https://www.infosecurity-magazine.com/news/experts-urge-greater-ai-supply/

Latest CyberSec News by @thecyberpicker
https://www.infosecurity-magazine.com/news/chinese-smishing-us-payment-cards/
Cybersecurity budgets tighten as economic anxiety rises
Uncertain tariff policies and fluctuating inflation and interest rates are leading to stagnant or reduced budgets, according to an IANS Research report.
Cursor AI Code Editor Vulnerability Enables RCE via Malicious MCP File Swaps Post Approval
Cursor patched a critical RCE flaw in its AI code editor that exposed devs to silent attacks.
Google’s August Patch Fixes Two Qualcomm Vulnerabilities Exploited in the Wild
Google fixed 6 Android flaws, including 3 exploited Qualcomm bugs, raising spyware concerns. Users urged to update.
Critical Vulnerabilities Found in NVIDIA's Triton Inference Server
Critical vulnerabilities in NVIDIA's Triton Inference Server, discovered by researchers, could allow unauthenticated attackers to gain full server control through remote code execution
Critical Android vulnerabilities patched—update as soon as you can
Google has patched 6 vulnerabilities in Android including two critical ones, one of which can compromise a device without the user needing to do anything.
Top Cybersecurity CEOs On The Cybercrime Magazine YouTube Channel
This week in cybersecurity from the editors at Cybercrime Magazine
Google a trouvé LA solution pour détecter des failles de sécurité à moindre coût
L’avenir de la chasse aux bugs pourrait bien appartenir aussi aux intelligences artificielles (IA). Google vient d’affirmer qu’un de ses systèmes avait été plutôt bon pour déceler plusieurs vulnérabilités au cours des derniers mois. Repérer les failles de sécurité est une opération coûteuse, mais qui fait partie du
Vietnamese-speaking hackers appear to be running global data theft operation through Telegram
A combination of phishing lures, a previously spotted infostealer and Telegram bots are fueling a campaign by apparent Vietnamese-speaking hackers to capture and sell sensitive data globally.
The Heat Wasn't Just Outside: Cyber Attacks Spiked in Summer 2025
Can your defenses withstand the biggest attacks of Summer 2025? From Interlock's FileFix to Qilin, Scattered Spider, and ToolShell exploits—simulate them all against your organization's defenses with Picus Security Validation Platform to find gaps before attackers do.
Alleged ‘tap-in’ scammer advertised services on social media
A 24-year-old woman who allegedly advertised her services on social media has been arrested for her part in a "tap-in" scam.
SHARED INTEL Q&A: From alert to fix — Gomboc brings trusted AI to Infrastructure-as-Code
The promise of AI in cybersecurity has been loudly heralded—yet quietly limited. Related: What is IaC? Machine learning has proven effective at spotting anomalies and flagging misconfigurations. But resolving those issues remains largely manual, slow, and labor-intensive. A recent Cloud Security Alliance survey found: •75% of teams spend at least one-fifth of their time manually
Taiwan’s TSMC fires engineers over suspected theft of semiconductor secrets
The two engineers, alongside a third suspect, have since been arrested in what is the first trade secrets case brought under Taiwan’s National Security Act, a law that intends to protect the country’s advantage in producing pioneering semiconductors.
Why Continuous IaC Validation is Non-Negotiable | CSA
Infrastructure as Code (IaC) promises consistency and control. But no matter how pristine your IaC is, your actual cloud environment will start to drift.
ReVault! When your SoC turns against you…
Talos reported 5 vulnerabilities to Broadcom and Dell affecting both the ControlVault3 Firmware and its associated Windows APIs that we are calling “ReVault”.
Cybersecurity Teams Hit by Lowest Budget Growth in Five Years
IANS found that stagnant budget growth rates have significantly impacted CISOs ability to increase their teams’ headcount
Dutch Caribbean islands respond to cyberattacks on courts, tax departments
A ransomware attack on Curaçao's tax office and an email breach at Aruba's parliament have put the Dutch Caribbean islands on high alert for cybersecurity issues.
Rubrik & Sophos Enhance Cyber Resilience for Microsoft 365
Cybersecurity attacks are rising sharply in 2025, and Microsoft has been one among many prominent targets. Research shows that 70 percent of M365 tenants have experienced account takeovers1 and 81 …
Cisco discloses data breach impacting Cisco.com user accounts
Cisco has disclosed that cybercriminals stole the basic profile information of users registered on Cisco.com following a voice phishing (vishing) attack targeting a company representative.
From Bing Search to Ransomware: Bumblebee and AdaptixC2 Deliver Akira
Overview Bumblebee malware has been an initial access tool used by threat actors since late 2021. In 2023 the malware was first reported as using SEO poisoning as a delivery mechanism. Recently in …
Misconfigurations Are Not Vulnerabilities: The Costly Confusion Behind Security Risks
Most SaaS incidents come from misconfigurations or permission issues, not attacks—putting users at unseen risk.
HTTP Request Smuggling Explained: with seasoned bug bounty hunter NahamSec and world-class researcher James Kettle
Ever wondered how attackers can compromise modern websites by exploiting invisible cracks in HTTP infrastructure to win big bounties? In his latest video, NahamSec walks through the basics of request
SonicWall urges admins to disable SSLVPN amid rising attacks
SonicWall has warned customers to disable SSLVPN services due to ransomware gangs potentially exploiting an unknown security vulnerability in SonicWall Gen 7 firewalls to breach networks over the past few weeks.
Exposed Without a Breach: The Cost of Data Blindness
These are in plain sight without a Breach. No ransomware. No compromise. Just misconfigured systems, overpermissioned users, silent access.
AI Impact Analysis: Ethical & Societal Considerations | CSA
An AI impact analysis assesses how an AI system affects those involved with it. Explore the key ethical and societal considerations for an AI impact analysis.
Surveilling Your Children with AirTags - Schneier on Security
Skechers is making a line of kid’s shoes with a hidden compartment for an AirTag.
Pourquoi payer les chasseurs de bugs quand on peut confier la traque à l’IA ?
L’avenir de la chasse aux bugs pourrait bien appartenir aussi aux intelligences artificielles (IA). Google vient d’affirmer qu’un de ses systèmes avait été plutôt bon pour déceler plusieurs vulnérabilités au cours des derniers mois. Repérer les failles de sécurité est une opération coûteuse, mais qui fait partie du
Unexpected snail mail packages are being sent with scammy QR codes, warns FBI
Receiving an unexpected package in the post is not always a pleasant surprise.
Android gets patches for Qualcomm flaws exploited in attacks
Google has released security patches for six vulnerabilities in Android's August 2025 security update, including two Qualcomm flaws exploited in targeted attacks.