๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News
25.9K subscribers
89.2K links
๐Ÿ—ž The finest daily news on cybersecurity and privacy.

๐Ÿ”” Daily releases.

๐Ÿ’ป Is your online life secure?

๐Ÿ“ฉ lalilolalo.dev@gmail.com
Download Telegram
๐Ÿ“” Jaguar Cyber Incident "Severely Disrupts" Sales and Operations ๐Ÿ“”

Jaguar has proactively shut down systems to mitigate the impact of the incident, amid reports that workers at a UK manufacturing plant had been told to stay at home.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“ข Blackpoint Cyber and NinjaOne partner to bolster MSP cybersecurity ๐Ÿ“ข

The collaboration combines Blackpoint Cybers MDR expertise with NinjaOnes automated endpoint management platform.

๐Ÿ“– Read more.

๐Ÿ”— Via "ITPro"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“ข The Salesloft Drift victim list keeps growing: Zscaler is the latest to confirm a breach, warning customers to remain wary of follow-up phishing attacks ๐Ÿ“ข

The company has warned customers that their data may have been accessed, saying it's implemented extra safeguards in response.

๐Ÿ“– Read more.

๐Ÿ”— Via "ITPro"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“” Azure AD Credentials Exposed in Public App Settings File ๐Ÿ“”

Experts have revealed an Azure AD vulnerability exposing ClientId and ClientSecret in a publicly accessible appsettings.json file.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“” Malicious npm Package Masquerades as Popular Email Library ๐Ÿ“”

A malicious npm package nodejssmtp has been discovered impersonating nodemailer and injecting code to drain crypto wallets.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ–‹๏ธ Researchers Warn of MystRodX Backdoor Using DNS and ICMP Triggers for Stealthy Control ๐Ÿ–‹๏ธ

Cybersecurity researchers have disclosed a stealthy new backdoor called MystRodX that comes with a variety of features to capture sensitive data from compromised systems. "MystRodX is a typical backdoor implemented in C, supporting features like file management, port forwarding, reverse shell, and socket management," QiAnXin XLab said in a report published last week. "Compared to typical.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“” ICE Reinstates Contract with Spyware Vendor Paragon ๐Ÿ“”

The US Immigration agency has resumed a 2m contract with the Graphite spyware developer, now owned by US investor AE Industrial Partners.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ–‹๏ธ Lazarus Group Expands Malware Arsenal With PondRAT, ThemeForestRAT, and RemotePE ๐Ÿ–‹๏ธ

The North Korealinked threat actor known as the Lazarus Group has been attributed to a social engineering campaign that distributes three different pieces of crossplatform malware called PondRAT, ThemeForestRAT, and RemotePE. The attack, observed by NCC Group's FoxIT in 2024, targeted an organization in the decentralized finance DeFi sector, ultimately leading to the compromise of an.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿฆฟ Top Tech Conferences & Events to Add to Your Calendar in 2025 ๐Ÿฆฟ

A great way to stay current with the latest tech trends and innovations is to attend conferences. Read and bookmark TechRepublic's events guide.

๐Ÿ“– Read more.

๐Ÿ”— Via "Tech Republic"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ–‹๏ธ Salesloft Takes Drift Offline After OAuth Token Theft Hits Hundreds of Organizations ๐Ÿ–‹๏ธ

Salesloft on Tuesday announced that it's taking Drift temporarily offline "in the very near future," as multiple companies have been ensnared in a farreaching supply chain attack spree targeting the marketing softwareasaservice product, resulting in the mass theft of authentication tokens. "This will provide the fastest path forward to comprehensively review the application and build.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿฆ… How Chinese State-Sponsored APT Actors Exploit Routers for Stealthy Cyber Espionage ๐Ÿฆ…

Chinese statesponsored " dataimagecaption"" datamediumfile"httpscyble.comwpcontentuploads202509Chinesestatesponsored300x150.webp" datalargefile"httpscyble.comwpcontentuploads202509Chinesestatesponsored1024x512.webp" title"How Chinese StateSponsored APT Actors Exploit Routers for Stealthy Cyber Espionage  1" Chinese statesponsored cyber espionage campaigns have been reportedly targeting critical sectors across the globe. From telecommunications and government to transportation, lodging, and military operations, cyber actors linked to the Peoples Republic of China PRC are conducting extensive, stealthy operations to infiltrate and control key network devices. This ongoing cyber onslaught has been documented by leading government agencies, revealing a complex web of tactics designed for l...

๐Ÿ“– Read more.

๐Ÿ”— Via "CYBLE"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ–‹๏ธ CISA Adds TP-Link and WhatsApp Flaws to KEV Catalog Amid Active Exploitation ๐Ÿ–‹๏ธ

The U.S. Cybersecurity and Infrastructure Security Agency CISA on Tuesday added a highseverity security flaw impacting TPLink TLWA855RE WiFi Ranger Extender products to its Known Exploited Vulnerabilities KEV catalog, citing evidence of active exploitation. The vulnerability, CVE202024363 CVSS score 8.8, concerns a case of missing authentication that could be abused to obtain.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ–‹๏ธ Cloudflare Blocks Record-Breaking 11.5 Tbps DDoS Attack ๐Ÿ–‹๏ธ

Cloudflare on Tuesday said it automatically mitigated a recordsetting volumetric distributed denialofservice DDoS attack that peaked at 11.5 terabits per second Tbps. "Over the past few weeks, we've autonomously blocked hundreds of hypervolumetric DDoS attacks, with the largest reaching peaks of 5.1 Bpps and 11.5 Tbps," the web infrastructure and security company said in a post on X. ".

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“” Brazilian FinTech Giant Sinqia Reveals $130m Heist Attempt ๐Ÿ“”

Evertec subsidiary Sinqia has posted details of an attempt to steal 130m from two B2B partners.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“ข Jaguar Land Rover โ€œdid the right thingโ€ shutting down systems to thwart cyber attack ๐Ÿ“ข

The attack on Jaguar Land Rover highlights the growing attractiveness of the automotive sector.

๐Ÿ“– Read more.

๐Ÿ”— Via "ITPro"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ–‹๏ธ Iranian Hackers Exploit 100+ Embassy Email Accounts in Global Phishing Targeting Diplomats ๐Ÿ–‹๏ธ

An Irannexus group has been linked to a "coordinated" and "multiwave" spearphishing campaign targeting the embassies and consulates in Europe and other regions across the world. The activity has been attributed by Israeli cybersecurity company Dream to Iranianaligned operators connected to broader offensive cyber activity undertaken by a group known as Homeland Justice. "Emails were sent to.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ–‹๏ธ AI-Driven Trends in Endpoint Security: What the 2025 Gartnerยฎ Magic Quadrantโ„ข Reveals ๐Ÿ–‹๏ธ

Cyber threats and attacks like ransomware continue to increase in volume and complexity with the endpoint typically being the most sought after and valued target. With the rapid expansion and adoption of AI, it is more critical than ever to ensure the endpoint is adequately secured by a platform capable of not just keeping pace, but staying ahead of an everevolving threat landscape.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“” Tycoon Phishing Kit Utilizes New Capabilities to Hide Malicious Links ๐Ÿ“”

Barracuda observed new methods to disguise phishing links in Tycoon phishing attacks, which are designed to bypass automated email security systems.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿฆฟ Best Practices to Minimize Security Risks ๐Ÿฆฟ

To reduce security threats within your organization, you must prioritize security risk management. Here are some best practices to follow, as well as some top resources from TechRepublic Premium.

๐Ÿ“– Read more.

๐Ÿ”— Via "Tech Republic"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“” Cloudflare and Palo Alto Networks Victimized in Salesloft Drift Breach ๐Ÿ“”

Cloudflare has notified customers that hackers may have accessed their data as part of the Salesloft Drift campaign.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“ข Security experts weigh in on โ€˜offboardingโ€™ practices after former Intel worker stole documents before changing jobs ๐Ÿ“ข

Enterprises should act swiftly to revoke rights and access, regardless of the manner of an employees departure.

๐Ÿ“– Read more.

๐Ÿ”— Via "ITPro"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity