πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.5K subscribers
88.9K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” Iran-Linked Pay2Key Ransomware Group Re-Emerges πŸ“”

Halcyon and Beazley Security track the return of Iranian ransomware group Pay2Key.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Invoice Fraud Costs UK Construction Sector Millions, NCA Warns πŸ“”

The National Crime Agency has warned construction firms about surging invoice fraud.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… The Energy Sector’s Ransomware Nightmare: Why Critical Infrastructure Can’t Catch a Break πŸ¦…

Let's talk about the sector that keeps our lights on, water running, and industries hummingand why it's become ransomware's favorite target.  In 2025, the global energy and utilities sector faced 187 confirmed ransomware attacks. Not attempts. Confirmed, successful intrusions where attackers locked systems, stole data, and demanded payment. And that's just what we know about.  If you think that number sounds alarming, you're paying attention.  When Ransomware Hits Where It Hurts  Here's the thing about attacking energy infrastructure the impact cascades. When ransomware paralyzed Halliburton's operations in August 2025, the company disclosed a 35 million loss. When hackers using FrostyGoop malware hit a Ukrainian municipal energy company, residents in Lviv lost heating during ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Attackers Rapidly Weaponize Critical Oracle WebLogic RCE, Honeypot Study Finds πŸ“”

Attackers rapidly exploited a critical Oracle WebLogic RCE flaw the same day exploit code was released, according to a CloudSEK honeypot study.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 TP-Link Fixes Bug That Lets Hackers Take Over Routers Without a Password 🦿

TPLink patched highseverity Archer NX router flaws, including one that could let attackers upload rogue firmware without authentication. The post TPLink Fixes Bug That Lets Hackers Take Over Routers Without a Password appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 The Next Billion Users Won’t Be Human: Securing the Agentic Enterprise 🦿

Menlo Securitys Ramin Farassat speaks with TechRepublic about how browserbased controls can protect AI agents from prompt injection and other fastscaling enterprise risks. The post The Next Billion Users Wont Be Human Securing the Agentic Enterprise appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Security Researchers Sound the Alarm on Vulnerabilities in AI-Generated Code πŸ“”

Security researchers from Georgia Tech have observed a surge in reported CVEs for which the flaw was introduced by AIgenerated code.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks πŸ–‹οΈ

A longterm and ongoing campaign attributed to a Chinanexus threat actor has embedded itself in telecom networks to conduct espionage against government networks. The strategic positioning activity, which involves implanting and maintaining stealthy access mechanisms within critical environments, has been attributed to Red Menshen, a threat cluster that's also tracked as Earth Bluecrow,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Millions of UK iPhone Users Will Need to Verify Their Age β€” Here’s Why 🦿

Apples latest iOS update adds some new features and fixes several bugs but it also introduces mandatory age verification for users in the United Kingdom. The post Millions of UK iPhone Users Will Need to Verify Their Age Heres Why appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Microsoft 365 Under Siege: Phishing Campaign Bypasses MFA Across 5 Countries 🦿

A global phishing campaign targeting Microsoft 365 bypasses security codes using a legitimate login feature, impacting hundreds of organizations. The post Microsoft 365 Under Siege Phishing Campaign Bypasses MFA Across 5 Countries appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ AI challenges mean it's time to shine for cyber professionals – but they need a helping hand πŸ“’

Keep your security pros close, you never know when youll need them to solve an AIrelated crisis.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ March rundown: RSAC warnings and Arm's AGI CPU πŸ“’

AI agents are complicating the jobs of cyber professionals.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Google just revised its β€˜Q-Day’ timeline: Quantum computers could break existing encryption techniques within three years – and enterprises are nowhere near ready πŸ“’

Google has warned that QDay, the point where a quantum computer is powerful enough to crack current encryption techniques, could come as soon as 2029.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ OpenAI is cracking down on AI misuse with a new bug bounty program πŸ“’

Submissions don't have to be security vulnerabilities, OpenAI says, just the potential to cause material harm.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Google Issues High-Risk Security Patch for 3.5 Billion Chrome Users: What You Need to Know 🦿

Google patches eight highseverity Chrome vulnerabilities affecting 3.5 billion users. Heres why you should update and relaunch your browser now. The post Google Issues HighRisk Security Patch for 3.5 Billion Chrome Users What You Need to Know appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Open VSX Bug Let Malicious VS Code Extensions Bypass Pre-Publish Security Checks πŸ–‹οΈ

Cybersecurity researchers have disclosed details of a nowpatched bug impacting Open VSX's prepublish scanning pipeline to cause the tool to allow a malicious Microsoft Visual Studio Code VS Code extension to pass the vetting process and go live in the registry. "The pipeline had a single boolean return value that meant both 'no scanners are configured' and 'all scanners failed to run,'" Koi.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ AitM Phishing Targets TikTok Business Accounts Using Cloudflare Turnstile Evasion πŸ–‹οΈ

Threat actors are using adversaryinthemiddle AitM phishing pages to seize control of TikTok for Business accounts in a new campaign, according to a report from Push Security. Business accounts associated with social media platforms are a lucrative target, as they can be weaponized by bad actors for malvertising and distributing malware. "TikTok has been historically abused to distribute.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ We Are At War πŸ–‹οΈ

Rising geopolitical tensions are reflected or in some cases preceded by cyber operations, while technology itself has become politicized. Lets admit it we are in the middle of it.  Introduction One tech power to rule them all is a thing of the past  The relative safety, peace and prosperity that much of the world has enjoyed since 1945 was not accidental. It emerged from the ashes.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Bearlyfy Hits Russian Firms with Custom GenieLocker Ransomware πŸ–‹οΈ

A proUkrainian group called Bearlyfy has been attributed to more than 70 cyber attacks targeting Russian companies since it first surfaced in the threat landscape in January 2025, with recent attacks leveraging a custom Windows ransomware strain codenamed GenieLocker. "Bearlyfy also known as Labubu operates as a dualpurpose group aimed at inflicting maximum damage upon Russian businesses.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ LangChain, LangGraph Flaws Expose Files, Secrets, Databases in Widely Used AI Frameworks πŸ–‹οΈ

Cybersecurity researchers have disclosed three security vulnerabilities impacting LangChain and LangGraph that, if successfully exploited, could expose filesystem data, environment secrets, and conversation history. Both LangChain and LangGraph are opensource frameworks that are used to build applications powered by Large Language Models LLMs. LangGraph is built on the foundations of.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” TeamPCP Targets Telnyx Package in Latest PyPI Software Supply Chain Attack πŸ“”

Socket and Endor Labs discovered a new TeamPCP campaign leading to the delivery of credentialstealing malware.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity