🛡 Cybersecurity & Privacy 🛡 - News
26K subscribers
89.3K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
🖋️ Vane Viper Generates 1 Trillion DNS Queries to Power Global Malware and Ad Fraud Network 🖋️

The threat actor known as Vane Viper has been outed as a purveyor of malicious ad technology adtech, while relying on a tangled web of shell companies and opaque ownership structures to deliberately evade responsibility. "Vane Viper has provided core infrastructure in widespread malvertising, ad fraud, and cyberthreat proliferation for at least a decade," Infoblox said in a technical report.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
🚨 NCSC statement following reports of nursery data incident 🚨

Statement from the NCSC in response to reports of an incident impacting nurseries.

📖 Read more.

🔗 Via "UK NCSC"

----------
👁️ Seen on @cibsecurity
🖋️ Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware 🖋️

The U.K. National Cyber Security Centre NCSC has revealed that threat actors have exploited the recently disclosed security flaws impacting Cisco firewalls as part of zeroday attacks to deliver previously undocumented malware families like RayInitiator and LINE VIPER. "The RayInitiator and LINE VIPER malware represent a significant evolution on that used in the previous campaign, both in.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
🦿 Security Breaches Found in AI-Powered Repair Tool Wondershare RepairIt 🦿

Trend Micro reveals that RepairIt "contradicted its privacy policy by collecting, storing, and, due to weak Development, Security, and Operations practices, inadvertently leaking private user data." The post Security Breaches Found in AIPowered Repair Tool Wondershare RepairIt appeared first on TechRepublic.

📖 Read more.

🔗 Via "Tech Republic"

----------
👁️ Seen on @cibsecurity
🦿 Security Breaches Found in AI-Powered Repair Tool Wondershare RepairIt 🦿

Trend Micro reveals that RepairIt "contradicted its privacy policy by collecting, storing, and, due to weak Development, Security, and Operations practices, inadvertently leaking private user data." The post Security Breaches Found in AIPowered Repair Tool Wondershare RepairIt appeared first on TechRepublic.

📖 Read more.

🔗 Via "Tech Republic"

----------
👁️ Seen on @cibsecurity
📢 Organizations around the world are unprepared for the threat from bad bots – and UK businesses are some of the worst performers 📢

As AIdriven bot traffic booms, legacy defenses are failing fast.

📖 Read more.

🔗 Via "ITPro"

----------
👁️ Seen on @cibsecurity
🪖 Sharpening the Focus on Product Requirements and Cybersecurity Risks: Updating Foundational Activities for IoT Product Manufacturers 🪖

Over the past few months, NIST has been revising and updating Foundational Activities for IoT Product Manufacturers NIST IR 8259 Revision 1 Initial Public Draft, which describes recommended premarket and postmarket activities for manufacturers to develop products that meet their customers cybersecurity needs and expectations. Thank you so much for the thoughtful comments and feedback throughout this process 400 participants across industry, consumer organizations, academia, federal agencies, and researchers shared feedback in both the December 2024 and March 2025 workshopsas well as.

📖 Read more.

🔗 Via "NIST"

----------
👁️ Seen on @cibsecurity
📢 Asahi production halted by cyber attack 📢

Yet another big brand suffers operational disruption following apparent hacking attack.

📖 Read more.

🔗 Via "ITPro"

----------
👁️ Seen on @cibsecurity
🪖 Sharpening the Focus on Product Requirements and Cybersecurity Risks: Updating Foundational Activities for IoT Product Manufacturers 🪖

Over the past few months, NIST has been revising and updating Foundational Activities for IoT Product Manufacturers NIST IR 8259 Revision 1 Initial Public Draft, which describes recommended premarket and postmarket activities for manufacturers to develop products that meet their customers cybersecurity needs and expectations. Thank you so much for the thoughtful comments and feedback throughout this process 400 participants across industry, consumer organizations, academia, federal agencies, and researchers shared feedback in both the December 2024 and March 2025 workshopsas well as.

📖 Read more.

🔗 Via "NIST"

----------
👁️ Seen on @cibsecurity
📢 Organizations around the world are unprepared for the threat from bad bots – and UK businesses are some of the worst performers 📢

As AIdriven bot traffic booms, legacy defenses are failing fast.

📖 Read more.

🔗 Via "ITPro"

----------
👁️ Seen on @cibsecurity
🦅 The Week in Vulnerabilities: MFT, Help Desk Fixes Urged by Cyble 🦅

Cyble Vulnerability Intelligence researchers tracked 1,126 vulnerabilities in the last week, and nearly 200 already have publicly available ProofsofConcept PoCs, raising the odds that the flaws will be exploited.  A total of 71 vulnerabilities were rated as critical under CVSS v3.1, while 21 received a critical severity rating under the newer CVSS v4.0 scoring system.  Here are some of the most critical vulnerabilities tracked by Cyble in the last week, including some under discussion on open source and underground forums.  SolarWinds WHD, GoAnywhere MFT Among the Top Vulnerabilities  Among the top vulnerabilities this week was CVE202526399, a critical remote code execution RCE vulnerability in SolarWinds Web Help Desk WHD, a webbased IT ticketing and asset management solution...

📖 Read more.

🔗 Via "CYBLE"

----------
👁️ Seen on @cibsecurity
🖋️ Phantom Taurus: New China-Linked Hacker Group Hits Governments With Stealth Malware 🖋️

Government and telecommunications organizations across Africa, the Middle East, and Asia have emerged as the target of a previously undocumented Chinaaligned nationstate actor dubbed Phantom Taurus over the past twoandahalf years. "Phantom Taurus' main focus areas include ministries of foreign affairs, embassies, geopolitical events, and military operations," Palo Alto Networks Unit 42.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
🖋️ Phantom Taurus: New China-Linked Hacker Group Hits Governments With Stealth Malware 🖋️

Government and telecommunications organizations across Africa, the Middle East, and Asia have emerged as the target of a previously undocumented Chinaaligned nationstate actor dubbed Phantom Taurus over the past twoandahalf years. "Phantom Taurus' main focus areas include ministries of foreign affairs, embassies, geopolitical events, and military operations," Palo Alto Networks Unit 42.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
🦅 The Week in Vulnerabilities: MFT, Help Desk Fixes Urged by Cyble 🦅

Cyble Vulnerability Intelligence researchers tracked 1,126 vulnerabilities in the last week, and nearly 200 already have publicly available ProofsofConcept PoCs, raising the odds that the flaws will be exploited.  A total of 71 vulnerabilities were rated as critical under CVSS v3.1, while 21 received a critical severity rating under the newer CVSS v4.0 scoring system.  Here are some of the most critical vulnerabilities tracked by Cyble in the last week, including some under discussion on open source and underground forums.  SolarWinds WHD, GoAnywhere MFT Among the Top Vulnerabilities  Among the top vulnerabilities this week was CVE202526399, a critical remote code execution RCE vulnerability in SolarWinds Web Help Desk WHD, a webbased IT ticketing and asset management solution...

📖 Read more.

🔗 Via "CYBLE"

----------
👁️ Seen on @cibsecurity
🦅 The Week in Vulnerabilities: MFT, Help Desk Fixes Urged by Cyble 🦅

Cyble Vulnerability Intelligence researchers tracked 1,126 vulnerabilities in the last week, and nearly 200 already have publicly available ProofsofConcept PoCs, raising the odds that the flaws will be exploited.  A total of 71 vulnerabilities were rated as critical under CVSS v3.1, while 21 received a critical severity rating under the newer CVSS v4.0 scoring system.  Here are some of the most critical vulnerabilities tracked by Cyble in the last week, including some under discussion on open source and underground forums.  SolarWinds WHD, GoAnywhere MFT Among the Top Vulnerabilities  Among the top vulnerabilities this week was CVE202526399, a critical remote code execution RCE vulnerability in SolarWinds Web Help Desk WHD, a webbased IT ticketing and asset management solution...

📖 Read more.

🔗 Via "CYBLE"

----------
👁️ Seen on @cibsecurity
📔 Smishing Campaigns Exploit Cellular Routers to Target Belgium 📔

New smishing attacks exploit Milesight routers to send phishing texts targeting Belgian users.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
📢 Asahi production halted by cyber attack 📢

Yet another big brand suffers operational disruption following apparent hacking attack.

📖 Read more.

🔗 Via "ITPro"

----------
👁️ Seen on @cibsecurity
📔 Smishing Campaigns Exploit Cellular Routers to Target Belgium 📔

New smishing attacks exploit Milesight routers to send phishing texts targeting Belgian users.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
🖋️ Researchers Disclose Google Gemini AI Flaws Allowing Prompt Injection and Cloud Exploits 🖋️

Cybersecurity researchers have disclosed three nowpatched security vulnerabilities impacting Google's Gemini artificial intelligence AI assistant that, if successfully exploited, could have exposed users to major privacy risks and data theft. "They made Gemini vulnerable to searchinjection attacks on its Search Personalization Model logtoprompt injection attacks against Gemini Cloud.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
🖋️ Researchers Disclose Google Gemini AI Flaws Allowing Prompt Injection and Cloud Exploits 🖋️

Cybersecurity researchers have disclosed three nowpatched security vulnerabilities impacting Google's Gemini artificial intelligence AI assistant that, if successfully exploited, could have exposed users to major privacy risks and data theft. "They made Gemini vulnerable to searchinjection attacks on its Search Personalization Model logtoprompt injection attacks against Gemini Cloud.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
📔 New Android RAT Klopatra Targets Financial Data 📔

New Android RAT Klopatra is targeting financial institutions using advanced evasion techniques.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity