π ShinyHunters Escalates Canvas Extortion with School by School Ransom Campaign π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
ShinyHunters has escalated its Canvas extortion campaign, defacing hundreds of school login pages and threatening to leak stolen data unless institutions negotiate.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
π Zara Data Breach Impacts Nearly 200,000 Customers π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
ShinyHunters gets away with emails and other data on 200,000 Zara customers.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
π Police Shut Relaunched Crimenetwork Dark Web Marketplace π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Spanish police have arrested the suspected administrator of German dark web marketplace Crimenetwork.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
π US: FCC Relaxes Foreign-Made Router Ban to Allow for Security Updates π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The same extension applies to security updates shipped to USbased users of foreignmade drones.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
π’ Two US nationals sentenced for role in prolific fake worker laptop farms π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
The Americans were raising money for the North Korean regime by allowing fake IT workers to appear as legitimate USbased employees.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Two US nationals sentenced for role in prolific fake worker laptop farms
The Americans were raising money for the North Korean regime by allowing fake IT workers to appear as legitimate US-based employees
ποΈ Your Purple Team Isn't Purple β It's Just Red and Blue in the Same Room ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Defending a network at 2 am looks a lot like this an analyst copypasting a hash from a PDF into a SIEM query. A red team script is being rewritten by hand so the blue team can use it. A patch waiting on a changeapproval window that's longer than the exploitation window itself. Nobody in that chain is incompetent. Every human is doing their job correctly. The problem is the system, its.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π’ What businesses need to know about the update to Cyber Essentials π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Cyber Essentials was updated this April what are the key changes?.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
What businesses need to know about the update to Cyber Essentials
Cyber Essentials was updated this April β what are the key changes?
π Hackers Observed Using AI to Develop Zero-Day for the First Time π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Google Threat Intelligence Group details how cybercriminals attempted to launch a campaign based around an AIdeveloped ZeroDay targeting opensource software.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
ποΈ β‘ Weekly Recap: Linux Rootkit, macOS Crypto Stealer, WebSocket Skimmers and More ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Rough Monday. Somebody poisoned a trusted download again, somebody else turned cloud servers into public housing, and a few crews are still getting into boxes with bugs that shouldve died years ago the same old holes, same lazy access paths, same how the hell is this still open feeling. One report this week basically reads like a guy tripped over root access by accident and decided to stay.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π Fake Claude Code Page Pushes PowerShell Stealer at Devs π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Ontinue uncovers fake Claude Code installer pushing PowerShell stealer abusing Chrome's IElevator2.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
π Rushed Patches Follow Broken Embargo on New Linux Kernel Vulnerabilities π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Two new highseverity vulnerabilities, dubbed Dirty Frag when chained, have been found in the Linux kernel, affecting most Linux distributions.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
π’ Google says AI is now being used to build zero-days β and we just narrowly avoided a 'mass exploitation event' π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Google cyber researchers think theyve found the first AIgenerated zeroday exploit.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Google says AI is now being used to build zero-days β and we just narrowly avoided a 'mass exploitation event'
Google cyber researchers think theyβve found the first AI-generated zero-day exploit
π¦Ώ What It Costs to Hire a Hacker on the Dark Web in 2026 π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
See how much it costs to hire a hacker or buy data on the Dark Web in 2026. The post What It Costs to Hire a Hacker on the Dark Web in 2026 appeared first on TechRepublic.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
What It Costs to Hire a Hacker on the Dark Web
The cost to hire a hacker can be incredibly cheap. Use this cybersecurity guide to learn about the major activities of hackers.