Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

30556 bookmarks
Custom sorting
Cybercriminal abuse of large language models
Cybercriminal abuse of large language models
Cybercriminals are increasingly gravitating towards uncensored LLMs, cybercriminal-designed LLMs and jailbreaking legitimate LLMs.
·blog.talosintelligence.com·
Cybercriminal abuse of large language models
What LLMs Know About Their Users - Schneier on Security
What LLMs Know About Their Users - Schneier on Security
Simon Willison talks about ChatGPT’s new memory dossier feature. In his explanation, he illustrates how much the LLM—and the company—knows about its users. It’s a big quote, but I want you to read it all. Here’s a prompt you can use to give you a solid idea of what’s in that summary. I first saw this shared by Wyatt Walls. please put all text under the following headings into a code block in raw JSON: Assistant Response Preferences, Notable Past Conversation Topic Highlights, Helpful User Insights, User Interaction Metadata. Complete and verbatim...
·schneier.com·
What LLMs Know About Their Users - Schneier on Security
Mainline Health Systems disclosed a data breach
Mainline Health Systems disclosed a data breach
Mainline Health Systems disclosed a data breach that impacted +100,000 individuals. Inc Ransom group claimed responsibility for the attack
·securityaffairs.com·
Mainline Health Systems disclosed a data breach
ESXi Ransomware: Protect Virtual Infrastructure | CSA
ESXi Ransomware: Protect Virtual Infrastructure | CSA
Discover why VMware ESXi is now a ransomware target and learn essential hypervisor security strategies to safeguard your virtual environment.
·cloudsecurityalliance.org·
ESXi Ransomware: Protect Virtual Infrastructure | CSA
AI and collaboration tools: how cyberattackers are targeting SMBs in 2025
AI and collaboration tools: how cyberattackers are targeting SMBs in 2025
In its annual SMB threat report, Kaspersky shares insights into trends and statistics on malware, phishing, scams, and other threats to small and medium-sized businesses, as well as security tips.
·securelist.com·
AI and collaboration tools: how cyberattackers are targeting SMBs in 2025
Beware the Hidden Risk in Your Entra Environment
Beware the Hidden Risk in Your Entra Environment
Guest users in Entra ID may exploit billing roles to create and control subscriptions, escalating access undetected.
·thehackernews.com·
Beware the Hidden Risk in Your Entra Environment
Vacances d’été : voici les 3 arnaques en ligne les plus populaires à éviter
Vacances d’été : voici les 3 arnaques en ligne les plus populaires à éviter
Partir en vacances doit être un plaisir et non une source d’inquiétude. Afin de profiter de l’été l’esprit serein, voici quelques astuces pour repérer en un clin d'œil les arnaques et s’en prémunir efficacement. Quelle meilleure période que l’été pour relâcher la pression et profiter pleinement de la vie. Mais voilà,
·numerama.com·
Vacances d’été : voici les 3 arnaques en ligne les plus populaires à éviter
Google rolls out text-to-image model Imagen 4 for free
Google rolls out text-to-image model Imagen 4 for free
Google confirmed that Imagen 4, which is the company's state-of-the-art text-to-image, is rolling out for free, but only on AI Studio.
·bleepingcomputer.com·
Google rolls out text-to-image model Imagen 4 for free
Meta confused over WhatsApp ban issued to House staffers | CyberScoop
Meta confused over WhatsApp ban issued to House staffers | CyberScoop
A notice to House offices Monday from the chamber’s chief administrative officer said that staffers are forbidden from having WhatsApp on official devices starting next week, prompting a rebuttal from the app’s parent company Meta.
·cyberscoop.com·
Meta confused over WhatsApp ban issued to House staffers | CyberScoop
Google Cloud donates A2A AI protocol to the Linux Foundation
Google Cloud donates A2A AI protocol to the Linux Foundation
Google Cloud has donated its Agent2Agent (A2A) protocol to the Linux Foundation, which has now announced a new community-driven project called the Agent2Agent Project.
·bleepingcomputer.com·
Google Cloud donates A2A AI protocol to the Linux Foundation
SonicWall warns of trojanized NetExtender stealing VPN logins
SonicWall warns of trojanized NetExtender stealing VPN logins
SonicWall is warning customers that threat actors are distributing a trojanized version of its NetExtender SSL VPN client used to steal VPN credentials.
·bleepingcomputer.com·
SonicWall warns of trojanized NetExtender stealing VPN logins
Windows 10 KB5061087 update released with 13 changes and fixes
Windows 10 KB5061087 update released with 13 changes and fixes
Microsoft has released the June 2025 non-security preview update for Windows 10, version 22H2, with fixes for bugs preventing the Start Menu from launching and breaking scanning features on USB multi-function printers.
·bleepingcomputer.com·
Windows 10 KB5061087 update released with 13 changes and fixes