Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29738 bookmarks
Custom sorting
Threat actors abuse Google Apps Script in evasive phishing attacks
Threat actors abuse Google Apps Script in evasive phishing attacks
Threat actors are abusing the trusted Google platform 'Google Apps Script' to host phishing pages, making them appear legitimate and eliminating the risk of them getting flagged by security tools.
¡bleepingcomputer.com¡
Threat actors abuse Google Apps Script in evasive phishing attacks
Apple Safari exposes users to fullscreen browser-in-the-middle attacks
Apple Safari exposes users to fullscreen browser-in-the-middle attacks
A weakness in Apple's Safari web browser allows threat actors to leverage the fullscreen browser-in-the-middle (BitM) technique to steal account credentials from unsuspecting users.
¡bleepingcomputer.com¡
Apple Safari exposes users to fullscreen browser-in-the-middle attacks
US sanctions firm linked to cyber scams behind $200 million in losses
US sanctions firm linked to cyber scams behind $200 million in losses
The U.S. Treasury Department has sanctioned Funnull Technology, a Philippines-based company that supports hundreds of thousands of malicious websites behind cyber scams linked to over $200 million in losses for Americans.
¡bleepingcomputer.com¡
US sanctions firm linked to cyber scams behind $200 million in losses
Cybercriminals exploit AI hype to spread ransomware, malware
Cybercriminals exploit AI hype to spread ransomware, malware
Threat actors linked to lesser-known ransomware and malware projects now use AI tools as lures to infect unsuspecting victims with malicious payloads.
¡bleepingcomputer.com¡
Cybercriminals exploit AI hype to spread ransomware, malware
Attackers are mapping your attack surface—are you?
Attackers are mapping your attack surface—are you?
Attackers are mapping your infrastructure before you even realize what's exposed. Sprocket ASM flips the script — giving you the same recon capabilities they use, plus change detection and actionable insights to close gaps fast. See your attack surface the way hackers do and beat them to it.
¡bleepingcomputer.com¡
Attackers are mapping your attack surface—are you?
The True Costs of Legacy Privileged Access Management | CSA
The True Costs of Legacy Privileged Access Management | CSA
Legacy Privileged Access Management (PAM) quietly drains resources, stalls innovation, & introduces security risks. It’s time to consider a modern alternative.
¡cloudsecurityalliance.org¡
The True Costs of Legacy Privileged Access Management | CSA
Deepfake-posting man faces huge $450,000 fine
Deepfake-posting man faces huge $450,000 fine
A man is facing a $450,000 AU fine after he published deepfake images of prominent Australian women on the now-defunct MrDeepfakes...
¡malwarebytes.com¡
Deepfake-posting man faces huge $450,000 fine
Cybercriminals camouflaging threats as AI tool installers
Cybercriminals camouflaging threats as AI tool installers
Cisco Talos has uncovered new threats, including ransomware like CyberLock and Lucky_Gh0$t, and a destructive malware called Numero, all disguised as legitimate AI tool installers to target victims.
¡blog.talosintelligence.com¡
Cybercriminals camouflaging threats as AI tool installers
Multimodal AI Faces New Safety Threats | CSA
Multimodal AI Faces New Safety Threats | CSA
Enkrypt AI's new report reveals critical safety flaws in multimodal models, exposing risks like CSEM content and CBRN info via hidden image prompts.
¡cloudsecurityalliance.org¡
Multimodal AI Faces New Safety Threats | CSA
Surveillance Via Smart Toothbrush - Schneier on Security
Surveillance Via Smart Toothbrush - Schneier on Security
The only links are from The Daily Mail and The Mirror, but a marital affair was discovered because the cheater was recorded using his smart toothbrush at home when he was supposed to be at work.
¡schneier.com¡
Surveillance Via Smart Toothbrush - Schneier on Security
RSAC Fireside Chat: Cyber risk mitigation turns personal–defending the CEO as an attack vector
RSAC Fireside Chat: Cyber risk mitigation turns personal–defending the CEO as an attack vector
Executives are under digital siege—and most don't even know it. Related: Shareholders sue over murder At RSAC 2025, I sat down with Chuck Randolph, SVP of Strategic Intelligence and Security at 360 Privacy, to unpack a trend reshaping the threat landscape: the weaponization of personal data against corporate leaders and high-net-worth individuals. For a full
¡lastwatchdog.com¡
RSAC Fireside Chat: Cyber risk mitigation turns personal–defending the CEO as an attack vector
Meet Burp Suite DAST: Your questions answered
Meet Burp Suite DAST: Your questions answered
We recently hosted a webinar to introduce Burp Suite DAST, the new name for Burp Suite Enterprise Edition, the best-in-class, automated web application and API security scanning solution for modern Ap
¡portswigger.net¡
Meet Burp Suite DAST: Your questions answered