๐ The finest daily news on cybersecurity and privacy. ๐ Daily releases. ๐ป Is your online life secure? ๐ฉ lalilolalo.dev@gmail.com
๐ต๏ธโโ๏ธ CISA Warns: Old DNS Trick 'Fast Flux' Is Still Thriving ๐ต๏ธโโ๏ธAn old DNS switcheroo technique is still helping attackers keep their infrastructure alive. But is it really a pressing issue in 2025?.
๐ Read more.
๐ Via "Dark Reading"
----------
๐๏ธ Seen on @cibsecurity
โ๏ธ Cyber Forensic Expert in 2,000+ Cases Faces FBI Probe โ๏ธA Minnesota cybersecurity and computer forensics expert whose testimony has featured in thousands of courtroom trials over the past 30 years is facing questions about his credentials and an inquiry from the Federal Bureau of Investigation FBI. Legal experts say the inquiry could be grounds to reopen a number of adjudicated cases in which the expert's testimony may have been pivotal.
๐ Read more.
๐ Via "Krebs on Security"
----------
๐๏ธ Seen on @cibsecurity
๐ฆฟ DDoS Attacks Now Key Weapons in Geopolitical Conflicts, NETSCOUT Warns ๐ฆฟHackers now use AI and botnets to launch powerful DDoS attacks, bypassing security and overwhelming servers as law enforcement struggles to keep up.
๐ Read more.
๐ Via "Tech Republic"
----------
๐๏ธ Seen on @cibsecurity
๐ต๏ธโโ๏ธ Medusa Rides Momentum From Ransomware-as-a-Service Pivot ๐ต๏ธโโ๏ธShifting to a RaaS business model has accelerated the group's growth, and targeting critical industries like healthcare, legal, and manufacturing hasn't hurt either.
๐ Read more.
๐ Via "Dark Reading"
----------
๐๏ธ Seen on @cibsecurity
๐ Nearly 600 Phishing Domains Emerge Following Bybit Heist ๐BforeAI researchers discover 596 suspicious Bybitthemed domains designed to defraud visitors.
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
๐ Sensitive Data Breached in Highline Schools Ransomware Incident ๐Highline Public Schools revealed that sensitive personal, financial and medical data was accessed by ransomware attackers during the September 2024 incident.
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
๐ CrushFTP Vulnerability Exploited Following Disclosure Issues ๐A critical authentication bypass flaw in CrushFTP is under active exploitation following a mishandled disclosure process.
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
๐ Chinese State Hackers Exploiting Newly Disclosed Ivanti Flaw ๐Mandiant warned that Chinese espionage actor UNC5221 is actively exploiting a critical Ivanti vulnerability, which can lead to remote code execution.
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
๐ Cyber Agencies Warn of Fast Flux Threat Bypassing Network Defenses ๐A joint cybersecurity advisory warns organizations globally about the defense gap in detecting and blocking fast flux techniques, which are exploited for malicious activities.
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
๐๏ธ Google Patches Quick Share Vulnerability Enabling Silent File Transfers Without Consent ๐๏ธCybersecurity researchers have disclosed details of a new vulnerability impacting Google's Quick Share data transfer utility for Windows that could be exploited to achieve a denialofservice DoS or send arbitrary files to a target's device without their approval. The flaw, tracked as CVE202410668 CVSS score 5.9, is a bypass for two of the 10 shortcomings that were originally disclosed by.
๐ Read more.
๐ Via "The Hacker News"
----------
๐๏ธ Seen on @cibsecurity
๐๏ธ AI Threats Are Evolving Fast โ Learn Practical Defense Tactics in this Expert Webinar ๐๏ธThe rules have changed. Again. Artificial intelligence is bringing powerful new tools to businesses. But it's also giving cybercriminals smarter ways to attack. Theyre moving quicker, targeting more precisely, and slipping past old defenses without being noticed. And here's the harsh truth If your security strategy hasnt evolved with AI in mind, youre already behind. But youre not aloneand.
๐ Read more.
๐ Via "The Hacker News"
----------
๐๏ธ Seen on @cibsecurity
๐๏ธ Microsoft Warns of Tax-Themed Email Attacks Using PDFs and QR Codes to Deliver Malware ๐๏ธMicrosoft is warning of several phishing campaigns that are leveraging taxrelated themes to deploy malware and steal credentials. "These campaigns notably use redirection methods such as URL shorteners and QR codes contained in malicious attachments and abuse legitimate services like filehosting services and business profile pages to avoid detection," Microsoft said in a report shared with The.
๐ Read more.
๐ Via "The Hacker News"
----------
๐๏ธ Seen on @cibsecurity
๐๏ธ CERT-UA Reports Cyberattacks Targeting Ukrainian State Systems with WRECKSTEEL Malware ๐๏ธThe Computer Emergency Response Team of Ukraine CERTUA has revealed that no less than three cyber attacks were recorded against state administration bodies and critical infrastructure facilities in the country with an aim to steal sensitive data. The campaign, the agency said, involved the use of compromised email accounts to send phishing messages containing links pointing to legitimate.
๐ Read more.
๐ Via "The Hacker News"
----------
๐๏ธ Seen on @cibsecurity
๐๏ธ Critical Ivanti Flaw Actively Exploited to Deploy TRAILBLAZE and BRUSHFIRE Malware ๐๏ธIvanti has disclosed details of a nowpatched critical security vulnerability impacting its Connect Secure that has come under active exploitation in the wild. The vulnerability, tracked as CVE202522457 CVSS score 9.0, concerns a case of a stackbased buffer overflow that could be exploited to execute arbitrary code on affected systems. "A stackbased buffer overflow in Ivanti Connect.
๐ Read more.
๐ Via "The Hacker News"
----------
๐๏ธ Seen on @cibsecurity
๐๏ธ SpotBugs Access Token Theft Identified as Root Cause of GitHub Supply Chain Attack ๐๏ธThe cascading supply chain attack that initially targeted Coinbase before becoming more widespread to single out users of the "tjactionschangedfiles" GitHub Action has been traced further back to the theft of a personal access token PAT related to SpotBugs. "The attackers obtained initial access by taking advantage of the GitHub Actions workflow of SpotBugs, a popular opensource tool for.
๐ Read more.
๐ Via "The Hacker News"
----------
๐๏ธ Seen on @cibsecurity
๐ต๏ธโโ๏ธ Gmail Is Not a Secure Way to Send Sensitive Comms: A Friendly Reminder ๐ต๏ธโโ๏ธNew endtoend Gmail encryption alone isn't secure enough for an enterprise's most sensitive and prized data, experts say.
๐ Read more.
๐ Via "Dark Reading"
----------
๐๏ธ Seen on @cibsecurity
๐ต๏ธโโ๏ธ Minnesota Tribe Struggles After Ransomware Attack ๐ต๏ธโโ๏ธHotel and casino operations for the Lower Sioux Indians have been canceled or postponed, and the local health center is redirecting those needing medical or dental care.
๐ Read more.
๐ Via "Dark Reading"
----------
๐๏ธ Seen on @cibsecurity
๐ข Verizon Call Filter API flaw couldโve exposed millions of Americansโ call records ๐ขA security flaw in Verizon's Call Filter app couldve allowed threat actors to access details of incoming calls for another user, a security researcher has found.
๐ Read more.
๐ Via "ITPro"
----------
๐๏ธ Seen on @cibsecurity
๐ฆ
Ransomware Attack Levels Remain High as Major Change Looms ๐ฆ
Cyble Ransomware Attack Levels Remain High as Major Change Looms " dataimagecaption"Cyble Ransomware Attack Levels Remain High as Major Change Looms " datamediumfile"httpscyble.comwpcontentuploads202504CybleBlogsRansomwareAttacksRaaS300x150.jpg" datalargefile"httpscyble.comwpcontentuploads202504CybleBlogsRansomwareAttacksRaaS.jpg" title"Ransomware Attack Levels Remain High as Major Change Looms 1" March saw notable events, including a potential change at the top of the ransomware world, persistently high attacks, and the emergence of new groups. March 2025 ended on a surprising note when the onionbased data leak site DLS of RansomHub the largest ransomware group over the last year went offline, fueling speculation of a possible takeover. A few days later, rival DragonForce claimed ...
๐ Read more.
๐ Via "CYBLE"
----------
๐๏ธ Seen on @cibsecurity
๐ Over Half of Attacks on Electricity and Water Firms Are Destructive ๐Semperis claims 62 of water and electricity providers were hit by cyberattacks in the past year.
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
๐ Amateur Hacker Leverages Russian Bulletproof Hosting Server to Spread Malware ๐The cybercriminal uses the service of Proton66, an infamous Russianbased bulletproof hosting provider, to deploy malware.
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
๐ Major Online Platform for Child Exploitation Dismantled ๐An international law enforcement operation has shut down Kidflix, a platform for child sexual exploitation with 1.8m registered users.
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
๐ Tj-actions Supply Chain Attack Traced Back to Single GitHub Token Compromise ๐The threat actors initially attempted to compromise projects associated with the Coinbase cryptocurrency exchange, said Palo Alto Networks.
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
๐๏ธ Triada Malware Preloaded on Counterfeit Android Phones Infects 2,600+ Devices ๐๏ธCounterfeit versions of popular smartphone models that are sold at reduced prices have been found to be preloaded with a modified version of an Android malware called Triada. "More than 2,600 users in different countries have encountered the new version of Triada, the majority in Russia," Kaspersky said in a report. The infections were recorded between March 13 and 27, 2025.ย Triada is the.
๐ Read more.
๐ Via "The Hacker News"
----------
๐๏ธ Seen on @cibsecurity
๐๏ธ AI Adoption in the Enterprise: Breaking Through the Security and Compliance Gridlock ๐๏ธAI holds the promise to revolutionize all sectors of enterprisefrom fraud detection and content personalization to customer service and security operations. Yet, despite its potential, implementation often stalls behind a wall of security, legal, and compliance hurdles. Imagine this alltoofamiliar scenario A CISO wants to deploy an AIdriven SOC to handle the overwhelming volume of security.
๐ Read more.
๐ Via "The Hacker News"
----------
๐๏ธ Seen on @cibsecurity
๐๏ธ Lazarus Group Targets Job Seekers With ClickFix Tactic to Deploy GolangGhost Malware ๐๏ธThe North Korean threat actors behind Contagious Interview have adopted the increasingly popular ClickFix social engineering tactic to lure job seekers in the cryptocurrency sector to deliver a previously undocumented Gobased backdoor called GolangGhost on Windows and macOS systems. The new activity, assessed to be a continuation of the campaign, has been codenamed ClickFake Interview by.
๐ Read more.
๐ Via "The Hacker News"
----------
๐๏ธ Seen on @cibsecurity
๐๏ธ Critical Flaw in Apache Parquet Allows Remote Attackers to Execute Arbitrary Code ๐๏ธA maximum severity security vulnerability has been disclosed in Apache Parquet's Java Library that, if successfully exploited, could allow a remote attacker to execute arbitrary code on susceptible instances. Apache Parquet is a free and opensource columnar data file format that's designed for efficient data processing and retrieval, providing support for complex data, highperformance.
๐ Read more.
๐ Via "The Hacker News"
----------
๐๏ธ Seen on @cibsecurity
๐๏ธ OPSEC Failure Exposes Coquettteโs Malware Campaigns on Bulletproof Hosting Servers ๐๏ธA novice cybercrime actor has been observed leveraging the services of a Russian bulletproof hosting BPH provider called Proton66 to facilitate their operations. The findings come from DomainTools, which detected the activity after it discovered a phony website named cybersecureprotect.com hosted on Proton66 that masqueraded as an antivirus service. The threat intelligence firm said it.
๐ Read more.
๐ Via "The Hacker News"
----------
๐๏ธ Seen on @cibsecurity
๐๏ธ Have We Reached a Distroless Tipping Point? ๐๏ธTheres a virtuous cycle in technology that pushes the boundaries of whats being built and how its being used. A new technology development emerges and captures the world's attention. People start experimenting and discover novel applications, use cases, and approaches to maximize the innovation's potential. These use cases generate significant value, fueling demand for the next iteration of.
๐ Read more.
๐ Via "The Hacker News"
----------
๐๏ธ Seen on @cibsecurity
๐ฆฟ Google DeepMind Proposes AI โMonitorsโ to Police Hyperintelligent Models ๐ฆฟDeepMinds approach to AGI safety and security splits threats into four categories. One solution could be a monitor AI.
๐ Read more.
๐ Via "Tech Republic"
----------
๐๏ธ Seen on @cibsecurity