πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ RatOn Android Malware Detected With NFC Relay and ATS Banking Fraud Capabilities πŸ–‹οΈ

A new Android malware called RatOn has evolved from a basic tool capable of conducting Near Field Communication NFC relay attacks to a sophisticated remote access trojan with Automated Transfer System ATS capabilities to conduct device fraud. "RatOn merges traditional overlay attacks with automatic money transfers and NFC relay functionality making it a uniquely powerful threat,".

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ How Leading CISOs are Getting Budget Approval πŸ–‹οΈ

Its budget season. Once again, security is being questioned, scrutinized, or deprioritized. If you're a CISO or security leader, you've likely found yourself explaining why your program matters, why a given tool or headcount is essential, and how the next breach is one blind spot away. But these arguments often fall short unless they're framed in a way the board can understand and appreciate.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Chinese Cyber Espionage Campaign Impersonates US Congressman πŸ“”

A House select committee said Chinese actors impersonated Representative John Moolenaar to steal information that could be used to influence trade talks.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Chinese Cyber Espionage Campaign Impersonates US Congressman πŸ“”

A House select committee said Chinese actors impersonated Representative John Moolenaar to steal information that could be used to influence trade talks.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Cyber attacks: Can the channel save the day? πŸ“’

Channel partners are becoming the first and often only line of defence for businesses facing growing cybersecurity threats.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Open Source Community Thwarts Massive npm Supply Chain Attack πŸ“”

What could have been a historic supply chain attack seems to have been averted due to the rapid response of the open source community.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Open Source Community Thwarts Massive npm Supply Chain Attack πŸ“”

What could have been a historic supply chain attack seems to have been averted due to the rapid response of the open source community.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Chinese Cyber Espionage Campaign Impersonates US Congressman πŸ“”

A House select committee said Chinese actors impersonated Representative John Moolenaar to steal information that could be used to influence trade talks.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ [Webinar] Shadow AI Agents Multiply Fast β€” Learn How to Detect and Control Them πŸ–‹οΈ

One click is all it takes. An engineer spins up an experimental AI Agent to test a workflow. A business unit connects to automate reporting. A cloud platform quietly enables a new agent behind the scenes. Individually, they look harmless. But together, they form an invisible swarm of Shadow AI Agentsoperating outside securitys line of sight, tied to identities you dont even know exist.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ [Webinar] Shadow AI Agents Multiply Fast β€” Learn How to Detect and Control Them πŸ–‹οΈ

One click is all it takes. An engineer spins up an experimental AI Agent to test a workflow. A business unit connects to automate reporting. A cloud platform quietly enables a new agent behind the scenes. Individually, they look harmless. But together, they form an invisible swarm of Shadow AI Agentsoperating outside securitys line of sight, tied to identities you dont even know exist.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ TOR-Based Cryptojacking Attack Expands Through Misconfigured Docker APIs πŸ–‹οΈ

Cybersecurity researchers have discovered a variant of a recently disclosed campaign that abuses the TOR network for cryptojacking attacks targeting exposed Docker APIs. Akamai, which discovered the latest activity last month, said it's designed to block other actors from accessing the Docker API from the internet. The findings build on a prior report from Trend Micro in late June 2025, which.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Salesloft: GitHub Account Breach Was Ground Zero in Drift Campaign πŸ“”

Salesloft has revealed that threat actors targeted customer Salesforce data after breaching its GitHub account.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Salesloft: GitHub Account Breach Was Ground Zero in Drift Campaign πŸ“”

Salesloft has revealed that threat actors targeted customer Salesforce data after breaching its GitHub account.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Axios User Agent Helps Automate Phishing on β€œUnprecedented Scale” πŸ“”

ReliaQuest warns that phishing campaigns abusing the Axios user agent have surged 241 in three months.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Axios User Agent Helps Automate Phishing on β€œUnprecedented Scale” πŸ“”

ReliaQuest warns that phishing campaigns abusing the Axios user agent have surged 241 in three months.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ From MostereRAT to ClickFix: New Malware Campaigns Highlight Rising AI and Phishing Risks πŸ–‹οΈ

Cybersecurity researchers have disclosed details of a phishing campaign that delivers a stealthy banking malwareturnedremote access trojan called MostereRAT. The phishing attack incorporates a number of advanced evasion techniques to gain complete control over compromised systems, siphon sensitive data, and extend its functionality by serving secondary plugins, Fortinet FortiGuard Labs said. ".

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ 20 Popular npm Packages With 2 Billion Weekly Downloads Compromised in Supply Chain Attack πŸ–‹οΈ

Multiple npm packages have been compromised as part of a software supply chain attack after a maintainer's account was compromised in a phishing attack. The attack targeted Josh Junon aka Qix, who received an email message that mimicked npm "supportnpmjs.help", urging them to update their update their twofactor authentication 2FA credentials before September 10, 2025, by clicking on.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Salesloft: GitHub Account Breach Was Ground Zero in Drift Campaign πŸ“”

Salesloft has revealed that threat actors targeted customer Salesforce data after breaching its GitHub account.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ From MostereRAT to ClickFix: New Malware Campaigns Highlight Rising AI and Phishing Risks πŸ–‹οΈ

Cybersecurity researchers have disclosed details of a phishing campaign that delivers a stealthy banking malwareturnedremote access trojan called MostereRAT. The phishing attack incorporates a number of advanced evasion techniques to gain complete control over compromised systems, siphon sensitive data, and extend its functionality by serving secondary plugins, Fortinet FortiGuard Labs said. ".

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Chinese Cyber Espionage Campaign Impersonates US Congressman πŸ“”

A House select committee said Chinese actors impersonated Representative John Moolenaar to steal information that could be used to influence trade talks.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Chinese Cyber Espionage Campaign Impersonates US Congressman πŸ“”

A House select committee said Chinese actors impersonated Representative John Moolenaar to steal information that could be used to influence trade talks.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity