πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” Shortcut-based Credential Lures Deliver DLL Implants πŸ“”

A new campaign has been observed using malicious Windows shortcuts in credentialthemed ZIP files to deploy PowerShell script.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Shortcut-based Credential Lures Deliver DLL Implants πŸ“”

A new campaign has been observed using malicious Windows shortcuts in credentialthemed ZIP files to deploy PowerShell script.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” AI Tops Cybersecurity Investment Priorities, PwC Finds πŸ“”

PwC found that AI security has become a top investment priority in cyber budgets over the next 12 months, ahead of cloud and network security.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” AI Tops Cybersecurity Investment Priorities, PwC Finds πŸ“”

PwC found that AI security has become a top investment priority in cyber budgets over the next 12 months, ahead of cloud and network security.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New China-Aligned Hackers Hit State and Telecom Sectors πŸ“”

Phantom Taurus is the latest formally identified cyberespionage group aligned with Chinese state interest.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New China-Aligned Hackers Hit State and Telecom Sectors πŸ“”

Phantom Taurus is the latest formally identified cyberespionage group aligned with Chinese state interest.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Campaign Warns Solicitors and House Buyers of Payment Diversion Fraud πŸ“”

The NCA warns that house buyers could face losses of over 80,000 from a type of BEC called payment diversion fraud.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Campaign Warns Solicitors and House Buyers of Payment Diversion Fraud πŸ“”

The NCA warns that house buyers could face losses of over 80,000 from a type of BEC called payment diversion fraud.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” ICO: Imgur’s UK Decision Won’t Prevent Regulatory Fine πŸ“”

Imagesharing platform Imgur has blocked its services within the UK, following a regulatory notice from the ICO.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” ICO: Imgur’s UK Decision Won’t Prevent Regulatory Fine πŸ“”

Imagesharing platform Imgur has blocked its services within the UK, following a regulatory notice from the ICO.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 Mid-Market Cybersecurity Budgets in 2026: Spend Smarter, Not Harder 🌊

Planning your 2026 cybersecurity budget isnt just a spreadsheet choreits survival. Midmarket companies are in a weird middle ground too tempting for attackers to ignore, but without Fortune 500 wallets The post MidMarket Cybersecurity Budgets in 2026 Spend Smarter, Not Harder appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 Mid-Market Cybersecurity Budgets in 2026: Spend Smarter, Not Harder 🌊

Planning your 2026 cybersecurity budget isnt just a spreadsheet choreits survival. Midmarket companies are in a weird middle ground too tempting for attackers to ignore, but without Fortune 500 wallets The post MidMarket Cybersecurity Budgets in 2026 Spend Smarter, Not Harder appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 CloudTrail Isn’t a Response Plan: Risk, Gaps, and the Real Value of Proactive Cloud Security 🌊

Managing cloud risk in 2025 is a highstakes balancing act. Many organizations turn to AWS CloudTrail as their first and sometimes only security control, seeing it as the cornerstone for The post CloudTrail Isnt a Response Plan Risk, Gaps, and the Real Value of Proactive Cloud Security appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 CloudTrail Isn’t a Response Plan: Risk, Gaps, and the Real Value of Proactive Cloud Security 🌊

Managing cloud risk in 2025 is a highstakes balancing act. Many organizations turn to AWS CloudTrail as their first and sometimes only security control, seeing it as the cornerstone for The post CloudTrail Isnt a Response Plan Risk, Gaps, and the Real Value of Proactive Cloud Security appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Broadcom Issues Patches for VMware NSX and vCenter Security Flaws πŸ“”

Broadcom has released security patches for critical flaws affecting several VMware products.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 UK Police Convicts Pair in £5.5 Billion Bitcoin Launder Case 🦿

Two defendants pleaded guilty in a Bitcoin laundering case tied to the UK's record crypto seizure. The Mets sevenyear probe moves to sentencing 1011 November. The post UK Police Convicts Pair in 5.5 Billion Bitcoin Launder Case appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Google Adds AI-Powered Ransomware Protection and Recovery to Drive for Desktop 🦿

This new ransomware detection is available in beta in Google Drive for desktop on Windows or macOS, with a general release expected by the end of the year. The post Google Adds AIPowered Ransomware Protection and Recovery to Drive for Desktop appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer πŸ–‹οΈ

In yet another piece of research, academics from Georgia Institute of Technology and Purdue University have demonstrated that the security guarantees offered by Intel's Software Guard eXtensions SGX can be bypassed on DDR4 systems to passively decrypt sensitive data. SGX is designed as a hardware feature in Intel server processors that allows applications to be run in a Trusted Execution.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 What Does the Government Shutdown Mean for Cybersecurity? 🦿

CISA is among the government agencies affected. The shutdown is a reminder for government contractors to harden their cybersecurity. The post What Does the Government Shutdown Mean for Cybersecurity? appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CometJacking: One Click Can Turn Perplexity’s Comet AI Browser Into a Data Thief πŸ–‹οΈ

Cybersecurity researchers have disclosed details of a new attack called CometJacking targeting Perplexity's agentic AI browser Comet by embedding malicious prompts within a seemingly innocuous link to siphon sensitive data, including from connected services, like email and calendar. The sneaky prompt injection attack plays out in the form of a malicious link that, when clicked, triggers the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Scanning Activity on Palo Alto Networks Portals Jump 500% in One Day πŸ–‹οΈ

Threat intelligence firm GreyNoise disclosed on Friday that it has observed a spike in scanning activity targeting Palo Alto Networks login portals. The company said it observed a nearly 500 increase in IP addresses scanning Palo Alto Networks login portals on October 3, 2025, the highest level recorded in the last three months. It described the traffic as targeted and structured, and aimed.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity