Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31466 bookmarks
Custom sorting
House passes legislation to criminalize nonconsensual deepfakes | CyberScoop
House passes legislation to criminalize nonconsensual deepfakes | CyberScoop
The Take It Down Act received rare levels of bipartisan support in the House and Senate, but critics fear enforcement could threaten First Amendment protections and unduly burden smaller companies and encrypted applications.
·cyberscoop.com·
House passes legislation to criminalize nonconsensual deepfakes | CyberScoop
Microsoft fixes Outlook paste, blank calendar rendering issues
Microsoft fixes Outlook paste, blank calendar rendering issues
Microsoft has confirmed several issues affecting Microsoft 365 customers using the "paste special' option and the calendar feature in the classic Outlook email client.
·bleepingcomputer.com·
Microsoft fixes Outlook paste, blank calendar rendering issues
New WordPress Malware Masquerades as Plugin
New WordPress Malware Masquerades as Plugin
New WordPress malware disguised as a plugin gives attackers persistent access and injects malicious code enabling administrative control
·infosecurity-magazine.com·
New WordPress Malware Masquerades as Plugin
RSAC Fireside Chat: Shift left, think forward — why MDR is emerging as cyber’s silver bullet
RSAC Fireside Chat: Shift left, think forward — why MDR is emerging as cyber’s silver bullet
With RSAC kicking off next week, the conversation is shifting—literally. Cybersecurity pros are rethinking how “shift left” applies not just to code, but to enterprise risk. Related: Making sense of threat detection In this Fireside Chat, I spoke with John DiLullo, CEO of Deepwatch, who makes a compelling case for how Managed Detection and Response
·lastwatchdog.com·
RSAC Fireside Chat: Shift left, think forward — why MDR is emerging as cyber’s silver bullet
Google: 97 zero-days exploited in 2024, over 50% in spyware attacks
Google: 97 zero-days exploited in 2024, over 50% in spyware attacks
Google's Threat Intelligence Group (GTIG) says attackers exploited 75 zero-day vulnerabilities in the wild last year, over 50% of which were linked to spyware attacks.
·bleepingcomputer.com·
Google: 97 zero-days exploited in 2024, over 50% in spyware attacks
CISA tags Broadcom Fabric OS, CommVault flaws as exploited in attacks
CISA tags Broadcom Fabric OS, CommVault flaws as exploited in attacks
The U.S. Cybersecurity & Infrastructure Security Agency (CISA) is warning of Broadcom Brocade Fabric OS, Commvault web servers, and Qualitia Active! Mail clients vulnerabilities that are actively exploited in attacks.
·bleepingcomputer.com·
CISA tags Broadcom Fabric OS, CommVault flaws as exploited in attacks
New Gremlin Infostealer Distributed on Telegram
New Gremlin Infostealer Distributed on Telegram
Administrators of a Telegram channel named CoderSharp have been advertising Gremlin Stealer since March 2025
·infosecurity-magazine.com·
New Gremlin Infostealer Distributed on Telegram
A New Era for Compliance | Compliance Automation | CSA
A New Era for Compliance | Compliance Automation | CSA
The Compliance Automation Revolution is a CSA initiative to develop methods to automatically gather compliance evidence, harmonize frameworks, & quantify risk.
·cloudsecurityalliance.org·
A New Era for Compliance | Compliance Automation | CSA
Product Walkthrough: Securing Microsoft Copilot with Reco
Product Walkthrough: Securing Microsoft Copilot with Reco
Find out how Reco keeps Microsoft 365 Copilot safe by spotting risky prompts, protecting data, managing user access, and identifying threats.
·thehackernews.com·
Product Walkthrough: Securing Microsoft Copilot with Reco
Applying Security Engineering to Prompt Injection Security - Schneier on Security
Applying Security Engineering to Prompt Injection Security - Schneier on Security
This seems like an important advance in LLM security against prompt injection: Google DeepMind has unveiled CaMeL (CApabilities for MachinE Learning), a new approach to stopping prompt-injection attacks that abandons the failed strategy of having AI models police themselves. Instead, CaMeL treats language models as fundamentally untrusted components within a secure software framework, creating clear boundaries between user commands and potentially malicious content. […] To understand CaMeL, you need to understand that prompt injections happen when AI systems can’t distinguish between legitimate user commands and malicious instructions hidden in content they’re processing...
·schneier.com·
Applying Security Engineering to Prompt Injection Security - Schneier on Security
Year in Review: AI based threats
Year in Review: AI based threats
2024 wasn't the year that AI rewrote the cybercrime playbook — but it did turbocharge some of the old tricks. Read this summary of AI-based threats, from Talos' 2024 Year in Review.
·blog.talosintelligence.com·
Year in Review: AI based threats
When to Hire a GDPR Auditor | CSA
When to Hire a GDPR Auditor | CSA
Discover when to engage a GDPR auditor and how platforms streamline compliance with automated tools and expert support.
·cloudsecurityalliance.org·
When to Hire a GDPR Auditor | CSA