πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ PraisonAI CVE-2026-44338 Auth Bypass Targeted Within Hours of Disclosure πŸ–‹οΈ

Threat actors have been observed attempting to exploit a recently disclosed security vulnerability in PraisonAI, an opensource multiagent orchestration framework, within four hours of public disclosure. The vulnerability in question is CVE202644338 CVSS score 7.3, a case of missing authentication that exposes sensitive endpoints to anyone, potentially allowing an attacker to invoke the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ How AI Hallucinations Are Creating Real Security Risks πŸ–‹οΈ

AI hallucinations are introducing serious security risks into critical infrastructure decisionmaking by exploiting human trust through highly confident yet incorrect outputs. When an AI model lacks certainty, it doesnt have a mechanism to recognize that. Instead, it generates the most probable response based on patterns in its training data, even if that response is inaccurate. These outputs.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New Fragnesia Flaw Hands Linux Local Users Root Access πŸ“”

New Fragnesia kernel flaw lets unprivileged local users escalate to root on Linux systems.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Google Launches Android Spyware Forensics Tool for High-Risk Users πŸ“”

Googles Android Advanced Protection Mode is getting a new feature allowing trusted security experts to investigate potential spyware infections.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Ghostwriter Targets Ukrainian Government With Geofenced PDF Phishing, Cobalt Strike πŸ–‹οΈ

The Belarusaligned threat group known as Ghostwriter has been attributed to a fresh set of attacks targeting governmental organizations in Ukraine. Active since at least 2016, Ghostwriter has been linked to both cyber espionage and influence operations targeting neighboring countries, particularly Ukraine. It's also tracked under the monikers FrostyNeighbor, PUSHCHA, Storm0257, TA445, UAC0057.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ What is continuous authentication? πŸ“’

Learn how continuous authentication minimizes the risk of account takeover or misuse.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Apple’s iPhone Privacy Feature Expands to More Users Worldwide 🦿

Apple expanded Limit Precise Location in iOS 26.5, but the carrier privacy feature still requires select iPhones and iPads. The post Apples iPhone Privacy Feature Expands to More Users Worldwide appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Mustang Panda Linked to Updated FDMTP Backdoor in Asia-Pacific Espionage Campaign πŸ“”

Mustang Panda campaign deploys updated FDMTP backdoor against AsiaPacific and Japan networks.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 Anatomy of a Targeted Phishing Attack: How We Caught a DocuSign Impersonation Campaign 🌊

Not all phishing emails are created equal. While most organizations deal with massblast spam that security tools catch routinely, targeted phishing, also known as spear phishing, is a different beast The post Anatomy of a Targeted Phishing Attack How We Caught a DocuSign Impersonation Campaign appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Cisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Access πŸ–‹οΈ

Cisco has released updates to address a maximumseverity authentication bypass flaw in Catalyst SDWAN Controller that it said has been exploited in limited attacks. The vulnerability, tracked as CVE202620182, carries a CVSS score of 10.0. "A vulnerability in the peering authentication in Cisco Catalyst SDWAN Controller, formerly SDWAN vSmart, and Cisco Catalyst SDWAN Manager, formerly.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Stealer Backdoor Found in 3 Node-IPC Versions Targeting Developer Secrets πŸ–‹οΈ

Cybersecurity researchers are sounding the alarm about what has been described as "malicious activity" in newly published versions of nodeipc. According to Socket and StepSecurity, three different versions of the npm package have been confirmed as malicious nodeipc9.1.6 nodeipc9.2.3 nodeipc12.0.1 "Early analysis indicates that nodeipc9.1.6, nodeipc9.2.3, and nodeipc12.0.1.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ ThreatsDay Bulletin: PAN-OS RCE, Mythos cURL Bug, AI Tokenizer Attacks, and 10+ Stories πŸ–‹οΈ

Everything is still on fire. This week feels dumb in the worst way bad links, weak checks, fake help desks, shady forum posts, and people turning supply chain attacks into some cursed little game for clout and cash. Half of it feels new. Half of it feels like crap we should have fixed years ago. The mess keeps getting louder users get tricked, boxes get popped, tools meant for normal work.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access Exploits πŸ–‹οΈ

The U.S.Cybersecurity and Infrastructure Security Agency CISA on Thursday added a newly disclosed vulnerability impacting Cisco Catalyst SDWAN Controller to its Known Exploited Vulnerabilities KEV catalog, requiring Federal Civilian Executive Branch FCEB agencies to remediate the issue by May 17, 2026. The vulnerability is a critical authentication bypass tracked as CVE202620182. It's.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ On-Prem Microsoft Exchange Server CVE-2026-42897 Exploited via Crafted Email πŸ–‹οΈ

Microsoft has disclosed a new security vulnerability impacting onpremise versions of Exchange Server that it said has come under active exploitation in the wild. The vulnerability, tracked as CVE202642897 CVSS score 8.1, has been described as a spoofing bug stemming from a crosssite scripting flaw. An anonymous researcher has been credited with discovering and reporting the issue. ".

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸš€ FrostyNeighbor: Fresh mischief and digital shenanigans πŸš€

ESET researchers uncovered new activities attributed to FrostyNeighbor, updating its compromise chain to support the groups continual cyberespionage operations.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” China-Linked Hackers Deploy New TencShell Malware Against Global Manufacturer πŸ“”

A suspected Chinalinked threat actor targeted the Indian branch of a global manufacturer leveraging an open source offensive toolkit.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ What 45 Days of Watching Your Own Tools Will Tell You About Your Real Attack Surface πŸ–‹οΈ

In Your Biggest Security Risk Isn't Malware It's What You Already Trust, we made a simple argument the most dangerous activity inside most organizations no longer looks like an attack. It looks like administration. PowerShell, WMIC, netsh, Certutil, MSBuild the same trusted utilities your IT team uses every day are also the preferred toolkit of modern threat actors. Bitdefender's analysis.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates πŸ–‹οΈ

OpenAI has disclosed that two of its employee devices in its corporate environment were impacted via the Mini ShaiHulud supply chain attack on TanStack, but noted that no user data, production systems, or intellectual property were compromised or modified in an unauthorized manner. "Upon identification of the malicious activity, we worked quickly to investigate, contain, and take steps to.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Microsoft Reports Severe Zero-Day Flaw in On-Prem Exchange Servers πŸ“”

The zeroday vulnerability affects onpremises installations for all versions of Exchange Server 2016, 2019 and Subscription Edition.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… GCC Cyber 2026: How Digital Banking Expansion Is Creating a New Attack Surface Attackers Are Already Exploiting πŸ¦…

The Gulf Cooperation Council GCC region has spent the last several years building one of the worlds most ambitious digital economies. Across Bahrain, Kuwait, Oman, Qatar, Saudi Arabia, and the UAE, governments and enterprises have accelerated investments in cloud infrastructure, AIdriven services, smart cities, and digital banking technology at a pace rarely seen elsewhere. Banks are rolling out instant payments, embedded finance services, mobilefirst platforms, and APIdriven ecosystems designed to support a rapidly expanding fintech economy. But this transformation has introduced a difficult reality for security teams every new integration, cloud workload, mobile application, and thirdparty service expands the digital banking attack surface. In 2026, attackers are no longer merel...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Google’s Default 15GB Free Storage Is Ending for Some New Accounts 🦿

Google is testing a change that gives some new accounts 5GB by default, with the full 15GB unlocked only after phone verification. The post Googles Default 15GB Free Storage Is Ending for Some New Accounts appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity