cibsecurity | Unsorted

Telegram-ะบะฐะฝะฐะป cibsecurity - ๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

25729

๐Ÿ—ž The finest daily news on cybersecurity and privacy. ๐Ÿ”” Daily releases. ๐Ÿ’ป Is your online life secure? ๐Ÿ“ฉ lalilolalo.dev@gmail.com

Subscribe to a channel

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ“” Police Scotland Fined After Sharing Victimโ€™s Phone Data ๐Ÿ“”

The ICO has fined Police Scotland after it shared the entire contents of a victims phone with her alleged attacker.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ“” Critical Zero-Click Flaw in n8n Allows Full Server Compromise ๐Ÿ“”

The critical vulnerability affecting both cloud and selfhosted n8n instances requires no authentication or even n8n account to be exploited.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ“” Law Enforcement Dismantles SocksEscort Proxy Network in Operation Lightning ๐Ÿ“”

Operation Lightning sees international law enforcement partners shut down SocksEscort, a major malicious proxy service used by cybercriminals worldwide.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿš€ Sednit reloaded: Back in the trenches ๐Ÿš€

The resurgence of one of Russias most notorious APT groups.

๐Ÿ“– Read more.

๐Ÿ”— Via "ESET - WeLiveSecurity"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿš€ Face value: What it takes to fool facial recognition ๐Ÿš€

ESETs Jake Moore used smart glasses, deepfakes and face swaps to hack widelyused facial recognition systems and he'll demo it all at RSAC 2026.

๐Ÿ“– Read more.

๐Ÿ”— Via "ESET - WeLiveSecurity"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ–‹๏ธ Web Server Exploits and Mimikatz Used in Attacks Targeting Asian Critical Infrastructure ๐Ÿ–‹๏ธ

Highvalue organizations located in South, Southeast, and East Asia have been targeted by a Chinese threat actor as part of a yearslong campaign. The activity, which has targeted aviation, energy, government, law enforcement, pharmaceutical, technology, and telecommunications sectors, has been attributed by Palo Alto Networks Unit 42 to a previously undocumented threat activity group dubbed.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

โ™Ÿ๏ธ How AI Assistants are Moving the Security Goalposts โ™Ÿ๏ธ

AIbased assistants or "agents" autonomous programs that have access to the user's computer, files, online services and can automate virtually any task are growing in popularity with developers and IT workers. But as so many eyebrowraising headlines over the past few weeks have shown, these powerful and assertive new tools are rapidly shifting the security priorities for organizations, while blurring the lines between data and code, trusted coworker and insider threat, ninja hacker and novice code jockey.

๐Ÿ“– Read more.

๐Ÿ”— Via "Krebs on Security"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ–‹๏ธ OpenAI Codex Security Scanned 1.2 Million Commits and Found 10,561 High-Severity Issues ๐Ÿ–‹๏ธ

OpenAI on Friday began rolling out Codex Security, an artificial intelligence AIpowered security agent that's designed to find, validate, and propose fixes for vulnerabilities. The feature is available in a research preview to ChatGPT Pro, Enterprise, Business, and Edu customers via the Codex web with free usage for the next month. "It builds deep context about your project to identify.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ–‹๏ธ Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT ๐Ÿ–‹๏ธ

Cybersecurity researchers have disclosed details of a multistage malware campaign that uses batch scripts as a pathway to deliver various encrypted remote access trojan RATs payloads that correspond to XWorm, AsyncRAT, and Xeno RAT. The stealthy attack chain has been codenamed VOIDGEIST by Securonix Threat Research. At a high level, the obfuscated batch script is used to deploy a second.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿฆฟ Bitwarden Brings Passkey Logins to Windows 11, Expanding Passwordless Sign-Ins ๐Ÿฆฟ

Bitwarden now supports passkey logins on Windows 11 for Microsoft Entra ID users, extending passwordless signins to device authentication. The post Bitwarden Brings Passkey Logins to Windows 11, Expanding Passwordless SignIns appeared first on TechRepublic.

๐Ÿ“– Read more.

๐Ÿ”— Via "Tech Republic"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿฆฟ FBI Investigates Suspicious Activity in Surveillance Platform ๐Ÿฆฟ

The FBI is investigating suspicious cyber activity in a system used to process surveillance and wiretap warrants, raising concerns about security risks to sensitive data. The post FBI Investigates Suspicious Activity in Surveillance Platform appeared first on TechRepublic.

๐Ÿ“– Read more.

๐Ÿ”— Via "Tech Republic"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ“ข Organizations hit by 90 zero-day vulnerabilities last year ๐Ÿ“ข

Google Threat Intelligence researchers warn that edge devices and security appliances are prime entry points.

๐Ÿ“– Read more.

๐Ÿ”— Via "ITPro"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿฆ… ClipXDaemon: Autonomous X11 Clipboard Hijacker Delivered via Bincrypter-Based Loader ๐Ÿฆ…

Executive Summary In early February 2026, Cyble Research Intelligence Labs CRIL identified a new Linux malware strain delivered through a loader structure previously associated with ShadowHS activity. While ShadowHS samples deployed postexploitation tooling, the newly observed payload is operationally different. We have named it ClipXDaemon, an autonomous cryptocurrency clipboard hijacker targeting Linux X11 environments. At the time of this writing, there is no evidence that ShadowHS and ClipXDaemon originate from the same malware author or campaign. The structural overlap in the loader stems from the use of bincrypter, an opensource shellscript encryption framework hosted on GitHub. Both campaigns appear to have leveraged this public tool independently. ClipXDaemon differ...

๐Ÿ“– Read more.

๐Ÿ”— Via "CYBLE"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ“” ContextCrush Flaw Exposes AI Development Tools to Attacks ๐Ÿ“”

Critical flaw "ContextCrush" in Context7 MCP Server could allow malicious instructions into AI tools.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ“” Zeroโ€‘Day Attacks on Enterprise Software Reach Record High, Google Warns ๐Ÿ“”

Almost a quarter of the zero days detected by Google in 2025 targeted security and networking appliances.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ“” CISA Issues Emergency Directive Over Exploited Cisco SD-WAN Flaws ๐Ÿ“”

CISA issued urgent directive as attackers exploit Cisco SDWAN flaw granting admin access to networks.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ“” PixRevolution Malware Hijacks Brazil's PIX Transfers in Real Time ๐Ÿ“”

PixRevolution Android trojan hijacks Brazils PIX payments in real time using accessibility abuse.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ“” Interpol's 'Operation Synergia III' Nets 94 Arrests in Major Cybercrime Sweep ๐Ÿ“”

A new law enforcement operation against phishing and ransomware operators led to the takedown of 45,000 malicious IP addresses.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿš€ Cyber fallout from the Iran war: What to have on your radar ๐Ÿš€

The cybersecurity implications of the war in the Middle East extend far beyond the region. Heres where to focus your defenses.

๐Ÿ“– Read more.

๐Ÿ”— Via "ESET - WeLiveSecurity"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿšจ International security chiefs to convene in Glasgow for flagship CYBERUK conference ๐Ÿšจ

CYBERUK will be delivered by the NCSC and sponsors across four distinct tracks of activity Resilience, Technology, Threat, and Ecosystem.

๐Ÿ“– Read more.

๐Ÿ”— Via "UK NCSC"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ–‹๏ธ Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data Theft ๐Ÿ–‹๏ธ

Two Google Chrome extensions have turned malicious after what appears to be a case of ownership transfer, offering attackers a way to push malware to downstream customers, inject arbitrary code, and harvest sensitive data. The extensions in question, both originally associated with a developer named "akshayanuonlinegmail.com" BuildMelon, are listed below QuickLens Search Screen with.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ–‹๏ธ Anthropic Finds 22 Firefox Vulnerabilities Using Claude Opus 4.6 AI Model ๐Ÿ–‹๏ธ

Anthropic on Friday said it discovered 22 new security vulnerabilities in the Firefox web browser as part of a security partnership with Mozilla. Of these, 14 have been classified as high, seven have been classified as moderate, and one has been rated low in severity. The issues were addressed in Firefox 148, released late last month. The vulnerabilities were identified over a twoweek period in.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿš€ What cybersecurity actually does for your business ๐Ÿš€

The ability to continue operating safely in an unsafe environment where competitors cannot is a competitive advantage that is rarely measured or discussed.

๐Ÿ“– Read more.

๐Ÿ”— Via "ESET - WeLiveSecurity"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ–‹๏ธ Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting India ๐Ÿ–‹๏ธ

The Pakistanaligned threat actor known as Transparent Tribe has become the latest hacking group to embrace artificial intelligence AIpowered coding tools to strike targets with various implants. The activity is designed to produce a "highvolume, mediocre mass of implants" that are developed using lesserknown programming languages like Nim, Zig, and Crystal and rely on trusted services like.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿฆฟ LexisNexis Hack Exposes 3.9M Records Through Unpatched React Vulnerability ๐Ÿฆฟ

LexisNexis confirmed a data breach after hackers leaked stolen files, with attackers claiming they exploited the React2Shell vulnerability. The post LexisNexis Hack Exposes 3.9M Records Through Unpatched React Vulnerability appeared first on TechRepublic.

๐Ÿ“– Read more.

๐Ÿ”— Via "Tech Republic"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ“” Iran's MuddyWater Hackers Hit US Firms with New 'Dindoor' Backdoor ๐Ÿ“”

A bank, an airport, a nonprofit and the Israeli branch of a US software company were among the targets of this new MuddyWater campaign.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ“ข FBI and Europol take down major data leak forum ๐Ÿ“ข

LeakBase enabled the sale and purchase of huge amount of personal data and had more than 142,000 members.

๐Ÿ“– Read more.

๐Ÿ”— Via "ITPro"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ“” Coruna Exploit Kit Targets Older iPhones in Multi-Stage Campaigns ๐Ÿ“”

Exploit kit "Coruna" targets iPhones running iOS 13.0 to 17.2.1, focusing on financial data theft.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ“” AI-Driven Insider Risk Now a โ€œCritical Business Threat,โ€ Report Warns ๐Ÿ“”

Malicious insiders are using misusing AI for nefarious gain, while employees cutting corners also creates risk, warns Mimecast.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ–‹๏ธ APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine ๐Ÿ–‹๏ธ

Cybersecurity researchers have disclosed details of a new Russian cyber campaign that has targeted Ukrainian entities with two previously undocumented malware families named BadPaw and MeowMeow. "The attack chain initiates with a phishing email containing a link to a ZIP archive. Once extracted, an initial HTA file displays a lure document written in Ukrainian concerning border crossing appeals.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…
Subscribe to a channel