Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31479 bookmarks
Custom sorting
Friday Squid Blogging: Catching Humboldt Squid - Schneier on Security
Friday Squid Blogging: Catching Humboldt Squid - Schneier on Security
First-person account of someone accidentally catching several Humboldt squid on a fishing line. No photos, though. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Blog moderation policy.
·schneier.com·
Friday Squid Blogging: Catching Humboldt Squid - Schneier on Security
Scammer steals $1.5 million from Baltimore by spoofing city vendor
Scammer steals $1.5 million from Baltimore by spoofing city vendor
In a post mortem of the incident, Baltimore Inspector General Isabel Mercedes Cumming said the city’s accounts payable department had failed to implement corrective measures after previous incidents of fraud and did not have proper protections in place to verify supplier details.
·therecord.media·
Scammer steals $1.5 million from Baltimore by spoofing city vendor
Windows 11 KB5064081 update clears up CPU usage metrics in Task Manager
Windows 11 KB5064081 update clears up CPU usage metrics in Task Manager
Microsoft has released the KB5064081 preview cumulative update for Windows 11 24H2, which includes thirty-six new features or changes, with many gradually rolling out. These updates include new Recall features and a new way of displaying CPU usage in Task Manager.
·bleepingcomputer.com·
Windows 11 KB5064081 update clears up CPU usage metrics in Task Manager
Microsoft fixes bug behind Windows certificate enrollment errors
Microsoft fixes bug behind Windows certificate enrollment errors
Microsoft has resolved a known issue causing false CertificateServicesClient (CertEnroll) error messages after installing the July 2025 preview and subsequent Windows 11 24H2 updates.
·bleepingcomputer.com·
Microsoft fixes bug behind Windows certificate enrollment errors
WhatsApp patches vulnerability exploited in zero-day attacks
WhatsApp patches vulnerability exploited in zero-day attacks
WhatsApp has patched a security vulnerability in its iOS and macOS messaging clients that was exploited in targeted zero-day attacks.
·bleepingcomputer.com·
WhatsApp patches vulnerability exploited in zero-day attacks
GAO-25-107283 Analysis: Defense Supply Chain Risks Are Escalating - interos.ai
GAO-25-107283 Analysis: Defense Supply Chain Risks Are Escalating - interos.ai
The defense supply chain is stronger with continuous, real-time monitoring. GAO‑25‑107283, a report recently released by the U.S. Government Accountability Office (GAO), highlights critical supply chain vulnerabilities across the Department of Defense’s 200,000+ supplier ecosystem. Areas for improvement include limited traceability of foreign-origin materials, visibility into lower-tier vendors, and streamlined contractual reporting. The dangers aren’t....
·interos.ai·
GAO-25-107283 Analysis: Defense Supply Chain Risks Are Escalating - interos.ai
Microsoft to enforce MFA for Azure resource management in October
Microsoft to enforce MFA for Azure resource management in October
Starting in October, Microsoft will enforce multi-factor authentication (MFA) for all Azure resource management actions to protect Azure clients from unauthorized access attempts.
·bleepingcomputer.com·
Microsoft to enforce MFA for Azure resource management in October
Microsoft says recent Windows update didn't kill your SSD
Microsoft says recent Windows update didn't kill your SSD
Microsoft has found no link between the August 2025 KB5063878 security update and customer reports of failure and data corruption issues affecting solid-state drives (SSDs) and hard disk drives (HDDs).
·bleepingcomputer.com·
Microsoft says recent Windows update didn't kill your SSD
Experts warn of actively exploited FreePBX zero-day
Experts warn of actively exploited FreePBX zero-day
Sangoma warns of an actively exploited FreePBX zero-day affecting systems with publicly exposed admin control panels.
·securityaffairs.com·
Experts warn of actively exploited FreePBX zero-day
Extorsion automatisée, chantage ciblé… quand Claude Code pilote une immense opération de « vibe hacking »
Extorsion automatisée, chantage ciblé… quand Claude Code pilote une immense opération de « vibe hacking »
La société américaine Anthropic dévoile une campagne de vols de données orchestrée à l’aide de son modèle de génération de code Claude Code. En un mois, l'opération aurait mis en danger 17 organisations. Le mode opératoire repose sur ce qu’Anthropic désigne comme du vibe hacking. Vibe coding. Voilà le terme tendance
·numerama.com·
Extorsion automatisée, chantage ciblé… quand Claude Code pilote une immense opération de « vibe hacking »
Achieving Resilience through Zero Trust | CSA
Achieving Resilience through Zero Trust | CSA
Zero Trust’s foundational concept of “always verify” is essential to building resilience. Reduce the blast radius to reduce the impact of incidents.
·cloudsecurityalliance.org·
Achieving Resilience through Zero Trust | CSA
Ransomware gang takedowns causing explosion of new, smaller groups
Ransomware gang takedowns causing explosion of new, smaller groups
The ransomware ecosystem continues to splinter, with new gangs proliferating in the wake of law enforcement takedowns that have scattered affiliates and prompted criminal rebrands.
·therecord.media·
Ransomware gang takedowns causing explosion of new, smaller groups
Cybercrime Moves Beyond Financial Gains
Cybercrime Moves Beyond Financial Gains
This week in cybersecurity from the editors at Cybercrime Magazine
·cybersecurityventures.com·
Cybercrime Moves Beyond Financial Gains
Npm Package Hijacked to Steal Data and Crypto via AI-Powered Malware
Npm Package Hijacked to Steal Data and Crypto via AI-Powered Malware
A software supply chain attack targeting Nx marks the first known case where attackers have leveraged developer AI assistants, according to StepSecurity
·infosecurity-magazine.com·
Npm Package Hijacked to Steal Data and Crypto via AI-Powered Malware
Baggage Tag Scam - Schneier on Security
Baggage Tag Scam - Schneier on Security
I just heard about this: There’s a travel scam warning going around the internet right now: You should keep your baggage tags on your bags until you get home, then shred them, because scammers are using luggage tags to file fraudulent claims for missing baggage with the airline. First, the scam is possible. I had a bag destroyed by baggage handlers on a recent flight, and all the information I needed to file a claim was on my luggage tag. I have no idea if I will successfully get any money from the airline, or what form it will be in, or how it will be tied to my name, but at least the first step is possible...
·schneier.com·
Baggage Tag Scam - Schneier on Security
State-Sponsored Hackers Behind Majority of Vulnerability Exploits
State-Sponsored Hackers Behind Majority of Vulnerability Exploits
Recorded Future highlighted the vast capabilities of state actors to rapidly weaponize newly disclosed vulnerabilities for geopolitical purposes
·infosecurity-magazine.com·
State-Sponsored Hackers Behind Majority of Vulnerability Exploits
Understanding HIPAA: Key Regulations and Compliance | CSA
Understanding HIPAA: Key Regulations and Compliance | CSA
HIPAA ensures the confidential handling of protected health information and mandates stringent guidelines for the privacy and security of patient data.
·cloudsecurityalliance.org·
Understanding HIPAA: Key Regulations and Compliance | CSA