Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31742 bookmarks
Custom sorting
News alert: Bubba AI launches Comp AI to help 100,000 startups get SOC 2 compliant by 2032 - The Last Watchdog
News alert: Bubba AI launches Comp AI to help 100,000 startups get SOC 2 compliant by 2032 - The Last Watchdog
San Francisco, Calif., Mar. 3, 2025, CyberNewswire -- With the growing importance of security compliance for startups, more companies are seeking to achieve and maintain compliance with frameworks like SOC 2, ISO 27001 & GDPR. Bubba AI, Inc. is building a comprehensive solution for these organizations to easily integrate compliance workflows and build their own
·lastwatchdog.com·
News alert: Bubba AI launches Comp AI to help 100,000 startups get SOC 2 compliant by 2032 - The Last Watchdog
Rubrik rotates authentication keys after log server breach
Rubrik rotates authentication keys after log server breach
Rubrik disclosed last month that one of its servers hosting log files was breached, causing the company to rotate potentially leaked authentication keys.
·bleepingcomputer.com·
Rubrik rotates authentication keys after log server breach
U.S. CISA adds Multiple Cisco Small Business RV Series Routers, Hitachi Vantara Pentaho BA Server, Microsoft Windows Win32k, and Progress WhatsUp Gold flaws to its Known Exploited Vulnerabilities catalog - Security Affairs
U.S. CISA adds Multiple Cisco Small Business RV Series Routers, Hitachi Vantara Pentaho BA Server, Microsoft Windows Win32k, and Progress WhatsUp Gold flaws to its Known Exploited Vulnerabilities catalog - Security Affairs
U.S. CISA adds Cisco Small Business Routers and Microsoft Windows Win32k flaws to its Known Exploited Vulnerabilities catalog.
·securityaffairs.com·
U.S. CISA adds Multiple Cisco Small Business RV Series Routers, Hitachi Vantara Pentaho BA Server, Microsoft Windows Win32k, and Progress WhatsUp Gold flaws to its Known Exploited Vulnerabilities catalog - Security Affairs
CISA says it will continue to monitor Russian cyber threats
CISA says it will continue to monitor Russian cyber threats
The Cybersecurity and Infrastructure Security Agency (CISA) shot down reports that changes are being made to how they approach cyber threats from Russia following a report by The Guardian last week.
·therecord.media·
CISA says it will continue to monitor Russian cyber threats
DHS says CISA will not stop monitoring Russian cyber threats
DHS says CISA will not stop monitoring Russian cyber threats
The US Cybersecurity and Infrastructure Security Agency says that media reports about it being directed to no longer follow or report on Russian cyber activity are untrue, and its mission remains unchanged.
·bleepingcomputer.com·
DHS says CISA will not stop monitoring Russian cyber threats
New ClickFix attack deploys Havoc C2 via Microsoft Sharepoint
New ClickFix attack deploys Havoc C2 via Microsoft Sharepoint
A newly uncovered ClickFix phishing campaign is tricking victims into executing malicious PowerShell commands that deploy the Havok post-exploitation framework for remote access to compromised devices.
·bleepingcomputer.com·
New ClickFix attack deploys Havoc C2 via Microsoft Sharepoint
UK watchdog probes TikTok and Reddit over child privacy concerns
UK watchdog probes TikTok and Reddit over child privacy concerns
On Monday, the United Kingdom's privacy watchdog announced that it is investigating TikTok, Reddit, and Imgur because of privacy concerns about how they are processing children's data.
·bleepingcomputer.com·
UK watchdog probes TikTok and Reddit over child privacy concerns
Microsoft-signed driver used in ransomware attacks
Microsoft-signed driver used in ransomware attacks
Threat actors are exploiting a privilege escalation flaw in Paragon Partition Manager for “bring your own vulnerable driver” (BYOVD) attacks.
·cybersecuritydive.com·
Microsoft-signed driver used in ransomware attacks
The Shift to Risk-Based Data Security Management | CSA
The Shift to Risk-Based Data Security Management | CSA
A growing number of companies are adopting risk-based and data-centric cybersecurity approaches like data security posture management (DSPM).
·cloudsecurityalliance.org·
The Shift to Risk-Based Data Security Management | CSA
Nearly 12,000 API keys and passwords found in AI training dataset
Nearly 12,000 API keys and passwords found in AI training dataset
Close to 12,000 valid secrets that include API keys and passwords have been found in the Common Crawl dataset used for training multiple artificial intelligence models.
·bleepingcomputer.com·
Nearly 12,000 API keys and passwords found in AI training dataset
Microsoft links recent Microsoft 365 outage to buggy update
Microsoft links recent Microsoft 365 outage to buggy update
​Microsoft says a coding issue is behind a now-resolved Microsoft 365 outage over the weekend that affected Outlook and Exchange Online authentication.
·bleepingcomputer.com·
Microsoft links recent Microsoft 365 outage to buggy update