Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29805 bookmarks
Custom sorting
Critical Langflow RCE flaw exploited to hack AI app servers
Critical Langflow RCE flaw exploited to hack AI app servers
The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has tagged a Langflow remote code execution vulnerability as actively exploited, urging organizations to apply security updates and mitigations as soon as possible.
·bleepingcomputer.com·
Critical Langflow RCE flaw exploited to hack AI app servers
RSAC Strategic Reel: Cyber experts on the front lines unpack ‘Shadow AI,’ ‘Ground Truth’ - The Last Watchdog
RSAC Strategic Reel: Cyber experts on the front lines unpack ‘Shadow AI,’ ‘Ground Truth’ - The Last Watchdog
The response to our first LastWatchdog Strategic Reel has been energizing — and telling. Related: What is a cyber kill chain? The appetite for crisp, credible insight is alive and well. As the LinkedIn algo picked up steam and auto-captioning kicked in, it became clear that this short-form format resonates. Not just because it’s fast
·lastwatchdog.com·
RSAC Strategic Reel: Cyber experts on the front lines unpack ‘Shadow AI,’ ‘Ground Truth’ - The Last Watchdog
UK Legal Aid Agency investigates cybersecurity incident
UK Legal Aid Agency investigates cybersecurity incident
The Legal Aid Agency (LAA), an executive agency of the UK's Ministry of Justice that oversees billions in legal funding, warned law firms of a security incident and said the attackers might have accessed financial information.
·bleepingcomputer.com·
UK Legal Aid Agency investigates cybersecurity incident
New Microsoft 365 outage impacts Teams and other services
New Microsoft 365 outage impacts Teams and other services
Microsoft is investigating a new Microsoft 365 outage affecting multiple services across North America, including the company's Teams collaboration platform.
·bleepingcomputer.com·
New Microsoft 365 outage impacts Teams and other services
Secure Vibe Coding: Level Up with Cursor Rules | CSA
Secure Vibe Coding: Level Up with Cursor Rules | CSA
Being aware of “Vibe Coding” security risks isn't enough. Cursor Rules offer a powerful way to shape AI behavior and ensure secure code generation.
·cloudsecurityalliance.org·
Secure Vibe Coding: Level Up with Cursor Rules | CSA
Why EASM is vital to modern digital risk protection
Why EASM is vital to modern digital risk protection
You can't protect what you can't see. From shadow IT to supplier risk, modern attack surfaces are sprawling fast — and External Attack Surface Management (EASM) is how security teams take back control. Learn from Outpost24 how EASM powers proactive digital risk protection.
·bleepingcomputer.com·
Why EASM is vital to modern digital risk protection
Multiple iHeartRadio stations breached in December
Multiple iHeartRadio stations breached in December
Several radio stations owned by iHeartMedia were breached in December, exposing Social Security numbers, financial information and more.
·therecord.media·
Multiple iHeartRadio stations breached in December
Google fixes actively exploited FreeType flaw on Android
Google fixes actively exploited FreeType flaw on Android
Google has released the May 2025 security updates for Android with fixes for 45 security flaws, including an actively exploited zero-click FreeType 2 code execution vulnerability.
·bleepingcomputer.com·
Google fixes actively exploited FreeType flaw on Android
Securing the Media Industry | CSA
Securing the Media Industry | CSA
Media companies face rising cyber threats and trust erosion. Discover how zero trust security strategies can protect digital assets and ensure content authenticity.
·cloudsecurityalliance.org·
Securing the Media Industry | CSA
Fake Student Fraud in Community Colleges - Schneier on Security
Fake Student Fraud in Community Colleges - Schneier on Security
Reporting on the rise of fake students enrolling in community college courses: The bots’ goal is to bilk state and federal financial aid money by enrolling in classes, and remaining enrolled in them, long enough for aid disbursements to go out. They often accomplish this by submitting AI-generated work. And because community colleges accept all applicants, they’ve been almost exclusively impacted by the fraud. The article talks about the rise of this type of fraud, the difficulty of detecting it, and how it upends quite a bit of the class structure and learning community...
·schneier.com·
Fake Student Fraud in Community Colleges - Schneier on Security
Proactive threat hunting with Talos IR
Proactive threat hunting with Talos IR
Learn more about the framework Talos IR uses to conduct proactive threat hunts, and how we can help you stay one step ahead of emerging threats.
·blog.talosintelligence.com·
Proactive threat hunting with Talos IR
ESXi Security: A Manufacturing Wake-Up Call | CSA
ESXi Security: A Manufacturing Wake-Up Call | CSA
Manufacturers face rising ESXi hypervisor threats. Learn why hypervisor ransomware protection is key to protecting your organization.
·cloudsecurityalliance.org·
ESXi Security: A Manufacturing Wake-Up Call | CSA