πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.4K subscribers
88.9K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🦿 Nearly 7M Email Addresses Exposed in Crunchyroll Third-Party Breach 🦿

Hackers claim they stole 6.8 million Crunchyroll email addresses through a thirdparty vendor breach, exposing support ticket data and other user details. The post Nearly 7M Email Addresses Exposed in Crunchyroll ThirdParty Breach appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 4 Best Free VPNs in 2026 🦿

Looking for the best free VPNs? Check out our guide to find the most reliable and secure options for protecting your online privacy that wont break the bank. The post 4 Best Free VPNs in 2026 appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ LeakBase Admin Arrested in Russia Over Massive Stolen Credential Marketplace πŸ–‹οΈ

The alleged administrator of the LeakBase cybercrime forum has been arrested by Russian law enforcement authorities, state media reported Thursday. According to TASS and MVD Media, a news website linked to the Russian Interior Ministry, the suspect is a resident of the city of Taganrog. The suspect is said to have been detained for creating and managing a criminal site that allowed stolen.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ GlassWorm Malware Uses Solana Dead Drops to Deliver RAT and Steal Browser, Crypto Data πŸ–‹οΈ

Cybersecurity researchers have flagged a new evolution of the GlassWorm campaign that delivers a multistage framework capable of comprehensive data theft and installing a remote access trojan RAT, which deploys an informationstealing Google Chrome extension masquerading as an offline version of Google Docs. "It logs keystrokes, dumps cookies and session tokens, captures screenshots, and.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ The Kill Chain Is Obsolete When Your AI Agent Is the Threat πŸ–‹οΈ

In September 2025, Anthropic disclosed that a statesponsored threat actor used an AI coding agent to execute an autonomous cyber espionage campaign against 30 global targets. The AI handled 8090 of tactical operations on its own, performing reconnaissance, writing exploit code, and attempting lateral movement at machine speed. This incident is worrying, but there's a scenario that should.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Russian Hacker Sentenced to 2 Years for TA551 Botnet-Driven Ransomware Attacks πŸ–‹οΈ

The U.S. Department of Justice DoJ said a Russian national has been sentenced to two years in prison for managing a botnet that was used to launch ransomware attacks against U.S. companies. Ilya Angelov, 40, of Tolyatti, Russia, was also fined 100,000. Angelov, who went by the online aliases "milan" and "okart," is said to have comanaged a Russiabased cybercriminal group known as TA551 aka.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Device Code Phishing Hits 340+ Microsoft 365 Orgs Across Five Countries via OAuth Abuse πŸ–‹οΈ

Cybersecurity researchers are calling attention to an active device code phishing campaign that's targeting Microsoft 365 identities across more than 340 organizations in the U.S., Canada, Australia, New Zealand, and Germany. The activity, per Huntress, was first spotted on February 19, 2026, with subsequent cases appearing at an accelerated pace since then. Notably, the campaign leverages.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🚨 Vulnerabilities affecting Citrix NetScaler ADC and Citrix NetScaler Gateway 🚨

UK organisations encouraged to take immediate action to mitigate two recently disclosed vulnerabilities affecting Citrix NetScaler ADC and Citrix NetScaler Gateway.

πŸ“– Read more.

πŸ”— Via "UK NCSC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Cloud Phones Linked to Rising Financial Fraud Threat πŸ“”

Cloud Android phones fuel financial fraud, evading detection and enabling dropper accounts.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Hackers Exploit Compromised Enterprise Identities at Industrial Scale, Warns SentinelOne πŸ“”

Cybersecurity companys annual report issues warning over a massmarketed impersonation crisis over attackers abusing legitimate credentials.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US: FCC Bans Foreign-Made Routers Over National Security Concerns πŸ“”

The US Federal Communications Commission has placed all consumergrade internet routers produced outside the US on its covered list.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” TeamPCP Expands Supply Chain Campaign With LiteLLM PyPI Compromise πŸ“”

Python package LiteLLM compromised with credentialstealing malware linked to TeamPCP threat group.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Experts Sound Alarm Over β€œPrompt Poaching” Browser Extensions πŸ“”

Expel has warned of malicious Chrome extensions stealing users AI conversations.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 GRC Tools vs. Compliance Platforms: Drop That Excel Table! 🌊

If you work in GRC, you know this scene intimately a shared Excel workbook, colorcoded by risk level, updated quarterly before audits, and quietly maintained by one or two people The post GRC Tools vs. Compliance Platforms Drop That Excel Table! appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… The Agentic AI Attack Surface: Prompt Injection, Memory Poisoning, and How to Defend Against Them πŸ¦…

The rise of agentic systems is changing how organizations think about defense and risk. As enterprises embrace autonomous decisionmaking, the agentic AI attack surface expands in ways that traditional security models were never designed to handle. These systems dont just process inputs they interpret goals, make decisions, and act independently. That shift introduces a new category of AI security vulnerabilities, where manipulation doesnt target code directly but the reasoning layer itself. Two new threats, prompt injection attacks and memory poisoning in AI, are quickly becoming central concerns in agentic AI security. Understanding how they work and how to defend against them is more than critical for any organization deploying autonomous systems at scale. The Expanding Agentic ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ β€˜It’s not a good look for the PC ecosystem as a whole.” HP to make fix for TPM vulnerability an industry standard πŸ“’

Just announced TPM Guard offers important protection against device data theft when attackers gain physical access.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ LiteLLM PyPI compromise: Everything we know so far πŸ“’

The TeamPCP hacking group is believed to have successfully backdoored the package to harvest credentials.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Systems are deterministic, people are probabilistic – AI is both, and that's a headache for cyber teams πŸ“’

AI combines both the risks associated with IT systems and the people using them, creating headaches for practitioners.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Tenable co-CEO Stephen Vintz says enterprises need to get serious about tackling the AI β€œresponsibility gap” πŸ“’

The Tenable chief wants a serious conversation on AI ownership and accountability.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ [Webinar] Stop Guessing. Learn to Validate Your Defenses Against Real Attacks πŸ–‹οΈ

Most teams have security tools in place. Alerts are firing, dashboards look clean, threat intel is flowing in. On the surface, everything feels under control. But one question usually stays unanswered Would your defenses actually stop a real attack? Thats where things get shaky. A control exists, so its assumed to work. A detection rule is active, so its expected to catch something. But very.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Claude Extension Flaw Enabled Zero-Click XSS Prompt Injection via Any Website πŸ–‹οΈ

Cybersecurity researchers have disclosed a vulnerability in Anthropic's Claude Google Chrome Extension that could have been exploited to trigger malicious prompts simply by visiting a web page. The flaw "allowed any website to silently inject prompts into that assistant as if the user wrote them," Koi Security researcher Oren Yomtov said in a report shared with The Hacker News. "No clicks, no.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity