πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ This DeepSeek-powered pen testing tool could be a Cobalt Strike successor – and hackers have downloaded it 10,000 times since July πŸ“’

Villager, a tool developed by a Chinabased red team project known as Cyberspike, is being used to automate attacks under the guise of penetration testing.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ NinjaOne expands availability on CrowdStrike Marketplace πŸ“’

CrowdStrike Falcon customers now have simplified access to NinjaOnes automated endpoint management capabilities.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Hackers behind Jaguar Land Rover announce their 'retirement' – should we believe them? πŸ“’

Is this really the end for Scattered Lapsus Hunters?.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Apple Backports Fix for CVE-2025-43300 Exploited in Sophisticated Spyware Attack πŸ–‹οΈ

Apple on Monday backported fixes for a recently patched security flaw that has been actively exploited in the wild. The vulnerability in question is CVE202543300 CVSS score 8.8, an outofbounds write issue in the ImageIO component that could result in memory corruption when processing a malicious image file. "Apple is aware of a report that this issue may have been exploited in an.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Securing the Agentic Era: Introducing Astrix's AI Agent Control Plane πŸ–‹οΈ

AI agents are rapidly becoming a core part of the enterprise, being embedded across enterprise workflows, operating with autonomy, and making decisions about which systems to access and how to use them. But as agents grow in power and autonomy, so do the risks and threats.  Recent studies show 80 of companies have already experienced unintended AI agent actions, from unauthorized system.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” UK: Tax Refund-Themed Phishing Slows in 2025 πŸ“”

Reports of email phishing attempts impersonating the UKs HM Revenue Customs plummeted in the first half of 2025.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” JLR Extends Production Halt After Cyber-Attack πŸ“”

Jaguar Land Rover JLR has confirmed that its pause in production will last until at least Wednesday, September 24.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” API Threats Surge to 40,000 Incidents in 1H 2025 πŸ“”

Thales claims there were over 40,000 API incidents in the first half of 2025.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” FinWise Bank Warns of Insider Data Breach πŸ“”

An insider data breach at FinWise may have impacted 689,000 customers.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site πŸ–‹οΈ

Cybersecurity researchers have warned of a new campaign that's leveraging a variant of the FileFix social engineering tactic to deliver the StealC information stealer malware. "The observed campaign uses a highly convincing, multilingual phishing site e.g., fake Facebook Security page, with antianalysis techniques and advanced obfuscation to evade detection," Acronis security researcher Eliad.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ Self-Replicating Worm Hits 180+ Software Packages β™ŸοΈ

At least 187 code packages made available through the JavaScript repository NPM have been infected with a selfreplicating worm that steals credentials from developers and publishes those secrets on GitHub, experts warn. The malware, which briefly infected multiple code packages from the security vendor CrowdStrike, steals and publishes even more credentials every time an infected package is installed.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ SlopAds Fraud Ring Exploits 224 Android Apps to Drive 2.3 Billion Daily Ad Bids πŸ–‹οΈ

A massive ad fraud and click fraud operation dubbed SlopAds ran a cluster of 224 apps, collectively attracting 38 million downloads across 228 countries and territories. "These apps deliver their fraud payload using steganography and create hidden WebViews to navigate to threat actorowned cashout sites, generating fraudulent ad impressions and clicks," HUMANs Satori Threat Intelligence and.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Gucci and Alexander McQueen Hit by Customer Data Breach πŸ“”

The attack, which is linked to ShinyHunters, has reportedly compromised data relating to 7.4 million unique email addresses.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Chinese AI Villager Pen Testing Tool Hits 11,000 PyPI Downloads πŸ“”

AInative Villager, which automates Kali and DeepSeek penetration tests, has reached 11,000 PyPI downloads fueling dualuse threat.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“” Fifteen Ransomware Gangs β€œRetire,” Future Unclear πŸ“”

Fifteen ransomware groups have claimed shutdown on BreachForums experts warn of rebrands and copycats.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 Lessons from Medusa: What the Industry’s Most Efficient Ransomware Teaches Us 🌊

Medusa is one of 2025s most aggressive multiextortion ransomware families it encrypts systems, steals data, and uses public pressure to force payment. Emerging in June 2021, it has evolved into a RansomwareasaService RaaS powerhouse, impacting over 300 victims by February 2025 across critical sectors like healthcare, education, manufacturing, and technology. With attacks surging 42 from The post Lessons from Medusa What the Industrys Most Efficient Ransomware Teaches Us appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Jaguar Land Rover says IT disruption set to continue πŸ“’

The automotive manufacturer is still not fully operational after the recent cyber attack.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Nearly 700,000 customers impacted after insider attack at US fintech firm πŸ“’

FinWise, which provides loans on behalf of US financial services firms, revealed a former employee accessed sensitive customer information after leaving the firm.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Apple Releases iOS 26, macOS Tahoe 26 and 50+ Security Fixes 🦿

Apple just fixed more than 50 security flaws across iPhone, iPad, Mac, Watch, TV, and Vision Pro. The post Apple Releases iOS 26, macOS Tahoe 26 and 50 Security Fixes appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ TA558 Uses AI-Generated Scripts to Deploy Venom RAT in Brazil Hotel Attacks πŸ–‹οΈ

The threat actor known as TA558 has been attributed to a fresh set of attacks delivering various remote access trojans RATs like Venom RAT to breach hotels in Brazil and Spanishspeaking markets. Russian cybersecurity vendor Kaspersky is tracking the activity, observed in summer 2025, to a cluster it tracks as RevengeHotels. "The threat actors continue to employ phishing emails with invoice.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Chinese TA415 Uses VS Code Remote Tunnels to Spy on U.S. Economic Policy Experts πŸ–‹οΈ

A Chinaaligned threat actor known as TA415 has been attributed to spearphishing campaigns targeting the U.S. government, think tanks, and academic organizations utilizing U.S.China economicthemed lures. "In this activity, the group masqueraded as the current Chair of the Select Committee on Strategic Competition between the United States and the Chinese Communist Party CCP, as well as the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity