Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29804 bookmarks
Custom sorting
Security Framework for Small Cloud Providers | CSA
Security Framework for Small Cloud Providers | CSA
CSA’s Enterprise Authority to Operate (EATO) framework and auditing guidelines are specifically designed to fulfill stringent regulatory compliance.
·cloudsecurityalliance.org·
Security Framework for Small Cloud Providers | CSA
KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS
KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS
KrebsOnSecurity last week was hit by a near record distributed denial-of-service (DDoS) attack that clocked in at more than 6.3 terabits of data per second (a terabit is one trillion bits of data). The brief attack appears to have been…
·krebsonsecurity.com·
KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS
Senators question Noem about CISA cuts, but get few details
Senators question Noem about CISA cuts, but get few details
Homeland Security Secretary Kristi Noem declined to provide specifics on what would be removed from the nation’s leading cybersecurity agency in light of the Trump administration’s proposed $491 million budget cut to the organization.
·therecord.media·
Senators question Noem about CISA cuts, but get few details
Mobile carrier Cellcom confirms cyberattack behind extended outages
Mobile carrier Cellcom confirms cyberattack behind extended outages
Wisconsin wireless provider Cellcom has confirmed that a cyberattack is responsible for the widespread service outage and disruptions that began on the evening of May 14, 2025.
·bleepingcomputer.com·
Mobile carrier Cellcom confirms cyberattack behind extended outages
Premium WordPress 'Motors' theme vulnerable to admin takeover attacks
Premium WordPress 'Motors' theme vulnerable to admin takeover attacks
A critical privilege escalation vulnerability has been discovered in the premium WordPress theme Motors, which allows unauthenticated attackers to hijack administrator accounts and take complete control of websites.
·bleepingcomputer.com·
Premium WordPress 'Motors' theme vulnerable to admin takeover attacks
High-profile CISA departure adds to agency’s struggles
High-profile CISA departure adds to agency’s struggles
The Trump administration’s workforce purge is sapping CISA of its best talent, experts say. CISA deputy Matt Hartman is the latest to leave the agency.
·cybersecuritydive.com·
High-profile CISA departure adds to agency’s struggles
VanHelsing ransomware builder leaked on hacking forum
VanHelsing ransomware builder leaked on hacking forum
The VanHelsing ransomware-as-a-service operation published the source code for its affiliate panel, data leak blog, and Windows encryptor builder after an old developer tried to sell it on the RAMP cybercrime forum.
·bleepingcomputer.com·
VanHelsing ransomware builder leaked on hacking forum
Google a trouvé une arme de destruction massive pour devenir le leader de l’IA
Google a trouvé une arme de destruction massive pour devenir le leader de l’IA
À l’occasion de sa conférence annuelle I/O, Google a trouvé surement l’astuce idéale pour faire de Gemini l'une des intelligences artificielles les plus performantes du moment. Avec « Personal Context », entend devenir un véritable assistant personnel. Parce qu'il est au cœur de la vie numérique de bien des
·numerama.com·
Google a trouvé une arme de destruction massive pour devenir le leader de l’IA
Cyberthreat to Alabama state government ‘neutralized’
Cyberthreat to Alabama state government ‘neutralized’
After a cyberattack first identified about 10 days ago, Alabama's IT leaders said the "threat has been neutralized and Alabama’s core operations are safe and stable."
·therecord.media·
Cyberthreat to Alabama state government ‘neutralized’
Uncensored AI Tool Raises Cybersecurity Alarms
Uncensored AI Tool Raises Cybersecurity Alarms
The Venice.ai chatbot gained traction in hacking forums for its uncensored access to advanced models
·infosecurity-magazine.com·
Uncensored AI Tool Raises Cybersecurity Alarms
Hazy Hawk gang exploits DNS misconfigs to hijack trusted domains
Hazy Hawk gang exploits DNS misconfigs to hijack trusted domains
A threat actor named 'Hazy Hawk' has been using DNS CNAME hijacking to hijack abandoned cloud endpoints of domains belonging to trusted organizations and incorporate them in large-scale scam delivery and traffic distribution systems (TDS).
·bleepingcomputer.com·
Hazy Hawk gang exploits DNS misconfigs to hijack trusted domains
Service desks are under attack: What can you do about it?
Service desks are under attack: What can you do about it?
Service desks are on the front lines of defense—and attackers know it. Attackers are using social engineering attacks to trick agents into changing passwords, disabling MFA, and granting access. Learn more from Specops Software on how to secure your service desk.
·bleepingcomputer.com·
Service desks are under attack: What can you do about it?
RVTools hit in supply chain attack to deliver Bumblebee malware
RVTools hit in supply chain attack to deliver Bumblebee malware
The official website for the RVTools VMware management tool was taken offline in what appears to be a supply chain attack where hackers replaced a DLL in the distributed installer to drop the Bumblebee malware loader on users' machines.
·bleepingcomputer.com·
RVTools hit in supply chain attack to deliver Bumblebee malware
High-Profile AI Failures Teach Us About Resilience | CSA
High-Profile AI Failures Teach Us About Resilience | CSA
When AI fails, it often fails fast and loud. Apply CSA’s AI Resilience Benchmarking Model to 4 real incidents to get a better understanding of AI failures.
·cloudsecurityalliance.org·
High-Profile AI Failures Teach Us About Resilience | CSA