Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31115 bookmarks
Custom sorting
Subverting AIOps Systems Through Poisoned Input Data - Schneier on Security
Subverting AIOps Systems Through Poisoned Input Data - Schneier on Security
In this input integrity attack against an AI system, researchers were able to fool AIOps tools: AIOps refers to the use of LLM-based agents to gather and analyze application telemetry, including system logs, performance metrics, traces, and alerts, to detect problems and then suggest or carry out corrective actions. The likes of Cisco have deployed AIops in a conversational interface that admins can use to prompt for information about system performance. Some AIOps tools can respond to such queries by automatically implementing fixes, or suggesting scripts that can address issues...
·schneier.com·
Subverting AIOps Systems Through Poisoned Input Data - Schneier on Security
Executives Warned About Celebrity Podcast Scams
Executives Warned About Celebrity Podcast Scams
The Better Business Bureau is urging business owners and influencers not to fall for a new type of podcast scam
·infosecurity-magazine.com·
Executives Warned About Celebrity Podcast Scams
BLACK HAT FIRESIDE CHAT: Straiker extends ‘red teaming’ to the AI layer as AI attacks surge
BLACK HAT FIRESIDE CHAT: Straiker extends ‘red teaming’ to the AI layer as AI attacks surge
The enterprise software model that defined the past two decades — SaaS — is being rapidly eclipsed by a new center of gravity: AI-native systems. These are autonomous agents wired directly into company data, tools, and workflows. Related: LLMs fuel automated attacks According to Straiker CEO Ankur Shah, this shift is happening faster than cloud
·lastwatchdog.com·
BLACK HAT FIRESIDE CHAT: Straiker extends ‘red teaming’ to the AI layer as AI attacks surge
Comment ces cyberespions nord-coréens ont infiltré les ambassades étrangères basées à Séoul
Comment ces cyberespions nord-coréens ont infiltré les ambassades étrangères basées à Séoul
Dans un rapport publié le 18 août 2025, les chercheurs de la société de cybersécurité Trellix décortiquent les dessous d'une campagne de cyberespionnage qui dure depuis des mois. En protagoniste principal, on retrouve Kimsuky, un groupe de hackers nords-coréens lié au pouvoir de Pyongyang. Leurs cibles ? Les
·numerama.com·
Comment ces cyberespions nord-coréens ont infiltré les ambassades étrangères basées à Séoul
Google fixed Chrome flaw found by Big Sleep AI
Google fixed Chrome flaw found by Big Sleep AI
Google Chrome 139 addressed a high-severity V8 vulnerability, tracked as CVE-2025-9132, found by Big Sleep AI
·securityaffairs.com·
Google fixed Chrome flaw found by Big Sleep AI
A hacker tied to Yemen Cyber Army gets 20 months in prison
A hacker tied to Yemen Cyber Army gets 20 months in prison
UK hacker Al-Tahery Al-Mashriky, tied to Yemen Cyber Army, gets 20 months in prison for website defacements and stolen data possession.
·securityaffairs.com·
A hacker tied to Yemen Cyber Army gets 20 months in prison
Microsoft releases emergency updates to fix Windows recovery
Microsoft releases emergency updates to fix Windows recovery
Microsoft has released emergency Windows out-of-band updates to resolve a known issue breaking reset and recovery operations after installing the August 2025 Windows security updates.
·bleepingcomputer.com·
Microsoft releases emergency updates to fix Windows recovery
Hackers target Workday in social engineering attack
Hackers target Workday in social engineering attack
Researchers cite increasing evidence of collaboration between Scattered Spider and the cybercrime group ShinyHunters in the campaign.
·cybersecuritydive.com·
Hackers target Workday in social engineering attack
Oregon Man Charged in ‘Rapper Bot’ DDoS Service
Oregon Man Charged in ‘Rapper Bot’ DDoS Service
A 22-year-old Oregon man has been arrested on suspicion of operating "Rapper Bot," a massive botnet used to power a service for launching distributed denial-of-service (DDoS) attacks against targets -- including a March 2025 DDoS that knocked Twitter/X offline. The…
·krebsonsecurity.com·
Oregon Man Charged in ‘Rapper Bot’ DDoS Service
Okta open-sources catalog of Auth0 rules for threat detection
Okta open-sources catalog of Auth0 rules for threat detection
Okta has open-sourced ready-made Sigma-based queries for Auth0 customers to detect account takeovers, misconfigurations, and suspicious behavior in event logs.
·bleepingcomputer.com·
Okta open-sources catalog of Auth0 rules for threat detection
Elastic rejects claims of a zero-day RCE flaw in Defend EDR
Elastic rejects claims of a zero-day RCE flaw in Defend EDR
Enterprise search and security company Elastic is rejecting reports of a zero-day vulnerability impacting its Defend endpoint detection and response (EDR) product.
·bleepingcomputer.com·
Elastic rejects claims of a zero-day RCE flaw in Defend EDR
L’IA de WhatsApp a-t-elle « accès à toutes vos discussions » ? Des messages alarmistes mélangent tout
L’IA de WhatsApp a-t-elle « accès à toutes vos discussions » ? Des messages alarmistes mélangent tout
Depuis plusieurs semaines, de nombreux messages circulent sur des groupes WhatsApp et sont transférés dans les discussions privées des utilisateurs, propageant une rumeur infondée. Selon ceux-ci, l’IA de Meta, intégrée à la messagerie en mars 2025, pourrait accéder au contenu des discussions privées ainsi qu'à de
·numerama.com·
L’IA de WhatsApp a-t-elle « accès à toutes vos discussions » ? Des messages alarmistes mélangent tout
Execs use responsible AI to drive growth, prevent risks
Execs use responsible AI to drive growth, prevent risks
Business leaders want to prevent further fallout as nearly all have experienced at least one problematic incident tied to AI, according to an Infosys survey.
·cybersecuritydive.com·
Execs use responsible AI to drive growth, prevent risks