Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31199 bookmarks
Custom sorting
The IT help desk kindly requests you read this newsletter
The IT help desk kindly requests you read this newsletter
How do attackers exploit authority bias to manipulate victims? Martin shares proactive strategies to protect yourself and others in this must-read edition of the Threat Source newsletter.
¡blog.talosintelligence.com¡
The IT help desk kindly requests you read this newsletter
NICKEL TAPESTRY expands fraudulent worker operations
NICKEL TAPESTRY expands fraudulent worker operations
The North Korean IT worker scheme grows to include organizations in Europe and Asia and industries beyond the technology sector
¡news.sophos.com¡
NICKEL TAPESTRY expands fraudulent worker operations
NICKEL TAPESTRY expands fraudulent worker operations
NICKEL TAPESTRY expands fraudulent worker operations
The North Korean IT worker scheme grows to include organizations in Europe and Asia and industries beyond the technology sector
¡news.sophos.com¡
NICKEL TAPESTRY expands fraudulent worker operations
Kickidler employee monitoring software abused in ransomware attacks
Kickidler employee monitoring software abused in ransomware attacks
Ransomware operations are using legitimate Kickidler employee monitoring software for reconnaissance, tracking their victims' activity, and harvesting credentials after breaching their networks.
¡bleepingcomputer.com¡
Kickidler employee monitoring software abused in ransomware attacks
Russian Group Launches LOSTKEYS Malware in Attacks
Russian Group Launches LOSTKEYS Malware in Attacks
New LOSTKEYS malware has been identified and linked to COLDRIVER by GTIG, stealing files and system data in targeted attacks
¡infosecurity-magazine.com¡
Russian Group Launches LOSTKEYS Malware in Attacks
Passwords in the age of AI: We need to find alternatives
Passwords in the age of AI: We need to find alternatives
The age of AI guessing our passwords is upon us and we need to change the ways we authenticate and use passwords where we have no alternatives.
¡malwarebytes.com¡
Passwords in the age of AI: We need to find alternatives
Google links new LostKeys data theft malware to Russian cyberspies
Google links new LostKeys data theft malware to Russian cyberspies
Since the start of the year, the Russian state-backed ColdRiver hacking group has been using new LostKeys malware to steal files in espionage attacks targeting Western governments, journalists, think tanks, and non-governmental organizations.
¡bleepingcomputer.com¡
Google links new LostKeys data theft malware to Russian cyberspies
Cybersecurity for SMB’s: Threats You Can’t Ignore | CSA
Cybersecurity for SMB’s: Threats You Can’t Ignore | CSA
Discover key findings from VikingCloud's 2025 SMB Threat Landscape Report, highlighting the cybersecurity challenges and risks faced by small businesses.
¡cloudsecurityalliance.org¡
Cybersecurity for SMB’s: Threats You Can’t Ignore | CSA
LockBit Ransomware Hacked, Insider Secrets Exposed
LockBit Ransomware Hacked, Insider Secrets Exposed
The data dump will likely shed light on LockBit’s recent activity and help law enforcement trace cryptocurrency transactions
¡infosecurity-magazine.com¡
LockBit Ransomware Hacked, Insider Secrets Exposed
ISO 42001: Auditing and Implementing Framework | CSA
ISO 42001: Auditing and Implementing Framework | CSA
Explore key insights from auditing and implementing ISO 42001, the international standard guiding responsible AI development and risk management.
¡cloudsecurityalliance.org¡
ISO 42001: Auditing and Implementing Framework | CSA
SonicWall urges admins to patch VPN flaw exploited in attacks
SonicWall urges admins to patch VPN flaw exploited in attacks
SonicWall has urged its customers to patch three security vulnerabilities affecting its Secure Mobile Access (SMA) appliances, one of them tagged as exploited in attacks
¡bleepingcomputer.com¡
SonicWall urges admins to patch VPN flaw exploited in attacks