πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities πŸ–‹οΈ

Cisco has disclosed that two more vulnerabilities affecting Catalyst SDWAN Manager formerly SDWAN vManage have come under active exploitation in the wild. The vulnerabilities in question are listed below CVE202620122 CVSS score 7.1 An arbitrary file overwrite vulnerability that could allow an authenticated, remote attacker to overwrite arbitrary files on the local file system.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders πŸ–‹οΈ

Most organizations assume encrypted data is safe. But many attackers are already preparing for a future where todays encryption can be broken. Instead of trying to decrypt information now, they are collecting encrypted data and storing it so it can be decrypted later using quantum computers. This tacticknown as harvest now, decrypt latermeans sensitive data transmitted today could become.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More πŸ–‹οΈ

Some weeks in cybersecurity feel routine. This one doesnt. Several new developments surfaced over the past few days, showing how quickly the threat landscape keeps shifting. Researchers uncovered fresh activity, security teams shared new findings, and a few unexpected moves from major tech companies also drew attention. Together, these updates offer a useful snapshot of what is happening.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware πŸ–‹οΈ

A suspected Irannexus threat actor has been attributed to a campaign targeting government officials in Iraq by impersonating the country's Ministry of Foreign Affairs to deliver a set of neverbeforeseen malware. Zscaler ThreatLabz, which observed the activity in January 2026, is tracking the cluster under the name Dust Specter. The attacks, which manifest in the form of two different.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Where Multi-Factor Authentication Stops and Credential Abuse Starts πŸ–‹οΈ

Organizations typically roll out multifactor authentication MFA and assume stolen passwords are no longer enough to access systems. In Windows environments, that assumption is often wrong. Attackers still compromise networks every day using valid credentials. The issue is not MFA itself, but coverage.  Enforced through an identity provider IdP such as Microsoft Entra ID, Okta, or.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine πŸ–‹οΈ

Cybersecurity researchers have disclosed details of a new Russian cyber campaign that has targeted Ukrainian entities with two previously undocumented malware families named BadPaw and MeowMeow. "The attack chain initiates with a phishing email containing a link to a ZIP archive. Once extracted, an initial HTA file displays a lure document written in Ukrainian concerning border crossing appeals.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Zero‑Day Attacks on Enterprise Software Reach Record High, Google Warns πŸ“”

Almost a quarter of the zero days detected by Google in 2025 targeted security and networking appliances.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” AI-Driven Insider Risk Now a β€œCritical Business Threat,” Report Warns πŸ“”

Malicious insiders are using misusing AI for nefarious gain, while employees cutting corners also creates risk, warns Mimecast.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” ContextCrush Flaw Exposes AI Development Tools to Attacks πŸ“”

Critical flaw "ContextCrush" in Context7 MCP Server could allow malicious instructions into AI tools.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Coruna Exploit Kit Targets Older iPhones in Multi-Stage Campaigns πŸ“”

Exploit kit "Coruna" targets iPhones running iOS 13.0 to 17.2.1, focusing on financial data theft.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… ClipXDaemon: Autonomous X11 Clipboard Hijacker Delivered via Bincrypter-Based Loader πŸ¦…

Executive Summary In early February 2026, Cyble Research Intelligence Labs CRIL identified a new Linux malware strain delivered through a loader structure previously associated with ShadowHS activity. While ShadowHS samples deployed postexploitation tooling, the newly observed payload is operationally different. We have named it ClipXDaemon, an autonomous cryptocurrency clipboard hijacker targeting Linux X11 environments. At the time of this writing, there is no evidence that ShadowHS and ClipXDaemon originate from the same malware author or campaign. The structural overlap in the loader stems from the use of bincrypter, an opensource shellscript encryption framework hosted on GitHub. Both campaigns appear to have leveraged this public tool independently. ClipXDaemon differ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ FBI and Europol take down major data leak forum πŸ“’

LeakBase enabled the sale and purchase of huge amount of personal data and had more than 142,000 members.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Organizations hit by 90 zero-day vulnerabilities last year πŸ“’

Google Threat Intelligence researchers warn that edge devices and security appliances are prime entry points.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Iran's MuddyWater Hackers Hit US Firms with New 'Dindoor' Backdoor πŸ“”

A bank, an airport, a nonprofit and the Israeli branch of a US software company were among the targets of this new MuddyWater campaign.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 FBI Investigates Suspicious Activity in Surveillance Platform 🦿

The FBI is investigating suspicious cyber activity in a system used to process surveillance and wiretap warrants, raising concerns about security risks to sensitive data. The post FBI Investigates Suspicious Activity in Surveillance Platform appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 LexisNexis Hack Exposes 3.9M Records Through Unpatched React Vulnerability 🦿

LexisNexis confirmed a data breach after hackers leaked stolen files, with attackers claiming they exploited the React2Shell vulnerability. The post LexisNexis Hack Exposes 3.9M Records Through Unpatched React Vulnerability appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🀯1
🦿 Bitwarden Brings Passkey Logins to Windows 11, Expanding Passwordless Sign-Ins 🦿

Bitwarden now supports passkey logins on Windows 11 for Microsoft Entra ID users, extending passwordless signins to device authentication. The post Bitwarden Brings Passkey Logins to Windows 11, Expanding Passwordless SignIns appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ–‹οΈ Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting India πŸ–‹οΈ

The Pakistanaligned threat actor known as Transparent Tribe has become the latest hacking group to embrace artificial intelligence AIpowered coding tools to strike targets with various implants. The activity is designed to produce a "highvolume, mediocre mass of implants" that are developed using lesserknown programming languages like Nim, Zig, and Crystal and rely on trusted services like.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT πŸ–‹οΈ

Cybersecurity researchers have disclosed details of a multistage malware campaign that uses batch scripts as a pathway to deliver various encrypted remote access trojan RATs payloads that correspond to XWorm, AsyncRAT, and Xeno RAT. The stealthy attack chain has been codenamed VOIDGEIST by Securonix Threat Research. At a high level, the obfuscated batch script is used to deploy a second.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸš€ What cybersecurity actually does for your business πŸš€

The ability to continue operating safely in an unsafe environment where competitors cannot is a competitive advantage that is rarely measured or discussed.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
❀2
πŸ–‹οΈ OpenAI Codex Security Scanned 1.2 Million Commits and Found 10,561 High-Severity Issues πŸ–‹οΈ

OpenAI on Friday began rolling out Codex Security, an artificial intelligence AIpowered security agent that's designed to find, validate, and propose fixes for vulnerabilities. The feature is available in a research preview to ChatGPT Pro, Enterprise, Business, and Edu customers via the Codex web with free usage for the next month. "It builds deep context about your project to identify.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity