πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers πŸ–‹οΈ

The North Korealinked threat actors associated with the Contagious Interview campaign have been attributed to a previously undocumented backdoor called AkdoorTea, along with tools like TsunamiKit and Tropidoor. Slovak cybersecurity firm ESET, which is tracking the activity under the name DeceptiveDevelopment, said the campaign targets software developers across all operating systems, Windows,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Phishing Campaign Evolves into PureRAT Deployment, Linked to Vietnamese Threat Actors πŸ“”

Vietnamese phishing campaign evolves from Python infostealer to PureRAT trojan.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Salesforce Patches Critical ForcedLeak Bug Exposing CRM Data via AI Prompt Injection πŸ–‹οΈ

Cybersecurity researchers have disclosed a critical flaw impacting Salesforce Agentforce, a platform for building artificial intelligence AI agents, that could allow attackers to potentially exfiltrate sensitive data from its customer relationship management CRM tool by means of an indirect prompt injection. The vulnerability has been codenamed ForcedLeak CVSS score 9.4 by Noma Security,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Malicious AI Agent Server Reportedly Steals Emails πŸ“”

The security researchers who discovered the malicious npm package called it the first malicious MCP in the wild.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🚨 NCSC warns of persistent malware campaign targeting Cisco devices 🚨

Latest malware analysis report helps organisations detect and mitigate malicious activity targeting certain Cisco devices.

πŸ“– Read more.

πŸ”— Via "UK NCSC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Critical Vulnerability in Salesforce AgentForce Exposed πŸ“”

Critical flaw ForcedLeak in Salesforce's AgentForce allows CRM data theft via prompt injection.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Urgent: Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive πŸ–‹οΈ

Cisco is urging customers to patch two security flaws impacting the VPN web server of Cisco Secure Firewall Adaptive Security Appliance ASA Software and Cisco Secure Firewall Threat Defense FTD Software, which it said have been exploited in the wild. The zeroday vulnerabilities in question are listed below CVE202520333 CVSS score 9.9 An improper validation of usersupplied input.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Threatsday Bulletin: Rootkit Patch, Federal Breach, OnePlus SMS Leak, TikTok Scandal & More πŸ–‹οΈ

Container .tdwrap Section .tdsection .tdtitle margin 16px 0 4px fontsize 32px lineheight 1.2 fontweight 800 .tdsubtitle margin 0 0 24px color 64748b fontsize 16px Timeline .tdtimeline position relative margin 0 !importantpadding 0!important liststyle none spine .tdtimelinebefore .

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Vane Viper Generates 1 Trillion DNS Queries to Power Global Malware and Ad Fraud Network πŸ–‹οΈ

The threat actor known as Vane Viper has been outed as a purveyor of malicious ad technology adtech, while relying on a tangled web of shell companies and opaque ownership structures to deliberately evade responsibility. "Vane Viper has provided core infrastructure in widespread malvertising, ad fraud, and cyberthreat proliferation for at least a decade," Infoblox said in a technical report.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🚨 NCSC statement following reports of nursery data incident 🚨

Statement from the NCSC in response to reports of an incident impacting nurseries.

πŸ“– Read more.

πŸ”— Via "UK NCSC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware πŸ–‹οΈ

The U.K. National Cyber Security Centre NCSC has revealed that threat actors have exploited the recently disclosed security flaws impacting Cisco firewalls as part of zeroday attacks to deliver previously undocumented malware families like RayInitiator and LINE VIPER. "The RayInitiator and LINE VIPER malware represent a significant evolution on that used in the previous campaign, both in.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Security Breaches Found in AI-Powered Repair Tool Wondershare RepairIt 🦿

Trend Micro reveals that RepairIt "contradicted its privacy policy by collecting, storing, and, due to weak Development, Security, and Operations practices, inadvertently leaking private user data." The post Security Breaches Found in AIPowered Repair Tool Wondershare RepairIt appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Security Breaches Found in AI-Powered Repair Tool Wondershare RepairIt 🦿

Trend Micro reveals that RepairIt "contradicted its privacy policy by collecting, storing, and, due to weak Development, Security, and Operations practices, inadvertently leaking private user data." The post Security Breaches Found in AIPowered Repair Tool Wondershare RepairIt appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Organizations around the world are unprepared for the threat from bad bots – and UK businesses are some of the worst performers πŸ“’

As AIdriven bot traffic booms, legacy defenses are failing fast.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸͺ– Sharpening the Focus on Product Requirements and Cybersecurity Risks: Updating Foundational Activities for IoT Product Manufacturers πŸͺ–

Over the past few months, NIST has been revising and updating Foundational Activities for IoT Product Manufacturers NIST IR 8259 Revision 1 Initial Public Draft, which describes recommended premarket and postmarket activities for manufacturers to develop products that meet their customers cybersecurity needs and expectations. Thank you so much for the thoughtful comments and feedback throughout this process 400 participants across industry, consumer organizations, academia, federal agencies, and researchers shared feedback in both the December 2024 and March 2025 workshopsas well as.

πŸ“– Read more.

πŸ”— Via "NIST"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Asahi production halted by cyber attack πŸ“’

Yet another big brand suffers operational disruption following apparent hacking attack.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸͺ– Sharpening the Focus on Product Requirements and Cybersecurity Risks: Updating Foundational Activities for IoT Product Manufacturers πŸͺ–

Over the past few months, NIST has been revising and updating Foundational Activities for IoT Product Manufacturers NIST IR 8259 Revision 1 Initial Public Draft, which describes recommended premarket and postmarket activities for manufacturers to develop products that meet their customers cybersecurity needs and expectations. Thank you so much for the thoughtful comments and feedback throughout this process 400 participants across industry, consumer organizations, academia, federal agencies, and researchers shared feedback in both the December 2024 and March 2025 workshopsas well as.

πŸ“– Read more.

πŸ”— Via "NIST"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Organizations around the world are unprepared for the threat from bad bots – and UK businesses are some of the worst performers πŸ“’

As AIdriven bot traffic booms, legacy defenses are failing fast.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… The Week in Vulnerabilities: MFT, Help Desk Fixes Urged by Cyble πŸ¦…

Cyble Vulnerability Intelligence researchers tracked 1,126 vulnerabilities in the last week, and nearly 200 already have publicly available ProofsofConcept PoCs, raising the odds that the flaws will be exploited.  A total of 71 vulnerabilities were rated as critical under CVSS v3.1, while 21 received a critical severity rating under the newer CVSS v4.0 scoring system.  Here are some of the most critical vulnerabilities tracked by Cyble in the last week, including some under discussion on open source and underground forums.  SolarWinds WHD, GoAnywhere MFT Among the Top Vulnerabilities  Among the top vulnerabilities this week was CVE202526399, a critical remote code execution RCE vulnerability in SolarWinds Web Help Desk WHD, a webbased IT ticketing and asset management solution...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Phantom Taurus: New China-Linked Hacker Group Hits Governments With Stealth Malware πŸ–‹οΈ

Government and telecommunications organizations across Africa, the Middle East, and Asia have emerged as the target of a previously undocumented Chinaaligned nationstate actor dubbed Phantom Taurus over the past twoandahalf years. "Phantom Taurus' main focus areas include ministries of foreign affairs, embassies, geopolitical events, and military operations," Palo Alto Networks Unit 42.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Phantom Taurus: New China-Linked Hacker Group Hits Governments With Stealth Malware πŸ–‹οΈ

Government and telecommunications organizations across Africa, the Middle East, and Asia have emerged as the target of a previously undocumented Chinaaligned nationstate actor dubbed Phantom Taurus over the past twoandahalf years. "Phantom Taurus' main focus areas include ministries of foreign affairs, embassies, geopolitical events, and military operations," Palo Alto Networks Unit 42.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity