Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

37156 bookmarks
Custom sorting
Démarchage téléphonique : les meilleures applications pour bloquer les arnaques en 2026 - Numerama
Démarchage téléphonique : les meilleures applications pour bloquer les arnaques en 2026 - Numerama
Alors que le démarchage téléphonique s'intensifie et que l'intelligence artificielle générative permet à des bots de simuler des appels, les solutions traditionnelles comme s'inscrire sur Bloctel ou bloquer les numéros un par un ne suffisent plus. Voici une sélection de logiciels recommandés par nos lecteurs pour
·numerama.com·
Démarchage téléphonique : les meilleures applications pour bloquer les arnaques en 2026 - Numerama
Upcoming Speaking Engagements - Schneier on Security
Upcoming Speaking Engagements - Schneier on Security
This is a current list of where and when I am scheduled to speak: I’m speaking at Ontario Tech University in Oshawa, Ontario, Canada, at 2 PM ET on Thursday, February 26, 2026. I’m speaking at the Personal AI Summit in Los Angeles, California, USA, on Thursday, March 5, 2026. I’m speaking at Tech Live: Cybersecurity in New York City, USA, on Wednesday, March 11, 2026. I’m giving the Ross Anderson Lecture at the University of Cambridge’s Churchill College at 5:30 PM GMT on Thursday, March 19, 2026. I’m speaking at RSAC 2026 in San Francisco, California, USA, on Wednesday, March 25, 2026...
·schneier.com·
Upcoming Speaking Engagements - Schneier on Security
One threat actor responsible for 83% of recent Ivanti RCE attacks
One threat actor responsible for 83% of recent Ivanti RCE attacks
Threat intelligence observations show that a single threat actor is responsible for most of the active exploitation of two critical vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), tracked as CVE-2026-21962 and CVE-2026-24061.
·bleepingcomputer.com·
One threat actor responsible for 83% of recent Ivanti RCE attacks
Snail mail letters target Trezor and Ledger users in crypto-theft attacks
Snail mail letters target Trezor and Ledger users in crypto-theft attacks
Threat actors are sending physical letters pretending to be from Trezor and Ledger, makers of cryptocurrency hardware wallets, to trick users into submitting recovery phrases in crypto theft attacks.
·bleepingcomputer.com·
Snail mail letters target Trezor and Ledger users in crypto-theft attacks
Objective-See: Blog
Objective-See: Blog
Posts about macOS malware, exploits, and tools
·objective-see.org·
Objective-See: Blog
Objective-See: Blog
Objective-See: Blog
Posts about macOS malware, exploits, and tools
·objective-see.org·
Objective-See: Blog
CIS Benchmarks February 2026 Update
CIS Benchmarks February 2026 Update
Here is an overview of the CIS Benchmarks that the Center for Internet Security (CIS) updated or released for February 2026.
·cisecurity.org·
CIS Benchmarks February 2026 Update
Upholding U.S. SLTT Resilience with Affordable Services
Upholding U.S. SLTT Resilience with Affordable Services
The MS-ISAC bridges the U.S. SLTT resilience gap by offering under-resourced organizations access to affordable services. Read to learn more.
·cisecurity.org·
Upholding U.S. SLTT Resilience with Affordable Services
Fake job recruiters hide malware in developer coding challenges
Fake job recruiters hide malware in developer coding challenges
A new variation of the fake recruiter campaign from North Korean threat actors is targeting JavaScript and Python developers with cryptocurrency-related tasks.
·bleepingcomputer.com·
Fake job recruiters hide malware in developer coding challenges
A one-prompt attack that breaks LLM safety alignment | Microsoft Security Blog
A one-prompt attack that breaks LLM safety alignment | Microsoft Security Blog
As LLMs and diffusion models power more applications, their safety alignment becomes critical. Our research shows that even minimal downstream fine‑tuning can weaken safeguards, raising a key question: how reliably does alignment hold as models evolve?
·microsoft.com·
A one-prompt attack that breaks LLM safety alignment | Microsoft Security Blog
Manipulating AI memory for profit: The rise of AI Recommendation Poisoning | Microsoft Security Blog
Manipulating AI memory for profit: The rise of AI Recommendation Poisoning | Microsoft Security Blog
That helpful “Summarize with AI” button? It might be secretly manipulating what your AI recommends.  Microsoft security researchers have discovered a growing trend of AI memory poisoning attacks used for promotional purposes, a technique we call AI Recommendation Poisoning.
·microsoft.com·
Manipulating AI memory for profit: The rise of AI Recommendation Poisoning | Microsoft Security Blog
Louis Vuitton, Dior, and Tiffany fined $25 million over data breaches
Louis Vuitton, Dior, and Tiffany fined $25 million over data breaches
South Korea has fined luxury fashion brands Louis Vuitton, Christian Dior Couture, and Tiffany $25 million for failing to implement adequate security measures, which facilitated unauthorized access and the exposure of data belonging to more than 5.5 million customers.
·bleepingcomputer.com·
Louis Vuitton, Dior, and Tiffany fined $25 million over data breaches
Ransomware attacks increase against IT and food sectors
Ransomware attacks increase against IT and food sectors
Social engineering and zero-day vulnerability weaponization are getting faster and easier, two information sharing and analysis centers said in new reports.
·cybersecuritydive.com·
Ransomware attacks increase against IT and food sectors
Turning IBM QRadar Alerts into Action with Criminal IP
Turning IBM QRadar Alerts into Action with Criminal IP
Criminal IP now integrates with IBM QRadar SIEM and SOAR to bring external IP-based threat intelligence directly into detection and response workflows. See how risk scoring and automated enrichment help SOC teams prioritize high-risk IPs and accelerate investigations without leaving QRadar.
·bleepingcomputer.com·
Turning IBM QRadar Alerts into Action with Criminal IP
CSA STAR for Cloud Identity Security | CSA
CSA STAR for Cloud Identity Security | CSA
Explains how CSA STAR guides cloud-first organizations to manage identity risk, govern access, and continuously assure cloud security.
·cloudsecurityalliance.org·
CSA STAR for Cloud Identity Security | CSA
Objective-See: Blog
Objective-See: Blog
Posts about macOS malware, exploits, and tools
·objective-see.org·
Objective-See: Blog