https://thehackernews.com/2025/04/5-major-concerns-with-employees-using.html

Latest CyberSec News by @thecyberpicker
AI and Privacy: Shifting from 2024 to 2025 | CSA
Explore how AI and data privacy are reshaping global business, driving innovation, and demanding agile, ethical governance across industries.
Rebuilding Maritime Cybersecurity Resilience: Charting an America First Course to Secure the U.S. Homeland | CyberScoop
Strengthening U.S. maritime cybersecurity in 2025 is vital. Learn about recent port cyberattacks and key steps to secure America’s ports and shipping against rising global threats.
Abilene city, Texas, takes systems offline following a cyberattack
Abilene, Texas, shut down systems after a cyberattack caused server issues. IT staff and experts are investigating the security incident.
Scalllywag Ad Fraud Network Generates 1.4 Billion Bid Requests Daily
Security firm Human lifts the lid on prolific new ad fraud scheme dubbed “scallywag”
$40bn Southeast Asian Scam Sector Growing “Like a Cancer”
The UN has warned that Southeast Asian fraud groups are expanding their operations
C’est quoi le Slopsquatting, la nouvelle menace sur Internet à cause des IA ?
L'émergence de l'intelligence artificielle générative s'accompagne d'un nouveau type de risque informatique : le Slopsquatting. Il s'agit d'une manipulation construite grâce aux hallucinations d'une IA, qui permet à une personne malveillante d'injecter du code corrompu dans des logiciels. Ce n'est un secret pour
Microsoft Secures MSA Signing with Azure Confidential VMs Following Storm-0558 Breach
Microsoft secures MSA and Entra ID with Azure Confidential VMs + HSM, preventing token forgery and reducing breach risks.
Lotus Panda Hacks SE Asian Governments With Browser Stealers and Sideloaded Malware
Lotus Panda breached 6 Southeast Asian organizations using custom tools, browser stealers, and sideloaded malware.
Whistleblower: DOGE Siphoned NLRB Case Data
A security architect with the National Labor Relations Board (NLRB) alleges that employees from Elon Musk's Department of Government Efficiency (DOGE) transferred gigabytes of sensitive data from agency case files in early March, using short-lived accounts configured to leave few…
Did DOGE "breach" Americans' data? (Lock and Code S06E08) | Malwarebytes
This week on the Lock and Code podcast, we speak with Sydney Saubestre about DOGE and its access to Americans' data.
Texas city takes systems offline after cyberattack
The city of Abilene disconnected servers after officials detected a cyber incident last week.
Researchers warn of critical flaw found in Erlang OTP SSH
The CVE could allow unauthenticated attackers to gain full access to a device. Many of these devices are widely used in IoT and telecom platforms.
Judge limits evidence about NSO Group customers, victims in damages trial | CyberScoop
A U.S. judge limits what evidence NSO Group can present in the WhatsApp spyware trial, blocking arguments about suspected criminal targets and focusing the case on NSO’s conduct.
Multiple top CISA officials behind ‘Secure by Design’ resign | CyberScoop
In a statement to CyberScoop, acting Director Bridget Bean said that encouraging the private sector to build more secure products will continue to be a priority at the agency.
Kimsuky Exploits BlueKeep RDP Vulnerability to Breach Systems in South Korea and Japan
Kimsuky exploited CVE-2019-0708 and CVE-2017-11882 since Oct 2023 to target 15 countries.
Researchers warn of critical flaw found in Erlang OTP SSH
The CVE could allow unauthenticated attackers to gain full access to a device. Many of these devices are widely used in IoT and telecom platforms.
Securing our future: April 2025 progress report on Microsoft’s Secure Future Initiative
The Microsoft Secure Future Initiative (SFI) stands as the largest cybersecurity engineering project in history and most extensive effort of its kind at Microsoft. Now, we are sharing the second SFI progress report, which highlights progress made in our multi-year journey to improve the security posture of Microsoft, our customers, and the industry at large.
Microsoft Entra account lockouts caused by user token logging mishap
Microsoft confirms that the weekend Entra account lockouts were caused by the invalidation of short-lived user refresh tokens that were mistakenly logged into internal systems.
SuperCard X Android Malware Enables Contactless ATM and PoS Fraud via NFC Relay Attacks
SuperCard X malware exploits NFC relay and social engineering to steal card data in Italy, enabling ATM fraud.
Microsoft strengthens in-house cyber governance, training
The technology giant, as part of its Secure Future Initiative program, has overhauled security practices following a series of crippling nation-state-linked cyberattacks.
Gartner: How to build a secure enterprise cloud environment
There are plenty of frameworks, tools and strategies to help map out a risk-resilient cloud infrastructure.
Virtual Patching: How to Protect VMware ESXi | CSA
Recent CVEs were patched amid concerns of exploitation. While traditional patching requires downtime, virtual patching allows critical systems to stay online.
State-sponsored hackers embrace ClickFix social engineering tactic
ClickFix attacks are being increasingly adopted by threat actors of all levels, with researchers now seeing multiple advanced persistent threat (APT) groups from North Korea, Iran, and Russia utilizing the tactic to breach networks.
Phishers abuse Google OAuth to spoof Google in DKIM replay attack
In a rather clever attack, hackers leveraged a weakness that allowed them to send a fake email that seemed delivered from Google's systems, passing all verifications but pointing to a fraudulent page that collected logins.
WordPress ad-fraud plugins generated 1.4 billion ad requests per day
A large-scale ad fraud operation called 'Scallywag' is monetizing pirating and URL shortening sites through specially crafted WordPress plugins that generate billions of daily fraudulent requests.
Five Keys to Choosing a Cloud Security Provider | CSA
Cloud security providers aren't all the same, and knowing what to look for and what questions to ask when making a decision comes down to five keys to success.
Cybersecurity VC deal flow and M&A activity heat up in early 2025
This week in cybersecurity from the editors at Cybercrime Magazine
Pour piéger les diplomates européens, les hackers russes les invitent « à boire un excellent verre de vin »
Une campagne d'espionnage menée depuis la Russie tente de piéger les politiques européens avec de fausses invitations envoyées par mail. Une fois la pièce jointe ouverte, l'ordinateur de la victime sera infecté et va offrir toutes ses informations aux hackers. Les pirates de Moscou mènent une nouvelle campagne de
https://securelist.com/lumma-fake-captcha-attacks-analysis/116274/