Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29854 bookmarks
Custom sorting
Citrix Bleed 2 exploited weeks before PoCs as Citrix denied attacks
Citrix Bleed 2 exploited weeks before PoCs as Citrix denied attacks
A critical Citrix NetScaler vulnerability, tracked as CVE-2025-5777 and dubbed "CitrixBleed 2," was actively exploited nearly two weeks before proof-of-concept (PoC) exploits were made public, despite Citrix stating that there was no evidence of attacks.
bleepingcomputer.com
Citrix Bleed 2 exploited weeks before PoCs as Citrix denied attacks
Microsoft Teams voice calls abused to push Matanbuchus malware
Microsoft Teams voice calls abused to push Matanbuchus malware
The Matanbuchus malware loader has been seen being distributed through social engineering over聽Microsoft Teams calls impersonating IT helpdesk.
bleepingcomputer.com
Microsoft Teams voice calls abused to push Matanbuchus malware
VMware fixes four ESXi zero-day bugs exploited at Pwn2Own Berlin
VMware fixes four ESXi zero-day bugs exploited at Pwn2Own Berlin
VMware fixed four vulnerabilities in VMware ESXi, Workstation, Fusion, and Tools that were exploited as zero-days during the Pwn2Own Berlin 2025 hacking contest in May 2025.
bleepingcomputer.com
VMware fixes four ESXi zero-day bugs exploited at Pwn2Own Berlin
United Natural Foods loses up to $400M in sales after cyberattack | CyberScoop
United Natural Foods loses up to $400M in sales after cyberattack | CyberScoop
The food distributor and wholesaler completely shut down its systems upon discovering the attack last month, yet core systems were restored and normal operating capacity returned within three weeks.
cyberscoop.com
United Natural Foods loses up to $400M in sales after cyberattack | CyberScoop
Google sues to disrupt BadBox 2.0 botnet infecting 10 million devices
Google sues to disrupt BadBox 2.0 botnet infecting 10 million devices
Google has filed a lawsuit against the anonymous operators of the Android BadBox 2.0 malware botnet, accusing them of running a global ad fraud scheme against the company's advertising platforms.
bleepingcomputer.com
Google sues to disrupt BadBox 2.0 botnet infecting 10 million devices
This is your sign to step away from the keyboard
This is your sign to step away from the keyboard
This week, Martin shows how stepping away from the screen can make you a stronger defender, alongside an inside scoop on emerging malware threats.
blog.talosintelligence.com
This is your sign to step away from the keyboard
Russian vodka producer reports disruptions after ransomware attack
Russian vodka producer reports disruptions after ransomware attack
Novabev Group, the Russian maker of Beluga Vodka and other brands, had to stop shipments and temporarily close stores in its WineLab subsidiary after a ransomware attack.
therecord.media
Russian vodka producer reports disruptions after ransomware attack
Hacker steals $27 million in BigONE exchange crypto breach
Hacker steals $27 million in BigONE exchange crypto breach
Cryptocurrency exchange BigONE announced that it suffered a security breach, in which hackers stole various digital assets valued at $27 million.
bleepingcomputer.com
Hacker steals $27 million in BigONE exchange crypto breach
Chinese hackers breached National Guard to steal network configurations
Chinese hackers breached National Guard to steal network configurations
The Chinese state-sponsored hacking group known as Salt Typhoon breached and remained undetected in a U.S. Army National Guard network for nine months in 2024, stealing network configuration files and administrator credentials that could be used to compromise other government networks.
bleepingcomputer.com
Chinese hackers breached National Guard to steal network configurations
Max severity Cisco ISE bug allows pre-auth command execution, patch now
Max severity Cisco ISE bug allows pre-auth command execution, patch now
A critical聽vulnerability (CVE-2025-20337) in Cisco's聽Identity Services Engine (ISE) could be exploited to let an unauthenticated attacker聽store malicious files, execute arbitrary code, or gain root privileges on vulnerable devices.
bleepingcomputer.com
Max severity Cisco ISE bug allows pre-auth command execution, patch now
Airbus pr茅pare l鈥橝400M 脿 devenir le 芦 vaisseau m猫re 禄 des drones de combat
Airbus pr茅pare l鈥橝400M 脿 devenir le 芦 vaisseau m猫re 禄 des drones de combat
L鈥橝irbus A400M, connu depuis ses d茅buts comme une r茅f茅rence mondiale du transport militaire, s鈥檃ppr锚te 脿 endosser de nouveaux r么les. Parmi eux ? Celui de 芦 vaisseau m猫re 禄 pour les drones de combat. Initialement con莽u pour l鈥檈mport de charges lourdes et le soutien logistique, l鈥橝400M voit ses missions s鈥櫭﹍argir au
numerama.com
Airbus pr茅pare l鈥橝400M 脿 devenir le 芦 vaisseau m猫re 禄 des drones de combat
Elite Russian university launches degree program on sanctions evasion
Elite Russian university launches degree program on sanctions evasion
The Higher School of Economics (HSE), a leading Russian institution, said the two-year course will focus on international corporate compliance and business ethics, and will be taught in both Russian and English.
therecord.media
Elite Russian university launches degree program on sanctions evasion
Adoption agency leaks over a million records
Adoption agency leaks over a million records
The database contained 1,115,061 records including the names of children, birth parents, adoptive parents, and other potentially sensitive information like case notes.
malwarebytes.com
Adoption agency leaks over a million records
Compliance is Falling Behind with Non-Human Identities | CSA
Compliance is Falling Behind with Non-Human Identities | CSA
Every major compliance framework, including PCI DSS, GDPR, and ISO 27001, requires strong access controls. Yet Non-Human Identities (NHIs) are often overlooked.
cloudsecurityalliance.org
Compliance is Falling Behind with Non-Human Identities | CSA