Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29804 bookmarks
Custom sorting
Interlock ransomware claims DaVita attack, leaks stolen data
Interlock ransomware claims DaVita attack, leaks stolen data
The Interlock ransomware gang has claimed the cyberattack on DaVita kidney dialysis firm and leaked data allegedly stolen from the organization.
·bleepingcomputer.com·
Interlock ransomware claims DaVita attack, leaks stolen data
Microsoft now pays up to $30,000 for some AI vulnerabilities
Microsoft now pays up to $30,000 for some AI vulnerabilities
Microsoft announced an increase in bug bounty payouts to $30,000 for AI vulnerabilities found in Dynamics 365 and Power Platform services and products.
·bleepingcomputer.com·
Microsoft now pays up to $30,000 for some AI vulnerabilities
Microsoft fixes bug causing incorrect 0x80070643 WinRE errors
Microsoft fixes bug causing incorrect 0x80070643 WinRE errors
Microsoft says it resolved a known issue causing erroneous 0x80070643 installation failure errors when deploying the April 2025 Windows Recovery Environment (WinRE) updates.
·bleepingcomputer.com·
Microsoft fixes bug causing incorrect 0x80070643 WinRE errors
Phishing Tests: Key Questions to Ask | CSA
Phishing Tests: Key Questions to Ask | CSA
Maximize your phishing assessments by asking the right questions—ensure tailored, effective campaigns that go beyond just checking the compliance box.
·cloudsecurityalliance.org·
Phishing Tests: Key Questions to Ask | CSA
Understanding Zero Trust Security Models | CSA
Understanding Zero Trust Security Models | CSA
As cyber threats get smarter, companies are using Zero Trust Security Models to keep their data safe. This way of thinking means "never trust, always verify."
·cloudsecurityalliance.org·
Understanding Zero Trust Security Models | CSA
Linux 'io_uring' security blindspot allows stealthy rootkit attacks
Linux 'io_uring' security blindspot allows stealthy rootkit attacks
A significant security gap in Linux runtime security caused by the 'io_uring' interface allows rootkits to operate undetected on systems while bypassing advanced Enterprise security software.
·bleepingcomputer.com·
Linux 'io_uring' security blindspot allows stealthy rootkit attacks
Ransomware Attacks Fall Sharply in March
Ransomware Attacks Fall Sharply in March
NCC Group found that ransomware attacks fell by 32% in March compared to February, but described this finding as a “red herring”
·infosecurity-magazine.com·
Ransomware Attacks Fall Sharply in March
Operation SyncHole: Lazarus APT goes back to the well
Operation SyncHole: Lazarus APT goes back to the well
Kaspersky GReAT experts uncovered a new campaign by Lazarus APT that exploits vulnerabilities in South Korean software products and uses a watering hole approach.
·securelist.com·
Operation SyncHole: Lazarus APT goes back to the well