πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ New Android Trojan β€œDatzbro” Tricking Elderly with AI-Generated Facebook Travel Events πŸ–‹οΈ

Cybersecurity researchers have flagged a previously undocumented Android banking trojan called Datzbro that can conduct device takeover DTO attacks and perform fraudulent transactions by preying on the elderly. Dutch mobile security company ThreatFabric said it discovered the campaign in August 2025 after users in Australia reported scammers managing Facebook groups promoting "active senior.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Evolving Enterprise Defense to Secure the Modern AI Supply Chain πŸ–‹οΈ

The world of enterprise technology is undergoing a dramatic shift. GenAI adoption is accelerating at an unprecedented pace, and SaaS vendors are embedding powerful LLMs directly into their platforms. Organizations are embracing AIpowered applications across every function, from marketing and development to finance and HR. This transformation unlocks innovation and efficiency, but it also.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ U.K. Police Just Seized Β£5.5 Billion in Bitcoin β€” The World’s Largest Crypto Bust πŸ–‹οΈ

A Chinese national has been convicted for her role in a fraudulent cryptocurrency scheme after law enforcement authorities in the U.K. confiscated 5.5 billion about 7.39 billion during a raid of her home in London. The cryptocurrency seizure, amounting to 61,000 Bitcoin, is believed to be the single largest such effort in the world, the Metropolitan Police said. Zhimin Qian aka Yadi Zhang,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CISA Sounds Alarm on Critical Sudo Flaw Actively Exploited in Linux and Unix Systems πŸ–‹οΈ

The U.S. Cybersecurity and Infrastructure Security Agency CISA on Monday added a critical security flaw impacting the Sudo commandline utility for Linux and Unixlike operating systems to its Known Exploited Vulnerabilities KEV catalog, citing evidence of active exploitation in the wild. The vulnerability in question is CVE202532463 CVSS score 9.3, which affects Sudo versions prior to.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘3
πŸ“’ Cybersecurity leaders must stop seeing resilience as a "tick box exercise" to achieve meaningful protection, says Gartner expert πŸ“’

Collaboration between departments and a better understanding of organizational metrics are key to addressing security blindspots.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ A new 'top-tier' Chinese espionage group is stealing sensitive data πŸ“’

Phantom Taurus has been operating for two years and uses custombuilt malware to maintain longterm access to critical targets.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and Impersonate Apps πŸ–‹οΈ

A highseverity security flaw has been disclosed in the One Identity OneLogin Identity and Access Management IAM solution that, if successfully exploited, could expose sensitive OpenID Connect OIDC application client secrets under certain circumstances. The vulnerability, tracked as CVE202559363, has been assigned a CVSS score of 7.7 out of 10.0. It has been described as a case of.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and Impersonate Apps πŸ–‹οΈ

A highseverity security flaw has been disclosed in the One Identity OneLogin Identity and Access Management IAM solution that, if successfully exploited, could expose sensitive OpenID Connect OIDC application client secrets under certain circumstances. The vulnerability, tracked as CVE202559363, has been assigned a CVSS score of 7.7 out of 10.0. It has been described as a case of.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Learn How Leading Security Teams Blend AI + Human Workflows (Free Webinar) πŸ–‹οΈ

AI is changing automationbut not always for the better. Thats why were hosting a new webinar, "Workflow Clarity Where AI Fits in Modern Automation," with Thomas Kinsella, Cofounder Chief Customer Officer at Tines, to explore how leading teams are cutting through the hype and building workflows that actually deliver.The rise of AI has changed how organizations think about automation.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Learn How Leading Security Teams Blend AI + Human Workflows (Free Webinar) πŸ–‹οΈ

AI is changing automationbut not always for the better. Thats why were hosting a new webinar, "Workflow Clarity Where AI Fits in Modern Automation," with Thomas Kinsella, Cofounder Chief Customer Officer at Tines, to explore how leading teams are cutting through the hype and building workflows that actually deliver.The rise of AI has changed how organizations think about automation.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Red Hat OpenShift AI Flaw Exposes Hybrid Cloud Infrastructure to Full Takeover πŸ–‹οΈ

A severe security flaw has been disclosed in the Red Hat OpenShift AI service that could allow attackers to escalate privileges and take control of the complete infrastructure under certain conditions. OpenShift AI is a platform for managing the lifecycle of predictive and generative artificial intelligence GenAI models at scale and across hybrid cloud environments. It also facilitates data.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Red Hat OpenShift AI Flaw Exposes Hybrid Cloud Infrastructure to Full Takeover πŸ–‹οΈ

A severe security flaw has been disclosed in the Red Hat OpenShift AI service that could allow attackers to escalate privileges and take control of the complete infrastructure under certain conditions. OpenShift AI is a platform for managing the lifecycle of predictive and generative artificial intelligence GenAI models at scale and across hybrid cloud environments. It also facilitates data.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ 2025 Cybersecurity Reality Check: Breaches Hidden, Attack Surfaces Growing, and AI Misperceptions Rising πŸ–‹οΈ

Bitdefenders 2025 Cybersecurity Assessment Report paints a sobering picture of todays cyber defense landscape mounting pressure to remain silent after breaches, a gap between leadership and frontline teams, and a growing urgency to shrink the enterprise attack surface. The annual research combines insights from over 1,200 IT and security professionals across six countries, along with an.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ 2025 Cybersecurity Reality Check: Breaches Hidden, Attack Surfaces Growing, and AI Misperceptions Rising πŸ–‹οΈ

Bitdefenders 2025 Cybersecurity Assessment Report paints a sobering picture of todays cyber defense landscape mounting pressure to remain silent after breaches, a gap between leadership and frontline teams, and a growing urgency to shrink the enterprise attack surface. The annual research combines insights from over 1,200 IT and security professionals across six countries, along with an.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Hackers Exploit Milesight Routers to Send Phishing SMS to European Users πŸ–‹οΈ

Unknown threat actors are abusing Milesight industrial cellular routers to send SMS messages as part of a smishing campaign targeting users in European countries since at least February 2022. French cybersecurity company SEKOIA said the attackers are exploiting the cellular router's API to send malicious SMS messages containing phishing URLs, with the campaigns primarily targeting Sweden, Italy,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Hackers Exploit Milesight Routers to Send Phishing SMS to European Users πŸ–‹οΈ

Unknown threat actors are abusing Milesight industrial cellular routers to send SMS messages as part of a smishing campaign targeting users in European countries since at least February 2022. French cybersecurity company SEKOIA said the attackers are exploiting the cellular router's API to send malicious SMS messages containing phishing URLs, with the campaigns primarily targeting Sweden, Italy,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Android Banking Trojan β€œKlopatra” Uses Hidden VNC to Control Infected Smartphones πŸ–‹οΈ

A previously undocumented Android banking trojan called Klopatra has compromised over 3,000 devices, with a majority of the infections reported in Spain and Italy. Italian fraud prevention firm Cleafy, which discovered the sophisticated malware and remote access trojan RAT in late August 2025, said it leverages Hidden Virtual Network Computing VNC for remote control of infected devices and.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Android Banking Trojan β€œKlopatra” Uses Hidden VNC to Control Infected Smartphones πŸ–‹οΈ

A previously undocumented Android banking trojan called Klopatra has compromised over 3,000 devices, with a majority of the infections reported in Spain and Italy. Italian fraud prevention firm Cleafy, which discovered the sophisticated malware and remote access trojan RAT in late August 2025, said it leverages Hidden Virtual Network Computing VNC for remote control of infected devices and.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Ukraine Warns of CABINETRAT Backdoor + XLL Add-ins Spread via Signal ZIPs πŸ–‹οΈ

The Computer Emergency Response Team of Ukraine CERTUA has warned of new targeted cyber attacks in the country using a backdoor called CABINETRAT. The activity, observed in September 2025, has been attributed to a threat cluster it tracks as UAC0245. The agency said it spotted the attack following the discovery of software tools taking the form of XLL files, which refer to Microsoft Excel.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Ukraine Warns of CABINETRAT Backdoor + XLL Add-ins Spread via Signal ZIPs πŸ–‹οΈ

The Computer Emergency Response Team of Ukraine CERTUA has warned of new targeted cyber attacks in the country using a backdoor called CABINETRAT. The activity, observed in September 2025, has been attributed to a threat cluster it tracks as UAC0245. The agency said it spotted the attack following the discovery of software tools taking the form of XLL files, which refer to Microsoft Excel.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Shortcut-based Credential Lures Deliver DLL Implants πŸ“”

A new campaign has been observed using malicious Windows shortcuts in credentialthemed ZIP files to deploy PowerShell script.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity