Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31742 bookmarks
Custom sorting
New FrigidStealer infostealer infects Macs via fake browser updates
New FrigidStealer infostealer infects Macs via fake browser updates
The FakeUpdate malware campaigns are increasingly becoming muddled, with two additional cybercrime groups tracked as TA2726 and TA2727, running campaigns that push a new macOS infostealer malware called FrigidStealer.
·bleepingcomputer.com·
New FrigidStealer infostealer infects Macs via fake browser updates
News alert: INE Security’s focus on practical security training enhances career stability in tech - The Last Watchdog
News alert: INE Security’s focus on practical security training enhances career stability in tech - The Last Watchdog
Cary, NC, Feb. 19, 2025, CyberNewswire -- 2025 marks a time of unprecedented volatility in the technology job market. On one hand, dependence on technology is soaring. The growth of AI and machine learning is propelling a surge in new technologies, tactics, and ideas. At the same time, organizations are trying to adapt to the
·lastwatchdog.com·
News alert: INE Security’s focus on practical security training enhances career stability in tech - The Last Watchdog
Device Code Phishing - Schneier on Security
Device Code Phishing - Schneier on Security
This isn’t new, but it’s increasingly popular: The technique is known as device code phishing. It exploits “device code flow,” a form of authentication formalized in the industry-wide OAuth standard. Authentication through device code flow is designed for logging printers, smart TVs, and similar devices into accounts. These devices typically don’t support browsers, making it difficult to sign in using more standard forms of authentication, such as entering user names, passwords, and two-factor mechanisms. Rather than authenticating the user directly, the input-constrained device displays an alphabetic or alphanumeric device code along with a link associated with the user account. The user opens the link on a computer or other device that’s easier to sign in with and enters the code. The remote server then sends a token to the input-constrained device that logs it into the account...
·schneier.com·
Device Code Phishing - Schneier on Security
WordPress Plugin Vulnerability Exposes 90,000 Sites to Attack
WordPress Plugin Vulnerability Exposes 90,000 Sites to Attack
A flaw in the Jupiter X Core plugin has been identified, allowing upload of malicious SVG files and remote code execution on vulnerable servers
·infosecurity-magazine.com·
WordPress Plugin Vulnerability Exposes 90,000 Sites to Attack
Finastra Notifies Customers of Data Breach
Finastra Notifies Customers of Data Breach
Finastra notifies customers of data breach that took place more than three months ago, impacting sensitive financial information
·infosecurity-magazine.com·
Finastra Notifies Customers of Data Breach
Patch Now: CISA Warns of Palo Alto Flaw Exploited in the Wild
Patch Now: CISA Warns of Palo Alto Flaw Exploited in the Wild
The authentication bypass vulnerability in the OS for the company's firewall devices is under increasing attack and being chained with other bugs, making it imperative for organizations to mitigate the issue ASAP.
·darkreading.com·
Patch Now: CISA Warns of Palo Alto Flaw Exploited in the Wild
DeepSeek 11x More Likely to Generate Harmful Content | CSA
DeepSeek 11x More Likely to Generate Harmful Content | CSA
Red teams have uncovered serious ethical and security flaws in DeepSeek’s technology. The model is highly biased and susceptible to generating insecure code.
·cloudsecurityalliance.org·
DeepSeek 11x More Likely to Generate Harmful Content | CSA
Thailand to take in 7,000 rescued from illegal cyber scam hubs in Myanmar
Thailand to take in 7,000 rescued from illegal cyber scam hubs in Myanmar
Around 7,000 people rescued from illegal call centers in Myanmar are awaiting transfer to Thailand amid a crackdown on cross-border scam operations, Thailand’s Prime Minister Paetongtarn Shinawatra said on Wednesday.
·therecord.media·
Thailand to take in 7,000 rescued from illegal cyber scam hubs in Myanmar
The Browser Blind Spot: Why Your Browser is the Next Cybersecurity Battleground
The Browser Blind Spot: Why Your Browser is the Next Cybersecurity Battleground
For years, defensive security strategies have focused on three core areas: network, endpoint, and email. Meanwhile, the browser, sits across all of them. This article examines three key areas where attackers focus their efforts and how browser-based attacks are evolving.
·bleepingcomputer.com·
The Browser Blind Spot: Why Your Browser is the Next Cybersecurity Battleground
Palo Alto Networks tags new firewall bug as exploited in attacks
Palo Alto Networks tags new firewall bug as exploited in attacks
Palo Alto Networks warns that hackers are actively exploiting a critical authentication bypass flaw (CVE-2025-0108) in PAN-OS firewalls, chaining it with two other vulnerabilities to breach devices in active attacks.
·bleepingcomputer.com·
Palo Alto Networks tags new firewall bug as exploited in attacks
Russian state hackers spy on Ukrainian military through Signal app
Russian state hackers spy on Ukrainian military through Signal app
Russian state-backed hackers are increasingly targeting Signal messenger accounts — including those used by Ukrainian military personnel and government officials — in an effort to access sensitive information that could aid Moscow’s war effort, researchers warn.
·therecord.media·
Russian state hackers spy on Ukrainian military through Signal app
New WinRAR version strips Windows metadata to increase privacy
New WinRAR version strips Windows metadata to increase privacy
WinRAR 7.10 was released yesterday with numerous features, such as larger memory pages, a dark mode, and the ability to fine-tune how Windows Mark-of-the-Web flags are propagated when extracting files.
·bleepingcomputer.com·
New WinRAR version strips Windows metadata to increase privacy
Dark Patterns: How the CPPA is Cracking Down | CSA
Dark Patterns: How the CPPA is Cracking Down | CSA
The California Privacy Protection Agency (CPPA) is taking a strong stance against dark patterns. Understand what dark patterns are & why they are harmful.
·cloudsecurityalliance.org·
Dark Patterns: How the CPPA is Cracking Down | CSA
OpenSSH bugs allows Man-in-the-Middle and DoS Attacks
OpenSSH bugs allows Man-in-the-Middle and DoS Attacks
Two OpenSSH vulnerabilities could allow machine-in-the-middle (MitM) and denial-of-service (DoS) attacks under certain conditions.
·securityaffairs.com·
OpenSSH bugs allows Man-in-the-Middle and DoS Attacks
Cyber Investor Insight Partners Suffers Security Breach
Cyber Investor Insight Partners Suffers Security Breach
Venture capital firm Insight Partners, which counts Recorded Future, SentinelOne and Wiz in its portfolio, confirmed an intrusion into its systems via a social engineering attack
·infosecurity-magazine.com·
Cyber Investor Insight Partners Suffers Security Breach