Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

30913 bookmarks
Custom sorting
Simple Steps for Attack Surface Reduction
Simple Steps for Attack Surface Reduction
Blocking unknown apps and enforcing MFA reduce ransomware risk and credential theft across enterprise networks.
·thehackernews.com·
Simple Steps for Attack Surface Reduction
CISA warns of N-able N-central flaws exploited in zero-day attacks
CISA warns of N-able N-central flaws exploited in zero-day attacks
​CISA warned on Wednesday that attackers are actively exploiting two security vulnerabilities in N‑able's N-central remote monitoring and management (RMM) platform.
·bleepingcomputer.com·
CISA warns of N-able N-central flaws exploited in zero-day attacks
Google Gemini's Deep Research is finally coming to API
Google Gemini's Deep Research is finally coming to API
Google Gemini's one of the most powerful features is Deep Research, but up until now, it has been strictly limited to the Gemini interface. This could change soon.
·bleepingcomputer.com·
Google Gemini's Deep Research is finally coming to API
Foundations for OT cybersecurity: Asset inventory guidance for owners and operators | Cyber.gov.au
Foundations for OT cybersecurity: Asset inventory guidance for owners and operators | Cyber.gov.au
This guidance outlines how OT owners and operators can create and maintain an asset inventory and OT taxonomy, to protect their most vital assets. It includes steps for defining scope and objectives for the inventory, identifying assets, collecting attributes, creating a taxonomy, managing data, and implementing asset life cycle management.
·cyber.gov.au·
Foundations for OT cybersecurity: Asset inventory guidance for owners and operators | Cyber.gov.au
Russia restricts WhatsApp, Telegram calls, alleging criminal, terrorist activity | CyberScoop
Russia restricts WhatsApp, Telegram calls, alleging criminal, terrorist activity | CyberScoop
Russia is restricting calls on the WhatsApp and Telegram messaging apps in what it says is a bid to counter criminal activity, but that WhatsApp contends is a response to its defiance of government efforts to violate user communication rights.
·cyberscoop.com·
Russia restricts WhatsApp, Telegram calls, alleging criminal, terrorist activity | CyberScoop
Russians hacked US courts, say investigators
Russians hacked US courts, say investigators
The US court filing system, which houses court records and sealed filings, was reportedly hacked by Russians seeking sensitive documents.
·malwarebytes.com·
Russians hacked US courts, say investigators
Fortinet warns of FortiSIEM pre-auth RCE flaw with exploit in the wild
Fortinet warns of FortiSIEM pre-auth RCE flaw with exploit in the wild
Fortinet is warning about a remote unauthenticated command injection flaw in FortiSIEM that has in-the-wild exploit code, making it critical for admins to apply the latest security updates.
·bleepingcomputer.com·
Fortinet warns of FortiSIEM pre-auth RCE flaw with exploit in the wild
Windows 11 24H2 updates failing again with 0x80240069 errors
Windows 11 24H2 updates failing again with 0x80240069 errors
The KB5063878 Windows 11 24H2 cumulative update, released earlier this week, fails to install on some systems according to widespread reports from Windows administrators.
·bleepingcomputer.com·
Windows 11 24H2 updates failing again with 0x80240069 errors
New downgrade attack can bypass FIDO auth in Microsoft Entra ID
New downgrade attack can bypass FIDO auth in Microsoft Entra ID
Security researchers have created a new FIDO downgrade attack against Microsoft Entra ID that tricks users into authenticating with weaker login methods, making them susceptible to phishing and session hijacking.
·bleepingcomputer.com·
New downgrade attack can bypass FIDO auth in Microsoft Entra ID
Pennsylvania attorney general's email, site down after cyberattack
Pennsylvania attorney general's email, site down after cyberattack
The Office of the Pennsylvania Attorney General has announced that a recent cyberattack has taken down its systems, including landline phone lines and email accounts.
·bleepingcomputer.com·
Pennsylvania attorney general's email, site down after cyberattack
AI Applications in Cybersecurity - Schneier on Security
AI Applications in Cybersecurity - Schneier on Security
There is a really great series of online events highlighting cool uses of AI in cybersecurity, titled Prompt||GTFO. Videos from the first three events are online. And here’s where to register to attend, or participate, in the fourth. Some really great stuff here.
·schneier.com·
AI Applications in Cybersecurity - Schneier on Security
Spike in Fortinet VPN brute-force attacks raises zero-day concerns
Spike in Fortinet VPN brute-force attacks raises zero-day concerns
A massive spike in brute-force attacks targeted Fortinet SSL VPNs earlier this month, followed by a switch to FortiManager, marked a deliberate shift in targeting that has historically preceded new vulnerability disclosures.
·bleepingcomputer.com·
Spike in Fortinet VPN brute-force attacks raises zero-day concerns