πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” Number of Cybersecurity Pros Surges 194% in Four Years πŸ“”

Cybersecurity is now the fifth fastestgrowing occupation in the UK, says Socura.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ The open source ecosystem is booming thanks to AI, but hackers are taking advantage πŸ“’

Analysis by Sonatype found that AI is giving attackers new opportunities to target victims.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 ShinyHunters Claims 14M Panera Bread Records Exposed in Data Breach 🦿

The dataset allegedly includes names, email addresses, postal addresses, phone numbers, and accountrelated details. The post ShinyHunters Claims 14M Panera Bread Records Exposed in Data Breach appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ 3 Decisions CISOs Need to Make to Prevent Downtime Risk in 2026 πŸ–‹οΈ

Beyond the direct impact of cyberattacks, enterprises suffer from a secondary but potentially even more costly risk operational downtime, any amount of which translates into very real damage. Thats why for CISOs, its key to prioritize decisions that reduce dwell time and protect their company from risk.  Three strategic steps you can take this year for better results 1. Focus on today's.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps πŸ–‹οΈ

A study by OMICRON has revealed widespread cybersecurity gaps in the operational technology OT networks of substations, power plants, and control centers worldwide. Drawing on data from more than 100 installations, the analysis highlights recurring technical, organizational, and functional issues that leave critical energy infrastructure vulnerable to cyber threats. The findings are based on.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US Data Breaches Hit Record High but Victim Numbers Decline πŸ“”

Nonprofit ITRC says the number of data breaches increased 5 annually to reach a record total in 2025.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” FBI Takes Down RAMP Ransomware Forum πŸ“”

The dark web forum administrator confirmed the takedown and said they had no plans to rebuild.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Ransomware Victim Numbers Rise, Despite Drop in Active Extortion Groups πŸ“”

Ransomware victims surged in Q4 2025 despite fewer active extortion groups, with data leaks rising 50, ReliaQuest researchers report.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ ThreatsDay Bulletin: New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories πŸ–‹οΈ

This weeks updates show how small changes can create real problems. Not loud incidents, but quiet shifts that are easy to miss until they add up. The kind that affects systems people rely on every day. Many of the stories point to the same trend familiar tools being used in unexpected ways. Security controls are being worked on. Trusted platforms turning into weak spots. What looks routine on.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
🦿 Microsoft Previews Windows 11 Update With Smarter AI and Phone Continuity 🦿

Heres a peek at AI assistance, phonetoPC handoff, accessibility improvements, security fixes, and stability updates. The post Microsoft Previews Windows 11 Update With Smarter AI and Phone Continuity appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘Ž1
πŸ–‹οΈ Ex-Google Engineer Convicted for Stealing 2,000 AI Trade Secrets for China Startup πŸ–‹οΈ

A former Google engineer accused of stealing thousands of the company's confidential documents to build a startup in China has been convicted in the U.S., the Department of Justice DoJ announced Thursday. Linwei Ding aka Leon Ding, 38, was convicted by a federal jury on seven counts of economic espionage and seven counts of theft of trade secrets for taking over 2,000 documents containing.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score πŸ–‹οΈ

SmarterTools has addressed two more security flaws in SmarterMail email software, including one critical security flaw that could result in arbitrary code execution. The vulnerability, tracked as CVE202624423, carries a CVSS score of 9.3 out of 10.0. "SmarterTools SmarterMail versions prior to build 9511 contain an unauthenticated remote code execution vulnerability in the ConnectToHub API.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Two Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released πŸ–‹οΈ

Ivanti has rolled out security updates to address two security flaws impacting Ivanti Endpoint Manager Mobile EPMM that have been exploited in zeroday attacks, one of which has been added by the U.S. Cybersecurity and Infrastructure Security Agency CISA to its Known Exploited Vulnerabilities KEV catalog. The criticalseverity vulnerabilities are listed below CVE20261281 CVSS score.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 Countries πŸ–‹οΈ

A new joint investigation by SentinelOne SentinelLABS, and Censys has revealed that the opensource artificial intelligence AI deployment has created a vast "unmanaged, publicly accessible layer of AI compute infrastructure" that spans 175,000 unique Ollama hosts across 130 countries. These systems, which span both cloud and residential networks across the world, operate outside the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Google Disrupts Extensive Residential Proxy Networks πŸ“”

Google has taken coordinated action against the massive IPIDEA residential proxy network, enhancing customer protections and disrupting cybercrime operations.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Operation Winter SHIELD: FBI Issues Call to Arms for Organizations to Improve Cybersecurity πŸ“”

The FBI outlines ten actions which organizations can take to defend networks against cybercriminal and nationstate threats.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” France Fines National Employment Agency €5m Over 2024 Data Breach πŸ“”

The French data protection regulator said that France Travails response to a 2024 data breach violated GDPR.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New CISA Guidance Targets Insider Threat Risks πŸ“”

CISA urges action against insider threats with publication of a new infographic offering strategies to manage risks.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… ShadowHS: A Fileless Linux Post‑Exploitation Framework Built on a Weaponized hackshell πŸ¦…

Executive Summary Cyble Research Intelligence Labs CRIL has identified a Linux intrusion chain leveraging a highly obfuscated, fileless loader that deploys a weaponized variant of hackshell entirely from memory. Cyble tracks this activity under the name ShadowHS, reflecting its fileless execution model and lineage from the original hackshell utility. Unlike conventional Linux malware that emphasizes automated propagation or immediate monetization, this activity prioritizes stealth, operator safety, and longterm interactive control over compromised systems. The loader decrypts and executes its payload exclusively in memory, leaving no persistent binary artifacts on disk. Once active, the payload exposes an interactive postexploitation environment that aggressively fingerprints h...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
❀2
🦿 Comcast to Pay $117M in Security Breach Settlement 🦿

The breach was linked to a vulnerability known as CitrixBleed, a flaw affecting Citrix NetScaler Application Delivery Controller and Gateway appliances. The post Comcast to Pay 117M in Security Breach Settlement appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ The FBI has seized the RAMP hacking forum, but will the takedown stick? History tells us otherwise πŸ“’

Billing itself as the only place ransomware allowed", RAMP catered mainly for Russianspeaking cyber criminals.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity