Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29865 bookmarks
Custom sorting
New Mobile Phone Forensics Tool - Schneier on Security
New Mobile Phone Forensics Tool - Schneier on Security
The Chinese have a new tool called Massistant. Massistant is the presumed successor to Chinese forensics tool, “MFSocket”, reported in 2019 and attributed to publicly traded cybersecurity company, Meiya Pico. The forensics tool works in tandem with a corresponding desktop software. Massistant gains access to device GPS location data, SMS messages, images, audio, contacts and phone services. Meiya Pico maintains partnerships with domestic and international law enforcement partners, both as a surveillance hardware and software provider, as well as through training programs for law enforcement personnel...
·schneier.com·
New Mobile Phone Forensics Tool - Schneier on Security
New “LameHug” Malware Deploys AI-Generated Commands
New “LameHug” Malware Deploys AI-Generated Commands
Ukraine’s CERT-UA has identified a new AI-powered malware, dubbed “LameHug,” which executes commands on compromised Windows systems in cyber-attacks, targeting the nation’s security and defense sector
·infosecurity-magazine.com·
New “LameHug” Malware Deploys AI-Generated Commands
OpenAI: GPT-5 is coming, "we'll see" if it creates a shockwave
OpenAI: GPT-5 is coming, "we'll see" if it creates a shockwave
OpenAI's next foundational and state-of-the-art model, GPT-5, is still on its way after a delay. OpenAI won't tell us the release date for now.
·bleepingcomputer.com·
OpenAI: GPT-5 is coming, "we'll see" if it creates a shockwave
5 Features Every AI-Powered SOC Platform Needs in 2025
5 Features Every AI-Powered SOC Platform Needs in 2025
A modern AI-based SOC platform must adapt in real time to handle alert overloads and fast-moving threats, surpassing traditional SIEM tools.
·securityaffairs.com·
5 Features Every AI-Powered SOC Platform Needs in 2025
« Payer ou consentir » : Meta bloque l’accès à Instagram et Facebook si vous ne faites pas ce choix
« Payer ou consentir » : Meta bloque l’accès à Instagram et Facebook si vous ne faites pas ce choix
Sur Instagram ou Facebook, Meta force désormais ses utilisateurs à faire un choix clair : payer pour naviguer sans publicité ou bien accepter le traitement de vos données personnelles pour continuer à utiliser les réseaux sociaux gratuitement. Depuis quelques jours, vous avez peut-être eu la surprise de voir une
·numerama.com·
« Payer ou consentir » : Meta bloque l’accès à Instagram et Facebook si vous ne faites pas ce choix
Poor Passwords Tattle on AI Hiring Bot Maker Paradox.ai
Poor Passwords Tattle on AI Hiring Bot Maker Paradox.ai
Security researchers recently revealed that the personal information of millions of people who applied for jobs at McDonald's was exposed after they guessed the password ("123456") for the fast food chain's account at Paradox.ai, a company that makes artificial intelligence…
·krebsonsecurity.com·
Poor Passwords Tattle on AI Hiring Bot Maker Paradox.ai
News Alert: SquareX, Fortune 500 CISOs to debut bowser security guide at Black Hat USA 2025
News Alert: SquareX, Fortune 500 CISOs to debut bowser security guide at Black Hat USA 2025
Palo Alto, Calif., July 17, 2025, CyberNewswire — SquareX announced the official launch of The Browser Security Field Manual at Black Hat USA 2025. In addition to a comprehensive practical guide to the latest TTPs attackers are using to target employees in the browser, this comprehensive manual features industry perspectives from leading CISOs from multiple
·lastwatchdog.com·
News Alert: SquareX, Fortune 500 CISOs to debut bowser security guide at Black Hat USA 2025
Citrix Bleed 2 exploited weeks before PoCs as Citrix denied attacks
Citrix Bleed 2 exploited weeks before PoCs as Citrix denied attacks
A critical Citrix NetScaler vulnerability, tracked as CVE-2025-5777 and dubbed "CitrixBleed 2," was actively exploited nearly two weeks before proof-of-concept (PoC) exploits were made public, despite Citrix stating that there was no evidence of attacks.
·bleepingcomputer.com·
Citrix Bleed 2 exploited weeks before PoCs as Citrix denied attacks
Microsoft Teams voice calls abused to push Matanbuchus malware
Microsoft Teams voice calls abused to push Matanbuchus malware
The Matanbuchus malware loader has been seen being distributed through social engineering over Microsoft Teams calls impersonating IT helpdesk.
·bleepingcomputer.com·
Microsoft Teams voice calls abused to push Matanbuchus malware
VMware fixes four ESXi zero-day bugs exploited at Pwn2Own Berlin
VMware fixes four ESXi zero-day bugs exploited at Pwn2Own Berlin
VMware fixed four vulnerabilities in VMware ESXi, Workstation, Fusion, and Tools that were exploited as zero-days during the Pwn2Own Berlin 2025 hacking contest in May 2025.
·bleepingcomputer.com·
VMware fixes four ESXi zero-day bugs exploited at Pwn2Own Berlin
United Natural Foods loses up to $400M in sales after cyberattack | CyberScoop
United Natural Foods loses up to $400M in sales after cyberattack | CyberScoop
The food distributor and wholesaler completely shut down its systems upon discovering the attack last month, yet core systems were restored and normal operating capacity returned within three weeks.
·cyberscoop.com·
United Natural Foods loses up to $400M in sales after cyberattack | CyberScoop
Google sues to disrupt BadBox 2.0 botnet infecting 10 million devices
Google sues to disrupt BadBox 2.0 botnet infecting 10 million devices
Google has filed a lawsuit against the anonymous operators of the Android BadBox 2.0 malware botnet, accusing them of running a global ad fraud scheme against the company's advertising platforms.
·bleepingcomputer.com·
Google sues to disrupt BadBox 2.0 botnet infecting 10 million devices
This is your sign to step away from the keyboard
This is your sign to step away from the keyboard
This week, Martin shows how stepping away from the screen can make you a stronger defender, alongside an inside scoop on emerging malware threats.
·blog.talosintelligence.com·
This is your sign to step away from the keyboard
Russian vodka producer reports disruptions after ransomware attack
Russian vodka producer reports disruptions after ransomware attack
Novabev Group, the Russian maker of Beluga Vodka and other brands, had to stop shipments and temporarily close stores in its WineLab subsidiary after a ransomware attack.
·therecord.media·
Russian vodka producer reports disruptions after ransomware attack
Hacker steals $27 million in BigONE exchange crypto breach
Hacker steals $27 million in BigONE exchange crypto breach
Cryptocurrency exchange BigONE announced that it suffered a security breach, in which hackers stole various digital assets valued at $27 million.
·bleepingcomputer.com·
Hacker steals $27 million in BigONE exchange crypto breach
Chinese hackers breached National Guard to steal network configurations
Chinese hackers breached National Guard to steal network configurations
The Chinese state-sponsored hacking group known as Salt Typhoon breached and remained undetected in a U.S. Army National Guard network for nine months in 2024, stealing network configuration files and administrator credentials that could be used to compromise other government networks.
·bleepingcomputer.com·
Chinese hackers breached National Guard to steal network configurations