Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

30967 bookmarks
Custom sorting
Microsoft reminds of Windows 10 support ending in two months
Microsoft reminds of Windows 10 support ending in two months
Microsoft has reminded customers that Windows 10 will be retired in two months after all editions of Windows 10, version 22H2 reach their end of servicing on October 14.
·bleepingcomputer.com·
Microsoft reminds of Windows 10 support ending in two months
Cisco warns of max severity flaw in Firewall Management Center
Cisco warns of max severity flaw in Firewall Management Center
Cisco is warning about a critical remote code execution (RCE) vulnerability in the RADIUS subsystem of its Secure Firewall Management Center (FMC) software.
·bleepingcomputer.com·
Cisco warns of max severity flaw in Firewall Management Center
UAT-7237 targets Taiwanese web hosting infrastructure
UAT-7237 targets Taiwanese web hosting infrastructure
Cisco Talos discovered UAT-7237, a Chinese-speaking advanced persistent threat (APT) group active since at least 2022, which has significant overlaps with UAT-5918.
·blog.talosintelligence.com·
UAT-7237 targets Taiwanese web hosting infrastructure
Trojans Embedded in .svg Files - Schneier on Security
Trojans Embedded in .svg Files - Schneier on Security
Porn sites are hiding code in .svg files: Unpacking the attack took work because much of the JavaScript in the .svg images was heavily obscured using a custom version of “JSFuck,” a technique that uses only a handful of character types to encode JavaScript into a camouflaged wall of text. Once decoded, the script causes the browser to download a chain of additional obfuscated JavaScript. The final payload, a known malicious script called Trojan.JS.Likejack, induces the browser to like a specified Facebook post as long as a user has their account open...
·schneier.com·
Trojans Embedded in .svg Files - Schneier on Security
Cisco Discloses Critical RCE Flaw in Firewall Management Software
Cisco Discloses Critical RCE Flaw in Firewall Management Software
Cisco has issued a software update to address the vulnerability, which can allow an unauthenticated, remote attacker to inject arbitrary shell commands
·infosecurity-magazine.com·
Cisco Discloses Critical RCE Flaw in Firewall Management Software
Majority of Organizations Ship Vulnerable Code, Study Finds
Majority of Organizations Ship Vulnerable Code, Study Finds
A new Checkmarx study reveals that AI-generated code now accounts for over 60% of codebases in some companies, much of which contains known vulnerabilities
·infosecurity-magazine.com·
Majority of Organizations Ship Vulnerable Code, Study Finds
Par pitié, cessez de demander nos infos personnelles à la caisse !
Par pitié, cessez de demander nos infos personnelles à la caisse !
C'est une rengaine, devenue presque un passage obligatoire dans de nombreux magasins en France. Au moment de payer, pour profiter d'une remise ou pour créer une carte de fidélité, le client est prié de donner tout un tas de données personnelles. Pourquoi ? Quelles sont les obligations des commerçants ? Et les droits
·numerama.com·
Par pitié, cessez de demander nos infos personnelles à la caisse !
US sanctions Grinex crypto-exchange, Garantex’s successor
US sanctions Grinex crypto-exchange, Garantex’s successor
The U.S. Department of the Treasury has announced sanctions against Grinex, the successor to Russian cryptocurrency exchange Garantex, which was previously sanctioned for helping ransomware gangs launder their money.
·bleepingcomputer.com·
US sanctions Grinex crypto-exchange, Garantex’s successor
Applying CIS Benchmarks to Harden Windows 11 VDI Systems
Applying CIS Benchmarks to Harden Windows 11 VDI Systems
Learn how the CIS IT team successfully implemented CIS Benchmarks in a Virtual Desktop Infrastructure (VDI) environment—specifically focusing on Windows 11.
·cisecurity.org·
Applying CIS Benchmarks to Harden Windows 11 VDI Systems
5 Cyber Questions Sheriffs & Police Chiefs Should Ask
5 Cyber Questions Sheriffs & Police Chiefs Should Ask
Cyber threat actors continue to target law enforcement agencies. Here are five cyber questions LE executives can ask to evaluate their defenses.
·cisecurity.org·
5 Cyber Questions Sheriffs & Police Chiefs Should Ask
Critical Infrastructure Caught in a Botnet
Critical Infrastructure Caught in a Botnet
Cyber threat actors frequently use a botnet in their efforts to target U.S. critical infrastructure. Read on for how to defend your networks.
·cisecurity.org·
Critical Infrastructure Caught in a Botnet
Over $300 million in cybercrime crypto seized in anti-fraud effort
Over $300 million in cybercrime crypto seized in anti-fraud effort
More than $300 million worth of cryptocurrency linked to cybercrime and fraud schemes has been frozen due to two separate initiatives involving law enforcement and private companies.
·bleepingcomputer.com·
Over $300 million in cybercrime crypto seized in anti-fraud effort
What happened in Vegas (that you actually want to know about)
What happened in Vegas (that you actually want to know about)
Hazel braves Vegas, overpriced water and the Black Hat maze to bring you Talos’ latest research — including a deep dive into the PS1Bot malware campaign.
·blog.talosintelligence.com·
What happened in Vegas (that you actually want to know about)
US updates sanctions on Russian cryptocurrency exchange Garantex
US updates sanctions on Russian cryptocurrency exchange Garantex
The Treasury Department added the cryptocurrency exchange Grinex and other entities to existing sanctions against Garantex, a Russian platform seized earlier this year.
·therecord.media·
US updates sanctions on Russian cryptocurrency exchange Garantex
Crypto24 ransomware hits large orgs with custom EDR evasion tool
Crypto24 ransomware hits large orgs with custom EDR evasion tool
The Crypto24 ransomware group has been using custom utilities to evade security solutions on breached networks, exfiltrate data, and encrypt files.
·bleepingcomputer.com·
Crypto24 ransomware hits large orgs with custom EDR evasion tool