Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31231 bookmarks
Custom sorting
Malicious VSCode extensions infect Windows with cryptominers
Malicious VSCode extensions infect Windows with cryptominers
Nine VSCode extensions on Microsoft's Visual Studio Code Marketplace pose as legitimate development tools while infecting users with the XMRig cryptominer to mine Ethereum and Monero.
·bleepingcomputer.com·
Malicious VSCode extensions infect Windows with cryptominers
Tech Accelerator: Azure security and AI adoption
Tech Accelerator: Azure security and AI adoption
Are you looking for guidance on how to effectively integrate security best practices within your Azure and AI projects? We know the pace of technological innovation offers as many opportunities as it does challenges. However, security cannot be an afterthought as you create Azure deployments and accelerate AI solutions.   That’s why we’re inviting you to attend Tech Accelerator: Azure Security and AI Adoption on April 22. Designed for developers and cloud architects, this one-day virtual event will equip you with the essential guidance and resources you need to securely plan, build, manage, and optimize your Azure deployments and AI projects.  Why should you attend?  During this event, you will learn how to leverage Microsoft security guidance, products, and tooling throughout your cloud journey - from the time you consider Azure to the point that you’re regularly managing and optimizing workloads. Discover how Microsoft protects its platform, how to identify security risks in your Azure environments, protect your infrastructure from security threats, design secure AI environments, and build and protect your AI applications.  What can you expect?  During this event, you'll have the opportunity to:  Learn from the experts: Get in-depth technical guidance from Microsoft experts to secure your Azure deployments and AI applications.  Engage with the community: Connect with fellow developers, cloud architects, and IT professionals.  Event details  Dates: April 22, 2025  Duration: 8:00-11:30 AM Pacific Time   Format: One keynote + six 25-minute sessions with technical guidance and demos  April 22, 2025:   Session  Time  Security: An essential part of your Azure and AI journey (keynote)  8:00 AM PT  Secure by design: Azure datacenter and hardware security  8:30 AM PT  Azure platform security: Embedded features and use cases  9:00 AM PT  Enhancing security for cloud migration  9:30 AM PT  How to secure your AI environment  10:00 AM PT  How to design and build secure AI projects  10:30 AM PT  Safeguard AI applications with Microsoft Defender for Cloud  11:00 AM PT    All sessions will be streamed live on the Microsoft Tech Community platform with live Q&A during the event with the speakers and subject experts. Q&A will close at 12:00 PM PT on Friday, April 25, 2025. Sessions will be available on demand immediately, so you can watch at your convenience.   Registration is not required. On each session page, you can find an Add to calendar link. Click the Attend button on the page to receive reminders. Please post questions early and often; we're here to help!  Please save the date and join us: https://aka.ms/AzureEssentialsEvent 
·techcommunity.microsoft.com·
Tech Accelerator: Azure security and AI adoption
This $16 AdGuard plan protects your whole family from malicious ads
This $16 AdGuard plan protects your whole family from malicious ads
You have until April 27 at 11:59 p.m. PT to grab lifetime access to AdGuard's privacy and ad-blocking tools for just $15.97 (reg. $169)—remember to enter code FAMPLAN at checkout for this limited-time discount.
·bleepingcomputer.com·
This $16 AdGuard plan protects your whole family from malicious ads
Windows 11 24H2 blocked on PCs with code-obfuscation driver BSODs
Windows 11 24H2 blocked on PCs with code-obfuscation driver BSODs
Microsoft has introduced a new Windows 11 24H2 safeguard hold for systems running security or enterprise software using SenseShield Technology's sprotect.sys driver.
·bleepingcomputer.com·
Windows 11 24H2 blocked on PCs with code-obfuscation driver BSODs
Year in Review: In conversation with the report's authors
Year in Review: In conversation with the report's authors
Want to know the most notable findings in Talos' Year in Review directly from our report's authors? Watch our two part video series.
·blog.talosintelligence.com·
Year in Review: In conversation with the report's authors
Is your phone listening to you? (Lock and Code S06E07)
Is your phone listening to you? (Lock and Code S06E07)
This week on the Lock and Code podcast, we speak with Lena Cohen about whether our phones are really listening to us to deliver ads.
·malwarebytes.com·
Is your phone listening to you? (Lock and Code S06E07)
CISA adds Ivanti Connect Secure vulnerability to KEV catalog
CISA adds Ivanti Connect Secure vulnerability to KEV catalog
CVE-2025-22457 is a critical stack buffer-overflow vulnerability that Ivanti had initially assessed as a low-level product bug that could not be exploited remotely.
·cybersecuritydive.com·
CISA adds Ivanti Connect Secure vulnerability to KEV catalog
News alert: SpyCloud study shows gaps in EDR, antivirus — 66% of malware infections missed
News alert: SpyCloud study shows gaps in EDR, antivirus — 66% of malware infections missed
Austin, TX, USA, April 7, 2025, CyberNewswire -- SpyCloud, the leading identity threat protection company, today released new analysis of its recaptured darknet data repository that shows threat actors are increasingly bypassing endpoint protection solutions: 66% of malware infections occur on devices with endpoint security solutions installed. SpyCloud offers integrations with leading endpoint detection and
·lastwatchdog.com·
News alert: SpyCloud study shows gaps in EDR, antivirus — 66% of malware infections missed
Les abonnés de Free visés par une arnaque Amazon contenant leur IBAN personnel
Les abonnés de Free visés par une arnaque Amazon contenant leur IBAN personnel
Un mail de phishing utilise les données exposées lors de la fuite de Free pour tromper les cibles. Les pirates usurpent cette fois l'apparence du service d'Amazon Prime pour dérober des données bancaires. Depuis près d'un mois, une campagne cible les victimes de la très médiatisée fuite de données Free. Les hackers
·numerama.com·
Les abonnés de Free visés par une arnaque Amazon contenant leur IBAN personnel
Apache Tomcat 11.0.3 - Remote Code Execution
Apache Tomcat 11.0.3 - Remote Code Execution
Apache Tomcat 11.0.3 - Remote Code Execution. CVE-2025-24813 . webapps exploit for Multiple platform
·exploit-db.com·
Apache Tomcat 11.0.3 - Remote Code Execution
Windows Remote Desktop Protocol: Remote to Rogue
Windows Remote Desktop Protocol: Remote to Rogue
A novel phishing campaign by Russia-nexus espionage actors targeting European government and military organizations.
·cloud.google.com·
Windows Remote Desktop Protocol: Remote to Rogue
Distributed SaaS Management: Balance & Security | CSA
Distributed SaaS Management: Balance & Security | CSA
Discover how to balance security and productivity in distributed SaaS management. Learn key risks and strategies for securing SaaS apps without disruption.
·cloudsecurityalliance.org·
Distributed SaaS Management: Balance & Security | CSA