Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

30326 bookmarks
Custom sorting
ShinyHunters behind Salesforce data theft attacks at Qantas, Allianz Life, and LVMH
ShinyHunters behind Salesforce data theft attacks at Qantas, Allianz Life, and LVMH
A wave of data breaches impacting companies like Qantas, Allianz Life, LVMH, and Adidas has been linked to the ShinyHunters extortion group, which has been using voice phishing attacks to steal data from Salesforce CRM instances.
·bleepingcomputer.com·
ShinyHunters behind Salesforce data theft attacks at Qantas, Allianz Life, and LVMH
Hackers target Python devs in phishing attacks using fake PyPI site
Hackers target Python devs in phishing attacks using fake PyPI site
The Python Software Foundation warned users this week that threat actors are trying to steal their credentials in phishing attacks using a fake Python Package Index (PyPI) website.
·bleepingcomputer.com·
Hackers target Python devs in phishing attacks using fake PyPI site
Scammers Unleash Flood of Slick Online Gaming Sites
Scammers Unleash Flood of Slick Online Gaming Sites
Fraudsters are flooding Discord and other social media platforms with ads for hundreds of polished online gaming and wagering websites that lure people with free credits and eventually abscond with any cryptocurrency funds deposited by players. Here's a closer look…
·krebsonsecurity.com·
Scammers Unleash Flood of Slick Online Gaming Sites
Army Secretary forces West Point to rescind appointment given to Easterly | CyberScoop
Army Secretary forces West Point to rescind appointment given to Easterly | CyberScoop
The United States Military Academy abruptly ended the appointment of Jen Easterly to a high-profile academic position in West Point’s Department of Social Sciences, according to a memorandum issued Wednesday by the Secretary of the Army.
·cyberscoop.com·
Army Secretary forces West Point to rescind appointment given to Easterly | CyberScoop
Safepay ransomware threatens to leak 3.5TB of Ingram Micro data
Safepay ransomware threatens to leak 3.5TB of Ingram Micro data
The SafePay ransomware gang is threatening to leak 3.5TB of data belonging to IT giant Ingram Micro, allegedly stolen from the company's compromised systems earlier this month.
·bleepingcomputer.com·
Safepay ransomware threatens to leak 3.5TB of Ingram Micro data
Hackers actively exploit critical RCE in WordPress Alone theme
Hackers actively exploit critical RCE in WordPress Alone theme
Threat actors are actively exploiting a critical unauthenticated arbitrary file upload vulnerability in the WordPress theme 'Alone,' to achieve remote code execution and perform a full site takeover.
·bleepingcomputer.com·
Hackers actively exploit critical RCE in WordPress Alone theme
Le gestionnaire de mots de passe de Dropbox : ce qu’il va se passer
Le gestionnaire de mots de passe de Dropbox : ce qu’il va se passer
Dropbox a pris la décision d'arrêter son aventure du gestionnaire de mots de passe, démarrée en 2020. L'outil sera progressivement coupé dans les mois à venir. Les internautes concernés doivent migrer sans tarder. C'était en 2020. En pleine période de pandémie de coronavirus, et de forte croissance dans le secteur du
·numerama.com·
Le gestionnaire de mots de passe de Dropbox : ce qu’il va se passer
Hackers plant 4G Raspberry Pi on bank network in failed ATM heist
Hackers plant 4G Raspberry Pi on bank network in failed ATM heist
The UNC2891 hacking group, also known as LightBasin, used a 4G-equipped Raspberry Pi hidden in a bank's network to bypass security defenses in a newly discovered attack.
·bleepingcomputer.com·
Hackers plant 4G Raspberry Pi on bank network in failed ATM heist
Elle aide Pyongyang à générer 17 millions de dollars depuis son salon et écope de 8 ans de prison
Elle aide Pyongyang à générer 17 millions de dollars depuis son salon et écope de 8 ans de prison
Accusée d’avoir sciemment aidé des agents nord-coréens à se faire recruter par de grandes entreprises américaines, Christina Chapman a été condamnée à plus de 8 ans de prison le 24 juillet par un tribunal fédéral. Blanchiment d'argent et usurpation d'identité : retour sur l'épilogue d'un fait divers cyber et
·numerama.com·
Elle aide Pyongyang à générer 17 millions de dollars depuis son salon et écope de 8 ans de prison
Apple patches security flaw exploited in Chrome zero-day attacks
Apple patches security flaw exploited in Chrome zero-day attacks
Apple has released security updates to address a high-severity vulnerability that has been exploited in zero-day attacks targeting Google Chrome users.
·bleepingcomputer.com·
Apple patches security flaw exploited in Chrome zero-day attacks
New Lenovo UEFI firmware updates fix Secure Boot bypass flaws
New Lenovo UEFI firmware updates fix Secure Boot bypass flaws
Lenovo is warning about high-severity BIOS flaws that could allow attackers to potentially bypass Secure Boot in all-in-one desktop PC models that use customized Insyde UEFI (Unified Extensible Firmware Interface).
·bleepingcomputer.com·
New Lenovo UEFI firmware updates fix Secure Boot bypass flaws
Hidden Backdoor Found in ATM Network via Raspberry Pi
Hidden Backdoor Found in ATM Network via Raspberry Pi
A covert ATM attack used a Raspberry Pi to breach bank systems, employing stealthy malware and anti-forensics techniques
·infosecurity-magazine.com·
Hidden Backdoor Found in ATM Network via Raspberry Pi
Palo Alto Networks to acquire CyberArk for $25 billion | CyberScoop
Palo Alto Networks to acquire CyberArk for $25 billion | CyberScoop
Palo Alto Networks has agreed to acquire identity security firm CyberArk for approximately $25 billion, marking the cybersecurity giant's largest acquisition and its formal entry into the identity security market.
·cyberscoop.com·
Palo Alto Networks to acquire CyberArk for $25 billion | CyberScoop
A Business Guide to Protecting PII on Social Media | CSA
A Business Guide to Protecting PII on Social Media | CSA
Steer clear of the dangers of oversharing on social media. This blog offers examples of what can go wrong and easy-to-follow steps on how to do things right.
·cloudsecurityalliance.org·
A Business Guide to Protecting PII on Social Media | CSA