πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🦿 Comcast to Pay $117M in Security Breach Settlement 🦿

The breach was linked to a vulnerability known as CitrixBleed, a flaw affecting Citrix NetScaler Application Delivery Controller and Gateway appliances. The post Comcast to Pay 117M in Security Breach Settlement appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ The FBI has seized the RAMP hacking forum, but will the takedown stick? History tells us otherwise πŸ“’

Billing itself as the only place ransomware allowed", RAMP catered mainly for Russianspeaking cyber criminals.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” National Crime Agency and NatWest Issue Joint Warning Over Invoice Fraud Threat πŸ“”

Cyber fraudsters targeting corporate finance departments costs businesses millions a year.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Badges, Bytes and Blackmail πŸ–‹οΈ

Behind the scenes of law enforcement in cyber what do we know about caught cybercriminals? What brought them in, where do they come from and what was their function in the crimescape? Introduction One view on the scattered fight against cybercrime The growing sophistication and diversification of cybercrime have compelled law enforcement agencies worldwide to respond through increasingly.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New AI-Developed Malware Campaign Targets Iranian Protests πŸ“”

The RedKitten campaign distributes lures designed to target people seeking information about missing persons or political dissidents in Iran.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Former Google engineer convicted of economic espionage after stealing thousands of secret AI, supercomputing documents πŸ“’

Linwei Ding told Chinese investors he could build a worldclass supercomputer.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware πŸ–‹οΈ

Cybersecurity researchers have discovered a new campaign attributed to a Chinalinked threat actor known as UAT8099 that took place between late 2025 and early 2026. The activity, discovered by Cisco Talos, has targeted vulnerable Internet Information Services IIS servers located across Asia, but with a specific focus on targets in Thailand and Vietnam. The scale of the campaign is currently.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access πŸ–‹οΈ

Cybersecurity researchers have discovered malicious Google Chrome extensions that come with capabilities to hijack affiliate links, steal data, and collect OpenAI ChatGPT authentication tokens. One of the extensions in question is Amazon Ads Blocker ID pnpchphmplpdimbllknjoiopmfphellj, which claims to be a tool to browse Amazon without any sponsored content. It was uploaded to the Chrome.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ CISA’s interim chief uploaded sensitive documents to a public version of ChatGPT – security experts explain why you should never do that πŸ“’

The incident at CISA raises yet more concerns about the rise of shadow AI and data protection risks.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“’ CISA’s interim chief uploaded sensitive documents to a public version of ChatGPT – security experts explain why you should never do that πŸ“’

The incident at CISA raises yet more concerns about the rise of shadow AI and data protection risks.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ CISA’s interim chief uploaded sensitive documents to a public version of ChatGPT – security experts explain why you should never do that πŸ“’

The incident at CISA raises yet more concerns about the rise of shadow AI and data protection risks.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” NSA Publishes New Zero Trust Implementation Guidelines πŸ“”

NSA released new guidelines to help organizations achieve targetlevel Zero Trust maturity.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Notepad++ Update Hijacking Linked to Hosting Provider Compromise πŸ“”

A supply chain attack on Notepad update process was linked to compromised hosting infrastructure.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Notepad++ Hosting Breach Attributed to China-Linked Lotus Blossom Hacking Group πŸ–‹οΈ

A Chinalinked threat actor known as Lotus Blossom has been attributed with medium confidence to the recently discovered compromise of the infrastructure hosting Notepad. The attack enabled the statesponsored hacking group to deliver a previously undocumented backdoor codenamed Chrysalis to users of the opensource editor, according to new findings from Rapid7. The development comes shortly.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ–‹οΈ Notepad++ Hosting Breach Attributed to China-Linked Lotus Blossom Hacking Group πŸ–‹οΈ

A Chinalinked threat actor known as Lotus Blossom has been attributed with medium confidence to the recently discovered compromise of the infrastructure hosting Notepad. The attack enabled the statesponsored hacking group to deliver a previously undocumented backdoor codenamed Chrysalis to users of the opensource editor, according to new findings from Rapid7. The development comes shortly.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Hugging Face Repositories Abused in New Android Malware Campaign 🦿

Attackers exploited Hugging Faces trusted infrastructure to spread an Android RAT, using fake security apps and thousands of malware variants. The post Hugging Face Repositories Abused in New Android Malware Campaign appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Phantom firms: The rise of fraudulent cybersecurity vendors πŸ“’

Channel partners need systematic vendor vetting to combat rising phantom firm scams.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ What security teams need to know about the NSA's new zero trust guidelines πŸ“’

The new guidelines aim to move an organization from discovery to targetlevel implementation of zero trust practices.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Notepad++ hackers remained undetected and pushed malicious updates for six months – here’s who’s responsible, how they did it, and how to check if you’ve been affected πŸ“’

Hackers remained undetected for months and distributed malicious updates to Notepad users after breaching the text editor software here's how to check if you've been affected.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ When Cloud Outages Ripple Across the Internet πŸ–‹οΈ

Recent major cloud service outages have been hard to miss. Highprofile incidents affecting providers such as AWS, Azure, and Cloudflare have disrupted large parts of the internet, taking down websites and services that many other systems depend on. The resulting ripple effects have halted applications and workflows that many organizations rely on every day. For consumers, these outages are.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks πŸ–‹οΈ

The Russialinked statesponsored threat actor known as APT28 aka UAC0001 has been attributed to attacks exploiting a newly disclosed security flaw in Microsoft Office as part of a campaign codenamed Operation Neusploit. Zscaler ThreatLabz said it observed the hacking group weaponizing the shortcoming on January 29, 2026, in attacks targeting users in Ukraine, Slovakia, and Romania, three.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity