cibsecurity | Unsorted

Telegram-ะบะฐะฝะฐะป cibsecurity - ๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

23174

๐Ÿ—ž The finest daily news on cybersecurity and privacy. ๐Ÿ”” Daily releases. ๐Ÿ’ป Is your online life secure? ๐Ÿ“ฉ lalilolalo.dev@gmail.com

Subscribe to a channel

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ“” SpyNote Malware Targets Android Users with Fake Google Play Pages ๐Ÿ“”

A new Android malware campaign uses fake Google Play pages to distribute the SpyNote Trojan.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ“” SpyNote Malware Targets Android Users with Fake Google Play Pages ๐Ÿ“”

A new Android malware campaign uses fake Google Play pages to distribute the SpyNote Trojan.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ“” Over 40% of UK Businesses Faced Cybersecurity Breaches in 2024 ๐Ÿ“”

The Cyber Security Breaches Survey 2025 has been released by the UK Home Office and DSIT today, reporting a slight decline in incidents compared to 2024 report.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ“” Google Cloud: CISOs Demand Simplified Security Tools Amid Growing Tech Complexity ๐Ÿ“”

Google Cloud announced a number of security products designed to reduce complexity for security leaders.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ“” Google Cloud: CISOs Demand Simplified Security Tools Amid Growing Tech Complexity ๐Ÿ“”

Google Cloud announced a number of security products designed to reduce complexity for security leaders.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ–‹๏ธ Incomplete Patch in NVIDIA Toolkit Leaves CVE-2024-0132 Open to Container Escapes ๐Ÿ–‹๏ธ

Cybersecurity researchers have detailed a case of an incomplete patch for a previously addressed security flaw impacting the NVIDIA Container Toolkit that, if successfully exploited, could put sensitive data at risk. The original vulnerability CVE20240132 CVSS score 9.0 is a TimeofCheck TimeofUse TOCTOU vulnerability that could lead to a container escape attack and allow for.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ“” Google Cloud: China Achieves โ€œCyber Superpowerโ€ Status ๐Ÿ“”

Google Clouds Sandra Joyce said that Chinese state actors advanced techniques and ability to stay undetected pose huge challenges.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ–‹๏ธ Incomplete Patch in NVIDIA Toolkit Leaves CVE-2024-0132 Open to Container Escapes ๐Ÿ–‹๏ธ

Cybersecurity researchers have detailed a case of an incomplete patch for a previously addressed security flaw impacting the NVIDIA Container Toolkit that, if successfully exploited, could put sensitive data at risk. The original vulnerability CVE20240132 CVSS score 9.0 is a TimeofCheck TimeofUse TOCTOU vulnerability that could lead to a container escape attack and allow for.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ“” Google Cloud: China Achieves โ€œCyber Superpowerโ€ Status ๐Ÿ“”

Google Clouds Sandra Joyce said that Chinese state actors advanced techniques and ability to stay undetected pose huge challenges.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐ŸŒŠ UnderDefense Named a Finalist in 2025 SC Awards: Best MDR Service for Excellence in Cybersecurity ๐ŸŒŠ

Were excited to share some big news UnderDefense has been named a finalist in the 2025 SC Awards, one of the most respected and competitive awards in the cybersecurity industry. This recognition isnt just a milestone its a reflection of the work weve poured into building a smarter, more proactive approach to security. Year The post UnderDefense Named a Finalist in 2025 SC Awards Best MDR Service for Excellence in Cybersecurity appeared first on UnderDefense.

๐Ÿ“– Read more.

๐Ÿ”— Via "UnderDefense"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ–‹๏ธ Incomplete Patch in NVIDIA Toolkit Leaves CVE-2024-0132 Open to Container Escapes ๐Ÿ–‹๏ธ

Cybersecurity researchers have detailed a case of an incomplete patch for a previously addressed security flaw impacting the NVIDIA Container Toolkit that, if successfully exploited, could put sensitive data at risk. The original vulnerability CVE20240132 CVSS score 9.0 is a TimeofCheck TimeofUse TOCTOU vulnerability that could lead to a container escape attack and allow for.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿš€ Watch out for these traps lurking in search results ๐Ÿš€

Heres how to avoid being hit by fraudulent websites that scammers can catapult directly to the top of your search results.

๐Ÿ“– Read more.

๐Ÿ”— Via "ESET - WeLiveSecurity"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿš€ Watch out for these traps lurking in search results ๐Ÿš€

Heres how to avoid being hit by fraudulent websites that scammers can catapult directly to the top of your search results.

๐Ÿ“– Read more.

๐Ÿ”— Via "ESET - WeLiveSecurity"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿฆฟ Can VPNs Be Tracked by the Police? ๐Ÿฆฟ

VPNs are popular due to the fact they add security and privacy to what are otherwise fairly open WiFi and public internet channels. But can VPNs be tracked by the police?.

๐Ÿ“– Read more.

๐Ÿ”— Via "Tech Republic"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

โ™Ÿ๏ธ China-based SMS Phishing Triad Pivots to Banks โ™Ÿ๏ธ

Chinabased purveyors of SMS phishing kits are enjoying remarkable success converting phished payment card data into mobile wallets from Apple and Google. Until recently, the socalled Smishing Triad mainly impersonated toll road operators and shipping companies. But experts say these groups are now directly targeting customers of international financial institutions, while dramatically expanding their cybercrime infrastructure and support staff.

๐Ÿ“– Read more.

๐Ÿ”— Via "Krebs on Security"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ–‹๏ธ PlayPraetor Reloaded: CTM360 Uncovers a Play Masquerading Party ๐Ÿ–‹๏ธ

Overview of the PlayPraetor Masquerading Party Variants CTM360 has now identified a much larger extent of the ongoing Play Praetor campaign. What started with 6000 URLs of a very specific banking attack has now grown to 16,000 with multiple variants. This research is ongoing, and much more is expected to be discovered in the coming days.ย  As before, all the newly discovered play.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ“” Over 40% of UK Businesses Faced Cybersecurity Breaches in 2024 ๐Ÿ“”

The Cyber Security Breaches Survey 2025 has been released by the UK Home Office and DSIT today, reporting a slight decline in incidents compared to 2024 report.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ–‹๏ธ Malicious npm Package Targets Atomic Wallet, Exodus Users by Swapping Crypto Addresses ๐Ÿ–‹๏ธ

Threat actors are continuing to upload malicious packages to the npm registry so as to tamper with alreadyinstalled local versions of legitimate libraries and execute malicious code in what's seen as a sneakier attempt to stage a software supply chain attack. The newly discovered package, named pdftooffice, masquerades as a utility for converting PDF files to Microsoft Word documents. But, in.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ“” Google Cloud: CISOs Demand Simplified Security Tools Amid Growing Tech Complexity ๐Ÿ“”

Google Cloud announced a number of security products designed to reduce complexity for security leaders.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ“” Google Cloud: China Achieves โ€œCyber Superpowerโ€ Status ๐Ÿ“”

Google Clouds Sandra Joyce said that Chinese state actors advanced techniques and ability to stay undetected pose huge challenges.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ“” Google Cloud: China Achieves โ€œCyber Superpowerโ€ Status ๐Ÿ“”

Google Clouds Sandra Joyce said that Chinese state actors advanced techniques and ability to stay undetected pose huge challenges.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ“” Google Cloud: China Achieves โ€œCyber Superpowerโ€ Status ๐Ÿ“”

Google Clouds Sandra Joyce said that Chinese state actors advanced techniques and ability to stay undetected pose huge challenges.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ–‹๏ธ PlayPraetor Reloaded: CTM360 Uncovers a Play Masquerading Party ๐Ÿ–‹๏ธ

Overview of the PlayPraetor Masquerading Party Variants CTM360 has now identified a much larger extent of the ongoing Play Praetor campaign. What started with 6000 URLs of a very specific banking attack has now grown to 16,000 with multiple variants. This research is ongoing, and much more is expected to be discovered in the coming days.ย  As before, all the newly discovered play.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ•ต๏ธโ€โ™‚๏ธ AuthZEN Aims to Harmonize Fractured Authorization Controls ๐Ÿ•ต๏ธโ€โ™‚๏ธ

Managing permissions and authorizations across dozens or hundreds of cloud services and platforms poses significant headaches for companies. An open specification aims to change that.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ“” SpyNote Malware Targets Android Users with Fake Google Play Pages ๐Ÿ“”

A new Android malware campaign uses fake Google Play pages to distribute the SpyNote Trojan.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ–‹๏ธ Malicious npm Package Targets Atomic Wallet, Exodus Users by Swapping Crypto Addresses ๐Ÿ–‹๏ธ

Threat actors are continuing to upload malicious packages to the npm registry so as to tamper with alreadyinstalled local versions of legitimate libraries and execute malicious code in what's seen as a sneakier attempt to stage a software supply chain attack. The newly discovered package, named pdftooffice, masquerades as a utility for converting PDF files to Microsoft Word documents. But, in.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ•ต๏ธโ€โ™‚๏ธ Zero-Day in CentreStack File Sharing Platform Under Attack ๐Ÿ•ต๏ธโ€โ™‚๏ธ

Gladinet's platform is widely used among managed service providers, and a critical deserialization flaw could put MSP customers in jeopardy.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ–‹๏ธ Incomplete Patch in NVIDIA Toolkit Leaves CVE-2024-0132 Open to Container Escapes ๐Ÿ–‹๏ธ

Cybersecurity researchers have detailed a case of an incomplete patch for a previously addressed security flaw impacting the NVIDIA Container Toolkit that, if successfully exploited, could put sensitive data at risk. The original vulnerability CVE20240132 CVSS score 9.0 is a TimeofCheck TimeofUse TOCTOU vulnerability that could lead to a container escape attack and allow for.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ“” Over 40% of UK Businesses Faced Cybersecurity Breaches in 2024 ๐Ÿ“”

The Cyber Security Breaches Survey 2025 has been released by the UK Home Office and DSIT today, reporting a slight decline in incidents compared to 2024 report.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿฆ… ICS Vulnerability Report: Energy, Manufacturing Device Fixes Urged by Cyble ๐Ÿฆ…

ICS Vulnerability Report " dataimagecaption"ICS Vulnerability Report " datamediumfile"httpscyble.comwpcontentuploads202504ICSVulnerabilityReport300x150.png" datalargefile"httpscyble.comwpcontentuploads202504ICSVulnerabilityReport1024x512.png" title"ICS Vulnerability Report Energy, Manufacturing Device Fixes Urged by Cybleย  1" Overview The Cyble report, part of the latest ICS Vulnerability Report, examined 70 ICS, Operational Technology OT, and Supervisory Control and Data Acquisition SCADA vulnerabilities identified in 16 recent advisories issued by the U.S. Cybersecurity and Infrastructure Security Agency CISA. Cyble highlighted several critical industrial control system ICS vulnerabilities in recent reports to clients, with the most severe vulnerabilities reaching 9.8 to 9.9 ...

๐Ÿ“– Read more.

๐Ÿ”— Via "CYBLE"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…
Subscribe to a channel