cibsecurity | Unsorted

Telegram-ะบะฐะฝะฐะป cibsecurity - ๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

23174

๐Ÿ—ž The finest daily news on cybersecurity and privacy. ๐Ÿ”” Daily releases. ๐Ÿ’ป Is your online life secure? ๐Ÿ“ฉ lalilolalo.dev@gmail.com

Subscribe to a channel

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ“” Identity Attacks Now Comprise a Third of Intrusions ๐Ÿ“”

IBM warns of infostealer surge as attackers automate credential theft and adopt AI to generate highly convincing phishing emails en masse.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ•ต๏ธโ€โ™‚๏ธ Android Phones Pre-Downloaded With Malware Target User Crypto Wallets ๐Ÿ•ต๏ธโ€โ™‚๏ธ

The threat actors lace predownloaded applications with malware to steal cryptocurrency by covertly swapping users' wallet addresses with their own.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ•ต๏ธโ€โ™‚๏ธ CVE Program Cuts Send the Cyber Sector Into Panic Mode ๐Ÿ•ต๏ธโ€โ™‚๏ธ

After threatening to slash support for the CVE program, CISA threw MITRE a lifeline at the last minute extending its government contract for another 11 months. After that, it looks like it's up to the private sector to find the cash to keep it going.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ–‹๏ธ Meta Resumes E.U. AI Training Using Public User Data After Regulator Approval ๐Ÿ–‹๏ธ

Meta has announced that it will begin to train its artificial intelligence AI models using public data shared by adults across its platforms in the European Union, nearly a year after it paused its efforts due to data protection concerns from Irish regulators. "This training will better support millions of people and businesses in Europe, by teaching our generative AI models to better.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

โ™Ÿ๏ธ Trump Revenge Tour Targets Cyber Leaders, Elections โ™Ÿ๏ธ

President Trump last week revoked security clearances for Chris Krebs, the former director of the Cybersecurity and Infrastructure Security Agency CISA who was fired by Trump after declaring the 2020 election the most secure in U.S. history. The White House memo, which also suspended clearances for other security professionals at Krebs's employer SentinelOne, comes as CISA is facing huge funding and staffing cuts.

๐Ÿ“– Read more.

๐Ÿ”— Via "Krebs on Security"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ•ต๏ธโ€โ™‚๏ธ AI Code Tools Widely Hallucinate Packages ๐Ÿ•ต๏ธโ€โ™‚๏ธ

The hallucination problem is not just pervasive, it is persistent as well, according to new research.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ•ต๏ธโ€โ™‚๏ธ Chinese APTs Exploit EDR 'Visibility Gap' for Cyber Espionage ๐Ÿ•ต๏ธโ€โ™‚๏ธ

Blind spots in network visibility, including in firewalls, IoT devices, and the cloud, are being exploited by Chinese statebacked threat actors with increasing success, according to new threat intelligence. Here's how experts say you can get eyes on it all.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿฆ… DOGE โ€œBig Ballsโ€ Ransomware and the False Connection to Edward Coristine ๐Ÿฆ…

Cyble DOGE BIG BALLS Ransomware and the False Connection to Edward Coristine " dataimagecaption"" datamediumfile"httpscyble.comwpcontentuploads202504NewCybleBlogs300x150.png" datalargefile"httpscyble.comwpcontentuploads202504NewCybleBlogs1024x512.png" title"DOGE "Big Balls" Ransomware and the False Connection to Edward Coristine 1" Key Takeaways This attack leverages a ZIP file with a deceptive LNK shortcut to silently execute a multistage PowerShellbased infection chain, ensuring stealthy deployment. A vulnerable driver CVE20152291 is exploited through a Bring Your Own Vulnerable Driver BYOVD technique to gain kernellevel readwrite access for privilege escalation. The payload is a customized version of Fog ransomware, branded as "DOGE BIG BALLS Ransomware," reflecting an attemp...

๐Ÿ“– Read more.

๐Ÿ”— Via "CYBLE"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ“” Digital Certificate Lifespans to Fall to 47 Days by 2029 ๐Ÿ“”

CABrowser Forum members have voted in favor of shortening TLSSSL certificate lifespans to 47 days.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ“” New Malware ResolverRAT Targets Healthcare and Pharma Sectors ๐Ÿ“”

ResolverRAT targets healthcare organizations using advanced evasion techniques and social engineering.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ“” Major WordPress Plugin Flaw Exploited in Under 4 Hours ๐Ÿ“”

Flaw in SureTriggers plugin allows unauthenticated users to create admin accounts on WordPress sites.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ–‹๏ธ Cybersecurity in the AI Era: Evolve Faster Than the Threats or Get Left Behind ๐Ÿ–‹๏ธ

AI is changing cybersecurity faster than many defenders realize. Attackers are already using AI to automate reconnaissance, generate sophisticated phishing lures, and exploit vulnerabilities before security teams can react. Meanwhile, defenders are overwhelmed by massive amounts of data and alerts, struggling to process information quickly enough to identify real threats. AI offers a way to.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ–‹๏ธ Phishing Campaigns Use Real-Time Checks to Validate Victim Emails Before Credential Theft ๐Ÿ–‹๏ธ

Cybersecurity researchers are calling attention to a new type of credential phishing scheme that ensures that the stolen information is associated with valid online accounts. The technique has been codenamed precisionvalidating phishing by Cofense, which it said employs realtime email validation so that only a select set of highvalue targets are served the fake login screens. "This tactic not.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ•ต๏ธโ€โ™‚๏ธ Morocco Investigates Social Security Agency Data Leak ๐Ÿ•ต๏ธโ€โ™‚๏ธ

A threat actor has claimed responsibility for the alleged politically motivated attack and has uploaded the stolen data to a Dark Web forum.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ•ต๏ธโ€โ™‚๏ธ 7 RSAC 2025 Cloud Security Sessions You Don't Want to Miss ๐Ÿ•ต๏ธโ€โ™‚๏ธ

Some of the brightest minds in the industry will discuss how to strengthen cloud security.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ•ต๏ธโ€โ™‚๏ธ CVE Program Cuts Send the Cyber Sector Into Panic Mode ๐Ÿ•ต๏ธโ€โ™‚๏ธ

After threatening to slash support for the CVE program, CISA threw MITRE a lifeline at the last minute extending its government contract for another 11 months. After that, it looks like it's up to the private sector to find the cash to keep it going.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ“” Identity Attacks Now Comprise a Third of Intrusions ๐Ÿ“”

IBM warns of infostealer surge as attackers automate credential theft and adopt AI to generate highly convincing phishing emails en masse.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ•ต๏ธโ€โ™‚๏ธ Dogged by Trump, Chris Krebs Resigns From SentinelOne ๐Ÿ•ต๏ธโ€โ™‚๏ธ

The president revoked the former CISA director's security clearance, half a decade after Krebs challenged rightwing election disinformation, prompting his eventual resignation.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ–‹๏ธ Gladinetโ€™s Triofox and CentreStack Under Active Exploitation via Critical RCE Vulnerability ๐Ÿ–‹๏ธ

A recently disclosed security flaw in Gladinet CentreStack also impacts its Triofox remote access and collaboration solution, according to Huntress, with seven different organizations compromised to date. Tracked as CVE202530406 CVSS score 9.0, the vulnerability refers to the use of a hardcoded cryptographic key that could expose internetaccessible servers to remote code execution attacks.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ•ต๏ธโ€โ™‚๏ธ Threat Intel Firm Offers Crypto in Exchange for Dark Web Accounts ๐Ÿ•ต๏ธโ€โ™‚๏ธ

Prodaft is currently buying accounts from five Dark Web forums and offers to pay extra for administrator or moderator accounts. The idea is to infiltrate forums to boost its threat intelligence.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ•ต๏ธโ€โ™‚๏ธ Fortinet Zero-Day Bug May Lead to Arbitrary Code Execution ๐Ÿ•ต๏ธโ€โ™‚๏ธ

A threat actor posted about the zeroday exploit on the same day that Fortinet published a warning about known vulnerabilities under active exploitation.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ–‹๏ธ ResolverRAT Campaign Targets Healthcare, Pharma via Phishing and DLL Side-Loading ๐Ÿ–‹๏ธ

Cybersecurity researchers have discovered a new, sophisticated remote access trojan called ResolverRAT that has been observed in attacks targeting healthcare and pharmaceutical sectors. "The threat actor leverages fearbased lures delivered via phishing emails, designed to pressure recipients into clicking a malicious link," Morphisec Labs researcher Nadav Lorber said in a report shared with The.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ“” AI Hallucinations Create โ€œSlopsquattingโ€ Supply Chain Threat ๐Ÿ“”

Experts have warned that threat actors could hijack AI hallucinations in slopsquatting attacks.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ“” US Blocks Foreign Governments from Acquiring Citizen Data ๐Ÿ“”

The US government has implemented a program that applies export controls on data transactions to certain countries of concern, including China and Russia.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ“” Prodaft Offers "No Judgment" Deal to Buy Dark Web Accounts from Cybercrime Forum Users ๐Ÿ“”

Through the SYS Initiative, Prodaft is offering a secure, anonymous channel for individuals to share information about ongoing cybercrime activities.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ–‹๏ธ Pakistan-Linked Hackers Expand Targets in India with CurlBack RAT and Spark RAT ๐Ÿ–‹๏ธ

A threat actor with ties to Pakistan has been observed targeting various sectors in India with various remote access trojans like Xeno RAT, Spark RAT, and a previously undocumented malware family called CurlBack RAT. The activity, detected by SEQRITE in December 2024, targeted Indian entities under railway, oil and gas, and external affairs ministries, marking an expansion of the hacking crew's.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ–‹๏ธ โšก Weekly Recap: Windows 0-Day, VPN Exploits, Weaponized AI, Hijacked Antivirus and More ๐Ÿ–‹๏ธ

Attackers arent waiting for patches anymore they are breaking in before defenses are ready. Trusted security tools are being hijacked to deliver malware. Even after a breach is detected and patched, some attackers stay hidden. This weeks events show a hard truth its not enough to react after an attack. You have to assume that any system you trust today could fail tomorrow. In a world.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿฆฟ How to Use LastPass Password Manager ๐Ÿฆฟ

Learn how to set up and use LastPass password manager. Start managing and storing your passwords with this stepbystep guide.

๐Ÿ“– Read more.

๐Ÿ”— Via "Tech Republic"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ•ต๏ธโ€โ™‚๏ธ How DigitalOcean Moved Away From Manual Identity Management ๐Ÿ•ต๏ธโ€โ™‚๏ธ

DigitalOcean executives describe how they automated and streamlined many of the identity and access management functions that had been previously handled manually.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ•ต๏ธโ€โ™‚๏ธ A New 'It RAT': Stealthy 'Resolver' Malware Burrows In ๐Ÿ•ต๏ธโ€โ™‚๏ธ

A new infostealer on the market is making big waves globally, replacing Lumma et al. in attacks and employing so many stealth, persistence, and antianalysis tricks that it's downright difficult to count them all.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…
Subscribe to a channel