Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

30015 bookmarks
Custom sorting
Lumma infostealer malware returns after law enforcement disruption
Lumma infostealer malware returns after law enforcement disruption
The Lumma infostealer malware operation is gradually resuming activities following a massive law enforcement operation in May, which resulted in the seizure of 2,300 domains and parts of its infrastructure.
·bleepingcomputer.com·
Lumma infostealer malware returns after law enforcement disruption
Windows 11 KB5062660 update brings new 'Windows Resilience' features
Windows 11 KB5062660 update brings new 'Windows Resilience' features
​​Microsoft has released the KB5062660 preview cumulative update for Windows 11 24H2 with twenty-nine new features or changes, with many gradually rolling out, such as the new Black Screen of Death and Quick Machine Recovery tool.
·bleepingcomputer.com·
Windows 11 KB5062660 update brings new 'Windows Resilience' features
House Republicans endorse stricter state and federal-led voter roll purges despite dearth of evidence on fraud | CyberScoop
House Republicans endorse stricter state and federal-led voter roll purges despite dearth of evidence on fraud | CyberScoop
A House hearing on state voter roll purges saw GOP lawmakers claim outdated voter lists enable fraud, but evidence was scant. Experts and voters testified about the real impacts of registration challenges and voter roll maintenance.
·cyberscoop.com·
House Republicans endorse stricter state and federal-led voter roll purges despite dearth of evidence on fraud | CyberScoop
Windows 11 gets new Black Screen of Death, auto recovery tool
Windows 11 gets new Black Screen of Death, auto recovery tool
Microsoft is rolling out significant changes to Windows 11 24H2 as part of the Windows Resilience Initiative, designed to reduce downtime and help devices recover from serious failures, as well as an overhaul of the all-too-familiar BSOD crash screens.
·bleepingcomputer.com·
Windows 11 gets new Black Screen of Death, auto recovery tool
Coyote malware abuses Windows accessibility framework for data theft
Coyote malware abuses Windows accessibility framework for data theft
A new variant of the banking trojan 'Coyote' has begun abusing a Windows accessibility feature, Microsoft's UI Automation framework, to identify which banking and cryptocurrency exchange sites are accessed on the device for potential credential theft.
·bleepingcomputer.com·
Coyote malware abuses Windows accessibility framework for data theft
Faille Microsoft SharePoint, une affaire d’espionnage chinois ?
Faille Microsoft SharePoint, une affaire d’espionnage chinois ?
L'écosystème cyber est en alerte depuis la découverte de deux vulnérabilités « zero-day » affectant la célèbre solution de gestion collaborative SharePoint de Microsoft. Toujours activement exploitées, ces failles sont au cœur d’une large campagne de piratage menée, selon de nombreux experts, par des groupes de
·numerama.com·
Faille Microsoft SharePoint, une affaire d’espionnage chinois ?
Major European healthcare network discloses security breach
Major European healthcare network discloses security breach
AMEOS Group, an operator of a massive healthcare network in Central Europe, has announced it has suffered a security breach that may have exposed customer, employee, and partner information.
·bleepingcomputer.com·
Major European healthcare network discloses security breach
CISA and FBI warn of escalating Interlock ransomware attacks
CISA and FBI warn of escalating Interlock ransomware attacks
CISA and the FBI warned on Tuesday of increased Interlock ransomware activity targeting businesses and critical infrastructure organizations in double extortion attacks.
·bleepingcomputer.com·
CISA and FBI warn of escalating Interlock ransomware attacks
UK moves to ban public sector organizations from making ransom payments | CyberScoop
UK moves to ban public sector organizations from making ransom payments | CyberScoop
The British government announced plans to prohibit public sector organizations and critical infrastructure operators from paying ransoms to cybercriminals, marking a significant shift in the nation's approach to combating ransomware attacks.
·cyberscoop.com·
UK moves to ban public sector organizations from making ransom payments | CyberScoop
Cisco: Maximum-severity ISE RCE flaws now exploited in attacks
Cisco: Maximum-severity ISE RCE flaws now exploited in attacks
Cisco is warning that three recently patched critical remote code execution vulnerabilities in Cisco Identity Services Engine (ISE) are now being actively exploited in attacks.
·bleepingcomputer.com·
Cisco: Maximum-severity ISE RCE flaws now exploited in attacks
Disrupting active exploitation of on-premises SharePoint vulnerabilities
Disrupting active exploitation of on-premises SharePoint vulnerabilities
Microsoft has observed two named Chinese nation-state actors, Linen Typhoon and Violet Typhoon, exploiting vulnerabilities targeting internet-facing SharePoint servers. In addition, we have observed another China-based threat actor, tracked as Storm-2603, exploiting these vulnerabilities. Microsoft has released new comprehensive security updates for all supported versions of SharePoint Server (Subscription Edition, 2019, and 2016) that protect customers against these new vulnerabilities. Customers should apply these updates immediately to ensure they are protected.
·microsoft.com·
Disrupting active exploitation of on-premises SharePoint vulnerabilities
UK to ban public sector orgs from paying ransomware gangs
UK to ban public sector orgs from paying ransomware gangs
The United Kingdom's government is planning to ban public sector and critical infrastructure organizations from paying ransoms after ransomware attacks.
·bleepingcomputer.com·
UK to ban public sector orgs from paying ransomware gangs
How Mature Is Your IaC Strategy? | CSA
How Mature Is Your IaC Strategy? | CSA
Unlock faster, safer deployments by leveling up your IaC maturity. Reduce misconfig risk, alert fatigue, and cloud costs—here’s how.
·cloudsecurityalliance.org·
How Mature Is Your IaC Strategy? | CSA