🛡 Cybersecurity & Privacy 🛡 - News
25.1K subscribers
88.5K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
🕵️‍♂️ Criminals Sending QR Codes in Phishing, Malware Campaigns 🕵️‍♂️

The AntiPhishing Working Group observed how attackers are increasingly abusing QR codes to conduct phishing attacks or to trick users into downloading malware.

📖 Read more.

🔗 Via "Dark Reading"

----------
👁️ Seen on @cibsecurity
🕵️‍♂️ IDE Extensions Pose Hidden Risks to Software Supply Chain 🕵️‍♂️

Malicious extensions can be engineered to bypass verification checks for popular integrated development environments, according to research from OX Security.

📖 Read more.

🔗 Via "Dark Reading"

----------
👁️ Seen on @cibsecurity
🕵️‍♂️ Attackers Impersonate Top Brands in Callback Phishing 🕵️‍♂️

Microsoft, PayPal, Docusign, and others are among the trusted brands threat actors use in socially engineered scams that try to get victims to call adversarycontrolled phone numbers.

📖 Read more.

🔗 Via "Dark Reading"

----------
👁️ Seen on @cibsecurity
🖋️ Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It 🖋️

Generative AI is changing how businesses work, learn, and innovate. But beneath the surface, something dangerous is happening. AI agents and custom GenAI workflows are creating new, hidden ways for sensitive enterprise data to leakand most teams dont even realize it. If youre building, deploying, or managing AI systems, now is the time to ask Are your AI agents exposing confidential data.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
🖋️ Critical Sudo Vulnerabilities Let Local Users Gain Root Access on Linux, Impacting Major Distros 🖋️

Cybersecurity researchers have disclosed two security flaws in the Sudo commandline utility for Linux and Unixlike operating systems that could enable local attackers to escalate their privileges to root on susceptible machines. A brief description of the vulnerabilities is below CVE202532462 CVSS score 2.8 Sudo before 1.9.17p1, when used with a sudoers file that specifies a host.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
📔 Taiwan Flags Chinese Apps Over Data Security Violations 📔

Taiwan warned that popular Chineseowned apps, including TikTok and Weibo, are harvesting personal data and sending it back to servers in China.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
👍1
📔 EU Launches Plan to Implement Quantum-Secure Infrastructure 📔

The EUs Quantum Strategy includes plans to develop secure quantum communication infrastructure across the region.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
📔 WordPress Plugin Flaw Exposes 600,000 Sites to File Deletion 📔

A severe flaw identified in the Forminator WordPress plugin allows arbitrary file deletion and potential site takeover.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
📔 Privilege Escalation Flaw Found in Azure Machine Learning Service 📔

A critical Azure Machine Learning flaw allows privilege escalation, risking subscription compromise.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
📔 CVE Program Launches Two New Forums to Enhance CVE Utilization 📔

The CVE Board has launched a Consumer Working Group and a Researcher Working Group, allowing new stakeholders to shape the future of the CVE Program.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
📔 Automation and Vulnerability Exploitation Drive Mass Ransomware Breaches 📔

ReliaQuest warns that initial access vulnerability exploitation is driving successful ransomware attacks.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
📔 North Korean Hackers Target Crypto Firms with Novel macOS Malware 📔

SentinelLabs observed North Korean actors deploying novel TTPs to target crypto firms, including a mix of programming languages and signalbased persistence.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
📔 Ransomware: Hunters International Is Not Shutting Down, It's Rebranding 📔

Some admins of Hunters International are now part of the encryptionless cyber extortion group World Leaks.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
🦅 The Week in Vulnerabilities: High-Risk IT and ICS Flaws Flagged by Cyble 🦅

IT Vulnerabilities " dataimagecaption"" datamediumfile"httpscyble.comwpcontentuploads202507ITVulnerabilities2300x150.webp" datalargefile"httpscyble.comwpcontentuploads202507ITVulnerabilities2.webp" title"The Week in Vulnerabilities HighRisk IT and ICS Flaws Flagged by Cyble 1" Cyble vulnerability intelligence researchers investigated dozens of vulnerabilities this week to highlight the IT and industrial control system ICS vulnerabilities that security teams should prioritize.  Cyble honeypot sensors also detected numerous vulnerabilities under active exploitation, and Cyble dark web researchers observed several threat actors discussing vulnerability exploits on underground and cybercrime forums, including a claimed Apple zeroday.  What follows are some highlights from Cybles IT and...

📖 Read more.

🔗 Via "CYBLE"

----------
👁️ Seen on @cibsecurity
🖋️ NightEagle APT Exploits Microsoft Exchange Flaw to Target China's Military and Tech Sectors 🖋️

Cybersecurity researchers have shed light on a previously undocumented threat actor called NightEagle aka APTQ95 that has been observed targeting Microsoft Exchange servers as a part of a zeroday exploit chain designed to target government, defense, and technology sectors in China. According to QiAnXin's RedDrip Team, the threat actor has been active since 2023 and has switched network.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
🖋️ Taiwan NSB Alerts Public on Data Risks from TikTok, Weibo, and RedNote Over China Ties 🖋️

Taiwan's National Security Bureau NSB has warned that Chinadeveloped applications like RedNote aka Xiaohongshu, Weibo, TikTok, WeChat, and Baidu Cloud pose security risks due to excessive data collection and data transfer to China. The alert comes following an inspection of these apps carried out in coordination with the Ministry of Justice Investigation Bureau MJIB and the Criminal.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
1👏1
🖋️ Alert: Exposed JDWP Interfaces Lead to Crypto Mining, Hpingbot Targets SSH for DDoS 🖋️

Threat actors are weaponizing exposed Java Debug Wire Protocol JDWP interfaces to obtain code execution capabilities and deploy cryptocurrency miners on compromised hosts. "The attacker used a modified version of XMRig with a hard"coded configuration, allowing them to avoid suspicious commandline arguments that are often flagged by defenders," Wiz researchers Yaara Shriki and Gili.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
1
📢 Everything we know about the Ingram Micro cyber attack so far 📢

A cyber attack on Ingram Micro severely disrupted operations and has been claimed by the SafePay ransomware group.

📖 Read more.

🔗 Via "ITPro"

----------
👁️ Seen on @cibsecurity
🕵️‍♂️ Bert Blitzes Linux & Windows Systems 🕵️‍♂️

The new ransomware strain's aggressive multithreading and crossplatform capabilities make it a potent threat to enterprise environments.

📖 Read more.

🔗 Via "Dark Reading"

----------
👁️ Seen on @cibsecurity
🕵️‍♂️ DPRK macOS 'NimDoor' Malware Targets Web3, Crypto Platforms 🕵️‍♂️

Researchers observed North Korean threat actors targeting cryptocurrency and Web3 platforms on Telegram using malicious Zoom meeting requests.

📖 Read more.

🔗 Via "Dark Reading"

----------
👁️ Seen on @cibsecurity
🕵️‍♂️ Ransomware Attack Triggers Widespread Outage at Ingram Micro 🕵️‍♂️

The outage began shortly before the July 4 holiday weekend and caused disruptions for customer ordering and other services provided by the IT distributor.

📖 Read more.

🔗 Via "Dark Reading"

----------
👁️ Seen on @cibsecurity