πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” Zero‑Day Attacks on Enterprise Software Reach Record High, Google Warns πŸ“”

Almost a quarter of the zero days detected by Google in 2025 targeted security and networking appliances.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” AI-Driven Insider Risk Now a β€œCritical Business Threat,” Report Warns πŸ“”

Malicious insiders are using misusing AI for nefarious gain, while employees cutting corners also creates risk, warns Mimecast.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” ContextCrush Flaw Exposes AI Development Tools to Attacks πŸ“”

Critical flaw "ContextCrush" in Context7 MCP Server could allow malicious instructions into AI tools.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Coruna Exploit Kit Targets Older iPhones in Multi-Stage Campaigns πŸ“”

Exploit kit "Coruna" targets iPhones running iOS 13.0 to 17.2.1, focusing on financial data theft.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… ClipXDaemon: Autonomous X11 Clipboard Hijacker Delivered via Bincrypter-Based Loader πŸ¦…

Executive Summary In early February 2026, Cyble Research Intelligence Labs CRIL identified a new Linux malware strain delivered through a loader structure previously associated with ShadowHS activity. While ShadowHS samples deployed postexploitation tooling, the newly observed payload is operationally different. We have named it ClipXDaemon, an autonomous cryptocurrency clipboard hijacker targeting Linux X11 environments. At the time of this writing, there is no evidence that ShadowHS and ClipXDaemon originate from the same malware author or campaign. The structural overlap in the loader stems from the use of bincrypter, an opensource shellscript encryption framework hosted on GitHub. Both campaigns appear to have leveraged this public tool independently. ClipXDaemon differ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ FBI and Europol take down major data leak forum πŸ“’

LeakBase enabled the sale and purchase of huge amount of personal data and had more than 142,000 members.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Organizations hit by 90 zero-day vulnerabilities last year πŸ“’

Google Threat Intelligence researchers warn that edge devices and security appliances are prime entry points.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Iran's MuddyWater Hackers Hit US Firms with New 'Dindoor' Backdoor πŸ“”

A bank, an airport, a nonprofit and the Israeli branch of a US software company were among the targets of this new MuddyWater campaign.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 FBI Investigates Suspicious Activity in Surveillance Platform 🦿

The FBI is investigating suspicious cyber activity in a system used to process surveillance and wiretap warrants, raising concerns about security risks to sensitive data. The post FBI Investigates Suspicious Activity in Surveillance Platform appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 LexisNexis Hack Exposes 3.9M Records Through Unpatched React Vulnerability 🦿

LexisNexis confirmed a data breach after hackers leaked stolen files, with attackers claiming they exploited the React2Shell vulnerability. The post LexisNexis Hack Exposes 3.9M Records Through Unpatched React Vulnerability appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🀯1
🦿 Bitwarden Brings Passkey Logins to Windows 11, Expanding Passwordless Sign-Ins 🦿

Bitwarden now supports passkey logins on Windows 11 for Microsoft Entra ID users, extending passwordless signins to device authentication. The post Bitwarden Brings Passkey Logins to Windows 11, Expanding Passwordless SignIns appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ–‹οΈ Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting India πŸ–‹οΈ

The Pakistanaligned threat actor known as Transparent Tribe has become the latest hacking group to embrace artificial intelligence AIpowered coding tools to strike targets with various implants. The activity is designed to produce a "highvolume, mediocre mass of implants" that are developed using lesserknown programming languages like Nim, Zig, and Crystal and rely on trusted services like.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT πŸ–‹οΈ

Cybersecurity researchers have disclosed details of a multistage malware campaign that uses batch scripts as a pathway to deliver various encrypted remote access trojan RATs payloads that correspond to XWorm, AsyncRAT, and Xeno RAT. The stealthy attack chain has been codenamed VOIDGEIST by Securonix Threat Research. At a high level, the obfuscated batch script is used to deploy a second.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸš€ What cybersecurity actually does for your business πŸš€

The ability to continue operating safely in an unsafe environment where competitors cannot is a competitive advantage that is rarely measured or discussed.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
❀2
πŸ–‹οΈ OpenAI Codex Security Scanned 1.2 Million Commits and Found 10,561 High-Severity Issues πŸ–‹οΈ

OpenAI on Friday began rolling out Codex Security, an artificial intelligence AIpowered security agent that's designed to find, validate, and propose fixes for vulnerabilities. The feature is available in a research preview to ChatGPT Pro, Enterprise, Business, and Edu customers via the Codex web with free usage for the next month. "It builds deep context about your project to identify.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Anthropic Finds 22 Firefox Vulnerabilities Using Claude Opus 4.6 AI Model πŸ–‹οΈ

Anthropic on Friday said it discovered 22 new security vulnerabilities in the Firefox web browser as part of a security partnership with Mozilla. Of these, 14 have been classified as high, seven have been classified as moderate, and one has been rated low in severity. The issues were addressed in Firefox 148, released late last month. The vulnerabilities were identified over a twoweek period in.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ How AI Assistants are Moving the Security Goalposts β™ŸοΈ

AIbased assistants or "agents" autonomous programs that have access to the user's computer, files, online services and can automate virtually any task are growing in popularity with developers and IT workers. But as so many eyebrowraising headlines over the past few weeks have shown, these powerful and assertive new tools are rapidly shifting the security priorities for organizations, while blurring the lines between data and code, trusted coworker and insider threat, ninja hacker and novice code jockey.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
❀3πŸ‘2
πŸ“’ Tomorrow's fraud techniques πŸ“’

Leaders need to proactive as attackers launch more consistent, sophisticated attacks.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Interpol teams up with tech firms to seize 45,000 malicious IPs, servers in global cyber crime crackdown πŸ“’

Operation Synergia III saw 94 arrests and counting with malicious IP addresses used in phishing and fraud schemes seized.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Alert issued over critical vulnerabilities in Linux’s AppArmor security layer – more than 12 million enterprise systems are at risk of root access πŸ“’

Researchers have warned Linux flaws allow unprivileged local users to gain root privileges and weaken container isolation.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ AutoCAD Users may have a ransomware problem – here's what they can do πŸ“’

A new malware family is currently using the same file types as the professional design software AutoCAD.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity