Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

30963 bookmarks
Custom sorting
UAT-7237 targets Taiwanese web hosting infrastructure
UAT-7237 targets Taiwanese web hosting infrastructure
Cisco Talos discovered UAT-7237, a Chinese-speaking advanced persistent threat (APT) group active since at least 2022, which has significant overlaps with UAT-5918.
·blog.talosintelligence.com·
UAT-7237 targets Taiwanese web hosting infrastructure
Trojans Embedded in .svg Files - Schneier on Security
Trojans Embedded in .svg Files - Schneier on Security
Porn sites are hiding code in .svg files: Unpacking the attack took work because much of the JavaScript in the .svg images was heavily obscured using a custom version of “JSFuck,” a technique that uses only a handful of character types to encode JavaScript into a camouflaged wall of text. Once decoded, the script causes the browser to download a chain of additional obfuscated JavaScript. The final payload, a known malicious script called Trojan.JS.Likejack, induces the browser to like a specified Facebook post as long as a user has their account open...
·schneier.com·
Trojans Embedded in .svg Files - Schneier on Security
Cisco Discloses Critical RCE Flaw in Firewall Management Software
Cisco Discloses Critical RCE Flaw in Firewall Management Software
Cisco has issued a software update to address the vulnerability, which can allow an unauthenticated, remote attacker to inject arbitrary shell commands
·infosecurity-magazine.com·
Cisco Discloses Critical RCE Flaw in Firewall Management Software
Majority of Organizations Ship Vulnerable Code, Study Finds
Majority of Organizations Ship Vulnerable Code, Study Finds
A new Checkmarx study reveals that AI-generated code now accounts for over 60% of codebases in some companies, much of which contains known vulnerabilities
·infosecurity-magazine.com·
Majority of Organizations Ship Vulnerable Code, Study Finds
Par pitié, cessez de demander nos infos personnelles à la caisse !
Par pitié, cessez de demander nos infos personnelles à la caisse !
C'est une rengaine, devenue presque un passage obligatoire dans de nombreux magasins en France. Au moment de payer, pour profiter d'une remise ou pour créer une carte de fidélité, le client est prié de donner tout un tas de données personnelles. Pourquoi ? Quelles sont les obligations des commerçants ? Et les droits
·numerama.com·
Par pitié, cessez de demander nos infos personnelles à la caisse !
US sanctions Grinex crypto-exchange, Garantex’s successor
US sanctions Grinex crypto-exchange, Garantex’s successor
The U.S. Department of the Treasury has announced sanctions against Grinex, the successor to Russian cryptocurrency exchange Garantex, which was previously sanctioned for helping ransomware gangs launder their money.
·bleepingcomputer.com·
US sanctions Grinex crypto-exchange, Garantex’s successor
Applying CIS Benchmarks to Harden Windows 11 VDI Systems
Applying CIS Benchmarks to Harden Windows 11 VDI Systems
Learn how the CIS IT team successfully implemented CIS Benchmarks in a Virtual Desktop Infrastructure (VDI) environment—specifically focusing on Windows 11.
·cisecurity.org·
Applying CIS Benchmarks to Harden Windows 11 VDI Systems
5 Cyber Questions Sheriffs & Police Chiefs Should Ask
5 Cyber Questions Sheriffs & Police Chiefs Should Ask
Cyber threat actors continue to target law enforcement agencies. Here are five cyber questions LE executives can ask to evaluate their defenses.
·cisecurity.org·
5 Cyber Questions Sheriffs & Police Chiefs Should Ask
Critical Infrastructure Caught in a Botnet
Critical Infrastructure Caught in a Botnet
Cyber threat actors frequently use a botnet in their efforts to target U.S. critical infrastructure. Read on for how to defend your networks.
·cisecurity.org·
Critical Infrastructure Caught in a Botnet
Over $300 million in cybercrime crypto seized in anti-fraud effort
Over $300 million in cybercrime crypto seized in anti-fraud effort
More than $300 million worth of cryptocurrency linked to cybercrime and fraud schemes has been frozen due to two separate initiatives involving law enforcement and private companies.
·bleepingcomputer.com·
Over $300 million in cybercrime crypto seized in anti-fraud effort
What happened in Vegas (that you actually want to know about)
What happened in Vegas (that you actually want to know about)
Hazel braves Vegas, overpriced water and the Black Hat maze to bring you Talos’ latest research — including a deep dive into the PS1Bot malware campaign.
·blog.talosintelligence.com·
What happened in Vegas (that you actually want to know about)
US updates sanctions on Russian cryptocurrency exchange Garantex
US updates sanctions on Russian cryptocurrency exchange Garantex
The Treasury Department added the cryptocurrency exchange Grinex and other entities to existing sanctions against Garantex, a Russian platform seized earlier this year.
·therecord.media·
US updates sanctions on Russian cryptocurrency exchange Garantex
Crypto24 ransomware hits large orgs with custom EDR evasion tool
Crypto24 ransomware hits large orgs with custom EDR evasion tool
The Crypto24 ransomware group has been using custom utilities to evade security solutions on breached networks, exfiltrate data, and encrypt files.
·bleepingcomputer.com·
Crypto24 ransomware hits large orgs with custom EDR evasion tool
Microsoft fixes Windows Server bug causing cluster, VM issues
Microsoft fixes Windows Server bug causing cluster, VM issues
Microsoft has resolved a known issue that triggers Cluster service and VM restart issues after installing July's Windows Server 2019 security updates.
·bleepingcomputer.com·
Microsoft fixes Windows Server bug causing cluster, VM issues
Pro-Russian hackers blamed for water dam sabotage in Norway
Pro-Russian hackers blamed for water dam sabotage in Norway
The Norwegian Police Security Service (PST) says that pro-Russian hackers took control of critical operation systems at a dam and opened outflow valves.
·bleepingcomputer.com·
Pro-Russian hackers blamed for water dam sabotage in Norway
Water sector expands partnership with volunteer hackers
Water sector expands partnership with volunteer hackers
As threats to critical infrastructure grow and government funding stagnates, operators are turning to civic-minded volunteers from the cybersecurity industry.
·cybersecuritydive.com·
Water sector expands partnership with volunteer hackers