Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

30430 bookmarks
Custom sorting
News alert: Comp AI lands $2.6M pre-seed to modernize compliance, disrupt SOC 2 market
News alert: Comp AI lands $2.6M pre-seed to modernize compliance, disrupt SOC 2 market
San Francisco, Calif., Aug. 1, 2025, CyberNewswire—Comp AI, an emerging player in the compliance automation space, today announced it has secured $2.6 million in pre-seed funding to accelerate its mission of transforming how companies achieve compliance with critical frameworks like SOC 2 and HIPAA. The funding round was co-led by OSS Capital and Grand Ventures,
·lastwatchdog.com·
News alert: Comp AI lands $2.6M pre-seed to modernize compliance, disrupt SOC 2 market
OpenAI may be testing a cheaper paid plan for ChatGPT
OpenAI may be testing a cheaper paid plan for ChatGPT
OpenAI is reportedly working on a new plan called 'Go,' which would be cheaper than the existing $20 Plus subscription.
·bleepingcomputer.com·
OpenAI may be testing a cheaper paid plan for ChatGPT
SonicWall firewall devices hit in surge of Akira ransomware attacks
SonicWall firewall devices hit in surge of Akira ransomware attacks
SonicWall firewall devices have been increasingly targeted since late July in a surge of Akira ransomware attacks, potentially exploiting a previously unknown security vulnerability, according to cybersecurity company Arctic Wolf.
·bleepingcomputer.com·
SonicWall firewall devices hit in surge of Akira ransomware attacks
Hackers leak purported Aeroflot data as Russia denies breach
Hackers leak purported Aeroflot data as Russia denies breach
Hackers have leaked flight records allegedly belonging to the CEO of the Russian airline Aeroflot following a major cyberattack that grounded flights.
·therecord.media·
Hackers leak purported Aeroflot data as Russia denies breach
Pi-hole discloses data breach via GiveWp WordPress plugin flaw
Pi-hole discloses data breach via GiveWp WordPress plugin flaw
Pi-hole, a popular network-level ad-blocker, has disclosed that donor names and email addresses were exposed through a security vulnerability in the GiveWP WordPress donation plugin.
·bleepingcomputer.com·
Pi-hole discloses data breach via GiveWp WordPress plugin flaw
The Best Go-To Guide to Network+ Performance Based Questions
The Best Go-To Guide to Network+ Performance Based Questions
Want to know how to ace CompTIA Network+ performance based questions in the exam? Read this article to learn every tip and trick you need for mastery.
·stationx.net·
The Best Go-To Guide to Network+ Performance Based Questions
Proton vient défier Google avec un outil de sécurité crucial pour l’internaute
Proton vient défier Google avec un outil de sécurité crucial pour l’internaute
Proton annonce le lancement de Proton Authenticator, un logiciel pour smartphone et pour ordinateur pour gérer ses codes pour la double authentification. L'outil vient challenger les ténors du genre, comme Google Authenticator. Avoir un mot de passe d'excellente qualité et unique par service, c'est bien. Utiliser un
·numerama.com·
Proton vient défier Google avec un outil de sécurité crucial pour l’internaute
« J’ai peur pour la suite », près de la moitié des attaques ransomware incluent des menaces physiques
« J’ai peur pour la suite », près de la moitié des attaques ransomware incluent des menaces physiques
Dans une étude publiée le 31 juillet 2025 et menée auprès de plus de 1 500 entreprises à travers le monde, la société américaine Semperis révèle que 78 % des entreprises interrogées ont été la cible d’une tentative de ransomware au cours de l’année écoulée. Parmi les victimes d'une attaque réussie, 40 % déclarent
·numerama.com·
« J’ai peur pour la suite », près de la moitié des attaques ransomware incluent des menaces physiques
AI-powered Cursor IDE vulnerable to prompt-injection attacks
AI-powered Cursor IDE vulnerable to prompt-injection attacks
A vulnerability that researchers call CurXecute is present in almost all versions of the AI-powered code editor Cursor, and can be exploited to execute remote code with developer privileges.
·bleepingcomputer.com·
AI-powered Cursor IDE vulnerable to prompt-injection attacks