π’ Security experts weigh in on βoffboardingβ practices after former Intel worker stole documents before changing jobs π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Enterprises should act swiftly to revoke rights and access, regardless of the manner of an employees departure.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Security experts call for better 'offboarding' practices amid spate of insider attacks by outgoing staff
Enterprises should act swiftly to revoke rights and access, regardless of the manner of an employeeβs departure
ποΈ Threat Actors Weaponize HexStrike AI to Exploit Citrix Flaws Within a Week of Disclosure ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Threat actors are attempting to leverage a newly released artificial intelligence AI offensive security tool called HexStrike AI to exploit recently disclosed security flaws. HexStrike AI, according to its website, is pitched as an AIdriven security platform to automate reconnaissance and vulnerability discovery with an aim to accelerate authorized red teaming operations, bug bounty hunting,.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Detecting Data Leaks Before Disaster ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
In January 2025, cybersecurity experts at Wiz Research found that Chinese AI specialist DeepSeek had suffered a data leak, putting more than 1 million sensitive log streams at risk. According to the Wiz Research team, they identified a publicly accessible ClickHouse database belonging to DeepSeek. This allowed full control over database operations, including the ability to access.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Android Security Alert: Google Patches 120 Flaws, Including Two Zero-Days Under Attack ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Google has shipped security updates to address 120 security flaws in its Android operating system as part of its monthly fixes for September 2025, including two issues that it said have been exploited in targeted attacks. The vulnerabilities are listed below CVE202538352 CVSS score 7.4 A privilege escalation flaw in the Linux Kernel component CVE202548543 CVSS score NA A.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π Major IPTV Piracy Network Uncovered Spanning 1100 Domains π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A massive IPTV privacy network has been uncovered distributing unlicensed content from major brands including Apple TV, Disney, HBO, Netflix and more.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Major IPTV Piracy Network Uncovered Spanning 1100 Domains
A massive IPTV privacy network has been uncovered distributing unlicensed content from major brands including Apple TV, Disney+, HBO, Netflix and more
π Russian APT28 Expands Arsenal with 'NotDoor' Outlook Backdoor π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The backdoor is a sophisticated VBAbased malware targeting Microsoft Outlook.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Russian APT28 Expands Arsenal with 'NotDoor' Outlook Backdoor
The backdoor is a sophisticated VBA-based malware targeting Microsoft Outlook
π Malicious npm Packages Exploit Ethereum Smart Contracts π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A malicious campaign using Ethereum smart contracts has been observed targeting developers via npm and GitHub.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Malicious npm Packages Exploit Ethereum Smart Contracts
A malicious campaign using Ethereum smart contracts has been observed targeting developers via npm and GitHub
β€1
ποΈ Russian APT28 Deploys βNotDoorβ Outlook Backdoor Against Companies in NATO Countries ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The Russian statesponsored hacking group tracked as APT28 has been attributed to a new Microsoft Outlook backdoor called NotDoor in attacks targeting multiple companies from different sectors in NATO member countries. NotDoor "is a VBA macro for Outlook designed to monitor incoming emails for a specific trigger word," S2 Grupo's LAB52 threat intelligence team said. "When such an email is.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Russian APT28 Deploys βNotDoorβ Outlook Backdoor Against Companies in NATO Countries ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The Russian statesponsored hacking group tracked as APT28 has been attributed to a new Microsoft Outlook backdoor called NotDoor in attacks targeting multiple companies from different sectors in NATO member countries. NotDoor "is a VBA macro for Outlook designed to monitor incoming emails for a specific trigger word," S2 Grupo's LAB52 threat intelligence team said. "When such an email is.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Russian APT28 Deploys βNotDoorβ Outlook Backdoor Against Companies in NATO Countries ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The Russian statesponsored hacking group tracked as APT28 has been attributed to a new Microsoft Outlook backdoor called NotDoor in attacks targeting multiple companies from different sectors in NATO member countries. NotDoor "is a VBA macro for Outlook designed to monitor incoming emails for a specific trigger word," S2 Grupo's LAB52 threat intelligence team said. "When such an email is.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have lifted the lid on a previously undocumented threat cluster dubbed GhostRedirector that has managed to compromise at least 65 Windows servers primarily located in Brazil, Thailand, and Vietnam. The attacks, per Slovak cybersecurity company ESET, led to the deployment of a passive C backdoor called Rungan and a native Internet Information Services IIS module.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have lifted the lid on a previously undocumented threat cluster dubbed GhostRedirector that has managed to compromise at least 65 Windows servers primarily located in Brazil, Thailand, and Vietnam. The attacks, per Slovak cybersecurity company ESET, led to the deployment of a passive C backdoor called Rungan and a native Internet Information Services IIS module.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Russian APT28 Deploys βNotDoorβ Outlook Backdoor Against Companies in NATO Countries ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The Russian statesponsored hacking group tracked as APT28 has been attributed to a new Microsoft Outlook backdoor called NotDoor in attacks targeting multiple companies from different sectors in NATO member countries. NotDoor "is a VBA macro for Outlook designed to monitor incoming emails for a specific trigger word," S2 Grupo's LAB52 threat intelligence team said. "When such an email is.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have lifted the lid on a previously undocumented threat cluster dubbed GhostRedirector that has managed to compromise at least 65 Windows servers primarily located in Brazil, Thailand, and Vietnam. The attacks, per Slovak cybersecurity company ESET, led to the deployment of a passive C backdoor called Rungan and a native Internet Information Services IIS module.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Cybercriminals Exploit Xβs Grok AI to Bypass Ad Protections and Spread Malware to Millions ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have flagged a new technique that cybercriminals have adopted to bypass social media platform X's malvertising protections and propagate malicious links using its artificial intelligence AI assistant Grok. The findings were highlighted by Nati Tal, head of Guardio Labs, in a series of posts on X. The technique has been codenamed Grokking. The approach is designed to.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π’ Gen Z has a cyber hygiene problem π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
A new survey shows Gen Z is far less concerned about cybersecurity than older generations.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Gen Z has a cyber hygiene problem
A new survey shows Gen Z is far less concerned about cybersecurity than older generations
π’ Cybersecurity experts issue urgent warning amid surge in Stealerium malware attacks π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Proofpoint said Stealerium has flown under the radar for some time now, but researchers have observed a huge spike in activity between May and August this year.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Cybersecurity experts issue urgent warning amid surge in Stealerium malware attacks
Proofpoint researchers said they've seen a big uptick in use of Stealerium malware, which is being used in a wide range of phishing campaigns
π’ The new BYOD: How tech leaders can securely evolve policy π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
As hybrid working becomes widespread and the variety of personal devices used by employees expands, firms are having to rethink BYOD policies.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
The new BYOD: How tech leaders can securely evolve policy
As hybrid working becomes widespread and the variety of personal devices used by employees expands, firms are having to rethink BYOD policies
π’ Hackers are using AI to dissect threat intelligence reports and βvibe codeβ malware π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
TrendMicro has called for caution on how much detail is disclosed in security advisories.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Hackers are using AI to dissect threat intelligence reports and βvibe codeβ malware
TrendMicro has called for caution on how much detail is disclosed in security advisories
π’ Non-human identities: Are we sleepwalking into a security crisis? π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Machine identities have exploded yet security strategies remain humanfocused.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ChannelPro
Non-human identities: Are we sleepwalking into a security crisis?
Machine identities have exploded - yet security strategies remain human-focused
π¦Ώ Build Practical Cyber Defense Skills with This 5-Course Bundle π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Train in AI threat detection, OSINT tools, and Zero Trust security models with lifetime access for just 19.99.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Build Practical Cyber Defense Skills with This 5-Course Bundle
Train in AI threat detection, OSINT tools, and Zero Trust security models with lifetime access for just $19.99.