Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29738 bookmarks
Custom sorting
Large-Scale Phishing Campaigns Target Russia and Ukraine
Large-Scale Phishing Campaigns Target Russia and Ukraine
A large-scale phishing campaign using DarkWatchman and Sheriff malware has been observed targeting companies in Russia and Ukraine
·infosecurity-magazine.com·
Large-Scale Phishing Campaigns Target Russia and Ukraine
5 Security Questionnaire Steps to Automate Today | CSA
5 Security Questionnaire Steps to Automate Today | CSA
One way to lighten the load of security questionnaires is to automate certain parts of the process. Automate these 5 steps for a more efficient workflow.
·cloudsecurityalliance.org·
5 Security Questionnaire Steps to Automate Today | CSA
Mystery Box Scams Deployed to Steal Credit Card Data
Mystery Box Scams Deployed to Steal Credit Card Data
Bitdefender highlighted the growing use of subscription scams, in which victims are lured by adverts into recurring payments for fake products
·infosecurity-magazine.com·
Mystery Box Scams Deployed to Steal Credit Card Data
Backdoor found in popular ecommerce components
Backdoor found in popular ecommerce components
Multiple vendors were hacked in a coordinated supply chain attack, Sansec found 21 applications with the same backdoor. Curiously, the malware was injected 6...
·sansec.io·
Backdoor found in popular ecommerce components
The 3 biggest cybersecurity threats to small businesses
The 3 biggest cybersecurity threats to small businesses
These 3 cybersecurity threats may not be the most sophisticated, but they're the most effective—and serious—threats for small businesses.
·malwarebytes.com·
The 3 biggest cybersecurity threats to small businesses
AI vs. AI: The new cybersecurity battle | CSA
AI vs. AI: The new cybersecurity battle | CSA
​AI enables attackers to craft convincing scams at scale, using deepfakes and typosquatting to bypass traditional defenses. Proactive AI security is essential.​
·cloudsecurityalliance.org·
AI vs. AI: The new cybersecurity battle | CSA
Two SonicWall SMA100 flaws actively exploited in the wild
Two SonicWall SMA100 flaws actively exploited in the wild
SonicWall confirmed that threat actors actively exploited two vulnerabilities impacting its SMA100 Secure Mobile Access (SMA) appliances.
·securityaffairs.com·
Two SonicWall SMA100 flaws actively exploited in the wild
FBI Publishes 42,000 LabHost Phishing Domains
FBI Publishes 42,000 LabHost Phishing Domains
The FBI has released details of 42,000 phishing domains associated with the LabHost operation, in order to help the security community
·infosecurity-magazine.com·
FBI Publishes 42,000 LabHost Phishing Domains
Hackers abuse IPv6 networking feature to hijack software updates
Hackers abuse IPv6 networking feature to hijack software updates
A China-aligned APT threat actor named "TheWizards" abuses an IPv6 networking feature to launch adversary-in-the-middle (AitM) attacks that hijack software updates to install Windows malware.
·bleepingcomputer.com·
Hackers abuse IPv6 networking feature to hijack software updates
Alleged ‘Scattered Spider’ Member Extradited to U.S.
Alleged ‘Scattered Spider’ Member Extradited to U.S.
A 23-year-old Scottish man thought to be a member of the prolific Scattered Spider cybercrime group was extradited last week from Spain to the United States, where he is facing charges of wire fraud, conspiracy and identity theft. U.S. prosecutors…
·krebsonsecurity.com·
Alleged ‘Scattered Spider’ Member Extradited to U.S.