fa
Feedback
Cyber Security News

Cyber Security News

رفتن به کانال در Telegram
2025 سال در اعدادsnowflakes fon
card fon
54 709
مشترکین
اطلاعاتی وجود ندارد24 ساعت
+447 روز
+33930 روز
آرشیو پست ها
⚡️Louis Vuitton Data Breach Hits Customers in Several Countries In Turkey, the company reported that the breach impacted nearly 143,000 residents. The same statement reveals that the incident involved a compromised account related to a third-party service provider. Cyber_Security_Channel
نمایش همه...
👍 2
President Lee Emphasizes Cybersecurity As Strategic Industry During Information Security Day The event highlighted the importance of fostering a robust cybersecurity ecosystem, with President Lee underscoring the need for continued innovation and investment in this critical field. By prioritizing cybersecurity, the nation can better protect its digital assets and promote economic growth. @Cyber_Security_Channel
نمایش همه...
4
ℹ️ 16 Billion Passwords Exposed in Record-Breaking Data Breach Happened a while back, maybe you missed it... “This is not just a leak – it’s a blueprint for mass exploitation. Cybercriminals now have unprecedented access to personal credentials that can be used for account takeover, identity theft, and highly targeted phishing. What’s especially concerning is the structure and recency of these datasets – these aren’t just old breaches being recycled. This is fresh, weaponizable intelligence at scale,” researchers said. The leaked data includes login info for just about every online service you can think of. We are talking: - Apple - GitHub - Google - Telegram - Facebook And even government platforms. With 16 billion records floating around, it's safe to say almost nothing was left out. Cyber_Security_Channel
نمایش همه...
10
Pakistan’s First AI-Powered Cybersecurity Tool Launched The tool utilizes machine learning algorithms to detect and respond to cyber threats in real-time, enhancing the country's cybersecurity posture. By leveraging AI, the tool can analyze vast amounts of data, identify patterns, and predict potential threats, enabling proactive measures to be taken. @Cyber_Security_Channel
نمایش همه...
😁 8🤣 5🔥 2
Ransomware: Hunters International Is Not Actually Shutting Down, It's Rebranding A Prodaft threat analyst known as 3xp0rt, who first spotted the group's takedown notice, told the Risky Business media outlet that the decryption keys are being made available via Hunters' backend. "We have information that victims are required to log in to a portal mentioned in the ransom note using their existing credentials to obtain the decryption software," 3xp0rt said. Cyber_Security_Channel
نمایش همه...
6
Ransomware Gang Hunters International Says It’s Shutting Down The sudden decision to shut down has sparked speculation among cybersecurity experts, with some wondering if the group's claims are genuine or merely a ruse to avoid law enforcement attention. Hunters International's activities had been closely monitored by authorities, and their alleged shutdown may indicate a significant development in the ongoing battle against ransomware threats. @Cyber_Security_Channel
نمایش همه...
5
Twitter Co-Founder Jack Dorsey Just Launched A Messaging App That Doesn’t Need The Internet The app, which utilizes blockchain technology and allows users to communicate via radio waves, Wi-Fi, or satellite connectivity, offers a decentralized alternative to traditional messaging platforms. This innovative approach enables users to stay connected even in areas with limited or no internet access, promoting global communication and community building. @Cyber_Security_Channel
نمایش همه...
12🥰 3
Scattered Spider Hacking Spree Continues With Airline Sector Attacks The new attacks are consistent with Scattered Spider's pattern of constantly shifting industry targeting since bursting on to the threat landscape in 2022. Multiple security vendors have described Scattered Spider as more of a loose collective rather than an organized group, consisting mostly 19 to 22 year old members who are native English speakers with a common interest in getting rich off of cybercrime. Scattered Spider is one of several groups associated with "The Com," a decentralized community of young cybercriminals in the US, the UK, and Europe that primarily operates on platforms like Discord and Telegram. Cyber_Security_Channel
نمایش همه...
10
Cyberattack Targets International Criminal Court The fresh attack occurred just as NATO leaders, including US President Donald Trump, were gathering in The Hague for a summit, and at a time the court is handling various high-profile cases, including arrest warrants. Cyber_Security_Channel
نمایش همه...
4
Chrome 138, Firefox 140 Patch Multiple Vulnerabilities Above update also fixes six medium-severity vulnerabilities leading to: • The exposure of a persistent UUID to identify the browser. • A lack of warning when opening files with the terminal extension. • Policy bypass, phishing attacks on Android, security checks bypass, and cross-site scripting attacks. Cyber_Security_Channel
نمایش همه...
2👍 2
Photo unavailableShow in Telegram
🚨 BRAODO Stealer abusing GitHub, obfuscated scripts dropping Remcos, BAT files delivering NetSupport RAT & more...   @anyrun_app publishes detailed breakdowns of the latest malware and phishing attacks every week. Read about the top threats of June and gather threat intel for proactive defense — click on this link for the full material. Want access to even more insights? Subscribe here now. ----- #ad #paidpromotion #sponsored @Cyber_Security_Channel
نمایش همه...
10👍 6🔥 3
Chaos Ransomware Hits Optima Tax Relief, Leaks 69GB of Data Optima Tax Relief has not released an official statement regarding the breach. There has been no confirmation about whether law enforcement or federal agencies are involved in the investigation. If you’ve ever used its services, assume your data could be at risk. Cyber_Security_Channel
نمایش همه...
4👍 3
⚡️China Breaks RSA Encryption With a Quantum Computer, Threatening Global Data Security A 22‑bit key is trivially small compared with production‑grade RSA, yet the test matters because the approach scaled beyond past demonstrations that stopped at 19 bits and required more qubits per variable. Cyber_Security_Channel
نمایش همه...
🤯 11 4🔥 3😱 2
The Road to Agentic AI: Defining a New Paradigm for Technology and Cybersecurity Not every AI system claiming to be agentic is. As technology evolves at an unprecedented pace, distinguishing genuine agentic AI systems from those that merely capitalize on industry buzzwords has become increasingly challenging. Defining what makes AI truly agentic is not just an exercise in classification — it is a critical step toward understanding the broader security implications of these systems. Cyber_Security_Channel
نمایش همه...
3
How CISOs Can Govern AI & Meet Evolving Regulations Not long ago, the role of the chief information security officer (CISO) was well-defined: protect infrastructure, secure applications, safeguard customer data, manage risk, and ensure compliance across a growing partner ecosystem. But as artificial intelligence (AI) transforms how enterprises operate, a new mandate has emerged: Govern its use responsibly, end to end. Cyber_Security_Channel
نمایش همه...
6
Zyxel Firewall Vulnerability Again in Attacker Crosshairs The attacks were mainly aimed at targets in the US, the UK, Spain, Germany, and India. The origin IPs, registered to Verizon Business infrastructure, were from the US, but GreyNoise notes that the true source of the attacks could have been spoofed, as the observed traffic was UDP, on port 500. Cyber_Security_Channel
نمایش همه...
6
Photo unavailableShow in Telegram
👨‍💻 Drive Faster Triage and Response in Your SOC Made possible with real-time sandbox analysis from @anyrun_app. The process is super simple: Sign up with your business Email. Click the following link. ----- #ad #paidpromotion #sponsored @Cyber_Security_Channel
نمایش همه...
7👍 4🔥 3👎 1
‘EchoLeak’ AI Attack Enabled Theft of Sensitive Data via Microsoft 365 Copilot The user does not need to open the malicious email or click on any links. The exploit, which Aim Security described as indirect prompt injection, is triggered when the victim asks Copilot for information referenced in the malicious email. That is when Copilot executes the attacker’s instructions to collect information previously provided by the victim and send it to the attacker. Cyber_Security_Channel
نمایش همه...
😨 11 6
BADBOX 2.0 Targets Home Networks in Botnet Campaign, FBI Warns BADBOX 2.0 also comes preinstalled on many devices, but it can also infect devices by requiring the user to download malicious apps from unofficial marketplaces. While the FBI's public service announcement did not name specific device manufacturers, Human Security's report noted the infected products include Android Open Source Project devices (not Android TV or Google Play Protect certified devices) and were manufactured in China. Cyber_Security_Channel
نمایش همه...
6👍 3
Trump Executive Order Takes Steps to Protect Domestic Hackers From Blowback The Trump administration announced Friday it is amending “problematic elements” of two landmark cybersecurity executive orders — though the extent of the changes in many cases appears modest. The modifications are part of a new executive order signed Friday by President Donald Trump. The full text of the EO was released Friday afternoon, and the Trump administration first outlined details of the order in a White House fact sheet. Cyber_Security_Channel
نمایش همه...
😁 4