πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ Webinar: How Smart MSSPs Using AI to Boost Margins with Half the Staff πŸ–‹οΈ

Every managed security provider is chasing the same problem in 2026 too many alerts, too few analysts, and clients demanding CISOlevel protection at SMB budgets. The truth? Most MSSPs are running harder, not smarter. And its breaking their margins. Thats where the quiet revolution is happening AI isnt just writing reports or surfacing risks its rebuilding how security services are.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Webinar: How Smart MSSPs Using AI to Boost Margins with Half the Staff πŸ–‹οΈ

Every managed security provider is chasing the same problem in 2026 too many alerts, too few analysts, and clients demanding CISOlevel protection at SMB budgets. The truth? Most MSSPs are running harder, not smarter. And its breaking their margins. Thats where the quiet revolution is happening AI isnt just writing reports or surfacing risks its rebuilding how security services are.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Exposure Assessment Platforms Signal a Shift in Focus πŸ–‹οΈ

Gartner doesnt create new categories lightly. Generally speaking, a new acronym only emerges when the industry's collective "todo list" has become mathematically impossible to complete. And so it seems that the introduction of the Exposure Assessment Platforms EAP category is a formal admission that traditional Vulnerability Management VM is no longer a viable way to secure a modern.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Exposure Assessment Platforms Signal a Shift in Focus πŸ–‹οΈ

Gartner doesnt create new categories lightly. Generally speaking, a new acronym only emerges when the industry's collective "todo list" has become mathematically impossible to complete. And so it seems that the introduction of the Exposure Assessment Platforms EAP category is a formal admission that traditional Vulnerability Management VM is no longer a viable way to secure a modern.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Chainlit AI Framework Flaws Enable Data Theft via File Read and SSRF Bugs πŸ–‹οΈ

Security vulnerabilities were uncovered in the popular opensource artificial intelligence AI framework Chainlit that could allow attackers to steal sensitive data, which may allow for lateral movement within a susceptible organization. Zafran Security said the highseverity flaws, collectively dubbed ChainLeak, could be abused to leak cloud environment API keys and steal sensitive files, or.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Chainlit AI Framework Flaws Enable Data Theft via File Read and SSRF Bugs πŸ–‹οΈ

Security vulnerabilities were uncovered in the popular opensource artificial intelligence AI framework Chainlit that could allow attackers to steal sensitive data, which may allow for lateral movement within a susceptible organization. Zafran Security said the highseverity flaws, collectively dubbed ChainLeak, could be abused to leak cloud environment API keys and steal sensitive files, or.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code πŸ–‹οΈ

The recently discovered sophisticated Linux malware framework known as VoidLink is assessed to have been developed by a single person with assistance from an artificial intelligence AI model. That's according to new findings from Check Point Research, which identified operational security blunders by malware's author that provided clues to its developmental origins. The latest insight makes.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code πŸ–‹οΈ

The recently discovered sophisticated Linux malware framework known as VoidLink is assessed to have been developed by a single person with assistance from an artificial intelligence AI model. That's according to new findings from Check Point Research, which identified operational security blunders by malware's author that provided clues to its developmental origins. The latest insight makes.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ LastPass Warns of Fake Maintenance Messages Targeting Users’ Master Passwords πŸ–‹οΈ

LastPass is alerting users to a new active phishing campaign that's impersonating the password management service, which aims to trick users into giving up their master passwords. The campaign, which began on or around January 19, 2026, involves sending phishing emails claiming upcoming maintenance and urging them to create a local backup of their password vaults in the next 24 hours. The.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ LastPass Warns of Fake Maintenance Messages Targeting Users’ Master Passwords πŸ–‹οΈ

LastPass is alerting users to a new active phishing campaign that's impersonating the password management service, which aims to trick users into giving up their master passwords. The campaign, which began on or around January 19, 2026, involves sending phishing emails claiming upcoming maintenance and urging them to create a local backup of their password vaults in the next 24 hours. The.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CERT/CC Warns binary-parser Bug Allows Node.js Privilege-Level Code Execution πŸ–‹οΈ

A security vulnerability has been disclosed in the popular binaryparser npm library that, if successfully exploited, could result in the execution of arbitrary JavaScript. The vulnerability, tracked as CVE20261245 CVSS score NA, affects all versions of the module prior to version 2.3.0, which addresses the issue. Patches for the flaw were released on November 26, 2025. Binaryparser is a.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CERT/CC Warns binary-parser Bug Allows Node.js Privilege-Level Code Execution πŸ–‹οΈ

A security vulnerability has been disclosed in the popular binaryparser npm library that, if successfully exploited, could result in the execution of arbitrary JavaScript. The vulnerability, tracked as CVE20261245 CVSS score NA, affects all versions of the module prior to version 2.3.0, which addresses the issue. Patches for the flaw were released on November 26, 2025. Binaryparser is a.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ North Korea-Linked Hackers Target Developers via Malicious VS Code Projects πŸ–‹οΈ

The North Korean threat actors associated with the longrunning Contagious Interview campaign have been observed using malicious Microsoft Visual Studio Code VS Code projects as lures to deliver a backdoor on compromised endpoints. The latest finding demonstrates continued evolution of the new tactic that was first discovered in December 2025, Jamf Threat Labs said. "This activity involved.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ North Korea-Linked Hackers Target Developers via Malicious VS Code Projects πŸ–‹οΈ

The North Korean threat actors associated with the longrunning Contagious Interview campaign have been observed using malicious Microsoft Visual Studio Code VS Code projects as lures to deliver a backdoor on compromised endpoints. The latest finding demonstrates continued evolution of the new tactic that was first discovered in December 2025, Jamf Threat Labs said. "This activity involved.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Phishing and Spoofed Sites Remain Primary Entry Points For Olympics πŸ“”

Cyber risks for the MilanoCortina 2026 Winter Games include phishing and spoofed websites as key threat vectors.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Phishing and Spoofed Sites Remain Primary Entry Points For Olympics πŸ“”

Cyber risks for the MilanoCortina 2026 Winter Games include phishing and spoofed websites as key threat vectors.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Peruvian Loan Scam Harvests Cards and PINs via Fake Applications πŸ“”

Loan phishing operation in Peru is stealing card info by impersonating financial institutions.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Peruvian Loan Scam Harvests Cards and PINs via Fake Applications πŸ“”

Loan phishing operation in Peru is stealing card info by impersonating financial institutions.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal πŸ“”

Sophisticated malware previously thought to be the work of a wellresourced cybercrime group was built by one person with the aid of AI tools.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal πŸ“”

Sophisticated malware previously thought to be the work of a wellresourced cybercrime group was built by one person with the aid of AI tools.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” EU Unveils Cybersecurity Overhaul with Proposed Update to Cybersecurity Act πŸ“”

The EUs Cybersecurity Act 2.0 will aim to address some of the challenges of the current CSA, including the slow rollout of certification schemes.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity