๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News
25.8K subscribers
89.2K links
๐Ÿ—ž The finest daily news on cybersecurity and privacy.

๐Ÿ”” Daily releases.

๐Ÿ’ป Is your online life secure?

๐Ÿ“ฉ lalilolalo.dev@gmail.com
Download Telegram
๐Ÿ“” UK: Education Sector Faces Surge in Cyber Breaches Despite Stable National Threat Levels ๐Ÿ“”

The British public education sector has faced the nations most dramatic increase in cyber breach prevalence over the past year.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿฆ… The Week in Vulnerabilities: GitHub Enterprise, Argo CD, Oracle Identity Manager, and Mozilla Security Flaws ๐Ÿฆ…

The latest weekly vulnerability Insights report to clients by Cyble provides a detailed view of vulnerabilities tracked between April 15, 2026, and April 21, 2026. The findings highlight a slight dip in overall disclosures compared to the previous week, but the persistence of active exploitation and evidence of realworld attacks continues to target enterprise, cloud, and opensource ecosystems.  During this reporting period, Cybles Vulnerability Intelligence module tracked 1,095 vulnerabilities, reflecting a decrease in volume after last weeks spike. However, the reduced number does not indicate lower risk. In fact, the presence of over 91 vulnerabilities with publicly available ProofofConcept PoC exploits increases the likelihood of rapid weaponization and exploitation in realworld ...

๐Ÿ“– Read more.

๐Ÿ”— Via "CYBLE"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“” CISA and Partners Publish Zero Trust Guidance For OT Security ๐Ÿ“”

A new CISAled guide explains how zerotrust security can be applied to operational technology, balancing cyber defence with safety and system availability.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
โ™Ÿ๏ธ Anti-DDoS Firm Heaped Attacks on Brazilian ISPs โ™Ÿ๏ธ

A Brazilian tech firm that specializes in protecting networks from distributed denialofservice DDoS attacks has been enabling a botnet responsible for an extended campaign of massive DDoS attacks against other network operators in Brazil, KrebsOnSecurity has learned. The firm's chief executive says the malicious activity resulted from a security breach and was likely the work of a competitor trying to tarnish his company's public image.

๐Ÿ“– Read more.

๐Ÿ”— Via "Krebs on Security"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ–‹๏ธ ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories ๐Ÿ–‹๏ธ

The internet is noisy this week. We are seeing some wild new tactics, like people using fake cell towers to send scam texts, while some developers are accidentally downloading tools that peek into their private files during a simple install. It is definitely a busy time to be online. Security is always a moving target. Millions of servers are currently sitting online without any passwords, and.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ”ฅ1
๐Ÿ“” Deep#Door Python Backdoor Evades Detection On Windows ๐Ÿ“”

DeepDoor Python RAT uses tunneling and obfuscation to evade detection and steal credentials.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿฆ… Cyble Named a Challenger in the 2026 Gartnerยฎ Magic Quadrantโ„ข for Cyber Threat Intelligence ๐Ÿฆ…

Recognized for Completeness of Vision and Ability to Execute We are excited to share that Cyble has been recognized as a Challenger in the 2026 Gartner Magic Quadrant for Cyber Threat Intelligence. Check back for a complimentary copy of the full report soon! In our view, this recognition reflects what we hear from the security The post Cyble Named a Challenger in the 2026 Gartner Magic Quadrant for Cyber Threat Intelligence appeared first on Cyble.

๐Ÿ“– Read more.

๐Ÿ”— Via "CYBLE"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
โค1
๐Ÿ–‹๏ธ Phishing Campaign Hits 80+ Orgs Using SimpleHelp and ScreenConnect RMM Tools ๐Ÿ–‹๏ธ

An active phishing campaign has been observed targeting multiple vectors since at least April 2025 with legitimate Remote Monitoring and Management RMM software as a way to establish persistent remote access to compromised hosts. The activity, codenamed VENOMOUSHELPER, has impacted over 80 organizations, most of which are in the U.S., according to Securonix. It shares overlaps with clusters.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ–‹๏ธ Phishing Campaign Hits 80+ Orgs Using SimpleHelp and ScreenConnect RMM Tools ๐Ÿ–‹๏ธ

An active phishing campaign has been observed targeting multiple vectors since at least April 2025 with legitimate Remote Monitoring and Management RMM software as a way to establish persistent remote access to compromised hosts. The activity, codenamed VENOMOUSHELPER, has impacted over 80 organizations, most of which are in the U.S., according to Securonix. It shares overlaps with clusters.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿฆฟ Microsoft Defender Bug Triggers False Malware Alerts for DigiCert Certificates ๐Ÿฆฟ

Microsoft fixed a Defender false positive that flagged legitimate DigiCert certificates as malware, disrupting Windows trust stores for some IT teams. The post Microsoft Defender Bug Triggers False Malware Alerts for DigiCert Certificates appeared first on TechRepublic.

๐Ÿ“– Read more.

๐Ÿ”— Via "Tech Republic"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“” Small Defense Firms Lack Network Data to Stop Nation-State Hackers, Analyst Says ๐Ÿ“”

Team Cymrus Stephen Campbell warned that small US defense contractors are not well prepared to face cyber intrusions through edge devices.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“” Small Defense Firms Lack Network Data to Stop Nation-State Hackers, Analyst Says ๐Ÿ“”

Team Cymrus Stephen Campbell warned that small US defense contractors are not well prepared to face cyber intrusions through edge devices.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“” Small Defense Firms Lack Network Data to Stop Nation-State Hackers, Analyst Says ๐Ÿ“”

Team Cymrus Stephen Campbell warned that small US defense contractors are not well prepared to face cyber intrusions through edge devices.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ–‹๏ธ Phishing Campaign Hits 80+ Orgs Using SimpleHelp and ScreenConnect RMM Tools ๐Ÿ–‹๏ธ

An active phishing campaign has been observed targeting multiple vectors since at least April 2025 with legitimate Remote Monitoring and Management RMM software as a way to establish persistent remote access to compromised hosts. The activity, codenamed VENOMOUSHELPER, has impacted over 80 organizations, most of which are in the U.S., according to Securonix. It shares overlaps with clusters.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“” Small Defense Firms Lack Network Data to Stop Nation-State Hackers, Analyst Says ๐Ÿ“”

Team Cymrus Stephen Campbell warned that small US defense contractors are not well prepared to face cyber intrusions through edge devices.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“” Small Defense Firms Lack Network Data to Stop Nation-State Hackers, Analyst Says ๐Ÿ“”

Team Cymrus Stephen Campbell warned that small US defense contractors are not well prepared to face cyber intrusions through edge devices.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ–‹๏ธ Progress Patches Critical MOVEit Automation Bug Enabling Authentication Bypass ๐Ÿ–‹๏ธ

Progress Software has released updates to address two security flaws in MOVEit Automation, including a critical bug that could result in an authentication bypass. MOVEit Automation formerly Central is a secure, serverbased managed file transfer MFT solution used to schedule and automate file movement workflows in enterprise environments without requiring any custom scripts.  The.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿฆฟ 5 Best VPNs for Android in 2026 ๐Ÿฆฟ

Explore the best VPNs for Android devices in 2026. Find out which VPN offers the best security, speed and features for your Android device. The post 5 Best VPNs for Android in 2026 appeared first on TechRepublic.

๐Ÿ“– Read more.

๐Ÿ”— Via "Tech Republic"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ–‹๏ธ Progress Patches Critical MOVEit Automation Bug Enabling Authentication Bypass ๐Ÿ–‹๏ธ

Progress Software has released updates to address two security flaws in MOVEit Automation, including a critical bug that could result in an authentication bypass. MOVEit Automation formerly Central is a secure, serverbased managed file transfer MFT solution used to schedule and automate file movement workflows in enterprise environments without requiring any custom scripts.  The.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“” Small Defense Firms Lack Network Data to Stop Nation-State Hackers, Analyst Says ๐Ÿ“”

Team Cymrus Stephen Campbell warned that small US defense contractors are not well prepared to face cyber intrusions through edge devices.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“” Small Defense Firms Lack Network Data to Stop Nation-State Hackers, Analyst Says ๐Ÿ“”

Team Cymrus Stephen Campbell warned that small US defense contractors are not well prepared to face cyber intrusions through edge devices.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity