πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ Ransomware gangs are using employee monitoring software as a springboard for cyber attacks πŸ“’

Two attempted attacks aimed to exploit Net Monitor for Employees Professional and SimpleHelp.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Fake CAPTCHA Scam Tricks Windows Users Into Installing Malware 🦿

A fake CAPTCHA scam is tricking Windows users into running PowerShell commands that install StealC malware and steal passwords, crypto wallets, and more. The post Fake CAPTCHA Scam Tricks Windows Users Into Installing Malware appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Fake β€˜Antivirus’ App Spreads Android Malware, Steals Banking Credentials 🦿

A fake Android antivirus app called TrustBastion is spreading malware and stealing banking credentials. Heres how it works and how to stay protected. The post Fake Antivirus App Spreads Android Malware, Steals Banking Credentials appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Infostealer Steals OpenClaw AI Agent Configuration Files and Gateway Tokens πŸ–‹οΈ

Cybersecurity researchers disclosed they have detected a case of an information stealer infection successfully exfiltrating a victim's OpenClaw formerly Clawdbot and Moltbot configuration environment. "This finding marks a significant milestone in the evolution of infostealer behavior the transition from stealing browser credentials to harvesting the 'souls' and identities of personal AI .

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Study Uncovers 25 Password Recovery Attacks in Major Cloud Password Managers πŸ–‹οΈ

A new study has found that multiple cloudbased password managers, including Bitwarden, Dashlane, and LastPass, are susceptible to password recovery attacks under certain conditions. "The attacks range in severity from integrity violations to the complete compromise of all vaults in an organization," researchers Matteo Scarlata, Giovanni Torrisi, Matilda Backendal, and Kenneth G. Paterson said.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Weekly Recap: Outlook Add-Ins Hijack, 0-Day Patches, Wormable Botnet & AI Malware πŸ–‹οΈ

This weeks recap shows how small gaps are turning into big entry points. Not always through new exploits, often through tools, addons, cloud setups, or workflows that people already trust and rarely question. Another signal attackers are mixing old and new methods. Legacy botnet tactics, modern cloud abuse, AI assistance, and supplychain exposure are being used side by side, whichever path.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ–‹οΈ Safe and Inclusive E‑Society: How Lithuania Is Bracing for AI‑Driven Cyber Fraud πŸ–‹οΈ

Presentation of the KTU Consortium Mission A Safe and Inclusive Digital Society at the Innovation Agency event Innovation Breakfast How MissionOriented Science and Innovation Programmes Will Address Societal Challenges. Technologies are evolving fast, reshaping economies, governance, and daily life. Yet, as innovation accelerates, so do digital risks. Technological change is no longer.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theft πŸ–‹οΈ

Cybersecurity researchers have disclosed details of a new mobile spyware platform dubbed ZeroDayRAT that's being advertised on Telegram as a way to grab sensitive data and facilitate realtime surveillance on Android and iOS devices. "The developer runs dedicated channels for sales, customer support, and regular updates, giving buyers a single point of access to a fully operational spyware.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Chrome Zero-Day (CVE-2026-2441) Under Active Attack β€” Patch Released πŸ–‹οΈ

Google on Friday released security updates for its Chrome browser to address a security flaw that it said has been exploited in the wild. The highseverity vulnerability, tracked as CVE20262441 CVSS score 8.8, has been described as a useafterfree bug in CSS. Security researcher Shaheen Fazim has been credited with discovering and reporting the shortcoming on February 11, 2026. "Use after.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Vulnerabilities in Password Managers Allow Hackers to View and Change Passwords πŸ“”

Security researchers have challenged endtoend encryption claims from popular commercial password managers.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” SMEs Wrong to Assume They Won’t Be Hit by Cyber-Attacks, NCSC Boss Warns πŸ“”

NCSCs Richard Horne has warned that cybercriminals do not care about business size and called for SMEs to act now to secure their organizations.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” OysterLoader Evolves With New C2 Infrastructure and Obfuscation πŸ“”

OysterLoader malware evolves into 2026, refining C2 infrastructure, obfuscation infection stages.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“” Operation DoppelBrand Weaponizes Trusted Brands For Credential Theft πŸ“”

New phishing campaign dubbed Operation DoppelBrand targeted major financial firms like Wells Fargo.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Google Warns of In the Wild Exploit as It Patches New Chrome Zero Day πŸ“”

A high severity vulnerability in Google Chrome and allows remote attackers to execute code.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Crypto Payments to Human Traffickers Surges 85% πŸ“”

Chainalysis warns that online fraud is fuelling sophisticated human trafficking operations.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Odido Breach Impacts Millions of Dutch Telco Users πŸ“”

Dutch telco Odido has revealed a major data breach impacting over six million customers.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 A Ghost Attacker in RAM: Neutralizing a Fileless Breach 🌊

Attackers can use ViewState to execute malicious code in memory. Learn how UnderDefense detected and neutralized a fileless attack. The post A Ghost Attacker in RAM Neutralizing a Fileless Breach appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 5 Hidden Costs of SOCaaS and How to Avoid Them 🌊

Managing cybersecurity budgets in 2026 is like navigating a minefield blindfolded. Organizations are increasingly turning to Security Operations Center as a Service SOCaaS as a costeffective alternative to building internal The post 5 Hidden Costs of SOCaaS and How to Avoid Them appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… How the Protective Security Policy Framework Shapes Australia’s Commonwealth Cyber Security Strategy πŸ¦…

The Australian government has intensified efforts to protect digital infrastructure across all Commonwealth entities. Two recent publications, the 202425 Protective Security Policy Framework PSPF Assessment Report and the 2025 Commonwealth Cyber Security Posture Report, offer a comprehensive snapshot of current achievements, challenges, and future priorities in government cyber resilience.  The PSPF Assessment Report highlights that 92 of noncorporate Commonwealth entities NCEs achieved an overall rating of Effective compliance under the updated evidencebased reporting model. This framework moves beyond traditional checklists, focusing on measurable outcomes, tangible risk reduction, and demonstrable assurance. While information security across agencies continues to perform well, te...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Apple Tests End-to-End Encrypted RCS Messaging in iOS 26.4 Developer Beta πŸ–‹οΈ

Apple on Monday released a new developer beta of iOS and iPadOS with support for endtoend encryption E2EE in Rich Communications Services RCS messages. The feature is currently available for testing in iOS and iPadOS 26.4 Beta, and is expected to be shipped to customers in a future update for iOS, iPadOS, macOS, and watchOS. "Endtoend encryption is in beta and is not available for all.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“’ Harnessing AI to secure the future of identity πŸ“’

Channel partners must lead on securing AI identities through governance and support.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1