Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29805 bookmarks
Custom sorting
MATLAB developer bringing systems back online following ransomware attack
MATLAB developer bringing systems back online following ransomware attack
Massachusetts-based MathWorks provided an update to customers on Monday after initially reporting outages on May 18, confirming that it experienced a ransomware attack that took down online applications and internal systems used by staff.
·therecord.media·
MATLAB developer bringing systems back online following ransomware attack
Fuite massive de Free : comment savoir si votre compte est concerné ?
Fuite massive de Free : comment savoir si votre compte est concerné ?
En octobre dernier, Free était victime d'un piratage massif de données, concernant 13,9 millions de comptes. Depuis ce 27 mai, le site Have I Been Pwned les répertorie. Voici comment savoir si votre compte est concerné. 26 octobre 2024 : Free informe ses abonnés qu'il a été victime d'une cyberattaque. Les données
·numerama.com·
Fuite massive de Free : comment savoir si votre compte est concerné ?
La CIA utilisait un site de fans Star Wars pour communiquer avec ses espions
La CIA utilisait un site de fans Star Wars pour communiquer avec ses espions
Derrière l’apparence inoffensive de centaines de sites web, dont un dédié à Star Wars, la CIA cachait un réseau de communication secret destiné à ses informateurs. Mal protégé, le dispositif a exposé de nombreux agents avec des conséquences humaines désastreuses. Nous sommes au début des années 2000 et la CIA
·numerama.com·
La CIA utilisait un site de fans Star Wars pour communiquer avec ses espions
CISA loses nearly all top officials as purge continues
CISA loses nearly all top officials as purge continues
Most of the leaders of the agency’s operating divisions and regional offices have left or will leave this month amid the Trump administration’s aggressive government-downsizing campaign.
·cybersecuritydive.com·
CISA loses nearly all top officials as purge continues
Not Every CVE Deserves a Fire Drill: Focus on What’s Exploitable
Not Every CVE Deserves a Fire Drill: Focus on What’s Exploitable
Not every "critical" vulnerability is a critical risk. Picus Exposure Validation cuts through the noise by testing what's actually exploitable in your environment — so you can patch what matters.
·bleepingcomputer.com·
Not Every CVE Deserves a Fire Drill: Focus on What’s Exploitable
Securing AI: Model Scanning & Red Teaming | CSA
Securing AI: Model Scanning & Red Teaming | CSA
Discover how model scanning and AI red teaming protect different layers of your AI stack - securing both what your models contain and how they behave.
·cloudsecurityalliance.org·
Securing AI: Model Scanning & Red Teaming | CSA
MATLAB dev confirms ransomware attack behind service outage
MATLAB dev confirms ransomware attack behind service outage
MathWorks, a leading developer of mathematical computing and simulation software, has revealed that a recent ransomware attack is behind an ongoing service outage.
·bleepingcomputer.com·
MATLAB dev confirms ransomware attack behind service outage
Threat-informed defense with HarfangLab EDR and FourCore ATTACK
Threat-informed defense with HarfangLab EDR and FourCore ATTACK
Adversary emulation is a key component of Threat-informed defense. This post details emulating Microsoft Edge browser data theft using FourCore ATTACK and validating detections with HarfangLab EDR to enhance security posture.
·fourcore.io·
Threat-informed defense with HarfangLab EDR and FourCore ATTACK
Chinese-Owned VPNs - Schneier on Security
Chinese-Owned VPNs - Schneier on Security
One one my biggest worries about VPNs is the amount of trust users need to place in them, and how opaque most of them are about who owns them and what sorts of data they retain. A new study found that many commercials VPNS are (often surreptitiously) owned by Chinese companies. It would be hard for U.S. users to avoid the Chinese VPNs. The ownership of many appeared deliberately opaque, with several concealing their structure behind layers of offshore shell companies. TTP was able to determine the Chinese ownership of the 20 VPN apps being offered to Apple’s U.S. users by piecing together corporate documents from around the world. None of those apps clearly disclosed their Chinese ownership...
·schneier.com·
Chinese-Owned VPNs - Schneier on Security
Building Compliant and Transparent Retail Trust | CSA
Building Compliant and Transparent Retail Trust | CSA
In retail, the commerce platform you choose should earn your trust through verifiable compliance practices & transparent operations that protect your customers.
·cloudsecurityalliance.org·
Building Compliant and Transparent Retail Trust | CSA
New Russia-affiliated actor Void Blizzard targets critical sectors for espionage
New Russia-affiliated actor Void Blizzard targets critical sectors for espionage
Microsoft Threat Intelligence has discovered a cluster of worldwide cloud abuse activity conducted by a threat actor we track as Void Blizzard, who we assess with high confidence is Russia-affiliated and has been active since at least April 2024. Void Blizzard’s cyberespionage operations tend to be highly targeted at specific organizations of interest to Russia, including in government, defense, transportation, media, non-governmental organizations (NGOs), and healthcare sectors primarily in Europe and North America.
·microsoft.com·
New Russia-affiliated actor Void Blizzard targets critical sectors for espionage
Russian Void Blizzard cyberspies linked to Dutch police breach
Russian Void Blizzard cyberspies linked to Dutch police breach
A previously unknown Russian-backed cyberespionage group now tracked as Void Blizzard has been linked to a September 2024 Dutch police security breach.
·bleepingcomputer.com·
Russian Void Blizzard cyberspies linked to Dutch police breach
Governments Urge Organizations to Prioritize SIEM/SOAR Adoption
Governments Urge Organizations to Prioritize SIEM/SOAR Adoption
A joint advisory from the US, UK, Australia and others highlights the importance of SIEM/SOAR platforms and overcoming implementation challenges
·infosecurity-magazine.com·
Governments Urge Organizations to Prioritize SIEM/SOAR Adoption