Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

30533 bookmarks
Custom sorting
Marks & Spencer faces $402 million profit hit after cyberattack
Marks & Spencer faces $402 million profit hit after cyberattack
British retailer giant Marks & Spencer (M&S) is bracing for a potential profit hit of up to £300 million £300 million ($402 million) following a recent cyberattack that led to widespread operational and sales disruptions.
·bleepingcomputer.com·
Marks & Spencer faces $402 million profit hit after cyberattack
Coinbase says recent data breach impacts 69,461 customers
Coinbase says recent data breach impacts 69,461 customers
Coinbase, a cryptocurrency exchange with over 100 million customers, revealed that a recent data breach in which cybercriminals stole customer and corporate data affected 69,461 individuals
·bleepingcomputer.com·
Coinbase says recent data breach impacts 69,461 customers
Convoluted layers: An artificial intelligence primer | Cyber.gov.au
Convoluted layers: An artificial intelligence primer | Cyber.gov.au
Rapid advances in artificial intelligence (AI), along with public releases of AI products, have prompted governments, businesses and criminals to accelerate efforts to incorporate this new technology into their operations. This advice provides definitions for some of the most commonly encountered AI terms in cybersecurity and a brief typology of cyberthreats that will arise from AI.
·cyber.gov.au·
Convoluted layers: An artificial intelligence primer | Cyber.gov.au
PowerSchool hacker pleads guilty to student data extortion scheme
PowerSchool hacker pleads guilty to student data extortion scheme
A 19-year-old college student from Worcester, Massachusetts, has agreed to plead guilty to a massive cyberattack on PowerSchool that extorted millions of dollars in exchange for not leaking the personal data of millions of students and teachers.
·bleepingcomputer.com·
PowerSchool hacker pleads guilty to student data extortion scheme
Security Framework for Small Cloud Providers | CSA
Security Framework for Small Cloud Providers | CSA
CSA’s Enterprise Authority to Operate (EATO) framework and auditing guidelines are specifically designed to fulfill stringent regulatory compliance.
·cloudsecurityalliance.org·
Security Framework for Small Cloud Providers | CSA
KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS
KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS
KrebsOnSecurity last week was hit by a near record distributed denial-of-service (DDoS) attack that clocked in at more than 6.3 terabits of data per second (a terabit is one trillion bits of data). The brief attack appears to have been…
·krebsonsecurity.com·
KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS
Senators question Noem about CISA cuts, but get few details
Senators question Noem about CISA cuts, but get few details
Homeland Security Secretary Kristi Noem declined to provide specifics on what would be removed from the nation’s leading cybersecurity agency in light of the Trump administration’s proposed $491 million budget cut to the organization.
·therecord.media·
Senators question Noem about CISA cuts, but get few details
Mobile carrier Cellcom confirms cyberattack behind extended outages
Mobile carrier Cellcom confirms cyberattack behind extended outages
Wisconsin wireless provider Cellcom has confirmed that a cyberattack is responsible for the widespread service outage and disruptions that began on the evening of May 14, 2025.
·bleepingcomputer.com·
Mobile carrier Cellcom confirms cyberattack behind extended outages
Premium WordPress 'Motors' theme vulnerable to admin takeover attacks
Premium WordPress 'Motors' theme vulnerable to admin takeover attacks
A critical privilege escalation vulnerability has been discovered in the premium WordPress theme Motors, which allows unauthenticated attackers to hijack administrator accounts and take complete control of websites.
·bleepingcomputer.com·
Premium WordPress 'Motors' theme vulnerable to admin takeover attacks
High-profile CISA departure adds to agency’s struggles
High-profile CISA departure adds to agency’s struggles
The Trump administration’s workforce purge is sapping CISA of its best talent, experts say. CISA deputy Matt Hartman is the latest to leave the agency.
·cybersecuritydive.com·
High-profile CISA departure adds to agency’s struggles
VanHelsing ransomware builder leaked on hacking forum
VanHelsing ransomware builder leaked on hacking forum
The VanHelsing ransomware-as-a-service operation published the source code for its affiliate panel, data leak blog, and Windows encryptor builder after an old developer tried to sell it on the RAMP cybercrime forum.
·bleepingcomputer.com·
VanHelsing ransomware builder leaked on hacking forum
Google a trouvé une arme de destruction massive pour devenir le leader de l’IA
Google a trouvé une arme de destruction massive pour devenir le leader de l’IA
À l’occasion de sa conférence annuelle I/O, Google a trouvé surement l’astuce idéale pour faire de Gemini l'une des intelligences artificielles les plus performantes du moment. Avec « Personal Context », entend devenir un véritable assistant personnel. Parce qu'il est au cœur de la vie numérique de bien des
·numerama.com·
Google a trouvé une arme de destruction massive pour devenir le leader de l’IA
Cyberthreat to Alabama state government ‘neutralized’
Cyberthreat to Alabama state government ‘neutralized’
After a cyberattack first identified about 10 days ago, Alabama's IT leaders said the "threat has been neutralized and Alabama’s core operations are safe and stable."
·therecord.media·
Cyberthreat to Alabama state government ‘neutralized’
Uncensored AI Tool Raises Cybersecurity Alarms
Uncensored AI Tool Raises Cybersecurity Alarms
The Venice.ai chatbot gained traction in hacking forums for its uncensored access to advanced models
·infosecurity-magazine.com·
Uncensored AI Tool Raises Cybersecurity Alarms
Hazy Hawk gang exploits DNS misconfigs to hijack trusted domains
Hazy Hawk gang exploits DNS misconfigs to hijack trusted domains
A threat actor named 'Hazy Hawk' has been using DNS CNAME hijacking to hijack abandoned cloud endpoints of domains belonging to trusted organizations and incorporate them in large-scale scam delivery and traffic distribution systems (TDS).
·bleepingcomputer.com·
Hazy Hawk gang exploits DNS misconfigs to hijack trusted domains