πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ Konni Hackers Deploy AI-Generated PowerShell Backdoor Against Blockchain Developers πŸ–‹οΈ

The North Korean threat actor known as Konni has been observed using PowerShell malware generated using artificial intelligence AI tools to target developers and engineering teams in the blockchain sector. The phishing campaign has targeted Japan, Australia, and India, highlighting the adversary's expansion of the targeting scope beyond South Korea, Russia, Ukraine, and European nations, Check.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” CISA Releases List of Post-Quantum Cryptography Product Categories πŸ“”

CISA released initial list of PQCcapable hardware and software to guide companies amid quantum threats.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Researchers Uncover β€œHaxor” SEO Poisoning Marketplace πŸ“”

Fortra researchers have discovered a new SEO poisoning operation known as HaxorSEO.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Law Firm Investigates Coupang Security Failures Ahead of Class Action Deadline πŸ“”

The US law firm Hagens Berman will lead a class action lawsuit against Coupang over security failures that led to a June 2025 data breach.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“” Okta Flags Customized, Reactive Vishing Attacks Which Bypass MFA πŸ“”

Threat actors posing as IT support teams use phishing kits to generate fake login sites in realtime to trick victims into handing over credentials.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Wiper Attack on Polish Power Grid Linked to Russia’s Sandworm πŸ“”

A destructive cyber attack targeting Polands energy sector has been linked to Russian APT group Sandworm.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 Python Developer 🌊

The post Python Developer appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Indian Users Targeted in Tax Phishing Campaign Delivering Blackmoon Malware πŸ–‹οΈ

Cybersecurity researchers have discovered an ongoing campaign that's targeting Indian users with a multistage backdoor as part of a suspected cyber espionage campaign. The activity, per the eSentire Threat Response Unit TRU, involves using phishing emails impersonating the Income Tax Department of India to trick victims into downloading a malicious archive, ultimately granting the threat.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 B2b Growth Marketing Manager (Online media, external placements, integrated campaigns) 🌊

The post B2b Growth Marketing Manager Online media, external placements, integrated campaigns appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” eScan Antivirus Supply Chain Breach Delivers Signed Malware πŸ“”

Supply chain breach in eScan antivirus distributes multistage malware via legitimate updates.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
❀2
πŸ“’ Hackers are using LLMs to generate malicious JavaScript in real time – and they’re going after web browsers πŸ“’

Defenders advised to use runtime behavioral analysis to detect and block malicious activity at the point of execution, directly within the browser.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 $95M Payout: Apple Begins Compensating Users in Siri Eavesdropping Case 🦿

Apple has started issuing Siri privacy settlement payouts, with claimants seeing deposits as low as 8 per device from a 95 million fund. The post 95M Payout Apple Begins Compensating Users in Siri Eavesdropping Case appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 WhatsApp Adds One-Tap Security Settings for Added Privacy 🦿

WhatsApp rolled out Strict Account Settings, a lockdownstyle mode that blocks unknown attachments, disables link previews, and silences unknown callers. The post WhatsApp Adds OneTap Security Settings for Added Privacy appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Build Practical Cyber Defense Skills with This 5-Course Bundle 🦿

Train in AI threat detection, OSINT tools, and Zero Trust security models with lifetime access for just 19.99. The post Build Practical Cyber Defense Skills with This 5Course Bundle appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘Ž1
🦿 Trump’s Acting Cyber Chief Allegedly Leaked Data to ChatGPT 🦿

Sources say event triggered internal cybersecurity alerts and a DHSlevel review into whether federal information had been improperly exposed. The post Trumps Acting Cyber Chief Allegedly Leaked Data to ChatGPT appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Android Phones Get AI-Powered Anti-Theft Features 🦿

Enhanced lockouts and stronger remote locking aim to make stolen devices far harderand less profitablefor criminals. The post Android Phones Get AIPowered AntiTheft Features appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Google Disrupts IPIDEA β€” One of the World’s Largest Residential Proxy Networks πŸ–‹οΈ

Google on Wednesday announced that it worked together with other partners to disrupt IPIDEA, which it described as one of the largest residential proxy networks in the world. To that end, the company said it took legal action to take down dozens of domains used to control devices and proxy traffic through them. As of writing, IPIDEA's website "www.ipidea.io" is no longer accessible. It.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware πŸ–‹οΈ

Cybersecurity researchers have flagged a new malicious Microsoft Visual Studio Code VS Code extension for Moltbot formerly Clawdbot on the official Extension Marketplace that claims to be a free artificial intelligence AI coding assistant, but stealthily drops a malicious payload on compromised hosts. The extension, named "ClawdBot Agent AI Coding Assistant" "clawdbot.clawdbotagent".

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid πŸ–‹οΈ

The "coordinated" cyber attack targeting multiple sites across the Polish power grid has been attributed with medium confidence to a Russian statesponsored hacking crew known as ELECTRUM. Operational technology OT cybersecurity company Dragos, in a new intelligence brief published Tuesday, described the late December 2025 activity as the first major cyber attack targeting distributed energy.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution πŸ–‹οΈ

Cybersecurity researchers have disclosed two new security flaws in the n8n workflow automation platform, including a crucial vulnerability that could result in remote code execution. The weaknesses, discovered by the JFrog Security Research team, are listed below CVE20261470 CVSS score 9.9 An eval injection vulnerability that could allow an authenticated user to bypass the Expression.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ From Triage to Threat Hunts: How AI Accelerates SecOps πŸ–‹οΈ

If you work in security operations, the concept of the AI SOC agent is likely familiar. Early narratives promised total autonomy. Vendors seized on the idea of the "Autonomous SOC" and suggested a future where algorithms replaced analysts. That future has not arrived. We have not seen mass layoffs or empty security operations centers. We have instead seen the emergence of a practical reality.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity