πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.1K subscribers
88.5K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ Everything we know about the Ingram Micro cyber attack so far πŸ“’

A cyber attack on Ingram Micro severely disrupted operations and has been claimed by the SafePay ransomware group.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Bert Blitzes Linux & Windows Systems πŸ•΅οΈβ€β™‚οΈ

The new ransomware strain's aggressive multithreading and crossplatform capabilities make it a potent threat to enterprise environments.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ DPRK macOS 'NimDoor' Malware Targets Web3, Crypto Platforms πŸ•΅οΈβ€β™‚οΈ

Researchers observed North Korean threat actors targeting cryptocurrency and Web3 platforms on Telegram using malicious Zoom meeting requests.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Ransomware Attack Triggers Widespread Outage at Ingram Micro πŸ•΅οΈβ€β™‚οΈ

The outage began shortly before the July 4 holiday weekend and caused disruptions for customer ordering and other services provided by the IT distributor.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 'Hunters International' RaaS Group Closes Its Doors πŸ•΅οΈβ€β™‚οΈ

The announcement comes just months after security researchers observed that the group was making the transition to rebrand to World Leaks, a data theft outfit.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ€”1
πŸ•΅οΈβ€β™‚οΈ Chrome Store Features Extension Poisoned With Sophisticated Spyware πŸ•΅οΈβ€β™‚οΈ

A color picker for Google's browser with more than 100,000 downloads hijacks sessions every time a user navigates to a new webpage and also redirects them to malicious sites.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Applying Agentic AI to Legacy Systems? Prepare For These 4 Challenges 🦿

In this TechRepublic exclusive, a chief innovation officer provides guidance on addressing challenges when deploying AI agents in legacy software environments.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 FBI Warning: Scattered Spider Hackers Are Targeting Airlines, Too 🦿

Scattered Spider hackers are now targeting airlines with advanced social engineering tactics to bypass MFA and breach critical systems, the FBI warns.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ SEO Poisoning Campaign Targets 8,500+ SMB Users with Malware Disguised as AI Tools πŸ–‹οΈ

Cybersecurity researchers have disclosed a malicious campaign that leverages search engine optimization SEO poisoning techniques to deliver a known malware loader called Oyster aka Broomstick or CleanUpLoader. The malvertising activity, per Arctic Wolf, promotes fake websites hosting trojanized versions of legitimate tools like PuTTY and WinSCP, aiming to trick software professionals.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ ⚑ Weekly Recap: Chrome 0-Day, Ivanti Exploits, MacOS Stealers, Crypto Heists and More πŸ–‹οΈ

Everything feels secureuntil one small thing slips through. Even strong systems can break if a simple check is missed or a trusted tool is misused. Most threats dont start with alarmsthey sneak in through the little things we overlook. A tiny bug, a reused password, a quiet connectionthats all it takes. Staying safe isnt just about reacting fast. Its about catching these early signs.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Manufacturing Security: Why Default Passwords Must Go πŸ–‹οΈ

If you didn't hear about Iranian hackers breaching US water facilities, it's because they only managed to control a single pressure station serving 7,000 people. What made this attack noteworthy wasn't its scale, but how easily the hackers gained access by simply using the manufacturer's default password "1111." This narrow escape prompted CISA to urge manufacturers to.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ TAG-140 Deploys DRAT V2 RAT, Targeting Indian Government, Defense, and Rail Sectors πŸ–‹οΈ

A hacking group with ties other than Pakistan has been found targeting Indian government organizations with a modified variant of a remote access trojan RAT called DRAT. The activity has been attributed by Recorded Future's Insikt Group to a threat actor tracked as TAG140, which it said overlaps with SideCopy, an adversarial collective assessed to be an operational subcluster within.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Iran-Aligned Hacking Group Targets Middle Eastern Governments πŸ“”

Iranaligned BladedFeline group has been observed targeting the government of Iraq and KRG with advanced malware.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Researchers Share CitrixBleed 2 Detection Analysis After Initial Hold πŸ“”

Vulnerability research company WatchTowr published a detection analysis for the Citrix Blled 2 flaw.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Hackers Target Employee Credentials Amid Spike in ID Attacks πŸ“”

Cybersecurity researchers have observed a 156 increase in credential theft incidents between 2024 and Q1 2025.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Qantas Contacted by Potential Cybercriminal Following Data Breach πŸ“”

Qantas said it is currently validating the contact, and has informed law enforcement.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Hundreds of Malicious Domains Registered Ahead of Prime Day πŸ“”

Check Point has discovered over 1000 suspicious domains registered in the runup to Amazon Prime Day.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” IT Giant Ingram Micro Reveals Ransomware Breach πŸ“”

Distributor Ingram Micro says it has found ransomware on its internal systems.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Ongoing Phishing Campaign Utilizes LogoKit for Credential Harvesting πŸ¦…

Cyble Ongoing Phishing Campaign Utilizes LogoKit for Credential Harvesting " dataimagecaption"" datamediumfile"httpscyble.comwpcontentuploads202507NewCybleBlogs91300x150.jpg" datalargefile"httpscyble.comwpcontentuploads202507NewCybleBlogs911024x512.jpg" title"Ongoing Phishing Campaign Utilizes LogoKit for Credential Harvesting 1" Key Takeaways The initial phishing link we identified mimicked the Hungary CERT login page, with the victim's email address prefilled in the username field to enhance credibility and increase the likelihood of credential submission. The phishing pages were hosted on Amazon S3 AWS to stay under the radar and increase credibility among potential victims. The phishing pages integrate Cloudflare Turnstile to create a false sense of security and legitimacy...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Phishing, Pivots, and Persistence: A Look into Japan’s Q1 2025 Cyber Threat Landscape πŸ¦…

JPCERT " dataimagecaption"" datamediumfile"httpscyble.comwpcontentuploads202507JPCERT300x150.webp" datalargefile"httpscyble.comwpcontentuploads202507JPCERT1024x512.webp" title"Phishing, Pivots, and Persistence A Look into Japans Q1 2025 Cyber Threat Landscape  2" As cybercriminals evolve their techniques and tactics, defenders must stay several steps ahead to minimize the risk and damage. The latest Q1 2025 Incident Handling Report from Japans JPCERT Coordination Center JPCERTCC provides a frontrow seat into the most pressing threats facing Japanese networks this quarterand the findings should concern organizations far beyond Japan.  Between January and March 2025, JPCERTCC responded to 3,974 incidents, marking a 10 increase in case coordination compared to the previous quarter. The ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 North Korean Hackers Deploy Rare Nim-Based Malware on macOS to Target Web3 Startups 🦿

A new Nimbased malware campaign targets macOS users in crypto and Web3 firms, using novel persistence tricks and encrypted communication.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity