πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.5K subscribers
89K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ AitM Phishing Targets TikTok Business Accounts Using Cloudflare Turnstile Evasion πŸ–‹οΈ

Threat actors are using adversaryinthemiddle AitM phishing pages to seize control of TikTok for Business accounts in a new campaign, according to a report from Push Security. Business accounts associated with social media platforms are a lucrative target, as they can be weaponized by bad actors for malvertising and distributing malware. "TikTok has been historically abused to distribute.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ We Are At War πŸ–‹οΈ

Rising geopolitical tensions are reflected or in some cases preceded by cyber operations, while technology itself has become politicized. Lets admit it we are in the middle of it.  Introduction One tech power to rule them all is a thing of the past  The relative safety, peace and prosperity that much of the world has enjoyed since 1945 was not accidental. It emerged from the ashes.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Bearlyfy Hits Russian Firms with Custom GenieLocker Ransomware πŸ–‹οΈ

A proUkrainian group called Bearlyfy has been attributed to more than 70 cyber attacks targeting Russian companies since it first surfaced in the threat landscape in January 2025, with recent attacks leveraging a custom Windows ransomware strain codenamed GenieLocker. "Bearlyfy also known as Labubu operates as a dualpurpose group aimed at inflicting maximum damage upon Russian businesses.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ LangChain, LangGraph Flaws Expose Files, Secrets, Databases in Widely Used AI Frameworks πŸ–‹οΈ

Cybersecurity researchers have disclosed three security vulnerabilities impacting LangChain and LangGraph that, if successfully exploited, could expose filesystem data, environment secrets, and conversation history. Both LangChain and LangGraph are opensource frameworks that are used to build applications powered by Large Language Models LLMs. LangGraph is built on the foundations of.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” TeamPCP Targets Telnyx Package in Latest PyPI Software Supply Chain Attack πŸ“”

Socket and Endor Labs discovered a new TeamPCP campaign leading to the delivery of credentialstealing malware.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Quantum Computing Threat to Encryption Is Closer Than Expected, Warns Google πŸ“”

QDay and the cybersecurity problems it brings could come as early as 2029 as Google accelerates its postquantum cryptography migration.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” UK Cracks Down on Chinese Crypto Marketplace for Funding Southeast Asia Scam Hubs πŸ“”

The UK government has sanctioned Xinbi, described as the secondlargest illicit online marketplace ever.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… China’s APT41 and the Expanding Enterprise Attack Surface: What Security Teams Must Prepare For πŸ¦…

The modern enterprise attack surface is no longer confined to corporate networks and endpoints it now stretches across cloud workloads, supply chains, remote devices, and even operational technology environments. Within this fragmented landscape, the activities of the APT41 threat group stand out as a signal of how hackers and adversaries are adapting. Known for blending statesponsored espionage with financially motivated operations, APT41 represents a dualpurpose threat model that security teams can no longer afford to treat as an edge case. Understanding APT41s Hybrid Threat Model Unlike many threat actors that operate with a singular objective, China APT41 cyberattacks are notable for their breadth of intent. Active since 2012, the group has consistently targeted industries r...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 AI Upgrades, Security Breaches, and Industry Shifts Define This Week in Tech 🦿

See what you missed in Daily Tech Insider from March 2327. The post AI Upgrades, Security Breaches, and Industry Shifts Define This Week in Tech appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New Wave of AiTM Phishing Targets TikTok for Business πŸ“”

Push Security has uncovered a new AiTM phishing campaign targeting TikTok for Business accounts using Google and TikTok themed login pages.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files πŸ–‹οΈ

TeamPCP, the threat actor behind the supply chain attack targeting Trivy, KICS, and litellm, has now compromised the telnyx Python package by pushing two malicious versions to steal sensitive data. The two versions, 4.87.1 and 4.87.2, published to the Python Package Index PyPI repository on March 27, 2026, concealed their credential harvesting capabilities within a .WAV file. Users are.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Apple Sends Lock Screen Alerts to Outdated iPhones Over Active Web-Based Exploits πŸ–‹οΈ

Apple is now sending Lock Screen notifications to iPhones and iPads running older versions of iOS and iPadOS to alert users of webbased attacks and urge them to install the update. The development was first reported by MacRumors. "Apple is aware of attacks targeting outofdate iOS software, including the version on your iPhone. Install this critical update to protect your iPhone," the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 AI SOC Guide: Architecture, Capabilities, Pricing, and Migration Playbook 🌊

AI SOC guide autonomous triage, humanAI collaboration, compliance automation, and realworld use cases. Built for IT Directors. Discover how. The post AI SOC Guide Architecture, Capabilities, Pricing, and Migration Playbook  appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
❀2
πŸ–‹οΈ Iran-Linked Hackers Breach FBI Director’s Personal Email, Hit Stryker With Wiper Attack πŸ–‹οΈ

Threat actors with ties to Iran successfully broke into the personal email account of Kash Patel, the director of the U.S. Federal Bureau of Investigation FBI, and leaked a cache of photos and other documents to the internet. Handala Hack Team, which carried out the breach, said on its website that Patel "will now find his name among the list of successfully hacked victims." In a statement.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Iran-Linked Hackers Breach FBI Director’s Personal Email, Hit Stryker With Wiper Attack πŸ–‹οΈ

Threat actors with ties to Iran successfully broke into the personal email account of Kash Patel, the director of the U.S. Federal Bureau of Investigation FBI, and leaked a cache of photos and other documents to the internet. Handala Hack Team, which carried out the breach, said on its website that Patel "will now find his name among the list of successfully hacked victims." In a statement.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Citrix NetScaler Under Active Recon for CVE-2026-3055 (CVSS 9.3) Memory Overread Bug πŸ–‹οΈ

A recently disclosed critical security flaw impacting Citrix NetScaler ADC and NetScaler Gateway is witnessing active reconnaissance activity, according to Defused Cyber and watchTowr. The vulnerability, CVE20263055 CVSS score 9.3, refers to a case of insufficient input validation leading to memory overread, which an attacker could exploit to leak potentially sensitive information. Per.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ TA446 Deploys DarkSword iOS Exploit Kit in Targeted Spear-Phishing Campaign πŸ–‹οΈ

Proofpoint has disclosed details of a targeted email campaign in which threat actors with ties to Russia are leveraging the recently disclosed DarkSword exploit kit to target iOS devices. The activity has been attributed with high confidence to the Russian statesponsored threat group known as TA446, which is also tracked by the broader cybersecurity community under the monikers Callisto,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ–‹οΈ CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation πŸ–‹οΈ

The U.S. Cybersecurity and Infrastructure Security Agency CISA on Friday added a critical security flaw impacting F5 BIGIP Access Policy Manager APM to its Known Exploited Vulnerabilities KEV catalog, citing evidence of active exploitation. The vulnerability in question is CVE202553521 CVSS v4 score 9.3, which could allow a threat actor to achieve remote code execution. "When a.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ OpenAI Patches ChatGPT Data Exfiltration Flaw and Codex GitHub Token Vulnerability πŸ–‹οΈ

A previously unknown vulnerability in OpenAI ChatGPT allowed sensitive conversation data to be exfiltrated without user knowledge or consent, according to new findings from Check Point. "A single malicious prompt could turn an otherwise ordinary conversation into a covert exfiltration channel, leaking user messages, uploaded files, and other sensitive content," the cybersecurity company said in.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Cybercriminals Exploit Tax Season With New Phishing Tactics πŸ“”

Taxseason phishing floods deliver RMM malware, credential theft, BEC and taxform scams.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
❀2
🦿 Android Alert: 50 Google Play Apps Linked to β€˜NoVoice’ Malware Reached 2.3M Downloads 🦿

NoVoice malware was found in 50 Android apps on Google Play, with 2.3 million downloads, by bypassing detection and targeting outdated devices. The post Android Alert 50 Google Play Apps Linked to NoVoice Malware Reached 2.3M Downloads appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity