Cyber Source Daily
banner
cybersourcedaily.bsky.social
Cyber Source Daily
@cybersourcedaily.bsky.social
Cybersecurity news and information


* Banner photo by the great Lennon Cheng on Unsplash
Reposted by Cyber Source Daily
The US' greatest strength is taking left-wing policies and making them right-wing by implementing them in the absolute dumbest way possible. Today we've got preventing price gouging through market intervention by... contacting the CEO of a single company and requesting that they simply not do that.
US Treasury Secretary Scott Bessent: Spoke with Walmart CEO, Walmart, $WMT, will absorb tariffs as they did in 2018.
May 18, 2025 at 9:31 PM
As a cybersecurity professional, too much caution can be detrimental to the progress and efficiency of your business operations. The same way that NOT being cautious enough can bring about disaster. #cybersecurity #awareness
May 18, 2025 at 3:13 PM
Reposted by Cyber Source Daily
How to Choose the Right Tech Conference for Your Goals

Tech conferences are essential for learning, networking, and staying updated in the fast-evolving IT and cybersecurity landscape. However, not all conferences are created equal. Here’s how to pick the best one for your needs. Types of Tech…
How to Choose the Right Tech Conference for Your Goals
Tech conferences are essential for learning, networking, and staying updated in the fast-evolving IT and cybersecurity landscape. However, not all conferences are created equal. Here’s how to pick the best one for your needs. Types of Tech Conferences 1. General Conferences Multi-track events with mixed beginner/intermediate sessions. Examples: FOSDEM, KubeCon, Embedded World. Best for: Discovering new topics, but requires careful session selection.
undercodetesting.com
May 18, 2025 at 11:50 AM
If you can write it in pseudo-code, you're about 80% of the way there. Fair?
May 18, 2025 at 12:37 PM
Reposted by Cyber Source Daily
CISA Drops RSS Feed for KEV Alerts, Moves to Email and Twitter (X)

The Cybersecurity and Infrastructure Security Agency (CISA) has announced the discontinuation of its RSS feed for Known Exploited Vulnerabilities (KEV) alerts, shifting notifications to email and Twitter (X). This decision has…
CISA Drops RSS Feed for KEV Alerts, Moves to Email and Twitter (X)
The Cybersecurity and Infrastructure Security Agency (CISA) has announced the discontinuation of its RSS feed for Known Exploited Vulnerabilities (KEV) alerts, shifting notifications to email and Twitter (X). This decision has sparked criticism due to the lack of prior notice and concerns over reliance on a third-party platform (X) for critical security updates. Official Sources: CISA Notice on RSS Feed Discontinuation…
undercodetesting.com
May 12, 2025 at 11:01 PM
Reposted by Cyber Source Daily
North Korean IT worker scam is now a threat to all companies, cybersecurity experts say buff.ly/aKqBkyC
North Korean IT worker scam is now a threat to all companies, cybersecurity experts say
One cybersecurity expert even said he recently found evidence that a U.S. political campaign in Oregon hired a North Korean IT worker.
buff.ly
May 4, 2025 at 4:12 PM
Reposted by Cyber Source Daily
🔐 Cybersecurity isn’t just technical—it’s emotional.
And it’s good to see more people waking up to that.

A new article in the SANS OUCH! newsletter breaks down how attackers use fear, urgency, shame, and trust to manipulate targets.
📎 sans.org/newsletters/...
SANS OUCH! Newsletter | How Cybercriminals Exploit Your Emotions | May 2025
OUCH! SANS Security Awareness Newsletter - How Cybercriminals Exploit Your Emotions
sans.org
May 3, 2025 at 7:29 PM
Remember: Signal chats are only as secure as your phone. #opsec #signal
May 3, 2025 at 7:26 PM
Reposted by Cyber Source Daily
DHS Secretary Kristi Noem backed the Cybersecurity Information Sharing Extension Act at the RSA Conference on Tuesday after "candid" conversations with cyber leaders

therecord.media/kristi-noem-...
Noem calls for reauthorization of cyberthreat information sharing law during RSA keynote
Noem also defended reducing the size of CISA, postponing the creation of a new headquarters for the agency and making other funding cuts or program changes at the organization.
therecord.media
April 30, 2025 at 1:00 AM
Reposted by Cyber Source Daily
A cybersecurity CEO was arrested for planting malware in hospital systems. Insider threats to critical infrastructure are more real than ever. #Cybersecurity #Healthcare #InsiderThreat
Cybersecurity CEO Caught Planting Malware in Hospital Systems
The CEO of a local cybersecurity firm has been arrested for planting malware in a hospital's computer systems, exposing new risks to healthcare cybersecurity.
geekoo.news
April 30, 2025 at 1:01 AM
Reposted by Cyber Source Daily
This is fantastic.
April 27, 2025 at 10:12 PM
Reposted by Cyber Source Daily
Apple’s dealing with zero-days linked to *sophisticated attacks*. Patch your gear, folks. #ZeroDay #AppleSecurity zurl.co/V5fEN
Apple Zero Days Under 'Sophisticated Attack,' but Details Lacking
The technology giant said two zero-day vulnerabilities were used in attacks on iOS devices against "specific targeted individuals," which suggests spyware or nation-state threat activity.
zurl.co
April 25, 2025 at 10:29 PM
Reposted by Cyber Source Daily
"Amid broader reductions across the cyber defense agency, CISA’s threat hunting division plans to cease use of Google-owned VirusTotal on April 20. The division already halted use of Censys..." 👀 cybersecuritynews.com/cisa-threat-hunting-staff-censys-virustotal/#google_vignette #cybesec #data #tech
CISA Warns Threat Hunting Staff to Stop Using Censys & VirusTotal
Hundreds of Cybersecurity and Infrastructure Security Agency (CISA) staff were notified this week that the organization is discontinuing critical cybersecurity tools used for threat hunting operations...
cybersecuritynews.com
April 22, 2025 at 3:25 PM
April 22, 2025 at 3:22 PM
Reposted by Cyber Source Daily
The universe is a simulation…but it was vibe coded. 😩
April 21, 2025 at 11:49 PM
Reposted by Cyber Source Daily
DOJ wants Google to sell Chrome to break its search monopoly, per NYT. They argue Chrome gives Google an unfair advantage. The antitrust trial could last 3 weeks, with a decision this summer. #antitrust #google #chrome #doj

#crypto #blockchain #news
April 22, 2025 at 12:59 AM
"Don’t snitch now," the note goes on to add. "We grabbed your trilatitude and trilongtitude (the most accurate) coordinates of where you live." #ransomware #doge #cybersecurity #hacking #security

www.darkreading.com/cyberattacks...
Fog Hackers Troll Victims With DOGE Ransom Notes
Since January, threat actors distributing the malware have notched up more than 100 victims.
www.darkreading.com
April 22, 2025 at 1:11 AM
Reposted by Cyber Source Daily
Hi, robot: Half of all internet traffic now automated

www.malwarebytes.com/blog/uncateg...
Hi, robot: Half of all internet traffic now automated
Bots now account for half of all internet traffic, according to a new study that shows how non-human activity has grown online.
www.malwarebytes.com
April 21, 2025 at 11:43 PM
Reposted by Cyber Source Daily
CISA senior officials Bob Lord and Lauren Zabierek resign, sparking concerns over agency's brain drain. With a looming workforce cut potentially impacting half of staff, cybersecurity mission faces turbulence as current leadership exits stage left.
Two top cyber officials resign from CISA
Bob Lord and Lauren Zabierek both posted on LinkedIn Monday morning that they were resigning from the Cybersecurity and Infrastructure Security Agency.
therecord.media
April 21, 2025 at 10:38 PM
Reposted by Cyber Source Daily
Trump orders federal investigations of former officials. "Chris Krebs oversaw the Cybersecurity and Infrastructure Security Agency during Trump’s first term, and affirmed the election Trump lost was free of fraud or tampering." edition.cnn.com/2025/04/12/p...
Analysis: Trump’s retribution sends a chilling message to dissenters | CNN Politics
Donald Trump’s White House has a threatening message for anyone who might even be perceived to disagree with the president: Don’t. Or else.
edition.cnn.com
April 14, 2025 at 1:08 AM
Reposted by Cyber Source Daily
1. LLM-generated code tries to run code from online software packages. Which is normal but
2. The packages don’t exist. Which would normally cause an error but
3. Nefarious people have made malware under package names that LLMs make up most often. So
4. Now the LLM code points to malware.
April 13, 2025 at 11:01 PM