Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29735 bookmarks
Custom sorting
14 Secure Coding Tips: Learn from the Experts at @Build
14 Secure Coding Tips: Learn from the Experts at @Build
Hey friends! If you are a developer, you know that writing clean and efficient code is just the starting point. Now, with AI playing a bigger role, secure coding isn't just a 'nice-to-have'—it's a must. Whether you're building web apps, working on cloud services, or adding AI to your projects, keeping your code safe is just as important as getting it out the door.  At Microsoft Build 2025, we’re bringing together some of the most influential security engineers, researchers, and developers to share practical tips and modern best practices to help you ship secure code — faster. Here are 14 quick secure coding tips that will make you a better, more security-savvy developer — and the security sessions @Build where you can learn more from the experts:  🎯 1. Secure AI from the start  Discover how to deliver intelligent apps without sacrificing security. This session covers how to protect against threats across code, secrets, dependencies, and even LLMs. Learn how to use Threat Modeling early in the product lifecycle to identify, assess and address security risks. You’ll learn about developer-focused security tools to deploy with confidence without context switching.  Learn more:  Session: “Shift Left: Secure Your Code and AI from the Start”  With Mark Russinovich, CTO, Deputy CISO and Technical Fellow, Microsoft Azure; Marcelo Oliveira, VP, Product Management, GitHub; Neil Coles, Principal Security Engineer  đŸ§Ș 2. Use the Wisdom from the Past   Michael Howard - author of the original secure coding book back in 2003 and now a senior director in the Microsoft Red Team - reflects on 25 years of secure code, how the practice has developed and current challenges in secure development. Get ready  for an end-to-end secure coding journey from Bill Gates anecdotes and tips for how you in 2025 can code securely to meet today's security threats.  Learn more:  Session: “Reflections on 25 years of writing secure code”  With Michael Howard, Senior Director, Red Team 📏3. Lock down the data   Microsoft is releasing a set of Purview APIs (+SDK) that will allow partners and customers to integrate their custom AI apps with the Microsoft Purview ecosystem for enterprise grade Data Security and Compliance outcomes. Join this demo session to get the latest.  Learn more:  Session: “Build secure and compliant AI applications with Microsoft Purview”  With Arpitha Dhanapathi, Principal Product Manager  🔚4. Think about security from start to finish   Security can be challenging at the best of times, especially when it’s not your full-time job. In this session, we walk you through the end-to-end deployment of a secure AI application, all the way from identities, VNETS, NSGs, key vault through to prompt shields and data labelling. If you’ve ever felt overwhelmed by trying to do the right thing by security but didn’t know where to start, this session is for you!  Learn more:  Session: “Deploying an end-to-end secure AI application”  With Sarah Young, Principal Security Advocate & Pamela Fox, Principal Cloud Advocate  đŸ€– 5. Play dev-ils advocate    To keep pace with evolving AI risks, organizations need tools to effectively test their AI systems, simulate adversarial attacks, and uncover weaknesses before bad actors can exploit them. Learn how the AI Red Teaming Agent in Azure AI Foundry can help your organization run automated scans for safety risks so you can leverage Microsoft's deep expertise to scale and accelerate your AI development with Trustworthy AI at the forefront.  Learn more:  Session: “Accelerate AI red teaming for your GenAI apps with Azure AI Foundry”  With Minsoo Thigpen, Senior Product Manager & Nagkumar Arkalgud, Senior Software Engineer  đŸ„·6. Skill up on agents   Agents—they’re all anyone is talking about. Join this demo session to learn how to extend security copilot to facilitate security and IT workflows across your environment.  In this demo you will see how to build an agent with supporting components - plugins and KQL queries - and architect it with triggers to automatically run.  Learn more:  Session: “Building Agents with Security Copilot”  With Vinod Jagannathan, Principal Product Manager  🔐7. Get the inside scoop first  One of the pillars of SFI is securing the engineering system. We will explore changes made to Azure DevOps to enable enhanced engineering system security at Microsoft and how customers can use them to better secure their own engineering systems as well.  Learn more:  Session: “Learn How Microsoft secured the Engineering System”  With Karl Piteira, Principal Group Program Manager & Rajesh Ramamurthy, Senior Director, Principal Group Product Management đŸš©8. Automate what you can   You don’t have to wait to identify risks. The Python Risk Identification Tool for generative AI (PyRIT) is an open source framework built to empower security professionals and engineers to proactively identify risks in generative AI systems. In this hands-on lab, you will learn how to deploy PyRIT and test it against a variety of AI applications.  Learn more:  Session: “AI security testing with PyRIT”  With Roman Lutz, Responsible AI Engineer & Richard Lundeen, Principal Software Engineering Lead - AI Red Team  ⚙ 9. Secure APIs    Join us for an engaging and informative session where we delve into the intricacies of API security in the context of AI. We'll examine the unique challenges posed by AI-driven applications and the sophisticated threats that target their APIs. From unauthorized access and data breaches to injection attacks and exploitation of vulnerabilities, the risks are manifold. However, with the right approach, these risks can be effectively mitigated.  Learn more:  Session: “Fortifying AI Frontiers - Securing APIs the path to your AI app”  With Abhi Singh, Director, Global Black Belt - Security & Preetham Anand Naik, Senior Product Manager  🆔 10. Verify explicitly, and automatically  We all know the saying, but we’ve got to put it into practice. Join this session to learn how to enable automated processes to securely onboard and grant resource access for high-privilege users with the Microsoft Entra Suite and MS Graph. Verify the identities of admins, C-level employees, or others who need access to sensitive internet or on-premises resources, and automatically reverify them at regular intervals. Work with a chosen identity verification partner for government ID-based verification that ensures your organization onboards and grants access to the right person.  Learn more:  Session: “Secure onboarding and access with the Microsoft Entra Suite” With Sri Ponnada, Senior Product Manager  ✅11. Apply best practices    Join us for an insightful session on best practices and enablement topics for developing and deploying secure solutions within Business Applications, as part of the Secure Future Initiative (SFI). We will look holistically at Power Platform features for Security under SFI pillars and explore Responsible AI with Purview and Copilot. We will further explore demos, design review checklists on product features under Secure by Design, Secure by Default, and Secure Operations for BizApps Solutions.  Learn more:  Session: “Building Secure Business Apps: Best Practices for Design to Deployment”  With Muhammad Aurangzeb, Senior Partner Solution Architect  đŸ•¶ïž 12. Use agents for Zero Trust  In this session, you will learn how to build AI Agents using the OpenAI SDK with Assistants and Function Calling for APIs secured by Microsoft Entra ID. This ensures adherence to Zero Trust principles. We will cover the essential steps to set up and configure the OpenAI SDK in a C# environment and demonstrate how to leverage Microsoft Entra ID for secure authentication and authorization.  Learn more:  Session: “Building Secure AI Agents with Microsoft Entra ID”  With Fabian Alves, Senior Product Manager  đŸ˜¶â€đŸŒ«ïž 13. Secure your apps, secure your people   Learn how to enable automated processes to securely onboard and grant resource access for high-privilege users with the Microsoft Entra Suite and MS Graph. Verify the identities of admins, C-level employees, or others who need access to sensitive internet or on-premises resources, and automatically reverify them at regular intervals. Work with a chosen identity verification partner for government ID-based verification that ensures your organization onboards and grants access to the right person.  Learn more:  Session: “Securing Applications with Microsoft Entra ID”  With Robert Stewart, Senior Specialist  đŸ“Č 14. Keep it user-friendly for the best results   In the rapidly evolving landscape of mobile application development, achieving pixel-perfect design and robust security is paramount. This lab focuses on the creation of mobile applications integrated via Native Authentication in Microsoft Entra External ID. Participants will explore the intricacies of designing visually precise user interfaces that align seamlessly with their brand while implementing native authentication methods, ensuring secure and efficient user verification processes.  Learn more:  Session: “Creating pixel-perfect mobile apps with Native Authentication” With Joylynn Kirui, Senior Cloud Security Advocate  💬 Come Learn from the People Building the Future  Join these sessions and more at Microsoft Build 2025. Whether you're a junior dev or a senior architect, you'll walk away with real-world tactics to help you build apps that are secure, scalable, and resilient — by design.    👉 Register for Microsoft Build Security Sessions Now » 
·techcommunity.microsoft.com·
14 Secure Coding Tips: Learn from the Experts at @Build
WhatsApp unveils 'Private Processing' for cloud-based AI features
WhatsApp unveils 'Private Processing' for cloud-based AI features
WhatsApp has announced the introduction of 'Private Processing,' a new technology that enables users to utilize advanced AI features by offloading tasks to privacy-preserving cloud servers.
·bleepingcomputer.com·
WhatsApp unveils 'Private Processing' for cloud-based AI features
SonicWall: SMA100 VPN vulnerabilities now exploited in attacks
SonicWall: SMA100 VPN vulnerabilities now exploited in attacks
Cybersecurity company SonicWall has warned customers that several vulnerabilities impacting its Secure Mobile Access (SMA) appliances are now being actively exploited in attacks.
·bleepingcomputer.com·
SonicWall: SMA100 VPN vulnerabilities now exploited in attacks
US arrests two alleged leaders of online extremist 764 group
US arrests two alleged leaders of online extremist 764 group
An affidavit unsealed in Washington, D.C., alleges that the two “targeted vulnerable children online, coercing them into producing degrading and explicit content under threat and manipulation."
·therecord.media·
US arrests two alleged leaders of online extremist 764 group
Commvault says recent breach didn't impact customer backup data
Commvault says recent breach didn't impact customer backup data
Commvault, a leading provider of data protection solutions, says a nation-state threat actor who breached its Azure environment didn't gain access to customer backup data.
·bleepingcomputer.com·
Commvault says recent breach didn't impact customer backup data
FBI shares massive list of 42,000 LabHost phishing domains
FBI shares massive list of 42,000 LabHost phishing domains
The FBI has shared 42,000 phishing domains tied to the LabHost cybercrime platform, one of the largest global phishing-as-a-service (PhaaS) platforms that was dismantled in April 2024.
·bleepingcomputer.com·
FBI shares massive list of 42,000 LabHost phishing domains
Microsoft Expands Cloud, AI Footprint Across Europe
Microsoft Expands Cloud, AI Footprint Across Europe
Microsoft has announced plans to expand cloud and AI infrastructure in the EU, increasing data center capacity by 40% by 2027
·infosecurity-magazine.com·
Microsoft Expands Cloud, AI Footprint Across Europe
Cyberattaques russes : pour la premiùre fois, la France s’en prend directement à Moscou
Cyberattaques russes : pour la premiùre fois, la France s’en prend directement à Moscou
C'est une premiÚre. La France a décidé de désigner la Russie comme responsable de plusieurs attaques informatiques. Paris en profite pour dénoncer l'hostilité de la Russie dans le cyberespace, et cela depuis au moins dix ans. C'est une prise de parole forte, mais qui traduit bien la lassitude et l'agacement des
·numerama.com·
Cyberattaques russes : pour la premiùre fois, la France s’en prend directement à Moscou
News alert: Link11 integrates DOSarrest, Reblaze to deliver advanced, integrated security platform
News alert: Link11 integrates DOSarrest, Reblaze to deliver advanced, integrated security platform
Frankfurt, Apr.30, 2025, CyberNewswire – Link11, DOSarrest, and Reblaze have combined their strengths into a single, integrated platform with a new brand identity. The result: a consistent user experience, maximum efficiency, and seamless security. As a European provider, Link11 addresses the current business risks associated with geopolitical uncertainties and growing compliance requirements. At the same
·lastwatchdog.com·
News alert: Link11 integrates DOSarrest, Reblaze to deliver advanced, integrated security platform
Cloud : En pleine guerre commerciale, Microsoft veut montrer patte blanche
Cloud : En pleine guerre commerciale, Microsoft veut montrer patte blanche
Microsoft multiplie les signaux d’apaisement à destination de l’Europe. En marge d’une visite à Bruxelles, son président Brad Smith a présenté...-Cloud
·usine-digitale.fr·
Cloud : En pleine guerre commerciale, Microsoft veut montrer patte blanche
DarkWatchman cybercrime malware returns on Russian networks
DarkWatchman cybercrime malware returns on Russian networks
A financially motivated group tracked as Hive0117 recently attacked multiple Russian industries with a retooled version of DarkWatchman malware, researchers said.
·therecord.media·
DarkWatchman cybercrime malware returns on Russian networks
Threat Modeling Google's A2A Protocol | CSA
Threat Modeling Google's A2A Protocol | CSA
MAESTRO, an AI-centric threat modeling approach, can be used to identify potential risks in implementations of Google's A2A (Agent-to-Agent) protocol.
·cloudsecurityalliance.org·
Threat Modeling Google's A2A Protocol | CSA
UK retailer Co-op shuts down some IT systems after hack attempt
UK retailer Co-op shuts down some IT systems after hack attempt
British supermarket chain Co-op Food has confirmed to BleepingComputer via a statement that it has suffered limited operational disruption as it responds to a cyberattack.
·bleepingcomputer.com·
UK retailer Co-op shuts down some IT systems after hack attempt
Co-op announces ‘attempted’ cyberattack in wake of M&S incident
Co-op announces ‘attempted’ cyberattack in wake of M&S incident
According to a Co-op spokesperson, the firm detected “attempts to gain unauthorised access to some of our systems” and as such had “taken proactive steps to keep our systems safe."
·therecord.media·
Co-op announces ‘attempted’ cyberattack in wake of M&S incident
Ascension discloses new data breach after third-party hacking incident
Ascension discloses new data breach after third-party hacking incident
​Ascension, one of the largest private healthcare systems in the United States, is notifying patients that their personal and health information was stolen in a December 2024 data theft attack, which affected a former business partner.
·bleepingcomputer.com·
Ascension discloses new data breach after third-party hacking incident
Technical Debt vs. Challenges: Know the Difference | CSA
Technical Debt vs. Challenges: Know the Difference | CSA
Learn how understanding the difference between technical debt and technical challenges can lead to smarter, faster decision-making for your organization.
·cloudsecurityalliance.org·
Technical Debt vs. Challenges: Know the Difference | CSA
The FBI's Brett Leatherman gives the latest ‘Typhoon’ forecast
The FBI's Brett Leatherman gives the latest ‘Typhoon’ forecast
Recorded Future News sat down with the deputy assistant director of the FBI’s cyber division at the RSA Conference to talk about the latest updates in countering China-linked hackers.
·therecord.media·
The FBI's Brett Leatherman gives the latest ‘Typhoon’ forecast