Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29739 bookmarks
Custom sorting
Duping Cloud Functions: An emerging serverless attack vector
Duping Cloud Functions: An emerging serverless attack vector
Cisco Talos built on Tenable’s discovery of a Google Cloud Platform vulnerability to uncover how attackers could exploit similar techniques across AWS and Azure.
·blog.talosintelligence.com·
Duping Cloud Functions: An emerging serverless attack vector
DoorDash Hack - Schneier on Security
DoorDash Hack - Schneier on Security
A DoorDash driver stole over $2.5 million over several months: The driver, Sayee Chaitainya Reddy Devagiri, placed expensive orders from a fraudulent customer account in the DoorDash app. Then, using DoorDash employee credentials, he manually assigned the orders to driver accounts he and the others involved had created. Devagiri would then mark the undelivered orders as complete and prompt DoorDash’s system to pay the driver accounts. Then he’d switch those same orders back to “in process” and do it all over again. Doing this “took less than five minutes, and was repeated hundreds of times for many of the orders,” writes the US Attorney’s Office...
·schneier.com·
DoorDash Hack - Schneier on Security
Mounting GenAI Cyber Risks Spur Investment in AI Security
Mounting GenAI Cyber Risks Spur Investment in AI Security
Thales found that 73% of organizations are investing in AI-specific security tools, amid surging takeup of GenAI tools in enterprises
·infosecurity-magazine.com·
Mounting GenAI Cyber Risks Spur Investment in AI Security
Consent Phishing: Bypassing MFA with OAuth | CSA
Consent Phishing: Bypassing MFA with OAuth | CSA
Explore how consent phishing exploits OAuth to bypass MFA, granting attackers persistent access to SaaS apps. Learn strategies to defend against this threat.
·cloudsecurityalliance.org·
Consent Phishing: Bypassing MFA with OAuth | CSA
Malware-infected printer delivered something extra to Windows users
Malware-infected printer delivered something extra to Windows users
You'd hope that spending $6,000 on a printer would give you a secure experience, free from viruses and other malware. However, in the case of Procolored printers, you'd be wrong.
·malwarebytes.com·
Malware-infected printer delivered something extra to Windows users
OpenAI plans to combine multiple models into GPT-5
OpenAI plans to combine multiple models into GPT-5
OpenAI is planning to combine multiple products (features or models) into its next foundational model, which is called GPT-5.
·bleepingcomputer.com·
OpenAI plans to combine multiple models into GPT-5
Fake KeePass password manager leads to ESXi ransomware attack
Fake KeePass password manager leads to ESXi ransomware attack
Threat actors have been distributing trojanized versions of the KeePass password manager for at least eight months to install Cobalt Strike beacons, steal credentials, and ultimately, deploy ransomware on the breached network.
·bleepingcomputer.com·
Fake KeePass password manager leads to ESXi ransomware attack
O2 UK patches bug leaking mobile user location from call metadata
O2 UK patches bug leaking mobile user location from call metadata
A flaw in O2 UK's implementation of VoLTE and WiFi Calling technologies could allow anyone to expose the general location of a person and other identifiers by calling the target.
·bleepingcomputer.com·
O2 UK patches bug leaking mobile user location from call metadata
Windows 10 emergency updates fix BitLocker recovery issues
Windows 10 emergency updates fix BitLocker recovery issues
Microsoft has released out-of-band updates to fix a known issue causing Windows 10 systems to boot into BitLocker recovery after installing the May 2025 security updates.
·bleepingcomputer.com·
Windows 10 emergency updates fix BitLocker recovery issues
Microsoft unveils Windows AI Foundry for AI-powered PC apps
Microsoft unveils Windows AI Foundry for AI-powered PC apps
Microsoft is replacing 'Copilot Runtime' with Windows AI Foundry to help developers build, experiment, and reach users with AI experiences in their apps.
·bleepingcomputer.com·
Microsoft unveils Windows AI Foundry for AI-powered PC apps
MY TAKE: Semantics aside, “agentic AI” is already reshaping how we work, think, envision what’s next
MY TAKE: Semantics aside, “agentic AI” is already reshaping how we work, think, envision what’s next
Stephen Klein didn’t just stir the pot. He lit a fire. Related: Klein's LinkedIn debate In a sharply worded post that quickly went viral on LinkedIn, the technologist and academic took direct aim at what he called the “hype-as-a-service” business model behind so-called agentic AI. His critique was blunt: what the industry is selling as
·lastwatchdog.com·
MY TAKE: Semantics aside, “agentic AI” is already reshaping how we work, think, envision what’s next
Microsoft open-sources Windows Subsystem for Linux at Build 2025
Microsoft open-sources Windows Subsystem for Linux at Build 2025
Microsoft has open-sourced the Windows Subsystem for Linux (WSL), making its source code available on GitHub, except for a few components that are part of Windows.
·bleepingcomputer.com·
Microsoft open-sources Windows Subsystem for Linux at Build 2025
Microsoft confirms new "Advanced" Settings for Windows 11
Microsoft confirms new "Advanced" Settings for Windows 11
At the Build 2025 developer conference, Microsoft announced a new 'Advanced Settings' feature to help users and developers personalize the OS experience.
·bleepingcomputer.com·
Microsoft confirms new "Advanced" Settings for Windows 11