πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.1K subscribers
88.5K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ¦… The Week in Vulnerabilities: Citrix NetScaler Fixes Urged by Cyble πŸ¦…

Cyble The Week in Vulnerabilities Citrix NetScaler Fixes Urged by Cyble " dataimagecaption"Cyble The Week in Vulnerabilities Citrix NetScaler Fixes Urged by Cyble " datamediumfile"httpscyble.comwpcontentuploads202506CybleBlogsVulnerabilitiesCitrix300x150.jpg" datalargefile"httpscyble.comwpcontentuploads202506CybleBlogsVulnerabilitiesCitrix.jpg" title"The Week in Vulnerabilities Citrix NetScaler Fixes Urged by Cyble  1" In addition to highrisk and actively exploited vulnerabilities, Cyble researchers also observed threat actors on cybercrime forums discussing potential exploits and zeroday vulnerabilities, increasing the chances that those flaws could also be exploited.  What follows are some highlights from Cybles weekly Vulnerability Intelligence and Sensor Intelligence reports.  ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Airoha Chip Vulns Put Sony, Bose Earbuds & Headphones at Risk πŸ•΅οΈβ€β™‚οΈ

The vulnerabilities, which have yet to be published, could allow a threat actor to hijack not only Bluetooth earbuds and headphones but also the devices connected to them.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Chinese Company Hikvision Banned By Canadian Government πŸ•΅οΈβ€β™‚οΈ

Though the company's video surveillance products will be prohibited for government use, individuals and private businesses can still buy the vendor's products.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ Hired Hacker Assists Drug Cartel in Finding, Killing FBI Sources πŸ•΅οΈβ€β™‚οΈ

According to a government report, El Chapo's Sinaloa drug cartel used a hacker to spy on people connected to the FBI's 2018 investigation against the kingpin, which led to deadly consequences.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Scattered Spider Hacking Spree Continues With Airline Sector Attacks πŸ•΅οΈβ€β™‚οΈ

Microsoft has called the hacker collective one of the most dangerous current cyberthreats.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” WordPress Plugin Flaw Exposes 600,000 Sites to File Deletion πŸ“”

A severe flaw identified in the Forminator WordPress plugin allows arbitrary file deletion and potential site takeover.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” WordPress Plugin Flaw Exposes 600,000 Sites to File Deletion πŸ“”

A severe flaw identified in the Forminator WordPress plugin allows arbitrary file deletion and potential site takeover.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” WordPress Plugin Flaw Exposes 600,000 Sites to File Deletion πŸ“”

A severe flaw identified in the Forminator WordPress plugin allows arbitrary file deletion and potential site takeover.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” WordPress Plugin Flaw Exposes 600,000 Sites to File Deletion πŸ“”

A severe flaw identified in the Forminator WordPress plugin allows arbitrary file deletion and potential site takeover.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Privilege Escalation Flaw Found in Azure Machine Learning Service πŸ“”

A critical Azure Machine Learning flaw allows privilege escalation, risking subscription compromise.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Privilege Escalation Flaw Found in Azure Machine Learning Service πŸ“”

A critical Azure Machine Learning flaw allows privilege escalation, risking subscription compromise.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 AI-Generated Phishing Sites Mimic Okta, Microsoft 365 in New Threat Campaign 🦿

Threat actors are exploiting Vercel's AI tool to generate convincing phishing pages. Read Vercels response and Oktas tips for keeping your organization secure.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ New Cyber Blueprint Aims to Guide Organizations on AI Journey πŸ•΅οΈβ€β™‚οΈ

Deloitte's new blueprint looks to bridge the gap between the massive push for AI adoption and a lack of preparedness among leaders and employees.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ New Cyber Blueprint Aims to Guide Organizations on AI Journey πŸ•΅οΈβ€β™‚οΈ

Deloitte's new blueprint looks to bridge the gap between the massive push for AI adoption and a lack of preparedness among leaders and employees.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸš€ How government cyber cuts will affect you and your business πŸš€

Deep cuts in cybersecurity spending risk creating ripple effects that will put many organizations at a higher risk of falling victim to cyberattacks.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ New Cyber Blueprint Aims to Guide Organizations on AI Journey πŸ•΅οΈβ€β™‚οΈ

Deloitte's new blueprint looks to bridge the gap between the massive push for AI adoption and a lack of preparedness among leaders and employees.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 AI-Generated Phishing Sites Mimic Okta, Microsoft 365 in New Threat Campaign 🦿

Threat actors are exploiting Vercel's AI tool to generate convincing phishing pages. Read Vercels response and Oktas tips for keeping your organization secure.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Privilege Escalation Flaw Found in Azure Machine Learning Service πŸ“”

A critical Azure Machine Learning flaw allows privilege escalation, risking subscription compromise.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Privilege Escalation Flaw Found in Azure Machine Learning Service πŸ“”

A critical Azure Machine Learning flaw allows privilege escalation, risking subscription compromise.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Using WinRAR? Update now to avoid falling victim to this file path flaw πŸ“’

WinRAR users have been urged to update after a patch was issued for a serious vulnerability.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ Big Tech’s Mixed Response to U.S. Treasury Sanctions β™ŸοΈ

In May 2025, the U.S. government sanctioned a Chinese national for operating a cloud provider linked to the majority of virtual currency investment scam websites reported to the FBI. But more than a month later, the accused continues to openly operate accounts at a slew of American tech companies, including Facebook, Github, LinkedIn, PayPal and TwitterX.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity