Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31201 bookmarks
Custom sorting
Exploitation of CLFS zero-day leads to ransomware activity
Exploitation of CLFS zero-day leads to ransomware activity
Microsoft Threat Intelligence Center (MSTIC) and Microsoft Security Response Center (MSRC) have discovered post-compromise exploitation of a newly discovered zero-day vulnerability in the Windows Common Log File System (CLFS) against a small number of targets. Microsoft released security updates to address the vulnerability, tracked as CVE 2025-29824, on April 8, 2025.
·microsoft.com·
Exploitation of CLFS zero-day leads to ransomware activity
Microsoft: Windows CLFS zero-day exploited by ransomware gang
Microsoft: Windows CLFS zero-day exploited by ransomware gang
Microsoft says the RansomEXX ransomware gang has been exploiting a high-severity zero-day flaw in the Windows Common Log File System to gain SYSTEM privileges on victims' systems.
·bleepingcomputer.com·
Microsoft: Windows CLFS zero-day exploited by ransomware gang
Windows 11 KB5055523 & KB5055528 cumulative updates released
Windows 11 KB5055523 & KB5055528 cumulative updates released
Microsoft has released Windows 11 KB5055523 and KB5055528 cumulative updates for versions 24H2 and 23H2 to fix security vulnerabilities and issues.
·bleepingcomputer.com·
Windows 11 KB5055523 & KB5055528 cumulative updates released
WhatsApp flaw can let attackers run malicious code on Windows PCs
WhatsApp flaw can let attackers run malicious code on Windows PCs
Meta warned Windows users to update the WhatsApp messaging app to the latest version to patch a vulnerability that can let attackers execute malicious code on their devices.
·bleepingcomputer.com·
WhatsApp flaw can let attackers run malicious code on Windows PCs
New Mirai botnet behind surge in TVT DVR exploitation
New Mirai botnet behind surge in TVT DVR exploitation
A significant spike in exploitation attempts targeting TVT NVMS9000 DVRs has been detected, peaking on April 3, 2025, with over 2,500 unique IPs scanning for vulnerable devices.
·bleepingcomputer.com·
New Mirai botnet behind surge in TVT DVR exploitation
Google AI taken for a ride by April Fools’ Day joke
Google AI taken for a ride by April Fools’ Day joke
Cwmbran in Wales holds the Guinness World Record for the most roundabouts—at least according to Google AI Overviews. Except that's not actually true...
·malwarebytes.com·
Google AI taken for a ride by April Fools’ Day joke
Ce faux site pour le concert de Jul ose dire aux fans de se méfier des arnaques en ligne
Ce faux site pour le concert de Jul ose dire aux fans de se méfier des arnaques en ligne
Des plateformes de phishing tentent de piéger les fans après l'annonce d'une nouvelle date de concert du rapeur Jul. Ces sites, habilement conçus, imitent à la perfection les vrais portails de billetterie — au point d’alerter les internautes… des arnaques en cours. Les hackers ne ratent jamais un événement. À peine
·numerama.com·
Ce faux site pour le concert de Jul ose dire aux fans de se méfier des arnaques en ligne
AWS rolls out ML-KEM to secure TLS from quantum threats
AWS rolls out ML-KEM to secure TLS from quantum threats
Amazon Web Services (AWS) has added support for the ML-KEM post-quantum key encapsulation mechanism to AWS Key Management Service (KMS), AWS Certificate Manager (ACM), and AWS Secrets Manager, making TLS connections more secure.
·bleepingcomputer.com·
AWS rolls out ML-KEM to secure TLS from quantum threats
Simple Magic: App Cloaking | CSA
Simple Magic: App Cloaking | CSA
​Learn how app cloaking enhances security by hiding private applications from the internet, reducing attack surfaces, and preventing unauthorized access.
·cloudsecurityalliance.org·
Simple Magic: App Cloaking | CSA
Year in Review: Key vulnerabilities, tools, and shifts in attacker email tactics
Year in Review: Key vulnerabilities, tools, and shifts in attacker email tactics
From Talos' 2024 Year in Review, here are some findings from the top targeted network device vulnerabilities. We also explore how threat actors are moving away from time sensitive lures in their emails. And finally we reveal the tools that adversaries most heavily utilized last year.
·blog.talosintelligence.com·
Year in Review: Key vulnerabilities, tools, and shifts in attacker email tactics