🗞 The finest daily news on cybersecurity and privacy. 🔔 Daily releases. 💻 Is your online life secure? 📩 lalilolalo.dev@gmail.com
🖋️ Deepfakes. Fake Recruiters. Cloned CFOs — Learn How to Stop AI-Driven Attacks in Real Time 🖋️Social engineering attacks have entered a new eraand theyre coming fast, smart, and deeply personalized. Its no longer just suspicious emails in your spam folder. Todays attackers use generative AI, stolen branding assets, and deepfake tools to mimic your executives, hijack your social channels, and create convincing fakes of your website, emails, and even voice. They dont just spoofthey.
📖 Read more.
🔗 Via "The Hacker News"
----------
👁️ Seen on @cibsecurity
🖋️ AI Agents Act Like Employees With Root Access—Here's How to Regain Control 🖋️The AI gold rush is on. But without identityfirst security, every deployment becomes an open door. Most organizations secure native AI like a web app, but it behaves more like a junior employee with root access and no manager. From Hype to High Stakes Generative AI has moved beyond the hype cycle. Enterprises are Deploying LLM copilots to accelerate software development Automating customer.
📖 Read more.
🔗 Via "The Hacker News"
----------
👁️ Seen on @cibsecurity
🖋️ UNC6148 Backdoors Fully-Patched SonicWall SMA 100 Series Devices with OVERSTEP Rootkit 🖋️A threat activity cluster has been observed targeting fullypatched endoflife SonicWall Secure Mobile Access SMA 100 series appliances as part of a campaign designed to drop a backdoor called OVERSTEP. The malicious activity, dating back to at least October 2024, has been attributed by the Google Threat Intelligence Group GTIG to a hacking crew it tracks as UNC6148. The number of known.
📖 Read more.
🔗 Via "The Hacker News"
----------
👁️ Seen on @cibsecurity
🦿 Trump Announces Pennsylvania Will Receive $90B+ in AI and Energy Investments 🦿During the summit held in Pittsburgh, Pennsylvania on July 15, companies promised new data centers, new jobs, cybersecurity education, energy research, and more.
📖 Read more.
🔗 Via "Tech Republic"
----------
👁️ Seen on @cibsecurity
🦿 Top Tech Conferences & Events to Add to Your Calendar in 2025 🦿A great way to stay current with the latest tech trends and innovations is by attending conferences. Read and bookmark TechRepublic's events guide.
📖 Read more.
🔗 Via "Tech Republic"
----------
👁️ Seen on @cibsecurity
🕵️♂️ Lessons Learned From McDonald's Big AI Flub 🕵️♂️McDonald's hiring platform was using its original default credentials and inadvertently exposed information belonging to possibly millions of job applicants.
📖 Read more.
🔗 Via "Dark Reading"
----------
👁️ Seen on @cibsecurity
🕵️♂️ Altered Telegram App Steals Chinese Users' Android Data 🕵️♂️Using more than 600 domains, attackers entice Chinesespeaking victims to download a vulnerable Telegram app that is nearly undetectable on older versions of Android.
📖 Read more.
🔗 Via "Dark Reading"
----------
👁️ Seen on @cibsecurity
🕵️♂️ Fully Patched SonicWall Gear Under Likely Zero-Day Attack 🕵️♂️A threat actor with likely links to the Abyss ransomware group is leveraging an apparent zeroday vulnerability to deploy the "Overstep" backdoor on fully uptodate appliances.
📖 Read more.
🔗 Via "Dark Reading"
----------
👁️ Seen on @cibsecurity
🕵️♂️ Elite 'Matanbuchus 3.0' Loader Spruces Up Ransomware Infections 🕵️♂️An upgraded cybercrime tool is designed to make targeted ransomware attacks as easy and effective as possible, with features like EDRspotting and DNSbased C2 communication.
📖 Read more.
🔗 Via "Dark Reading"
----------
👁️ Seen on @cibsecurity
📢 Industry welcomes the NCSC’s new Vulnerability Research Initiative – but does it go far enough? 📢The cybersecurity agency will work with external researchers to uncover potential security holes in hardware and software.
📖 Read more.
🔗 Via "ITPro"
----------
👁️ Seen on @cibsecurity
🖋️ Over 600 Laravel Apps Exposed to Remote Code Execution Due to Leaked APP_KEYs on GitHub 🖋️Cybersecurity researchers have discovered a serious security issue that allows leaked Laravel APPKEYs to be weaponized to gain remote code execution capabilities on hundreds of applications. "Laravel's APPKEY, essential for encrypting sensitive data, is often leaked publicly e.g., on GitHub," GitGuardian said. "If attackers get access to this key, they can exploit a deserialization flaw to.
📖 Read more.
🔗 Via "The Hacker News"
----------
👁️ Seen on @cibsecurity
🕵️♂️ Pay2Key Ransomware Gang Resurfaces With Incentives to Attack US, Israel 🕵️♂️The ransomwareasaservice RaaS operation, which has been tied to an Iranian advanced persistent threat APT group, recently boosted its affiliate profit share to 80 for attacks on Western targets.
📖 Read more.
🔗 Via "Dark Reading"
----------
👁️ Seen on @cibsecurity
🖋️ Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257) 🖋️Fortinet has released fixes for a critical security flaw impacting FortiWeb that could enable an unauthenticated attacker to run arbitrary database commands on susceptible instances. Tracked as CVE202525257, the vulnerability carries a CVSS score of 9.6 out of a maximum of 10.0. "An improper neutralization of special elements used in an SQL command 'SQL Injection' vulnerability CWE89 in.
📖 Read more.
🔗 Via "The Hacker News"
----------
👁️ Seen on @cibsecurity
🕵️♂️ Factoring Cybersecurity Into Finance's Digital Strategy 🕵️♂️As financial institutions continue to embrace digital transformation, their success will depend on their ability to establish and maintain robust and responsible cybersecurity practices.
📖 Read more.
🔗 Via "Dark Reading"
----------
👁️ Seen on @cibsecurity
🖋️ Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals 🖋️An Iranianbacked ransomwareasaservice RaaS named Pay2Key has resurfaced in the wake of the IsraelIranU.S. conflict last month, offering bigger payouts to cybercriminals who launch attacks against Israel and the U.S. The financially motivated scheme, now operating under the moniker Pay2Key.I2P, is assessed to be linked to a hacking group tracked as Fox Kitten aka Lemon Sandstorm. ".
📖 Read more.
🔗 Via "The Hacker News"
----------
👁️ Seen on @cibsecurity
🖋️ New Konfety Malware Variant Evades Detection by Manipulating APKs and Dynamic Code 🖋️Cybersecurity researchers have discovered a new, sophisticated variant of a known Android malware referred to as Konfety that leverages the evil twin technique to enable ad fraud. The sneaky approach essentially involves a scenario wherein two variants of an application share the same package name A benign "decoy" app that's hosted on the Google Play Store and its evil twin, which is.
📖 Read more.
🔗 Via "The Hacker News"
----------
👁️ Seen on @cibsecurity
🖋️ Critical Golden dMSA Attack in Windows Server 2025 Enables Cross-Domain Attacks and Persistent Access 🖋️Cybersecurity researchers have disclosed what they say is a "critical design flaw" in delegated Managed Service Accounts dMSAs introduced in Windows Server 2025. "The flaw can result in highimpact attacks, enabling crossdomain lateral movement and persistent access to all managed service accounts and their resources across Active Directory indefinitely," Semperis said in a report shared with.
📖 Read more.
🔗 Via "The Hacker News"
----------
👁️ Seen on @cibsecurity
🖋️ Hackers Leverage Microsoft Teams to Spread Matanbuchus 3.0 Malware to Targeted Firms 🖋️Cybersecurity researchers have flagged a new variant of a known malware loader called Matanbuchus that packs in significant features to enhance its stealth and evade detection. Matanbuchus is the name given to a malwareasaservice MaaS offering that can act as a conduit for nextstage payloads, including Cobalt Strike beacons and ransomware. First advertised in February 2021 on.
📖 Read more.
🔗 Via "The Hacker News"
----------
👁️ Seen on @cibsecurity
🦿 Four AI Powerhouses Land $200M Pentagon Contracts to ‘Support US Warfighters’ 🦿The Pentagon awards 200 million contracts to Google, OpenAI, Anthropic, and xAI to develop AI systems for US defense and national security operations.
📖 Read more.
🔗 Via "Tech Republic"
----------
👁️ Seen on @cibsecurity
🦿 Microsoft’s July Patch Might Be to Blame If Azure VM Isn’t Loading 🦿The security bug was introduced during Microsofts July 2025 Patch Tuesday rollout last week.
📖 Read more.
🔗 Via "Tech Republic"
----------
👁️ Seen on @cibsecurity
🕵️♂️ ISC2 Finds Orgs Are Increasingly Leaning on AI 🕵️♂️While many organizations are eagerly integrating AI into their workflows and cybersecurity practices, some remain undecided and even concerned about potential drawbacks of AI deployment.
📖 Read more.
🔗 Via "Dark Reading"
----------
👁️ Seen on @cibsecurity
🕵️♂️ Securing the Budget: Demonstrating Cybersecurity's Return 🕵️♂️By tying security investments to measurable outcomes like reduced breach likelihood and financial impact CISOs can align internal stakeholders and justify spending based on realworld risk.
📖 Read more.
🔗 Via "Dark Reading"
----------
👁️ Seen on @cibsecurity
🕵️♂️ Women Who 'Hacked the Status Quo' Aim to Inspire Cybersecurity Careers 🕵️♂️A group of female cybersecurity pioneers will share what they've learned about navigating a field dominated by men, in order to help other women empower themselves and pursue successful cybersecurity careers.
📖 Read more.
🔗 Via "Dark Reading"
----------
👁️ Seen on @cibsecurity
📢 MSPs emerge as key security partners for mid-market enterprises 📢The MSP Customer Insight Report reveals 85 of midsized organizations now rely on MSPs for security support.
📖 Read more.
🔗 Via "ITPro"
----------
👁️ Seen on @cibsecurity
📢 ‘All US forces must now assume their networks are compromised’ after Salt Typhoon breach 📢The announcement marks the second major Salt Typhoon incident in the space of two years.
📖 Read more.
🔗 Via "ITPro"
----------
👁️ Seen on @cibsecurity
🕵️♂️ 350M Cars, 1B Devices Exposed to 1-Click Bluetooth RCE 🕵️♂️Mercedes, Skoda, and Volkswagen vehicles, as well as untold industrial, medical, mobile, and consumer devices, may be vulnerable to an attack chain called "PerfektBlue.".
📖 Read more.
🔗 Via "Dark Reading"
----------
👁️ Seen on @cibsecurity
🕵️♂️ As Cyber-Insurance Premiums Drop, Coverage Is Key to Resilience 🕵️♂️Cyberinsurance premiums continue to decline from their explosive growth from 2020 to 2022, but coverage is more important than ever to manage risks, experts say.
📖 Read more.
🔗 Via "Dark Reading"
----------
👁️ Seen on @cibsecurity
📔 ISACA Addresses Experience Gap with CISA Associate Designation 📔The new CISA Associate designation recognizes ISACA members who have passed the CISA exam, but do not yet have the required experience.
📖 Read more.
🔗 Via "Infosecurity Magazine"
----------
👁️ Seen on @cibsecurity
🖋️ PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution 🖋️Cybersecurity researchers have discovered a set of four security flaws in OpenSynergy's BlueSDK Bluetooth stack that, if successfully exploited, could allow remote code execution on millions of transport vehicles from different vendors. The vulnerabilities, dubbed PerfektBlue, can be fashioned together as an exploit chain to run arbitrary code on cars from at least three major automakers,.
📖 Read more.
🔗 Via "The Hacker News"
----------
👁️ Seen on @cibsecurity
🖋️ Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild 🖋️A recently disclosed maximumseverity security flaw impacting the Wing FTP Server has come under active exploitation in the wild, according to Huntress. The vulnerability, tracked as CVE202547812 CVSS score 10.0, is a case of improper handling of null '0' bytes in the server's web interface, which allows for remote code execution. It has been addressed in version 7.4.4. "The user and.
📖 Read more.
🔗 Via "The Hacker News"
----------
👁️ Seen on @cibsecurity