πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ Storm-0501 Exploits Entra ID to Exfiltrate and Delete Azure Data in Hybrid Cloud Attacks πŸ–‹οΈ

The financially motivated threat actor known as Storm0501 has been observed refining its tactics to conduct data exfiltration and extortion attacks targeting cloud environments. "Unlike traditional onpremises ransomware, where the threat actor typically deploys malware to encrypt critical files across endpoints within the compromised network and then negotiates for a decryption key,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Someone Created the First AI-Powered Ransomware Using OpenAI's gpt-oss:20b Model πŸ–‹οΈ

Cybersecurity company ESET has disclosed that it discovered an artificial intelligence AIpowered ransomware variant codenamed PromptLock. Written in Golang, the newly identified strain uses the gptoss20b model from OpenAI locally via the Ollama API to generate malicious Lua scripts in realtime. The openweight language model was released by OpenAI earlier this month. "PromptLock.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Someone Created the First AI-Powered Ransomware Using OpenAI's gpt-oss:20b Model πŸ–‹οΈ

Cybersecurity company ESET has disclosed that it discovered an artificial intelligence AIpowered ransomware variant codenamed PromptLock. Written in Golang, the newly identified strain uses the gptoss20b model from OpenAI locally via the Ollama API to generate malicious Lua scripts in realtime. The openweight language model was released by OpenAI earlier this month. "PromptLock.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Someone Created the First AI-Powered Ransomware Using OpenAI's gpt-oss:20b Model πŸ–‹οΈ

Cybersecurity company ESET has disclosed that it discovered an artificial intelligence AIpowered ransomware variant codenamed PromptLock. Written in Golang, the newly identified strain uses the gptoss20b model from OpenAI locally via the Ollama API to generate malicious Lua scripts in realtime. The openweight language model was released by OpenAI earlier this month. "PromptLock.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits πŸ–‹οΈ

The U.S. Department of the Treasury's Office of Foreign Assets Control OFAC announced a fresh round of sanctions against two individuals and two entities for their role in the North Korean remote information technology IT worker scheme to generate illicit revenue for the regime's weapons of mass destruction and ballistic missile programs. "The North Korean regime continues to target American.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Storm-0501 Exploits Entra ID to Exfiltrate and Delete Azure Data in Hybrid Cloud Attacks πŸ–‹οΈ

The financially motivated threat actor known as Storm0501 has been observed refining its tactics to conduct data exfiltration and extortion attacks targeting cloud environments. "Unlike traditional onpremises ransomware, where the threat actor typically deploys malware to encrypt critical files across endpoints within the compromised network and then negotiates for a decryption key,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Someone Created the First AI-Powered Ransomware Using OpenAI's gpt-oss:20b Model πŸ–‹οΈ

Cybersecurity company ESET has disclosed that it discovered an artificial intelligence AIpowered ransomware variant codenamed PromptLock. Written in Golang, the newly identified strain uses the gptoss20b model from OpenAI locally via the Ollama API to generate malicious Lua scripts in realtime. The openweight language model was released by OpenAI earlier this month. "PromptLock.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ Affiliates Flock to β€˜Soulless’ Scam Gambling Machine β™ŸοΈ

Last month, KrebsOnSecurity tracked the sudden emergence of hundreds of polished online gaming and wagering websites that lure people with free credits and eventually abscond with any cryptocurrency funds deposited by players. We've since learned that these scam gambling sites have proliferated thanks to a new Russian affiliate program called "Gambler Panel" that bills itself as a "soulless project that is made for profit.".

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Researchers Find VS Code Flaw Allowing Attackers to Republish Deleted Extensions Under Same Names πŸ–‹οΈ

Cybersecurity researchers have discovered a loophole in the Visual Studio Code Marketplace that allows threat actors to reuse names of previously removed extensions. Software supply chain security outfit ReversingLabs said it made the discovery after it identified a malicious extension named "ahbanC.shiba" that functioned similarly to two other extensions ahban.shiba and ahban.cychelloworld .

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Salesloft Attacks Target Google Workspace πŸ“”

Adversaries targeting the Salesloft Drift application integration with Salesforce have also compromised Google Workspace accounts.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Build Job-Ready IT and Cybersecurity Skills with Hands-On Labs 🦿

Get lifetime access to The 2025 Complete Defensive Cyber Security Bundle for 39.99 reg. 240.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Ransomware attack on IT supplier disrupts hundreds of Swedish municipalities πŸ“’

The attack on IT systems supplier Miljdata has impacted public sector services across the country.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Ransomware attack on IT supplier disrupts hundreds of Swedish municipalities πŸ“’

The attack on IT systems supplier Miljdata has impacted public sector services across the country.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” WhatsApp Patches Zero-Day, Zero-Click Flaw πŸ“”

WhatsApp has fixed a zeroday vulnerability linked to a sophisticated cyberattack.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Supply Chain Attacks Have Doubled. What’s Driving the Increase? πŸ¦…

supply chain attacks " dataimagecaption"" datamediumfile"httpscyble.comwpcontentuploads202509supplychainattacks300x150.webp" datalargefile"httpscyble.comwpcontentuploads202509supplychainattacks.webp" title"Supply Chain Attacks Have Doubled. Whats Driving the Increase?  1" Software supply chain attacks have been occurring at twice their longterm average in recent months and have shown no sign of slowing down.  The uptick in supply chain attacks began in April 2025, when Cyble dark web researchers observed claims of 31 such attacks. Since then, cyberattacks with supply chain implications have averaged 26 a month, twice the rate seen from early 2024 through March 2025 chart below.  Cybles most recent threat landscape report registration required documented 30 supply chain incidents...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Ransomware attack on IT supplier disrupts hundreds of Swedish municipalities πŸ“’

The attack on IT systems supplier Miljdata has impacted public sector services across the country.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Build Job-Ready IT and Cybersecurity Skills with Hands-On Labs 🦿

Get lifetime access to The 2025 Complete Defensive Cyber Security Bundle for 39.99 reg. 240.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Build Job-Ready IT and Cybersecurity Skills with Hands-On Labs 🦿

Get lifetime access to The 2025 Complete Defensive Cyber Security Bundle for 39.99 reg. 240.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Supply Chain Attacks Have Doubled. What’s Driving the Increase? πŸ¦…

supply chain attacks " dataimagecaption"" datamediumfile"httpscyble.comwpcontentuploads202509supplychainattacks300x150.webp" datalargefile"httpscyble.comwpcontentuploads202509supplychainattacks.webp" title"Supply Chain Attacks Have Doubled. Whats Driving the Increase?  1" Software supply chain attacks have been occurring at twice their longterm average in recent months and have shown no sign of slowing down.  The uptick in supply chain attacks began in April 2025, when Cyble dark web researchers observed claims of 31 such attacks. Since then, cyberattacks with supply chain implications have averaged 26 a month, twice the rate seen from early 2024 through March 2025 chart below.  Cybles most recent threat landscape report registration required documented 30 supply chain incidents...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Supply Chain Attacks Have Doubled. What’s Driving the Increase? πŸ¦…

supply chain attacks " dataimagecaption"" datamediumfile"httpscyble.comwpcontentuploads202509supplychainattacks300x150.webp" datalargefile"httpscyble.comwpcontentuploads202509supplychainattacks.webp" title"Supply Chain Attacks Have Doubled. Whats Driving the Increase?  1" Software supply chain attacks have been occurring at twice their longterm average in recent months and have shown no sign of slowing down.  The uptick in supply chain attacks began in April 2025, when Cyble dark web researchers observed claims of 31 such attacks. Since then, cyberattacks with supply chain implications have averaged 26 a month, twice the rate seen from early 2024 through March 2025 chart below.  Cybles most recent threat landscape report registration required documented 30 supply chain incidents...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ–‹οΈ ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics πŸ–‹οΈ

Cybersecurity researchers have discovered a new phishing campaign undertaken by the North Korealinked hacking group called ScarCruft aka APT37 to deliver a malware known as RokRAT. The activity has been codenamed Operation HanKook Phantom by Seqrite Labs, stating the attacks appear to target individuals associated with the National Intelligence Research Association, including academic figures.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1