Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29804 bookmarks
Custom sorting
Popular LLMs Found to Produce Vulnerable Code by Default
Popular LLMs Found to Produce Vulnerable Code by Default
Backslash Security found that naïve prompts resulted in code vulnerable to at least four of the of the 10 most common vulnerabilities across popular LLMs
·infosecurity-magazine.com·
Popular LLMs Found to Produce Vulnerable Code by Default
FBI seeks help to unmask Salt Typhoon hackers behind telecom breaches
FBI seeks help to unmask Salt Typhoon hackers behind telecom breaches
The FBI has asked the public for information on Chinese Salt Typhoon hackers behind widespread breaches of telecommunications providers in the United States and worldwide.
·bleepingcomputer.com·
FBI seeks help to unmask Salt Typhoon hackers behind telecom breaches
defcon.org
defcon.org
The largest hacking and security conference with presentations, workshops, contests, villages and the premier Capture The Flag Contest.
·defcon.org·
defcon.org
Hackers abuse OAuth 2.0 workflows to hijack Microsoft 365 accounts
Hackers abuse OAuth 2.0 workflows to hijack Microsoft 365 accounts
Russian threat actors have been abusing legitimate OAuth 2.0 authentication workflows to hijack Microsoft 365 accounts of employees of organizations related to Ukraine and human rights.
·bleepingcomputer.com·
Hackers abuse OAuth 2.0 workflows to hijack Microsoft 365 accounts
Lessons from Ted Lasso for cybersecurity success
Lessons from Ted Lasso for cybersecurity success
In this edition, Bill explores how intellectual curiosity drives success in cybersecurity, shares insights on the IAB ToyMaker’s tactics, and covers the top security headlines you need to know.
·blog.talosintelligence.com·
Lessons from Ted Lasso for cybersecurity success
New Linux Rootkit - Schneier on Security
New Linux Rootkit - Schneier on Security
Interesting: The company has released a working rootkit called “Curing” that uses io_uring, a feature built into the Linux kernel, to stealthily perform malicious activities without being caught by many of the detection solutions currently on the market. At the heart of the issue is the heavy reliance on monitoring system calls, which has become the go-to method for many cybersecurity vendors. The problem? Attackers can completely sidestep these monitored calls by leaning on io_uring instead. This clever method could let bad actors quietly make network connections or tamper with files without triggering the usual alarms...
·schneier.com·
New Linux Rootkit - Schneier on Security
RSAC Fireside Chat: The NDR evolution story—from open source start to kill chain clarity
RSAC Fireside Chat: The NDR evolution story—from open source start to kill chain clarity
As enterprises brace for a new wave of stealthy intrusions — so-called Typhoon attacks — security leaders are doubling down on network intelligence that goes beyond surface-level alerts. Related: What is NDR? In this RSAC 2025 Fireside Chat, I sat down with Corelight CEO Brian Dye to unpack how Network Detection and Response (NDR) is
·lastwatchdog.com·
RSAC Fireside Chat: The NDR evolution story—from open source start to kill chain clarity
North Korean IT workers seen using AI tools to scam firms into hiring them
North Korean IT workers seen using AI tools to scam firms into hiring them
North Korean IT workers illicitly gaining employment at U.S. and European tech companies are increasingly using generative artificial intelligence in a variety of ways to assist them throughout the job application and interview process.
·therecord.media·
North Korean IT workers seen using AI tools to scam firms into hiring them
Lazarus hackers breach six companies in watering hole attacks
Lazarus hackers breach six companies in watering hole attacks
In a recent espionage campaign, the infamous North Korean threat group Lazarus targeted multiple organizations in the software, IT, finance, and telecommunications sectors in South Korea.
·bleepingcomputer.com·
Lazarus hackers breach six companies in watering hole attacks
ELENOR-corp Ransomware Targets Healthcare Sector
ELENOR-corp Ransomware Targets Healthcare Sector
ELENOR-corp ransomware, a new version of Mimic, is targeting healthcare organizations using advanced capabilities
·infosecurity-magazine.com·
ELENOR-corp Ransomware Targets Healthcare Sector
Frederick Health data breach impacts nearly 1 million patients
Frederick Health data breach impacts nearly 1 million patients
​A ransomware attack in January at Frederick Health Medical Group, a major healthcare provider in Maryland, has led to a data breach affecting nearly one million patients.
·bleepingcomputer.com·
Frederick Health data breach impacts nearly 1 million patients
RSAC Fireside Chat: X9 PKI emerges to help financial sector interoperate, get ready for ‘Q-Day’
RSAC Fireside Chat: X9 PKI emerges to help financial sector interoperate, get ready for ‘Q-Day’
As RSAC 2025 convenes next week in San Francisco, digital trust is poised to take center stage. Related: PKI and the IoT cloud One quiet but consequential development now taking root in the financial sector could prove pivotal: the emergence of a dedicated Public Key Infrastructure (PKI) framework, tailored to banks and payment networks, guided
·lastwatchdog.com·
RSAC Fireside Chat: X9 PKI emerges to help financial sector interoperate, get ready for ‘Q-Day’