πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ Organizations hit by 90 zero-day vulnerabilities last year πŸ“’

Google Threat Intelligence researchers warn that edge devices and security appliances are prime entry points.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Iran's MuddyWater Hackers Hit US Firms with New 'Dindoor' Backdoor πŸ“”

A bank, an airport, a nonprofit and the Israeli branch of a US software company were among the targets of this new MuddyWater campaign.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 FBI Investigates Suspicious Activity in Surveillance Platform 🦿

The FBI is investigating suspicious cyber activity in a system used to process surveillance and wiretap warrants, raising concerns about security risks to sensitive data. The post FBI Investigates Suspicious Activity in Surveillance Platform appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 LexisNexis Hack Exposes 3.9M Records Through Unpatched React Vulnerability 🦿

LexisNexis confirmed a data breach after hackers leaked stolen files, with attackers claiming they exploited the React2Shell vulnerability. The post LexisNexis Hack Exposes 3.9M Records Through Unpatched React Vulnerability appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🀯1
🦿 Bitwarden Brings Passkey Logins to Windows 11, Expanding Passwordless Sign-Ins 🦿

Bitwarden now supports passkey logins on Windows 11 for Microsoft Entra ID users, extending passwordless signins to device authentication. The post Bitwarden Brings Passkey Logins to Windows 11, Expanding Passwordless SignIns appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ–‹οΈ Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting India πŸ–‹οΈ

The Pakistanaligned threat actor known as Transparent Tribe has become the latest hacking group to embrace artificial intelligence AIpowered coding tools to strike targets with various implants. The activity is designed to produce a "highvolume, mediocre mass of implants" that are developed using lesserknown programming languages like Nim, Zig, and Crystal and rely on trusted services like.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT πŸ–‹οΈ

Cybersecurity researchers have disclosed details of a multistage malware campaign that uses batch scripts as a pathway to deliver various encrypted remote access trojan RATs payloads that correspond to XWorm, AsyncRAT, and Xeno RAT. The stealthy attack chain has been codenamed VOIDGEIST by Securonix Threat Research. At a high level, the obfuscated batch script is used to deploy a second.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸš€ What cybersecurity actually does for your business πŸš€

The ability to continue operating safely in an unsafe environment where competitors cannot is a competitive advantage that is rarely measured or discussed.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
❀2
πŸ–‹οΈ OpenAI Codex Security Scanned 1.2 Million Commits and Found 10,561 High-Severity Issues πŸ–‹οΈ

OpenAI on Friday began rolling out Codex Security, an artificial intelligence AIpowered security agent that's designed to find, validate, and propose fixes for vulnerabilities. The feature is available in a research preview to ChatGPT Pro, Enterprise, Business, and Edu customers via the Codex web with free usage for the next month. "It builds deep context about your project to identify.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Anthropic Finds 22 Firefox Vulnerabilities Using Claude Opus 4.6 AI Model πŸ–‹οΈ

Anthropic on Friday said it discovered 22 new security vulnerabilities in the Firefox web browser as part of a security partnership with Mozilla. Of these, 14 have been classified as high, seven have been classified as moderate, and one has been rated low in severity. The issues were addressed in Firefox 148, released late last month. The vulnerabilities were identified over a twoweek period in.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ How AI Assistants are Moving the Security Goalposts β™ŸοΈ

AIbased assistants or "agents" autonomous programs that have access to the user's computer, files, online services and can automate virtually any task are growing in popularity with developers and IT workers. But as so many eyebrowraising headlines over the past few weeks have shown, these powerful and assertive new tools are rapidly shifting the security priorities for organizations, while blurring the lines between data and code, trusted coworker and insider threat, ninja hacker and novice code jockey.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
❀3πŸ‘2
πŸ“’ Tomorrow's fraud techniques πŸ“’

Leaders need to proactive as attackers launch more consistent, sophisticated attacks.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Interpol teams up with tech firms to seize 45,000 malicious IPs, servers in global cyber crime crackdown πŸ“’

Operation Synergia III saw 94 arrests and counting with malicious IP addresses used in phishing and fraud schemes seized.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Alert issued over critical vulnerabilities in Linux’s AppArmor security layer – more than 12 million enterprise systems are at risk of root access πŸ“’

Researchers have warned Linux flaws allow unprivileged local users to gain root privileges and weaken container isolation.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ AutoCAD Users may have a ransomware problem – here's what they can do πŸ“’

A new malware family is currently using the same file types as the professional design software AutoCAD.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ 'It's destructive, not ransomware': Security experts weigh in on motivation behind Stryker cyber attack πŸ“’

The attack on medical tech company Stryker has severely impacted operations globally.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ The rise of PhaaS: what businesses should know πŸ“’

With phishing as a service PhaaS on the rise, which new kits should firms know about and how can leaders avoid being caught out?.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Thousands of Asus routers are being used to fuel a massive cyber crime spree πŸ“’

Black Lotus Labs has spotted a massive botnet of Asus routers built by malware that uses a common peer networking tool.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ How resellers can win with smarter Multi-Factor Authentication (MFA) πŸ“’

Enhanced and phishingresistant MFA prevents MFA bombing andfatigue.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Sectigo taps Clint Maddox to lead global field operations πŸ“’

The appointment follows a year of strong momentum for the security vendor as it expands its global channel footprint.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ The rise of teen hackers β€˜makes for a good headline’, but cyber crime activities peak later in life πŸ“’

With family responsibilities and mortgages to pay, it's not teenagers dishing out malware or carrying out cyber extortion.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1