🛡 Cybersecurity & Privacy 🛡 - News – Telegram
🛡 Cybersecurity & Privacy 🛡 - News
25.2K subscribers
88.5K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
📔 Infostealer Targets OpenClaw to Loot Victim’s Digital Life 📔

Hudson Rock has warned OpenClaw users that infostealers are targeting their configuration files.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
📢 Vast majority of breaches enabled by preventable gaps, identity weaknesses says Palo Alto Networks 📢

Identity controls and better understanding of threat surface are key to rebuffing increasingly threatening cyber attacks.

📖 Read more.

🔗 Via "ITPro"

----------
👁️ Seen on @cibsecurity
🖋️ Webinar: How Modern SOC Teams Use AI and Context to Investigate Cloud Breaches Faster 🖋️

Cloud attacks move fast faster than most incident response teams. In data centers, investigations had time. Teams could collect disk images, review logs, and build timelines over days. In the cloud, infrastructure is shortlived. A compromised instance can disappear in minutes. Identities rotate. Logs expire. Evidence can vanish before analysis even begins. Cloud forensics is fundamentally.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
🖋️ My Day Getting My Hands Dirty with an NDR System 🖋️

My objectiveThe role of NDR in SOC workflowsStarting up the NDR systemHow AI complements the human responseWhat else did I try out?What could I see with NDR that I wouldnt otherwise?Am I ready to be a network security analyst now? My objective As someone relatively inexperienced with network threat hunting, I wanted to get some handson experience using a network detection and response .

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
📢 Researchers called on LastPass, Dashlane, and Bitwarden to up defenses after severe flaws put 60 million users at risk – here’s how each company responded 📢

Analysts at ETH Zurich called for cryptographic standard improvements after a host of password managers were found lacking.

📖 Read more.

🔗 Via "ITPro"

----------
👁️ Seen on @cibsecurity
📔 Over-Privileged AI Drives 4.5 Times Higher Incident Rates 📔

Teleport study reveals that organizations running overprivileged AI have a 76 incident rate.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
📔 Significant Rise in Ransomware Attacks Targeting Industrial Operations 📔

Dragos annual report warns of a surge in ransomware attacks causing increased operational disruption in industrial environments.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
🖋️ SmartLoader Attack Uses Trojanized Oura MCP Server to Deploy StealC Infostealer 🖋️

Cybersecurity researchers have disclosed details of a new SmartLoader campaign that involves distributing a trojanized version of a Model Context Protocol MCP server associated with Oura Health to deliver an information stealer known as StealC. "The threat actors cloned a legitimate Oura MCP Server a tool that connects AI assistants to Oura Ring health data and built a deceptive.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
📔 Low-Skilled Cybercriminals Use AI to Perform "Vibe Extortion" Attacks 📔

Unit 42 researchers observed a lowskilled threat actor using an LLM to noscript a professional extortion strategy, complete with deadlines and pressure tactics.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
📔 Apple Expands RCS Encryption and Memory Protections in iOS 26.4 📔

iOS 26.4 Beta adds endtoend encryption for RCS messaging and enhanced Memory Integrity Enforcement.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
2
📢 Millions of developers could be impacted by flaws in Visual Studio Code extensions – here's what you need to know and how to protect yourself 📢

The VS Code vulnerabilities highlight broader IDE security risks, said OX Security.

📖 Read more.

🔗 Via "ITPro"

----------
👁️ Seen on @cibsecurity
📢 Ransomware protection for all: How consumption-based subnoscription models can lower the entry point for cyber resilience 📢

Consumptionbased immutable backup makes enterprisegrade ransomware resilience affordable to all.

📖 Read more.

🔗 Via "ITPro"

----------
👁️ Seen on @cibsecurity
🦿 Microsoft: Critical Windows Admin Center Flaw Allows Privilege Escalation 🦿

A highseverity Windows Admin Center vulnerability CVE202626119 could allow privilege escalation in enterprise environments. Heres what to know and how to mitigate risk. The post Microsoft Critical Windows Admin Center Flaw Allows Privilege Escalation appeared first on TechRepublic.

📖 Read more.

🔗 Via "Tech Republic"

----------
👁️ Seen on @cibsecurity
🦿 Substack Breach May Have Leaked Nearly 700,000 User Details Online 🦿

Substack says hackers accessed user emails, phone numbers, and internal metadata in October 2025, with a database of 697,313 records later posted online. The post Substack Breach May Have Leaked Nearly 700,000 User Details Online appeared first on TechRepublic.

📖 Read more.

🔗 Via "Tech Republic"

----------
👁️ Seen on @cibsecurity
🖋️ CRESCENTHARVEST Campaign Targets Iran Protest Supporters With RAT Malware 🖋️

Cybersecurity researchers have disclosed details of a new campaign dubbed CRESCENTHARVEST, likely targeting supporters of Iran's ongoing protests to conduct information theft and longterm espionage. The Acronis Threat Research Unit TRU said it observed the activity after January 9, with the attacks designed to deliver a malicious payload that serves as a remote access trojan RAT and.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
🖋️ Citizen Lab Finds Cellebrite Tool Used on Kenyan Activist’s Phone in Police Custody 🖋️

New research from the Citizen Lab has found signs that Kenyan authorities used a commercial forensic extraction tool manufactured by Israeli company Cellebrite to break into a prominent dissident's phone, making it the latest case of abuse of the technology targeting civil society. The interdisciplinary research unit at the University of Toronto's Munk School of Global Affairs Public.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
🖋️ Grandstream GXP1600 VoIP Phones Exposed to Unauthenticated Remote Code Execution 🖋️

Cybersecurity researchers have disclosed a critical security flaw in the Grandstream GXP1600 series of VoIP phones that could allow an attacker to seize control of susceptible devices. The vulnerability, tracked as CVE20262329, carries a CVSS score of 9.3 out of a maximum of 10.0. It has been described as a case of unauthenticated stackbased buffer overflow that could result in remote code.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
🖋️ Critical Flaws Found in Four VS Code Extensions with Over 125 Million Installs 🖋️

Cybersecurity researchers have disclosed multiple security vulnerabilities in four popular Microsoft Visual Studio Code VS Code extensions that, if successfully exploited, could allow threat actors to steal local files and execute code remotely. The extensions, which have been collectively installed more than 125 million times, are Live Server, Code Runner, Markdown Preview Enhanced, and.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
🖋️ Cybersecurity Tech Predictions for 2026: Operating in a World of Permanent Instability 🖋️

In 2025, navigating the digital seas still felt like a matter of direction. Organizations charted routes, watched the horizon, and adjusted course to reach safe harbors of resilience, trust, and compliance. In 2026, the seas are no longer calm between storms. Cybersecurity now unfolds in a state of continuous atmospheric instability AIdriven threats that adapt in real time, expanding.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
🖋️ Dell RecoverPoint for VMs Zero-Day CVE-2026-22769 Exploited Since Mid-2024 🖋️

A maximum severity security vulnerability in Dell RecoverPoint for Virtual Machines has been exploited as a zeroday by a suspected Chinanexus threat cluster dubbed UNC6201 since mid2024, according to a new report from Google Mandiant and Google Threat Intelligence Group GTIG. The activity involves the exploitation of CVE202622769 CVSS score 10.0, a case of hardcoded credentials.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
🖋️ 3 Ways to Start Your Intelligent Workflow Program 🖋️

Security, IT, and engineering teams today are under relentless pressure to accelerate outcomes, cut operational drag, and unlock the full potential of AI and automation. But simply investing in tools isnt enough. 88 of AI proofsofconcept never make it to production, even though 70 of workers cite freeing time for highvalue work as the primary AI automation motivation. Real impact comes.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity