Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31391 bookmarks
Custom sorting
News alert: Global security leaders to convene at OpenSSL 2025 — final week for early-bird rates
News alert: Global security leaders to convene at OpenSSL 2025 — final week for early-bird rates
Newark, N.J., Aug. 25, 2025, CyberNewwire — Only 7 days left to secure the Early Bird registration at the OpenSSL Conference 2025, October 7 – 9 in Prague. The event will bring together lawyers, regulators, developers, and entrepreneurs to explore issues of security and privacy for everyone, everywhere. Attendees will have the opportunity to: ‱Meet
·lastwatchdog.com·
News alert: Global security leaders to convene at OpenSSL 2025 — final week for early-bird rates
Storm-0501 hackers shift to ransomware attacks in the cloud
Storm-0501 hackers shift to ransomware attacks in the cloud
Microsoft warns that a threat actor tracked as Storm-0501 has evolved its operations, shifting away from encrypting devices with ransomware to focusing on cloud-based encryption, data theft, and extortion.
·bleepingcomputer.com·
Storm-0501 hackers shift to ransomware attacks in the cloud
Experimental PromptLock ransomware uses AI to encrypt, steal data
Experimental PromptLock ransomware uses AI to encrypt, steal data
Threat researchers discovered the first AI-powered ransomware, called PromptLock, that uses Lua scripts to steal and encrypt data on Windows, macOS, and Linux systems.
·bleepingcomputer.com·
Experimental PromptLock ransomware uses AI to encrypt, steal data
FreePBX servers hacked via zero-day, emergency fix released
FreePBX servers hacked via zero-day, emergency fix released
The Sangoma FreePBX Security Team is warning about an actively exploited FreePBX zero-day vulnerability that impacts systems with the Administrator Control Panel (ACP) is exposed to the internet.
·bleepingcomputer.com·
FreePBX servers hacked via zero-day, emergency fix released
Libbiosig, Tenda, SAIL, PDF XChange, Foxit vulnerabilities
Libbiosig, Tenda, SAIL, PDF XChange, Foxit vulnerabilities
Cisco Talos’ Vulnerability Discovery & Research team recently disclosed ten vulnerabilities in BioSig Libbiosig, nine in Tenda AC6 Router, eight in SAIL, two in PDF-XChange Editor, and one in a Foxit PDF Reader. The vulnerabilities mentioned in this blog post have been patched by their respective vendors, all in adherence to Cisco’s third-party vulnerability disclosure policy.     For Snort coverage that can detect the exploitation of these vulnerabilities, download the latest rule sets from S
·blog.talosintelligence.com·
Libbiosig, Tenda, SAIL, PDF XChange, Foxit vulnerabilities
IT system supplier cyberattack impacts 200 municipalities in Sweden
IT system supplier cyberattack impacts 200 municipalities in Sweden
A cyberattack on Miljödata, an IT systems supplier for roughly 80% of Sweden's municipal systems, has caused accessibility problems in more than 200 regions of the country.
·bleepingcomputer.com·
IT system supplier cyberattack impacts 200 municipalities in Sweden
Global Salt Typhoon hacking campaigns linked to Chinese tech firms
Global Salt Typhoon hacking campaigns linked to Chinese tech firms
The U.S. National Security Agency (NSA), the UK's National Cyber Security Centre (NCSC), and partners from over a dozen countries have linked the Salt Typhoon global hacking campaigns to three China-based technology firms.
·bleepingcomputer.com·
Global Salt Typhoon hacking campaigns linked to Chinese tech firms
Storm-0501’s evolving techniques lead to cloud-based ransomware
Storm-0501’s evolving techniques lead to cloud-based ransomware
Financially motivated threat actor Storm-0501 has continuously evolved their campaigns to achieve sharpened focus on cloud-based tactics, techniques, and procedures (TTPs). While the threat actor has been known for targeting hybrid cloud environments, their primary objective has shifted from deploying on-premises endpoint ransomware to using cloud-based ransomware tactics.
·microsoft.com·
Storm-0501’s evolving techniques lead to cloud-based ransomware
Google to verify all Android devs to protect users from malware
Google to verify all Android devs to protect users from malware
Google is introducing a new defense for Android called 'Developer Verification' to block malware installations from sideloaded apps sourced from outside the official Google Play app store.
·bleepingcomputer.com·
Google to verify all Android devs to protect users from malware
Hackers use fake NDAs to deliver malware to US manufacturers
Hackers use fake NDAs to deliver malware to US manufacturers
Hackers are targeting American industrial firms by contacting them through their website forms, posing as potential business partners before infecting them with malware.
·therecord.media·
Hackers use fake NDAs to deliver malware to US manufacturers
Attention, cet outil trĂšs populaire peut devenir un mouchard pour localiser les Tesla
Attention, cet outil trĂšs populaire peut devenir un mouchard pour localiser les Tesla
Dans l’écosystĂšme Tesla, il existe une solution qui assouvit la soif toujours plus grande de certains propriĂ©taires en donnĂ©es sur leur prĂ©cieux vĂ©hicule. Son nom ? TeslaMate, un outil open source capable d'enregistrer l’historique de trajets, l’état de la batterie mais Ă©galement de rĂ©vĂ©ler des donnĂ©es sensibles Ă  la
·numerama.com·
Attention, cet outil trĂšs populaire peut devenir un mouchard pour localiser les Tesla
Over 28,000 Citrix devices vulnerable to new exploited RCE flaw
Over 28,000 Citrix devices vulnerable to new exploited RCE flaw
More than 28,200 Citrix instances are vulnerable to a critical remote code execution vulnerability tracked as CVE-2025-7775 that is already being exploited in the wild.
·bleepingcomputer.com·
Over 28,000 Citrix devices vulnerable to new exploited RCE flaw
Researchers Discover First Reported AI-Powered Ransomware
Researchers Discover First Reported AI-Powered Ransomware
While still in development, PromptLock is described as the “first known AI-powered ransomware” by ESET researchers
·infosecurity-magazine.com·
Researchers Discover First Reported AI-Powered Ransomware
Allied spy agencies blame 3 Chinese tech companies for Salt Typhoon attacks
Allied spy agencies blame 3 Chinese tech companies for Salt Typhoon attacks
The three companies were accused of providing “cyber-related products and services to China’s intelligence services, including multiple units in the People’s Liberation Army and Ministry of State Security” since at least 2021, according to the advisory.
·therecord.media·
Allied spy agencies blame 3 Chinese tech companies for Salt Typhoon attacks
NetScaler warns hackers are exploiting zero-day vulnerability
NetScaler warns hackers are exploiting zero-day vulnerability
The company is urging customers to patch their devices immediately, saying the flaw could lead to denial of service or remote code execution.
·cybersecuritydive.com·
NetScaler warns hackers are exploiting zero-day vulnerability