Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31239 bookmarks
Custom sorting
Phishing platform 'Lucid' behind wave of iOS, Android SMS attacks
Phishing platform 'Lucid' behind wave of iOS, Android SMS attacks
A phishing-as-a-service (PhaaS) platform named 'Lucid' has been targeting 169 entities in 88 countries using well-crafted messages sent on iMessage (iOS) and RCS (Android).
·bleepingcomputer.com·
Phishing platform 'Lucid' behind wave of iOS, Android SMS attacks
Analyzing open-source bootloaders: Finding vulnerabilities faster with AI
Analyzing open-source bootloaders: Finding vulnerabilities faster with AI
Using Microsoft Security Copilot to expedite the discovery process, Microsoft has uncovered several vulnerabilities in multiple open-source bootloaders impacting all operating systems relying on Unified Extensible Firmware Interface (UEFI) Secure Boot. Through a series of prompts, we identified and refined security issues, ultimately uncovering an exploitable integer overflow vulnerability in the GRUB2, U-boot, and Barebox bootloaders.
·microsoft.com·
Analyzing open-source bootloaders: Finding vulnerabilities faster with AI
Hackers abuse WordPress MU-Plugins to hide malicious code
Hackers abuse WordPress MU-Plugins to hide malicious code
Hackers are utilizing the WordPress mu-plugins ("Must-Use Plugins") directory to stealthily run malicious code on every page while evading detection.
·bleepingcomputer.com·
Hackers abuse WordPress MU-Plugins to hide malicious code
The North Korea worker problem is bigger than you think | CyberScoop
The North Korea worker problem is bigger than you think | CyberScoop
The yearslong scheme goes much deeper than contract work, extending to roles beyond traditional IT and sometimes granting the insider threat “keys to the kingdom,” DTEX President Mohan Koo said.
·cyberscoop.com·
The North Korea worker problem is bigger than you think | CyberScoop
North Korean hackers adopt ClickFix attacks to target crypto firms
North Korean hackers adopt ClickFix attacks to target crypto firms
The notorious North Korean Lazarus hacking group has reportedly adopted 'ClickFix' tactics to deploy malware targeting job seekers in the cryptocurrency industry, particularly centralized finance (CeFi).
·bleepingcomputer.com·
North Korean hackers adopt ClickFix attacks to target crypto firms
CISA warns new malware targeting Ivanti zero-day vulnerability
CISA warns new malware targeting Ivanti zero-day vulnerability
CVE-2025-0282, a critical vulnerability that affects Ivanti’s Connect Secure, Policy Secure and ZTA Gateway products, was disclosed and patched in January.
·cybersecuritydive.com·
CISA warns new malware targeting Ivanti zero-day vulnerability
Beers with Talos: Year in Review episode
Beers with Talos: Year in Review episode
In this podcast, Joe, Hazel, Bill and Dave break down Talos' Year in Review 2024 and discuss how and why cybercriminals have been leaning so heavily on attacks that are routed in stealth in simplicity.
·blog.talosintelligence.com·
Beers with Talos: Year in Review episode
Unify Governance & Security with an Application Fabric | CSA
Unify Governance & Security with an Application Fabric | CSA
Application fabrics provide a governance layer that simplifies visibility, enabling enterprises to close gaps between identity & application management.
·cloudsecurityalliance.org·
Unify Governance & Security with an Application Fabric | CSA
IoT Security Challenges (Most Critical Risk of 2025)
IoT Security Challenges (Most Critical Risk of 2025)
Looking to learn more about IoT security challenges? Read our straightforward guide to improve your understanding of common IoT hacking threats.
·stationx.net·
IoT Security Challenges (Most Critical Risk of 2025)
Available now: 2024 Year in Review
Available now: 2024 Year in Review
Download Talos' 2024 Year in Review now, and access key insights on the top targeted vulnerabilities of the year, network-based attacks, email threats, adversary toolsets, identity attacks, multi-factor authentication (MFA) abuse, ransomware and AI-based attacks.
·blog.talosintelligence.com·
Available now: 2024 Year in Review
The Signal Chat Leak and the NSA - Schneier on Security
The Signal Chat Leak and the NSA - Schneier on Security
US National Security Advisor Mike Waltz, who started the now-infamous group chat coordinating a US attack against the Yemen-based Houthis on March 15, is seemingly now suggesting that the secure messaging service Signal has security vulnerabilities. "I didn’t see this loser in the group," Waltz told Fox News about Atlantic editor in chief Jeffrey Goldberg, whom Waltz invited to the chat. "Whether he did it deliberately or it happened in some other technical mean, is something we’re trying to figure out." Waltz’s implication that Goldberg may have hacked his way in was followed by a ...
·schneier.com·
The Signal Chat Leak and the NSA - Schneier on Security
AI Software Supply Chain Risks Require Diligence | CSA
AI Software Supply Chain Risks Require Diligence | CSA
CISOs are on the look out for novel attack vectors or future breaches of the upstream assets partners use to deliver their cloud-delivered AI services.
·cloudsecurityalliance.org·
AI Software Supply Chain Risks Require Diligence | CSA