πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🦿 What It Costs to Hire a Hacker on the Dark Web in 2026 🦿

See how much it costs to hire a hacker or buy data on the Dark Web in 2026. The post What It Costs to Hire a Hacker on the Dark Web in 2026 appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Preparing for identity attacks: what steps do you need to take? πŸ“’

User identities are at risk can you help your customers keep up with security in their fragmented environments?.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Instructure chose to a pay ransom following the Canvas cyber attack – research shows more than half of security leaders would follow suit πŸ“’

Opting to pay ransoms creates huge risks for enterprises youre relying on the word of criminals.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Enterprises are slacking on MySQL database security, and it could come back to haunt them πŸ“’

Poor database security practices are leaving organizations at huge risk of compromise.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Microsoft’s Patch Tuesday Update Targets 120 Security Flaws 🦿

Microsofts May Patch Tuesday fixes 120 flaws, including 31 remote code execution bugs, with no zerodays reported at release. The post Microsofts Patch Tuesday Update Targets 120 Security Flaws appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Google Launches New Android Security Features to Fight Scams, Theft 🦿

Google detailed Android security updates for 2026, including verified bank calls, stronger theft protection, OTP hiding, and spyware forensics. The post Google Launches New Android Security Features to Fight Scams, Theft appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Hackers Claim 11M Files Stolen From Foxconn, Supplier to Apple and Nvidia 🦿

Foxconn confirmed a North American cyberattack after Nitrogen claimed it had stolen 11M files tied to major tech customer projects. The post Hackers Claim 11M Files Stolen From Foxconn, Supplier to Apple and Nvidia appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Canvas Breach Hackers Reach Deal After Claiming 275M Records Stolen 🦿

Instructure reached a deal with the Canvas hackers after they claimed to have stolen data tied to nearly 9,000 schools and 275 million people. The post Canvas Breach Hackers Reach Deal After Claiming 275M Records Stolen appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Fragnesia Linux Kernel LPE Grants Root Access via Page Cache Corruption πŸ–‹οΈ

Details have emerged about a new variant of the recent Dirty Frag Linux local privilege escalation LPE vulnerability that allows local attackers to gain root access, making it the third such bug to be identified in the kernel within a span of two weeks. Codenamed Fragnesia, the security vulnerability is tracked as CVE202646300 CVSS score 7.8 and is rooted in the Linux kernel's XFRM.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ 18-Year-Old NGINX Rewrite Module Flaw Enables Unauthenticated RCE πŸ–‹οΈ

Cybersecurity researchers have disclosed multiple security vulnerabilities impacting NGINX Plus and NGINX Open, including a critical flaw that remained undetected for 18 years. The vulnerability, discovered by depthfirst, is a heap buffer overflow issue impacting ngxhttprewritemodule CVE202642945, CVSS v4 score 9.2 that could allow an attacker to achieve remote code execution or cause a.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Microsoft's MDASH AI System Finds 16 Windows Flaws Fixed in Patch Tuesday πŸ–‹οΈ

Microsoft has unveiled a new multimodel artificial intelligence AIdriven system called MDASH to facilitate vulnerability discovery and remediation at scale, adding that it's being tested by some customers as part of a limited private preview. MDASH, short for multimodel agentic scanning harness, is designed as a modelagnostic system that uses bespoke AI agents for different vulnerability.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Azerbaijani Energy Firm Hit by Repeated Microsoft Exchange Exploitation πŸ–‹οΈ

A threat actor with affiliations to China has been linked to a "multiwave intrusion" targeting an unnamed Azerbaijani oil and gas company between late December 2025 and late February 2026, marking an expansion of its targeting. The activity has been attributed by Bitdefender with moderatetohigh confidence to a hacking group known as FamousSparrow aka UAT9244, which shares some level of.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ [Webinar] How Modern Attack Paths Cross Code, Pipelines, and Cloud πŸ–‹οΈ

TLDR Stop chasing thousands of "toast" alerts. Join experts from Wiz to learn how hackers connect tiny flaws to build a "Lethal Chain" to your dataand how to break it. Register for the Strategic Briefing Here. Most security tools work like a smoke alarm that goes off every time you burn a piece of toast. You get so many alerts that you eventually start to ignore them. The real danger? While.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Most Remediation Programs Never Confirm the Fix Actually Worked πŸ–‹οΈ

Security teams have never had better visibility into their environments and never been worse at confirming what they fix stays fixed. Mandiant's MTrends 2026 report puts the mean time to exploit at an estimated negative seven days. The Verizon 2025 DBIR puts median time to remediate edge device vulnerabilities at 32 days. These numbers have understandably driven the industry toward a clear.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Microsoft Patches 138 Vulnerabilities, Including DNS and Netlogon RCE Flaws πŸ–‹οΈ

Microsoft on Tuesday released patches for 138 security vulnerabilities spanning its product portfolio, although none of them have been listed as publicly known or under active attack. Of the 138 flaws, 30 are rated Critical, 104 are rated Important, three are rated Moderate, and one is rated Low in severity. As many as 61 vulnerabilities are classified as privilege escalation bugs, followed by.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ GemStuffer Abuses 150+ RubyGems to Exfiltrate Scraped U.K. Council Portal Data πŸ–‹οΈ

Cybersecurity researchers are calling attention to a new campaign dubbed GemStuffer that has targeted the RubyGems repository with more than 150 gems that use the registry as a data exfiltration channel rather than for malware distribution. "The packages do not appear designed for mass developer compromise," Socket said. "Many have little or no download activity, and the payloads are repetitive,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Android Adds Intrusion Logging for Sophisticated Spyware Forensics πŸ–‹οΈ

Google on Tuesday unveiled a new optin Android feature called Intrusion Logging for storing forensic logs to better analyze sophisticated spyware attacks. Intrusion Logging, available as part of Advanced Protection Mode, enables "persistent and privacypreserving forensics logging to allow for investigation of devices in the event of a suspected compromise," the company said. The feature, it.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Canvas Owner Reaches Agreement With Cybercriminals After Ransomware Attack πŸ“”

Instructure says it reached an agreement with ShinyHunters over the Canvas breach data.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Avada Builder Flaws Expose One Million WordPress Sites πŸ“”

Avada Builder flaws allowed file read and SQL injection on one million WordPress sites.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Ransomware: Over Half of CISOs Would Consider Paying Ransom to Hackers πŸ“”

Survey of cybersecurity leaders suggests that majority would strongly consider paying cybercriminals, if thats what it took to help restore encrypted systems.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Global Cyber Agencies Issue New SBOMs for AI Guidance to Tackle AI Supply Chain Risks πŸ“”

The G7 Cybersecurity Working Group releases new SBOM for AI guidance, outlining seven key data clusters to boost transparency and security across AI supply chains.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity