🛡 Cybersecurity & Privacy 🛡 - News
25.1K subscribers
88.5K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
📔 WordPress Plugin Flaw Exposes 600,000 Sites to File Deletion 📔

A severe flaw identified in the Forminator WordPress plugin allows arbitrary file deletion and potential site takeover.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
📔 Privilege Escalation Flaw Found in Azure Machine Learning Service 📔

A critical Azure Machine Learning flaw allows privilege escalation, risking subscription compromise.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
📔 CVE Program Launches Two New Forums to Enhance CVE Utilization 📔

The CVE Board has launched a Consumer Working Group and a Researcher Working Group, allowing new stakeholders to shape the future of the CVE Program.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
📔 Automation and Vulnerability Exploitation Drive Mass Ransomware Breaches 📔

ReliaQuest warns that initial access vulnerability exploitation is driving successful ransomware attacks.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
📔 North Korean Hackers Target Crypto Firms with Novel macOS Malware 📔

SentinelLabs observed North Korean actors deploying novel TTPs to target crypto firms, including a mix of programming languages and signalbased persistence.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
📔 Ransomware: Hunters International Is Not Shutting Down, It's Rebranding 📔

Some admins of Hunters International are now part of the encryptionless cyber extortion group World Leaks.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
🦅 The Week in Vulnerabilities: High-Risk IT and ICS Flaws Flagged by Cyble 🦅

IT Vulnerabilities " dataimagecaption"" datamediumfile"httpscyble.comwpcontentuploads202507ITVulnerabilities2300x150.webp" datalargefile"httpscyble.comwpcontentuploads202507ITVulnerabilities2.webp" title"The Week in Vulnerabilities HighRisk IT and ICS Flaws Flagged by Cyble 1" Cyble vulnerability intelligence researchers investigated dozens of vulnerabilities this week to highlight the IT and industrial control system ICS vulnerabilities that security teams should prioritize.  Cyble honeypot sensors also detected numerous vulnerabilities under active exploitation, and Cyble dark web researchers observed several threat actors discussing vulnerability exploits on underground and cybercrime forums, including a claimed Apple zeroday.  What follows are some highlights from Cybles IT and...

📖 Read more.

🔗 Via "CYBLE"

----------
👁️ Seen on @cibsecurity
🖋️ NightEagle APT Exploits Microsoft Exchange Flaw to Target China's Military and Tech Sectors 🖋️

Cybersecurity researchers have shed light on a previously undocumented threat actor called NightEagle aka APTQ95 that has been observed targeting Microsoft Exchange servers as a part of a zeroday exploit chain designed to target government, defense, and technology sectors in China. According to QiAnXin's RedDrip Team, the threat actor has been active since 2023 and has switched network.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
🖋️ Taiwan NSB Alerts Public on Data Risks from TikTok, Weibo, and RedNote Over China Ties 🖋️

Taiwan's National Security Bureau NSB has warned that Chinadeveloped applications like RedNote aka Xiaohongshu, Weibo, TikTok, WeChat, and Baidu Cloud pose security risks due to excessive data collection and data transfer to China. The alert comes following an inspection of these apps carried out in coordination with the Ministry of Justice Investigation Bureau MJIB and the Criminal.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
1👏1
🖋️ Alert: Exposed JDWP Interfaces Lead to Crypto Mining, Hpingbot Targets SSH for DDoS 🖋️

Threat actors are weaponizing exposed Java Debug Wire Protocol JDWP interfaces to obtain code execution capabilities and deploy cryptocurrency miners on compromised hosts. "The attacker used a modified version of XMRig with a hard"coded configuration, allowing them to avoid suspicious commandline arguments that are often flagged by defenders," Wiz researchers Yaara Shriki and Gili.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
1
📢 Everything we know about the Ingram Micro cyber attack so far 📢

A cyber attack on Ingram Micro severely disrupted operations and has been claimed by the SafePay ransomware group.

📖 Read more.

🔗 Via "ITPro"

----------
👁️ Seen on @cibsecurity
🕵️‍♂️ Bert Blitzes Linux & Windows Systems 🕵️‍♂️

The new ransomware strain's aggressive multithreading and crossplatform capabilities make it a potent threat to enterprise environments.

📖 Read more.

🔗 Via "Dark Reading"

----------
👁️ Seen on @cibsecurity
🕵️‍♂️ DPRK macOS 'NimDoor' Malware Targets Web3, Crypto Platforms 🕵️‍♂️

Researchers observed North Korean threat actors targeting cryptocurrency and Web3 platforms on Telegram using malicious Zoom meeting requests.

📖 Read more.

🔗 Via "Dark Reading"

----------
👁️ Seen on @cibsecurity
🕵️‍♂️ Ransomware Attack Triggers Widespread Outage at Ingram Micro 🕵️‍♂️

The outage began shortly before the July 4 holiday weekend and caused disruptions for customer ordering and other services provided by the IT distributor.

📖 Read more.

🔗 Via "Dark Reading"

----------
👁️ Seen on @cibsecurity
🕵️‍♂️ 'Hunters International' RaaS Group Closes Its Doors 🕵️‍♂️

The announcement comes just months after security researchers observed that the group was making the transition to rebrand to World Leaks, a data theft outfit.

📖 Read more.

🔗 Via "Dark Reading"

----------
👁️ Seen on @cibsecurity
🤔1
🕵️‍♂️ Chrome Store Features Extension Poisoned With Sophisticated Spyware 🕵️‍♂️

A color picker for Google's browser with more than 100,000 downloads hijacks sessions every time a user navigates to a new webpage and also redirects them to malicious sites.

📖 Read more.

🔗 Via "Dark Reading"

----------
👁️ Seen on @cibsecurity
🦿 Applying Agentic AI to Legacy Systems? Prepare For These 4 Challenges 🦿

In this TechRepublic exclusive, a chief innovation officer provides guidance on addressing challenges when deploying AI agents in legacy software environments.

📖 Read more.

🔗 Via "Tech Republic"

----------
👁️ Seen on @cibsecurity
🦿 FBI Warning: Scattered Spider Hackers Are Targeting Airlines, Too 🦿

Scattered Spider hackers are now targeting airlines with advanced social engineering tactics to bypass MFA and breach critical systems, the FBI warns.

📖 Read more.

🔗 Via "Tech Republic"

----------
👁️ Seen on @cibsecurity
🖋️ SEO Poisoning Campaign Targets 8,500+ SMB Users with Malware Disguised as AI Tools 🖋️

Cybersecurity researchers have disclosed a malicious campaign that leverages search engine optimization SEO poisoning techniques to deliver a known malware loader called Oyster aka Broomstick or CleanUpLoader. The malvertising activity, per Arctic Wolf, promotes fake websites hosting trojanized versions of legitimate tools like PuTTY and WinSCP, aiming to trick software professionals.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
🖋️ Weekly Recap: Chrome 0-Day, Ivanti Exploits, MacOS Stealers, Crypto Heists and More 🖋️

Everything feels secureuntil one small thing slips through. Even strong systems can break if a simple check is missed or a trusted tool is misused. Most threats dont start with alarmsthey sneak in through the little things we overlook. A tiny bug, a reused password, a quiet connectionthats all it takes. Staying safe isnt just about reacting fast. Its about catching these early signs.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
🖋️ Manufacturing Security: Why Default Passwords Must Go 🖋️

If you didn't hear about Iranian hackers breaching US water facilities, it's because they only managed to control a single pressure station serving 7,000 people. What made this attack noteworthy wasn't its scale, but how easily the hackers gained access by simply using the manufacturer's default password "1111." This narrow escape prompted CISA to urge manufacturers to.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity