Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29719 bookmarks
Custom sorting
Google: 97 zero-days exploited in 2024, over 50% in spyware attacks
Google: 97 zero-days exploited in 2024, over 50% in spyware attacks
Google's Threat Intelligence Group (GTIG) says attackers exploited 75 zero-day vulnerabilities in the wild last year, over 50% of which were linked to spyware attacks.
·bleepingcomputer.com·
Google: 97 zero-days exploited in 2024, over 50% in spyware attacks
CISA tags Broadcom Fabric OS, CommVault flaws as exploited in attacks
CISA tags Broadcom Fabric OS, CommVault flaws as exploited in attacks
The U.S. Cybersecurity & Infrastructure Security Agency (CISA) is warning of Broadcom Brocade Fabric OS, Commvault web servers, and Qualitia Active! Mail clients vulnerabilities that are actively exploited in attacks.
·bleepingcomputer.com·
CISA tags Broadcom Fabric OS, CommVault flaws as exploited in attacks
New Gremlin Infostealer Distributed on Telegram
New Gremlin Infostealer Distributed on Telegram
Administrators of a Telegram channel named CoderSharp have been advertising Gremlin Stealer since March 2025
·infosecurity-magazine.com·
New Gremlin Infostealer Distributed on Telegram
A New Era for Compliance | Compliance Automation | CSA
A New Era for Compliance | Compliance Automation | CSA
The Compliance Automation Revolution is a CSA initiative to develop methods to automatically gather compliance evidence, harmonize frameworks, & quantify risk.
·cloudsecurityalliance.org·
A New Era for Compliance | Compliance Automation | CSA
Product Walkthrough: Securing Microsoft Copilot with Reco
Product Walkthrough: Securing Microsoft Copilot with Reco
Find out how Reco keeps Microsoft 365 Copilot safe by spotting risky prompts, protecting data, managing user access, and identifying threats.
·thehackernews.com·
Product Walkthrough: Securing Microsoft Copilot with Reco
Applying Security Engineering to Prompt Injection Security - Schneier on Security
Applying Security Engineering to Prompt Injection Security - Schneier on Security
This seems like an important advance in LLM security against prompt injection: Google DeepMind has unveiled CaMeL (CApabilities for MachinE Learning), a new approach to stopping prompt-injection attacks that abandons the failed strategy of having AI models police themselves. Instead, CaMeL treats language models as fundamentally untrusted components within a secure software framework, creating clear boundaries between user commands and potentially malicious content. […] To understand CaMeL, you need to understand that prompt injections happen when AI systems can’t distinguish between legitimate user commands and malicious instructions hidden in content they’re processing...
·schneier.com·
Applying Security Engineering to Prompt Injection Security - Schneier on Security
Year in Review: AI based threats
Year in Review: AI based threats
2024 wasn't the year that AI rewrote the cybercrime playbook — but it did turbocharge some of the old tricks. Read this summary of AI-based threats, from Talos' 2024 Year in Review.
·blog.talosintelligence.com·
Year in Review: AI based threats
When to Hire a GDPR Auditor | CSA
When to Hire a GDPR Auditor | CSA
Discover when to engage a GDPR auditor and how platforms streamline compliance with automated tools and expert support.
·cloudsecurityalliance.org·
When to Hire a GDPR Auditor | CSA
Europol Creates “Violence-as-a-Service” Taskforce
Europol Creates “Violence-as-a-Service” Taskforce
Europol has launched a new initiative designed to combat recruitment of youngsters into violent organized crime groups
·infosecurity-magazine.com·
Europol Creates “Violence-as-a-Service” Taskforce