Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

Windows 11 KB5077181 fixes boot failures linked to failed updates
Windows 11 KB5077181 fixes boot failures linked to failed updates
Microsoft says it has resolved a Windows 11 bug that caused some commercial systems to fail to boot with an "UNMOUNTABLE_BOOT_VOLUME" error after installing recent security updates, with the fix delivered in the February 2026 Patch Tuesday update.
·bleepingcomputer.com·
Windows 11 KB5077181 fixes boot failures linked to failed updates
CTM360: Lumma Stealer and Ninja Browser malware campaign abusing Google Groups
CTM360: Lumma Stealer and Ninja Browser malware campaign abusing Google Groups
CTM360 reports 4,000+ malicious Google Groups and 3,500+ Google-hosted URLs used to spread the Lumma Stealer infostealing malware and a trojanized "Ninja Browser." The report details how attackers abuse trusted Google services to steal credentials and maintain persistence across Windows and Linux systems.
·bleepingcomputer.com·
CTM360: Lumma Stealer and Ninja Browser malware campaign abusing Google Groups
Pastebin comments push ClickFix JavaScript attack to hijack crypto swaps
Pastebin comments push ClickFix JavaScript attack to hijack crypto swaps
Threat actors are abusing Pastebin comments to distribute a new ClickFix-style attack that tricks cryptocurrency users into executing malicious JavaScript in their browser, allowing attackers to hijack Bitcoin swap transactions and redirect funds to attacker-controlled wallets.
·bleepingcomputer.com·
Pastebin comments push ClickFix JavaScript attack to hijack crypto swaps
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 84
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 84
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape
·securityaffairs.com·
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 84
Démarchage téléphonique : les meilleures applications pour bloquer les arnaques en 2026 - Numerama
Démarchage téléphonique : les meilleures applications pour bloquer les arnaques en 2026 - Numerama
Alors que le démarchage téléphonique s'intensifie et que l'intelligence artificielle générative permet à des bots de simuler des appels, les solutions traditionnelles comme s'inscrire sur Bloctel ou bloquer les numéros un par un ne suffisent plus. Voici une sélection de logiciels recommandés par nos lecteurs pour
·numerama.com·
Démarchage téléphonique : les meilleures applications pour bloquer les arnaques en 2026 - Numerama
Upcoming Speaking Engagements - Schneier on Security
Upcoming Speaking Engagements - Schneier on Security
This is a current list of where and when I am scheduled to speak: I’m speaking at Ontario Tech University in Oshawa, Ontario, Canada, at 2 PM ET on Thursday, February 26, 2026. I’m speaking at the Personal AI Summit in Los Angeles, California, USA, on Thursday, March 5, 2026. I’m speaking at Tech Live: Cybersecurity in New York City, USA, on Wednesday, March 11, 2026. I’m giving the Ross Anderson Lecture at the University of Cambridge’s Churchill College at 5:30 PM GMT on Thursday, March 19, 2026. I’m speaking at RSAC 2026 in San Francisco, California, USA, on Wednesday, March 25, 2026...
·schneier.com·
Upcoming Speaking Engagements - Schneier on Security
One threat actor responsible for 83% of recent Ivanti RCE attacks
One threat actor responsible for 83% of recent Ivanti RCE attacks
Threat intelligence observations show that a single threat actor is responsible for most of the active exploitation of two critical vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), tracked as CVE-2026-21962 and CVE-2026-24061.
·bleepingcomputer.com·
One threat actor responsible for 83% of recent Ivanti RCE attacks
Snail mail letters target Trezor and Ledger users in crypto-theft attacks
Snail mail letters target Trezor and Ledger users in crypto-theft attacks
Threat actors are sending physical letters pretending to be from Trezor and Ledger, makers of cryptocurrency hardware wallets, to trick users into submitting recovery phrases in crypto theft attacks.
·bleepingcomputer.com·
Snail mail letters target Trezor and Ledger users in crypto-theft attacks
Objective-See: Blog
Objective-See: Blog
Posts about macOS malware, exploits, and tools
·objective-see.org·
Objective-See: Blog
Objective-See: Blog
Objective-See: Blog
Posts about macOS malware, exploits, and tools
·objective-see.org·
Objective-See: Blog
CIS Benchmarks February 2026 Update
CIS Benchmarks February 2026 Update
Here is an overview of the CIS Benchmarks that the Center for Internet Security (CIS) updated or released for February 2026.
·cisecurity.org·
CIS Benchmarks February 2026 Update
Upholding U.S. SLTT Resilience with Affordable Services
Upholding U.S. SLTT Resilience with Affordable Services
The MS-ISAC bridges the U.S. SLTT resilience gap by offering under-resourced organizations access to affordable services. Read to learn more.
·cisecurity.org·
Upholding U.S. SLTT Resilience with Affordable Services
Fake job recruiters hide malware in developer coding challenges
Fake job recruiters hide malware in developer coding challenges
A new variation of the fake recruiter campaign from North Korean threat actors is targeting JavaScript and Python developers with cryptocurrency-related tasks.
·bleepingcomputer.com·
Fake job recruiters hide malware in developer coding challenges
A one-prompt attack that breaks LLM safety alignment | Microsoft Security Blog
A one-prompt attack that breaks LLM safety alignment | Microsoft Security Blog
As LLMs and diffusion models power more applications, their safety alignment becomes critical. Our research shows that even minimal downstream fine‑tuning can weaken safeguards, raising a key question: how reliably does alignment hold as models evolve?
·microsoft.com·
A one-prompt attack that breaks LLM safety alignment | Microsoft Security Blog
Manipulating AI memory for profit: The rise of AI Recommendation Poisoning | Microsoft Security Blog
Manipulating AI memory for profit: The rise of AI Recommendation Poisoning | Microsoft Security Blog
That helpful “Summarize with AI” button? It might be secretly manipulating what your AI recommends.  Microsoft security researchers have discovered a growing trend of AI memory poisoning attacks used for promotional purposes, a technique we call AI Recommendation Poisoning.
·microsoft.com·
Manipulating AI memory for profit: The rise of AI Recommendation Poisoning | Microsoft Security Blog
Louis Vuitton, Dior, and Tiffany fined $25 million over data breaches
Louis Vuitton, Dior, and Tiffany fined $25 million over data breaches
South Korea has fined luxury fashion brands Louis Vuitton, Christian Dior Couture, and Tiffany $25 million for failing to implement adequate security measures, which facilitated unauthorized access and the exposure of data belonging to more than 5.5 million customers.
·bleepingcomputer.com·
Louis Vuitton, Dior, and Tiffany fined $25 million over data breaches