πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package πŸ–‹οΈ

Threat actors have been observed exploiting a critical security flaw impacting the Metro Development Server in the popular "reactnativecommunitycli" npm package. Cybersecurity company VulnCheck said it first observed exploitation of CVE202511953 aka Metro4Shell on December 21, 2025. With a CVSS score of 9.8, the vulnerability allows remote unauthenticated attackers to execute arbitrary.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” UK ICO Launches Investigation into X Over AI Generated Non-Consensual Sexual Imagery πŸ“”

UK Data Protection Watchdog has serious concerns over data privacy on Elon Musks social platform.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” DockerDash Exposes AI Supply Chain Weakness In Docker's Ask Gordon πŸ“”

DockerDash vulnerability allows RCE and data exfiltration via unverified metadata in Ask Gordon.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” SQL Injection Flaw Affects 40,000 WordPress Sites πŸ“”

40,000 WordPress sites are vulnerable to SQL injection in Quiz and Survey Master plugin.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“’ Google issues warning over ShinyHunters-branded vishing campaigns πŸ“’

Related groups are stealing data through voice phishing and fake credential harvesting websites.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ The CVE system isn’t working – what's next? πŸ“’

With 2025's funding issues underlining key issues with the CVE system, what should businesses be doing to source intelligence about security vulnerabilities?.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Windows Shutdown Bug Spreads to Windows 10, Microsoft Confirms 🦿

Microsoft confirms a Windows bug preventing some PCs from shutting down or hibernating after January 2026 updates. A fix is still pending. The post Windows Shutdown Bug Spreads to Windows 10, Microsoft Confirms appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Chrome Add-On Caught Stealing Amazon Commissions 🦿

A Chrome extension posing as an Amazon ad blocker was caught hijacking affiliate links in the background, redirecting commissions without user consent. The post Chrome AddOn Caught Stealing Amazon Commissions appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 New Microsoft Update Improves Windows Sign-In Experience 🦿

Windows 11s optional KB5074105 update fixes the missing password icon bug linked to August 29, 2025s KB5064081 and delivers 32 improvements. The post New Microsoft Update Improves Windows SignIn Experience appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns πŸ–‹οΈ

Threat actors affiliated with China have been attributed to a fresh set of cyber espionage campaigns targeting government and law enforcement agencies across Southeast Asia throughout 2025. Check Point Research is tracking the previously undocumented activity cluster under the moniker AmaranthDragon, which it said shares links to the APT 41 ecosystem. Targeted countries include Cambodia,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Orchid Security Introduces Continuous Identity Observability for Enterprise Applications πŸ–‹οΈ

An innovative approach to discovering, analyzing, and governing identity usage beyond traditional IAM controls. The Challenge Identity Lives Outside the Identity Stack Identity and access management tools were built to govern users and directories. Modern enterprises run on applications. Over time, identity logic has moved into application code, APIs, service accounts, and custom authentication.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ The First 90 Seconds: How Early Decisions Shape Incident Response Investigations πŸ–‹οΈ

Many incident response failures do not come from a lack of tools, intelligence, or technical skills. They come from what happens immediately after detection, when pressure is high, and information is incomplete. I have seen IR teams recover from sophisticated intrusions with limited telemetry. I have also seen teams lose control of investigations they should have been able to handle. The.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers πŸ–‹οΈ

Microsoft has warned that informationstealing attacks are "rapidly expanding" beyond Windows to target Apple macOS environments by leveraging crossplatform languages like Python and abusing trusted platforms for distribution at scale. The tech giant's Defender Security Research Team said it observed macOStargeted infostealer campaigns using social engineering techniques such as ClickFix since.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Eclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensions πŸ–‹οΈ

The Eclipse Foundation, which maintains the Open VSX Registry, has announced plans to enforce security checks before Microsoft Visual Studio Code VS Code extensions are published to the opensource repository to combat supply chain threats. The move marks a shift from a reactive to a proactive approach to ensure that malicious extensions don't end up getting published on the Open VSX Registry.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog πŸ–‹οΈ

The U.S. Cybersecurity and Infrastructure Security Agency CISA on Tuesday added a critical security flaw impacting SolarWinds Web Help Desk WHD to its Known Exploited Vulnerabilities KEV catalog, flagging it as actively exploited in attacks. The vulnerability, tracked as CVE202540551 CVSS score 9.8, is a untrusted data deserialization vulnerability that could pave the way for remote.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Global SystemBC Botnet Found Active Across 10,000 Infected Systems πŸ“”

SystemBC malware linked to 10,000 infected IPs, posing risks to sensitive government infrastructure.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New Technical Markers Reveal Expanding ShadowSyndicate Cybercriminal Infrastructure πŸ“”

ShadowSyndicate cluster expands with new SSH fingerprints connecting servers to other ransomware ops.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” AI Drives Doubling of Phishing Attacks in a Year πŸ“”

Cofense claims AI is making phishing emails more personalized and sophisticated.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Two Critical Flaws in n8n AI Workflow Automation Platform Allow Complete Takeover πŸ“”

Pillar Security discovered two new critical vulnerabilities in n8n that could lead to supply chain compromise, credential harvesting and complete takeover attacks.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” SolarWinds Web Help Desk Vulnerability Actively Exploited πŸ“”

CISA has added a critical CVE in SolarWinds Web Help Desk to its KEV Catalog.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Hundreds of Malicious Crypto Trading Add-Ons Found in Moltbot/OpenClaw πŸ“”

A security researcher found 386 malicious skills published on ClawHub, a skill repository for the popular OpenClaw AI assistant project.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity