๐ The finest daily news on cybersecurity and privacy. ๐ Daily releases. ๐ป Is your online life secure? ๐ฉ lalilolalo.dev@gmail.com
๐๏ธ New Reports Uncover Jailbreaks, Unsafe Code, and Data Theft Risks in Leading AI Systems ๐๏ธVarious generative artificial intelligence GenAI services have been found vulnerable to two types of jailbreak attacks that make it possible to produce illicit or dangerous content. The first of the two techniques, codenamed Inception, instructs an AI tool to imagine a fictitious scenario, which can then be adapted into a second scenario within the first one where there exists no safety.
๐ Read more.
๐ Via "The Hacker News"
----------
๐๏ธ Seen on @cibsecurity
๐ฆฟ The 5 Best VPNs for Amazon Fire Stick in 2025 ๐ฆฟCheck out TechRepublics list of top Amazon Fire Stick VPNs for safe streaming in 2025.
๐ Read more.
๐ Via "Tech Republic"
----------
๐๏ธ Seen on @cibsecurity
๐ต๏ธโโ๏ธ Windows Backdoor Targets Members of Exiled Uyghur Community ๐ต๏ธโโ๏ธA spearphishing campaign sent Trojanized versions of legitimate wordprocessing software to members of the World Uyghur Congress as part of China's continued cyberespionage activity against the ethnic minority.
๐ Read more.
๐ Via "Dark Reading"
----------
๐๏ธ Seen on @cibsecurity
๐ต๏ธโโ๏ธ US Critical Infrastructure Still Struggles With OT Security ๐ต๏ธโโ๏ธHow does a company defend itself from cyberattacks by a foreign adversary? A collection of experts gathered at this year's RSAC Conference to explain how the US can help.
๐ Read more.
๐ Via "Dark Reading"
----------
๐๏ธ Seen on @cibsecurity
๐ต๏ธโโ๏ธ From Mission-Centric to People-Centric: Competitive Leadership in Cyber ๐ต๏ธโโ๏ธMaking a case for empathy in cyberleadership roles as a strategic business advantage.
๐ Read more.
๐ Via "Dark Reading"
----------
๐๏ธ Seen on @cibsecurity
๐ต๏ธโโ๏ธ Risks of Using AI Models Developed by Competing Nations ๐ต๏ธโโ๏ธThe current offlineopen source model boom is unstoppable. Its impact depends on how well the risks are managed today.
๐ Read more.
๐ Via "Dark Reading"
----------
๐๏ธ Seen on @cibsecurity
๐ต๏ธโโ๏ธ US Critical Infrastructure Still Struggles With OT Security ๐ต๏ธโโ๏ธHow does a company defend itself from cyberattacks by a foreign adversary? A collection of experts gathered at this year's RSAC Conference to explain how the US can help.
๐ Read more.
๐ Via "Dark Reading"
----------
๐๏ธ Seen on @cibsecurity
๐ Zero-Day Exploitation Figure Surges 19% in Two Years ๐Google claims 19 more zeroday bugs were exploited in 2024 than 2022 as threat actors focus on security products.
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
๐ต๏ธโโ๏ธ From Mission-Centric to People-Centric: Competitive Leadership in Cyber ๐ต๏ธโโ๏ธMaking a case for empathy in cyberleadership roles as a strategic business advantage.
๐ Read more.
๐ Via "Dark Reading"
----------
๐๏ธ Seen on @cibsecurity
๐ Zero-Day Exploitation Figure Surges 19% in Two Years ๐Google claims 19 more zeroday bugs were exploited in 2024 than 2022 as threat actors focus on security products.
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
๐ New Gremlin Infostealer Distributed on Telegram ๐Administrators of a Telegram channel named CoderSharp have been advertising Gremlin Stealer since March 2025.
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
๐ Europol Creates โViolence-as-a-Serviceโ Taskforce ๐Europol has launched a new initiative designed to combat recruitment of youngsters into violent organized crime groups.
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
๐ข RSAC Conference Day One: Vibe Is 'All In' on AI for Security ๐ขArtificial intelligence took center stage as RSAC Conference looks at how the discussion has moved from generative AI to agentic AI.
๐ Read more.
๐ Via "ITPro"
----------
๐๏ธ Seen on @cibsecurity
๐ Zero-Day Exploitation Figure Surges 19% in Two Years ๐Google claims 19 more zeroday bugs were exploited in 2024 than 2022 as threat actors focus on security products.
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
๐ New WordPress Malware Masquerades as Plugin ๐New WordPress malware disguised as a plugin gives attackers persistent access and injects malicious code enabling administrative control.
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
๐๏ธ WhatsApp Launches Private Processing to Enable AI Features While Protecting Message Privacy ๐๏ธPopular messaging app WhatsApp on Tuesday unveiled a new technology called Private Processing to enable artificial intelligence AI capabilities in a privacypreserving manner. "Private Processing will allow users to leverage powerful optional AI features like summarizing unread messages or editing help while preserving WhatsApp's core privacy promise," the Metaowned service said in a.
๐ Read more.
๐ Via "The Hacker News"
----------
๐๏ธ Seen on @cibsecurity
๐ต๏ธโโ๏ธ Vulnerability Exploitation Is Shifting in 2024-25 ๐ต๏ธโโ๏ธThe number of vulnerabilities exploited by attacks may not be growing these days, but they are increasingly affecting enterprise technologies.
๐ Read more.
๐ Via "Dark Reading"
----------
๐๏ธ Seen on @cibsecurity
๐ต๏ธโโ๏ธ Risks of Using AI Models Developed by Competing Nations ๐ต๏ธโโ๏ธThe current offlineopen source model boom is unstoppable. Its impact depends on how well the risks are managed today.
๐ Read more.
๐ Via "Dark Reading"
----------
๐๏ธ Seen on @cibsecurity
๐ต๏ธโโ๏ธ Hacking in Space: Not as Tough as You Might Think ๐ต๏ธโโ๏ธBarbara Grofe, space asset security architect at Spartan Corp, discussed the realities of hacking in space, and the outlook is not pieinthesky.
๐ Read more.
๐ Via "Dark Reading"
----------
๐๏ธ Seen on @cibsecurity
๐ต๏ธโโ๏ธ Many Fuel Tank Monitoring Systems Vulnerable to Disruption ๐ต๏ธโโ๏ธThousands of automatic tank gauge ATG devices are accessible over the Internet and are just "a packet away" from compromise, security researcher warns at 2025 RSAC Conference.
๐ Read more.
๐ Via "Dark Reading"
----------
๐๏ธ Seen on @cibsecurity
๐ Europol Creates โViolence-as-a-Serviceโ Taskforce ๐Europol has launched a new initiative designed to combat recruitment of youngsters into violent organized crime groups.
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
๐ต๏ธโโ๏ธ Hacking in Space: Not as Tough as You Might Think ๐ต๏ธโโ๏ธBarbara Grofe, space asset security architect at Spartan Corp, discussed the realities of hacking in space, and the outlook is not pieinthesky.
๐ Read more.
๐ Via "Dark Reading"
----------
๐๏ธ Seen on @cibsecurity
๐ Europol Creates โViolence-as-a-Serviceโ Taskforce ๐Europol has launched a new initiative designed to combat recruitment of youngsters into violent organized crime groups.
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
๐ Infostealers Harvest Over 30,000 Australian Banking Credentials ๐Dvuln researchers highlighted the growing impact of infostealers on the cybercrime landscape, enabling attackers to bypass traditional defenses.
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
๐ต๏ธโโ๏ธ Many Fuel Tank Monitoring Systems Vulnerable to Disruption ๐ต๏ธโโ๏ธThousands of automatic tank gauge ATG devices are accessible over the Internet and are just "a packet away" from compromise, security researcher warns at 2025 RSAC Conference.
๐ Read more.
๐ Via "Dark Reading"
----------
๐๏ธ Seen on @cibsecurity
๐ Infostealers Harvest Over 30,000 Australian Banking Credentials ๐Dvuln researchers highlighted the growing impact of infostealers on the cybercrime landscape, enabling attackers to bypass traditional defenses.
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
๐ Phorpiex Botnet Delivers LockBit Ransomware with Automated Tactics ๐A new ransomware campaign is automating LockBit deployment via the Phorpiex botnet, according to Cybereason.
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
๐ New Gremlin Infostealer Distributed on Telegram ๐Administrators of a Telegram channel named CoderSharp have been advertising Gremlin Stealer since March 2025.
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
๐ What is AI in Cybersecurity? ๐AI in cybersecurity is the use of artificial intelligence to detect, prevent, and respond to cyber threats in real time. AI security systems continuously analyze massive datasets, learning from patterns and anomalies to identify potential risks before they escalate.ย AI cybersecurity tools operate around the clock, sniffing out risks faster than humans, automating responses, and The post ย What is AI in Cybersecurity? appeared first on UnderDefense.
๐ Read more.
๐ Via "UnderDefense"
----------
๐๏ธ Seen on @cibsecurity
๐ข HPE boosts Aruba, GreenLake security ๐ขTech giant hopes to help enterprises battle against rise of "sophisticated" cloud threats.
๐ Read more.
๐ Via "ITPro"
----------
๐๏ธ Seen on @cibsecurity