Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29805 bookmarks
Custom sorting
« La navigation privée suffit à protéger mon anonymat en ligne » : mythe ou réalité ?
« La navigation privée suffit à protéger mon anonymat en ligne » : mythe ou réalité ?
Pour échapper aux trackers, à la publicité ciblée ou simplement ne pas enregistrer son historique de navigation, il est commun d’activer la navigation privée. Voici pourquoi c’est une fausse bonne idée. La plupart des navigateurs web disposent d’une fonctionnalité de navigation privée. Très pratique et simple à
·numerama.com·
« La navigation privée suffit à protéger mon anonymat en ligne » : mythe ou réalité ?
Friday Squid Blogging: US Naval Ship Attacked by Squid in 1978 - Schneier on Security
Friday Squid Blogging: US Naval Ship Attacked by Squid in 1978 - Schneier on Security
Interesting story: USS Stein was underway when her anti-submarine sonar gear suddenly stopped working. On returning to port and putting the ship in a drydock, engineers observed many deep scratches in the sonar dome’s rubber “NOFOUL” coating. In some areas, the coating was described as being shredded, with rips up to four feet long. Large claws were left embedded at the bottom of most of the scratches. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
·schneier.com·
Friday Squid Blogging: US Naval Ship Attacked by Squid in 1978 - Schneier on Security
Hacker steals $223 million in Cetus Protocol cryptocurrency heist
Hacker steals $223 million in Cetus Protocol cryptocurrency heist
The decentralized exchange Cetus Protocol announced that hackers have stolen $223 million in cryptocurrency and is offering a deal to stop all legal action if the funds are returned.
·bleepingcomputer.com·
Hacker steals $223 million in Cetus Protocol cryptocurrency heist
Dozens of malicious packages on NPM collect host and network data
Dozens of malicious packages on NPM collect host and network data
60 packages have been discovered in the NPM index that attempt to collect sensitive host and network data and send it to a Discord webhook controlled by the threat actor.
·bleepingcomputer.com·
Dozens of malicious packages on NPM collect host and network data
FBI warns of Luna Moth extortion attacks targeting law firms
FBI warns of Luna Moth extortion attacks targeting law firms
The FBI warned that an extortion gang known as the Silent Ransom Group has been targeting U.S. law firms over the last two years in callback phishing and social engineering attacks.
·bleepingcomputer.com·
FBI warns of Luna Moth extortion attacks targeting law firms
US, Europol arrest 270 dark web drug traffickers in Operation RapTor
US, Europol arrest 270 dark web drug traffickers in Operation RapTor
U.S. and EU law enforcement seized more than $200 million and 144 kilograms of fentanyl or fentanyl-laced narcotics alongside 180 firearms as part of the international effort.
·therecord.media·
US, Europol arrest 270 dark web drug traffickers in Operation RapTor
Large-scale sting tied to Operation Endgame disrupts ransomware infrastructure | CyberScoop
Large-scale sting tied to Operation Endgame disrupts ransomware infrastructure | CyberScoop
Law enforcement agencies in Europe and North America have dismantled major infrastructure used in ransomware attacks as part of Operation Endgame, disrupting initial access malware and issuing international arrest warrants against key suspects.
·cyberscoop.com·
Large-scale sting tied to Operation Endgame disrupts ransomware infrastructure | CyberScoop
Balancing Privacy & Cybersecurity | CSA
Balancing Privacy & Cybersecurity | CSA
Explore how privacy intersects with cybersecurity and how aligning them strengthens data protection strategies.
·cloudsecurityalliance.org·
Balancing Privacy & Cybersecurity | CSA
Scarcity signals: Are rare activities red flags?
Scarcity signals: Are rare activities red flags?
Talos analyzed six months of PowerShell network telemetry and found that rare domains are over three times more likely to be malicious compared to frequently contacted ones.
·blog.talosintelligence.com·
Scarcity signals: Are rare activities red flags?
Phishing Campaigns: Taking the Pressure Off Employees | CSA
Phishing Campaigns: Taking the Pressure Off Employees | CSA
A tailored phishing campaign runs on personal information. Taking employees’ personal information out of circulation deprives attackers of a valuable resource.
·cloudsecurityalliance.org·
Phishing Campaigns: Taking the Pressure Off Employees | CSA
Signal Blocks Windows Recall - Schneier on Security
Signal Blocks Windows Recall - Schneier on Security
This article gives a good rundown of the security risks of Windows Recall, and the repurposed copyright protection took that Signal used to block the AI feature from scraping Signal data.
·schneier.com·
Signal Blocks Windows Recall - Schneier on Security
TikTok videos now push infostealer malware in ClickFix attacks
TikTok videos now push infostealer malware in ClickFix attacks
Cybercriminals are using TikTok videos to trick users into infecting themselves with Vidar and StealC information-stealing malware in ClickFix attacks.
·bleepingcomputer.com·
TikTok videos now push infostealer malware in ClickFix attacks
Windows 11 Notepad gets AI-powered text writing capabilities
Windows 11 Notepad gets AI-powered text writing capabilities
Microsoft is testing a new AI-powered text generation feature in Notepad that can let Windows Insiders create content based on custom prompts.
·bleepingcomputer.com·
Windows 11 Notepad gets AI-powered text writing capabilities
Global Dark Web Sting Sees 270 Arrested
Global Dark Web Sting Sees 270 Arrested
Operation Raptor also resulted in the seizure of $184m and a record amount of illegal drugs, firearms and drug trafficking proceeds
·infosecurity-magazine.com·
Global Dark Web Sting Sees 270 Arrested
DragonForce Engages in "Turf War" for Ransomware Dominance
DragonForce Engages in "Turf War" for Ransomware Dominance
Sophos has observed DragonForce attacking rival ransomware operators including RansomHub as it seeks to expand its reach in the cybercrime marketplace
·infosecurity-magazine.com·
DragonForce Engages in "Turf War" for Ransomware Dominance