π’ What security teams need to know about the NSA's new zero trust guidelines π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
The new guidelines aim to move an organization from discovery to targetlevel implementation of zero trust practices.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
What security teams need to know about the NSA's new zero trust guidelines
The new guidelines aim to move an organization from discovery to target-level implementation of zero trust practices
π’ Notepad++ hackers remained undetected and pushed malicious updates for six months β hereβs whoβs responsible, how they did it, and how to check if youβve been affected π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Hackers remained undetected for months and distributed malicious updates to Notepad users after breaching the text editor software here's how to check if you've been affected.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Notepad++ hackers remained undetected and pushed malicious updates for six months β hereβs whoβs responsible, how they did it,β¦
Notepad++ users should ensure theyβre running the latest version of the open source software
ποΈ When Cloud Outages Ripple Across the Internet ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Recent major cloud service outages have been hard to miss. Highprofile incidents affecting providers such as AWS, Azure, and Cloudflare have disrupted large parts of the internet, taking down websites and services that many other systems depend on. The resulting ripple effects have halted applications and workflows that many organizations rely on every day. For consumers, these outages are.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The Russialinked statesponsored threat actor known as APT28 aka UAC0001 has been attributed to attacks exploiting a newly disclosed security flaw in Microsoft Office as part of a campaign codenamed Operation Neusploit. Zscaler ThreatLabz said it observed the hacking group weaponizing the shortcoming on January 29, 2026, in attacks targeting users in Ukraine, Slovakia, and Romania, three.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Mozilla Adds One-Click Option to Disable Generative AI Features in Firefox ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Mozilla on Monday announced a new controls section in its Firefox desktop browser settings that allows users to completely turn off generative artificial intelligence GenAI features. "It provides a single place to block current and future generative AI features in Firefox," Ajit Varma, head of Firefox, said. "You can also review and manage individual AI features if you choose to use them. This.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Notepad++ Hosting Breach Attributed to China-Linked Lotus Blossom Hacking Group ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
A Chinalinked threat actor known as Lotus Blossom has been attributed with medium confidence to the recently discovered compromise of the infrastructure hosting Notepad. The attack enabled the statesponsored hacking group to deliver a previously undocumented backdoor codenamed Chrysalis to users of the opensource editor, according to new findings from Rapid7. The development comes shortly.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
A security audit of 2,857 skills on ClawHub has found 341 malicious skills across multiple campaigns, according to new findings from Koi Security, exposing users to new supply chain risks. ClawHub is a marketplace designed to make it easy for OpenClaw users to find and install thirdparty skills. It's an extension to the OpenClaw project, a selfhosted artificial intelligence AI assistant.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
A highseverity security flaw has been disclosed in OpenClaw formerly referred to as Clawdbot and Moltbot that could allow remote code execution RCE through a crafted malicious link. The issue, which is tracked as CVE202625253 CVSS score 8.8, has been addressed in version 2026.1.29 released on January 30, 2026. It has been described as a token exfiltration vulnerability that leads to.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Microsoft has announced a threephase approach to phase out New Technology LAN Manager NTLM as part of its efforts to shift Windows environments toward stronger, Kerberosbased options. The development comes more than two years after the tech giant revealed its plans to deprecate the legacy technology, citing its susceptibility to weaknesses that could facilitate relay attacks and allow bad.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ β‘ Weekly Recap: Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New Threats ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Every week brings new discoveries, attacks, and defenses that shape the state of cybersecurity. Some threats are stopped quickly, while others go unseen until they cause real damage. Sometimes a single update, exploit, or mistake changes how we think about risk and protection. Every incident shows how defenders adapt and how fast attackers try to stay ahead. This weeks recap brings you the.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Securing the Mid-Market Across the Complete Threat Lifecycle ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
For midmarket organizations, cybersecurity is a constant balancing act. Proactive, preventative security measures are essential to protect an expanding attack surface. Combined with effective protection that blocks threats, they play a critical role in stopping cyberattacks before damage is done. The challenge is that many security tools add complexity and cost that most midmarket businesses.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π New Password-Stealing Phishing Campaign Targets Corporate Dropbox Credentials π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Multistage attack begins with fake message relating to business requests and evades detection with link hidden in a PDF.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
New Password-Stealing Phishing Campaign Targets Dropbox Credentials
Multi-stage attack begins with fake message relating to business requests and evades detection with link hidden in a PDF
β€1
π Vibe-Coded Moltbook Exposes User Data, API Keys and More π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Wiz Security claims Moltbook misconfiguration allowed full read and write access.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
π NSA Publishes New Zero Trust Implementation Guidelines π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
NSA released new guidelines to help organizations achieve targetlevel Zero Trust maturity.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
π Notepad++ Update Hijacking Linked to Hosting Provider Compromise π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A supply chain attack on Notepad update process was linked to compromised hosting infrastructure.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
π Fancy Bear Exploits Microsoft Office Flaw in Ukraine, EU Cyber-Attacks π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Russialinked hacking group Fancy Bear is exploiting a brandnew vulnerability in Microsoft Office, CERTUA says.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Fancy Bear Exploits Microsoft Office Flaw in Ukraine, EU Cyber-Attacks
Russia-linked hacking group Fancy Bear is exploiting a brand-new vulnerability in Microsoft Office, CERT-UA says
π¦
Desperate Perth Renters Targeted by Rising Australian Housing Scam π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
For many residents in Perth, finding a rental has become a highstakes challenge. As demand for housing surges, a troubling trend has just been revealed. An Australian housing scam preying on renters who are willing to stretch every dollar to secure a roof over their heads. These rent scams, often orchestrated by individuals posing as private landlords on online platforms like Facebook Marketplace, have left victims financially and emotionally drained. The scheme typically begins with a seemingly genuine rental listing. Scammers steal photos from legitimate properties and post them online, offering rent well below the market rate. In Perth, median rental prices are at historic highs, with houses averaging 700 per week and units 670. Scammers exploit this stress by pitching exclusive...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble
Perth Renters Warned About Australian Housing Scam
The Australian housing scam is hitting Perth hard. Government advises on spotting fake landlords, avoid scams, and protect your rent in Australia.
π Cybercrime Unit of Paris Prosecutors Raid Elon Muskβs X Offices in France π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Elon Musk and Xs former CEO were summoned for voluntary interviews in Paris on April 20, 2026.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Paris Prosecutors Raid Elon Muskβs X Offices in France
Elon Musk and Xβs former CEO were summoned for voluntary interviews in Paris on April 20, 2026
β€1
π¦
The Week in Vulnerabilities: Open-Sources Fixes Urged by Cyble π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble Vulnerability Intelligence researchers tracked 1,147 vulnerabilities in the last week, and more than 128 of the disclosed vulnerabilities already have a publicly available ProofofConcept PoC, significantly increasing the likelihood of realworld attacks. A total of 108 vulnerabilities were rated as critical under the CVSS v3.1 scoring system, while 54 received a critical severity rating based on the newer CVSS v4.0 scoring system. Below are some of the IT vulnerabilities flagged by Cyble threat intelligence researchers for prioritization by security teams in recent reports to clients. The Weeks Top IT Vulnerabilities Cybles network of honeypot sensors detected attack attempts on CVE202568613, a critical remote code execution flaw in the n8n opensource workflow automat...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble
Top IT Vulnerabilities This Week | Cyble Threat Intelligence
Cyble tracked 1,147 vulnerabilities this week, including 128 with PoCs. Critical flaws demand immediate attention from security teams.
π Researchers Warn of New βVectβ RaaS Variant π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A new ransomwareasaservice operation dubbed Vect features custom malware.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
ποΈ [Webinar] The Smarter SOC Blueprint: Learn What to Build, Buy, and Automate ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Most security teams today are buried under tools. Too many dashboards. Too much noise. Not enough real progress. Every vendor promises complete coverage or AIpowered automation, but inside most SOCs, teams are still overwhelmed, stretched thin, and unsure which tools are truly pulling their weight. The result? Bloated stacks, missed signals, and mounting pressure to do more with less. This.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity