Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31048 bookmarks
Custom sorting
How to spot the latest fake Gmail security alerts
How to spot the latest fake Gmail security alerts
Fake Gmail security alerts are tricking users into inadvertently handing over control of their accounts to scammers. Here's what to look for.
·malwarebytes.com·
How to spot the latest fake Gmail security alerts
ERMAC Android malware source code leak exposes banking trojan infrastructure
ERMAC Android malware source code leak exposes banking trojan infrastructure
The source code for version 3 of the ERMAC Android banking trojan has been leaked online, exposing the internals of the malware-as-a-service platform and the operator's infrastructure.
·bleepingcomputer.com·
ERMAC Android malware source code leak exposes banking trojan infrastructure
AI for Cybersecurity: Building Trust in Your Workflows
AI for Cybersecurity: Building Trust in Your Workflows
In cybersecurity, speed matters, but trust is crucial. AI must ensure both rapid response and reliable decisions to avoid errors.
·securityaffairs.com·
AI for Cybersecurity: Building Trust in Your Workflows
Over 800 N-able servers left unpatched against critical flaws
Over 800 N-able servers left unpatched against critical flaws
Over 800 N-able N-central servers remain unpatched against a pair of critical security vulnerabilities tagged as actively exploited last week.
·bleepingcomputer.com·
Over 800 N-able servers left unpatched against critical flaws
Mozilla warns Germany could soon declare ad blockers illegal
Mozilla warns Germany could soon declare ad blockers illegal
A recent ruling from Germany's Federal Supreme Court (BGH) has revived a legal battle over whether browser-based ad blockers infringe copyright, raising fears about a potential ban of the tools in the country.
·bleepingcomputer.com·
Mozilla warns Germany could soon declare ad blockers illegal
USB Malware Campaign Spreads Cryptominer Worldwide
USB Malware Campaign Spreads Cryptominer Worldwide
A multi-stage attack delivered via USB devices has been observed installing cryptomining malware using DLL hijacking and PowerShell
·infosecurity-magazine.com·
USB Malware Campaign Spreads Cryptominer Worldwide
Popular npm Package Compromised in Phishing Attack
Popular npm Package Compromised in Phishing Attack
An incident involving the npm package eslint-config-prettier has been uncovered spreading Scavenger RAT
·infosecurity-magazine.com·
Popular npm Package Compromised in Phishing Attack
A Successful Social Engineering Attack: Retool 2023 | CSA
A Successful Social Engineering Attack: Retool 2023 | CSA
In 2023, a threat actor launched a social engineering campaign on Retool involving smishing & credential harvesting, leading them to a one-time password token.
·cloudsecurityalliance.org·
A Successful Social Engineering Attack: Retool 2023 | CSA
SHARED INTEL Q&A: Rethinking Zero Trust to close the widening gap on file-borne threats
SHARED INTEL Q&A: Rethinking Zero Trust to close the widening gap on file-borne threats
For years, “Zero Trust” has reshaped cybersecurity architecture — pushing organizations to move beyond the perimeter and reframe everything around identity, access control, and segmentation. Related: The Zero-Trust revolution These shifts are overdue. But as the frameworks mature, a critical blind spot remains: files. Spreadsheets, PDFs, Word docs — they flow freely across teams, vendors,
·lastwatchdog.com·
SHARED INTEL Q&A: Rethinking Zero Trust to close the widening gap on file-borne threats
Microsoft: Recent Windows updates may fail to install via WUSA
Microsoft: Recent Windows updates may fail to install via WUSA
Microsoft has mitigated a known issue that caused Windows update failures when installing them from a network share using the Windows Update Standalone Installer (WUSA).
·bleepingcomputer.com·
Microsoft: Recent Windows updates may fail to install via WUSA
Soosyze CMS 2.0 - Brute Force Login
Soosyze CMS 2.0 - Brute Force Login
Soosyze CMS 2.0 - Brute Force Login. CVE-2025-52392 . webapps exploit for Multiple platform
·exploit-db.com·
Soosyze CMS 2.0 - Brute Force Login
Tenda AC20 16.03.08.12 - Command Injection
Tenda AC20 16.03.08.12 - Command Injection
Tenda AC20 16.03.08.12 - Command Injection. CVE-2025-9090 . remote exploit for Multiple platform
·exploit-db.com·
Tenda AC20 16.03.08.12 - Command Injection