Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31742 bookmarks
Custom sorting
Malicious Chrome extensions can spoof password managers in new attack
Malicious Chrome extensions can spoof password managers in new attack
A newly devised "polymorphic" attack allows malicious Chrome extensions to morph into browser extensions, including password managers, crypto wallets, and banking apps, to steal sensitive information.
·bleepingcomputer.com·
Malicious Chrome extensions can spoof password managers in new attack
Android botnet BadBox largely disrupted
Android botnet BadBox largely disrupted
Removing 24 malicious apps from the Google Play store and silencing some servers has almost halved the BadBox botnet.
·malwarebytes.com·
Android botnet BadBox largely disrupted
Choosing the Right CNAPP Vendor (Mid Size Enterprises) | CSA
Choosing the Right CNAPP Vendor (Mid Size Enterprises) | CSA
With numerous CNAPP vendors to choose from, it can be a challenge for mid-sized enterprises. Learn the six factors for finding optimal cloud-native protection.
·cloudsecurityalliance.org·
Choosing the Right CNAPP Vendor (Mid Size Enterprises) | CSA
The Best 100 Cybercrime Podcasts
The Best 100 Cybercrime Podcasts
This week in cybersecurity from the editors at Cybercrime Magazine
·cybersecurityventures.com·
The Best 100 Cybercrime Podcasts
How Can AI and Data Turn Cybersecurity Into Comedy? | CSA
How Can AI and Data Turn Cybersecurity Into Comedy? | CSA
AI-powered cybersecurity catches hackers like a comedy sketch—predictable, absurd, and always one step ahead. Learn how data and risk quantification expose threats.
·cloudsecurityalliance.org·
How Can AI and Data Turn Cybersecurity Into Comedy? | CSA
Unmasking the new persistent attacks on Japan
Unmasking the new persistent attacks on Japan
Cisco Talos has discovered an active exploitation of CVE-2024-4577 by an attacker in order to gain access to the victim's machines and carry out post-exploitation activities.
·blog.talosintelligence.com·
Unmasking the new persistent attacks on Japan
Cybersecurity Job Satisfaction Plummets, Women Hit Hardest
Cybersecurity Job Satisfaction Plummets, Women Hit Hardest
Layoffs and cutbacks have been cited as major factors in a significant drop in job satisfaction among women working in cybersecurity, according to ISC2
·infosecurity-magazine.com·
Cybersecurity Job Satisfaction Plummets, Women Hit Hardest
Outsmarting Cyber Threats with Attack Graphs
Outsmarting Cyber Threats with Attack Graphs
Attack graphs provide continuous visibility into attack paths, enabling proactive threat detection and risk mitigation.
·thehackernews.com·
Outsmarting Cyber Threats with Attack Graphs
Open-source tool 'Rayhunter' helps users detect Stingray attacks
Open-source tool 'Rayhunter' helps users detect Stingray attacks
The Electronic Frontier Foundation (EFF) has released a free, open-source tool named Rayhunter that is designed to detect cell-site simulators (CSS), also known as IMSI catchers or Stingrays.
·bleepingcomputer.com·
Open-source tool 'Rayhunter' helps users detect Stingray attacks
Cybercriminals picked up the pace on attacks last year | CyberScoop
Cybercriminals picked up the pace on attacks last year | CyberScoop
Ransomware groups last year achieved lateral movement within an average of 48 minutes after gaining initial access to targeted environments, threat intelligence experts said.
·cyberscoop.com·
Cybercriminals picked up the pace on attacks last year | CyberScoop
Silk Typhoon hackers now target IT supply chains to breach networks
Silk Typhoon hackers now target IT supply chains to breach networks
Microsoft warns that Chinese cyber-espionage threat group 'Silk Typhoon' has shifted its tactics, now targeting remote management tools and cloud services in supply chain attacks that give them access to downstream customers.
·bleepingcomputer.com·
Silk Typhoon hackers now target IT supply chains to breach networks