https://securelist.com/triada-trojan-modules-analysis/116380/

Latest CyberSec News by @thecyberpicker
Popular LLMs Found to Produce Vulnerable Code by Default
Backslash Security found that naïve prompts resulted in code vulnerable to at least four of the of the 10 most common vulnerabilities across popular LLMs
FBI seeks help to unmask Salt Typhoon hackers behind telecom breaches
The FBI has asked the public for information on Chinese Salt Typhoon hackers behind widespread breaches of telecommunications providers in the United States and worldwide.
DslogdRAT Malware Deployed via Ivanti ICS Zero-Day CVE-2025-0282 in Japan Attacks
CVE-2025-0282 exploited by Chinese threat actors + DslogdRAT malware installs + 9X ICS scans spike
Researchers Identify Rack::Static Vulnerability Enabling Data Breaches in Ruby Servers
CVE-2025-27610 allows unauthenticated access to sensitive files in Rack Ruby apps due to root misconfig.
DEF CON® 33 Hacking Conference - Call For Authors
defcon.org
The largest hacking and security conference with presentations, workshops, contests, villages and the premier Capture The Flag Contest.
Microsoft announces fix for CPU spikes when typing in Outlook
Microsoft says it will soon fix a known issue causing CPU spikes when typing messages in recent versions of its classic Outlook email client.
Nearly 500,000 impacted by 2023 cyberattack on Long Beach, California
More than a year after a cyberattack on the government of Long Beach, California, the city is informing residents that information on nearly half a million people was leaked.
VulnCheck spotted 159 actively exploited vulnerabilities in first few months of 2025 | CyberScoop
The vulnerability threat intelligence firm’s research reinforces a slew of recent reports warning about increased exploits in 2024.
CISA gets new No. 2: Madhu Gottumukkala | CyberScoop
He served under then-South Dakota Gov. Kristi Noem, who now heads up the Department of Homeland Security.
AI speeds up analysis work for humans, two federal cyber officials say | CyberScoop
More broadly, AI is viewed as being a double-edged sword in cybersecurity, one that can bolster both defensive and offensive operations.
Hackers abuse OAuth 2.0 workflows to hijack Microsoft 365 accounts
Russian threat actors have been abusing legitimate OAuth 2.0 authentication workflows to hijack Microsoft 365 accounts of employees of organizations related to Ukraine and human rights.
Judge tosses citizenship provisions in Trump elections order | CyberScoop
Requests to block federal agencies from sharing federal data with states and to condition federal election funding were denied by Judge Colleen Kollar-Kotelly.
Lessons from Ted Lasso for cybersecurity success
In this edition, Bill explores how intellectual curiosity drives success in cybersecurity, shares insights on the IAB ToyMaker’s tactics, and covers the top security headlines you need to know.
New Linux Rootkit - Schneier on Security
Interesting: The company has released a working rootkit called “Curing” that uses io_uring, a feature built into the Linux kernel, to stealthily perform malicious activities without being caught by many of the detection solutions currently on the market. At the heart of the issue is the heavy reliance on monitoring system calls, which has become the go-to method for many cybersecurity vendors. The problem? Attackers can completely sidestep these monitored calls by leaning on io_uring instead. This clever method could let bad actors quietly make network connections or tamper with files without triggering the usual alarms...
RSAC Fireside Chat: The NDR evolution story—from open source start to kill chain clarity
As enterprises brace for a new wave of stealthy intrusions — so-called Typhoon attacks — security leaders are doubling down on network intelligence that goes beyond surface-level alerts. Related: What is NDR? In this RSAC 2025 Fireside Chat, I sat down with Corelight CEO Brian Dye to unpack how Network Detection and Response (NDR) is
Dialysis company DaVita reviewing data leaked by ransomware gang
The Interlock ransomware gang posted samples from a trove of data it is claiming to have stolen from the company.
Microsoft fixes machine learning bug flagging Adobe emails as spam
Microsoft says it mitigated a known issue in one of its machine learning (ML) models that mistakenly flagged Adobe emails in Exchange Online as spam.
North Korean IT workers seen using AI tools to scam firms into hiring them
North Korean IT workers illicitly gaining employment at U.S. and European tech companies are increasingly using generative artificial intelligence in a variety of ways to assist them throughout the job application and interview process.
Lazarus hackers breach six companies in watering hole attacks
In a recent espionage campaign, the infamous North Korean threat group Lazarus targeted multiple organizations in the software, IT, finance, and telecommunications sectors in South Korea.
ELENOR-corp Ransomware Targets Healthcare Sector
ELENOR-corp ransomware, a new version of Mimic, is targeting healthcare organizations using advanced capabilities
CISOs band together to urge world governments to harmonize cyber rules
Policymakers have moved slowly to reduce regulatory overlap, but the new industry plea could help change that.
Zoom attack tricks victims into allowing remote access to install malware and steal money
Attackers are luring victims into a Zoom call and then taking over their PC to install malware, infiltrate their accounts, and steal their assets.
Frederick Health data breach impacts nearly 1 million patients
A ransomware attack in January at Frederick Health Medical Group, a major healthcare provider in Maryland, has led to a data breach affecting nearly one million patients.
New whitepaper outlines the taxonomy of failure modes in AI agents
Read the new whitepaper from the Microsoft AI Red Team to better understand the taxonomy of failure mode in agentic AI.
Zoom attack tricks victims into allowing remote access to install malware and steal money
Attachers are luring victims into a Zoom call and then taking over their PC to install malware, infiltrate their accounts, and steal their assets.
Lazarus Hits 6 South Korean Firms via Cross EX, Innorix Zero-Day and ThreatNeedle Malware
Lazarus exploited zero-days in South Korean software, targeting 6 firms with ThreatNeedle and more.
RSAC Fireside Chat: X9 PKI emerges to help financial sector interoperate, get ready for ‘Q-Day’
As RSAC 2025 convenes next week in San Francisco, digital trust is poised to take center stage. Related: PKI and the IoT cloud One quiet but consequential development now taking root in the financial sector could prove pivotal: the emergence of a dedicated Public Key Infrastructure (PKI) framework, tailored to banks and payment networks, guided
[tl;dr sec] #276 - AI-created PoC Exploit, Cloud Snitch, Kubernetes Attack Simulation
AI creating/debugging an exploit for the recent Erlang/OTP SSH vuln, map visualization and firewall for AWS activity, a multi-stage attack simulation tool for k8s