Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29739 bookmarks
Custom sorting
defcon.org
defcon.org
The largest hacking and security conference with presentations, workshops, contests, villages and the premier Capture The Flag Contest.
·defcon.org·
defcon.org
Hackers abuse OAuth 2.0 workflows to hijack Microsoft 365 accounts
Hackers abuse OAuth 2.0 workflows to hijack Microsoft 365 accounts
Russian threat actors have been abusing legitimate OAuth 2.0 authentication workflows to hijack Microsoft 365 accounts of employees of organizations related to Ukraine and human rights.
·bleepingcomputer.com·
Hackers abuse OAuth 2.0 workflows to hijack Microsoft 365 accounts
Lessons from Ted Lasso for cybersecurity success
Lessons from Ted Lasso for cybersecurity success
In this edition, Bill explores how intellectual curiosity drives success in cybersecurity, shares insights on the IAB ToyMaker’s tactics, and covers the top security headlines you need to know.
·blog.talosintelligence.com·
Lessons from Ted Lasso for cybersecurity success
New Linux Rootkit - Schneier on Security
New Linux Rootkit - Schneier on Security
Interesting: The company has released a working rootkit called “Curing” that uses io_uring, a feature built into the Linux kernel, to stealthily perform malicious activities without being caught by many of the detection solutions currently on the market. At the heart of the issue is the heavy reliance on monitoring system calls, which has become the go-to method for many cybersecurity vendors. The problem? Attackers can completely sidestep these monitored calls by leaning on io_uring instead. This clever method could let bad actors quietly make network connections or tamper with files without triggering the usual alarms...
·schneier.com·
New Linux Rootkit - Schneier on Security
RSAC Fireside Chat: The NDR evolution story—from open source start to kill chain clarity
RSAC Fireside Chat: The NDR evolution story—from open source start to kill chain clarity
As enterprises brace for a new wave of stealthy intrusions — so-called Typhoon attacks — security leaders are doubling down on network intelligence that goes beyond surface-level alerts. Related: What is NDR? In this RSAC 2025 Fireside Chat, I sat down with Corelight CEO Brian Dye to unpack how Network Detection and Response (NDR) is
·lastwatchdog.com·
RSAC Fireside Chat: The NDR evolution story—from open source start to kill chain clarity
North Korean IT workers seen using AI tools to scam firms into hiring them
North Korean IT workers seen using AI tools to scam firms into hiring them
North Korean IT workers illicitly gaining employment at U.S. and European tech companies are increasingly using generative artificial intelligence in a variety of ways to assist them throughout the job application and interview process.
·therecord.media·
North Korean IT workers seen using AI tools to scam firms into hiring them
Lazarus hackers breach six companies in watering hole attacks
Lazarus hackers breach six companies in watering hole attacks
In a recent espionage campaign, the infamous North Korean threat group Lazarus targeted multiple organizations in the software, IT, finance, and telecommunications sectors in South Korea.
·bleepingcomputer.com·
Lazarus hackers breach six companies in watering hole attacks
ELENOR-corp Ransomware Targets Healthcare Sector
ELENOR-corp Ransomware Targets Healthcare Sector
ELENOR-corp ransomware, a new version of Mimic, is targeting healthcare organizations using advanced capabilities
·infosecurity-magazine.com·
ELENOR-corp Ransomware Targets Healthcare Sector
Frederick Health data breach impacts nearly 1 million patients
Frederick Health data breach impacts nearly 1 million patients
​A ransomware attack in January at Frederick Health Medical Group, a major healthcare provider in Maryland, has led to a data breach affecting nearly one million patients.
·bleepingcomputer.com·
Frederick Health data breach impacts nearly 1 million patients
RSAC Fireside Chat: X9 PKI emerges to help financial sector interoperate, get ready for ‘Q-Day’
RSAC Fireside Chat: X9 PKI emerges to help financial sector interoperate, get ready for ‘Q-Day’
As RSAC 2025 convenes next week in San Francisco, digital trust is poised to take center stage. Related: PKI and the IoT cloud One quiet but consequential development now taking root in the financial sector could prove pivotal: the emergence of a dedicated Public Key Infrastructure (PKI) framework, tailored to banks and payment networks, guided
·lastwatchdog.com·
RSAC Fireside Chat: X9 PKI emerges to help financial sector interoperate, get ready for ‘Q-Day’
Interlock ransomware claims DaVita attack, leaks stolen data
Interlock ransomware claims DaVita attack, leaks stolen data
The Interlock ransomware gang has claimed the cyberattack on DaVita kidney dialysis firm and leaked data allegedly stolen from the organization.
·bleepingcomputer.com·
Interlock ransomware claims DaVita attack, leaks stolen data
Microsoft now pays up to $30,000 for some AI vulnerabilities
Microsoft now pays up to $30,000 for some AI vulnerabilities
Microsoft announced an increase in bug bounty payouts to $30,000 for AI vulnerabilities found in Dynamics 365 and Power Platform services and products.
·bleepingcomputer.com·
Microsoft now pays up to $30,000 for some AI vulnerabilities
Microsoft fixes bug causing incorrect 0x80070643 WinRE errors
Microsoft fixes bug causing incorrect 0x80070643 WinRE errors
Microsoft says it resolved a known issue causing erroneous 0x80070643 installation failure errors when deploying the April 2025 Windows Recovery Environment (WinRE) updates.
·bleepingcomputer.com·
Microsoft fixes bug causing incorrect 0x80070643 WinRE errors