πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ Organizations around the world are unprepared for the threat from bad bots – and UK businesses are some of the worst performers πŸ“’

As AIdriven bot traffic booms, legacy defenses are failing fast.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… The Week in Vulnerabilities: MFT, Help Desk Fixes Urged by Cyble πŸ¦…

Cyble Vulnerability Intelligence researchers tracked 1,126 vulnerabilities in the last week, and nearly 200 already have publicly available ProofsofConcept PoCs, raising the odds that the flaws will be exploited.  A total of 71 vulnerabilities were rated as critical under CVSS v3.1, while 21 received a critical severity rating under the newer CVSS v4.0 scoring system.  Here are some of the most critical vulnerabilities tracked by Cyble in the last week, including some under discussion on open source and underground forums.  SolarWinds WHD, GoAnywhere MFT Among the Top Vulnerabilities  Among the top vulnerabilities this week was CVE202526399, a critical remote code execution RCE vulnerability in SolarWinds Web Help Desk WHD, a webbased IT ticketing and asset management solution...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Phantom Taurus: New China-Linked Hacker Group Hits Governments With Stealth Malware πŸ–‹οΈ

Government and telecommunications organizations across Africa, the Middle East, and Asia have emerged as the target of a previously undocumented Chinaaligned nationstate actor dubbed Phantom Taurus over the past twoandahalf years. "Phantom Taurus' main focus areas include ministries of foreign affairs, embassies, geopolitical events, and military operations," Palo Alto Networks Unit 42.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Phantom Taurus: New China-Linked Hacker Group Hits Governments With Stealth Malware πŸ–‹οΈ

Government and telecommunications organizations across Africa, the Middle East, and Asia have emerged as the target of a previously undocumented Chinaaligned nationstate actor dubbed Phantom Taurus over the past twoandahalf years. "Phantom Taurus' main focus areas include ministries of foreign affairs, embassies, geopolitical events, and military operations," Palo Alto Networks Unit 42.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… The Week in Vulnerabilities: MFT, Help Desk Fixes Urged by Cyble πŸ¦…

Cyble Vulnerability Intelligence researchers tracked 1,126 vulnerabilities in the last week, and nearly 200 already have publicly available ProofsofConcept PoCs, raising the odds that the flaws will be exploited.  A total of 71 vulnerabilities were rated as critical under CVSS v3.1, while 21 received a critical severity rating under the newer CVSS v4.0 scoring system.  Here are some of the most critical vulnerabilities tracked by Cyble in the last week, including some under discussion on open source and underground forums.  SolarWinds WHD, GoAnywhere MFT Among the Top Vulnerabilities  Among the top vulnerabilities this week was CVE202526399, a critical remote code execution RCE vulnerability in SolarWinds Web Help Desk WHD, a webbased IT ticketing and asset management solution...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… The Week in Vulnerabilities: MFT, Help Desk Fixes Urged by Cyble πŸ¦…

Cyble Vulnerability Intelligence researchers tracked 1,126 vulnerabilities in the last week, and nearly 200 already have publicly available ProofsofConcept PoCs, raising the odds that the flaws will be exploited.  A total of 71 vulnerabilities were rated as critical under CVSS v3.1, while 21 received a critical severity rating under the newer CVSS v4.0 scoring system.  Here are some of the most critical vulnerabilities tracked by Cyble in the last week, including some under discussion on open source and underground forums.  SolarWinds WHD, GoAnywhere MFT Among the Top Vulnerabilities  Among the top vulnerabilities this week was CVE202526399, a critical remote code execution RCE vulnerability in SolarWinds Web Help Desk WHD, a webbased IT ticketing and asset management solution...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Smishing Campaigns Exploit Cellular Routers to Target Belgium πŸ“”

New smishing attacks exploit Milesight routers to send phishing texts targeting Belgian users.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Asahi production halted by cyber attack πŸ“’

Yet another big brand suffers operational disruption following apparent hacking attack.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Smishing Campaigns Exploit Cellular Routers to Target Belgium πŸ“”

New smishing attacks exploit Milesight routers to send phishing texts targeting Belgian users.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Researchers Disclose Google Gemini AI Flaws Allowing Prompt Injection and Cloud Exploits πŸ–‹οΈ

Cybersecurity researchers have disclosed three nowpatched security vulnerabilities impacting Google's Gemini artificial intelligence AI assistant that, if successfully exploited, could have exposed users to major privacy risks and data theft. "They made Gemini vulnerable to searchinjection attacks on its Search Personalization Model logtoprompt injection attacks against Gemini Cloud.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Researchers Disclose Google Gemini AI Flaws Allowing Prompt Injection and Cloud Exploits πŸ–‹οΈ

Cybersecurity researchers have disclosed three nowpatched security vulnerabilities impacting Google's Gemini artificial intelligence AI assistant that, if successfully exploited, could have exposed users to major privacy risks and data theft. "They made Gemini vulnerable to searchinjection attacks on its Search Personalization Model logtoprompt injection attacks against Gemini Cloud.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New Android RAT Klopatra Targets Financial Data πŸ“”

New Android RAT Klopatra is targeting financial institutions using advanced evasion techniques.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Smishing Campaigns Exploit Cellular Routers to Target Belgium πŸ“”

New smishing attacks exploit Milesight routers to send phishing texts targeting Belgian users.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New Android RAT Klopatra Targets Financial Data πŸ“”

New Android RAT Klopatra is targeting financial institutions using advanced evasion techniques.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Microsoft Expands Sentinel Into Agentic Security Platform With Unified Data Lake πŸ–‹οΈ

Microsoft on Tuesday unveiled the expansion of its Sentinel Security Incidents and Event Management solution SIEM as a unified agentic platform with the general availability of the Sentinel data lake. In addition, the tech giant said it's also releasing a public preview of Sentinel Graph and Sentinel Model Context Protocol MCP server. "With graphbased context, semantic access, and agentic.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Microsoft Expands Sentinel Into Agentic Security Platform With Unified Data Lake πŸ–‹οΈ

Microsoft on Tuesday unveiled the expansion of its Sentinel Security Incidents and Event Management solution SIEM as a unified agentic platform with the general availability of the Sentinel data lake. In addition, the tech giant said it's also releasing a public preview of Sentinel Graph and Sentinel Model Context Protocol MCP server. "With graphbased context, semantic access, and agentic.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US Cuts Federal Funding for MS-ISAC Cybersecurity Program πŸ“”

The Trump administration wants CISA to transition to a new model for supporting local government agencies cyber strategy.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New Android RAT Klopatra Targets Financial Data πŸ“”

New Android RAT Klopatra is targeting financial institutions using advanced evasion techniques.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Phantom Taurus: New China-Linked Hacker Group Hits Governments With Stealth Malware πŸ–‹οΈ

Government and telecommunications organizations across Africa, the Middle East, and Asia have emerged as the target of a previously undocumented Chinaaligned nationstate actor dubbed Phantom Taurus over the past twoandahalf years. "Phantom Taurus' main focus areas include ministries of foreign affairs, embassies, geopolitical events, and military operations," Palo Alto Networks Unit 42.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Smishing Campaigns Exploit Cellular Routers to Target Belgium πŸ“”

New smishing attacks exploit Milesight routers to send phishing texts targeting Belgian users.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ€”1
πŸ“” Smishing Campaigns Exploit Cellular Routers to Target Belgium πŸ“”

New smishing attacks exploit Milesight routers to send phishing texts targeting Belgian users.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity