Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31294 bookmarks
Custom sorting
UK launches vulnerability research program for external experts
UK launches vulnerability research program for external experts
UK's National Cyber Security Centre (NCSC) has announced a new Vulnerability Research Initiative (VRI) that aims to strengthen relations with external cybersecurity experts.
·bleepingcomputer.com·
UK launches vulnerability research program for external experts
Interlock ransomware adopts FileFix method to deliver malware
Interlock ransomware adopts FileFix method to deliver malware
Hackers have adopted the new technique called 'FileFix' in Interlock ransomware attacks to drop a remote access trojan (RAT) on targeted systems.
·bleepingcomputer.com·
Interlock ransomware adopts FileFix method to deliver malware
The Unusual Suspect: Git Repos
The Unusual Suspect: Git Repos
🚨 A fake CAPTCHA is all it takes. Interlock ransomware is back—now pushing a stealthy PHP RAT via “FileFix,” a spin on ClickFix that hijacks File Ex
·thehackernews.com·
The Unusual Suspect: Git Repos
Piracy sites for Nintendo Switch, PS4 games taken down by FBI
Piracy sites for Nintendo Switch, PS4 games taken down by FBI
Last week, the FBI’s Atlanta field office announced the seizure of nsw2u.com, nswdl.com, game-2u.com, bigngame.com, ps4pkg.com, ps4pkg.net and mgnetu.com — placing FBI banners on all of the sites.
·therecord.media·
Piracy sites for Nintendo Switch, PS4 games taken down by FBI
Malicious VSCode extension in Cursor IDE led to $500K crypto theft
Malicious VSCode extension in Cursor IDE led to $500K crypto theft
A fake extension for the Cursor AI IDE code editor infected devices with remote access tools and infostealers, which, in one case, led to the theft of $500,000 in cryptocurrency from a Russian crypto developer.
·bleepingcomputer.com·
Malicious VSCode extension in Cursor IDE led to $500K crypto theft
Gigabyte motherboards vulnerable to UEFI malware bypassing Secure Boot
Gigabyte motherboards vulnerable to UEFI malware bypassing Secure Boot
Dozens of Gigabyte motherboard models run on UEFI firmware vulnerable to security issues that allow planting bootkit malware that is invisible to the operating system and can survive reinstalls.
·bleepingcomputer.com·
Gigabyte motherboards vulnerable to UEFI malware bypassing Secure Boot
Zero Trust Lessons | 5G Cloud Core Security Assessment | CSA
Zero Trust Lessons | 5G Cloud Core Security Assessment | CSA
As telecom networks embrace cloud-native to power 5G, the importance of Zero Trust has never been greater. A recent assessment of a 5G core network shows why.
·cloudsecurityalliance.org·
Zero Trust Lessons | 5G Cloud Core Security Assessment | CSA
Is XBOW’s success the beginning of the end of human-led bug hunting? Not yet. | CyberScoop
Is XBOW’s success the beginning of the end of human-led bug hunting? Not yet. | CyberScoop
While most said XBOW’s capabilities fall short of an existential crisis for human bug hunters and red-team leaders, they also acknowledge that the balance between human and automation in cybersecurity is shifting rapidly underneath the industry’s feet.
·cyberscoop.com·
Is XBOW’s success the beginning of the end of human-led bug hunting? Not yet. | CyberScoop
What Are the 5 Key CompTIA Security+ Domains You Must Know?
What Are the 5 Key CompTIA Security+ Domains You Must Know?
Wondering what Security+ domains are on this certification exam? Look no further—read our article to learn everything you must know about them.
·stationx.net·
What Are the 5 Key CompTIA Security+ Domains You Must Know?