Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31476 bookmarks
Custom sorting
Scammer steals $1.5 million from Baltimore by spoofing city vendor
Scammer steals $1.5 million from Baltimore by spoofing city vendor
In a post mortem of the incident, Baltimore Inspector General Isabel Mercedes Cumming said the city’s accounts payable department had failed to implement corrective measures after previous incidents of fraud and did not have proper protections in place to verify supplier details.
·therecord.media·
Scammer steals $1.5 million from Baltimore by spoofing city vendor
Windows 11 KB5064081 update clears up CPU usage metrics in Task Manager
Windows 11 KB5064081 update clears up CPU usage metrics in Task Manager
Microsoft has released the KB5064081 preview cumulative update for Windows 11 24H2, which includes thirty-six new features or changes, with many gradually rolling out. These updates include new Recall features and a new way of displaying CPU usage in Task Manager.
·bleepingcomputer.com·
Windows 11 KB5064081 update clears up CPU usage metrics in Task Manager
Microsoft fixes bug behind Windows certificate enrollment errors
Microsoft fixes bug behind Windows certificate enrollment errors
Microsoft has resolved a known issue causing false CertificateServicesClient (CertEnroll) error messages after installing the July 2025 preview and subsequent Windows 11 24H2 updates.
·bleepingcomputer.com·
Microsoft fixes bug behind Windows certificate enrollment errors
GAO-25-107283 Analysis: Defense Supply Chain Risks Are Escalating - interos.ai
GAO-25-107283 Analysis: Defense Supply Chain Risks Are Escalating - interos.ai
The defense supply chain is stronger with continuous, real-time monitoring. GAO‑25‑107283, a report recently released by the U.S. Government Accountability Office (GAO), highlights critical supply chain vulnerabilities across the Department of Defense’s 200,000+ supplier ecosystem. Areas for improvement include limited traceability of foreign-origin materials, visibility into lower-tier vendors, and streamlined contractual reporting. The dangers aren’t....
·interos.ai·
GAO-25-107283 Analysis: Defense Supply Chain Risks Are Escalating - interos.ai
Microsoft to enforce MFA for Azure resource management in October
Microsoft to enforce MFA for Azure resource management in October
Starting in October, Microsoft will enforce multi-factor authentication (MFA) for all Azure resource management actions to protect Azure clients from unauthorized access attempts.
·bleepingcomputer.com·
Microsoft to enforce MFA for Azure resource management in October
Microsoft says recent Windows update didn't kill your SSD
Microsoft says recent Windows update didn't kill your SSD
Microsoft has found no link between the August 2025 KB5063878 security update and customer reports of failure and data corruption issues affecting solid-state drives (SSDs) and hard disk drives (HDDs).
·bleepingcomputer.com·
Microsoft says recent Windows update didn't kill your SSD
Experts warn of actively exploited FreePBX zero-day
Experts warn of actively exploited FreePBX zero-day
Sangoma warns of an actively exploited FreePBX zero-day affecting systems with publicly exposed admin control panels.
·securityaffairs.com·
Experts warn of actively exploited FreePBX zero-day
Extorsion automatisée, chantage ciblé… quand Claude Code pilote une immense opération de « vibe hacking »
Extorsion automatisée, chantage ciblé… quand Claude Code pilote une immense opération de « vibe hacking »
La société américaine Anthropic dévoile une campagne de vols de données orchestrée à l’aide de son modèle de génération de code Claude Code. En un mois, l'opération aurait mis en danger 17 organisations. Le mode opératoire repose sur ce qu’Anthropic désigne comme du vibe hacking. Vibe coding. Voilà le terme tendance
·numerama.com·
Extorsion automatisée, chantage ciblé… quand Claude Code pilote une immense opération de « vibe hacking »
Achieving Resilience through Zero Trust | CSA
Achieving Resilience through Zero Trust | CSA
Zero Trust’s foundational concept of “always verify” is essential to building resilience. Reduce the blast radius to reduce the impact of incidents.
·cloudsecurityalliance.org·
Achieving Resilience through Zero Trust | CSA
Ransomware gang takedowns causing explosion of new, smaller groups
Ransomware gang takedowns causing explosion of new, smaller groups
The ransomware ecosystem continues to splinter, with new gangs proliferating in the wake of law enforcement takedowns that have scattered affiliates and prompted criminal rebrands.
·therecord.media·
Ransomware gang takedowns causing explosion of new, smaller groups
Baggage Tag Scam - Schneier on Security
Baggage Tag Scam - Schneier on Security
I just heard about this: There’s a travel scam warning going around the internet right now: You should keep your baggage tags on your bags until you get home, then shred them, because scammers are using luggage tags to file fraudulent claims for missing baggage with the airline. First, the scam is possible. I had a bag destroyed by baggage handlers on a recent flight, and all the information I needed to file a claim was on my luggage tag. I have no idea if I will successfully get any money from the airline, or what form it will be in, or how it will be tied to my name, but at least the first step is possible...
·schneier.com·
Baggage Tag Scam - Schneier on Security
Understanding HIPAA: Key Regulations and Compliance | CSA
Understanding HIPAA: Key Regulations and Compliance | CSA
HIPAA ensures the confidential handling of protected health information and mandates stringent guidelines for the privacy and security of patient data.
·cloudsecurityalliance.org·
Understanding HIPAA: Key Regulations and Compliance | CSA
Google: Salesloft Drift breach hits all integrations
Google: Salesloft Drift breach hits all integrations
Google warns that Salesloft Drift OAuth breach affects all integrations, not just Salesforce. All tokens should be treated as compromised.
·securityaffairs.com·
Google: Salesloft Drift breach hits all integrations
How attackers adapt to built-in macOS protection
How attackers adapt to built-in macOS protection
We analyze the built-in protection mechanisms in macOS: how they work, how threat actors can attack them or deceive users, and how to detect such attacks.
·securelist.com·
How attackers adapt to built-in macOS protection