Trending
CyberNewsFI's Avatar

CyberNewsFI

@cyber-news-fi

News related to #cyber #infosec #finland

36
Followers
20
Following
2,628
Posts
09.11.2025
Joined
Posts Following

Latest posts by CyberNewsFI @cyber-news-fi

AppsFlyer Web SDK hijacked to spread crypto-stealing JavaScript code AppsFlyer Web SDK hijacked to spread crypto-stealing JavaScript code

AppsFlyer Web SDK hijacked to spread crypto-stealing JavaScript code https://www.bleepingcomputer.com/news/security/appsflyer-web-sdk-used-to-spread-crypto-stealer-javascript-code/

14.03.2026 16:04 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Veeam Patches 7 Critical Backup & Replication Flaws Allowing Remote Code Execution Veeam Patches 7 Critical Backup & Replication Flaws Allowing Remote Code Execution

Veeam Patches 7 Critical Backup & Replication Flaws Allowing Remote Code Execution https://thehackernews.com/2026/03/veeam-patches-7-critical-backup.html

14.03.2026 04:34 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Microsoft: Windows 11 users can't access C: drive on some Samsung PCs Microsoft: Windows 11 users can't access C: drive on some Samsung PCs

Microsoft: Windows 11 users can't access C: drive on some Samsung PCs https://www.bleepingcomputer.com/news/microsoft/microsoft-windows-11-users-cant-access-c-drive-on-some-samsung-pcs/

13.03.2026 23:33 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
FBI seeks victims of Steam games used to spread malware FBI seeks victims of Steam games used to spread malware

FBI seeks victims of Steam games used to spread malware https://www.bleepingcomputer.com/news/security/fbi-seeks-victims-of-steam-games-used-to-spread-malware/

13.03.2026 22:03 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
New York cyber regulations for water organizations to take effect in 2027 New York cyber regulations for water organizations to take effect in 2027

New York cyber regulations for water organizations to take effect in 2027 https://therecord.media/new-york-water-cyber-regulations

13.03.2026 19:33 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Poland's nuclear research centre targeted by cyberattack Poland's nuclear research centre targeted by cyberattack

Poland's nuclear research centre targeted by cyberattack https://www.bleepingcomputer.com/news/security/polands-nuclear-research-centre-targeted-by-cyberattack/

13.03.2026 18:33 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Microsoft investigates classic Outlook sync and connection issues Microsoft investigates classic Outlook sync and connection issues

Microsoft investigates classic Outlook sync and connection issues https://www.bleepingcomputer.com/news/microsoft/microsoft-investigates-classic-outlook-sync-and-connection-issues/

13.03.2026 18:03 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Ransomware incident responder gave info to BlackCat cybercriminals during negotiations, DOJ alleges Ransomware incident responder gave info to BlackCat cybercriminals during negotiations, DOJ alleges

Ransomware incident responder gave info to BlackCat cybercriminals during negotiations, DOJ alleges https://therecord.media/ransomware-blackcat-doj-incident-responder

13.03.2026 17:03 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
From VMware to what’s next: Protecting data during hypervisor migration From VMware to what’s next: Protecting data during hypervisor migration

From VMware to what’s next: Protecting data during hypervisor migration https://www.bleepingcomputer.com/news/security/from-vmware-to-whats-next-protecting-data-during-hypervisor-migration/

13.03.2026 16:03 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
From legacy architecture to Cloudflare One From legacy architecture to Cloudflare One

From legacy architecture to Cloudflare One https://blog.cloudflare.com/legacy-to-agile-sase/

13.03.2026 15:03 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Police sinkholes 45,000 IP addresses in cybercrime crackdown Police sinkholes 45,000 IP addresses in cybercrime crackdown

Police sinkholes 45,000 IP addresses in cybercrime crackdown https://www.bleepingcomputer.com/news/security/police-sinkholes-45-000-ip-addresses-in-cybercrime-crackdown/

13.03.2026 14:33 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Starbucks discloses data breach affecting hundreds of employees Starbucks discloses data breach affecting hundreds of employees

Starbucks discloses data breach affecting hundreds of employees https://www.bleepingcomputer.com/news/security/starbucks-discloses-data-breach-affecting-hundreds-of-employees/

13.03.2026 09:33 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Google fixes two new Chrome zero-days exploited in attacks Google fixes two new Chrome zero-days exploited in attacks

Google fixes two new Chrome zero-days exploited in attacks https://www.bleepingcomputer.com/news/google/google-fixes-two-new-chrome-zero-days-exploited-in-attacks/

13.03.2026 08:03 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
PÀÀkirjoitus / Suomalaisten vaalidata voi mennΓ€ amerikkalaiselle pilvijΓ€tille – Eurooppa jΓ€i tΓ€ssΓ€kin jΓ€lkeen PÀÀkirjoitus / Suomalaisten vaalidata voi mennΓ€ amerikkalaiselle pilvijΓ€tille – Eurooppa jΓ€i tΓ€ssΓ€kin jΓ€lkeen

PÀÀkirjoitus / Suomalaisten vaalidata voi mennΓ€ amerikkalaiselle pilvijΓ€tille – Eurooppa jΓ€i tΓ€ssΓ€kin jΓ€lkeen https://www.kauppalehti.fi/uutiset/a/1cdeba7c-c93e-4f0f-9041-99553d4a1690

13.03.2026 04:33 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Epic Fury Update: Stryker Attack Highlights Handala's Shift from Espionage to Disruption Epic Fury Update: Stryker Attack Highlights Handala's Shift from Espionage to Disruption

Epic Fury Update: Stryker Attack Highlights Handala's Shift from Espionage to Disruption https://www.levelblue.com/blogs/spiderlabs-blog/epic-fury-update-stryker-attack-highlights-handalas-shift-from-espionage-to-disruption

13.03.2026 02:03 πŸ‘ 0 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Suspected China-Based Espionage Operation Against Military Targets in Southeast Asia Suspected China-Based Espionage Operation Against Military Targets in Southeast Asia

Suspected China-Based Espionage Operation Against Military Targets in Southeast Asia https://unit42.paloaltonetworks.com/espionage-campaign-against-military-targets/

12.03.2026 23:33 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Canadian retail giant Loblaw notifies customers of data breach Canadian retail giant Loblaw notifies customers of data breach

Canadian retail giant Loblaw notifies customers of data breach https://www.bleepingcomputer.com/news/security/canadian-retail-giant-loblaw-notifies-customers-of-data-breach/

12.03.2026 23:03 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
US, Europol disrupt SocksEscort network that exploited thousands of residential routers US, Europol disrupt SocksEscort network that exploited thousands of residential routers

US, Europol disrupt SocksEscort network that exploited thousands of residential routers https://therecord.media/us-europol-disrupt-socksescort-network

12.03.2026 22:33 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
England Hockey investigating ransomware data breach England Hockey investigating ransomware data breach

England Hockey investigating ransomware data breach https://www.bleepingcomputer.com/news/security/england-hockey-investigating-ransomware-data-breach/

12.03.2026 22:03 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
OpenAI Blurs Its Mass Surveillance Red Line With New Pentagon Contract OpenAI Blurs Its Mass Surveillance Red Line With New Pentagon Contract

OpenAI Blurs Its Mass Surveillance Red Line With New Pentagon Contract https://citizenlab.ca/openai-blurs-its-mass-surveillance-red-line-with-new-pentagon-contract/

12.03.2026 21:33 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
AI-generated Slopoly malware used in Interlock ransomware attack AI-generated Slopoly malware used in Interlock ransomware attack

AI-generated Slopoly malware used in Interlock ransomware attack https://www.bleepingcomputer.com/news/security/ai-generated-slopoly-malware-used-in-interlock-ransomware-attack/

12.03.2026 21:03 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
β€œHandala Hack” – Unveiling Group’s Modus Operandi β€œHandala Hack” – Unveiling Group’s Modus Operandi

β€œHandala Hack” – Unveiling Group’s Modus Operandi https://research.checkpoint.com/2026/handala-hack-unveiling-groups-modus-operandi/

12.03.2026 19:33 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Storm-2561 uses SEO poisoning to distribute fake VPN clients for credential theft Storm-2561 uses SEO poisoning to distribute fake VPN clients for credential theft

Storm-2561 uses SEO poisoning to distribute fake VPN clients for credential theft https://www.microsoft.com/en-us/security/blog/2026/03/12/storm-2561-uses-seo-poisoning-to-distribute-fake-vpn-clients-for-credential-theft/

12.03.2026 19:03 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
February 2026 CVE Landscape: 13 Critical Vulnerabilities Mark 43% Drop from January February 2026 CVE Landscape: 13 Critical Vulnerabilities Mark 43% Drop from January

February 2026 CVE Landscape: 13 Critical Vulnerabilities Mark 43% Drop from January https://www.recordedfuture.com/blog/february-2026-cve-landscape

12.03.2026 18:33 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
From transparency to action: What the latest Microsoft email security benchmark reveals From transparency to action: What the latest Microsoft email security benchmark reveals

From transparency to action: What the latest Microsoft email security benchmark reveals https://www.microsoft.com/en-us/security/blog/2026/03/12/from-transparency-to-action-what-the-latest-microsoft-email-security-benchmark-reveals/

12.03.2026 18:03 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Trane Tracer SC, Tracer SC+, and Tracer Concierge Trane Tracer SC, Tracer SC+, and Tracer Concierge

Trane Tracer SC, Tracer SC+, and Tracer Concierge https://www.cisa.gov/news-events/ics-advisories/icsa-26-071-01

12.03.2026 17:33 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Cyber National Mission Force to get new commander amid broader leadership turnover Cyber National Mission Force to get new commander amid broader leadership turnover

Cyber National Mission Force to get new commander amid broader leadership turnover https://therecord.media/cyber-national-mission-force-new-commander

12.03.2026 17:03 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Google paid $17.1 million for vulnerability reports in 2025 Google paid $17.1 million for vulnerability reports in 2025

Google paid $17.1 million for vulnerability reports in 2025 https://www.bleepingcomputer.com/news/google/google-paid-171-million-for-vulnerability-reports-in-2025/

12.03.2026 16:33 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Detecting and analyzing prompt abuse in AI tools Detecting and analyzing prompt abuse in AI tools

Detecting and analyzing prompt abuse in AI tools https://www.microsoft.com/en-us/security/blog/2026/03/12/detecting-analyzing-prompt-abuse-in-ai-tools/

12.03.2026 16:03 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Going the Extra Mile: Travel Rewards Turn into Underground Currency. Going the Extra Mile: Travel Rewards Turn into Underground Currency.

Going the Extra Mile: Travel Rewards Turn into Underground Currency. https://www.bleepingcomputer.com/news/security/going-the-extra-mile-travel-rewards-turn-into-underground-currency/

12.03.2026 15:33 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0