πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery πŸ–‹οΈ

Cybersecurity researchers have taken the wraps off a gatewaymonitoring and adversaryinthemiddle AitM framework dubbed DKnife that's operated by Chinanexus threat actors since at least 2019. The framework comprises seven Linuxbased implants that are designed to perform deep packet inspection, manipulate traffic, and deliver malware via routers and edge devices. Its primary targets seem to.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk πŸ–‹οΈ

The U.S. Cybersecurity and Infrastructure Security Agency CISA has ordered Federal Civilian Executive Branch FCEB agencies to strengthen asset lifecycle management for edge network devices and remove those that no longer receive security updates from original equipment manufacturers OEMs over the next 12 to 18 months. The agency said the move is to drive down technical debt and minimize.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities πŸ–‹οΈ

A previously undocumented cyber espionage group operating from Asia broke into the networks of at least 70 government and critical infrastructure organizations across 37 countries over the past year, according to new findings from Palo Alto Networks Unit 42. In addition, the hacking crew has been observed conducting active reconnaissance against government infrastructure associated with 155.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ How Samsung Knox Helps Stop Your Network Security Breach πŸ–‹οΈ

As you know, enterprise network security has undergone significant evolution over the past decade. Firewalls have become more intelligent, threat detection methods have advanced, and access controls are now more detailed. However and its a big however, the increasing use of mobile devices in business operations necessitates network security measures that are specifically.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware πŸ–‹οΈ

Cybersecurity researchers have discovered a new supply chain attack in which legitimate packages on npm and the Python Package Index PyPI repository have been compromised to push malicious versions to facilitate wallet credential theft and remote code execution. The compromised versions of the two packages are listed below dydxprotocolv4clientjs npm 3.4.1, 1.22.1, 1.15.2, 1.0.31.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries πŸ–‹οΈ

Artificial intelligence AI company Anthropic revealed that its latest large language model LLM, Claude Opus 4.6, has found more than 500 previously unknown highseverity security flaws in opensource libraries, including Ghostscript, OpenSC, and CGIF. Claude Opus 4.6, which was launched Thursday, comes with improved coding skills, including code review and debugging capabilities, along with.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ”₯2
πŸ–‹οΈ German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists πŸ–‹οΈ

Germany's Federal Office for the Protection of the Constitution aka Bundesamt fr Verfassungsschutz or BfV and Federal Office for Information Security BSI have issued a joint advisory warning of a malicious cyber campaign undertaken by a likely statesponsored threat actor that involves carrying out phishing attacks over the Signal messaging app. "The focus is on highranking targets in.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists πŸ–‹οΈ

Germany's Federal Office for the Protection of the Constitution aka Bundesamt fr Verfassungsschutz or BfV and Federal Office for Information Security BSI have issued a joint advisory warning of a malicious cyber campaign undertaken by a likely statesponsored threat actor that involves carrying out phishing attacks over the Signal messaging app. "The focus is on highranking targets in.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ OpenClaw Integrates VirusTotal Scanning to Detect Malicious ClawHub Skills πŸ–‹οΈ

OpenClaw formerly Moltbot and Clawdbot has announced that it's partnering with Googleowned VirusTotal to scan skills that are being uploaded to ClawHub, its skill marketplace, as part of broader efforts to bolster the security of the agentic ecosystem. "All skills published to ClawHub are now scanned using VirusTotal's threat intelligence, including their new Code Insight capability,".

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“’ β€˜They are able to move fast now’: AI is expanding attack surfaces – and hackers are looking to reap the same rewards as enterprises with the technology πŸ“’

Potent new malware strains, faster attack times, and the rise of shadow AI are causing havoc.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Ransomware gangs are using employee monitoring software as a springboard for cyber attacks πŸ“’

Two attempted attacks aimed to exploit Net Monitor for Employees Professional and SimpleHelp.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Fake CAPTCHA Scam Tricks Windows Users Into Installing Malware 🦿

A fake CAPTCHA scam is tricking Windows users into running PowerShell commands that install StealC malware and steal passwords, crypto wallets, and more. The post Fake CAPTCHA Scam Tricks Windows Users Into Installing Malware appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Fake β€˜Antivirus’ App Spreads Android Malware, Steals Banking Credentials 🦿

A fake Android antivirus app called TrustBastion is spreading malware and stealing banking credentials. Heres how it works and how to stay protected. The post Fake Antivirus App Spreads Android Malware, Steals Banking Credentials appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Infostealer Steals OpenClaw AI Agent Configuration Files and Gateway Tokens πŸ–‹οΈ

Cybersecurity researchers disclosed they have detected a case of an information stealer infection successfully exfiltrating a victim's OpenClaw formerly Clawdbot and Moltbot configuration environment. "This finding marks a significant milestone in the evolution of infostealer behavior the transition from stealing browser credentials to harvesting the 'souls' and identities of personal AI .

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Study Uncovers 25 Password Recovery Attacks in Major Cloud Password Managers πŸ–‹οΈ

A new study has found that multiple cloudbased password managers, including Bitwarden, Dashlane, and LastPass, are susceptible to password recovery attacks under certain conditions. "The attacks range in severity from integrity violations to the complete compromise of all vaults in an organization," researchers Matteo Scarlata, Giovanni Torrisi, Matilda Backendal, and Kenneth G. Paterson said.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Weekly Recap: Outlook Add-Ins Hijack, 0-Day Patches, Wormable Botnet & AI Malware πŸ–‹οΈ

This weeks recap shows how small gaps are turning into big entry points. Not always through new exploits, often through tools, addons, cloud setups, or workflows that people already trust and rarely question. Another signal attackers are mixing old and new methods. Legacy botnet tactics, modern cloud abuse, AI assistance, and supplychain exposure are being used side by side, whichever path.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ–‹οΈ Safe and Inclusive E‑Society: How Lithuania Is Bracing for AI‑Driven Cyber Fraud πŸ–‹οΈ

Presentation of the KTU Consortium Mission A Safe and Inclusive Digital Society at the Innovation Agency event Innovation Breakfast How MissionOriented Science and Innovation Programmes Will Address Societal Challenges. Technologies are evolving fast, reshaping economies, governance, and daily life. Yet, as innovation accelerates, so do digital risks. Technological change is no longer.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theft πŸ–‹οΈ

Cybersecurity researchers have disclosed details of a new mobile spyware platform dubbed ZeroDayRAT that's being advertised on Telegram as a way to grab sensitive data and facilitate realtime surveillance on Android and iOS devices. "The developer runs dedicated channels for sales, customer support, and regular updates, giving buyers a single point of access to a fully operational spyware.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Chrome Zero-Day (CVE-2026-2441) Under Active Attack β€” Patch Released πŸ–‹οΈ

Google on Friday released security updates for its Chrome browser to address a security flaw that it said has been exploited in the wild. The highseverity vulnerability, tracked as CVE20262441 CVSS score 8.8, has been described as a useafterfree bug in CSS. Security researcher Shaheen Fazim has been credited with discovering and reporting the shortcoming on February 11, 2026. "Use after.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Vulnerabilities in Password Managers Allow Hackers to View and Change Passwords πŸ“”

Security researchers have challenged endtoend encryption claims from popular commercial password managers.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” SMEs Wrong to Assume They Won’t Be Hit by Cyber-Attacks, NCSC Boss Warns πŸ“”

NCSCs Richard Horne has warned that cybercriminals do not care about business size and called for SMEs to act now to secure their organizations.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity