Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29804 bookmarks
Custom sorting
New Gremlin Infostealer Distributed on Telegram
New Gremlin Infostealer Distributed on Telegram
Administrators of a Telegram channel named CoderSharp have been advertising Gremlin Stealer since March 2025
·infosecurity-magazine.com·
New Gremlin Infostealer Distributed on Telegram
A New Era for Compliance | Compliance Automation | CSA
A New Era for Compliance | Compliance Automation | CSA
The Compliance Automation Revolution is a CSA initiative to develop methods to automatically gather compliance evidence, harmonize frameworks, & quantify risk.
·cloudsecurityalliance.org·
A New Era for Compliance | Compliance Automation | CSA
Product Walkthrough: Securing Microsoft Copilot with Reco
Product Walkthrough: Securing Microsoft Copilot with Reco
Find out how Reco keeps Microsoft 365 Copilot safe by spotting risky prompts, protecting data, managing user access, and identifying threats.
·thehackernews.com·
Product Walkthrough: Securing Microsoft Copilot with Reco
Applying Security Engineering to Prompt Injection Security - Schneier on Security
Applying Security Engineering to Prompt Injection Security - Schneier on Security
This seems like an important advance in LLM security against prompt injection: Google DeepMind has unveiled CaMeL (CApabilities for MachinE Learning), a new approach to stopping prompt-injection attacks that abandons the failed strategy of having AI models police themselves. Instead, CaMeL treats language models as fundamentally untrusted components within a secure software framework, creating clear boundaries between user commands and potentially malicious content. […] To understand CaMeL, you need to understand that prompt injections happen when AI systems can’t distinguish between legitimate user commands and malicious instructions hidden in content they’re processing...
·schneier.com·
Applying Security Engineering to Prompt Injection Security - Schneier on Security
Year in Review: AI based threats
Year in Review: AI based threats
2024 wasn't the year that AI rewrote the cybercrime playbook — but it did turbocharge some of the old tricks. Read this summary of AI-based threats, from Talos' 2024 Year in Review.
·blog.talosintelligence.com·
Year in Review: AI based threats
When to Hire a GDPR Auditor | CSA
When to Hire a GDPR Auditor | CSA
Discover when to engage a GDPR auditor and how platforms streamline compliance with automated tools and expert support.
·cloudsecurityalliance.org·
When to Hire a GDPR Auditor | CSA
Zero-Day Exploitation Figure Surges 19% in Two Years
Zero-Day Exploitation Figure Surges 19% in Two Years
Google claims 19% more zero-day bugs were exploited in 2024 than 2022 as threat actors focus on security products
·infosecurity-magazine.com·
Zero-Day Exploitation Figure Surges 19% in Two Years
News alert: Case dismissed against VPN executive, affirms no-logs policy as a valid legal defense
News alert: Case dismissed against VPN executive, affirms no-logs policy as a valid legal defense
Toronto, Canada, Apr. 28, 2025, CyberNewswire -- Windscribe, a globally used privacy-first VPN service, announced today that its founder, Yegor Sak, has been fully acquitted by a court in Athens, Greece, following a two-year legal battle in which Sak was personally charged in connection with an alleged internet offence by an unknown user of the
·lastwatchdog.com·
News alert: Case dismissed against VPN executive, affirms no-logs policy as a valid legal defense