πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸš€ FrostyNeighbor: Fresh mischief and digital shenanigans πŸš€

ESET researchers uncovered new activities attributed to FrostyNeighbor, updating its compromise chain to support the groups continual cyberespionage operations.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” China-Linked Hackers Deploy New TencShell Malware Against Global Manufacturer πŸ“”

A suspected Chinalinked threat actor targeted the Indian branch of a global manufacturer leveraging an open source offensive toolkit.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ What 45 Days of Watching Your Own Tools Will Tell You About Your Real Attack Surface πŸ–‹οΈ

In Your Biggest Security Risk Isn't Malware It's What You Already Trust, we made a simple argument the most dangerous activity inside most organizations no longer looks like an attack. It looks like administration. PowerShell, WMIC, netsh, Certutil, MSBuild the same trusted utilities your IT team uses every day are also the preferred toolkit of modern threat actors. Bitdefender's analysis.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates πŸ–‹οΈ

OpenAI has disclosed that two of its employee devices in its corporate environment were impacted via the Mini ShaiHulud supply chain attack on TanStack, but noted that no user data, production systems, or intellectual property were compromised or modified in an unauthorized manner. "Upon identification of the malicious activity, we worked quickly to investigate, contain, and take steps to.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Microsoft Reports Severe Zero-Day Flaw in On-Prem Exchange Servers πŸ“”

The zeroday vulnerability affects onpremises installations for all versions of Exchange Server 2016, 2019 and Subscription Edition.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… GCC Cyber 2026: How Digital Banking Expansion Is Creating a New Attack Surface Attackers Are Already Exploiting πŸ¦…

The Gulf Cooperation Council GCC region has spent the last several years building one of the worlds most ambitious digital economies. Across Bahrain, Kuwait, Oman, Qatar, Saudi Arabia, and the UAE, governments and enterprises have accelerated investments in cloud infrastructure, AIdriven services, smart cities, and digital banking technology at a pace rarely seen elsewhere. Banks are rolling out instant payments, embedded finance services, mobilefirst platforms, and APIdriven ecosystems designed to support a rapidly expanding fintech economy. But this transformation has introduced a difficult reality for security teams every new integration, cloud workload, mobile application, and thirdparty service expands the digital banking attack surface. In 2026, attackers are no longer merel...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Google’s Default 15GB Free Storage Is Ending for Some New Accounts 🦿

Google is testing a change that gives some new accounts 5GB by default, with the full 15GB unlocked only after phone verification. The post Googles Default 15GB Free Storage Is Ending for Some New Accounts appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 6 Best VPNs for Canada in 2026 (Free & Paid Options Compared) 🦿

What is the best VPN provider in Canada in 2026? Compare pricing, features, speeds, and privacy protections of our recommended VPNs. The post 6 Best VPNs for Canada in 2026 Free Paid Options Compared appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 The First AI-Crafted Zero-Day Was Easy to Spot. The Next One May Not Be 🦿

Google reported the first confirmed AIassisted zeroday exploit, raising new concerns about logic flaws, supply chain risk, and containment. The post The First AICrafted ZeroDay Was Easy to Spot. The Next One May Not Be appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Gremlin Stealer Evolves into Modular Threat with Advanced Evasion Capabilities πŸ“”

A new Gremlin stealer variant has evolved into a modular toolkit with advanced evasion and data theft capabilities, according to new Unit 42 research.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Vibe Coding Cheat Sheet: Tools, Prompts, Security Tips, and More 🦿

This vibe coding cheat sheet explains how plainlanguage prompts can build apps fast, plus the planning, testing, and security checks needed. The post Vibe Coding Cheat Sheet Tools, Prompts, Security Tips, and More appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 OpenAI Warns Mac Users to Update Apps After Supply-Chain Attack 🦿

OpenAI says Mac users must update ChatGPT, Codex, and Atlas apps by June 12 after an npm supplychain attack exposed signing certificates. The post OpenAI Warns Mac Users to Update Apps After SupplyChain Attack appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Two Unpatched Windows Exploits Target BitLocker, SYSTEM Access 🦿

Two unpatched Windows exploit PoCs target BitLocker protections and privilege controls after Microsofts May Patch Tuesday security update. The post Two Unpatched Windows Exploits Target BitLocker, SYSTEM Access appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Turla Turns Kazuar Backdoor Into Modular P2P Botnet for Persistent Access πŸ–‹οΈ

The Russian statesponsored hacking group known as Turla has transformed its custom backdoor Kazuar into a modular peertopeer P2P botnet that's engineered for stealth and persistent access to compromised hosts. Turla, per the U.S. Cybersecurity and Infrastructure Security Agency CISA, is assessed to be affiliated with Center 16 of Russia's Federal Security Service FSB.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Four OpenClaw Flaws Enable Data Theft, Privilege Escalation, and Persistence πŸ–‹οΈ

Cybersecurity researchers have disclosed a set of four security flaws in OpenClaw that could be chained to achieve data theft, privilege escalation, and persistence. The vulnerabilities, collectively dubbed Claw Chain by Cyera, can permit an attacker to establish a foothold, expose sensitive data, and plant backdoors. A brief description of the flaws is below .

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸš€ Why geopolitical turmoil is a gift for scammers, and how to stay safe πŸš€

Conflict is a boon for opportunistic fraudsters. Look out for their ploys.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity