ar
Feedback
Cyber Security News

Cyber Security News

الذهاب إلى القناة على Telegram
2025 عام في الأرقامsnowflakes fon
card fon
54 710
المشتركون
لا توجد بيانات24 ساعات
+447 أيام
+33930 أيام
أرشيف المشاركات
Minnesota Activates National Guard in Response to Cyberattack “The Minnesota National Guard’s cyber forces will collaborate with city, state, and federal officials to resolve the situation and mitigate lasting impacts. Above all, we are committed to protecting the safety and security of the people of Saint Paul,” he continued. Cyber_Security_Channel
إظهار الكل...
1👍 1
BlackSuit Ransomware: Law Enforcement Officials Seize Ransomware Website The seizure of BlackSuit's dark web infrastructure, including data leak blogs and negotiation sites, marks a significant setback for the ransomware group. This operation, dubbed "Operation Checkmate," was a collaborative effort involving law enforcement agencies from the US, UK, Ukraine, and others, with support from Romanian cybersecurity firm Bitdefender. The group's sites now display seizure notices, disrupting their ability to extort victims and leak stolen data. The BlackSuit ransomware gang, believed to be a rebranding of the Conti and Royal ransomware gangs, has targeted hundreds of organizations worldwide, demanding over $500 million in ransoms. However, researchers suggest that BlackSuit may have already rebranded as Chaos ransomware, sharing similar tactics and code patterns ². @Cyber_Security_Channel
إظهار الكل...
7👏 1
New York Seeking Public Opinion on Water Systems Cyber Regulations DOH, DEC, and EFC worked together to align definitions and provisions within their requirements, and to ensure that the regulations are aligned with CISA and Environmental Protection Agency guidance on securing IT and OT environments. Cyber_Security_Channel
إظهار الكل...
👍 3 1
High-Severity Flaws Patched in Chrome, Firefox The first high-severity bug, CVE-2025-8027, impacts the browser’s JavaScript engine, which only writes partial return values to the stack. The second, CVE-2025-8028, impacts arm64 architectures, where numerous entries in a specific instruction leads to “truncation and incorrect computation of the branch address”. Cyber_Security_Channel
إظهار الكل...
👍 4 1
Microsoft’s New Security Store is Like an App Store for Cybersecurity The Microsoft Security Store is a storefront designed for security professionals to buy and deploy SaaS solutions and AI agents from Microsoft’s ecosystem partners. Darktrace, Illumio, Netskope, Perfomanta, and Tanium are all part of the new store, with solutions covering threat protection, identity and device management, and more. Cyber_Security_Channel
إظهار الكل...
6👍 1
Cisco Firewall Zero-Days Exploited in China-Linked ArcaneDoor Attacks Users are advised to update their devices as soon as possible, as the fixed release will automatically check the ROM and remove the attackers’ persistence mechanism. Users are also advised to rotate all passwords, certificates, and keys following the update. Cyber_Security_Channel
إظهار الكل...
🔥 9
Photo unavailableShow in Telegram
💥 𝗦𝘁𝗮𝘆 O𝗻𝗲 S𝘁𝗲𝗽 A𝗵𝗲𝗮𝗱 W𝗶𝘁𝗵 T𝗼𝗽-N𝗼𝘁𝗰𝗵 T𝗵𝗿𝗲𝗮𝘁 I𝗻𝘁𝗲𝗹𝗹𝗶𝗴𝗲𝗻𝗰𝗲 F𝗲𝗲𝗱𝘀 Detect and stop threats before they strike your company. Contact #ANYRUN to try TI Feeds — right here. ----- #ad #paidpromotion #sponsored @Cyber_Security_Channel
إظهار الكل...
7👍 1😍 1
Throwback ICOUNTER: $30 Million Series A Raised For Cybersecurity Solutions The Series A funding will enable iCOUNTER to expand its cybersecurity offerings and enhance its capabilities to protect against evolving threats. By bolstering its resources, iCOUNTER aims to deliver more effective security solutions to its clients. p.s. if you are looking for a job in cybersecurity, this quick training might help in your next interview. @Cyber_Security_Channel
إظهار الكل...
4
Uganda Orders Google To Register As Data Processor In Landmark Privacy Ruling This ruling sets a precedent for data protection in Uganda, emphasizing the need for companies like Google to comply with local data processing regulations. The order reflects growing efforts by governments to assert control over data handling practices of major tech companies to protect citizens' privacy. ----- p.s. top companies use this tool for automating compliance (no, it's not Delve) but it does save a lot of time and stress for security teams. ----- @Cyber_Security_Channel
إظهار الكل...
👍 8 1
Photo unavailableShow in Telegram
🚨 Lazarus Group Escalated its Operations in 2025   Discover active campaigns and malware from this APT, and get actionable advice to prepare your SOC for the next attack — click on this link for the full material.   @anyrun_app publishes detailed breakdowns of the latest malware and phishing attacks every week.   Want access to even more insights?   Subscribe here now. ----- #ad #paidpromotion #sponsored @Cyber_Security_Channel
إظهار الكل...
5👍 3🔥 2
Reshaping Cybersecurity And Digital Forensics In Ghana The initiative aims to enhance Ghana's cybersecurity capabilities, improve digital forensic analysis, and build a skilled workforce to tackle emerging cyber threats. By investing in these areas, Ghana can better protect its digital infrastructure and support economic development. ----- p.s. if you want to get 1% better at cybersecurity today, start here and improve your skills. ----- @Cyber_Security_Channel
إظهار الكل...
6👍 1
Agents Of Change: The Rise Of Autonomous AI In Cybersecurity Autonomous AI systems can analyze vast amounts of data, identify patterns, and respond to threats in real-time, enabling organizations to stay ahead of sophisticated cyber attacks. As the technology continues to evolve, it's likely to play an increasingly important role in protecting digital assets and infrastructure. ----- p.s. if you want to get 1% better at cybersecurity today, start here and improve your skills. ----- @Cyber_Security_Channel
إظهار الكل...
2🤔 1
Photo unavailableShow in Telegram
Over 600 Laravel Apps Exposed To Remote Code Execution Due To Leaked APP_KEYs On GitHub The exposure of these APP_KEYs on GitHub puts the affected Laravel applications at risk of remote code execution attacks, potentially allowing attackers to gain unauthorized access or control. Developers are urged to secure their keys and review their application's security to prevent exploitation. 📸 Image Credit: Codeburst ----- No CTA today — let's take a day off =) ----- @Cyber_Security_Channel
إظهار الكل...
5👍 2
Fully Home-Grown Tech Must For Cybersecurity, Cannot Depend On Other Sources: IT Secy The secretary emphasized the need for self-reliance in cybersecurity technologies to ensure the country's digital infrastructure is secure and not vulnerable to external dependencies. Developing indigenous tech capabilities is seen as crucial for safeguarding national security interests. p.s. if you are looking for a job in cybersecurity, this quick training might help in your next interview. @Cyber_Security_Channel
إظهار الكل...
👍 3
The U.S. Black Hat Real-Life Course For Korea's Representative Hacking Defense Competition Will Be Held From The 10th To The 11th The course aims to enhance the skills of participants in defending against advanced hacking techniques and real-world threats. By learning from experts at Black Hat, Korea's representatives can gain valuable insights and strategies for improving cybersecurity defense capabilities. p.s. if you are looking for a job in cybersecurity, this quick training might help in your next interview. @Cyber_Security_Channel
إظهار الكل...
3👍 1
Not SponsoredZip Security Raises $13.5M Series A To Bring Cybersecurity To The 95% Of Businesses Without A Security Team The funding will help Zip Security expand its offerings and make cybersecurity more accessible to businesses lacking dedicated security teams. By targeting this underserved market, Zip Security aims to provide essential security solutions to help protect these businesses from cyber threats. p.s. if you are looking for a job in cybersecurity, this quick training might help in your next interview. @Cyber_Security_Channel
إظهار الكل...
4👍 2
Photo unavailableShow in Telegram
🚨 New Malware Tactics Bypass Traditional Defenses If your SOC can’t afford to miss a single threat, this session is for you. 📍Cases & Detection Tips for SOCs In real time, ANY.RUN experts will: — Share insights into strengthening SOC expertise — Demonstrate and break down examples of evasion techniques — Offer detection strategies for ClickFix, phishing kits, and Living-Off-the-Land (LotL) attacks 👥 Who should attend? ↳ SOC analysts (all tiers), security managers, and CISOs ready to level up resilience. 📅 When? ↳ September 17 | 03:00 PM GMT Join a FREE webinar on how to have an upper hand → click here to register. ----- #ad #paidpromotion #sponsored @Cyber_Security_Channel
إظهار الكل...
10👍 6🔥 3
Hackers Scanning For TeleMessage Signal Clone Flaw Exposing Passwords The flaw in TeleMessage Signal clone could allow attackers to access sensitive information, including passwords, if exploited. Users of affected systems should be vigilant and consider updating or securing their configurations to prevent potential breaches. p.s. if you are looking for a job in cybersecurity, this quick training might help in your next interview. @Cyber_Security_Channel
إظهار الكل...
👍 2 1
Why Security And AI Need To Grow Hand In Hand As AI becomes more integral to various systems and applications, security must be a parallel consideration to mitigate risks and prevent potential misuse. Growing security and AI hand in hand ensures that AI's benefits are realized while minimizing vulnerabilities and threats. ----- p.s. if your compliance process is lacking organization, this Notion system might be the structure you are looking for. ----- @Cyber_Security_Channel
إظهار الكل...
👍 3 1
Photo unavailableShow in Telegram
🔍 Study Phishkits & Malware that Exploit Legitimate Sites with Threat Intelligence Lookup Enrich IOCs with actionable context in seconds with FREE, exclusive attack data from 15K SOCs. Try it now → click here. ----- #ad #paidpromotion #sponsored @Cyber_Security_Channel
إظهار الكل...
10👍 4