Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31373 bookmarks
Custom sorting
Hackers use fake NDAs to deliver malware to US manufacturers
Hackers use fake NDAs to deliver malware to US manufacturers
Hackers are targeting American industrial firms by contacting them through their website forms, posing as potential business partners before infecting them with malware.
·therecord.media·
Hackers use fake NDAs to deliver malware to US manufacturers
Attention, cet outil très populaire peut devenir un mouchard pour localiser les Tesla
Attention, cet outil très populaire peut devenir un mouchard pour localiser les Tesla
Dans l’écosystème Tesla, il existe une solution qui assouvit la soif toujours plus grande de certains propriétaires en données sur leur précieux véhicule. Son nom ? TeslaMate, un outil open source capable d'enregistrer l’historique de trajets, l’état de la batterie mais également de révéler des données sensibles à la
·numerama.com·
Attention, cet outil très populaire peut devenir un mouchard pour localiser les Tesla
Over 28,000 Citrix devices vulnerable to new exploited RCE flaw
Over 28,000 Citrix devices vulnerable to new exploited RCE flaw
More than 28,200 Citrix instances are vulnerable to a critical remote code execution vulnerability tracked as CVE-2025-7775 that is already being exploited in the wild.
·bleepingcomputer.com·
Over 28,000 Citrix devices vulnerable to new exploited RCE flaw
Researchers Discover First Reported AI-Powered Ransomware
Researchers Discover First Reported AI-Powered Ransomware
While still in development, PromptLock is described as the “first known AI-powered ransomware” by ESET researchers
·infosecurity-magazine.com·
Researchers Discover First Reported AI-Powered Ransomware
Allied spy agencies blame 3 Chinese tech companies for Salt Typhoon attacks
Allied spy agencies blame 3 Chinese tech companies for Salt Typhoon attacks
The three companies were accused of providing “cyber-related products and services to China’s intelligence services, including multiple units in the People’s Liberation Army and Ministry of State Security” since at least 2021, according to the advisory.
·therecord.media·
Allied spy agencies blame 3 Chinese tech companies for Salt Typhoon attacks
NetScaler warns hackers are exploiting zero-day vulnerability
NetScaler warns hackers are exploiting zero-day vulnerability
The company is urging customers to patch their devices immediately, saying the flaw could lead to denial of service or remote code execution.
·cybersecuritydive.com·
NetScaler warns hackers are exploiting zero-day vulnerability
Automatiser votre travail, vous en rêviez ? Ce ransomware boosté à l'IA l'a fait - Numerama
Automatiser votre travail, vous en rêviez ? Ce ransomware boosté à l'IA l'a fait - Numerama
Dans un article publié le 26 août 2025, les chercheurs d'ESET révèlent une découverte pour le moins perturbante. Derrière le nom « PromptLock » se cache un malware capable de générer son propre code malveillant et de s’adapter en temps réel à l’environnement ciblé, le tout grâce à l'IA. Faisons-nous face au tout
·numerama.com·
Automatiser votre travail, vous en rêviez ? Ce ransomware boosté à l'IA l'a fait - Numerama
ShadowSilk Campaign Targets Central Asian Governments
ShadowSilk Campaign Targets Central Asian Governments
A series of cyber-attacks against government organizations in Central Asia and Asia- Pacific has been linked to the ShadowSilk threat cluster
·infosecurity-magazine.com·
ShadowSilk Campaign Targets Central Asian Governments
Why zero trust is never 'done' and is an ever-evolving process
Why zero trust is never 'done' and is an ever-evolving process
Zero trust isn't a project you finish—it's a cycle that keeps evolving. From supply chain exploits to policy drift, resilience requires continuous testing and adaptation. Learn how Specops Software supports this journey with tools that make it easier.
·bleepingcomputer.com·
Why zero trust is never 'done' and is an ever-evolving process
Framework to Protect Digital Identities in Agentic AI | CSA
Framework to Protect Digital Identities in Agentic AI | CSA
The Digital Identity Rights Framework safeguards digital identities in AI environments by integrating legal & technical controls that ensure traceability.
·cloudsecurityalliance.org·
Framework to Protect Digital Identities in Agentic AI | CSA
Navigating Global Headwinds: Frances Townsend Joins interos.ai’s Risk Intelligence Summit - interos.ai
Navigating Global Headwinds: Frances Townsend Joins interos.ai’s Risk Intelligence Summit - interos.ai
From international conflicts and cyber warfare to tariffs and trade protectionism, today’s geopolitical landscape is creating unprecedented challenges for global supply chains. These forces directly affect material costs, logistics and overall operational stability, leaving companies to navigate increasing uncertainty. Now more than ever, leaders must understand how national security concerns and international politics can quickly....
·interos.ai·
Navigating Global Headwinds: Frances Townsend Joins interos.ai’s Risk Intelligence Summit - interos.ai
Healthcare Services Group data breach impacts 624,000 people
Healthcare Services Group data breach impacts 624,000 people
The Healthcare Services Group (HSGI) is alerting more than 600,000 individuals that their personal information was exposed in a security breach last year.
·bleepingcomputer.com·
Healthcare Services Group data breach impacts 624,000 people
77 malicious apps removed from Google Play Store
77 malicious apps removed from Google Play Store
Researchers have found 77 malicious apps in the official Google Play Store ranging from adware to state of the art banking Trojans.
·malwarebytes.com·
77 malicious apps removed from Google Play Store
Risk-Based vs. Compliance-Based Security | CSA
Risk-Based vs. Compliance-Based Security | CSA
Compliance frameworks often fall short of addressing the nuanced nature of cyber risks. Risk-based security measures enhance your overall security posture.
·cloudsecurityalliance.org·
Risk-Based vs. Compliance-Based Security | CSA
The 5 Golden Rules of Safe AI Adoption
The 5 Golden Rules of Safe AI Adoption
Employees adopt AI rapidly; lack of safeguards demands 5 golden rules for CISOs to secure usage.
·thehackernews.com·
The 5 Golden Rules of Safe AI Adoption
We Are Still Unable to Secure LLMs from Malicious Inputs - Schneier on Security
We Are Still Unable to Secure LLMs from Malicious Inputs - Schneier on Security
Nice indirect prompt injection attack: Bargury’s attack starts with a poisoned document, which is shared to a potential victim’s Google Drive. (Bargury says a victim could have also uploaded a compromised file to their own account.) It looks like an official document on company meeting policies. But inside the document, Bargury hid a 300-word malicious prompt that contains instructions for ChatGPT. The prompt is written in white text in a size-one font, something that a human is unlikely to see but a machine will still read. In a proof of concept video of the attack...
·schneier.com·
We Are Still Unable to Secure LLMs from Malicious Inputs - Schneier on Security