Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29738 bookmarks
Custom sorting
Google Chrome to use on-device AI to detect tech support scams
Google Chrome to use on-device AI to detect tech support scams
Google is implementing a new Chrome security feature that uses the built-in 'Gemini Nano' large-language model (LLM) to detect and block tech support scams while browsing the web.
·bleepingcomputer.com·
Google Chrome to use on-device AI to detect tech support scams
Chinese hackers behind attacks targeting SAP NetWeaver servers
Chinese hackers behind attacks targeting SAP NetWeaver servers
Forescout Vedere Labs security researchers have linked ongoing attacks targeting a maximum severity vulnerability impacting SAP NetWeaver instances to a Chinese threat actor.
·bleepingcomputer.com·
Chinese hackers behind attacks targeting SAP NetWeaver servers
CIOs pay too much for not enough IT security
CIOs pay too much for not enough IT security
Cyber system complexity and a lack of adequate tools are adding to enterprise IT headaches, according to Logicalis Group.
·cybersecuritydive.com·
CIOs pay too much for not enough IT security
Germany takes down eXch cryptocurrency exchange, seizes servers
Germany takes down eXch cryptocurrency exchange, seizes servers
The Federal police in Germany (BKA) seized the server infrastructure and shut down the 'eXch' cryptocurrency exchange platform for alleged money laundering cybercrime proceeds.
·bleepingcomputer.com·
Germany takes down eXch cryptocurrency exchange, seizes servers
The OWASP Top 10 for LLMs: CSA’s Defense Playbook | CSA
The OWASP Top 10 for LLMs: CSA’s Defense Playbook | CSA
The OWASP Top 10 for LLM Applications provide a standardized framework for the most critical vulnerabilities facing AI systems. Map them to CSA best practices.
·cloudsecurityalliance.org·
The OWASP Top 10 for LLMs: CSA’s Defense Playbook | CSA
VirtualBox 7.0.16 - Privilege Escalation
VirtualBox 7.0.16 - Privilege Escalation
VirtualBox 7.0.16 - Privilege Escalation. CVE-2024-21111 . local exploit for Windows platform
·exploit-db.com·
VirtualBox 7.0.16 - Privilege Escalation
A CISO's Guide to Reporting on Cloud Security | CSA
A CISO's Guide to Reporting on Cloud Security | CSA
Reporting is one of the most important parts of being a CISO. There’s a big difference between saying “trust me, we’re secure” and proving it with data.
·cloudsecurityalliance.org·
A CISO's Guide to Reporting on Cloud Security | CSA
UN Launches New Cyber-Attack Assessment Framework
UN Launches New Cyber-Attack Assessment Framework
The UNIDR Intrusion Path is designed to provide a simplified view of cyber-threats and security across the network perimeter
·infosecurity-magazine.com·
UN Launches New Cyber-Attack Assessment Framework
Lumma Stealer, coming and going
Lumma Stealer, coming and going
The high-profile information stealer switches up its TTPs, but keeps the CAPTCHA tactic; we take a deep dive
·news.sophos.com·
Lumma Stealer, coming and going
Lumma Stealer, coming and going
Lumma Stealer, coming and going
The high-profile information stealer switches up its TTPs, but keeps the CAPTCHA tactic; we take a deep dive
·news.sophos.com·
Lumma Stealer, coming and going
PowerSchool Admits Ransom Payment Amid Fresh Extortion Demands
PowerSchool Admits Ransom Payment Amid Fresh Extortion Demands
PowerSchool said its customers had been hit by new extortion demands using data stolen in a previous attack, despite attacker claims the data had been deleted
·infosecurity-magazine.com·
PowerSchool Admits Ransom Payment Amid Fresh Extortion Demands