Back in August: 6.4 million Bouygues Telecom customers just had their data exposed in a huge data breach – and it's the second to hit French telecoms operators in a month
Never share your usernames and passwords.
Be particularly wary of calls from fake bank advisors who may try to gain your trust by giving your name or account number.
If in doubt, end the call and call your bank or bank advisor back at their usual number.
Cyber_Security_Channel
Never share your usernames and passwords.
Be particularly wary of calls from fake bank advisors who may try to gain your trust by giving your name or account number.
If in doubt, end the call and call your bank or bank advisor back at their usual number.
Cyber_Security_Channel
IT Pro
6.4 million Bouygues Telecom customers just had their data exposed in a huge data breach – and it's the second to hit French telecoms…
A broad range of customer data was exposed, according to Bouygues Telecom
❤7👍2🤯1
Chrome Sandbox Escape Earns Researcher $250,000
$250,000 is the maximum reward that Google is prepared to pay out for a Chrome sandbox escape vulnerability, but the amount can only be earned for a submission that includes a high-quality report with demonstration of remote code execution.
Cyber_Security_Channel
$250,000 is the maximum reward that Google is prepared to pay out for a Chrome sandbox escape vulnerability, but the amount can only be earned for a submission that includes a high-quality report with demonstration of remote code execution.
Cyber_Security_Channel
SecurityWeek
Chrome Sandbox Escape Earns Researcher $250,000
A researcher has been given the highest reward in Google’s Chrome bug bounty program for a sandbox escape with remote code execution.
1👍3❤2🤯2
Securing The Human Layer: Modernising Workforce Authentication
Attackers are using increasingly sophisticated techniques, including credential spraying, brute-force attacks and malware that intercepts passwords and one-time passwords (OTPs).
Additionally, push-bombing or MFA fatigue attacks overwhelm users with mobile push authentication prompts, increasing the likelihood of accidental approval.
These vulnerabilities highlight the urgent need to move away from legacy authentication methods, which consistently fail to prevent breaches and expose organizations to financial, reputational and operational harm.
Cyber_Security_Channel
Attackers are using increasingly sophisticated techniques, including credential spraying, brute-force attacks and malware that intercepts passwords and one-time passwords (OTPs).
Additionally, push-bombing or MFA fatigue attacks overwhelm users with mobile push authentication prompts, increasing the likelihood of accidental approval.
These vulnerabilities highlight the urgent need to move away from legacy authentication methods, which consistently fail to prevent breaches and expose organizations to financial, reputational and operational harm.
Cyber_Security_Channel
BW People
Securing The Human Layer: Modernising Workforce Authentication
The cyberthreat landscape is rapidly evolving, with attackers leveraging advanced phishing campaigns, credential-stuffing attacks and deepfake-enabled social engineering to target organizations. These sophisticated tactics have exposed the limitations of…
👍3❤1
⚡️University of Pennsylvania Confirms New Data Breach After Oracle Hack
University of Pennsylvania disclosed another breach in late October 2025, after a hacker compromised internal systems and stole data on Penn's development and alumni activities.
The attacker claimed they exfiltrated personal information belonging to roughly 1.2 million students, alumni, and donors.
Institution noted that the attackers exploited a previously unknown security vulnerability.
@Cyber_Security_Channel
University of Pennsylvania disclosed another breach in late October 2025, after a hacker compromised internal systems and stole data on Penn's development and alumni activities.
The attacker claimed they exfiltrated personal information belonging to roughly 1.2 million students, alumni, and donors.
Institution noted that the attackers exploited a previously unknown security vulnerability.
@Cyber_Security_Channel
BleepingComputer
University of Pennsylvania confirms new data breach after Oracle hack
The University of Pennsylvania (Penn) has confirmed a new data breach after attackers stole documents containing personal information from its Oracle E-Business Suite servers in August.
👍4❤2
📣 Webinar: Cybersecurity Law, Regulations and Compliance
Enhance your ImmuniWeb® AI Platform skills, earn CPE credits & qualify to become ImmuniWeb® Certified Professional.
Key insights:
• Recent developments in data protection, privacy law
• Cybersecurity requirements, penalties personal liability for non-compliance
• Strategies to reduce legal risks
• Insurance pitfalls & ways to avoid them
• Best data breach investigation practices & disclosure in 2026
• How cybersecurity compliance services by ImmuniWeb can help
→ When: December 11 at 10am, 5pm and 9pm CET.
→ Host: Dr. Ilia Kolochenko, CEO & Chief Architect at ImmuniWeb, Attorney-at-Law.
Registration is open:
Session 1 – December 11, 2025
Geneva 10am | Dubai 1pm | Singapore 5pm
👉 Click here.
Session 2 – December 11, 2025
Geneva 5pm | New York 11am | California 8am
👉 Click here.
Session 3 – December 11, 2025
Geneva 9pm | New York 3pm | California 12pm
👉 Click here.
-----
#ad #paidpromotion #sponsored
@Cyber_Security_Channel
Enhance your ImmuniWeb® AI Platform skills, earn CPE credits & qualify to become ImmuniWeb® Certified Professional.
Key insights:
• Recent developments in data protection, privacy law
• Cybersecurity requirements, penalties personal liability for non-compliance
• Strategies to reduce legal risks
• Insurance pitfalls & ways to avoid them
• Best data breach investigation practices & disclosure in 2026
• How cybersecurity compliance services by ImmuniWeb can help
→ When: December 11 at 10am, 5pm and 9pm CET.
→ Host: Dr. Ilia Kolochenko, CEO & Chief Architect at ImmuniWeb, Attorney-at-Law.
Registration is open:
Session 1 – December 11, 2025
Geneva 10am | Dubai 1pm | Singapore 5pm
👉 Click here.
Session 2 – December 11, 2025
Geneva 5pm | New York 11am | California 8am
👉 Click here.
Session 3 – December 11, 2025
Geneva 9pm | New York 3pm | California 12pm
👉 Click here.
-----
#ad #paidpromotion #sponsored
@Cyber_Security_Channel
❤3🔥1
Chrome, Edge Extensions Caught Tracking Users, Creating Backdoors
All gained ‘Featured’ and ‘Verified’ statuses from Google, before the threat actor weaponized them with a malicious update in mid-2024.
One of them, Clean Master, had more than 300,000 installs.
The update essentially transformed the extensions into a remote code execution framework, Koi says.
Every hour, the extensions would check an external server for instructions and execute arbitrary JavaScript code, with full browser API access.
Cyber_Security_Channel
All gained ‘Featured’ and ‘Verified’ statuses from Google, before the threat actor weaponized them with a malicious update in mid-2024.
One of them, Clean Master, had more than 300,000 installs.
The update essentially transformed the extensions into a remote code execution framework, Koi says.
Every hour, the extensions would check an external server for instructions and execute arbitrary JavaScript code, with full browser API access.
Cyber_Security_Channel
SecurityWeek
Chrome, Edge Extensions Caught Tracking Users, Creating Backdoors
The extensions were seen profiling users, reading cookie data to create unique identifiers, and executing payloads with browser API access.
❤2💩1
🔴 LIVE from inside #Lazarus APT's IT workers scheme.
For weeks, researchers from NorthScan & BCA LTD kept #hackers believing they controlled a US dev's laptop.
In reality, it was #ANYRUN sandbox recording everything.
➡️ See full story and videos — click here.
-----
#ad #paidpromotion #sponsored
@Cyber_Security_Channel
For weeks, researchers from NorthScan & BCA LTD kept #hackers believing they controlled a US dev's laptop.
In reality, it was #ANYRUN sandbox recording everything.
➡️ See full story and videos — click here.
-----
#ad #paidpromotion #sponsored
@Cyber_Security_Channel
🔥6❤4
React2Shell Attacks Linked to North Korean Hackers
In the EtherRAT attack, React2Shell is exploited to execute a shell command for downloading and executing a shell script designed to deploy a JavaScript implant.
This implant is a dropper that decrypts the main payload, EtherRAT.
Cyber_Security_Channel
In the EtherRAT attack, React2Shell is exploited to execute a shell command for downloading and executing a shell script designed to deploy a JavaScript implant.
This implant is a dropper that decrypts the main payload, EtherRAT.
Cyber_Security_Channel
SecurityWeek
React2Shell Attacks Linked to North Korean Hackers
North Korean threat actors are believed to be behind CVE-2025-55182 exploitation delivering EtherRAT.
❤6👍1
Highly Popular NPM Packages Poisoned in New Supply Chain Attack
A DuckDB maintainer was also phished, but the DuckDBLabs team was able to block the attacker’s access shortly after.
However, the DuckDB distribution for Node.js on the NPM registry was injected with malware, the team announced.
Cyber_Security_Channel
A DuckDB maintainer was also phished, but the DuckDBLabs team was able to block the attacker’s access shortly after.
However, the DuckDB distribution for Node.js on the NPM registry was injected with malware, the team announced.
Cyber_Security_Channel
SecurityWeek
Highly Popular NPM Packages Poisoned in New Supply Chain Attack
Designed to intercept cryptocurrency transactions, the malicious code reached 10% of cloud environments.
👍6🔥1
🚨 New Threat Alert: Salty2FA & Tycoon2FA are Now Targeting Enterprises in a Joint Phishing Operation.
A new PhaaS “chimera” now appears inside the same campaigns and even the same payloads, making attribution harder.
See the hybrid payload executed in the @anyrun_app sandbox — click here.
👨💻 Get all the details and actionable IOCs to adapt detection and threat hunting — click here.
-----
#ad #paidpromotion #sponsored
@Cyber_Security_Channel
A new PhaaS “chimera” now appears inside the same campaigns and even the same payloads, making attribution harder.
See the hybrid payload executed in the @anyrun_app sandbox — click here.
👨💻 Get all the details and actionable IOCs to adapt detection and threat hunting — click here.
-----
#ad #paidpromotion #sponsored
@Cyber_Security_Channel
❤10👍4🔥1
Microsoft’s Project Ire Autonomously Reverse Engineers Software to Find Malware
It added, “Its tool-use API enables the system to update its understanding of a file using a wide range of reverse engineering tools, including Microsoft memory analysis sandboxes based on Project Freta, custom and open-source tools, documentation search, and multiple decompilers.”
Cyber_Security_Channel
It added, “Its tool-use API enables the system to update its understanding of a file using a wide range of reverse engineering tools, including Microsoft memory analysis sandboxes based on Project Freta, custom and open-source tools, documentation search, and multiple decompilers.”
Cyber_Security_Channel
SecurityWeek
Microsoft’s Project Ire Autonomously Reverse Engineers Software to Find Malware
Microsoft has unveiled Project Ire, a prototype autonomous AI agent that can analyze any software file to determine if it’s malicious.
❤5
New Android Albiriox Malware Gains Traction in Dark Web Markets
Researchers found that the dropper used JSONPacker to obfuscate the underlying code, prompting victims to enable the “Install Unknown Apps” permission before installing Albiriox.
Once active, the malware connects to its command server over an unencrypted TCP channel and registers the device using hardware and OS identifiers.
Cyber_Security_Channel
Researchers found that the dropper used JSONPacker to obfuscate the underlying code, prompting victims to enable the “Install Unknown Apps” permission before installing Albiriox.
Once active, the malware connects to its command server over an unencrypted TCP channel and registers the device using hardware and OS identifiers.
Cyber_Security_Channel
Infosecurity Magazine
New Android Albiriox Malware Gains Traction in Dark Web Markets
Android malware Albiriox emerged as MaaS, offering device takeover and real-time fraud capabilities
❤2👀2👍1
MITRE Unveils ATT&CK v18 With Updates to Detections, Mobile, ICS
In the Mobile section, coverage has been added for adversaries abusing the ‘linked devices’ feature in Signal and WhatsApp.
Also in this section, the ‘abuse accessibility features’ technique has been brought back after it was deprecated in version 7 of ATT&CK.
Cyber_Security_Channel
In the Mobile section, coverage has been added for adversaries abusing the ‘linked devices’ feature in Signal and WhatsApp.
Also in this section, the ‘abuse accessibility features’ technique has been brought back after it was deprecated in version 7 of ATT&CK.
Cyber_Security_Channel
SecurityWeek
MITRE Unveils ATT&CK v18 With Updates to Detections, Mobile, ICS
MITRE has unveiled the latest version of ATT&CK, with the most significant changes in the defensive part of the framework.
👍2❤1
Beyond the Prompt: Building Trustworthy Agent Systems
Output validation & guardrails: never trust raw agent output.
Implement strict validation checks before any action is taken or result is presented. Define clear boundaries for what actions are permissible (e.g., “can read this database but never modify it”).
Cyber_Security_Channel
Output validation & guardrails: never trust raw agent output.
Implement strict validation checks before any action is taken or result is presented. Define clear boundaries for what actions are permissible (e.g., “can read this database but never modify it”).
Cyber_Security_Channel
SecurityWeek
Beyond the Prompt: Building Trustworthy Agent Systems
Building secure AI agent systems requires a disciplined engineering approach focused on deliberate architecture and human oversight.
👍4🔥2🤡1
Hundreds of Arrests as Operation Sentinel Recovers $3m
The outcomes from Operation Sentinel reflect the commitment of African law enforcement agencies, working in close coordination with international partners.
Their actions have successfully protected livelihoods, secured sensitive personal data and preserved critical infrastructure.
Cyber_Security_Channel
The outcomes from Operation Sentinel reflect the commitment of African law enforcement agencies, working in close coordination with international partners.
Their actions have successfully protected livelihoods, secured sensitive personal data and preserved critical infrastructure.
Cyber_Security_Channel
Infosecurity Magazine
Hundreds of Arrests as Operation Sentinel Recovers $3m
Operational Sentinel helps to crack down on cybercrime across 19 African countries in a month-long campaign
❤4👍3🔥2
DarkSub 2025: Top Cybersecurity Tool For Privacy Protection
DarkSub excels in several key areas, including its zero-data retention policy, ensuring users' activity logs remain private.
Its modular design allows users to customize privacy settings based on real-world use cases, such as VPN protection, stealth browsing, or firewall elevation.
Additionally, DarkSub's AI-powered threat detection system provides real-time alerts and predictive insights to stay ahead of emerging threats ¹.
@Cyber_Security_Channel
DarkSub excels in several key areas, including its zero-data retention policy, ensuring users' activity logs remain private.
Its modular design allows users to customize privacy settings based on real-world use cases, such as VPN protection, stealth browsing, or firewall elevation.
Additionally, DarkSub's AI-powered threat detection system provides real-time alerts and predictive insights to stay ahead of emerging threats ¹.
@Cyber_Security_Channel
NewsWire
DarkSub 2025: Top Cybersecurity Tool for Privacy Protection
Empowering businesses and individuals to reduce online exposure and defend privacy through proactive cybersecurity measures in the face of growing digital surveillance.
👍4❤1
2️⃣0️⃣2️⃣6️⃣ Happy New Year from the Cyber Security News Team!
We would like to say thank you for continously supporting our community throughout the eventful year of 2025.
Together we have managed to reach important milestones and expand our sphere of influence even further around the globe.
♥️ We are grateful for all the members, partners, and supporters that engaged with our content, purchased paid advertisements, and showed appreciation to our channels =)
Our team hopes that all the content on this channel was useful and enjoyable for you.
☃️ We are planning to show dedication by continuing our mission next year, and are always open to your feedback, suggestions, and collaboration ideas — @cybersecadmin.
Thank you once again, and all the best in the New Year of 2026!
Warm regards to each of you,
~The Cyber Security News Team
🎅 @Cyber_Security_Channel 🎁
We would like to say thank you for continously supporting our community throughout the eventful year of 2025.
Together we have managed to reach important milestones and expand our sphere of influence even further around the globe.
♥️ We are grateful for all the members, partners, and supporters that engaged with our content, purchased paid advertisements, and showed appreciation to our channels =)
Our team hopes that all the content on this channel was useful and enjoyable for you.
☃️ We are planning to show dedication by continuing our mission next year, and are always open to your feedback, suggestions, and collaboration ideas — @cybersecadmin.
Thank you once again, and all the best in the New Year of 2026!
Warm regards to each of you,
~The Cyber Security News Team
🎅 @Cyber_Security_Channel 🎁
❤17🎉6🔥3
Korean Air Data Compromised in Oracle EBS Hack
Korean Air reportedly confirmed that hackers have stolen the information of roughly 30,000 of its current and former employees from KC&D, including names and bank account numbers.
Customer data was not exposed, the airline said.
Cyber_Security_Channel
Korean Air reportedly confirmed that hackers have stolen the information of roughly 30,000 of its current and former employees from KC&D, including names and bank account numbers.
Customer data was not exposed, the airline said.
Cyber_Security_Channel
SecurityWeek
Korean Air Data Compromised in Oracle EBS Hack
Roughly 30,000 Korean Air employees had their data stolen by hackers in a breach at former subsidiary KC&D.
👍3❤2🕊1
GhostPoster Firefox Extensions Hide Malware in Icons
The extension’s developer used steganography to hide after that marker a loader that reaches a remote command-and-control (C&C) server to retrieve an encrypted payload.
Cyber_Security_Channel
The extension’s developer used steganography to hide after that marker a loader that reaches a remote command-and-control (C&C) server to retrieve an encrypted payload.
Cyber_Security_Channel
SecurityWeek
GhostPoster Firefox Extensions Hide Malware in Icons
The malware hijacks purchase commissions, tracks users, removes security headers, injects hidden iframes, and bypasses CAPTCHA.
👍4
Conflicting Narratives in Security Incident: Hackers Claim Resecurity Breach, Firm Says Honeypot
According to Resecurity, it detected the threat actor's reconnaissance activities in November 2025.
The firm claims this monitoring led to the identification of the attackers' infrastructure, which was subsequently reported to law enforcement.
Cyber_Security_Channel
According to Resecurity, it detected the threat actor's reconnaissance activities in November 2025.
The firm claims this monitoring led to the identification of the attackers' infrastructure, which was subsequently reported to law enforcement.
Cyber_Security_Channel
TechNadu
Resecurity Denies Hack Claims, Citing Honeypot Strategy - TechNadu
A hacking group identifying as Scattered Lapsus$ Hunters claimed to have breached Resecurity, which said the attackers were monitored in a honeypot.