Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31198 bookmarks
Custom sorting
The OWASP Top 10 for LLMs: CSA’s Defense Playbook | CSA
The OWASP Top 10 for LLMs: CSA’s Defense Playbook | CSA
The OWASP Top 10 for LLM Applications provide a standardized framework for the most critical vulnerabilities facing AI systems. Map them to CSA best practices.
·cloudsecurityalliance.org·
The OWASP Top 10 for LLMs: CSA’s Defense Playbook | CSA
VirtualBox 7.0.16 - Privilege Escalation
VirtualBox 7.0.16 - Privilege Escalation
VirtualBox 7.0.16 - Privilege Escalation. CVE-2024-21111 . local exploit for Windows platform
·exploit-db.com·
VirtualBox 7.0.16 - Privilege Escalation
A CISO's Guide to Reporting on Cloud Security | CSA
A CISO's Guide to Reporting on Cloud Security | CSA
Reporting is one of the most important parts of being a CISO. There’s a big difference between saying “trust me, we’re secure” and proving it with data.
·cloudsecurityalliance.org·
A CISO's Guide to Reporting on Cloud Security | CSA
UN Launches New Cyber-Attack Assessment Framework
UN Launches New Cyber-Attack Assessment Framework
The UNIDR Intrusion Path is designed to provide a simplified view of cyber-threats and security across the network perimeter
·infosecurity-magazine.com·
UN Launches New Cyber-Attack Assessment Framework
Lumma Stealer, coming and going
Lumma Stealer, coming and going
The high-profile information stealer switches up its TTPs, but keeps the CAPTCHA tactic; we take a deep dive
·news.sophos.com·
Lumma Stealer, coming and going
Lumma Stealer, coming and going
Lumma Stealer, coming and going
The high-profile information stealer switches up its TTPs, but keeps the CAPTCHA tactic; we take a deep dive
·news.sophos.com·
Lumma Stealer, coming and going
PowerSchool Admits Ransom Payment Amid Fresh Extortion Demands
PowerSchool Admits Ransom Payment Amid Fresh Extortion Demands
PowerSchool said its customers had been hit by new extortion demands using data stolen in a previous attack, despite attacker claims the data had been deleted
·infosecurity-magazine.com·
PowerSchool Admits Ransom Payment Amid Fresh Extortion Demands
FBI: End-of-life routers hacked for cybercrime proxy networks
FBI: End-of-life routers hacked for cybercrime proxy networks
The FBI warns that threat actors are deploying malware on end-of-life (EoL) routers to convert them into proxies sold on the 5Socks and Anyproxy networks.
·bleepingcomputer.com·
FBI: End-of-life routers hacked for cybercrime proxy networks
Cisco fixes max severity IOS XE flaw letting attackers hijack devices
Cisco fixes max severity IOS XE flaw letting attackers hijack devices
Cisco has fixed a maximum severity flaw in IOS XE Software for Wireless LAN Controllers by a hard-coded JSON Web Token (JWT) that allows an unauthenticated remote attacker to take over devices.
·bleepingcomputer.com·
Cisco fixes max severity IOS XE flaw letting attackers hijack devices
Supply chain attack hits npm package with 45,000 weekly downloads
Supply chain attack hits npm package with 45,000 weekly downloads
An npm package named 'rand-user-agent' has been compromised in a supply chain attack to inject obfuscated code that activates a remote access trojan (RAT) on the user's system.
·bleepingcomputer.com·
Supply chain attack hits npm package with 45,000 weekly downloads