Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31438 bookmarks
Custom sorting
US targets North Korean IT worker army with new sanctions
US targets North Korean IT worker army with new sanctions
The U.S. Treasury's Office of Foreign Assets Control (OFAC) has sanctioned two individuals and two companies associated with North Korean IT worker schemes that operate at the expense of American organizations.
·bleepingcomputer.com·
US targets North Korean IT worker army with new sanctions
Google warns Salesloft breach impacted some Workspace accounts
Google warns Salesloft breach impacted some Workspace accounts
Google reports that the Salesloft Drift breach is larger than initially thought, warning that attackers also used stolen OAuth tokens to access Google Workspace email accounts in addition to Salesforce data.
·bleepingcomputer.com·
Google warns Salesloft breach impacted some Workspace accounts
Link up, lift up, level up
Link up, lift up, level up
This week, Joe encourages you to find your community in cybersecurity and make the effort to grow, network and hack stuff together.
·blog.talosintelligence.com·
Link up, lift up, level up
Data breach at TransUnion impacts 4.4 million people
Data breach at TransUnion impacts 4.4 million people
The incident began on July 28 and was discovered two days later, TransUnion told the Maine attorney general. A separate filing in Texas shows that Social Security numbers were among the leaked information.
·therecord.media·
Data breach at TransUnion impacts 4.4 million people
Google shares workarounds for auth failures on ChromeOS devices
Google shares workarounds for auth failures on ChromeOS devices
Google is working to resolve authentication failures preventing users from signing into their Clever and ClassLink accounts on some ChromeOS devices.
·bleepingcomputer.com·
Google shares workarounds for auth failures on ChromeOS devices
Malware devs abuse Anthropic’s Claude AI to build ransomware
Malware devs abuse Anthropic’s Claude AI to build ransomware
Anthropic's Claude Code large language model has been abused by threat actors who used it in data extortion campaigns and to develop ransomware packages.
·bleepingcomputer.com·
Malware devs abuse Anthropic’s Claude AI to build ransomware
Affiliates Flock to ‘Soulless’ Scam Gambling Machine
Affiliates Flock to ‘Soulless’ Scam Gambling Machine
Last month, KrebsOnSecurity tracked the sudden emergence of hundreds of polished online gaming and wagering websites that lure people with free credits and eventually abscond with any cryptocurrency funds deposited by players. We've since learned that these scam gambling sites…
·krebsonsecurity.com·
Affiliates Flock to ‘Soulless’ Scam Gambling Machine
Police seize VerifTools fake ID marketplace servers, domains
Police seize VerifTools fake ID marketplace servers, domains
The FBI and the Dutch Police have shut down the VerifTools marketplace for fraudulent identity documents after seizing servers in Amsterdam that hosted the online operation.
·bleepingcomputer.com·
Police seize VerifTools fake ID marketplace servers, domains
Passwordstate dev urges users to patch auth bypass vulnerability
Passwordstate dev urges users to patch auth bypass vulnerability
Click Studios, the company behind the Passwordstate enterprise-grade password manager, has warned customers to patch a high-severity authentication bypass vulnerability as soon as possible.
·bleepingcomputer.com·
Passwordstate dev urges users to patch auth bypass vulnerability
Cyberespionnage chinois : trois entreprises de la tech formellement identifiées par le FBI
Cyberespionnage chinois : trois entreprises de la tech formellement identifiées par le FBI
Dans une alerte publiée le 27 août 2025, le FBI, conjointement avec les services de renseignement de douze pays, a annoncé avoir formellement identifié trois entreprises chinoises utilisées comme paravent par Salt Typhoon. Depuis plusieurs années, ce groupe de cyberespionnage infiltre des infrastructures hautement
·numerama.com·
Cyberespionnage chinois : trois entreprises de la tech formellement identifiées par le FBI
Claude AI chatbot abused to launch “cybercrime spree”
Claude AI chatbot abused to launch “cybercrime spree”
Anthropic—maker of AI coding chatbot Claude—says cybercriminals have abused Claude to automate and orchestrate sophisticated attacks.
·malwarebytes.com·
Claude AI chatbot abused to launch “cybercrime spree”
MATLAB dev says ransomware gang stole data of 10,000 people
MATLAB dev says ransomware gang stole data of 10,000 people
MathWorks, a leading developer of mathematical simulation and computing software, revealed that a ransomware gang stole the data of over 10,000 people after breaching its network in April.
·bleepingcomputer.com·
MATLAB dev says ransomware gang stole data of 10,000 people
Fake IT Support Attacks Hit Microsoft Teams
Fake IT Support Attacks Hit Microsoft Teams
Fake IT support lures are being used to trick employees into installing remote‑access tools via Microsoft Teams
·infosecurity-magazine.com·
Fake IT Support Attacks Hit Microsoft Teams
News alert: SquareX finds browser flaw undermining passkeys while exposing banking and SaaS apps
News alert: SquareX finds browser flaw undermining passkeys while exposing banking and SaaS apps
Palo Alto, Calif., Aug. 28, 2025, CyberNewswire — It is no secret that passwords are highly susceptible to phishing and brute force attacks. This led to the mass adoption of passkeys, a passwordless authentication method leveraging cryptographic key pairs that allows users to log in with biometrics or a hardware key. According to FIDO, over
·lastwatchdog.com·
News alert: SquareX finds browser flaw undermining passkeys while exposing banking and SaaS apps
TransUnion suffers data breach impacting over 4.4 million people
TransUnion suffers data breach impacting over 4.4 million people
Consumer credit reporting giant TransUnion warns it suffered a data breach exposing the personal information of over 4.4 million people in the United States.
·bleepingcomputer.com·
TransUnion suffers data breach impacting over 4.4 million people
Shadow IT Is Expanding Your Attack Surface. Here’s Proof
Shadow IT Is Expanding Your Attack Surface. Here’s Proof
Shadow IT isn't theoretical—it's everywhere. Intruder uncovered exposed backups, open Git repos, and admin panels in just days, all hiding sensitive data. Make your hidden assets visible before attackers do.
·bleepingcomputer.com·
Shadow IT Is Expanding Your Attack Surface. Here’s Proof
The Emerging Identity Imperatives of Agentic AI | CSA
The Emerging Identity Imperatives of Agentic AI | CSA
Examine the structure of AI agents, the identity gaps they expose, and the principles required to govern them as they take on a larger role in enterprises.
·cloudsecurityalliance.org·
The Emerging Identity Imperatives of Agentic AI | CSA