fa
Feedback
Cyber Security News

Cyber Security News

رفتن به کانال در Telegram
2025 سال در اعدادsnowflakes fon
card fon
54 712
مشترکین
-124 ساعت
+567 روز
+35730 روز

در حال بارگیری داده...

جذب مشترکین
دسامبر '25
دسامبر '25
+341
در 0 کانال‌ها
نوامبر '25
+577
در 0 کانال‌ها
Get PRO
اکتبر '25
+123
در 0 کانال‌ها
Get PRO
سپتامبر '250
در 0 کانال‌ها
Get PRO
اوت '250
در 0 کانال‌ها
Get PRO
ژوئیه '250
در 0 کانال‌ها
Get PRO
ژوئن '250
در 0 کانال‌ها
Get PRO
مه '250
در 0 کانال‌ها
Get PRO
آوریل '250
در 0 کانال‌ها
Get PRO
مارس '250
در 0 کانال‌ها
Get PRO
فوریه '250
در 0 کانال‌ها
Get PRO
ژانویه '25
+14
در 0 کانال‌ها
Get PRO
دسامبر '24
+60
در 0 کانال‌ها
Get PRO
نوامبر '24
+174
در 0 کانال‌ها
Get PRO
اکتبر '24
+171
در 0 کانال‌ها
Get PRO
سپتامبر '24
+6 434
در 0 کانال‌ها
Get PRO
اوت '24
+4 165
در 0 کانال‌ها
Get PRO
ژوئیه '24
+1 285
در 0 کانال‌ها
Get PRO
ژوئن '24
+979
در 0 کانال‌ها
Get PRO
مه '24
+1 152
در 0 کانال‌ها
Get PRO
آوریل '24
+1 347
در 0 کانال‌ها
Get PRO
مارس '24
+1 276
در 0 کانال‌ها
Get PRO
فوریه '24
+1 239
در 0 کانال‌ها
Get PRO
ژانویه '24
+1 374
در 0 کانال‌ها
Get PRO
دسامبر '23
+1 168
در 0 کانال‌ها
Get PRO
نوامبر '23
+733
در 0 کانال‌ها
Get PRO
اکتبر '23
+634
در 0 کانال‌ها
Get PRO
سپتامبر '23
+881
در 0 کانال‌ها
Get PRO
اوت '23
+2 789
در 0 کانال‌ها
Get PRO
ژوئیه '230
در 0 کانال‌ها
Get PRO
ژوئن '23
+24
در 0 کانال‌ها
Get PRO
مه '23
+1 119
در 0 کانال‌ها
Get PRO
آوریل '23
+3 041
در 0 کانال‌ها
Get PRO
مارس '23
+96
در 0 کانال‌ها
Get PRO
فوریه '23
+6 714
در 0 کانال‌ها
Get PRO
ژانویه '230
در 0 کانال‌ها
Get PRO
دسامبر '220
در 0 کانال‌ها
Get PRO
نوامبر '220
در 0 کانال‌ها
Get PRO
اکتبر '22
+165
در 0 کانال‌ها
Get PRO
سپتامبر '22
+863
در 0 کانال‌ها
Get PRO
اوت '22
+793
در 0 کانال‌ها
Get PRO
ژوئیه '22
+893
در 0 کانال‌ها
Get PRO
ژوئن '22
+858
در 0 کانال‌ها
Get PRO
مه '22
+837
در 0 کانال‌ها
Get PRO
آوریل '22
+812
در 0 کانال‌ها
Get PRO
مارس '22
+1 316
در 0 کانال‌ها
Get PRO
فوریه '22
+931
در 0 کانال‌ها
Get PRO
ژانویه '22
+24 496
در 0 کانال‌ها
تاریخ
رشد مشترکین
اشارات
کانال‌ها
26 دسامبر+6
25 دسامبر+6
24 دسامبر+8
23 دسامبر+15
22 دسامبر+11
21 دسامبر+13
20 دسامبر+18
19 دسامبر+12
18 دسامبر+24
17 دسامبر+20
16 دسامبر+13
15 دسامبر+7
14 دسامبر+28
13 دسامبر+12
12 دسامبر+18
11 دسامبر+13
10 دسامبر+5
09 دسامبر+10
08 دسامبر+8
07 دسامبر0
06 دسامبر+7
05 دسامبر+19
04 دسامبر+5
03 دسامبر+19
02 دسامبر+17
01 دسامبر+27
پست‌های کانال
Hundreds of Arrests as Operation Sentinel Recovers $3m The outcomes from Operation Sentinel reflect the commitment of African law enforcement agencies, working in close coordination with international partners. Their actions have successfully protected livelihoods, secured sensitive personal data and preserved critical infrastructure. Cyber_Security_Channel

100

2
Beyond the Prompt: Building Trustworthy Agent Systems Output validation & guardrails: never trust raw agent output. Implement strict validation checks before any action is taken or result is presented. Define clear boundaries for what actions are permissible (e.g., “can read this database but never modify it”). Cyber_Security_Channel
1 874
3
MITRE Unveils ATT&CK v18 With Updates to Detections, Mobile, ICS In the Mobile section, coverage has been added for adversaries abusing the ‘linked devices’ feature in Signal and WhatsApp. Also in this section, the ‘abuse accessibility features’ technique has been brought back after it was deprecated in version 7 of ATT&CK. Cyber_Security_Channel
2 564
4
New Android Albiriox Malware Gains Traction in Dark Web Markets Researchers found that the dropper used JSONPacker to obfuscate the underlying code, prompting victims to enable the “Install Unknown Apps” permission before installing Albiriox. Once active, the malware connects to its command server over an unencrypted TCP channel and registers the device using hardware and OS identifiers. Cyber_Security_Channel
3 336
5
Microsoft’s Project Ire Autonomously Reverse Engineers Software to Find Malware It added, “Its tool-use API enables the system to update its understanding of a file using a wide range of reverse engineering tools, including Microsoft memory analysis sandboxes based on Project Freta, custom and open-source tools, documentation search, and multiple decompilers.” Cyber_Security_Channel
3 912
6
🚨 New Threat Alert: Salty2FA & Tycoon2FA are Now Targeting Enterprises in a Joint Phishing Operation. A new PhaaS “chimera”
🚨 New Threat Alert: Salty2FA & Tycoon2FA are Now Targeting Enterprises in a Joint Phishing Operation. A new PhaaS “chimera” now appears inside the same campaigns and even the same payloads, making attribution harder. See the hybrid payload executed in the @anyrun_app sandbox — click here. 👨‍💻 Get all the details and actionable IOCs to adapt detection and threat hunting — click here. ----- #ad #paidpromotion #sponsored @Cyber_Security_Channel
4 577
7
Highly Popular NPM Packages Poisoned in New Supply Chain Attack A DuckDB maintainer was also phished, but the DuckDBLabs team was able to block the attacker’s access shortly after. However, the DuckDB distribution for Node.js on the NPM registry was injected with malware, the team announced. Cyber_Security_Channel
5 019
8
React2Shell Attacks Linked to North Korean Hackers In the EtherRAT attack, React2Shell is exploited to execute a shell command for downloading and executing a shell script designed to deploy a JavaScript implant. This implant is a dropper that decrypts the main payload, EtherRAT. Cyber_Security_Channel
5 411
9
🔴 LIVE from inside #Lazarus APT's IT workers scheme. For weeks, researchers from NorthScan & BCA LTD kept #hackers believing
🔴 LIVE from inside #Lazarus APT's IT workers scheme.   For weeks, researchers from NorthScan & BCA LTD kept #hackers believing they controlled a US dev's laptop. In reality, it was #ANYRUN sandbox recording everything.   ➡️ See full story and videos — click here. ----- #ad #paidpromotion #sponsored @Cyber_Security_Channel
5 602
10
Chrome, Edge Extensions Caught Tracking Users, Creating Backdoors All gained ‘Featured’ and ‘Verified’ statuses from Google, before the threat actor weaponized them with a malicious update in mid-2024. One of them, Clean Master, had more than 300,000 installs. The update essentially transformed the extensions into a remote code execution framework, Koi says. Every hour, the extensions would check an external server for instructions and execute arbitrary JavaScript code, with full browser API access. Cyber_Security_Channel
5 931
11
📣 Webinar: Cybersecurity Law, Regulations and Compliance Enhance your ImmuniWeb® AI Platform skills, earn CPE credits & qual
📣 Webinar: Cybersecurity Law, Regulations and Compliance Enhance your ImmuniWeb® AI Platform skills, earn CPE credits & qualify to become ImmuniWeb® Certified Professional. Key insights: • Recent developments in data protection, privacy law • Cybersecurity requirements, penalties personal liability for non-compliance • Strategies to reduce legal risks • Insurance pitfalls & ways to avoid them • Best data breach investigation practices & disclosure in 2026 • How cybersecurity compliance services by ImmuniWeb can help → When: December 11 at 10am, 5pm and 9pm CET. → Host: Dr. Ilia Kolochenko, CEO & Chief Architect at ImmuniWeb, Attorney-at-Law. Registration is open: Session 1 – December 11, 2025 Geneva 10am | Dubai 1pm | Singapore 5pm 👉 Click here. Session 2 – December 11, 2025 Geneva 5pm | New York 11am | California 8am 👉 Click here. Session 3 – December 11, 2025 Geneva 9pm | New York 3pm | California 12pm 👉 Click here. ----- #ad #paidpromotion #sponsored @Cyber_Security_Channel
5 674
12
⚡️University of Pennsylvania Confirms New Data Breach After Oracle Hack University of Pennsylvania disclosed another breach in late October 2025, after a hacker compromised internal systems and stole data on Penn's development and alumni activities. The attacker claimed they exfiltrated personal information belonging to roughly 1.2 million students, alumni, and donors. Institution noted that the attackers exploited a previously unknown security vulnerability. @Cyber_Security_Channel
5 272
13
Beyond the Prompt: Building Trustworthy Agent Systems Output validation & guardrails: never trust raw agent output. Implement strict validation checks before any action is taken or result is presented. Define clear boundaries for what actions are permissible (e.g., “can read this database but never modify it”). Cyber_Security_Channel
429
14
Securing The Human Layer: Modernising Workforce Authentication Attackers are using increasingly sophisticated techniques, including credential spraying, brute-force attacks and malware that intercepts passwords and one-time passwords (OTPs). Additionally, push-bombing or MFA fatigue attacks overwhelm users with mobile push authentication prompts, increasing the likelihood of accidental approval. These vulnerabilities highlight the urgent need to move away from legacy authentication methods, which consistently fail to prevent breaches and expose organizations to financial, reputational and operational harm. Cyber_Security_Channel
5 769
15
Chrome Sandbox Escape Earns Researcher $250,000 $250,000 is the maximum reward that Google is prepared to pay out for a Chrome sandbox escape vulnerability, but the amount can only be earned for a submission that includes a high-quality report with demonstration of remote code execution. Cyber_Security_Channel
6 189
16
Back in August: 6.4 million Bouygues Telecom customers just had their data exposed in a huge data breach – and it's the second to hit French telecoms operators in a month Never share your usernames and passwords. Be particularly wary of calls from fake bank advisors who may try to gain your trust by giving your name or account number. If in doubt, end the call and call your bank or bank advisor back at their usual number. Cyber_Security_Channel
6 746
17
Chinese Cyberspies Deploy ‘BadAudio’ Malware via Supply Chain Attacks BadAudio is deployed as a DLL and uses search order hijacking for execution. Recent versions have been dropped in archives also containing VBS, BAT, and LNK files, designed to automate the malware’s placement, to achieve persistence, and trigger the DLL’s sideloading. Cyber_Security_Channel
6 836
18
Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests' Payment Data As soon as the card details, along with th
Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests' Payment Data As soon as the card details, along with the expiration data and CVV number, are entered, the page attempts to process a transaction in the background... While a "support chat" window appears on the screen with steps to complete a supposed "3D Secure verification for your credit card" to secure against fake bookings. 📷 Photo Credit: Dreamstime Cyber_Security_Channel
6 804
19
Newly Identified Android Spyware Appears to be From a Commercial Vendor The Android spyware, dubbed LANDFALL, exploited a zero-day, or previously undocumented, vulnerability in Galaxy phones’ image processing libraries. The spyware was likely sent via the WhatsApp messaging platform to exfiltrate data and snoop on targets. The vulnerability was privately reported to Samsung in September 2024 but the company did not release a firmware update to fix it until April 2025. Cyber_Security_Channel
6 671
20
👨‍💻 SOC Leader’s Playbook: 3 Steps to Faster MTTR Get actionable tips in a Live Webinar on November 25. In this session, AN
👨‍💻 SOC Leader’s Playbook: 3 Steps to Faster MTTR Get actionable tips in a Live Webinar on November 25.  In this session, ANY.RUN experts will demonstrate how to: • Eliminate the alert fatigue  • Achieve a 3x performance boost   • Ensure early detection of new attacks • Reduce MTTR by 21 minutes per incident   ✔️ Who should attend? SOC leaders, security managers, CISOs, and analysts of all tiers looking to improve their security posture. Join a FREE webinar → click here to register. ----- #ad #paidpromotion #sponsored @Cyber_Security_Channel
6 684