Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31201 bookmarks
Custom sorting
Apache Parquet exploit tool detect servers vulnerable to critical flaw
Apache Parquet exploit tool detect servers vulnerable to critical flaw
A proof-of-concept exploit has been publicly released for a maximum severity Apache Parquet vulnerability, tracked as CVE-2025-30065, making it easy to find vulnerable servers.
·bleepingcomputer.com·
Apache Parquet exploit tool detect servers vulnerable to critical flaw
Samsung MagicINFO 9 Server RCE flaw now exploited in attacks
Samsung MagicINFO 9 Server RCE flaw now exploited in attacks
Hackers are exploiting an unauthenticated remote code execution (RCE) vulnerability in the Samsung MagicINFO 9 Server to hijack devices and deploy malware.
·bleepingcomputer.com·
Samsung MagicINFO 9 Server RCE flaw now exploited in attacks
NIST loses key cyber experts in standards and research
NIST loses key cyber experts in standards and research
The head of the agency’s Computer Security Division and roughly a dozen of his subordinates took the Trump administration’s retirement offers, placing key programs at risk.
·cybersecuritydive.com·
NIST loses key cyber experts in standards and research
Critical Langflow RCE flaw exploited to hack AI app servers
Critical Langflow RCE flaw exploited to hack AI app servers
The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has tagged a Langflow remote code execution vulnerability as actively exploited, urging organizations to apply security updates and mitigations as soon as possible.
·bleepingcomputer.com·
Critical Langflow RCE flaw exploited to hack AI app servers
RSAC Strategic Reel: Cyber experts on the front lines unpack ‘Shadow AI,’ ‘Ground Truth’ - The Last Watchdog
RSAC Strategic Reel: Cyber experts on the front lines unpack ‘Shadow AI,’ ‘Ground Truth’ - The Last Watchdog
The response to our first LastWatchdog Strategic Reel has been energizing — and telling. Related: What is a cyber kill chain? The appetite for crisp, credible insight is alive and well. As the LinkedIn algo picked up steam and auto-captioning kicked in, it became clear that this short-form format resonates. Not just because it’s fast
·lastwatchdog.com·
RSAC Strategic Reel: Cyber experts on the front lines unpack ‘Shadow AI,’ ‘Ground Truth’ - The Last Watchdog
UK Legal Aid Agency investigates cybersecurity incident
UK Legal Aid Agency investigates cybersecurity incident
The Legal Aid Agency (LAA), an executive agency of the UK's Ministry of Justice that oversees billions in legal funding, warned law firms of a security incident and said the attackers might have accessed financial information.
·bleepingcomputer.com·
UK Legal Aid Agency investigates cybersecurity incident
New Microsoft 365 outage impacts Teams and other services
New Microsoft 365 outage impacts Teams and other services
Microsoft is investigating a new Microsoft 365 outage affecting multiple services across North America, including the company's Teams collaboration platform.
·bleepingcomputer.com·
New Microsoft 365 outage impacts Teams and other services
Secure Vibe Coding: Level Up with Cursor Rules | CSA
Secure Vibe Coding: Level Up with Cursor Rules | CSA
Being aware of “Vibe Coding” security risks isn't enough. Cursor Rules offer a powerful way to shape AI behavior and ensure secure code generation.
·cloudsecurityalliance.org·
Secure Vibe Coding: Level Up with Cursor Rules | CSA
Why EASM is vital to modern digital risk protection
Why EASM is vital to modern digital risk protection
You can't protect what you can't see. From shadow IT to supplier risk, modern attack surfaces are sprawling fast — and External Attack Surface Management (EASM) is how security teams take back control. Learn from Outpost24 how EASM powers proactive digital risk protection.
·bleepingcomputer.com·
Why EASM is vital to modern digital risk protection
Multiple iHeartRadio stations breached in December
Multiple iHeartRadio stations breached in December
Several radio stations owned by iHeartMedia were breached in December, exposing Social Security numbers, financial information and more.
·therecord.media·
Multiple iHeartRadio stations breached in December
Google fixes actively exploited FreeType flaw on Android
Google fixes actively exploited FreeType flaw on Android
Google has released the May 2025 security updates for Android with fixes for 45 security flaws, including an actively exploited zero-click FreeType 2 code execution vulnerability.
·bleepingcomputer.com·
Google fixes actively exploited FreeType flaw on Android