Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31742 bookmarks
Custom sorting
How Can Startups Prioritize Security & Privacy? | CSA
How Can Startups Prioritize Security & Privacy? | CSA
Startups can prioritize security and privacy by embedding governance, automation, and compliance early, ensuring scalable and cost-effective protection.
·cloudsecurityalliance.org·
How Can Startups Prioritize Security & Privacy? | CSA
How Banks Can Adapt to the Rising Threat of Financial Crime
How Banks Can Adapt to the Rising Threat of Financial Crime
Banking fraud and financial crimes are growing more sophisticated every day. By understanding the threats and building strong collaborations, banks can protect themselves and their clients.
·darkreading.com·
How Banks Can Adapt to the Rising Threat of Financial Crime
Ce jeu d’aventure sur Steam était en réalité un piège tendu par un hacker
Ce jeu d’aventure sur Steam était en réalité un piège tendu par un hacker
Un jeu d'aventure, disponible sur Steam, a été retiré après la découverte d’un malware caché dans son téléchargement. Cet incident met en évidence la vulnérabilité des joueurs face aux cybermenaces, souvent dissimulées sous des titres attrayants. La plateforme d'achats de jeux video Steam a récemment retiré un jeu en
·numerama.com·
Ce jeu d’aventure sur Steam était en réalité un piège tendu par un hacker
Salt Typhoon Exploits Cisco Devices in Telco Infrastructure
Salt Typhoon Exploits Cisco Devices in Telco Infrastructure
The China-sponsored state espionage group has exploited known, older bugs in Cisco gear for successful cyber intrusions on six continents in the past two months.
·darkreading.com·
Salt Typhoon Exploits Cisco Devices in Telco Infrastructure
AI-Powered Social Engineering: Ancillary Tools and Techniques
AI-Powered Social Engineering: Ancillary Tools and Techniques
AI-driven social engineering is transforming cybercrime, leveraging deepfake videos, voice cloning, and OSINT automation to bypass traditional defense
·thehackernews.com·
AI-Powered Social Engineering: Ancillary Tools and Techniques
Warning: Tunnel of Love Leads to Scams
Warning: Tunnel of Love Leads to Scams
Romance-baiting losses were up 40% last year, as more and more pig-butchering efforts crop up in the wild.
·darkreading.com·
Warning: Tunnel of Love Leads to Scams
PostgreSQL flaw exploited as zero-day in BeyondTrust breach
PostgreSQL flaw exploited as zero-day in BeyondTrust breach
​Rapid7's vulnerability research team says attackers exploited a PostgreSQL security flaw as a zero-day to breach the network of privileged access management company BeyondTrust in December.
·bleepingcomputer.com·
PostgreSQL flaw exploited as zero-day in BeyondTrust breach
Chinese hackers breach more US telecoms via unpatched Cisco routers
Chinese hackers breach more US telecoms via unpatched Cisco routers
China's Salt Typhoon hackers are still actively targeting telecoms worldwide and have breached more U.S. telecommunications providers via unpatched Cisco IOS XE network devices.
·bleepingcomputer.com·
Chinese hackers breach more US telecoms via unpatched Cisco routers
AI and Civil Service Purges - Schneier on Security
AI and Civil Service Purges - Schneier on Security
Donald Trump and Elon Musk’s chaotic approach to reform is upending government operations. Critical functions have been halted, tens of thousands of federal staffers are being encouraged to resign, and congressional mandates are being disregarded. The next phase: The Department of Government Efficiency reportedly wants to use AI to cut costs. According to The Washington Post, Musk’s group has started to run sensitive data from government systems through AI programs to analyze spending and determine what could be pruned. This may lead to the elimination of human jobs in favor of automation. As one government official who has been tracking Musk’s DOGE team told the...
·schneier.com·
AI and Civil Service Purges - Schneier on Security
Sécurité des identités : CyberArk met la main sur Zilla pour 175 millions de dollars
Sécurité des identités : CyberArk met la main sur Zilla pour 175 millions de dollars
La société de sécurité des identités CyberArk s'empare de Zilla, une start-up américaine qui aide les entreprises à gérer l'accès des employés...-Cybersécurité
·usine-digitale.fr·
Sécurité des identités : CyberArk met la main sur Zilla pour 175 millions de dollars
Microsoft fixes bug causing Windows Server 2025 boot errors
Microsoft fixes bug causing Windows Server 2025 boot errors
​Microsoft has fixed a known issue causing "boot device inaccessible" errors during startup on some Windows Server 2025 systems using iSCSI.
·bleepingcomputer.com·
Microsoft fixes bug causing Windows Server 2025 boot errors
Storm-2372 conducts device code phishing campaign
Storm-2372 conducts device code phishing campaign
Microsoft Threat Intelligence Center discovered an active and successful device code phishing campaign by a threat actor we track as Storm-2372. Our ongoing investigation indicates that this campaign has been active since August 2024 with the actor creating lures that resemble messaging app experiences including WhatsApp, Signal, and Microsoft Teams. Storm-2372’s targets during this time have included government, non-governmental organizations (NGOs), information technology (IT) services and technology, defense, telecommunications, health, higher education, and energy/oil and gas in Europe, North America, Africa, and the Middle East. Microsoft assesses with medium confidence that Storm-2372 aligns with Russian interests, victimology, and tradecraft.
·microsoft.com·
Storm-2372 conducts device code phishing campaign
whoAMI attacks give hackers code execution on Amazon EC2 instances
whoAMI attacks give hackers code execution on Amazon EC2 instances
Security researchers discovered a name confusion attack that allows access to an Amazon Web Services account to anyone that publishes an Amazon Machine Image (AMI) with a specific name.
·bleepingcomputer.com·
whoAMI attacks give hackers code execution on Amazon EC2 instances
Roundtable: Is DOGE Flouting Cybersecurity for US Data?
Roundtable: Is DOGE Flouting Cybersecurity for US Data?
Cybersecurity experts weigh in on the red flags flying around the new Department of Government Efficiency's handling of the mountains of US data it now has access to, potentially without basic information security protections in place.
·darkreading.com·
Roundtable: Is DOGE Flouting Cybersecurity for US Data?
Chinese APT 'Emperor Dragonfly' Moonlights With Ransomware
Chinese APT 'Emperor Dragonfly' Moonlights With Ransomware
Pivoting from prior cyber espionage, the threat group deployed its backdoor tool set to ultimately push out RA World malware, demanding $2 million from its victim.
·darkreading.com·
Chinese APT 'Emperor Dragonfly' Moonlights With Ransomware
Changing the narrative on pig butchering scams
Changing the narrative on pig butchering scams
Hazel discusses Interpol’s push to rename pig butchering scams as ‘romance baiting’. Plus, catch up on the latest vulnerability research from Talos, and why a recent discovery is a “rare industry win”.
·blog.talosintelligence.com·
Changing the narrative on pig butchering scams