πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” Experts Welcome Global Cybersecurity Vulnerability Enumeration Launch πŸ“”

A new service, the Global Cybersecurity Vulnerability Enumeration GCVE, offers an alternative to the USled CVE.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Report Fraud Promises to Streamline Fight Against Economic Crime πŸ“”

City of London Police has launched the UKs national Report Fraud service.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Risk of AI Model Collapse to Drive Zero Trust Data Governance, Gartner Says πŸ“”

Gartner predicts 50 of organizations will adopt zero trust data governance by 2028.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Chainlit Security Flaws Highlight Infrastructure Risks in AI Apps πŸ“”

2 security vulnerabilities in the Chainlit framework expose risks from web flaws in AI applications.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ North Korean PurpleBravo Campaign Targeted 3,136 IP Addresses via Fake Job Interviews πŸ–‹οΈ

As many as 3,136 individual IP addresses linked to likely targets of the Contagious Interview activity have been identified, with the campaign claiming 20 potential victim organizations spanning artificial intelligence AI, cryptocurrency, financial services, IT services, marketing, and software development sectors in Europe, South Asia, the Middle East, and Central America. The new findings.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Cisco Fixes Actively Exploited Zero-Day CVE-2026-20045 in Unified CM and Webex πŸ–‹οΈ

Cisco has released fresh patches to address what it described as a "critical" security vulnerability impacting multiple Unified Communications CM products and Webex Calling Dedicated Instance that it has been actively exploited as a zeroday in the wild. The vulnerability, CVE202620045 CVSS score 8.2, could permit an unauthenticated remote attacker to execute arbitrary commands on the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Automated FortiGate Attacks Exploit FortiCloud SSO to Alter Firewall Configurations πŸ–‹οΈ

Cybersecurity company Arctic Wolf has warned of a "new cluster of automated malicious activity" that involves unauthorized firewall configuration changes on Fortinet FortiGate devices. The activity, it said, commenced on January 15, 2026, adding it shares similarities with a December 2025 campaign in which malicious SSO logins on FortiGate appliances were recorded against the admin account from.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware πŸ–‹οΈ

A new multistage phishing campaign has been observed targeting users in Russia with ransomware and a remote access trojan called Amnesia RAT. "The attack begins with social engineering lures delivered via businessthemed documents crafted to appear routine and benign," Fortinet FortiGuard Labs researcher Cara Lin said in a technical breakdown published this week. "These documents and.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ–‹οΈ New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector πŸ–‹οΈ

The Russian nationstate hacking group known as Sandworm has been attributed to what has been described as the "largest cyber attack" targeting Poland's power system in the last week of December 2025. The attack was unsuccessful, the country's energy minister, Milosz Motyka, said last week. "The command of the cyberspace forces has diagnosed in the last days of the year the strongest attack on.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Who Approved This Agent? Rethinking Access, Accountability, and Risk in the Age of AI Agents πŸ–‹οΈ

AI agents are accelerating how work gets done. They schedule meetings, access data, trigger workflows, write code, and take action in real time, pushing productivity beyond human speed across the enterprise. Then comes the moment every security team eventually hits Wait who approved this? Unlike users or applications, AI agents are often deployed quickly, shared broadly,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog πŸ–‹οΈ

The U.S. Cybersecurity and Infrastructure Security Agency CISA on Friday added a critical security flaw affecting Broadcom VMware vCenter Server that was patched in June 2024 to its Known Exploited Vulnerabilities KEV catalog, citing evidence of active exploitation in the wild. The vulnerability in question is CVE202437079 CVSS score 9.8, which refers to a heap overflow in the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ How can businesses make their cybersecurity training stick? πŸ“’

Who in the modern business needs cybersecurity training and what key factors should firms keep in mind?.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“’ Thousands of Microsoft Teams users are being targeted in a new phishing campaign πŸ“’

Microsoft Teams users should be on the alert, according to researchers at Check Point.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Microsoft Shared BitLocker Keys With FBI, Raising Privacy Fears 🦿

Microsoft confirmed it can hand over BitLocker recovery keys stored in the cloud under warrant, reviving debate over who controls encrypted data. The post Microsoft Shared BitLocker Keys With FBI, Raising Privacy Fears appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Gmail Spam Filter Breakdown Affects 1.8B Users 🦿

The disruption began Saturday 5am Pacific time, Jan .24 affecting approximately 1.8 billion Gmail users worldwide with widespread email misclassification. The post Gmail Spam Filter Breakdown Affects 1.8B Users appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Malicious VS Code AI Extensions with 1.5 Million Installs Steal Developer Source Code πŸ–‹οΈ

Cybersecurity researchers have discovered two malicious Microsoft Visual Studio Code VS Code extensions that are advertised as artificial intelligence AIpowered coding assistants, but also harbor covert functionality to siphon developer data to Chinabased servers. The extensions, which have 1.5 million combined installs and are still available for download from the official Visual Studio.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ ⚑ Weekly Recap: Firewall Flaws, AI-Built Malware, Browser Traps, Critical CVEs & More πŸ–‹οΈ

Security failures rarely arrive loudly. They slip in through trusted tools, halffixed problems, and habits people stop questioning. This weeks recap shows that pattern clearly. Attackers are moving faster than defenses, mixing old tricks with new paths. Patched no longer means safe, and every day, software keeps becoming the entry point. What follows is a set of small but telling signals.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Winning Against AI-Based Attacks Requires a Combined Defensive Approach πŸ–‹οΈ

If theres a constant in cybersecurity, its that adversaries are always innovating. The rise of offensive AI is transforming attack strategies and making them harder to detect. Googles Threat Intelligence Group, recently reported on adversaries using Large Language Models LLMs to both conceal code and generate malicious scripts on the fly, letting malware shapeshift in realtime to evade.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Konni Hackers Deploy AI-Generated PowerShell Backdoor Against Blockchain Developers πŸ–‹οΈ

The North Korean threat actor known as Konni has been observed using PowerShell malware generated using artificial intelligence AI tools to target developers and engineering teams in the blockchain sector. The phishing campaign has targeted Japan, Australia, and India, highlighting the adversary's expansion of the targeting scope beyond South Korea, Russia, Ukraine, and European nations, Check.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” CISA Releases List of Post-Quantum Cryptography Product Categories πŸ“”

CISA released initial list of PQCcapable hardware and software to guide companies amid quantum threats.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Researchers Uncover β€œHaxor” SEO Poisoning Marketplace πŸ“”

Fortra researchers have discovered a new SEO poisoning operation known as HaxorSEO.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity