πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ RatOn Android Malware Detected With NFC Relay and ATS Banking Fraud Capabilities πŸ–‹οΈ

A new Android malware called RatOn has evolved from a basic tool capable of conducting Near Field Communication NFC relay attacks to a sophisticated remote access trojan with Automated Transfer System ATS capabilities to conduct device fraud. "RatOn merges traditional overlay attacks with automatic money transfers and NFC relay functionality making it a uniquely powerful threat,".

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ RatOn Android Malware Detected With NFC Relay and ATS Banking Fraud Capabilities πŸ–‹οΈ

A new Android malware called RatOn has evolved from a basic tool capable of conducting Near Field Communication NFC relay attacks to a sophisticated remote access trojan with Automated Transfer System ATS capabilities to conduct device fraud. "RatOn merges traditional overlay attacks with automatic money transfers and NFC relay functionality making it a uniquely powerful threat,".

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ [Webinar] Shadow AI Agents Multiply Fast β€” Learn How to Detect and Control Them πŸ–‹οΈ

One click is all it takes. An engineer spins up an experimental AI Agent to test a workflow. A business unit connects to automate reporting. A cloud platform quietly enables a new agent behind the scenes. Individually, they look harmless. But together, they form an invisible swarm of Shadow AI Agentsoperating outside securitys line of sight, tied to identities you dont even know exist.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ [Webinar] Shadow AI Agents Multiply Fast β€” Learn How to Detect and Control Them πŸ–‹οΈ

One click is all it takes. An engineer spins up an experimental AI Agent to test a workflow. A business unit connects to automate reporting. A cloud platform quietly enables a new agent behind the scenes. Individually, they look harmless. But together, they form an invisible swarm of Shadow AI Agentsoperating outside securitys line of sight, tied to identities you dont even know exist.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ From MostereRAT to ClickFix: New Malware Campaigns Highlight Rising AI and Phishing Risks πŸ–‹οΈ

Cybersecurity researchers have disclosed details of a phishing campaign that delivers a stealthy banking malwareturnedremote access trojan called MostereRAT. The phishing attack incorporates a number of advanced evasion techniques to gain complete control over compromised systems, siphon sensitive data, and extend its functionality by serving secondary plugins, Fortinet FortiGuard Labs said. ".

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ From MostereRAT to ClickFix: New Malware Campaigns Highlight Rising AI and Phishing Risks πŸ–‹οΈ

Cybersecurity researchers have disclosed details of a phishing campaign that delivers a stealthy banking malwareturnedremote access trojan called MostereRAT. The phishing attack incorporates a number of advanced evasion techniques to gain complete control over compromised systems, siphon sensitive data, and extend its functionality by serving secondary plugins, Fortinet FortiGuard Labs said. ".

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ How Leading CISOs are Getting Budget Approval πŸ–‹οΈ

Its budget season. Once again, security is being questioned, scrutinized, or deprioritized. If you're a CISO or security leader, you've likely found yourself explaining why your program matters, why a given tool or headcount is essential, and how the next breach is one blind spot away. But these arguments often fall short unless they're framed in a way the board can understand and appreciate.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ How Leading CISOs are Getting Budget Approval πŸ–‹οΈ

Its budget season. Once again, security is being questioned, scrutinized, or deprioritized. If you're a CISO or security leader, you've likely found yourself explaining why your program matters, why a given tool or headcount is essential, and how the next breach is one blind spot away. But these arguments often fall short unless they're framed in a way the board can understand and appreciate.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“’ US Senator calls for Microsoft FTC probe over β€˜gross cybersecurity negligence’ – Ron Wyden claims the tech giant has provided β€˜dangerous, insecure software’ to the US government πŸ“’

Ron Wyden, a Democratic senator from Oregon, has written to the chair of the FTC calling for an investigation into Microsoft's cyber practices.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
❀2
πŸ“’ LNER warns customers to remain vigilant after personal data exposed in cyber attack πŸ“’

LNER has warned customers to remain vigilant for social engineering attacks after a cyber attack on the rail operator exposed personal data.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Jaguar Land Rover u-turns on cyber attack containment claims, admits β€˜some data has been affected’ πŸ“’

Jaguar Land Rover JLR has admitted some data may have been accessed by hackers following a cyber attack which severely disrupted production.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Everything we know about the Plex data breach so far πŸ“’

Plex advised users to sign out of any connected devices that are currently logged in and enable twofactor authentication if they havent already.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“’ Prolific ransomware operator added to Europe’s Most Wanted list as US dangles $10 million reward πŸ“’

The US Department of Justice is offering a reward of up to 10 million for information leading to the arrest of Volodymyr Viktorovych Tymoshchuk, an alleged ransomware criminal.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Malware Injected Into Code Packages That Get 2 Billion+ Downloads Each Week 🦿

An attack targeting the Node.js ecosystem was just identified but not before it compromised 18 npm packages that account for billions of weekly downloads.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Former WhatsApp Security Chief Sues Meta, Citing Major Privacy Risks 🦿

ExWhatsApp security chief Attaullah Baig is suing Meta and alleging the company ignored flaws that put billions at risk. Meta denies the claims.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Cracking the Boardroom Code: Helping CISOs Speak the Language of Business πŸ–‹οΈ

CISOs know their field. They understand the threat landscape. They understand how to build a strong and costeffective security stack. They understand how to staff out their organization. They understand the intricacies of compliance. They understand what it takes to reduce risk. Yet one question comes up again and again in our conversations with these security leaders how do I make the impact.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers πŸ–‹οΈ

Threat actors affiliated with the Akira ransomware group have continued to target SonicWall devices for initial access. Cybersecurity firm Rapid7 said it observed a spike in intrusions involving SonicWall appliances over the past month, particularly following reports about renewed Akira ransomware activity since late July 2025. SonicWall subsequently revealed the SSL VPN activity aimed at its.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Fake Madgicx Plus and SocialMetrics Extensions Are Hijacking Meta Business Accounts πŸ–‹οΈ

Cybersecurity researchers have disclosed two new campaigns that are serving fake browser extensions using malicious ads and fake websites to steal sensitive data. The malvertising campaign, per Bitdefender, is designed to push fake "Meta Verified" browser extensions named SocialMetrics Pro that claim to unlock the blue check badge for Facebook and Instagram profiles. At least 37 malicious ads.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ AsyncRAT Exploits ConnectWise ScreenConnect to Steal Credentials and Crypto πŸ–‹οΈ

Cybersecurity researchers have disclosed details of a new campaign that leverages ConnectWise ScreenConnect, a legitimate Remote Monitoring and Management RMM software, to deliver a fleshless loader that drops a remote access trojan RAT called AsyncRAT to steal sensitive data from compromised hosts. "The attacker used ScreenConnect to gain remote access, then executed a layered VBScript and.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Chinese APT Deploys EggStreme Fileless Malware to Breach Philippine Military Systems πŸ–‹οΈ

An advanced persistent threat APT group from China has been attributed to the compromise of a Philippinesbased military company using a previously undocumented fileless malware framework called EggStreme. "This multistage toolset achieves persistent, lowprofile espionage by injecting malicious code directly into memory and leveraging DLL sideloading to execute payloads," Bitdefender.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems πŸ–‹οΈ

Cybersecurity researchers have discovered two new malware families, including a modular Apple macOS backdoor called CHILLYHELL and a Gobased remote access trojan RAT named ZynorRAT that can target both Windows and Linux systems. According to an analysis from Jamf Threat Labs, ChillyHell is written in C and is developed for Intel architectures. CHILLYHELL is the name assigned to a malware.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity