ποΈ Cybercriminals Exploit Xβs Grok AI to Bypass Ad Protections and Spread Malware to Millions ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have flagged a new technique that cybercriminals have adopted to bypass social media platform X's malvertising protections and propagate malicious links using its artificial intelligence AI assistant Grok. The findings were highlighted by Nati Tal, head of Guardio Labs, in a series of posts on X. The technique has been codenamed Grokking. The approach is designed to.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π’ Gen Z has a cyber hygiene problem π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
A new survey shows Gen Z is far less concerned about cybersecurity than older generations.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Gen Z has a cyber hygiene problem
A new survey shows Gen Z is far less concerned about cybersecurity than older generations
π’ Cybersecurity experts issue urgent warning amid surge in Stealerium malware attacks π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Proofpoint said Stealerium has flown under the radar for some time now, but researchers have observed a huge spike in activity between May and August this year.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Cybersecurity experts issue urgent warning amid surge in Stealerium malware attacks
Proofpoint researchers said they've seen a big uptick in use of Stealerium malware, which is being used in a wide range of phishing campaigns
π’ The new BYOD: How tech leaders can securely evolve policy π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
As hybrid working becomes widespread and the variety of personal devices used by employees expands, firms are having to rethink BYOD policies.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
The new BYOD: How tech leaders can securely evolve policy
As hybrid working becomes widespread and the variety of personal devices used by employees expands, firms are having to rethink BYOD policies
π’ Hackers are using AI to dissect threat intelligence reports and βvibe codeβ malware π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
TrendMicro has called for caution on how much detail is disclosed in security advisories.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Hackers are using AI to dissect threat intelligence reports and βvibe codeβ malware
TrendMicro has called for caution on how much detail is disclosed in security advisories
π’ Non-human identities: Are we sleepwalking into a security crisis? π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Machine identities have exploded yet security strategies remain humanfocused.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ChannelPro
Non-human identities: Are we sleepwalking into a security crisis?
Machine identities have exploded - yet security strategies remain human-focused
π¦Ώ Build Practical Cyber Defense Skills with This 5-Course Bundle π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Train in AI threat detection, OSINT tools, and Zero Trust security models with lifetime access for just 19.99.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Build Practical Cyber Defense Skills with This 5-Course Bundle
Train in AI threat detection, OSINT tools, and Zero Trust security models with lifetime access for just $19.99.
π¦Ώ Is a Recent Windows Update Responsible for SSD Failures? Microsoft Has an Answer π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
A rash of SSD failures have prompted some users to blame a recent Windows Update. Microsoft insist the problem is not its fault.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Is a Recent Windows Update Responsible for SSD Failures? Microsoft Has an Answer
A rash of SSD failures have prompted some users to blame a recent Windows Update. Microsoft insist the problem is not its fault.
ποΈ Russian APT28 Deploys βNotDoorβ Outlook Backdoor Against Companies in NATO Countries ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The Russian statesponsored hacking group tracked as APT28 has been attributed to a new Microsoft Outlook backdoor called NotDoor in attacks targeting multiple companies from different sectors in NATO member countries. NotDoor "is a VBA macro for Outlook designed to monitor incoming emails for a specific trigger word," S2 Grupo's LAB52 threat intelligence team said. "When such an email is.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have lifted the lid on a previously undocumented threat cluster dubbed GhostRedirector that has managed to compromise at least 65 Windows servers primarily located in Brazil, Thailand, and Vietnam. The attacks, per Slovak cybersecurity company ESET, led to the deployment of a passive C backdoor called Rungan and a native Internet Information Services IIS module.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Cybercriminals Exploit Xβs Grok AI to Bypass Ad Protections and Spread Malware to Millions ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have flagged a new technique that cybercriminals have adopted to bypass social media platform X's malvertising protections and propagate malicious links using its artificial intelligence AI assistant Grok. The findings were highlighted by Nati Tal, head of Guardio Labs, in a series of posts on X. The technique has been codenamed Grokking. The approach is designed to.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Simple Steps for Attack Surface Reduction ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Story teaser text Cybersecurity leaders face mounting pressure to stop attacks before they start, and the best defense may come down to the settings you choose on day one. In this piece, Yuriy Tsibere explores how default policies like denybydefault, MFA enforcement, and application Ringfencing can eliminate entire categories of risk. From disabling Office macros to blocking outbound server.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
β€1
ποΈ Google Fined $379 Million by French Regulator for Cookie Consent Violations ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The French data protection authority has fined Google and Chinese ecommerce giant Shein 379 million 325 million and 175 million 150 million, respectively, for violating cookie rules. Both companies set advertising cookies on users' browsers without securing their consent, the National Commission on Informatics and Liberty CNIL said. Shein has since updated its systems to comply with.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ CISA Flags TP-Link Router Flaws CVE-2023-50224 and CVE-2025-9377 as Actively Exploited ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The U.S. Cybersecurity and Infrastructure Security Agency CISA on Wednesday added two security flaws impacting TPLink wireless routers to its Known Exploited Vulnerabilities KEV catalog, noting that there is evidence of them being exploited in the wild. The vulnerabilities in question are listed below CVE202350224 CVSS score 6.5 An authentication bypass by spoofing vulnerability.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π GhostRedirector Emerges as New China-Aligned Threat Actor π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A newly identified hacking group named GhostRedirector has compromised 65 Windows servers using previously unknown tools.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
GhostRedirector Emerges as New China-Aligned Threat Actor
A newly identified hacking group named GhostRedirector has compromised 65 Windows servers using previously unknown tools
π North Korean Hackers Exploit Threat Intel Platforms For Phishing π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
North Korean hackers have been observed exploiting cyber threat intelligence platforms in a campaign targeting job seekers with malwarelaced lures.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
North Korean Hackers Exploit Threat Intel Platforms For Phishing
North Korean hackers have been observed exploiting cyber threat intelligence platforms in a campaign targeting job seekers with malware-laced lures
π CMS Provider Sitecore Patches Exploited Critical Zero Day π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Google Clouds Mandiant successfully disrupted an active ViewState deserialization attack affecting Sitecore deployments.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
CMS Provider Sitecore Patches Exploited Critical Zero Day
Google Cloudβs Mandiant successfully disrupted an active ViewState deserialization attack affecting Sitecore deployments
π US and 14 Allies Release Joint Guidance on Software Bill of Materials π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The joint guidance is a welcome first step towards a common, global adoption of SBOMs, experts argued.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
π Scattered Spider-Linked Group Claims JLR Cyber-Attack π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
JLR said it is investigating following claims by the actor Scattered Lapsus Hunters that it had stolen data from the firm and had issued an extortion demand.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Scattered Spider-Linked Group Claims JLR Cyber-Attack
JLR said it is investigating following claims by the actor βScattered Lapsus$ Huntersβ that it had stolen data from the firm and had issued an extortion demand
π Threat Actors Abuse Hexstrike-AI Tool to Accelerate Exploitation π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Hackers are using legitimate red team tool HexstrikeAI to simplify and speed up vulnerability exploitation.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Threat Actors Abuse Hexstrike-AI Tool to Accelerate Exploitation
Hackers are using legitimate red team tool Hexstrike-AI to simplify and speed up vulnerability exploitation
π Healthcare Sector Takes 58 Days to Resolve Serious Vulnerabilities π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A new Cobalt study finds healthcare organizations among the slowest at resolving serious vulnerabilities.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Healthcare Sector Takes 58 Days to Resolve Serious Vulnerabilities
A new Cobalt study finds healthcare organizations among the slowest at resolving serious vulnerabilities