πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ Apple iPhone Air and iPhone 17 Feature A19 Chips With Spyware-Resistant Memory Safety πŸ–‹οΈ

Apple on Tuesday revealed a new security feature called Memory Integrity Enforcement MIE that's built into its newly introduced iPhone models, including iPhone 17 and iPhone Air. MIE, per the tech giant, offers "alwayson memory safety protection" across critical attack surfaces such as the kernel and over 70 userland processes without sacrificing device performance by designing its A19 and.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ The Time-Saving Guide for Service Providers: Automating vCISO and Compliance Services πŸ–‹οΈ

Introduction Managed service providers MSPs and managed security service providers MSSPs are under increasing pressure to deliver strong cybersecurity outcomes in a landscape marked by rising threats and evolving compliance requirements. At the same time, clients want better protection without managing cybersecurity themselves. Service providers must balance these growing demands with the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Watch Out for Salty2FA: New Phishing Kit Targeting US and EU Enterprises πŸ–‹οΈ

PhishingasaService PhaaS platforms keep evolving, giving attackers faster and cheaper ways to break into corporate accounts. Now, researchers at ANY.RUN has uncovered a new entrant Salty2FA, a phishing kit designed to bypass multiple twofactor authentication methods and slip past traditional defenses.  Already spotted in campaigns across the US and EU, Salty2FA puts enterprises at.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ China-Linked APT41 Hackers Target U.S. Trade Officials Amid 2025 Negotiations πŸ–‹οΈ

The House Select Committee on China has formally issued an advisory warning of an "ongoing" series of highly targeted cyber espionage campaigns linked to the People's Republic of China PRC amid contentious U.S.China trade talks. "These campaigns seek to compromise organizations and individuals involved in U.S.China trade policy and diplomacy, including U.S. government agencies, U.S. business.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Adobe Commerce Flaw CVE-2025-54236 Lets Hackers Take Over Customer Accounts πŸ–‹οΈ

Adobe has warned of a critical security flaw in its Commerce and Magento Open Source platforms that, if successfully exploited, could allow attackers to take control of customer accounts. The vulnerability, tracked as CVE202554236 aka SessionReaper, carries a CVSS score of 9.1 out of a maximum of 10.0. It has been described as an improper input validation flaw. Adobe said it's not aware of.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ SAP Patches Critical NetWeaver (CVSS Up to 10.0) and High-Severity S/4HANA Flaws πŸ–‹οΈ

SAP on Tuesday released security updates to address multiple security flaws, including three critical vulnerabilities in SAP Netweaver that could result in code execution and the upload arbitrary files. The vulnerabilities are listed below CVE202542944 CVSS score 10.0 A deserialization vulnerability in SAP NetWeaver that could allow an unauthenticated attacker to submit a malicious.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸš€ Preventing business disruption and building cyber-resilience with MDR πŸš€

Given the serious financial and reputational risks of incidents that grind business to a halt, organizations need to prioritize a preventionfirst cybersecurity strategy.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Wyden Urges FTC Investigation Over Ascension Ransomware Hack πŸ“”

Senator Ron Wyden of Oregon has urged the FTC to investigate Microsoft for cybersecurity lapses linked to ransomware attacks on US critical infrastructure.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Chinese APT Actor Compromises Military Firm with Novel Fileless Malware Toolset πŸ“”

Bitdefender said the sophisticated multistage operation allowed attackers to maintain persistent access and steal sensitive data from a Philippines military company.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” France: Three Regional Healthcare Agencies Targeted by Cyber-Attacks πŸ“”

Compromised data includes personal data such as patients full names, ages, phone numbers and email addresses.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted πŸ“”

US offers 11m as LockerGoga ransomware suspect becomes one of Europes most wanted men.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” LNER Reveals Supply Chain Attack Compromised Customer Information πŸ“”

Governmentrun train operator LNER has revealed details of a supplier data breach.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” KillSec Ransomware Hits Brazilian Healthcare IT Vendor πŸ“”

A ransomware attack by KillSec on Brazil software provider MedicSolution threatens healthcare, impacting providers and patients.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Cursor Autorun Flaw Lets Repositories Execute Code Without Consent πŸ“”

A flaw in the Cursor extension allows unauthorized code execution when opening repositories in Visual Studio.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Adobe Releases Emergency Patch for Critical Flaw in Commerce and Magento πŸ“”

The vulnerability, dubbed SessionReaper, allows customer account takeover and unauthenticated remote code execution.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Ransomware Payments Plummet in Education Amid Enhanced Resiliency πŸ“”

Sophos found that average ransom demands and payments fell substantially in the education sector in 2025, as recovery time and costs fell.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Two Zero-Days Among Patch Tuesday CVEs This Month πŸ“”

Microsoft has fixed over 80 vulnerabilities including two publicly disclosed zerodays in its latest Patch Tuesday release.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Malicious npm Code Reached 10% of Cloud Environments πŸ“”

Wiz Security warns that a recently discovered supply chain attack campaign targeting npm is far from over.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 Project Manager 🌊

The post Project Manager appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 Beyond Torq: A Guide to 2025 AI SOC Alternatives 🌊

Torq is a solid platform. An AI SOC that takes the edge off Tier1 fatigue with its lowcode workflows and the Torq Socrates AI agent automation. But if youre asking, Is there a better way? wed say yes you have options. Heres the real guide to nine credible Torq alternatives, explained with realworld context, judgment, The post Beyond Torq A Guide to 2025 AI SOC Alternatives appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 6 Blumira Alternatives: 2025’s Dive into AI SOCs 🌊

Blumira SIEMXDR sits in that good enough ground for IT managers without a fullblown SOC team. But if youve outgrown simple setups or are finally budgeting for real breach prevention, youve got options. Here well unpack 6 Blumira alternatives what they get right, where they fall short, and when youll need more than just automation. The post 6 Blumira Alternatives 2025s Dive into AI SOCs appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity