Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29675 bookmarks
Custom sorting
Spain awarded €12.3 million in contracts to Huawei
Spain awarded €12.3 million in contracts to Huawei
Spain gives Huawei wiretap contracts, sparking concerns over potential Chinese government access due to Huawei’s links to Beijing.
·securityaffairs.com·
Spain awarded €12.3 million in contracts to Huawei
Indian Police Raid Tech Support Scam Call Center
Indian Police Raid Tech Support Scam Call Center
Operation Chakra-V scores success as a fraud syndicate is busted following the raid of a scam call center operating in Noida, Uttar Pradesh
·infosecurity-magazine.com·
Indian Police Raid Tech Support Scam Call Center
Pourquoi l’armée américaine recrute des tech bros pour moderniser ses rangs
Pourquoi l’armée américaine recrute des tech bros pour moderniser ses rangs
L’armée américaine vient de créer une nouvelle unité dédiée aux tech bros : le Detachment 201, alias l’Executive Innovation Corps. Son objectif ? Intégrer directement l'expertise de la Silicon Valley au cœur de ses forces, pour créer un pont entre la technologie civile et les besoins de modernisation militaire aux
·numerama.com·
Pourquoi l’armée américaine recrute des tech bros pour moderniser ses rangs
KongTuke FileFix Leads to New Interlock RAT Variant
KongTuke FileFix Leads to New Interlock RAT Variant
Researchers from The DFIR Report, in partnership with Proofpoint, have identified a new and resilient variant of the Interlock ransomware group’s remote access trojan (RAT). This new malware,…
·thedfirreport.com·
KongTuke FileFix Leads to New Interlock RAT Variant
Windows 10 KB5062554 update breaks emoji panel search feature
Windows 10 KB5062554 update breaks emoji panel search feature
The search feature for the Windows 10 emoji panel is broken after installing the KB5062554 cumulative update released Tuesday, making it not possible to look up emojis by name or keyword.
·bleepingcomputer.com·
Windows 10 KB5062554 update breaks emoji panel search feature
Google Gemini flaw hijacks email summaries for phishing
Google Gemini flaw hijacks email summaries for phishing
Google Gemini for Workspace can be exploited to generate email summaries that appear legitimate but include malicious instructions or warnings that direct users to phishing sites without using attachments or direct links.
·bleepingcomputer.com·
Google Gemini flaw hijacks email summaries for phishing
Hackers are exploiting critical RCE flaw in Wing FTP Server
Hackers are exploiting critical RCE flaw in Wing FTP Server
Hackers have started to exploit a critical remote code execution vulnerability in Wing FTP Server just one day after technical details on the flaw became public.
·bleepingcomputer.com·
Hackers are exploiting critical RCE flaw in Wing FTP Server
NVIDIA shares guidance to defend GDDR6 GPUs against Rowhammer attacks
NVIDIA shares guidance to defend GDDR6 GPUs against Rowhammer attacks
NVIDIA is warning users to activate System Level Error-Correcting Code  mitigation to protect against Rowhammer attacks on graphical processors with GDDR6 memory.
·bleepingcomputer.com·
NVIDIA shares guidance to defend GDDR6 GPUs against Rowhammer attacks
Albemarle latest Virginia county hit with ransomware
Albemarle latest Virginia county hit with ransomware
Albemarle County officials confirmed systems were hit with ransomware last month, exposing resident and employee data and knocking services offline.
·therecord.media·
Albemarle latest Virginia county hit with ransomware
Squid Dominated the Oceans in the Late Cretaceous - Schneier on Security
Squid Dominated the Oceans in the Late Cretaceous - Schneier on Security
New research: One reason the early years of squids has been such a mystery is because squids’ lack of hard shells made their fossils hard to come by. Undeterred, the team instead focused on finding ancient squid beaks—hard mouthparts with high fossilization potential that could help the team figure out how squids evolved. With that in mind, the team developed an advanced fossil discovery technique that completely digitized rocks with all their embedded fossils in complete 3D form. Upon using that technique on Late Cretaceous rocks from Japan, the team identified 1,000 fossilized cephalopod beaks hidden inside the rocks, which included 263 squid specimens and 40 previously unknown squid species...
·schneier.com·
Squid Dominated the Oceans in the Late Cretaceous - Schneier on Security
'123456' password exposed info for 64 million McDonald’s job applicants
'123456' password exposed info for 64 million McDonald’s job applicants
Cybersecurity researchers discovered a vulnerability in McHire, McDonald's chatbot job application platform, that exposed the personal information of more than 64 million job applicants across the United States.
·bleepingcomputer.com·
'123456' password exposed info for 64 million McDonald’s job applicants
WordPress Gravity Forms developer hacked to push backdoored plugins
WordPress Gravity Forms developer hacked to push backdoored plugins
The popular WordPress plugin Gravity Forms has been compromised in what seems a supply-chain attack where manual installers from the official website were infected with a backdoor.
·bleepingcomputer.com·
WordPress Gravity Forms developer hacked to push backdoored plugins
Airline executive agrees to dismiss litigation around alleged hack-for-hire scheme
Airline executive agrees to dismiss litigation around alleged hack-for-hire scheme
The cases, which stretched across multiple continents and shed light on the shady world of corporate espionage and mercenary hackers, stemmed from a scheme allegedly orchestrated by an attorney at the law firm Dechert to hack into Azima’s accounts for one of its clients.
·therecord.media·
Airline executive agrees to dismiss litigation around alleged hack-for-hire scheme
Exploits for pre-auth Fortinet FortiWeb RCE flaw released, patch now
Exploits for pre-auth Fortinet FortiWeb RCE flaw released, patch now
Proof-of-concept exploits have been released for a critical SQLi vulnerability in Fortinet FortiWeb that can be used to achieve pre-authenticated remote code execution on vulnerable servers.
·bleepingcomputer.com·
Exploits for pre-auth Fortinet FortiWeb RCE flaw released, patch now