Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31660 bookmarks
Custom sorting
Hardening Microsoft Windows 10 workstations | Cyber.gov.au
Hardening Microsoft Windows 10 workstations | Cyber.gov.au
This publication provides recommendations on hardening workstations using Enterprise and Education editions of Microsoft Windows 10. While this publication refers to workstations, most recommendations are equally applicable to servers (with the exception of Domain Controllers) using Microsoft Windows Server. Security features discussed in this publication, along with the names and locations of Group Policy settings, are taken from Microsoft Windows 10 version 22H2.
·cyber.gov.au·
Hardening Microsoft Windows 10 workstations | Cyber.gov.au
Hardening Microsoft Windows 11 workstations | Cyber.gov.au
Hardening Microsoft Windows 11 workstations | Cyber.gov.au
This publication provides recommendations on hardening workstations using Enterprise and Education editions of Microsoft Windows 11. While this publication refers to workstations, most recommendations are equally applicable to servers (with the exception of Domain Controllers) using Microsoft Windows Server. Security features discussed in this publication, along with the names and locations of Group Policy settings, are taken from Microsoft Windows 11 version 24H2.
·cyber.gov.au·
Hardening Microsoft Windows 11 workstations | Cyber.gov.au
A Shared Vision of Software Bill of Materials (SBOM) for Cybersecurity | Cyber.gov.au
A Shared Vision of Software Bill of Materials (SBOM) for Cybersecurity | Cyber.gov.au
This guidance, authored by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and international partners, presents a shared vision of Software Bill of Materials (SBOM) and the value that increased software component and supply chain transparency can offer to the global community.
·cyber.gov.au·
A Shared Vision of Software Bill of Materials (SBOM) for Cybersecurity | Cyber.gov.au
Plex tells users to reset passwords after new data breach
Plex tells users to reset passwords after new data breach
Media streaming platform Plex is warning customers to reset passwords after suffering a data breach in which a hacker was able to steal customer authentication data from one of its databases.
·bleepingcomputer.com·
Plex tells users to reset passwords after new data breach
18 Popular Code Packages Hacked, Rigged to Steal Crypto
18 Popular Code Packages Hacked, Rigged to Steal Crypto
At least 18 popular JavaScript code packages that are collectively downloaded more than two billion times each week were briefly compromised with malicious software today, after a developer involved in maintaining the projects was phished. The attack appears to have…
·krebsonsecurity.com·
18 Popular Code Packages Hacked, Rigged to Steal Crypto
Managing cryptographic keys and secrets | Cyber.gov.au
Managing cryptographic keys and secrets | Cyber.gov.au
This guide has been developed to help organisational personnel in understanding the threat environment and the value of implementing secure keys and secrets management to make better informed decisions.
·cyber.gov.au·
Managing cryptographic keys and secrets | Cyber.gov.au
A Shared Vision of Software Bill of Materials (SBOM) for Cybersecurity | Cyber.gov.au
A Shared Vision of Software Bill of Materials (SBOM) for Cybersecurity | Cyber.gov.au
This guidance, authored by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and international partners, presents a shared vision of Software Bill of Materials (SBOM) and the value that increased software component and supply chain transparency can offer to the global community.
·cyber.gov.au·
A Shared Vision of Software Bill of Materials (SBOM) for Cybersecurity | Cyber.gov.au
Hardening Microsoft Windows 10 workstations | Cyber.gov.au
Hardening Microsoft Windows 10 workstations | Cyber.gov.au
This publication provides recommendations on hardening workstations using Enterprise and Education editions of Microsoft Windows 10. While this publication refers to workstations, most recommendations are equally applicable to servers (with the exception of Domain Controllers) using Microsoft Windows Server. Security features discussed in this publication, along with the names and locations of Group Policy settings, are taken from Microsoft Windows 10 version 22H2.
·cyber.gov.au·
Hardening Microsoft Windows 10 workstations | Cyber.gov.au
Hardening Microsoft Windows 11 workstations | Cyber.gov.au
Hardening Microsoft Windows 11 workstations | Cyber.gov.au
This publication provides recommendations on hardening workstations using Enterprise and Education editions of Microsoft Windows 11. While this publication refers to workstations, most recommendations are equally applicable to servers (with the exception of Domain Controllers) using Microsoft Windows Server. Security features discussed in this publication, along with the names and locations of Group Policy settings, are taken from Microsoft Windows 11 version 24H2.
·cyber.gov.au·
Hardening Microsoft Windows 11 workstations | Cyber.gov.au
Surge in networks scans targeting Cisco ASA devices raise concerns
Surge in networks scans targeting Cisco ASA devices raise concerns
Large network scans have been  targeting Cisco ASA devices, prompting warnings from cybersecurity researchers that it could indicate an upcoming flaw in the products.
·bleepingcomputer.com·
Surge in networks scans targeting Cisco ASA devices raise concerns
Salesloft: Hacker broke into systems in March through GitHub account
Salesloft: Hacker broke into systems in March through GitHub account
The hacker spent months performing reconnaissance activities on both Salesloft application environments as well as those for Drift, an AI chatbot company that Salesloft acquired last year.
·therecord.media·
Salesloft: Hacker broke into systems in March through GitHub account
Foundations for OT cybersecurity: Asset inventory guidance for owners and operators | Cyber.gov.au
Foundations for OT cybersecurity: Asset inventory guidance for owners and operators | Cyber.gov.au
This guidance outlines how OT owners and operators can create and maintain an asset inventory and OT taxonomy, to protect their most vital assets. It includes steps for defining scope and objectives for the inventory, identifying assets, collecting attributes, creating a taxonomy, managing data, and implementing asset life cycle management.
·cyber.gov.au·
Foundations for OT cybersecurity: Asset inventory guidance for owners and operators | Cyber.gov.au
Hackers steal 3,325 secrets in GhostAction GitHub supply chain attack
Hackers steal 3,325 secrets in GhostAction GitHub supply chain attack
A new supply chain attack on GitHub, dubbed 'GhostAction,' has compromised 3,325 secrets, including PyPI, npm, DockerHub, GitHub tokens, Cloudflare, and AWS keys.
·bleepingcomputer.com·
Hackers steal 3,325 secrets in GhostAction GitHub supply chain attack
Cyberattack on Jaguar Land Rover threatens to hit British economic growth
Cyberattack on Jaguar Land Rover threatens to hit British economic growth
The disruption is the latest to hit a high-profile brand in the United Kingdom, and follows repeated delays in the British government introducing cybersecurity regulations that would require businesses to better protect themselves from attacks.
·therecord.media·
Cyberattack on Jaguar Land Rover threatens to hit British economic growth
Signal adds secure cloud backups to save and restore chats
Signal adds secure cloud backups to save and restore chats
Signal has introduced a new opt-in feature that helps users create end-to-end encrypted backups of their chats, allowing them to restore messages even if their phones are damaged or lost.
·bleepingcomputer.com·
Signal adds secure cloud backups to save and restore chats
US sanctions companies behind cyber scam centers in Cambodia, Myanmar
US sanctions companies behind cyber scam centers in Cambodia, Myanmar
Secretary of State Marco Rubio said U.S. officials sanctioned nine people and companies involved in running Shwe Kokko — a hub for scam centers in Myanmar — as well as four individuals and six entities for their roles operating forced labor compounds in Cambodia.
·therecord.media·
US sanctions companies behind cyber scam centers in Cambodia, Myanmar
Lovesac confirms data breach after ransomware attack claims
Lovesac confirms data breach after ransomware attack claims
American furniture brand Lovesac is warning that it suffered a data breach impacting an undisclosed number of individuals, stating their personal data was exposed in a cybersecurity incident.
·bleepingcomputer.com·
Lovesac confirms data breach after ransomware attack claims
Signed Copies of Rewiring Democracy - Schneier on Security
Signed Copies of Rewiring Democracy - Schneier on Security
When I announced my latest book last week, I forgot to mention that you can pre-order a signed copy here. I will ship the books the week of 10/20, when it is published.
·schneier.com·
Signed Copies of Rewiring Democracy - Schneier on Security
Sports streaming piracy service with 123M yearly visits shut down
Sports streaming piracy service with 123M yearly visits shut down
​Calcio, a large piracy sports streaming platform with more than 120 million visits in the past year, was shut down following a collaborative effort by the Alliance for Creativity and Entertainment (ACE) and DAZN.
·bleepingcomputer.com·
Sports streaming piracy service with 123M yearly visits shut down
SHARED INTEL Q&A: Is your antivirus catching fresh threats — or just echoing VirusTotal?
SHARED INTEL Q&A: Is your antivirus catching fresh threats — or just echoing VirusTotal?
In cybersecurity, trust often hinges on what users think their software is doing — versus what’s actually happening under the hood. Related: Eddy Willem's 'Borrowed Brains' findings Take antivirus, for example. Many users assume threat detection is based on proprietary research, unique signatures, and internal analysis. But what happens when a product’s detection engine is
·lastwatchdog.com·
SHARED INTEL Q&A: Is your antivirus catching fresh threats — or just echoing VirusTotal?
Hackers hijack npm packages with 2 billion weekly downloads in supply chain attack
Hackers hijack npm packages with 2 billion weekly downloads in supply chain attack
In what is being called the largest supply chain attack in history, attackers have injected malware into NPM packages with over 2.6 billion weekly downloads after compromising maintainers' accounts in a phishing attack.
·bleepingcomputer.com·
Hackers hijack npm packages with 2 billion weekly downloads in supply chain attack