πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ ThreatsDay Bulletin: OpenSSL RCE, Foxit 0-Days, Copilot Leak, AI Password Flaws & 20+ Stories πŸ–‹οΈ

The cyber threat space doesnt pause, and this week makes that clear. New risks, new tactics, and new security gaps are showing up across platforms, tools, and industries often all at the same time. Some developments are headlinelevel. Others sit in the background but carry longterm impact. Together, they shape how defenders need to think about exposure, response, and preparedness right now.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Remcos RAT Expands Real-Time Surveillance Capabilities πŸ“”

New Remcos RAT variant enhances realtime surveillance and evasion techniques to compromise Windows.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
β™ŸοΈ β€˜Starkiller’ Phishing Service Proxies Real Login Pages, MFA β™ŸοΈ

Most phishing websites are little more than static copies of login pages for popular online destinations, and they are often quickly taken down by antiabuse activists and security firms. But a stealthy new phishingasaservice offering lets customers sidestep both of these pitfalls It uses cleverly disguised links to load the target brand's real website, and then acts as a relay between the target and the legitimate site forwarding the victim's username, password and multifactor authentication MFA code to the legitimate site and returning its responses.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ β€˜Starkiller’ Phishing Service Proxies Real Login Pages, MFA β™ŸοΈ

Most phishing websites are little more than static copies of login pages for popular online destinations, and they are often quickly taken down by antiabuse activists and security firms. But a stealthy new phishingasaservice offering lets customers sidestep both of these pitfalls It uses cleverly disguised links to load the target brand's real website, and then acts as a relay between the target and the legitimate site forwarding the victim's username, password and multifactor authentication MFA code to the legitimate site and returning its responses.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ β€˜Starkiller’ Phishing Service Proxies Real Login Pages, MFA β™ŸοΈ

Most phishing websites are little more than static copies of login pages for popular online destinations, and they are often quickly taken down by antiabuse activists and security firms. But a stealthy new phishingasaservice offering lets customers sidestep both of these pitfalls It uses cleverly disguised links to load the target brand's real website, and then acts as a relay between the target and the legitimate site forwarding the victim's username, password and multifactor authentication MFA code to the legitimate site and returning its responses.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ β€˜Starkiller’ Phishing Service Proxies Real Login Pages, MFA β™ŸοΈ

Most phishing websites are little more than static copies of login pages for popular online destinations, and they are often quickly taken down by antiabuse activists and security firms. But a stealthy new phishingasaservice offering lets customers sidestep both of these pitfalls It uses cleverly disguised links to load the target brand's real website, and then acts as a relay between the target and the legitimate site forwarding the victim's username, password and multifactor authentication MFA code to the legitimate site and returning its responses.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries πŸ–‹οΈ

A Russianspeaking, financially motivated threat actor has been observed taking advantage of commercial generative artificial intelligence AI services to compromise over 600 FortiGate devices located in 55 countries. That's according to new findings from Amazon Threat Intelligence, which said it observed the activity between January 11 and February 18, 2026. "No exploitation of FortiGate.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 EDR vs. Managed SIEM: What You Actually Need for Full Visibility (And What’s Just Overlap) 🌊

Do you need SIEM with existing EDR? We break down real coverage gaps, compliance requirements ROI. Evaluate your security stack objectively. The post EDR vs. Managed SIEM What You Actually Need for Full Visibility And Whats Just Overlap appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” 44% Surge in App Exploits as AI Speeds Up Cyber-Attacks, IBM Finds πŸ“”

IBM's 2026 XForce report reveals 44 rise in cyberattacks on public apps, driven by AI and flaws.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“’ How to use cyber deception in your security strategy πŸ“’

Cyber deception allows firms to play adversaries at their own game but how is it achieved?.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ How to use cyber deception in your security strategy πŸ“’

Cyber deception allows firms to play adversaries at their own game but how is it achieved?.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ How to use cyber deception in your security strategy πŸ“’

Cyber deception allows firms to play adversaries at their own game but how is it achieved?.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ How to use cyber deception in your security strategy πŸ“’

Cyber deception allows firms to play adversaries at their own game but how is it achieved?.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ How to use cyber deception in your security strategy πŸ“’

Cyber deception allows firms to play adversaries at their own game but how is it achieved?.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ How to use cyber deception in your security strategy πŸ“’

Cyber deception allows firms to play adversaries at their own game but how is it achieved?.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ β€œIf you wanted to have civil disobedience and start the process of unraveling a society, we're a pretty big target”: how National Gas is shielding itself against cyber threats with Palo Alto Networks πŸ“’

As one of the UKs most critical organizations, National Gas is looking at a major overhaul of its cloud and on premises approach to cybersecurity.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“’ Law enforcement and security firms take down huge PhaaS platform πŸ“’

Tycoon 2FA has been responsible for tens of millions of phishing messages, reaching over 500,000 organizations each month worldwide.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ International Women’s Day 2026: why are there still so few women working in cybersecurity? πŸ“’

The figures show a stagnating number of women entering the cybersecurity industry why is this, and what needs to be done to change?.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Law enforcement and security firms take down huge PhaaS platform πŸ“’

Tycoon 2FA has been responsible for tens of millions of phishing messages, reaching over 500,000 organizations each month worldwide.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Hackers Used New Exploit Kit to Compromise Thousands of iPhones 🦿

Thousands of iPhones were compromised using the Coruna exploit kit, which chained 23 iOS vulnerabilities into advanced attacks used for espionage and cybercrime. The post Hackers Used New Exploit Kit to Compromise Thousands of iPhones appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Anthropic CEO Calls OpenAI’s Military Messaging β€˜Straight Up Lies’ 🦿

Anthropic CEO Dario Amodei is openly challenging how OpenAI describes its defense work, sharpening the debate over what AI guardrails really mean. The post Anthropic CEO Calls OpenAIs Military Messaging Straight Up Lies appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity