πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🌊 A Ghost Attacker in RAM: Neutralizing a Fileless Breach 🌊

Attackers can use ViewState to execute malicious code in memory. Learn how UnderDefense detected and neutralized a fileless attack. The post A Ghost Attacker in RAM Neutralizing a Fileless Breach appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 5 Hidden Costs of SOCaaS and How to Avoid Them 🌊

Managing cybersecurity budgets in 2026 is like navigating a minefield blindfolded. Organizations are increasingly turning to Security Operations Center as a Service SOCaaS as a costeffective alternative to building internal The post 5 Hidden Costs of SOCaaS and How to Avoid Them appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… How the Protective Security Policy Framework Shapes Australia’s Commonwealth Cyber Security Strategy πŸ¦…

The Australian government has intensified efforts to protect digital infrastructure across all Commonwealth entities. Two recent publications, the 202425 Protective Security Policy Framework PSPF Assessment Report and the 2025 Commonwealth Cyber Security Posture Report, offer a comprehensive snapshot of current achievements, challenges, and future priorities in government cyber resilience.  The PSPF Assessment Report highlights that 92 of noncorporate Commonwealth entities NCEs achieved an overall rating of Effective compliance under the updated evidencebased reporting model. This framework moves beyond traditional checklists, focusing on measurable outcomes, tangible risk reduction, and demonstrable assurance. While information security across agencies continues to perform well, te...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Apple Tests End-to-End Encrypted RCS Messaging in iOS 26.4 Developer Beta πŸ–‹οΈ

Apple on Monday released a new developer beta of iOS and iPadOS with support for endtoend encryption E2EE in Rich Communications Services RCS messages. The feature is currently available for testing in iOS and iPadOS 26.4 Beta, and is expected to be shipped to customers in a future update for iOS, iPadOS, macOS, and watchOS. "Endtoend encryption is in beta and is not available for all.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“’ Harnessing AI to secure the future of identity πŸ“’

Channel partners must lead on securing AI identities through governance and support.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ–‹οΈ Microsoft Finds β€œSummarize with AI” Prompts Manipulating Chatbot Recommendations πŸ–‹οΈ

New research from Microsoft has revealed that legitimate businesses are gaming artificial intelligence AI chatbots via the "Summarize with AI" button that's being increasingly placed on websites in ways that mirror classic search engine poisoning AI. The new AI hijacking technique has been codenamed AI Recommendation Poisoning by the Microsoft Defender Security Research Team. The tech giant.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Infostealer Targets OpenClaw to Loot Victim’s Digital Life πŸ“”

Hudson Rock has warned OpenClaw users that infostealers are targeting their configuration files.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Vast majority of breaches enabled by preventable gaps, identity weaknesses says Palo Alto Networks πŸ“’

Identity controls and better understanding of threat surface are key to rebuffing increasingly threatening cyber attacks.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Webinar: How Modern SOC Teams Use AI and Context to Investigate Cloud Breaches Faster πŸ–‹οΈ

Cloud attacks move fast faster than most incident response teams. In data centers, investigations had time. Teams could collect disk images, review logs, and build timelines over days. In the cloud, infrastructure is shortlived. A compromised instance can disappear in minutes. Identities rotate. Logs expire. Evidence can vanish before analysis even begins. Cloud forensics is fundamentally.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ My Day Getting My Hands Dirty with an NDR System πŸ–‹οΈ

My objectiveThe role of NDR in SOC workflowsStarting up the NDR systemHow AI complements the human responseWhat else did I try out?What could I see with NDR that I wouldnt otherwise?Am I ready to be a network security analyst now? My objective As someone relatively inexperienced with network threat hunting, I wanted to get some handson experience using a network detection and response .

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Researchers called on LastPass, Dashlane, and Bitwarden to up defenses after severe flaws put 60 million users at risk – here’s how each company responded πŸ“’

Analysts at ETH Zurich called for cryptographic standard improvements after a host of password managers were found lacking.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Over-Privileged AI Drives 4.5 Times Higher Incident Rates πŸ“”

Teleport study reveals that organizations running overprivileged AI have a 76 incident rate.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Significant Rise in Ransomware Attacks Targeting Industrial Operations πŸ“”

Dragos annual report warns of a surge in ransomware attacks causing increased operational disruption in industrial environments.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ SmartLoader Attack Uses Trojanized Oura MCP Server to Deploy StealC Infostealer πŸ–‹οΈ

Cybersecurity researchers have disclosed details of a new SmartLoader campaign that involves distributing a trojanized version of a Model Context Protocol MCP server associated with Oura Health to deliver an information stealer known as StealC. "The threat actors cloned a legitimate Oura MCP Server a tool that connects AI assistants to Oura Ring health data and built a deceptive.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Low-Skilled Cybercriminals Use AI to Perform "Vibe Extortion" Attacks πŸ“”

Unit 42 researchers observed a lowskilled threat actor using an LLM to script a professional extortion strategy, complete with deadlines and pressure tactics.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Apple Expands RCS Encryption and Memory Protections in iOS 26.4 πŸ“”

iOS 26.4 Beta adds endtoend encryption for RCS messaging and enhanced Memory Integrity Enforcement.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
❀2
πŸ“’ Millions of developers could be impacted by flaws in Visual Studio Code extensions – here's what you need to know and how to protect yourself πŸ“’

The VS Code vulnerabilities highlight broader IDE security risks, said OX Security.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Ransomware protection for all: How consumption-based subscription models can lower the entry point for cyber resilience πŸ“’

Consumptionbased immutable backup makes enterprisegrade ransomware resilience affordable to all.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Microsoft: Critical Windows Admin Center Flaw Allows Privilege Escalation 🦿

A highseverity Windows Admin Center vulnerability CVE202626119 could allow privilege escalation in enterprise environments. Heres what to know and how to mitigate risk. The post Microsoft Critical Windows Admin Center Flaw Allows Privilege Escalation appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Substack Breach May Have Leaked Nearly 700,000 User Details Online 🦿

Substack says hackers accessed user emails, phone numbers, and internal metadata in October 2025, with a database of 697,313 records later posted online. The post Substack Breach May Have Leaked Nearly 700,000 User Details Online appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CRESCENTHARVEST Campaign Targets Iran Protest Supporters With RAT Malware πŸ–‹οΈ

Cybersecurity researchers have disclosed details of a new campaign dubbed CRESCENTHARVEST, likely targeting supporters of Iran's ongoing protests to conduct information theft and longterm espionage. The Acronis Threat Research Unit TRU said it observed the activity after January 9, with the attacks designed to deliver a malicious payload that serves as a remote access trojan RAT and.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity