Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31281 bookmarks
Custom sorting
Rethinking Data Risk in the AI Era: A Unified Approach | CSA
Rethinking Data Risk in the AI Era: A Unified Approach | CSA
The explosive growth of data, the rapid adoption of AI, & an evolving threat landscape have outpaced traditional security. Legacy solutions are not enough.
·cloudsecurityalliance.org·
Rethinking Data Risk in the AI Era: A Unified Approach | CSA
The 7 technology trends that could replace passwords
The 7 technology trends that could replace passwords
230M stolen passwords met complexity requirements—and were still compromised. Passwords aren't going away for now, but there are new technologies that may increasingly replace them. Learn more from Specops Software about how to protect your passwords.
·bleepingcomputer.com·
The 7 technology trends that could replace passwords
RedCurl cyberspies create ransomware to encrypt Hyper-V servers
RedCurl cyberspies create ransomware to encrypt Hyper-V servers
A threat actor named 'RedCurl,' known for stealthy corporate espionage operations since 2018, is now using a ransomware encryptor designed to target Hyper-V virtual machines.
·bleepingcomputer.com·
RedCurl cyberspies create ransomware to encrypt Hyper-V servers
EncryptHub Exploits Windows Zero-Day to Deploy Rhadamanthys and StealC Malware
EncryptHub Exploits Windows Zero-Day to Deploy Rhadamanthys and StealC Malware
EncryptHub Exploits Windows Zero-Day to Deploy Rhadamanthys and StealC Malware | Read more hacking news on The Hacker News cybersecurity news website and learn how to protect against cyberattacks and software vulnerabilities.
·thehackernews.com·
EncryptHub Exploits Windows Zero-Day to Deploy Rhadamanthys and StealC Malware
How Does Continuous Controls Monitoring Improve GRC? | CSA
How Does Continuous Controls Monitoring Improve GRC? | CSA
Continuous Controls Monitoring (CCM) automates compliance oversight, reducing manual effort, improving accuracy, and enhancing security posture for organizations.
·cloudsecurityalliance.org·
How Does Continuous Controls Monitoring Improve GRC? | CSA
New npm attack poisons local packages with backdoors
New npm attack poisons local packages with backdoors
Two malicious packages were discovered on npm (Node package manager) that covertly patch legitimate, locally installed packages to inject a persistent reverse shell backdoor.
·bleepingcomputer.com·
New npm attack poisons local packages with backdoors
Microsoft: Recent Windows updates cause Remote Desktop issues
Microsoft: Recent Windows updates cause Remote Desktop issues
Microsoft says that some customers might experience Remote Desktop and RDS connection issues after installing recent Windows updates released since January 2025.
·bleepingcomputer.com·
Microsoft: Recent Windows updates cause Remote Desktop issues
ETSI Publishes New Quantum-Safe Encryption Standards
ETSI Publishes New Quantum-Safe Encryption Standards
Standards body ETSI has defined a scheme for key encapsulation mechanisms with access control (KEMAC), enabling quantum-secure encryption
·infosecurity-magazine.com·
ETSI Publishes New Quantum-Safe Encryption Standards
AI Data Poisoning - Schneier on Security
AI Data Poisoning - Schneier on Security
Cloudflare has a new feature—available to free users as well—that uses AI to generate random pages to feed to AI web crawlers: Instead of simply blocking bots, Cloudflare’s new system lures them into a “maze” of realistic-looking but irrelevant pages, wasting the crawler’s computing resources. The approach is a notable shift from the standard block-and-defend strategy used by most website protection services. Cloudflare says blocking bots sometimes backfires because it alerts the crawler’s operators that they’ve been detected. “When we detect unauthorized crawling, rather than blocking the request, we will link to a series of AI-generated pages that are convincing enough to entice a crawler to traverse them,” writes Cloudflare. “But while real looking, this content is not actually the content of the site we are protecting, so the crawler wastes time and resources.”...
·schneier.com·
AI Data Poisoning - Schneier on Security
Building a Robust Data Security Maturity Model | CSA
Building a Robust Data Security Maturity Model | CSA
Security maturity measures an organization's ability to manage risks. This guide explains data security maturity and provides assessment best practices.
·cloudsecurityalliance.org·
Building a Robust Data Security Maturity Model | CSA
ENISA Probes Space Threat Landscape in New Report
ENISA Probes Space Threat Landscape in New Report
EU security agency ENISA has released a new report outlining the threats and potential mitigations for the space sector
·infosecurity-magazine.com·
ENISA Probes Space Threat Landscape in New Report
GUEST ESSAY: The case for making real-time business continuity a frontline cybersecurity priority
GUEST ESSAY: The case for making real-time business continuity a frontline cybersecurity priority
It starts with a ripple of confusion, then panic. Hospital systems freeze mid-procedure. Electronic medical records become inaccessible. Related: Valuable intel on healthcare system cyber exposures In the ICU, alarms blare as doctors and nurses scramble to stabilize critical patients without access to real-time data. Admissions come to a standstill. Emergency rooms overflow with patients
·lastwatchdog.com·
GUEST ESSAY: The case for making real-time business continuity a frontline cybersecurity priority
Google fixes Chrome zero-day exploited in espionage campaign
Google fixes Chrome zero-day exploited in espionage campaign
​Google has fixed a high-severity Chrome zero-day vulnerability exploited to escape the browser's sandbox and deploy malware in espionage attacks targeting Russian organizations.
·bleepingcomputer.com·
Google fixes Chrome zero-day exploited in espionage campaign