πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ A terrifying Microsoft flaw could’ve allowed hackers to compromise β€˜every Entra ID tenant in the world’ πŸ“’

The Entra ID vulnerability could have allowed full access to virtually all Azure customer accounts.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ A cyber attack has caused chaos at airports across Europe – here's everything we know so far πŸ“’

Passengers at a string of European airports faced severe disruption.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Google Touts β€˜Biggest Upgrade to Chrome in Its History’ With Gemini AI 🦿

Google embeds Gemini into Chrome in what it calls the browsers biggest upgrade, adding features to summarize pages, combat scams, and simplify browsing. The post Google Touts Biggest Upgrade to Chrome in Its History With Gemini AI appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ ⚑ Weekly Recap: Chrome 0-Day, AI Hacking Tools, DDR5 Bit-Flips, npm Worm & More πŸ–‹οΈ

The security landscape now moves at a pace no patch cycle can match. Attackers arent waiting for quarterly updates or monthly fixesthey adapt within hours, blending fresh techniques with old, forgotten flaws to create new openings. A vulnerability closed yesterday can become the blueprint for tomorrows breach. This weeks recap explores the trends driving that constant churn how threat.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ How to Gain Control of AI Agents and Non-Human Identities πŸ–‹οΈ

We hear this a lot Weve got hundreds of service accounts and AI agents running in the background. We didnt create most of them. We dont know who owns them. How are we supposed to secure them? Every enterprise today runs on more than users. Behind the scenes, thousands of nonhuman identities, from service accounts to API tokens to AI agents, access systems, move data, and execute tasks.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Major Cyber Threat Detection Vendors Pull Out of MITRE Evaluations Test πŸ“”

MITRE said it understands why Microsoft, SentinelOne and Palo Alto pulled out of its 2025 of ATTCK Evaluations test and promises to do better next year.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” FBI Says Threat Actors Are Spoofing its IC3 Site πŸ“”

The FBI has warned that adversaries have published fake versions of its cybercrime reporting portal IC3.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Airport Chaos Enters Third Day After Supply Chain Attack πŸ“”

Heathrow, Brussels, Dublin and Berlin airports are among those disrupted by a cyberattack on Collins Aerospace.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Australia Urges Immediate Action on Post-Quantum Cryptography as CRQC Threat Looms πŸ¦…

CRQC " dataimagecaption"" datamediumfile"httpscyble.comwpcontentuploads202509CRQC300x150.webp" datalargefile"httpscyble.comwpcontentuploads202509CRQC.webp" title"Australia Urges Immediate Action on PostQuantum Cryptography as CRQC Threat Looms  1" The Australian Cyber Security Centre ACSC, a division of the Australian Signals Directorate ASD, has issued a comprehensive call to action for organizations to begin preparing their cybersecurity infrastructure for the advent of cryptographically relevant quantum computers CRQC.   The guidance outlines the urgency of adopting postquantum cryptography PQC and provides a detailed roadmap to complete the transition by the end of 2030.  CRQC A Future Threat with PresentDay Implications  While fully operational CRQCs do not yet exist, ASD wa...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Organizations Must Update Defenses to Scattered Spider Tactics, Experts Urge πŸ“”

Experts at a Gartner event highlighted areas of focus in identity, processes and thirdparty risk management to tackle the novel tactics employed by Scattered Spider.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ ComicForm and SectorJ149 Hackers Deploy Formbook Malware in Eurasian Cyberattacks πŸ–‹οΈ

Organizations in Belarus, Kazakhstan, and Russia have emerged as the target of a phishing campaign undertaken by a previously undocumented hacking group called ComicForm since at least April 2025. The activity primarily targeted industrial, financial, tourism, biotechnology, research, and trade sectors, cybersecurity company F6 said in an analysis published last week. The attack chain involves.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” npm Package Uses QR Code Steganography to Steal Credentials πŸ“”

Malicious npm package Fezbox uses QR codes to steal credentials from browser cookies.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
🦿 Proofpoint’s New Agentic AI Cybersecurity Solutions Address 4 Key Challenges 🦿

Proofpoint expands humancentric security to protect AI agents, safeguarding collaboration points and shared data in the agentic workspace. The post Proofpoints New Agentic AI Cybersecurity Solutions Address 4 Key Challenges appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Proofpoint’s New Agentic AI Cybersecurity Solutions Address 4 Key Challenges 🦿

Proofpoint expands humancentric security to protect AI agents, safeguarding collaboration points and shared data in the agentic workspace. The post Proofpoints New Agentic AI Cybersecurity Solutions Address 4 Key Challenges appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Proofpoint’s New Agentic AI Cybersecurity Solutions Address 4 Key Challenges 🦿

Proofpoint expands humancentric security to protect AI agents, safeguarding collaboration points and shared data in the agentic workspace. The post Proofpoints New Agentic AI Cybersecurity Solutions Address 4 Key Challenges appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ Feds Tie β€˜Scattered Spider’ Duo to $115M in Ransoms β™ŸοΈ

U.S. prosecutors last week levied criminal hacking charges against 19yearold U.K. national Thalha Jubair for allegedly being a core member of Scattered Spider, a prolific cybercrime group blamed for extorting at least 115 million in ransom payments from victims. The charges came as Jubair and an alleged coconspirator appeared in a London court to face accusations of hacking into and extorting several large U.K. retailers, the London transit system, and healthcare providers in the United States.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Cisco Warns of Actively Exploited SNMP Vulnerability Allowing RCE or DoS in IOS Software πŸ–‹οΈ

Cisco has warned of a highseverity security flaw in IOS Software and IOS XE Software that could allow a remote attacker to execute arbitrary code or trigger a denialofservice DoS condition under specific circumstances. The company said the vulnerability, CVE202520352 CVSS score 7.7, has been exploited in the wild, adding it became aware of it "after local Administrator credentials were.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ Feds Tie β€˜Scattered Spider’ Duo to $115M in Ransoms β™ŸοΈ

U.S. prosecutors last week levied criminal hacking charges against 19yearold U.K. national Thalha Jubair for allegedly being a core member of Scattered Spider, a prolific cybercrime group blamed for extorting at least 115 million in ransom payments from victims. The charges came as Jubair and an alleged coconspirator appeared in a London court to face accusations of hacking into and extorting several large U.K. retailers, the London transit system, and healthcare providers in the United States.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
🦿 Proofpoint’s New Agentic AI Cybersecurity Solutions Address 4 Key Challenges 🦿

Proofpoint expands humancentric security to protect AI agents, safeguarding collaboration points and shared data in the agentic workspace. The post Proofpoints New Agentic AI Cybersecurity Solutions Address 4 Key Challenges appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” npm Package Uses QR Code Steganography to Steal Credentials πŸ“”

Malicious npm package Fezbox uses QR codes to steal credentials from browser cookies.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” npm Package Uses QR Code Steganography to Steal Credentials πŸ“”

Malicious npm package Fezbox uses QR codes to steal credentials from browser cookies.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity