Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

30989 bookmarks
Custom sorting
Understanding Zero Trust Security Models | CSA
Understanding Zero Trust Security Models | CSA
As cyber threats get smarter, companies are using Zero Trust Security Models to keep their data safe. This way of thinking means "never trust, always verify."
·cloudsecurityalliance.org·
Understanding Zero Trust Security Models | CSA
Linux 'io_uring' security blindspot allows stealthy rootkit attacks
Linux 'io_uring' security blindspot allows stealthy rootkit attacks
A significant security gap in Linux runtime security caused by the 'io_uring' interface allows rootkits to operate undetected on systems while bypassing advanced Enterprise security software.
·bleepingcomputer.com·
Linux 'io_uring' security blindspot allows stealthy rootkit attacks
Ransomware Attacks Fall Sharply in March
Ransomware Attacks Fall Sharply in March
NCC Group found that ransomware attacks fell by 32% in March compared to February, but described this finding as a “red herring”
·infosecurity-magazine.com·
Ransomware Attacks Fall Sharply in March
Operation SyncHole: Lazarus APT goes back to the well
Operation SyncHole: Lazarus APT goes back to the well
Kaspersky GReAT experts uncovered a new campaign by Lazarus APT that exploits vulnerabilities in South Korean software products and uses a watering hole approach.
·securelist.com·
Operation SyncHole: Lazarus APT goes back to the well
forum.defcon.org
forum.defcon.org
A community for Hackers, Researchers, DEF CON Groups, and anyone looking to explore the world of security.
·forum.defcon.org·
forum.defcon.org
Attackers hit security device defects hard in 2024 | CyberScoop
Attackers hit security device defects hard in 2024 | CyberScoop
Mandiant said exploits were the most common initial access vector last year, linking software defects to 1 in 3 attacks. The most commonly exploited vulnerabilities affected network edge devices.
·cyberscoop.com·
Attackers hit security device defects hard in 2024 | CyberScoop
DOGE Worker’s Code Supports NLRB Whistleblower
DOGE Worker’s Code Supports NLRB Whistleblower
A whistleblower at the National Labor Relations Board (NLRB) alleged last week that denizens of Elon Musk's Department of Government Efficiency (DOGE) siphoned gigabytes of data from the agency's sensitive case files in early March. The whistleblower said accounts created…
·krebsonsecurity.com·
DOGE Worker’s Code Supports NLRB Whistleblower
Russian army targeted by new Android malware hidden in mapping app
Russian army targeted by new Android malware hidden in mapping app
A new Android malware has been discovered hidden inside trojanized versions of the Alpine Quest mapping app, which is reportedly used by Russian soldiers as part of war zone operational planning.
·bleepingcomputer.com·
Russian army targeted by new Android malware hidden in mapping app
Cloudflare: Government-backed internet shutdowns plummet to zero in first quarter
Cloudflare: Government-backed internet shutdowns plummet to zero in first quarter
Governments around the world have appeared to ease off from using internet shutdowns to silence protesters and control access to information, according to new data from internet infrastructure company Cloudflare.
·therecord.media·
Cloudflare: Government-backed internet shutdowns plummet to zero in first quarter
Understanding the threat landscape for Kubernetes and containerized assets
Understanding the threat landscape for Kubernetes and containerized assets
The dynamic nature of containers can make it challenging for security teams to detect runtime anomalies or pinpoint the source of a security incident, presenting an opportunity for attackers to stay undetected. Microsoft Threat Intelligence has observed threat actors taking advantage of unsecured workload identities to gain access to resources, including containerized environments. Microsoft data […]
·microsoft.com·
Understanding the threat landscape for Kubernetes and containerized assets