https://www.bleepingcomputer.com/news/security/iclicker-hack-targeted-students-with-malware-via-fake-captcha/

Latest CyberSec News by @thecyberpicker
ChatGPT is finally adding Download as PDF for Deep Research
ChatGPT's Deep Research, which allows you to conduct multi-step research for complex tasks, is finally getting an option to save the report as a PDF.
Fake AI video generators drop new Noodlophile infostealer malware
Fake AI-powered video generation tools are being used to distribute a new information-stealing malware family called 'Noodlophile,' under the guise of generated media content.
Microsoft Teams will soon block screen capture during meetings
Microsoft is working on adding a new Teams feature that will prevent users from capturing screenshots of sensitive information shared during meetings.
MY TAKE: Beyond agentic AI mediocrity — the real disruption is empowering the disenfranchised
Is agentic AI accelerating mediocrity? Plenty of folks on LinkedIn seem to think so. Related: The 400th journalist A growing chorus of academics, tech workers, and digital culture watchers are pointing out the obvious: the more we prompt, the more we flatten. Across marketing, B2B, and even journalism, GenAI is churning out clean, inoffensive, structurally
SAP NetWeaver exploitation enters second wave of threat activity
Researchers are tracking hundreds of cases around the world and warning that the risk is more serious than previously known.
NSO Group condamné, malware russe contre l'Europe… Les 5 actus cyber de la semaine
L’Usine Digitale vous propose un récapitulatif des grandes actualités de la semaine en matière de cybersécurité. Au programme, la...-Cybersécurité
Germany Shuts Down eXch Over $1.9B Laundering, Seizes €34M in Crypto and 8TB of Data
German police seized eXch on April 30, confiscating €34M in crypto over $1.9B laundering links.
Google Pays $1.375 Billion to Texas Over Unauthorized Tracking and Biometric Data Collection
Google fined $1.375B by Texas for secretly tracking location and biometric data without user consent.
SonicWall customers confront resurgence of actively exploited vulnerabilities | CyberScoop
The network security device vendor is making a regular appearance on CISA’s known exploited vulnerabilities catalog. Unlike its competitors, SonicWall hasn’t signed the secure-by-design pledge.
Friday Squid Blogging: Japanese Divers Video Giant Squid - Schneier on Security
The video is really amazing. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
A cyber attack briefly disrupted South African Airways operations
A cyberattack briefly disrupted South African Airways' website, app, and systems, but core flight operations remained unaffected.
Ascension says recent data breach affects over 430,000 patients
Ascension, one of the largest private healthcare systems in the United States, has revealed that a data breach disclosed last month affects the personal and healthcare information of over 430,000 patients.
Three Russians, one Kazakhstani charged in takedown of Anyproxy and 5socks botnets
U.S. prosecutors charged four foreign nationals and said a law enforcement operation seized internet domains associated with two powerful botnets.
Senators move to quash the use of Chinese AI system by federal contractors | CyberScoop
Sens. Cassidy and Rosen cite the possibility that the use of DeepSeek to carry out contract work may put sensitive federal data in the hands of the Chinese government.
German operation shuts down crypto mixer eXch, seizes millions in assets
Infrastructure and digital assets from the cryptocurrency mixer eXch — believed to be involved with the laundering of funds from the ByBit hack — are now in the hands of German authorities.
Police dismantles botnet selling hacked routers as residential proxies
Law enforcement authorities have dismantled a botnet that infected thousands of routers over the last 20 years to build two networks of residential proxies known as Anyproxy and 5socks.
Google Chrome to use on-device AI to detect tech support scams
Google is implementing a new Chrome security feature that uses the built-in 'Gemini Nano' large-language model (LLM) to detect and block tech support scams while browsing the web.
Google Chrome will use AI to block tech support scam websites
Google announced it will equip Chrome with an AI driven method to detect and block Tech Support Scam websites
Hackers hijack Japanese financial accounts to conduct nearly $2 billion in trades
Japanese finance regulators said that in April alone, nine securities firms reported 2,746 fraudulent transactions conducted through nearly 5,000 accounts that were breached by hackers.
OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
OtterCookie v4 adds VM evasion and MetaMask theft in April 2025, signaling rapid malware evolution.
BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. - Dutch Operation
Dutch and U.S. law enforcement have dismantled a long-running criminal proxy botnet powered by over 7,000 infected IoT and end-of-life (EoL) devices
Lostkeys, le malware utilisé par les pirates russes pour voler des fichiers aux pays occidentaux
L'équipe de renseignement sur les menaces de Google a associé le malware Lostkeys, capable de dérober des fichiers à partir d'extensions codées...-Cybersécurité
Chinese hackers behind attacks targeting SAP NetWeaver servers
Forescout Vedere Labs security researchers have linked ongoing attacks targeting a maximum severity vulnerability impacting SAP NetWeaver instances to a Chinese threat actor.
CIOs pay too much for not enough IT security
Cyber system complexity and a lack of adequate tools are adding to enterprise IT headaches, according to Logicalis Group.
Germany takes down eXch cryptocurrency exchange, seizes servers
The Federal police in Germany (BKA) seized the server infrastructure and shut down the 'eXch' cryptocurrency exchange platform for alleged money laundering cybercrime proceeds.
Apache ActiveMQ 6.1.6 - Denial of Service (DOS)
Apache ActiveMQ 6.1.6 - Denial of Service (DOS). CVE-2025-27533 . remote exploit for Multiple platform
The OWASP Top 10 for LLMs: CSA’s Defense Playbook | CSA
The OWASP Top 10 for LLM Applications provide a standardized framework for the most critical vulnerabilities facing AI systems. Map them to CSA best practices.
Microsoft Windows 11 Pro 23H2 - Ancillary Function Driver for WinSock Privilege Escalation
Microsoft Windows 11 Pro 23H2 - Ancillary Function Driver for WinSock Privilege Escalation. CVE-2024-38193 . local exploit for Windows platform
Cybercriminal services target end-of-life routers, FBI warns
The FBI warns that attackers are using end-of-life routers to deploy malware and turn them into proxies sold on 5Socks and Anyproxy networks.