Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29735 bookmarks
Custom sorting
FBI: End-of-life routers hacked for cybercrime proxy networks
FBI: End-of-life routers hacked for cybercrime proxy networks
The FBI warns that threat actors are deploying malware on end-of-life (EoL) routers to convert them into proxies sold on the 5Socks and Anyproxy networks.
·bleepingcomputer.com·
FBI: End-of-life routers hacked for cybercrime proxy networks
Cisco fixes max severity IOS XE flaw letting attackers hijack devices
Cisco fixes max severity IOS XE flaw letting attackers hijack devices
Cisco has fixed a maximum severity flaw in IOS XE Software for Wireless LAN Controllers by a hard-coded JSON Web Token (JWT) that allows an unauthenticated remote attacker to take over devices.
·bleepingcomputer.com·
Cisco fixes max severity IOS XE flaw letting attackers hijack devices
Supply chain attack hits npm package with 45,000 weekly downloads
Supply chain attack hits npm package with 45,000 weekly downloads
An npm package named 'rand-user-agent' has been compromised in a supply chain attack to inject obfuscated code that activates a remote access trojan (RAT) on the user's system.
·bleepingcomputer.com·
Supply chain attack hits npm package with 45,000 weekly downloads
The IT help desk kindly requests you read this newsletter
The IT help desk kindly requests you read this newsletter
How do attackers exploit authority bias to manipulate victims? Martin shares proactive strategies to protect yourself and others in this must-read edition of the Threat Source newsletter.
·blog.talosintelligence.com·
The IT help desk kindly requests you read this newsletter
NICKEL TAPESTRY expands fraudulent worker operations
NICKEL TAPESTRY expands fraudulent worker operations
The North Korean IT worker scheme grows to include organizations in Europe and Asia and industries beyond the technology sector
·news.sophos.com·
NICKEL TAPESTRY expands fraudulent worker operations
NICKEL TAPESTRY expands fraudulent worker operations
NICKEL TAPESTRY expands fraudulent worker operations
The North Korean IT worker scheme grows to include organizations in Europe and Asia and industries beyond the technology sector
·news.sophos.com·
NICKEL TAPESTRY expands fraudulent worker operations
Kickidler employee monitoring software abused in ransomware attacks
Kickidler employee monitoring software abused in ransomware attacks
Ransomware operations are using legitimate Kickidler employee monitoring software for reconnaissance, tracking their victims' activity, and harvesting credentials after breaching their networks.
·bleepingcomputer.com·
Kickidler employee monitoring software abused in ransomware attacks
Russian Group Launches LOSTKEYS Malware in Attacks
Russian Group Launches LOSTKEYS Malware in Attacks
New LOSTKEYS malware has been identified and linked to COLDRIVER by GTIG, stealing files and system data in targeted attacks
·infosecurity-magazine.com·
Russian Group Launches LOSTKEYS Malware in Attacks
Passwords in the age of AI: We need to find alternatives
Passwords in the age of AI: We need to find alternatives
The age of AI guessing our passwords is upon us and we need to change the ways we authenticate and use passwords where we have no alternatives.
·malwarebytes.com·
Passwords in the age of AI: We need to find alternatives
Google links new LostKeys data theft malware to Russian cyberspies
Google links new LostKeys data theft malware to Russian cyberspies
Since the start of the year, the Russian state-backed ColdRiver hacking group has been using new LostKeys malware to steal files in espionage attacks targeting Western governments, journalists, think tanks, and non-governmental organizations.
·bleepingcomputer.com·
Google links new LostKeys data theft malware to Russian cyberspies
Cybersecurity for SMB’s: Threats You Can’t Ignore | CSA
Cybersecurity for SMB’s: Threats You Can’t Ignore | CSA
Discover key findings from VikingCloud's 2025 SMB Threat Landscape Report, highlighting the cybersecurity challenges and risks faced by small businesses.
·cloudsecurityalliance.org·
Cybersecurity for SMB’s: Threats You Can’t Ignore | CSA
LockBit Ransomware Hacked, Insider Secrets Exposed
LockBit Ransomware Hacked, Insider Secrets Exposed
The data dump will likely shed light on LockBit’s recent activity and help law enforcement trace cryptocurrency transactions
·infosecurity-magazine.com·
LockBit Ransomware Hacked, Insider Secrets Exposed