Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

30916 bookmarks
Custom sorting
Have You Turned Off Your Virtual Oven?
Have You Turned Off Your Virtual Oven?
EASM and DRP tools automate asset discovery and threat monitoring, reducing breach risk from hidden digital exposures.
·thehackernews.com·
Have You Turned Off Your Virtual Oven?
LLM Coding Integrity Breach - Schneier on Security
LLM Coding Integrity Breach - Schneier on Security
Here’s an interesting story about a failure being introduced by LLM-written code. Specifically, the LLM was doing some code refactoring, and when it moved a chunk of code from one file to another it changed a “break” to a “continue.” That turned an error logging statement into an infinite loop, which crashed the system. This is an integrity failure. Specifically, it’s a failure of processing integrity. And while we can think of particular patches that alleviate this exact failure, the larger problem is much harder to solve. Davi Ottenheimer ...
·schneier.com·
LLM Coding Integrity Breach - Schneier on Security
Simple Steps for Attack Surface Reduction
Simple Steps for Attack Surface Reduction
Blocking unknown apps and enforcing MFA reduce ransomware risk and credential theft across enterprise networks.
·thehackernews.com·
Simple Steps for Attack Surface Reduction
CISA warns of N-able N-central flaws exploited in zero-day attacks
CISA warns of N-able N-central flaws exploited in zero-day attacks
​CISA warned on Wednesday that attackers are actively exploiting two security vulnerabilities in N‑able's N-central remote monitoring and management (RMM) platform.
·bleepingcomputer.com·
CISA warns of N-able N-central flaws exploited in zero-day attacks
Google Gemini's Deep Research is finally coming to API
Google Gemini's Deep Research is finally coming to API
Google Gemini's one of the most powerful features is Deep Research, but up until now, it has been strictly limited to the Gemini interface. This could change soon.
·bleepingcomputer.com·
Google Gemini's Deep Research is finally coming to API
Foundations for OT cybersecurity: Asset inventory guidance for owners and operators | Cyber.gov.au
Foundations for OT cybersecurity: Asset inventory guidance for owners and operators | Cyber.gov.au
This guidance outlines how OT owners and operators can create and maintain an asset inventory and OT taxonomy, to protect their most vital assets. It includes steps for defining scope and objectives for the inventory, identifying assets, collecting attributes, creating a taxonomy, managing data, and implementing asset life cycle management.
·cyber.gov.au·
Foundations for OT cybersecurity: Asset inventory guidance for owners and operators | Cyber.gov.au
OpenAI relaxes GPT-5 rate limit, promises to improve the personality
OpenAI relaxes GPT-5 rate limit, promises to improve the personality
OpenAI is slowly addressing all concerns around GPT-5, including rate limits and now its personality, which has been criticized for being less affirmative.
·bleepingcomputer.com·
OpenAI relaxes GPT-5 rate limit, promises to improve the personality
Russia restricts WhatsApp, Telegram calls, alleging criminal, terrorist activity | CyberScoop
Russia restricts WhatsApp, Telegram calls, alleging criminal, terrorist activity | CyberScoop
Russia is restricting calls on the WhatsApp and Telegram messaging apps in what it says is a bid to counter criminal activity, but that WhatsApp contends is a response to its defiance of government efforts to violate user communication rights.
·cyberscoop.com·
Russia restricts WhatsApp, Telegram calls, alleging criminal, terrorist activity | CyberScoop
Russians hacked US courts, say investigators
Russians hacked US courts, say investigators
The US court filing system, which houses court records and sealed filings, was reportedly hacked by Russians seeking sensitive documents.
·malwarebytes.com·
Russians hacked US courts, say investigators
Fortinet warns of FortiSIEM pre-auth RCE flaw with exploit in the wild
Fortinet warns of FortiSIEM pre-auth RCE flaw with exploit in the wild
Fortinet is warning about a remote unauthenticated command injection flaw in FortiSIEM that has in-the-wild exploit code, making it critical for admins to apply the latest security updates.
·bleepingcomputer.com·
Fortinet warns of FortiSIEM pre-auth RCE flaw with exploit in the wild
Windows 11 24H2 updates failing again with 0x80240069 errors
Windows 11 24H2 updates failing again with 0x80240069 errors
The KB5063878 Windows 11 24H2 cumulative update, released earlier this week, fails to install on some systems according to widespread reports from Windows administrators.
·bleepingcomputer.com·
Windows 11 24H2 updates failing again with 0x80240069 errors
New downgrade attack can bypass FIDO auth in Microsoft Entra ID
New downgrade attack can bypass FIDO auth in Microsoft Entra ID
Security researchers have created a new FIDO downgrade attack against Microsoft Entra ID that tricks users into authenticating with weaker login methods, making them susceptible to phishing and session hijacking.
·bleepingcomputer.com·
New downgrade attack can bypass FIDO auth in Microsoft Entra ID
Pennsylvania attorney general's email, site down after cyberattack
Pennsylvania attorney general's email, site down after cyberattack
The Office of the Pennsylvania Attorney General has announced that a recent cyberattack has taken down its systems, including landline phone lines and email accounts.
·bleepingcomputer.com·
Pennsylvania attorney general's email, site down after cyberattack
AI Applications in Cybersecurity - Schneier on Security
AI Applications in Cybersecurity - Schneier on Security
There is a really great series of online events highlighting cool uses of AI in cybersecurity, titled Prompt||GTFO. Videos from the first three events are online. And here’s where to register to attend, or participate, in the fourth. Some really great stuff here.
·schneier.com·
AI Applications in Cybersecurity - Schneier on Security