πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” Threat Actors Abuse Hexstrike-AI Tool to Accelerate Exploitation πŸ“”

Hackers are using legitimate red team tool HexstrikeAI to simplify and speed up vulnerability exploitation.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Healthcare Sector Takes 58 Days to Resolve Serious Vulnerabilities πŸ“”

A new Cobalt study finds healthcare organizations among the slowest at resolving serious vulnerabilities.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 Exabeam vs. The Field: 2025’s AI SOC Comparison 🌊

Looking for Exabeam alternatives? High pricing at scale, SIEM baggage that never goes away, and blind spots in SaaS and identity are all legit reasons to shop around. Either way, there are lots of options for you. AI SOC startups are popping up like mushrooms after rain. Investment is flowing, promises are loud. But when The post Exabeam vs. The Field 2025s AI SOC Comparison appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸš€ GhostRedirector poisons Windows servers: Backdoors with a side of Potatoes πŸš€

ESET researchers have identified a new threat actor targeting Windows servers with a passive C backdoor and a malicious IIS module that manipulates Google search results.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… The Week in Vulnerabilities: Apple, Citrix Flaws Draw Threat Actor Interest πŸ¦…

IT Vulnerabilities Recorded by Cyble " dataimagecaption"" datamediumfile"httpscyble.comwpcontentuploads202509ITVulnerabilitiesRecordedbyCyble300x150.webp" datalargefile"httpscyble.comwpcontentuploads202509ITVulnerabilitiesRecordedbyCyble.webp" title"The Week in Vulnerabilities Apple, Citrix Flaws Draw Threat Actor Interest 1" Cyble Vulnerability Intelligence researchers tracked 787 vulnerabilities in the last week, and more than 229 of the disclosed vulnerabilities already have publicly available ProofsofConcept PoCs. The exploitation rate just under 30 is at the high end of the 2030 range observed by Cyble in recent weeks.  A total of 56 vulnerabilities were rated as critical under CVSS v3.1, while 43 received a critical severity rating based on the newer CVSS v4.0 scoring system....

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ VirusTotal Finds 44 Undetected SVG Files Used to Deploy Base64-Encoded Phishing Pages πŸ–‹οΈ

Cybersecurity researchers have flagged a new malware campaign that has leveraged Scalable Vector Graphics SVG files as part of phishing attacks impersonating the Colombian judicial system. The SVG files, according to VirusTotal, are distributed via email and designed to execute an embedded JavaScript payload, which then decodes and injects a Base64encoded HTML phishing page masquerading as a.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ–‹οΈ Automation Is Redefining Pentest Delivery πŸ–‹οΈ

Pentesting remains one of the most effective ways to identify realworld security weaknesses before adversaries do. But as the threat landscape has evolved, the way we deliver pentest results hasn't kept pace. Most organizations still rely on traditional reporting methodsstatic PDFs, emailed documents, and spreadsheetbased tracking. The problem? These outdated workflows introduce delays,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” 61% of US Companies Hit by Insider Data Breaches πŸ“”

The OPSWAT report found that insider breaches cost impacted firms 2.7m on average due to factors such as regulatory fines and diminished productivity.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“” US and 14 Allies Release Joint Guidance on Software Bill of Materials πŸ“”

The joint guidance is a welcome first step towards a common, global adoption of SBOMs, experts argued.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ SAP S/4HANA Critical Vulnerability CVE-2025-42957 Exploited in the Wild πŸ–‹οΈ

A critical security vulnerability impacting SAP S4HANA, an Enterprise Resource Planning ERP software, has come under active exploitation in the wild. The command injection vulnerability, tracked as CVE202542957 CVSS score 9.9, was fixed by SAP as part of its monthly updates last month. "SAP S4HANA allows an attacker with user privileges to exploit a vulnerability in the function module.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🚨 NCSC statement: Incident impacting Jaguar Land Rover 🚨

Statement from the NCSC regarding the cyber incident affecting Jaguar Land Rover.

πŸ“– Read more.

πŸ”— Via "UK NCSC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” macOS Stealer Campaign Uses β€œCracked” App Lures to Bypass Apple Security πŸ“”

Trend Micro observed the attackers using terminalbased installation methods for the AMOS malware, luring macOS users into installing cracked versions of apps.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 Dropzone AI Against 11 Rivals: AI SOC Showdown 2025 🌊

Running a Tesla on autopilot in LA is fine. In a warzone, though? Youd not give it a chance. Yet some companies switch cybersecurity onto autopilot with AI SOC, reducing human oversight to zero.   One of those AI SOC startups is Dropzone AI, but rivals are lining up. Lets see which Dropzone AI competitors are The post Dropzone AI Against 11 Rivals AI SOC Showdown 2025 appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Let’s talk about digital sovereignty πŸ“’

In the age of AI and cloud, where data resides is a key consideration.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Lack of visibility creates "cascade" of security risk, says Kiteworks πŸ“’

Organizations that don't keep track of data breaches, shadow AI, and thirdparty counts face dramatically worse outcomes across every metric.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” South Carolina School District Data Breach Affects 31,000 People πŸ“”

An investigation has revealed that files were stolen in a data breach affecting a South Carolina school district.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Cybercriminals β€˜Grok’ Their Way Past X’s Defenses to Spread Malware 🦿

Hackers exploit Xs Grok AI to spread malware via promoted ads, exposing millions to malicious links in a scheme researchers call Grokking.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ€”1
πŸ–‹οΈ TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations πŸ–‹οΈ

The threat actor behind the malwareasaservice MaaS framework and loader called CastleLoader has also developed a remote access trojan known as CastleRAT. "Available in both Python and C variants, CastleRAT's core functionality consists of collecting system information, downloading and executing additional payloads, and executing commands via CMD and PowerShell," Recorded Future Insikt Group.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“” Bridgestone Confirms "Limited Cyber Incident" Impacting Facilities in North America πŸ“”

Bridgestone Americas confirmed the incident but has not detailed the scope of the attack.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation πŸ–‹οΈ

Federal Civilian Executive Branch FCEB agencies are being advised to update their Sitecore instances by September 25, 2025, following the discovery of a security flaw that has come under active exploitation in the wild. The vulnerability, tracked as CVE202553690, carries a CVSS score of 9.0 out of a maximum of 10.0, indicating critical severity. "Sitecore Experience Manager XM, Experience.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ GOP Cries Censorship Over Spam Filters That Work β™ŸοΈ

The chairman of the Federal Trade Commission FTC last week sent a letter to Google's CEO demanding to know why Gmail was blocking messages from Republican senders while allegedly failing to block similar missives supporting Democrats. The letter followed media reports accusing Gmail of disproportionately flagging messages from the GOP fundraising platform WinRed and sending them to the spam folder. But according to experts who track daily spam volumes worldwide, WinRed's messages are getting blocked more because its methods of blasting email are increasingly way more spammy than that of ActBlue, the fundraising platform for Democrats.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity