๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News
25.8K subscribers
89.2K links
๐Ÿ—ž The finest daily news on cybersecurity and privacy.

๐Ÿ”” Daily releases.

๐Ÿ’ป Is your online life secure?

๐Ÿ“ฉ lalilolalo.dev@gmail.com
Download Telegram
๐Ÿ–‹๏ธ AI-Driven Trends in Endpoint Security: What the 2025 Gartnerยฎ Magic Quadrantโ„ข Reveals ๐Ÿ–‹๏ธ

Cyber threats and attacks like ransomware continue to increase in volume and complexity with the endpoint typically being the most sought after and valued target. With the rapid expansion and adoption of AI, it is more critical than ever to ensure the endpoint is adequately secured by a platform capable of not just keeping pace, but staying ahead of an everevolving threat landscape.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“” Tycoon Phishing Kit Utilizes New Capabilities to Hide Malicious Links ๐Ÿ“”

Barracuda observed new methods to disguise phishing links in Tycoon phishing attacks, which are designed to bypass automated email security systems.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿฆฟ Best Practices to Minimize Security Risks ๐Ÿฆฟ

To reduce security threats within your organization, you must prioritize security risk management. Here are some best practices to follow, as well as some top resources from TechRepublic Premium.

๐Ÿ“– Read more.

๐Ÿ”— Via "Tech Republic"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“” Cloudflare and Palo Alto Networks Victimized in Salesloft Drift Breach ๐Ÿ“”

Cloudflare has notified customers that hackers may have accessed their data as part of the Salesloft Drift campaign.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“ข Security experts weigh in on โ€˜offboardingโ€™ practices after former Intel worker stole documents before changing jobs ๐Ÿ“ข

Enterprises should act swiftly to revoke rights and access, regardless of the manner of an employees departure.

๐Ÿ“– Read more.

๐Ÿ”— Via "ITPro"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ–‹๏ธ Threat Actors Weaponize HexStrike AI to Exploit Citrix Flaws Within a Week of Disclosure ๐Ÿ–‹๏ธ

Threat actors are attempting to leverage a newly released artificial intelligence AI offensive security tool called HexStrike AI to exploit recently disclosed security flaws. HexStrike AI, according to its website, is pitched as an AIdriven security platform to automate reconnaissance and vulnerability discovery with an aim to accelerate authorized red teaming operations, bug bounty hunting,.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ–‹๏ธ Detecting Data Leaks Before Disaster ๐Ÿ–‹๏ธ

In January 2025, cybersecurity experts at Wiz Research found that Chinese AI specialist DeepSeek had suffered a data leak, putting more than 1 million sensitive log streams at risk. According to the Wiz Research team, they identified a publicly accessible ClickHouse database belonging to DeepSeek. This allowed full control over database operations, including the ability to access.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ–‹๏ธ Android Security Alert: Google Patches 120 Flaws, Including Two Zero-Days Under Attack ๐Ÿ–‹๏ธ

Google has shipped security updates to address 120 security flaws in its Android operating system as part of its monthly fixes for September 2025, including two issues that it said have been exploited in targeted attacks. The vulnerabilities are listed below CVE202538352 CVSS score 7.4 A privilege escalation flaw in the Linux Kernel component  CVE202548543 CVSS score NA A.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“” Major IPTV Piracy Network Uncovered Spanning 1100 Domains ๐Ÿ“”

A massive IPTV privacy network has been uncovered distributing unlicensed content from major brands including Apple TV, Disney, HBO, Netflix and more.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“” Russian APT28 Expands Arsenal with 'NotDoor' Outlook Backdoor ๐Ÿ“”

The backdoor is a sophisticated VBAbased malware targeting Microsoft Outlook.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“” Malicious npm Packages Exploit Ethereum Smart Contracts ๐Ÿ“”

A malicious campaign using Ethereum smart contracts has been observed targeting developers via npm and GitHub.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
โค1
๐Ÿ–‹๏ธ Russian APT28 Deploys โ€œNotDoorโ€ Outlook Backdoor Against Companies in NATO Countries ๐Ÿ–‹๏ธ

The Russian statesponsored hacking group tracked as APT28 has been attributed to a new Microsoft Outlook backdoor called NotDoor in attacks targeting multiple companies from different sectors in NATO member countries. NotDoor "is a VBA macro for Outlook designed to monitor incoming emails for a specific trigger word," S2 Grupo's LAB52 threat intelligence team said. "When such an email is.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ–‹๏ธ Russian APT28 Deploys โ€œNotDoorโ€ Outlook Backdoor Against Companies in NATO Countries ๐Ÿ–‹๏ธ

The Russian statesponsored hacking group tracked as APT28 has been attributed to a new Microsoft Outlook backdoor called NotDoor in attacks targeting multiple companies from different sectors in NATO member countries. NotDoor "is a VBA macro for Outlook designed to monitor incoming emails for a specific trigger word," S2 Grupo's LAB52 threat intelligence team said. "When such an email is.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ–‹๏ธ Russian APT28 Deploys โ€œNotDoorโ€ Outlook Backdoor Against Companies in NATO Countries ๐Ÿ–‹๏ธ

The Russian statesponsored hacking group tracked as APT28 has been attributed to a new Microsoft Outlook backdoor called NotDoor in attacks targeting multiple companies from different sectors in NATO member countries. NotDoor "is a VBA macro for Outlook designed to monitor incoming emails for a specific trigger word," S2 Grupo's LAB52 threat intelligence team said. "When such an email is.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ–‹๏ธ GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module ๐Ÿ–‹๏ธ

Cybersecurity researchers have lifted the lid on a previously undocumented threat cluster dubbed GhostRedirector that has managed to compromise at least 65 Windows servers primarily located in Brazil, Thailand, and Vietnam. The attacks, per Slovak cybersecurity company ESET, led to the deployment of a passive C backdoor called Rungan and a native Internet Information Services IIS module.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ–‹๏ธ GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module ๐Ÿ–‹๏ธ

Cybersecurity researchers have lifted the lid on a previously undocumented threat cluster dubbed GhostRedirector that has managed to compromise at least 65 Windows servers primarily located in Brazil, Thailand, and Vietnam. The attacks, per Slovak cybersecurity company ESET, led to the deployment of a passive C backdoor called Rungan and a native Internet Information Services IIS module.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ–‹๏ธ Russian APT28 Deploys โ€œNotDoorโ€ Outlook Backdoor Against Companies in NATO Countries ๐Ÿ–‹๏ธ

The Russian statesponsored hacking group tracked as APT28 has been attributed to a new Microsoft Outlook backdoor called NotDoor in attacks targeting multiple companies from different sectors in NATO member countries. NotDoor "is a VBA macro for Outlook designed to monitor incoming emails for a specific trigger word," S2 Grupo's LAB52 threat intelligence team said. "When such an email is.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ–‹๏ธ GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module ๐Ÿ–‹๏ธ

Cybersecurity researchers have lifted the lid on a previously undocumented threat cluster dubbed GhostRedirector that has managed to compromise at least 65 Windows servers primarily located in Brazil, Thailand, and Vietnam. The attacks, per Slovak cybersecurity company ESET, led to the deployment of a passive C backdoor called Rungan and a native Internet Information Services IIS module.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ–‹๏ธ Cybercriminals Exploit Xโ€™s Grok AI to Bypass Ad Protections and Spread Malware to Millions ๐Ÿ–‹๏ธ

Cybersecurity researchers have flagged a new technique that cybercriminals have adopted to bypass social media platform X's malvertising protections and propagate malicious links using its artificial intelligence AI assistant Grok. The findings were highlighted by Nati Tal, head of Guardio Labs, in a series of posts on X. The technique has been codenamed Grokking. The approach is designed to.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“ข Gen Z has a cyber hygiene problem ๐Ÿ“ข

A new survey shows Gen Z is far less concerned about cybersecurity than older generations.

๐Ÿ“– Read more.

๐Ÿ”— Via "ITPro"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“ข Cybersecurity experts issue urgent warning amid surge in Stealerium malware attacks ๐Ÿ“ข

Proofpoint said Stealerium has flown under the radar for some time now, but researchers have observed a huge spike in activity between May and August this year.

๐Ÿ“– Read more.

๐Ÿ”— Via "ITPro"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity