๐ฆฟ Top Tech Conferences & Events to Add to Your Calendar in 2025 ๐ฆฟ
๐ Read more.
๐ Via "Tech Republic"
----------
๐๏ธ Seen on @cibsecurity
A great way to stay current with the latest tech trends and innovations is to attend conferences. Read and bookmark TechRepublic's events guide.๐ Read more.
๐ Via "Tech Republic"
----------
๐๏ธ Seen on @cibsecurity
TechRepublic
Top Tech Conferences & Events to Add to Your Calendar in 2025
Discover the top tech conferences and events to add to your calendar in 2025, and stay updated on the latest trends and innovations.
๐๏ธ Salesloft Takes Drift Offline After OAuth Token Theft Hits Hundreds of Organizations ๐๏ธ
๐ Read more.
๐ Via "The Hacker News"
----------
๐๏ธ Seen on @cibsecurity
Salesloft on Tuesday announced that it's taking Drift temporarily offline "in the very near future," as multiple companies have been ensnared in a farreaching supply chain attack spree targeting the marketing softwareasaservice product, resulting in the mass theft of authentication tokens. "This will provide the fastest path forward to comprehensively review the application and build.๐ Read more.
๐ Via "The Hacker News"
----------
๐๏ธ Seen on @cibsecurity
๐ฆ
How Chinese State-Sponsored APT Actors Exploit Routers for Stealthy Cyber Espionage ๐ฆ
๐ Read more.
๐ Via "CYBLE"
----------
๐๏ธ Seen on @cibsecurity
Chinese statesponsored " dataimagecaption"" datamediumfile"httpscyble.comwpcontentuploads202509Chinesestatesponsored300x150.webp" datalargefile"httpscyble.comwpcontentuploads202509Chinesestatesponsored1024x512.webp" title"How Chinese StateSponsored APT Actors Exploit Routers for Stealthy Cyber Espionage 1" Chinese statesponsored cyber espionage campaigns have been reportedly targeting critical sectors across the globe. From telecommunications and government to transportation, lodging, and military operations, cyber actors linked to the Peoples Republic of China PRC are conducting extensive, stealthy operations to infiltrate and control key network devices. This ongoing cyber onslaught has been documented by leading government agencies, revealing a complex web of tactics designed for l...๐ Read more.
๐ Via "CYBLE"
----------
๐๏ธ Seen on @cibsecurity
Cyble
Chinese State-Sponsored Group Targets Global Networks
Chinese state-sponsored hackers exploit router vulnerabilities to infiltrate global telecom, government, and military networks in stealthy.
๐๏ธ CISA Adds TP-Link and WhatsApp Flaws to KEV Catalog Amid Active Exploitation ๐๏ธ
๐ Read more.
๐ Via "The Hacker News"
----------
๐๏ธ Seen on @cibsecurity
The U.S. Cybersecurity and Infrastructure Security Agency CISA on Tuesday added a highseverity security flaw impacting TPLink TLWA855RE WiFi Ranger Extender products to its Known Exploited Vulnerabilities KEV catalog, citing evidence of active exploitation. The vulnerability, CVE202024363 CVSS score 8.8, concerns a case of missing authentication that could be abused to obtain.๐ Read more.
๐ Via "The Hacker News"
----------
๐๏ธ Seen on @cibsecurity
๐๏ธ Cloudflare Blocks Record-Breaking 11.5 Tbps DDoS Attack ๐๏ธ
๐ Read more.
๐ Via "The Hacker News"
----------
๐๏ธ Seen on @cibsecurity
Cloudflare on Tuesday said it automatically mitigated a recordsetting volumetric distributed denialofservice DDoS attack that peaked at 11.5 terabits per second Tbps. "Over the past few weeks, we've autonomously blocked hundreds of hypervolumetric DDoS attacks, with the largest reaching peaks of 5.1 Bpps and 11.5 Tbps," the web infrastructure and security company said in a post on X. ".๐ Read more.
๐ Via "The Hacker News"
----------
๐๏ธ Seen on @cibsecurity
๐ Brazilian FinTech Giant Sinqia Reveals $130m Heist Attempt ๐
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
Evertec subsidiary Sinqia has posted details of an attempt to steal 130m from two B2B partners.๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
Infosecurity Magazine
Brazilian Fintech Giant Sinqia Reveals $130m Heist Attempt
Evertec subsidiary Sinqia has posted details of an attempt to steal $130m from two B2B partners
๐ข Jaguar Land Rover โdid the right thingโ shutting down systems to thwart cyber attack ๐ข
๐ Read more.
๐ Via "ITPro"
----------
๐๏ธ Seen on @cibsecurity
The attack on Jaguar Land Rover highlights the growing attractiveness of the automotive sector.๐ Read more.
๐ Via "ITPro"
----------
๐๏ธ Seen on @cibsecurity
IT Pro
Jaguar Land Rover โdid the right thingโ shutting down systems to thwart cyber attack
The attack on Jaguar Land Rover highlights the growing attractiveness of the automotive sector
๐๏ธ Iranian Hackers Exploit 100+ Embassy Email Accounts in Global Phishing Targeting Diplomats ๐๏ธ
๐ Read more.
๐ Via "The Hacker News"
----------
๐๏ธ Seen on @cibsecurity
An Irannexus group has been linked to a "coordinated" and "multiwave" spearphishing campaign targeting the embassies and consulates in Europe and other regions across the world. The activity has been attributed by Israeli cybersecurity company Dream to Iranianaligned operators connected to broader offensive cyber activity undertaken by a group known as Homeland Justice. "Emails were sent to.๐ Read more.
๐ Via "The Hacker News"
----------
๐๏ธ Seen on @cibsecurity
๐๏ธ AI-Driven Trends in Endpoint Security: What the 2025 Gartnerยฎ Magic Quadrantโข Reveals ๐๏ธ
๐ Read more.
๐ Via "The Hacker News"
----------
๐๏ธ Seen on @cibsecurity
Cyber threats and attacks like ransomware continue to increase in volume and complexity with the endpoint typically being the most sought after and valued target. With the rapid expansion and adoption of AI, it is more critical than ever to ensure the endpoint is adequately secured by a platform capable of not just keeping pace, but staying ahead of an everevolving threat landscape.๐ Read more.
๐ Via "The Hacker News"
----------
๐๏ธ Seen on @cibsecurity
๐ Tycoon Phishing Kit Utilizes New Capabilities to Hide Malicious Links ๐
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
Barracuda observed new methods to disguise phishing links in Tycoon phishing attacks, which are designed to bypass automated email security systems.๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
Infosecurity Magazine
Tycoon Phishing Kit Utilizes New Capabilities to Hide Malicious Links
Barracuda observed new methods to disguise phishing links in Tycoon phishing attacks, which are designed to bypass automated email security systems
๐ฆฟ Best Practices to Minimize Security Risks ๐ฆฟ
๐ Read more.
๐ Via "Tech Republic"
----------
๐๏ธ Seen on @cibsecurity
To reduce security threats within your organization, you must prioritize security risk management. Here are some best practices to follow, as well as some top resources from TechRepublic Premium.๐ Read more.
๐ Via "Tech Republic"
----------
๐๏ธ Seen on @cibsecurity
TechRepublic
Best Practices to Minimize Security Risks
To reduce security threats within your organization, you must prioritize security risk management.
๐ Cloudflare and Palo Alto Networks Victimized in Salesloft Drift Breach ๐
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
Cloudflare has notified customers that hackers may have accessed their data as part of the Salesloft Drift campaign.๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
Infosecurity Magazine
Cloudflare and Palo Alto Networks Victimized in Salesloft Drift Breach
Cloudflare has notified customers that hackers may have accessed their data as part of the Salesloft Drift campaign
๐ข Security experts weigh in on โoffboardingโ practices after former Intel worker stole documents before changing jobs ๐ข
๐ Read more.
๐ Via "ITPro"
----------
๐๏ธ Seen on @cibsecurity
Enterprises should act swiftly to revoke rights and access, regardless of the manner of an employees departure.๐ Read more.
๐ Via "ITPro"
----------
๐๏ธ Seen on @cibsecurity
IT Pro
Security experts call for better 'offboarding' practices amid spate of insider attacks by outgoing staff
Enterprises should act swiftly to revoke rights and access, regardless of the manner of an employeeโs departure
๐๏ธ Threat Actors Weaponize HexStrike AI to Exploit Citrix Flaws Within a Week of Disclosure ๐๏ธ
๐ Read more.
๐ Via "The Hacker News"
----------
๐๏ธ Seen on @cibsecurity
Threat actors are attempting to leverage a newly released artificial intelligence AI offensive security tool called HexStrike AI to exploit recently disclosed security flaws. HexStrike AI, according to its website, is pitched as an AIdriven security platform to automate reconnaissance and vulnerability discovery with an aim to accelerate authorized red teaming operations, bug bounty hunting,.๐ Read more.
๐ Via "The Hacker News"
----------
๐๏ธ Seen on @cibsecurity
๐๏ธ Detecting Data Leaks Before Disaster ๐๏ธ
๐ Read more.
๐ Via "The Hacker News"
----------
๐๏ธ Seen on @cibsecurity
In January 2025, cybersecurity experts at Wiz Research found that Chinese AI specialist DeepSeek had suffered a data leak, putting more than 1 million sensitive log streams at risk. According to the Wiz Research team, they identified a publicly accessible ClickHouse database belonging to DeepSeek. This allowed full control over database operations, including the ability to access.๐ Read more.
๐ Via "The Hacker News"
----------
๐๏ธ Seen on @cibsecurity
๐๏ธ Android Security Alert: Google Patches 120 Flaws, Including Two Zero-Days Under Attack ๐๏ธ
๐ Read more.
๐ Via "The Hacker News"
----------
๐๏ธ Seen on @cibsecurity
Google has shipped security updates to address 120 security flaws in its Android operating system as part of its monthly fixes for September 2025, including two issues that it said have been exploited in targeted attacks. The vulnerabilities are listed below CVE202538352 CVSS score 7.4 A privilege escalation flaw in the Linux Kernel component CVE202548543 CVSS score NA A.๐ Read more.
๐ Via "The Hacker News"
----------
๐๏ธ Seen on @cibsecurity
๐ Major IPTV Piracy Network Uncovered Spanning 1100 Domains ๐
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
A massive IPTV privacy network has been uncovered distributing unlicensed content from major brands including Apple TV, Disney, HBO, Netflix and more.๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
Infosecurity Magazine
Major IPTV Piracy Network Uncovered Spanning 1100 Domains
A massive IPTV privacy network has been uncovered distributing unlicensed content from major brands including Apple TV, Disney+, HBO, Netflix and more
๐ Russian APT28 Expands Arsenal with 'NotDoor' Outlook Backdoor ๐
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
The backdoor is a sophisticated VBAbased malware targeting Microsoft Outlook.๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
Infosecurity Magazine
Russian APT28 Expands Arsenal with 'NotDoor' Outlook Backdoor
The backdoor is a sophisticated VBA-based malware targeting Microsoft Outlook
๐ Malicious npm Packages Exploit Ethereum Smart Contracts ๐
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
A malicious campaign using Ethereum smart contracts has been observed targeting developers via npm and GitHub.๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
Infosecurity Magazine
Malicious npm Packages Exploit Ethereum Smart Contracts
A malicious campaign using Ethereum smart contracts has been observed targeting developers via npm and GitHub
โค1
๐๏ธ Russian APT28 Deploys โNotDoorโ Outlook Backdoor Against Companies in NATO Countries ๐๏ธ
๐ Read more.
๐ Via "The Hacker News"
----------
๐๏ธ Seen on @cibsecurity
The Russian statesponsored hacking group tracked as APT28 has been attributed to a new Microsoft Outlook backdoor called NotDoor in attacks targeting multiple companies from different sectors in NATO member countries. NotDoor "is a VBA macro for Outlook designed to monitor incoming emails for a specific trigger word," S2 Grupo's LAB52 threat intelligence team said. "When such an email is.๐ Read more.
๐ Via "The Hacker News"
----------
๐๏ธ Seen on @cibsecurity
๐๏ธ Russian APT28 Deploys โNotDoorโ Outlook Backdoor Against Companies in NATO Countries ๐๏ธ
๐ Read more.
๐ Via "The Hacker News"
----------
๐๏ธ Seen on @cibsecurity
The Russian statesponsored hacking group tracked as APT28 has been attributed to a new Microsoft Outlook backdoor called NotDoor in attacks targeting multiple companies from different sectors in NATO member countries. NotDoor "is a VBA macro for Outlook designed to monitor incoming emails for a specific trigger word," S2 Grupo's LAB52 threat intelligence team said. "When such an email is.๐ Read more.
๐ Via "The Hacker News"
----------
๐๏ธ Seen on @cibsecurity