Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31294 bookmarks
Custom sorting
New Mirai botnet infect TBK DVR devices via command injection flaw
New Mirai botnet infect TBK DVR devices via command injection flaw
A new variant of the Mirai malware botnet is exploiting a command injection vulnerability in TBK DVR-4104 and DVR-4216 digital video recording devices to hijack them.
·bleepingcomputer.com·
New Mirai botnet infect TBK DVR devices via command injection flaw
Comment les pirates brouillent les traces des cryptomonnaies qu’ils volent
Comment les pirates brouillent les traces des cryptomonnaies qu’ils volent
Au programme, des techniques comme le « Peel Chain », des mixeurs ou encore des services d'échange opaques. Ce 4 mars, Ben Zhou, le P-DG de la plateforme d'échange Bybit, a une mauvaise nouvelle à annoncer sur le réseau social X. Un peu plus de dix jours après le spectaculaire piratage de l'échangeur, un hack
·numerama.com·
Comment les pirates brouillent les traces des cryptomonnaies qu’ils volent
Voici les trois meilleurs VPN du moment en promotion
Voici les trois meilleurs VPN du moment en promotion
Avoir un VPN pour se rendre sur Internet s'est largement démocratisé, grâce notamment à des campagnes marketing intensives de la part des fournisseurs. Mais quels sont les meilleurs VPN du moment au meilleur rapport qualité-prix ? Les VPN sont de plus en plus utilisés pour surfer l'esprit tranquille sur vos appareils
·numerama.com·
Voici les trois meilleurs VPN du moment en promotion
Malicious npm packages posing as utilities delete project directories
Malicious npm packages posing as utilities delete project directories
Two malicious packages have been discovered in the npm JavaScript package index, which masquerades as useful utilities but, in reality, are destructive data wipers that delete entire application directories.
·bleepingcomputer.com·
Malicious npm packages posing as utilities delete project directories
Supply chain attack hits Gluestack NPM packages with 960K weekly downloads
Supply chain attack hits Gluestack NPM packages with 960K weekly downloads
A significant supply chain attack hit NPM after 15 popular Gluestack packages with over 950,000 weekly downloads were compromised to include malicious code that acts as a remote access trojan (RAT).
·bleepingcomputer.com·
Supply chain attack hits Gluestack NPM packages with 960K weekly downloads
MY TAKE: Are we ‘Super f**cked’ by agentic AI? — debate gets 10 million + views on YouTube
MY TAKE: Are we ‘Super f**cked’ by agentic AI? — debate gets 10 million + views on YouTube
The day after my column dissecting Chris Sacca's viral outburst went live—his now-notorious claim that we are "super f**ked" by artificial intelligence—I stumbled onto another AI conversation that had already amassed over 10 million views: a roundtable debate hosted by Steven Bartlett on his widely watched YouTube show, Diary of a CEO. Related: Ordinary folks
·lastwatchdog.com·
MY TAKE: Are we ‘Super f**cked’ by agentic AI? — debate gets 10 million + views on YouTube
Hearing on the Federal Government and AI - Schneier on Security
Hearing on the Federal Government and AI - Schneier on Security
On Thursday I testified before the House Committee on Oversight and Government Reform at a hearing titled “The Federal Government in the Age of Artificial Intelligence.” The other speakers mostly talked about how cool AI was—and sometimes about how cool their own company was—but I was asked by the Democrats to specifically talk about DOGE and the risks of exfiltrating our data from government agencies and feeding it into AIs. My written testimony is here. Video of the hearing is here.
·schneier.com·
Hearing on the Federal Government and AI - Schneier on Security
Arnaque mondiale au recrutement : les USA traquent de faux développeurs Nord-Coréens
Arnaque mondiale au recrutement : les USA traquent de faux développeurs Nord-Coréens
Le Département de la Justice américain (DOJ) a déposé une plainte pour geler plus de 7,7 millions de dollars sous la forme de cryptomonnaies, NFT et autres actifs numériques. Une somme relativement modeste, mais qui cache un plus vaste réseau international de blanchiment d’argent orchestré par la Corée du Nord. Le
·numerama.com·
Arnaque mondiale au recrutement : les USA traquent de faux développeurs Nord-Coréens
Microsoft shares script to restore inetpub folder you shouldn’t delete
Microsoft shares script to restore inetpub folder you shouldn’t delete
Microsoft has released a PowerShell script to help restore an empty 'inetpub' folder created by the April 2025 Windows security updates if deleted. As Microsoft previously warned, this folder helps mitigate a high-severity Windows Process Activation privilege escalation vulnerability.
·bleepingcomputer.com·
Microsoft shares script to restore inetpub folder you shouldn’t delete
OpenAI forced to preserve ChatGPT chats
OpenAI forced to preserve ChatGPT chats
ChatGPT developer Open AI has been ordered to maintain user chats as it battle a lawsuit from The New York Times and other publishers.
·malwarebytes.com·
OpenAI forced to preserve ChatGPT chats
Avec son nouveau "Cyber Blueprint", l’UE muscle sa gestion des crises cyber
Avec son nouveau "Cyber Blueprint", l’UE muscle sa gestion des crises cyber
Face à l'accroissement des menaces cyber, l'Union européenne révise son "Cyber Blueprint". Adopté par le Conseil de l'UE, ce cadre stratégique...-Cybersécurité
·usine-digitale.fr·
Avec son nouveau "Cyber Blueprint", l’UE muscle sa gestion des crises cyber
Kettering Health confirms Interlock ransomware behind cyberattack
Kettering Health confirms Interlock ransomware behind cyberattack
Healthcare giant Kettering Health, which manages 14 medical centers in Ohio, confirmed that the Interlock ransomware group breached its network and stole data in a May cyberattack.
·bleepingcomputer.com·
Kettering Health confirms Interlock ransomware behind cyberattack
In the Beginning, Before Zero Trust | CSA
In the Beginning, Before Zero Trust | CSA
Not all visions can predict the future. That future is now, and cybersecurity needs to reinvent itself. Zero Trust is the solution.
·cloudsecurityalliance.org·
In the Beginning, Before Zero Trust | CSA
Report on the Malicious Uses of AI - Schneier on Security
Report on the Malicious Uses of AI - Schneier on Security
OpenAI just published its annual report on malicious uses of AI. By using AI as a force multiplier for our expert investigative teams, in the three months since our last report we’ve been able to detect, disrupt and expose abusive activity including social engineering, cyber espionage, deceptive employment schemes, covert influence operations and scams. These operations originated in many parts of the world, acted in many different ways, and focused on many different targets. A significant number appeared to originate in China: Four of the 10 cases in this report, spanning social engineering, covert influence operations and cyber threats, likely had a Chinese origin. But we’ve disrupted abuses from many other countries too: this report includes case studies of a likely task scam from Cambodia, comment spamming apparently from the Philippines, covert influence attempts potentially linked with Russia and Iran, and deceptive employment schemes...
·schneier.com·
Report on the Malicious Uses of AI - Schneier on Security
La vérité derrière l’autopen de Joe Biden qui affole les pro-Trump
La vérité derrière l’autopen de Joe Biden qui affole les pro-Trump
La récente enquête réclamée par Donald Trump sur l’utilisation de l’autopen par Joe Biden a relancé les débats autour de cette technologie ancienne, pourtant méconnue. Alors que les partisans de Trump y voient une preuve de « décadence cognitive », un rapide retour en arrière sur le fonctionnement et l'histoire de
·numerama.com·
La vérité derrière l’autopen de Joe Biden qui affole les pro-Trump