Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31742 bookmarks
Custom sorting
WhatsApp flaw can let attackers run malicious code on Windows PCs
WhatsApp flaw can let attackers run malicious code on Windows PCs
Meta warned Windows users to update the WhatsApp messaging app to the latest version to patch a vulnerability that can let attackers execute malicious code on their devices.
·bleepingcomputer.com·
WhatsApp flaw can let attackers run malicious code on Windows PCs
New Mirai botnet behind surge in TVT DVR exploitation
New Mirai botnet behind surge in TVT DVR exploitation
A significant spike in exploitation attempts targeting TVT NVMS9000 DVRs has been detected, peaking on April 3, 2025, with over 2,500 unique IPs scanning for vulnerable devices.
·bleepingcomputer.com·
New Mirai botnet behind surge in TVT DVR exploitation
Google AI taken for a ride by April Fools’ Day joke
Google AI taken for a ride by April Fools’ Day joke
Cwmbran in Wales holds the Guinness World Record for the most roundabouts—at least according to Google AI Overviews. Except that's not actually true...
·malwarebytes.com·
Google AI taken for a ride by April Fools’ Day joke
Ce faux site pour le concert de Jul ose dire aux fans de se méfier des arnaques en ligne
Ce faux site pour le concert de Jul ose dire aux fans de se méfier des arnaques en ligne
Des plateformes de phishing tentent de piéger les fans après l'annonce d'une nouvelle date de concert du rapeur Jul. Ces sites, habilement conçus, imitent à la perfection les vrais portails de billetterie — au point d’alerter les internautes… des arnaques en cours. Les hackers ne ratent jamais un événement. À peine
·numerama.com·
Ce faux site pour le concert de Jul ose dire aux fans de se méfier des arnaques en ligne
AWS rolls out ML-KEM to secure TLS from quantum threats
AWS rolls out ML-KEM to secure TLS from quantum threats
Amazon Web Services (AWS) has added support for the ML-KEM post-quantum key encapsulation mechanism to AWS Key Management Service (KMS), AWS Certificate Manager (ACM), and AWS Secrets Manager, making TLS connections more secure.
·bleepingcomputer.com·
AWS rolls out ML-KEM to secure TLS from quantum threats
Simple Magic: App Cloaking | CSA
Simple Magic: App Cloaking | CSA
​Learn how app cloaking enhances security by hiding private applications from the internet, reducing attack surfaces, and preventing unauthorized access.
·cloudsecurityalliance.org·
Simple Magic: App Cloaking | CSA
Year in Review: Key vulnerabilities, tools, and shifts in attacker email tactics
Year in Review: Key vulnerabilities, tools, and shifts in attacker email tactics
From Talos' 2024 Year in Review, here are some findings from the top targeted network device vulnerabilities. We also explore how threat actors are moving away from time sensitive lures in their emails. And finally we reveal the tools that adversaries most heavily utilized last year.
·blog.talosintelligence.com·
Year in Review: Key vulnerabilities, tools, and shifts in attacker email tactics
Enhance TPRM with Staff Augmentation | CSA
Enhance TPRM with Staff Augmentation | CSA
Learn what third-party risk management (TPRM) entails, what staff augmentation is, and how to decide whether it’s the right solution for your TPRM needs.
·cloudsecurityalliance.org·
Enhance TPRM with Staff Augmentation | CSA
Agentic AI in the SOC - Dawn of Autonomous Alert Triage
Agentic AI in the SOC - Dawn of Autonomous Alert Triage
Agentic AI transforms SOCs by autonomously triaging and investigating 100% of alerts, reducing burnout and improving detection speed.
·thehackernews.com·
Agentic AI in the SOC - Dawn of Autonomous Alert Triage
Arguing Against CALEA - Schneier on Security
Arguing Against CALEA - Schneier on Security
At a Congressional hearing earlier this week, Matt Blaze made the point that CALEA, the 1994 law that forces telecoms to make phone calls wiretappable, is outdated in today’s threat environment and should be rethought: In other words, while the legally-mandated CALEA capability requirements have changed little over the last three decades, the infrastructure that must implement and protect it has changed radically. This has greatly expanded the “attack surface” that must be defended to prevent unauthorized wiretaps, especially at scale. The job of the illegal eavesdropper has gotten significantly easier, with many more options and opportunities for them to exploit. Compromising our telecommunications infrastructure is now little different from performing any other kind of computer intrusion or data breach, a well-known and endemic cybersecurity problem. To put it bluntly, something like Salt Typhoon was inevitable, and will likely happen again unless significant changes are made...
·schneier.com·
Arguing Against CALEA - Schneier on Security