Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31320 bookmarks
Custom sorting
https://www.schneier.com/blog/archives/2025/03/critical-github-attack.html
https://www.schneier.com/blog/archives/2025/03/critical-github-attack.html
This is serious: A sophisticated cascading supply chain attack has compromised multiple GitHub Actions, exposing critical CI/CD secrets across tens of thousands of repositories. The attack, which originally targeted the widely used “tj-actions/changed-files” utility, is now believed to have originated from an earlier breach of the “reviewdog/action-setup@v1” GitHub Action, according to a report. […] CISA confirmed the vulnerability has been patched in version 46.0.1. Given that the utility is used by more than 23,000 GitHub repositories, the scale of potential impact has raised significant alarm throughout the developer community...
·schneier.com·
https://www.schneier.com/blog/archives/2025/03/critical-github-attack.html
https://tldrsec.com/p/tldr-sec-271
https://tldrsec.com/p/tldr-sec-271
Threat modeling (with) LLMs, tj-actions woes, reading a threat actor's Telegram C2
·tldrsec.com·
https://tldrsec.com/p/tldr-sec-271
https://securityaffairs.com/175663/security/u-s-cisa-adds-edimax-ic-7100-ip-camera-nakivo-and-sap-netweaver-as-java-flaws-to-its-known-exploited-vulnerabilities-catalog.html
https://securityaffairs.com/175663/security/u-s-cisa-adds-edimax-ic-7100-ip-camera-nakivo-and-sap-netweaver-as-java-flaws-to-its-known-exploited-vulnerabilities-catalog.html
U.S. CISA adds Edimax IC-7100 IP Camera, NAKIVO, and SAP NetWeaver AS Java flaws to its Known Exploited Vulnerabilities catalog.
·securityaffairs.com·
https://securityaffairs.com/175663/security/u-s-cisa-adds-edimax-ic-7100-ip-camera-nakivo-and-sap-netweaver-as-java-flaws-to-its-known-exploited-vulnerabilities-catalog.html
https://blog.talosintelligence.com/uat-5918-targets-critical-infra-in-taiwan/
https://blog.talosintelligence.com/uat-5918-targets-critical-infra-in-taiwan/
UAT-5918, a threat actor believed to be motivated by establishing long-term access for information theft, uses a combination of web shells and open-sourced tooling to conduct post-compromise activities to establish persistence in victim environments for information theft and credential harvesting.
·blog.talosintelligence.com·
https://blog.talosintelligence.com/uat-5918-targets-critical-infra-in-taiwan/
https://www.numerama.com/politique/1930143-signal-menace-de-quitter-la-france-si-la-loi-contre-le-narcotrafic-va-trop-loin.html
https://www.numerama.com/politique/1930143-signal-menace-de-quitter-la-france-si-la-loi-contre-le-narcotrafic-va-trop-loin.html
La présidente de la fondation Signal prévient que la loi Narcotrafic est susceptible de provoquer un retrait de son application de messagerie instantanée du marché français. En cause ? Les dispositions pouvant nuire à la sécurité des communications chiffrées. L'avertissement a pris la forme d'un tweet, publié dans
·numerama.com·
https://www.numerama.com/politique/1930143-signal-menace-de-quitter-la-france-si-la-loi-contre-le-narcotrafic-va-trop-loin.html