πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.1K subscribers
88.5K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🌊 SOC as a Service buyer’s guide 🌊

When your provider stops delivering, its time for a change. This stepbystep guide shows you how to switch MSSP, MDR, MXDR... The post SOC as a Service buyers guide appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Massive Android Fraud Operations Uncovered: IconAds, Kaleidoscope, SMS Malware, NFC Scams πŸ–‹οΈ

A mobile ad fraud operation dubbed IconAds that consisted of 352 Android apps has been disrupted, according to a new report from HUMAN. The identified apps were designed to load outofcontext ads on a user's screen and hide their icons from the device home screen launcher, making it harder for victims to remove them, per the company's Satori Threat Intelligence and Research Team. The apps have.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” WordPress Plugin Flaw Exposes 600,000 Sites to File Deletion πŸ“”

A severe flaw identified in the Forminator WordPress plugin allows arbitrary file deletion and potential site takeover.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” WordPress Plugin Flaw Exposes 600,000 Sites to File Deletion πŸ“”

A severe flaw identified in the Forminator WordPress plugin allows arbitrary file deletion and potential site takeover.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ A major ransomware hosting provider just got hit US with sanctions πŸ“’

Aeza Group's services were being used for ransomware, infostealers, and disinformation.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Hackers are using PDFs to impersonate big brands like Microsoft and PayPal in a new threat campaign πŸ“’

Hackers are increasingly using PDF attachments to impersonate major brands in phishing campaigns, according to new research from Cisco Talos.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ–‹οΈ Massive Android Fraud Operations Uncovered: IconAds, Kaleidoscope, SMS Malware, NFC Scams πŸ–‹οΈ

A mobile ad fraud operation dubbed IconAds that consisted of 352 Android apps has been disrupted, according to a new report from HUMAN. The identified apps were designed to load outofcontext ads on a user's screen and hide their icons from the device home screen launcher, making it harder for victims to remove them, per the company's Satori Threat Intelligence and Research Team. The apps have.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Massive Android Fraud Operations Uncovered: IconAds, Kaleidoscope, SMS Malware, NFC Scams πŸ–‹οΈ

A mobile ad fraud operation dubbed IconAds that consisted of 352 Android apps has been disrupted, according to a new report from HUMAN. The identified apps were designed to load outofcontext ads on a user's screen and hide their icons from the device home screen launcher, making it harder for victims to remove them, per the company's Satori Threat Intelligence and Research Team. The apps have.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets, Stealing User Assets πŸ–‹οΈ

Cybersecurity researchers have uncovered over 40 malicious browser extensions for Mozilla Firefox that are designed to steal cryptocurrency wallet secrets, putting users' digital assets at risk. "These extensions impersonate legitimate wallet tools from widelyused platforms such as Coinbase, MetaMask, Trust Wallet, Phantom, Exodus, OKX, Keplr, MyMonero, Bitget, Leap, Ethereum Wallet, and Filfox.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Hackers are using PDFs to impersonate big brands like Microsoft and PayPal in a new threat campaign πŸ“’

Hackers are increasingly using PDF attachments to impersonate major brands in phishing campaigns, according to new research from Cisco Talos.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets, Stealing User Assets πŸ–‹οΈ

Cybersecurity researchers have uncovered over 40 malicious browser extensions for Mozilla Firefox that are designed to steal cryptocurrency wallet secrets, putting users' digital assets at risk. "These extensions impersonate legitimate wallet tools from widelyused platforms such as Coinbase, MetaMask, Trust Wallet, Phantom, Exodus, OKX, Keplr, MyMonero, Bitget, Leap, Ethereum Wallet, and Filfox.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” EU Launches Plan to Implement Quantum-Secure Infrastructure πŸ“”

The EUs Quantum Strategy includes plans to develop secure quantum communication infrastructure across the region.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Privilege Escalation Flaw Found in Azure Machine Learning Service πŸ“”

A critical Azure Machine Learning flaw allows privilege escalation, risking subscription compromise.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Hackers are using PDFs to impersonate big brands like Microsoft and PayPal in a new threat campaign πŸ“’

Hackers are increasingly using PDF attachments to impersonate major brands in phishing campaigns, according to new research from Cisco Talos.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Privilege Escalation Flaw Found in Azure Machine Learning Service πŸ“”

A critical Azure Machine Learning flaw allows privilege escalation, risking subscription compromise.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets, Stealing User Assets πŸ–‹οΈ

Cybersecurity researchers have uncovered over 40 malicious browser extensions for Mozilla Firefox that are designed to steal cryptocurrency wallet secrets, putting users' digital assets at risk. "These extensions impersonate legitimate wallet tools from widelyused platforms such as Coinbase, MetaMask, Trust Wallet, Phantom, Exodus, OKX, Keplr, MyMonero, Bitget, Leap, Ethereum Wallet, and Filfox.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets, Stealing User Assets πŸ–‹οΈ

Cybersecurity researchers have uncovered over 40 malicious browser extensions for Mozilla Firefox that are designed to steal cryptocurrency wallet secrets, putting users' digital assets at risk. "These extensions impersonate legitimate wallet tools from widelyused platforms such as Coinbase, MetaMask, Trust Wallet, Phantom, Exodus, OKX, Keplr, MyMonero, Bitget, Leap, Ethereum Wallet, and Filfox.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” WordPress Plugin Flaw Exposes 600,000 Sites to File Deletion πŸ“”

A severe flaw identified in the Forminator WordPress plugin allows arbitrary file deletion and potential site takeover.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets, Stealing User Assets πŸ–‹οΈ

Cybersecurity researchers have uncovered over 40 malicious browser extensions for Mozilla Firefox that are designed to steal cryptocurrency wallet secrets, putting users' digital assets at risk. "These extensions impersonate legitimate wallet tools from widelyused platforms such as Coinbase, MetaMask, Trust Wallet, Phantom, Exodus, OKX, Keplr, MyMonero, Bitget, Leap, Ethereum Wallet, and Filfox.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ The Hidden Weaknesses in AI SOC Tools that No One Talks About πŸ–‹οΈ

If youre evaluating AIpowered SOC platforms, youve likely seen bold claims faster triage, smarter remediation, and less noise. But under the hood, not all AI is created equal. Many solutions rely on pretrained AI models that are hardwired for a handful of specific use cases. While that might work for yesterdays SOC, today's reality is different. Modern security operations teams face a.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ The Hidden Weaknesses in AI SOC Tools that No One Talks About πŸ–‹οΈ

If youre evaluating AIpowered SOC platforms, youve likely seen bold claims faster triage, smarter remediation, and less noise. But under the hood, not all AI is created equal. Many solutions rely on pretrained AI models that are hardwired for a handful of specific use cases. While that might work for yesterdays SOC, today's reality is different. Modern security operations teams face a.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity