π’ Everything we know about the Plex data breach so far π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Plex advised users to sign out of any connected devices that are currently logged in and enable twofactor authentication if they havent already.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Everything we know about the Plex data breach so far
No credit card information or passwords were compromised in the Plex data breach
β€1
π’ Prolific ransomware operator added to Europeβs Most Wanted list as US dangles $10 million reward π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
The US Department of Justice is offering a reward of up to 10 million for information leading to the arrest of Volodymyr Viktorovych Tymoshchuk, an alleged ransomware criminal.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Prolific ransomware operator added to Europeβs Most Wanted list as US dangles $10 million reward
Volodymyr Viktorovych Tymoshchuk is believed to have been behind hundreds of attacks
π¦Ώ Malware Injected Into Code Packages That Get 2 Billion+ Downloads Each Week π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
An attack targeting the Node.js ecosystem was just identified but not before it compromised 18 npm packages that account for billions of weekly downloads.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Malware Injected Into Code Packages That Get 2 Billion+ Downloads Each Week
An attack targeting the Node.js ecosystem was just identified β but not before it compromised 18 npm packages that account for billions of weekly downloads.
π¦Ώ Former WhatsApp Security Chief Sues Meta, Citing Major Privacy Risks π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
ExWhatsApp security chief Attaullah Baig is suing Meta and alleging the company ignored flaws that put billions at risk. Meta denies the claims.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Former WhatsApp Security Chief Sues Meta, Citing Major Privacy Risks
Ex-WhatsApp security chief Attaullah Baig is suing Meta and alleging the company ignored flaws that put billions at risk. Meta denies the claims.
ποΈ Cracking the Boardroom Code: Helping CISOs Speak the Language of Business ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
CISOs know their field. They understand the threat landscape. They understand how to build a strong and costeffective security stack. They understand how to staff out their organization. They understand the intricacies of compliance. They understand what it takes to reduce risk. Yet one question comes up again and again in our conversations with these security leaders how do I make the impact.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Threat actors affiliated with the Akira ransomware group have continued to target SonicWall devices for initial access. Cybersecurity firm Rapid7 said it observed a spike in intrusions involving SonicWall appliances over the past month, particularly following reports about renewed Akira ransomware activity since late July 2025. SonicWall subsequently revealed the SSL VPN activity aimed at its.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Fake Madgicx Plus and SocialMetrics Extensions Are Hijacking Meta Business Accounts ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have disclosed two new campaigns that are serving fake browser extensions using malicious ads and fake websites to steal sensitive data. The malvertising campaign, per Bitdefender, is designed to push fake "Meta Verified" browser extensions named SocialMetrics Pro that claim to unlock the blue check badge for Facebook and Instagram profiles. At least 37 malicious ads.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ AsyncRAT Exploits ConnectWise ScreenConnect to Steal Credentials and Crypto ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have disclosed details of a new campaign that leverages ConnectWise ScreenConnect, a legitimate Remote Monitoring and Management RMM software, to deliver a fleshless loader that drops a remote access trojan RAT called AsyncRAT to steal sensitive data from compromised hosts. "The attacker used ScreenConnect to gain remote access, then executed a layered VBScript and.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Chinese APT Deploys EggStreme Fileless Malware to Breach Philippine Military Systems ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
An advanced persistent threat APT group from China has been attributed to the compromise of a Philippinesbased military company using a previously undocumented fileless malware framework called EggStreme. "This multistage toolset achieves persistent, lowprofile espionage by injecting malicious code directly into memory and leveraging DLL sideloading to execute payloads," Bitdefender.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have discovered two new malware families, including a modular Apple macOS backdoor called CHILLYHELL and a Gobased remote access trojan RAT named ZynorRAT that can target both Windows and Linux systems. According to an analysis from Jamf Threat Labs, ChillyHell is written in C and is developed for Intel architectures. CHILLYHELL is the name assigned to a malware.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Microsoft Fixes 80 Flaws β Including SMB PrivEsc and Azure CVSS 10.0 Bugs ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Microsoft on Tuesday addressed a set of 80 security flaws in its software, including one vulnerability that has been disclosed as publicly known at the time of release. Of the 80 vulnerabilities, eight are rated Critical and 72 are rated Important in severity. None of the shortcomings has been exploited in the wild as a zeroday. Like last month, 38 of the disclosed flaws are related to.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Apple iPhone Air and iPhone 17 Feature A19 Chips With Spyware-Resistant Memory Safety ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Apple on Tuesday revealed a new security feature called Memory Integrity Enforcement MIE that's built into its newly introduced iPhone models, including iPhone 17 and iPhone Air. MIE, per the tech giant, offers "alwayson memory safety protection" across critical attack surfaces such as the kernel and over 70 userland processes without sacrificing device performance by designing its A19 and.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ The Time-Saving Guide for Service Providers: Automating vCISO and Compliance Services ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Introduction Managed service providers MSPs and managed security service providers MSSPs are under increasing pressure to deliver strong cybersecurity outcomes in a landscape marked by rising threats and evolving compliance requirements. At the same time, clients want better protection without managing cybersecurity themselves. Service providers must balance these growing demands with the.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Watch Out for Salty2FA: New Phishing Kit Targeting US and EU Enterprises ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
PhishingasaService PhaaS platforms keep evolving, giving attackers faster and cheaper ways to break into corporate accounts. Now, researchers at ANY.RUN has uncovered a new entrant Salty2FA, a phishing kit designed to bypass multiple twofactor authentication methods and slip past traditional defenses. Already spotted in campaigns across the US and EU, Salty2FA puts enterprises at.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ China-Linked APT41 Hackers Target U.S. Trade Officials Amid 2025 Negotiations ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The House Select Committee on China has formally issued an advisory warning of an "ongoing" series of highly targeted cyber espionage campaigns linked to the People's Republic of China PRC amid contentious U.S.China trade talks. "These campaigns seek to compromise organizations and individuals involved in U.S.China trade policy and diplomacy, including U.S. government agencies, U.S. business.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Adobe Commerce Flaw CVE-2025-54236 Lets Hackers Take Over Customer Accounts ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Adobe has warned of a critical security flaw in its Commerce and Magento Open Source platforms that, if successfully exploited, could allow attackers to take control of customer accounts. The vulnerability, tracked as CVE202554236 aka SessionReaper, carries a CVSS score of 9.1 out of a maximum of 10.0. It has been described as an improper input validation flaw. Adobe said it's not aware of.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ SAP Patches Critical NetWeaver (CVSS Up to 10.0) and High-Severity S/4HANA Flaws ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
SAP on Tuesday released security updates to address multiple security flaws, including three critical vulnerabilities in SAP Netweaver that could result in code execution and the upload arbitrary files. The vulnerabilities are listed below CVE202542944 CVSS score 10.0 A deserialization vulnerability in SAP NetWeaver that could allow an unauthenticated attacker to submit a malicious.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π Preventing business disruption and building cyber-resilience with MDR π
π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
Given the serious financial and reputational risks of incidents that grind business to a halt, organizations need to prioritize a preventionfirst cybersecurity strategy.π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
Welivesecurity
Preventing business disruption and building cyber-resilience with MDR
Given the serious financial and reputational risks of incidents that grind business to a halt, organizations need to prioritize a prevention-first cybersecurity strategy.
π Wyden Urges FTC Investigation Over Ascension Ransomware Hack π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Senator Ron Wyden of Oregon has urged the FTC to investigate Microsoft for cybersecurity lapses linked to ransomware attacks on US critical infrastructure.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Wyden Urges FTC Investigation Over Ascension Ransomware Hack
Senator Ron Wyden of Oregon has urged the FTC to investigate Microsoft for cybersecurity lapses linked to ransomware attacks on US critical infrastructure
π Chinese APT Actor Compromises Military Firm with Novel Fileless Malware Toolset π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Bitdefender said the sophisticated multistage operation allowed attackers to maintain persistent access and steal sensitive data from a Philippines military company.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Chinese APT Actor Compromises Military Firm with Novel Fileless Malware Toolset
Bitdefender said the sophisticated multi-stage operation allowed attackers to maintain persistent access and steal sensitive data from a Philippines military company
π France: Three Regional Healthcare Agencies Targeted by Cyber-Attacks π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Compromised data includes personal data such as patients full names, ages, phone numbers and email addresses.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
France: Three Regional Healthcare Agencies Targeted by Cyber-Attacks
Compromised data includes personal data such as patientsβ full names, ages, phone numbers and email addresses