πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score πŸ–‹οΈ

SmarterTools has addressed two more security flaws in SmarterMail email software, including one critical security flaw that could result in arbitrary code execution. The vulnerability, tracked as CVE202624423, carries a CVSS score of 9.3 out of 10.0. "SmarterTools SmarterMail versions prior to build 9511 contain an unauthenticated remote code execution vulnerability in the ConnectToHub API.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Two Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released πŸ–‹οΈ

Ivanti has rolled out security updates to address two security flaws impacting Ivanti Endpoint Manager Mobile EPMM that have been exploited in zeroday attacks, one of which has been added by the U.S. Cybersecurity and Infrastructure Security Agency CISA to its Known Exploited Vulnerabilities KEV catalog. The criticalseverity vulnerabilities are listed below CVE20261281 CVSS score.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 Countries πŸ–‹οΈ

A new joint investigation by SentinelOne SentinelLABS, and Censys has revealed that the opensource artificial intelligence AI deployment has created a vast "unmanaged, publicly accessible layer of AI compute infrastructure" that spans 175,000 unique Ollama hosts across 130 countries. These systems, which span both cloud and residential networks across the world, operate outside the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Google Disrupts Extensive Residential Proxy Networks πŸ“”

Google has taken coordinated action against the massive IPIDEA residential proxy network, enhancing customer protections and disrupting cybercrime operations.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Operation Winter SHIELD: FBI Issues Call to Arms for Organizations to Improve Cybersecurity πŸ“”

The FBI outlines ten actions which organizations can take to defend networks against cybercriminal and nationstate threats.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” France Fines National Employment Agency €5m Over 2024 Data Breach πŸ“”

The French data protection regulator said that France Travails response to a 2024 data breach violated GDPR.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New CISA Guidance Targets Insider Threat Risks πŸ“”

CISA urges action against insider threats with publication of a new infographic offering strategies to manage risks.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… ShadowHS: A Fileless Linux Post‑Exploitation Framework Built on a Weaponized hackshell πŸ¦…

Executive Summary Cyble Research Intelligence Labs CRIL has identified a Linux intrusion chain leveraging a highly obfuscated, fileless loader that deploys a weaponized variant of hackshell entirely from memory. Cyble tracks this activity under the name ShadowHS, reflecting its fileless execution model and lineage from the original hackshell utility. Unlike conventional Linux malware that emphasizes automated propagation or immediate monetization, this activity prioritizes stealth, operator safety, and longterm interactive control over compromised systems. The loader decrypts and executes its payload exclusively in memory, leaving no persistent binary artifacts on disk. Once active, the payload exposes an interactive postexploitation environment that aggressively fingerprints h...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
❀2
🦿 Comcast to Pay $117M in Security Breach Settlement 🦿

The breach was linked to a vulnerability known as CitrixBleed, a flaw affecting Citrix NetScaler Application Delivery Controller and Gateway appliances. The post Comcast to Pay 117M in Security Breach Settlement appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ The FBI has seized the RAMP hacking forum, but will the takedown stick? History tells us otherwise πŸ“’

Billing itself as the only place ransomware allowed", RAMP catered mainly for Russianspeaking cyber criminals.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” National Crime Agency and NatWest Issue Joint Warning Over Invoice Fraud Threat πŸ“”

Cyber fraudsters targeting corporate finance departments costs businesses millions a year.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Badges, Bytes and Blackmail πŸ–‹οΈ

Behind the scenes of law enforcement in cyber what do we know about caught cybercriminals? What brought them in, where do they come from and what was their function in the crimescape? Introduction One view on the scattered fight against cybercrime The growing sophistication and diversification of cybercrime have compelled law enforcement agencies worldwide to respond through increasingly.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New AI-Developed Malware Campaign Targets Iranian Protests πŸ“”

The RedKitten campaign distributes lures designed to target people seeking information about missing persons or political dissidents in Iran.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Former Google engineer convicted of economic espionage after stealing thousands of secret AI, supercomputing documents πŸ“’

Linwei Ding told Chinese investors he could build a worldclass supercomputer.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware πŸ–‹οΈ

Cybersecurity researchers have discovered a new campaign attributed to a Chinalinked threat actor known as UAT8099 that took place between late 2025 and early 2026. The activity, discovered by Cisco Talos, has targeted vulnerable Internet Information Services IIS servers located across Asia, but with a specific focus on targets in Thailand and Vietnam. The scale of the campaign is currently.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access πŸ–‹οΈ

Cybersecurity researchers have discovered malicious Google Chrome extensions that come with capabilities to hijack affiliate links, steal data, and collect OpenAI ChatGPT authentication tokens. One of the extensions in question is Amazon Ads Blocker ID pnpchphmplpdimbllknjoiopmfphellj, which claims to be a tool to browse Amazon without any sponsored content. It was uploaded to the Chrome.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ CISA’s interim chief uploaded sensitive documents to a public version of ChatGPT – security experts explain why you should never do that πŸ“’

The incident at CISA raises yet more concerns about the rise of shadow AI and data protection risks.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“’ CISA’s interim chief uploaded sensitive documents to a public version of ChatGPT – security experts explain why you should never do that πŸ“’

The incident at CISA raises yet more concerns about the rise of shadow AI and data protection risks.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ CISA’s interim chief uploaded sensitive documents to a public version of ChatGPT – security experts explain why you should never do that πŸ“’

The incident at CISA raises yet more concerns about the rise of shadow AI and data protection risks.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” NSA Publishes New Zero Trust Implementation Guidelines πŸ“”

NSA released new guidelines to help organizations achieve targetlevel Zero Trust maturity.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Notepad++ Update Hijacking Linked to Hosting Provider Compromise πŸ“”

A supply chain attack on Notepad update process was linked to compromised hosting infrastructure.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity