🛡 Cybersecurity & Privacy 🛡 - News
25.9K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
🦅 LunoBotnet: A Self-Healing Linux Botnet with Modular DDoS and Cryptojacking Capabilities 🦅

Executive Summary In a deepdive analysis, Cyble Research and Intelligence Labs CRIL identified an ongoing inthewild Linux botnet campaign, which we have dubbed Luno. This campaign combines cryptocurrency mining, remote command execution, and modular DDoS attack capabilities. Additionally, it uses watchdogbased respawning and unusually strong antianalysis defences into a single malware framework, indicating active professional threat actor involvement. Unlike conventional cryptominers or DDoS botnets, LunoC2 exhibits process masquerading, binary replacement, and a selfupdate system, suggesting the malware is designed as a longterm criminal infrastructure tool. Based on frequent updates to attack modules, it appears to be actively evolving and being augmented with new functional...

📖 Read more.

🔗 Via "CYBLE"

----------
👁️ Seen on @cibsecurity
📢 FBI warns 'indiscriminate' Salt Typhoon hacking campaign has hit organizations in more than 80 countries 📢

The Salt Typhoon hacker group has waged several major campaigns against US telecoms companies and critical infrastructure operators now it's ramping up attacks globally.

📖 Read more.

🔗 Via "ITPro"

----------
👁️ Seen on @cibsecurity
📔 Salty2FA Phishing Kit Unveils New Level of Sophistication 📔

Salty2FA phishing campaign showcases advanced techniques and professionalism of cybercrime operations.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
🖋️ RatOn Android Malware Detected With NFC Relay and ATS Banking Fraud Capabilities 🖋️

A new Android malware called RatOn has evolved from a basic tool capable of conducting Near Field Communication NFC relay attacks to a sophisticated remote access trojan with Automated Transfer System ATS capabilities to conduct device fraud. "RatOn merges traditional overlay attacks with automatic money transfers and NFC relay functionality making it a uniquely powerful threat,".

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
📔 Salty2FA Phishing Kit Unveils New Level of Sophistication 📔

Salty2FA phishing campaign showcases advanced techniques and professionalism of cybercrime operations.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
📔 Salty2FA Phishing Kit Unveils New Level of Sophistication 📔

Salty2FA phishing campaign showcases advanced techniques and professionalism of cybercrime operations.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
📢 Salesloft Drift hackers had access to company GitHub account for months before attacks 📢

Hackers behind the Salesloft Drift breach had access to the companys GitHub account for several months before waging a flurry of attacks, the company has revealed.

📖 Read more.

🔗 Via "ITPro"

----------
👁️ Seen on @cibsecurity
📢 Salesloft Drift hackers had access to company GitHub account for months before attacks 📢

Hackers behind the Salesloft Drift breach had access to the companys GitHub account for several months before waging a flurry of attacks, the company has revealed.

📖 Read more.

🔗 Via "ITPro"

----------
👁️ Seen on @cibsecurity
📢 FBI warns 'indiscriminate' Salt Typhoon hacking campaign has hit organizations in more than 80 countries 📢

The Salt Typhoon hacker group has waged several major campaigns against US telecoms companies and critical infrastructure operators now it's ramping up attacks globally.

📖 Read more.

🔗 Via "ITPro"

----------
👁️ Seen on @cibsecurity
📢 FBI warns 'indiscriminate' Salt Typhoon hacking campaign has hit organizations in more than 80 countries 📢

The Salt Typhoon hacker group has waged several major campaigns against US telecoms companies and critical infrastructure operators now it's ramping up attacks globally.

📖 Read more.

🔗 Via "ITPro"

----------
👁️ Seen on @cibsecurity
🖋️ [Webinar] Shadow AI Agents Multiply Fast — Learn How to Detect and Control Them 🖋️

One click is all it takes. An engineer spins up an experimental AI Agent to test a workflow. A business unit connects to automate reporting. A cloud platform quietly enables a new agent behind the scenes. Individually, they look harmless. But together, they form an invisible swarm of Shadow AI Agentsoperating outside securitys line of sight, tied to identities you dont even know exist.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
📔 Open Source Community Thwarts Massive npm Supply Chain Attack 📔

What could have been a historic supply chain attack seems to have been averted due to the rapid response of the open source community.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
📔 Open Source Community Thwarts Massive npm Supply Chain Attack 📔

What could have been a historic supply chain attack seems to have been averted due to the rapid response of the open source community.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
📔 Threat Actor Accidentally Exposes AI-Powered Operations 📔

A threat actor accidentally revealed their AIpowered methods by installing Huntress security software.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
📔 Open Source Community Thwarts Massive npm Supply Chain Attack 📔

What could have been a historic supply chain attack seems to have been averted due to the rapid response of the open source community.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
📔 Threat Actor Accidentally Exposes AI-Powered Operations 📔

A threat actor accidentally revealed their AIpowered methods by installing Huntress security software.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
🖋️ Axios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks 🖋️

Threat actors are abusing HTTP client tools like Axios in conjunction with Microsoft's Direct Send feature to form a "highly efficient attack pipeline" in recent phishing campaigns, according to new findings from ReliaQuest. "Axios user agent activity surged 241 from June to August 2025, dwarfing the 85 growth of all other flagged user agents combined," the cybersecurity company said in a.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
🖋️ Axios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks 🖋️

Threat actors are abusing HTTP client tools like Axios in conjunction with Microsoft's Direct Send feature to form a "highly efficient attack pipeline" in recent phishing campaigns, according to new findings from ReliaQuest. "Axios user agent activity surged 241 from June to August 2025, dwarfing the 85 growth of all other flagged user agents combined," the cybersecurity company said in a.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
📢 Salesloft Drift hackers had access to company GitHub account for months before attacks 📢

Hackers behind the Salesloft Drift breach had access to the companys GitHub account for several months before waging a flurry of attacks, the company has revealed.

📖 Read more.

🔗 Via "ITPro"

----------
👁️ Seen on @cibsecurity
🖋️ From MostereRAT to ClickFix: New Malware Campaigns Highlight Rising AI and Phishing Risks 🖋️

Cybersecurity researchers have disclosed details of a phishing campaign that delivers a stealthy banking malwareturnedremote access trojan called MostereRAT. The phishing attack incorporates a number of advanced evasion techniques to gain complete control over compromised systems, siphon sensitive data, and extend its functionality by serving secondary plugins, Fortinet FortiGuard Labs said. ".

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
📢 Cyber attacks: Can the channel save the day? 📢

Channel partners are becoming the first and often only line of defence for businesses facing growing cybersecurity threats.

📖 Read more.

🔗 Via "ITPro"

----------
👁️ Seen on @cibsecurity