Commonwealth Sentinel Cyber Security's Avatar

Commonwealth Sentinel Cyber Security

@cwealthsentinel.bsky.social

At Commonwealth Sentinel, we focus on cyber security so you can focus on other things.# CyberSecurity for local government, non-profit, and small business. #FemaleFounder

201 Followers  |  533 Following  |  2,025 Posts  |  Joined: 17.11.2024  |  1.6452

Latest posts by cwealthsentinel.bsky.social on Bluesky

Preview
New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale Researchers detail new AI and phishing kits that steal credentials, bypass MFA, and scale attacks across major services.

New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale

12.12.2025 21:16 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Microsoft bounty program now includes any flaw impacting its services Microsoft now paysΒ security researchers for finding criticalΒ vulnerabilities in any of its online services, regardless of whether the code was written by Microsoft or a third party.

Microsoft bounty program now includes any flaw impacting its services

12.12.2025 18:18 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Hackers exploit unpatched Gogs zero-day to breach 700 servers An unpatched zero-day vulnerability in Gogs, a popular self-hosted Git service, has enabled attackers to gain remote code execution onΒ Internet-facing instances andΒ compromise hundreds of servers.

Hackers exploit unpatched Gogs zero-day to breach 700 servers

12.12.2025 17:08 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw Google issues a Chrome update to fix actively exploited issue 466192044 and other confirmed 2025 security flaws.

Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw

12.12.2025 15:57 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Google fixed a new actively exploited Chrome zero-day Google addressed three vulnerabilities in the Chrome browser, including a high-severity bug already exploited in the wild.

#PatchNow #Patch #CriticalPatch #PatchManagement #SoftwarePatch #BugFix #CyberSecurity #ITSecurity #SecurityUpdate

Google fixed a new actively exploited Chrome zero-day ift.tt/X9ZJDTp

12.12.2025 15:05 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
The Deep Web makes up 90% of the Internet. Β» Cyber Security Wait, what? Isn't the Deep Web the illegal marketplace teeming with drug dealers, thieves, and hitmen? No, that’s the β€œDark Web.” What is the Deep Web?

The Deep Web makes up 90% of the Internet. Β» Cyber Security

12.12.2025 14:18 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
US extradites Ukrainian accused of hacking for Russia : The digital intrusion allegedly caused thousands of pounds of meat to spoil and triggered an ammonia leak in the facility

US extradites Ukrainian woman accused of hacking meat processing plant for Russia

12.12.2025 13:07 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Microsoft Teams to warn of suspicious traffic with external domains Microsoft is working on a new Teams security feature that will analyze suspicious traffic with external domains to help IT administrators tackle potential security threats.

Microsoft Teams to warn of suspicious traffic with external domains

11.12.2025 21:16 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
New EtherRAT backdoor surfaces in React2Shell attacks tied to North Korea NK-linked hackers are likely exploiting the React2Shell flaw to deploy a newly discovered remote access trojan, dubbed EtherRAT.

New EtherRAT backdoor surfaces in React2Shell attacks tied to North Korea

11.12.2025 18:18 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Cybersecurity Experts Share One Big Warning for Your Business Ahead of Holiday Break

11.12.2025 17:08 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Changing the physics of cyber defense | Microsoft Security Blog Cyber defense is evolving. Find out how graph-powered strategies and AI can help organizations detect threats faster and improve security hygiene.

Changing the physics of cyber defense

11.12.2025 15:57 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
How to Boost Your Cyber Security in Three Steps Β» In the FBI's 2022 revealed that cyber crime caused $10.2 billion. Despite this, organizations do not provide their employees with cyber security training.

How to Boost Your Cyber Security in Three Steps Β»

11.12.2025 14:18 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Warning: WinRAR Vulnerability CVE-2025-6218 Under Active Attack by Multiple Threat Groups CISA warns WinRAR CVE-2025-6218 is under active attack by multiple threat groups, requiring federal fixes by Dec. 30, 2025.

Warning: WinRAR Vulnerability CVE-2025-6218 Under Active Attack by Multiple Threat Groups

11.12.2025 13:07 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Ukrainian hacker charged with helping Russian hacktivist groups U.S. prosecutors have charged a Ukrainian national for her role in cyberattacks targeting critical infrastructure worldwide, including U.S. water systems, election systems, and nuclear facilities, on…

Ukrainian hacker charged with helping Russian hacktivist groups

10.12.2025 21:16 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Fortinet Patches Critical Authentication Bypass Vulnerabilities The two security defects impact FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager with FortiCloud SSO login authentication enabled.

Fortinet Patches Critical Authentication Bypass Vulnerabilities

10.12.2025 18:18 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Is Alert Fatigue Sabotaging Your Cyber Security? Β» Alert fatigue is one of the most dangerous β€œslow-burn” risks in cyber security. It doesn’t make headlines but it quietly erodes your defenses day after day,

Is Alert Fatigue Sabotaging Your Cyber Security? Β»

10.12.2025 18:04 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Scammers are poisoning AI search results to steer you straight into their traps - here's how AI tools like Google AI Overview and Perplexity Comet are being tricked into suggesting scam support numbers.

Scammers are poisoning AI search results to steer you straight into their traps - here's how

10.12.2025 17:08 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Oracle EBS zero-day used by Clop to breach Barts Health NHS Clop ransomware stole data from Barts Health NHS after exploiting a zero-day in its Oracle E-Business Suite, causing a database breach.

Oracle EBS zero-day used by Clop to breach Barts Health NHS

10.12.2025 15:57 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Risks and Rewards of Cloud Storage: What You Need to Know Storing essential files in cloud storage may seem secure and convenient, but it is not infallible. Accidental deletion, loss, or corruption is still possible.

Risks and Rewards of Cloud Storage: What You Need to Know

10.12.2025 14:18 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days Microsoft fixed 56 Windows security flaws, including an actively exploited privilege-escalation bug and two new command-injection zero-days.

#PatchNow #Patch #CriticalPatch #PatchManagement #SoftwarePatch #BugFix #CyberSecurity #ITSecurity #SecurityUpdate
Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days ift.tt/gBmcjGt

10.12.2025 13:09 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
UK finally vows to look at 35-year-old Computer Misuse Act : As Portugal gives researchers a pass under cybersecurity law

UK finally vows to look at 35-year-old Computer Misuse Act

10.12.2025 13:07 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Google Adds Layered Defenses to Chrome to Block Indirect Prompt Injection Threats Chrome adds new layered defenses to block prompt injections, restrict origin access, and prevent unsafe AI actions.

Google Adds Layered Defenses to Chrome to Block Indirect Prompt Injection Threats

09.12.2025 21:16 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
US Posts $10 Million Bounty for Iranian Hackers The US seeks information on the leader of Emennet Pasargad, Mohammad Bagher Shirinkar, and long-time employee Fatemeh Sedighian Kashi.

US Posts $10 Million Bounty for Iranian Hackers

09.12.2025 18:18 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Data Breach: The Ultimate Guide to Surviving - Cybersecurity Have you ever had your personal information exposed in a data breach? It's likely you have, even if you are unaware of it.

Data Breach: The Ultimate Guide to Surviving - Cybersecurity

09.12.2025 17:08 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Cloudflare down, websites offline with 500 Internal Server Error Cloudflare is down, as websites are crashing with a 500 Internal Server Error. Cloudflare is investigating the reports.

Cloudflare down, websites offline with 500 Internal Server Error

09.12.2025 15:57 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Preview
Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability AWS reports China-linked groups Earth Lamia and Jackpot Panda rapidly attacking the critical React2Shell CVE-2025-55182 RCE flaw.

Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability

09.12.2025 14:18 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Attackers hit React defect as researchers quibble over proof A debate over actual exploitation is muddying response efforts. Multiple researchers say they’ve observed working proof of concepts while others assert evidence of attacks is lacking.

Attackers hit React defect as researchers quibble over proof

09.12.2025 13:07 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Sneeit WordPress RCE Exploited in the Wild While ICTBroadcast Bug Fuels Frost Botnet Attacks Active exploits target Sneeit plugin CVE-2025-6389 and ICTBroadcast CVE-2025-2611, enabling RCE, backdoors, and Frost DDoS botnet delivery.

Sneeit WordPress RCE Exploited in the Wild While ICTBroadcast Bug Fuels Frost Botnet Attacks

08.12.2025 21:16 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Android Malware FvncBot, SeedSnatcher, and ClayRat Gain Stronger Data Theft Features Researchers detail FvncBot, SeedSnatcher, and a stronger ClayRat that widen Android data theft and device control tactics.

Android Malware FvncBot, SeedSnatcher, and ClayRat Gain Stronger Data Theft Features

08.12.2025 18:18 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
How Can Retailers Cyber-Prepare for the Most Vulnerable Time of the Year? Holiday peaks trigger sharp rises in credential-stuffing and account-takeover attempts; layered controls and strong password hygiene reduce retail ris

How Can Retailers Cyber-Prepare for the Most Vulnerable Time of the Year?

08.12.2025 17:08 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

@cwealthsentinel is following 19 prominent accounts