Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29802 bookmarks
Custom sorting
ConnectWise says nation-state attack targeted multiple ScreenConnect customers
ConnectWise says nation-state attack targeted multiple ScreenConnect customers
The company said it “recently learned of suspicious activity” within its environment that it believes “was tied to a sophisticated nation state actor, which affected a very small number of ScreenConnect customers.”
¡therecord.media¡
ConnectWise says nation-state attack targeted multiple ScreenConnect customers
How to deploy AI safely
How to deploy AI safely
Microsoft Deputy CISO Yonatan Zunger shares tips and guidance for safely and efficiently implementing AI in your organization.
¡microsoft.com¡
How to deploy AI safely
Defending against evolving identity attack techniques
Defending against evolving identity attack techniques
Threat actors continue to develop and leverage various techniques that aim to compromise cloud identities. Despite advancements in protections like multifactor authentication (MFA) and passwordless solutions, social engineering remains a key aspect of phishing attacks. Implementing phishing-resistant solutions, like passkeys, can improve security against these evolving threats.
¡microsoft.com¡
Defending against evolving identity attack techniques
A new author has appeared
A new author has appeared
Talos Content Manager Amy introduces themself, shares her unconventional journey into cybersecurity and reports on threats masquerading as AI installers.
¡blog.talosintelligence.com¡
A new author has appeared
Threat actors abuse Google Apps Script in evasive phishing attacks
Threat actors abuse Google Apps Script in evasive phishing attacks
Threat actors are abusing the trusted Google platform 'Google Apps Script' to host phishing pages, making them appear legitimate and eliminating the risk of them getting flagged by security tools.
¡bleepingcomputer.com¡
Threat actors abuse Google Apps Script in evasive phishing attacks
Apple Safari exposes users to fullscreen browser-in-the-middle attacks
Apple Safari exposes users to fullscreen browser-in-the-middle attacks
A weakness in Apple's Safari web browser allows threat actors to leverage the fullscreen browser-in-the-middle (BitM) technique to steal account credentials from unsuspecting users.
¡bleepingcomputer.com¡
Apple Safari exposes users to fullscreen browser-in-the-middle attacks
US sanctions firm linked to cyber scams behind $200 million in losses
US sanctions firm linked to cyber scams behind $200 million in losses
The U.S. Treasury Department has sanctioned Funnull Technology, a Philippines-based company that supports hundreds of thousands of malicious websites behind cyber scams linked to over $200 million in losses for Americans.
¡bleepingcomputer.com¡
US sanctions firm linked to cyber scams behind $200 million in losses
Cybercriminals exploit AI hype to spread ransomware, malware
Cybercriminals exploit AI hype to spread ransomware, malware
Threat actors linked to lesser-known ransomware and malware projects now use AI tools as lures to infect unsuspecting victims with malicious payloads.
¡bleepingcomputer.com¡
Cybercriminals exploit AI hype to spread ransomware, malware
Attackers are mapping your attack surface—are you?
Attackers are mapping your attack surface—are you?
Attackers are mapping your infrastructure before you even realize what's exposed. Sprocket ASM flips the script — giving you the same recon capabilities they use, plus change detection and actionable insights to close gaps fast. See your attack surface the way hackers do and beat them to it.
¡bleepingcomputer.com¡
Attackers are mapping your attack surface—are you?
The True Costs of Legacy Privileged Access Management | CSA
The True Costs of Legacy Privileged Access Management | CSA
Legacy Privileged Access Management (PAM) quietly drains resources, stalls innovation, & introduces security risks. It’s time to consider a modern alternative.
¡cloudsecurityalliance.org¡
The True Costs of Legacy Privileged Access Management | CSA
Deepfake-posting man faces huge $450,000 fine
Deepfake-posting man faces huge $450,000 fine
A man is facing a $450,000 AU fine after he published deepfake images of prominent Australian women on the now-defunct MrDeepfakes...
¡malwarebytes.com¡
Deepfake-posting man faces huge $450,000 fine
Cybercriminals camouflaging threats as AI tool installers
Cybercriminals camouflaging threats as AI tool installers
Cisco Talos has uncovered new threats, including ransomware like CyberLock and Lucky_Gh0$t, and a destructive malware called Numero, all disguised as legitimate AI tool installers to target victims.
¡blog.talosintelligence.com¡
Cybercriminals camouflaging threats as AI tool installers
Multimodal AI Faces New Safety Threats | CSA
Multimodal AI Faces New Safety Threats | CSA
Enkrypt AI's new report reveals critical safety flaws in multimodal models, exposing risks like CSEM content and CBRN info via hidden image prompts.
¡cloudsecurityalliance.org¡
Multimodal AI Faces New Safety Threats | CSA
Surveillance Via Smart Toothbrush - Schneier on Security
Surveillance Via Smart Toothbrush - Schneier on Security
The only links are from The Daily Mail and The Mirror, but a marital affair was discovered because the cheater was recorded using his smart toothbrush at home when he was supposed to be at work.
¡schneier.com¡
Surveillance Via Smart Toothbrush - Schneier on Security