Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

30599 bookmarks
Custom sorting
Widespread Microsoft Entra lockouts tied to new security feature rollout
Widespread Microsoft Entra lockouts tied to new security feature rollout
Windows administrators from numerous organizations report widespread account lockouts triggered by false positives in the rollout of a new Microsoft Entra ID's "leaked credentials" detection app called MACE.
·bleepingcomputer.com·
Widespread Microsoft Entra lockouts tied to new security feature rollout
Critical Erlang/OTP SSH RCE bug now has public exploits, patch now
Critical Erlang/OTP SSH RCE bug now has public exploits, patch now
Public exploits are now available for a critical Erlang/OTP SSH vulnerability tracked as CVE-2025-32433, allowing unauthenticated attackers to remotely execute code on impacted devices.
·bleepingcomputer.com·
Critical Erlang/OTP SSH RCE bug now has public exploits, patch now
New Android malware steals your credit cards for NFC relay attacks
New Android malware steals your credit cards for NFC relay attacks
A new malware-as-a-service (MaaS) platform named 'SuperCard X' has emerged, targeting Android devices via NFC relay attacks that enable point-of-sale and ATM transactions using compromised payment card data.
·bleepingcomputer.com·
New Android malware steals your credit cards for NFC relay attacks
FoxCMS 1.2.5 - Remote Code Execution (RCE)
FoxCMS 1.2.5 - Remote Code Execution (RCE)
FoxCMS 1.2.5 - Remote Code Execution (RCE). CVE-2025-29306 . webapps exploit for Multiple platform
·exploit-db.com·
FoxCMS 1.2.5 - Remote Code Execution (RCE)
Drupal 11.x-dev - Full Path Disclosure
Drupal 11.x-dev - Full Path Disclosure
Drupal 11.x-dev - Full Path Disclosure. CVE-2024-45440 . webapps exploit for PHP platform
·exploit-db.com·
Drupal 11.x-dev - Full Path Disclosure
Friday Squid Blogging: Live Colossal Squid Filmed - Schneier on Security
Friday Squid Blogging: Live Colossal Squid Filmed - Schneier on Security
A live colossal squid was filmed for the first time in the ocean. It’s only a juvenile: a foot long. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
·schneier.com·
Friday Squid Blogging: Live Colossal Squid Filmed - Schneier on Security
OpenAI details ChatGPT-o3, o4-mini, o4-mini-high usage limits
OpenAI details ChatGPT-o3, o4-mini, o4-mini-high usage limits
OpenAI has launched three new reasoning models - o3, o4-mini, and o4-mini-high for Plus and Pro subscribers, but as it turns out, these models do not offer 'unlimited' usage.
·bleepingcomputer.com·
OpenAI details ChatGPT-o3, o4-mini, o4-mini-high usage limits
ASUS warns of critical auth bypass flaw in routers using AiCloud
ASUS warns of critical auth bypass flaw in routers using AiCloud
ASUS is warning about an authentication bypass vulnerability in routers with AiCloud enabled that could allow remote attackers to perform unauthorized execution of functions on the device.
·bleepingcomputer.com·
ASUS warns of critical auth bypass flaw in routers using AiCloud
SonicWall SMA VPN devices targeted in attacks since January
SonicWall SMA VPN devices targeted in attacks since January
A remote code execution vulnerability affecting SonicWall Secure Mobile Access (SMA) appliances has been under active exploitation since at least January 2025, according to cybersecurity company Arctic Wolf.
·bleepingcomputer.com·
SonicWall SMA VPN devices targeted in attacks since January
7 Steps to Take After a Credential-Based Attack
7 Steps to Take After a Credential-Based Attack
Hackers don't break in—they log in. Credential-based attacks now fuel nearly half of all breaches. Learn how to scan your Active Directory for compromised passwords and stop attackers before they strike.
·bleepingcomputer.com·
7 Steps to Take After a Credential-Based Attack
Data Security Evolution: From DLP to DSPM | CSA
Data Security Evolution: From DLP to DSPM | CSA
Explore how Data Security Posture Management (DSPM) enhances traditional DLP by offering real-time visibility, risk assessment, and automated protection.
·cloudsecurityalliance.org·
Data Security Evolution: From DLP to DSPM | CSA
7 Steps to Take After a Credential-Based cyberattack
7 Steps to Take After a Credential-Based cyberattack
Hackers don't break in—they log in. Credential-based attacks now fuel nearly half of all breaches. Learn how to scan your Active Directory for compromised passwords and stop attackers before they strike.
·bleepingcomputer.com·
7 Steps to Take After a Credential-Based cyberattack
Chinese hackers target Russian govt with upgraded RAT malware
Chinese hackers target Russian govt with upgraded RAT malware
Chinese-speaking IronHusky hackers are targeting Russian and Mongolian government organizations using upgraded MysterySnail remote access trojan (RAT) malware.
·bleepingcomputer.com·
Chinese hackers target Russian govt with upgraded RAT malware