πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ NCA confirms arrest after airport cyber disruption πŸ“’

Disruption is easing across Europe following the ransomware incident.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Cyber skills shortages are pushing firms into dangerous shortcuts – and it’s putting them at huge risk of security breaches πŸ“’

Chronic cyber skills shortages mean many businesses are implementing quick fixes.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ NCA confirms arrest after airport cyber disruption πŸ“’

Disruption is easing across Europe following the ransomware incident.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Cyber skills shortages are pushing firms into dangerous shortcuts – and it’s putting them at huge risk of security breaches πŸ“’

Chronic cyber skills shortages mean many businesses are implementing quick fixes.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Co-op chief executive β€˜very proud’ of cyber attack response despite huge financial losses πŸ“’

The company says operating profits are 80 million down, and that the financial effects may continue into the second half.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ NCA confirms arrest after airport cyber disruption πŸ“’

Disruption is easing across Europe following the ransomware incident.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Cyber skills shortages are pushing firms into dangerous shortcuts – and it’s putting them at huge risk of security breaches πŸ“’

Chronic cyber skills shortages mean many businesses are implementing quick fixes.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Pentesters are now a CISOs best friend as critical vulnerabilities skyrocket πŸ“’

Attack surfaces are expanding rapidly, but pentesters are here to save the day.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CTEM's Core: Prioritization and Validation πŸ–‹οΈ

Despite a coordinated investment of time, effort, planning, and resources, even the most uptodate cybersecurity systems continue to fail. Every day. Why?  Its not because security teams can't see enough. Quite the contrary. Every security tool spits out thousands of findings. Patch this. Block that. Investigate this. It's a tsunami of red dots that not even the most crackerjack team on.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Threatsday Bulletin: Rootkit Patch, Federal Breach, OnePlus SMS Leak, TikTok Scandal & More πŸ–‹οΈ

Container .tdwrap Section .tdsection .tdtitle margin 16px 0 4px fontsize 32px lineheight 1.2 fontweight 800 .tdsubtitle margin 0 0 24px color 64748b fontsize 16px Timeline .tdtimeline position relative margin 0 !importantpadding 0!important liststyle none spine .tdtimelinebefore .

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Tech Overtakes Gaming as Top DDoS Attack Target, New Gcore Radar Report Finds πŸ–‹οΈ

The latest Gcore Radar report analyzing attack data from Q1Q2 2025, reveals a 41 yearonyear increase in total attack volume. The largest attack peaked at 2.2 Tbps, surpassing the 2 Tbps record in late 2024. Attacks are growing not only in scale but in sophistication, with longer durations, multilayered strategies, and a shift in target industries. Technology now overtakes gaming as the most.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Malicious Rust Crates Steal Solana and Ethereum Keys β€” 8,424 Downloads Confirmed πŸ–‹οΈ

Cybersecurity researchers have discovered two malicious Rust crates impersonating a legitimate library called fastlog to steal Solana and Ethereum wallet keys from source code. The crates, named fasterlog and asyncprintln, were published by the threat actor under the alias rustguruman and dumbnbased on May 25, 2025, amassing 8,424 downloads in total, according to software supply chain.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Chinese Hackers Use 'BRICKSTORM' Backdoor to Breach US Firms πŸ“”

The hackers are likely trying to collect data to feed the development of zeroday exploits, said Google researchers.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Co-op Records Β£206m Revenue Loss Following Cyber-Attack πŸ“”

The UK retailer estimated the losses from temporarily shutting down some of its systems to contain the threat.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Experts Warn of Global Breach Risk from Indian Suppliers πŸ“”

SecurityScorecard report finds 53 of Indian vendors suffered thirdparty breaches in the past year.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers πŸ–‹οΈ

The North Korealinked threat actors associated with the Contagious Interview campaign have been attributed to a previously undocumented backdoor called AkdoorTea, along with tools like TsunamiKit and Tropidoor. Slovak cybersecurity firm ESET, which is tracking the activity under the name DeceptiveDevelopment, said the campaign targets software developers across all operating systems, Windows,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Phishing Campaign Evolves into PureRAT Deployment, Linked to Vietnamese Threat Actors πŸ“”

Vietnamese phishing campaign evolves from Python infostealer to PureRAT trojan.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Salesforce Patches Critical ForcedLeak Bug Exposing CRM Data via AI Prompt Injection πŸ–‹οΈ

Cybersecurity researchers have disclosed a critical flaw impacting Salesforce Agentforce, a platform for building artificial intelligence AI agents, that could allow attackers to potentially exfiltrate sensitive data from its customer relationship management CRM tool by means of an indirect prompt injection. The vulnerability has been codenamed ForcedLeak CVSS score 9.4 by Noma Security,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Malicious AI Agent Server Reportedly Steals Emails πŸ“”

The security researchers who discovered the malicious npm package called it the first malicious MCP in the wild.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🚨 NCSC warns of persistent malware campaign targeting Cisco devices 🚨

Latest malware analysis report helps organisations detect and mitigate malicious activity targeting certain Cisco devices.

πŸ“– Read more.

πŸ”— Via "UK NCSC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Critical Vulnerability in Salesforce AgentForce Exposed πŸ“”

Critical flaw ForcedLeak in Salesforce's AgentForce allows CRM data theft via prompt injection.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity