πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.5K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🦿 AI-Powered Browser Comet From Perplexity Launches β€˜To Amplify Our Intelligence’ 🦿

Perplexitys new Comet web browser was built on a foundation of privacy. Learn about Comets other key features and availability.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ€”1
β™ŸοΈ UK Arrests Four in β€˜Scattered Spider’ Ransom Group β™ŸοΈ

Authorities in the United Kingdom this week arrested four alleged members of "Scattered Spider," a prolific data theft and extortion group whose recent victims include multiple airlines and the U.K. retail chain Marks Spencer.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises πŸ–‹οΈ

The U.S. Cybersecurity and Infrastructure Security Agency CISA on Thursday added a critical security flaw impacting Citrix NetScaler ADC and Gateway to its Known Exploited Vulnerabilities KEV catalog, officially confirming the vulnerability has been weaponized in the wild. The shortcoming in question is CVE20255777 CVSS score 9.3, an instance of insufficient input validation that.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads πŸ–‹οΈ

Cybersecurity researchers have discovered a critical vulnerability in the opensource mcpremote project that could result in the execution of arbitrary operating system OS commands. The vulnerability, tracked as CVE20256514, carries a CVSS score of 9.6 out of 10.0. "The vulnerability allows attackers to trigger arbitrary OS command execution on the machine running mcpremote when it.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord πŸ–‹οΈ

Cryptocurrency users are the target of an ongoing social engineering campaign that employs fake startup companies to trick users into downloading malware that can drain digital assets from both Windows and macOS systems. "These malicious operations impersonate AI, gaming, and Web3 firms using spoofed social media accounts and project documentation hosted on legitimate platforms like Notion and.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” LLMs Fall Short in Vulnerability Discovery and Exploitation πŸ“”

Forescout found that most LLMs are unreliable in vulnerability research and exploit tasks, with threat actors still skeptical about using tools for these purposes.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 McAfee Pricing 2025: Ultimate Guide for Security Products 🌊

In 2025, McAfee continues to offer a wide range of cybersecurity solutions tailored to individuals, SMBs, and large enterprises.  For businesses, McAfee Endpoint Security typically starts at around 3555 per user per year, with McAfee MVISION cloudnative offerings priced higher, often 70120 per useryear based on modules like EDR, XDR, or CNAPP. Enterprise bundles can The post McAfee Pricing 2025 Ultimate Guide for Security Products appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 Proofpoint Pricing 2025: Ultimate Guide for Security Products 🌊

In 2025, Proofpoint continues to be a leading choice for email security, threat protection, and data loss prevention across organizations of all sizes. Pricing varies significantly depending on the modules selected and organization size. Entrylevel Essentials plans for small businesses start around 25 per usermonth, while Enterprisegrade bundles with advanced threat protection, DLP, and archiving The post Proofpoint Pricing 2025 Ultimate Guide for Security Products appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Hacktivist Attacks on Critical Infrastructure Grow as New Groups Emerge πŸ¦…

Cyble Hacktivist Attacks on Critical Infrastructure Grow as New Groups Emerge " dataimagecaption"Cyble Hacktivist Attacks on Critical Infrastructure Grow as New Groups Emerge " datamediumfile"httpscyble.comwpcontentuploads202507CybleBlogsHactivists300x150.jpg" datalargefile"httpscyble.comwpcontentuploads202507CybleBlogsHactivists.jpg" title"Hacktivist Attacks on Critical Infrastructure Grow as New Groups Emerge  1" Hacktivists are increasingly targeting critical infrastructure as they expand beyond the DDoS attacks and website defacements typically associated with ideologically motivated cyberattacks.  Cybles assessment of the hacktivism threat landscape in the second quarter of 2025 found that industrial control system ICS attacks, data breaches, and accessbased attacks now compris...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ M&S chair calls for mandatory reporting of cyber attacks after "traumatic" ransomware incident – but will it do more harm than good? πŸ“’

MS chair Archie Norman has called for mandatory reporting amid claims two large UK companies were hacked without any public knowledge.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” MPs Warn of β€œSignificant” Iranian Cyber-Threat to UK πŸ“”

The Intelligence and Security Committee has warned of Irans aggressive and extensive cyber capabilities.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Over Half of β€œFinfluencer” Victims Have Lost Money, Says TSB πŸ“”

British bank TSB warns of rise of finfluencers who dispense dubious financial advice online.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“” Indian Cyber Espionage Group Targets Italian Government πŸ“”

DoNot APT, also known as APTC35, traditionally operates exclusively in South Asia.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Ingram Micro cyber attack: IT distributor says system restoration underway – but some customers might have to wait for a return to normality πŸ“’

Ingram Micro is gradually getting back on its feet after a recent cyber attack severely disrupted systems.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” British Man Sentenced for Network Rail Wi-Fi Hack πŸ“”

The man was handed a suspended prison sentence for offenses relating to the hack of Network Rail public WiFi, exposing customers to offensive messaging.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Securing Data in the AI Era πŸ–‹οΈ

The 2025 Data Risk Report Enterprises face potentially serious data loss risks from AIfueled tools. Adopting a unified, AIdriven approach to data security can help. As businesses increasingly rely on clouddriven platforms and AIpowered tools to accelerate digital transformation, the stakes for safeguarding sensitive enterprise data have reached unprecedented levels. The Zscaler ThreatLabz.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild πŸ–‹οΈ

A recently disclosed maximumseverity security flaw impacting the Wing FTP Server has come under active exploitation in the wild, according to Huntress. The vulnerability, tracked as CVE202547812 CVSS score 10.0, is a case of improper handling of null '0' bytes in the server's web interface, which allows for remote code execution. It has been addressed in version 7.4.4. "The user and.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals πŸ–‹οΈ

An Iranianbacked ransomwareasaservice RaaS named Pay2Key has resurfaced in the wake of the IsraelIranU.S. conflict last month, offering bigger payouts to cybercriminals who launch attacks against Israel and the U.S. The financially motivated scheme, now operating under the moniker Pay2Key.I2P, is assessed to be linked to a hacking group tracked as Fox Kitten aka Lemon Sandstorm. ".

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ–‹οΈ PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution πŸ–‹οΈ

Cybersecurity researchers have discovered a set of four security flaws in OpenSynergy's BlueSDK Bluetooth stack that, if successfully exploited, could allow remote code execution on millions of transport vehicles from different vendors. The vulnerabilities, dubbed PerfektBlue, can be fashioned together as an exploit chain to run arbitrary code on cars from at least three major automakers,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ•΅οΈβ€β™‚οΈ Factoring Cybersecurity Into Finance's Digital Strategy πŸ•΅οΈβ€β™‚οΈ

As financial institutions continue to embrace digital transformation, their success will depend on their ability to establish and maintain robust and responsible cybersecurity practices.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” ISACA Addresses Experience Gap with CISA Associate Designation πŸ“”

The new CISA Associate designation recognizes ISACA members who have passed the CISA exam, but do not yet have the required experience.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity