Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31743 bookmarks
Custom sorting
BadPilot network hacking campaign fuels Russian SandWorm attacks
BadPilot network hacking campaign fuels Russian SandWorm attacks
A subgroup of the Russian state-sponsored hacking group APT44, also known as 'Seashell Blizzard' and 'Sandworm', has been targeting critical organizations and governments in a multi-year campaign dubbed 'BadPilot.'
·bleepingcomputer.com·
BadPilot network hacking campaign fuels Russian SandWorm attacks
Ivanti fixes three critical flaws in Connect Secure & Policy Secure
Ivanti fixes three critical flaws in Connect Secure & Policy Secure
Ivanti has released security updates for Ivanti Connect Secure (ICS), Ivanti Policy Secure (IPS), and Ivanti Secure Access Client (ISAC) to address multiple vulnerabilities, including three critical severity problems.
·bleepingcomputer.com·
Ivanti fixes three critical flaws in Connect Secure & Policy Secure
Microsoft: Russia's Sandworm APT Exploits Edge Bugs Globally
Microsoft: Russia's Sandworm APT Exploits Edge Bugs Globally
Sandworm (aka Seashell Blizzard) has an initial access wing called "BadPilot" that uses standard intrusion tactics to spread Russia's tendrils around the world.
·darkreading.com·
Microsoft: Russia's Sandworm APT Exploits Edge Bugs Globally
Is AI a Friend or Foe of Healthcare Security?
Is AI a Friend or Foe of Healthcare Security?
When it comes to keeping patient information safe, people empowerment is just as necessary as deploying new technologies.
·darkreading.com·
Is AI a Friend or Foe of Healthcare Security?
Why Is NHI Ownership Critical for Security? | CSA
Why Is NHI Ownership Critical for Security? | CSA
Clear ownership of non-human identities (NHIs) is key to reducing insider threats, improving IAM, and streamlining governance. Learn how to enhance security posture.
·cloudsecurityalliance.org·
Why Is NHI Ownership Critical for Security? | CSA
Delivering Malware Through Abandoned Amazon S3 Buckets - Schneier on Security
Delivering Malware Through Abandoned Amazon S3 Buckets - Schneier on Security
Here’s a supply-chain attack just waiting to happen. A group of researchers searched for, and then registered, abandoned Amazon S3 buckets for about $400. These buckets contained software libraries that are still used. Presumably the projects don’t realize that they have been abandoned, and still ping them for patches, updates, and etc. The TL;DR is that this time, we ended up discovering ~150 Amazon S3 buckets that had previously been used across commercial and open source software products, governments, and infrastructure deployment/update pipelines—and then abandoned...
·schneier.com·
Delivering Malware Through Abandoned Amazon S3 Buckets - Schneier on Security
How to Steer AI Adoption: A CISO Guide
How to Steer AI Adoption: A CISO Guide
CISOs lead AI strategy without clear guidance. The CLEAR framework helps security teams track AI, enforce policies, and drive responsible adoption.
·thehackernews.com·
How to Steer AI Adoption: A CISO Guide
India's Cybercrime Problems Grow as Nation Digitizes
India's Cybercrime Problems Grow as Nation Digitizes
More than half of attacks on Indian businesses come from outside the country, while 45% of those targeting consumers come from Cambodia, Myanmar, and Laos.
·darkreading.com·
India's Cybercrime Problems Grow as Nation Digitizes
Cybercrime: A Multifaceted National Security Threat
Cybercrime: A Multifaceted National Security Threat
Google Threat Intelligence Group discusses the current state of cybercrime, and why it must be considered a national security threat.
·cloud.google.com·
Cybercrime: A Multifaceted National Security Threat