Be Cyber Aware. Our vacancies channel: @CyberSecurityJobs Our chat: t.me/cybersecuritynewschat LinkedIn: https://www.linkedin.com/company/securitynews/ Facebook: https://www.facebook.com/BreakingCyberSecNews 📩 Cooperation: @cybersecadmin
☑️ Working on Compliance? Check this Out!
Notion ISMS = your resource for Information Security Management.
— Awareness
— Risk Management
— Implementation Roadmap
— ISO 27001 Self-Assessment doc
— Information Security Policies (& more)
✔️ Learn more here.
-----
@Cyber_Security_Channel
ℹ️ TikTok Faces Fresh European Privacy Investigation Over China Data Transfers
The investigation will examine whether TikTok's data transfer practices comply with European Union regulations, particularly in light of the company's ties to China.
Concerns over data privacy and security have been mounting, and this investigation could have significant implications for TikTok's operations in Europe.
@Cyber_Security_Channel
McDonald’s AI Hiring Bot Exposed Millions of Applicants’ Data to Hackers Who Tried the Password ‘123456’
Carroll says he only discovered that appalling lack of security around applicants' information because he was intrigued by McDonald's decision to subject potential new hires to an AI chatbot screener and personality test.
“I just thought it was pretty uniquely dystopian compared to a normal hiring process, right? And that's what made me want to look into it more,” says Carroll.
Cyber_Security_Channel
⚡️Louis Vuitton Data Breach Hits Customers in Several Countries
In Turkey, the company reported that the breach impacted nearly 143,000 residents.
The same statement reveals that the incident involved a compromised account related to a third-party service provider.
Cyber_Security_Channel
ℹ️ 16 Billion Passwords Exposed in Record-Breaking Data Breach
Happened a while back, maybe you missed it...
“This is not just a leak – it’s a blueprint for mass exploitation.
Cybercriminals now have unprecedented access to personal credentials that can be used for account takeover, identity theft, and highly targeted phishing.
What’s especially concerning is the structure and recency of these datasets – these aren’t just old breaches being recycled.
This is fresh, weaponizable intelligence at scale,” researchers said.
The leaked data includes login info for just about every online service you can think of.
We are talking:
- Apple
- GitHub
- Google
- Telegram
- Facebook
And even government platforms.
With 16 billion records floating around, it's safe to say almost nothing was left out.
Cyber_Security_Channel
Ransomware: Hunters International Is Not Actually Shutting Down, It's Rebranding
A Prodaft threat analyst known as 3xp0rt, who first spotted the group's takedown notice, told the Risky Business media outlet that the decryption keys are being made available via Hunters' backend.
"We have information that victims are required to log in to a portal mentioned in the ransom note using their existing credentials to obtain the decryption software," 3xp0rt said.
Cyber_Security_Channel
Twitter Co-Founder Jack Dorsey Just Launched A Messaging App That Doesn’t Need The Internet
The app, which utilizes blockchain technology and allows users to communicate via radio waves, Wi-Fi, or satellite connectivity, offers a decentralized alternative to traditional messaging platforms.
This innovative approach enables users to stay connected even in areas with limited or no internet access, promoting global communication and community building.
@Cyber_Security_Channel
Cyberattack Targets International Criminal Court
The fresh attack occurred just as NATO leaders, including US President Donald Trump, were gathering in The Hague for a summit, and at a time the court is handling various high-profile cases, including arrest warrants.
Cyber_Security_Channel
🚨 BRAODO Stealer abusing GitHub, obfuscated scripts dropping Remcos, BAT files delivering NetSupport RAT & more...
@anyrun_app publishes detailed breakdowns of the latest malware and phishing attacks every week.
Read about the top threats of June and gather threat intel for proactive defense — click on this link for the full material.
Want access to even more insights?
Subscribe here now.
-----
#ad #paidpromotion #sponsored
@Cyber_Security_Channel
⚡️China Breaks RSA Encryption With a Quantum Computer, Threatening Global Data Security
A 22‑bit key is trivially small compared with production‑grade RSA, yet the test matters because the approach scaled beyond past demonstrations that stopped at 19 bits and required more qubits per variable.
Cyber_Security_Channel
How CISOs Can Govern AI & Meet Evolving Regulations
Not long ago, the role of the chief information security officer (CISO) was well-defined: protect infrastructure, secure applications, safeguard customer data, manage risk, and ensure compliance across a growing partner ecosystem.
But as artificial intelligence (AI) transforms how enterprises operate, a new mandate has emerged: Govern its use responsibly, end to end.
Cyber_Security_Channel
👨💻 Drive Faster Triage and Response in Your SOC
Made possible with real-time sandbox analysis from @anyrun_app.
The process is super simple:
Sign up with your business Email.
Click the following link.
-----
#ad #paidpromotion #sponsored
@Cyber_Security_Channel
BADBOX 2.0 Targets Home Networks in Botnet Campaign, FBI Warns
BADBOX 2.0 also comes preinstalled on many devices, but it can also infect devices by requiring the user to download malicious apps from unofficial marketplaces.
While the FBI's public service announcement did not name specific device manufacturers, Human Security's report noted the infected products include Android Open Source Project devices (not Android TV or Google Play Protect certified devices) and were manufactured in China.
Cyber_Security_Channel
F5 Acquires Fletch, a San Francisco Cybersecurity Start-Up that Helps Companies Flag Threats
Seattle-based application delivery and security giant F5 has acquired Fletch, a San Francisco startup founded in 2020 that uses AI to help companies spot threats and reduce alert fatigue. Terms of the deal were not disclosed.
Cyber_Security_Channel
Czech Government Condemns Chinese Hack on Critical Infrastructure
The Government of the Czech Republic strongly condemns this malicious cyber campaign against its critical infrastructure,” the statement read.
“Such behavior undermines the credibility of the People’s Republic of China and contradicts its public declarations.
Cyber_Security_Channel
Binance CEO Provides Urgent Security Warning To All Users: Details Inside
The CEO's warning highlights the importance of users being vigilant and taking proactive measures to secure their accounts.
This includes enabling two-factor authentication, using strong passwords, and being cautious of phishing attempts.
@Cyber_Security_Channel
Due To Data Privacy… User Wins Lawsuit Against Meta In Germany
The German user's victory in the lawsuit against Meta highlights the growing concerns over data privacy in the digital age.
The court's ruling emphasizes the need for companies to prioritize transparency and accountability in their data collection practices.
This landmark case may set a precedent for future lawsuits and regulatory actions.
@Cyber_Security_Channel
Cybersecurity MBA Students Talk Tech, Business And Policy In D.C.
The event provided a platform for students to engage with industry experts and policymakers, discussing the latest trends and challenges in cybersecurity.
Through these interactions, students gained valuable insights into the intersection of technology, business, and policy in the field of cybersecurity.
@Cyber_Security_Channel
President Lee Emphasizes Cybersecurity As Strategic Industry During Information Security Day
The event highlighted the importance of fostering a robust cybersecurity ecosystem, with President Lee underscoring the need for continued innovation and investment in this critical field.
By prioritizing cybersecurity, the nation can better protect its digital assets and promote economic growth.
@Cyber_Security_Channel
Pakistan’s First AI-Powered Cybersecurity Tool Launched
The tool utilizes machine learning algorithms to detect and respond to cyber threats in real-time, enhancing the country's cybersecurity posture.
By leveraging AI, the tool can analyze vast amounts of data, identify patterns, and predict potential threats, enabling proactive measures to be taken.
@Cyber_Security_Channel
Ransomware Gang Hunters International Says It’s Shutting Down
The sudden decision to shut down has sparked speculation among cybersecurity experts, with some wondering if the group's claims are genuine or merely a ruse to avoid law enforcement attention.
Hunters International's activities had been closely monitored by authorities, and their alleged shutdown may indicate a significant development in the ongoing battle against ransomware threats.
@Cyber_Security_Channel
Scattered Spider Hacking Spree Continues With Airline Sector Attacks
The new attacks are consistent with Scattered Spider's pattern of constantly shifting industry targeting since bursting on to the threat landscape in 2022.
Multiple security vendors have described Scattered Spider as more of a loose collective rather than an organized group, consisting mostly 19 to 22 year old members who are native English speakers with a common interest in getting rich off of cybercrime.
Scattered Spider is one of several groups associated with "The Com," a decentralized community of young cybercriminals in the US, the UK, and Europe that primarily operates on platforms like Discord and Telegram.
Cyber_Security_Channel
Chrome 138, Firefox 140 Patch Multiple Vulnerabilities
Above update also fixes six medium-severity vulnerabilities leading to:
• The exposure of a persistent UUID to identify the browser.
• A lack of warning when opening files with the terminal extension.
• Policy bypass, phishing attacks on Android, security checks bypass, and cross-site scripting attacks.
Cyber_Security_Channel
Chaos Ransomware Hits Optima Tax Relief, Leaks 69GB of Data
Optima Tax Relief has not released an official statement regarding the breach.
There has been no confirmation about whether law enforcement or federal agencies are involved in the investigation.
If you’ve ever used its services, assume your data could be at risk.
Cyber_Security_Channel
The Road to Agentic AI: Defining a New Paradigm for Technology and Cybersecurity
Not every AI system claiming to be agentic is.
As technology evolves at an unprecedented pace, distinguishing genuine agentic AI systems from those that merely capitalize on industry buzzwords has become increasingly challenging.
Defining what makes AI truly agentic is not just an exercise in classification — it is a critical step toward understanding the broader security implications of these systems.
Cyber_Security_Channel
Zyxel Firewall Vulnerability Again in Attacker Crosshairs
The attacks were mainly aimed at targets in the US, the UK, Spain, Germany, and India.
The origin IPs, registered to Verizon Business infrastructure, were from the US, but GreyNoise notes that the true source of the attacks could have been spoofed, as the observed traffic was UDP, on port 500.
Cyber_Security_Channel
‘EchoLeak’ AI Attack Enabled Theft of Sensitive Data via Microsoft 365 Copilot
The user does not need to open the malicious email or click on any links.
The exploit, which Aim Security described as indirect prompt injection, is triggered when the victim asks Copilot for information referenced in the malicious email.
That is when Copilot executes the attacker’s instructions to collect information previously provided by the victim and send it to the attacker.
Cyber_Security_Channel
Trump Executive Order Takes Steps to Protect Domestic Hackers From Blowback
The Trump administration announced Friday it is amending “problematic elements” of two landmark cybersecurity executive orders — though the extent of the changes in many cases appears modest.
The modifications are part of a new executive order signed Friday by President Donald Trump.
The full text of the EO was released Friday afternoon, and the Trump administration first outlined details of the order in a White House fact sheet.
Cyber_Security_Channel
'Everest Group' Extorts Global Orgs via SAP's HR Tool
Besides Coca-Cola, Everest's most notable May victims have been the Mediclinic Group.
It's a multibillion-dollar hospital group managing locations in Namibia, South Africa, Switzerland, and the United Arab Emirates (UAE).
Additionally, the Department of Tourism and Culture in Abu Dhabi (DCTA).
It has also struck smaller outfits, like the Brooklyn-based medical imaging company PDI Health and a small bank based in Jordan called Jordan Kuwait Bank.
Cyber_Security_Channel
Nova Scotia Power Confirms Ransomware Attack, 280k Notified of Data Breach
In the latest update, shared on its website on May 23, Nova Scotia Power confirmed that it has been targeted in what it described as a “sophisticated ransomware attack”.
“No payment has been made to the threat actor,” the utility clarified.
“This decision reflects our careful assessment of applicable sanctions laws and alignment with law enforcement guidance.”
Cyber_Security_Channel