π’ Organizations hit by 90 zero-day vulnerabilities last year π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Google Threat Intelligence researchers warn that edge devices and security appliances are prime entry points.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Organizations hit by 90 zero-day vulnerabilities last year
Google Threat Intelligence researchers warn that edge devices and security appliances are prime entry points
π Iran's MuddyWater Hackers Hit US Firms with New 'Dindoor' Backdoor π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A bank, an airport, a nonprofit and the Israeli branch of a US software company were among the targets of this new MuddyWater campaign.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
π¦Ώ FBI Investigates Suspicious Activity in Surveillance Platform π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
The FBI is investigating suspicious cyber activity in a system used to process surveillance and wiretap warrants, raising concerns about security risks to sensitive data. The post FBI Investigates Suspicious Activity in Surveillance Platform appeared first on TechRepublic.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
FBI Investigates Suspicious Activity in Surveillance Platform
The FBI is investigating suspicious cyber activity in a system used to process surveillance and wiretap warrants, raising concerns about security risks to sensitive data.
π¦Ώ LexisNexis Hack Exposes 3.9M Records Through Unpatched React Vulnerability π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
LexisNexis confirmed a data breach after hackers leaked stolen files, with attackers claiming they exploited the React2Shell vulnerability. The post LexisNexis Hack Exposes 3.9M Records Through Unpatched React Vulnerability appeared first on TechRepublic.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
LexisNexis Hack Exposes 3.9M Records Through Unpatched React Vulnerability
LexisNexis confirmed a data breach after hackers leaked stolen files, with attackers claiming they exploited the React2Shell vulnerability.
π€―1
π¦Ώ Bitwarden Brings Passkey Logins to Windows 11, Expanding Passwordless Sign-Ins π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Bitwarden now supports passkey logins on Windows 11 for Microsoft Entra ID users, extending passwordless signins to device authentication. The post Bitwarden Brings Passkey Logins to Windows 11, Expanding Passwordless SignIns appeared first on TechRepublic.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Bitwarden Brings Passkey Logins to Windows 11, Expanding Passwordless Sign-Ins
Bitwarden now supports passkey logins on Windows 11 for Microsoft Entra ID users, extending passwordless sign-ins to device authentication.
β€1
ποΈ Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting India ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The Pakistanaligned threat actor known as Transparent Tribe has become the latest hacking group to embrace artificial intelligence AIpowered coding tools to strike targets with various implants. The activity is designed to produce a "highvolume, mediocre mass of implants" that are developed using lesserknown programming languages like Nim, Zig, and Crystal and rely on trusted services like.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have disclosed details of a multistage malware campaign that uses batch scripts as a pathway to deliver various encrypted remote access trojan RATs payloads that correspond to XWorm, AsyncRAT, and Xeno RAT. The stealthy attack chain has been codenamed VOIDGEIST by Securonix Threat Research. At a high level, the obfuscated batch script is used to deploy a second.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
β€1
π What cybersecurity actually does for your business π
π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
The ability to continue operating safely in an unsafe environment where competitors cannot is a competitive advantage that is rarely measured or discussed.π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
Welivesecurity
What cybersecurity actually does for your business
Strong cybersecurity creates value that may not be immediately obvious or measurable. Here's where to look forit.
β€2
ποΈ OpenAI Codex Security Scanned 1.2 Million Commits and Found 10,561 High-Severity Issues ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
OpenAI on Friday began rolling out Codex Security, an artificial intelligence AIpowered security agent that's designed to find, validate, and propose fixes for vulnerabilities. The feature is available in a research preview to ChatGPT Pro, Enterprise, Business, and Edu customers via the Codex web with free usage for the next month. "It builds deep context about your project to identify.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Anthropic Finds 22 Firefox Vulnerabilities Using Claude Opus 4.6 AI Model ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Anthropic on Friday said it discovered 22 new security vulnerabilities in the Firefox web browser as part of a security partnership with Mozilla. Of these, 14 have been classified as high, seven have been classified as moderate, and one has been rated low in severity. The issues were addressed in Firefox 148, released late last month. The vulnerabilities were identified over a twoweek period in.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
βοΈ How AI Assistants are Moving the Security Goalposts βοΈ
π Read more.
π Via "Krebs on Security"
----------
ποΈ Seen on @cibsecurity
AIbased assistants or "agents" autonomous programs that have access to the user's computer, files, online services and can automate virtually any task are growing in popularity with developers and IT workers. But as so many eyebrowraising headlines over the past few weeks have shown, these powerful and assertive new tools are rapidly shifting the security priorities for organizations, while blurring the lines between data and code, trusted coworker and insider threat, ninja hacker and novice code jockey.π Read more.
π Via "Krebs on Security"
----------
ποΈ Seen on @cibsecurity
Krebs on Security
How AI Assistants are Moving the Security Goalposts
AI-based assistants or "agents" -- autonomous programs that have access to the user's computer, files, online services and can automate virtually any task -- are growing in popularity with developers and IT workers. But as so many eyebrow-raising headlinesβ¦
β€3π2
π’ Tomorrow's fraud techniques π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Leaders need to proactive as attackers launch more consistent, sophisticated attacks.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Tomorrow's fraud techniques
Leaders need to proactive as attackers launch more consistent, sophisticated attacks
π’ Interpol teams up with tech firms to seize 45,000 malicious IPs, servers in global cyber crime crackdown π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Operation Synergia III saw 94 arrests and counting with malicious IP addresses used in phishing and fraud schemes seized.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Interpol teams up with tech firms to seize 45,000 malicious IPs, servers in global cyber crime crackdown
Operation Synergia III saw 94 arrests - and counting - with malicious IP addresses used in phishing and fraud schemes seized
π’ Alert issued over critical vulnerabilities in Linuxβs AppArmor security layer β more than 12 million enterprise systems are at risk of root access π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Researchers have warned Linux flaws allow unprivileged local users to gain root privileges and weaken container isolation.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Alert issued over critical vulnerabilities in Linuxβs AppArmor security layer β more than 12 million enterprise systems are atβ¦
Researchers have warned Linux flaws allow unprivileged local users to gain root privileges and weaken container isolation
π’ AutoCAD Users may have a ransomware problem β here's what they can do π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
A new malware family is currently using the same file types as the professional design software AutoCAD.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
AutoCAD Users may have a ransomware problem β here's what they can do
A new malware family is currently using the same file types as the professional design software AutoCAD
π’ 'It's destructive, not ransomware': Security experts weigh in on motivation behind Stryker cyber attack π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
The attack on medical tech company Stryker has severely impacted operations globally.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
'It's destructive, not ransomware': Security experts weigh in on motivation behind Stryker cyber attack
The attack on medical tech company Stryker has severely impacted operations globally
π’ The rise of PhaaS: what businesses should know π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
With phishing as a service PhaaS on the rise, which new kits should firms know about and how can leaders avoid being caught out?.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
The rise of PhaaS: what businesses should know
With phishing as a service (PhaaS) on the rise, which new kits should firms know about and how can leaders avoid being caught out?
π’ Thousands of Asus routers are being used to fuel a massive cyber crime spree π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Black Lotus Labs has spotted a massive botnet of Asus routers built by malware that uses a common peer networking tool.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Thousands of Asus routers are being used to fuel a massive cyber crime spree
Black Lotus Labs has spotted a massive botnet of Asus routers built by malware that uses a common peer networking tool
π’ How resellers can win with smarter Multi-Factor Authentication (MFA) π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Enhanced and phishingresistant MFA prevents MFA bombing andfatigue.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ChannelPro
How resellers can win with smarter Multi-Factor Authentication (MFA)
Enhanced and phishing-resistant MFA prevents MFA bombing andfatigue
π’ Sectigo taps Clint Maddox to lead global field operations π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
The appointment follows a year of strong momentum for the security vendor as it expands its global channel footprint.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ChannelPro
Sectigo taps Clint Maddox to lead global field operations
The appointment follows a year of strong momentum for the security vendor as it expands its global channel footprint
π’ The rise of teen hackers βmakes for a good headlineβ, but cyber crime activities peak later in life π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
With family responsibilities and mortgages to pay, it's not teenagers dishing out malware or carrying out cyber extortion.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
The rise of teen hackers βmakes for a good headlineβ, but cyber crime activities peak later in life
With family responsibilities and mortgages to pay, it's not teenagers dishing out malware or carrying out cyber extortion
π1