Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31056 bookmarks
Custom sorting
Workday s’est fait piĂ©ger par la mĂ©thode redoutable des hackers, les cyberattaques par CRM
Workday s’est fait piĂ©ger par la mĂ©thode redoutable des hackers, les cyberattaques par CRM
Dans un communiquĂ© publiĂ© le 15 aoĂ»t 2025, le gĂ©ant des logiciels RH Workday annonce avoir Ă©tĂ© victime d'une cyberattaque ayant compromis certaines donnĂ©es professionnelles de ses clients. L'offensive s’inscrit dans un mode opĂ©ratoire particuliĂšrement efficace, qui vise les CRM des entreprises et qui continue
·numerama.com·
Workday s’est fait piĂ©ger par la mĂ©thode redoutable des hackers, les cyberattaques par CRM
Nebraska man gets 1 year in prison for $3.5M cryptojacking scheme
Nebraska man gets 1 year in prison for $3.5M cryptojacking scheme
A Nebraska man was sentenced to one year in prison for defrauding cloud computing providers of over $3.5 million to mine cryptocurrency worth nearly $1 million.
·bleepingcomputer.com·
Nebraska man gets 1 year in prison for $3.5M cryptojacking scheme
XenoRAT malware campaign hits multiple embassies in South Korea
XenoRAT malware campaign hits multiple embassies in South Korea
A state-sponsored espionage campaign is targeting foreign embassies in South Korea to deploy XenoRAT malware from malicious GitHub repositories.
·bleepingcomputer.com·
XenoRAT malware campaign hits multiple embassies in South Korea
Massive Allianz Life data breach impacts 1.1 million people
Massive Allianz Life data breach impacts 1.1 million people
Hackers have stolen the personal information of 1.1 million individuals in a Salesforce data theft attack, which impacted U.S. insurance giant Allianz Life in July.
·bleepingcomputer.com·
Massive Allianz Life data breach impacts 1.1 million people
How to spot the latest fake Gmail security alerts
How to spot the latest fake Gmail security alerts
Fake Gmail security alerts are tricking users into inadvertently handing over control of their accounts to scammers. Here's what to look for.
·malwarebytes.com·
How to spot the latest fake Gmail security alerts
ERMAC Android malware source code leak exposes banking trojan infrastructure
ERMAC Android malware source code leak exposes banking trojan infrastructure
The source code for version 3 of the ERMAC Android banking trojan has been leaked online, exposing the internals of the malware-as-a-service platform and the operator's infrastructure.
·bleepingcomputer.com·
ERMAC Android malware source code leak exposes banking trojan infrastructure
AI for Cybersecurity: Building Trust in Your Workflows
AI for Cybersecurity: Building Trust in Your Workflows
In cybersecurity, speed matters, but trust is crucial. AI must ensure both rapid response and reliable decisions to avoid errors.
·securityaffairs.com·
AI for Cybersecurity: Building Trust in Your Workflows
Over 800 N-able servers left unpatched against critical flaws
Over 800 N-able servers left unpatched against critical flaws
Over 800 N-able N-central servers remain unpatched against a pair of critical security vulnerabilities tagged as actively exploited last week.
·bleepingcomputer.com·
Over 800 N-able servers left unpatched against critical flaws
Mozilla warns Germany could soon declare ad blockers illegal
Mozilla warns Germany could soon declare ad blockers illegal
A recent ruling from Germany's Federal Supreme Court (BGH) has revived a legal battle over whether browser-based ad blockers infringe copyright, raising fears about a potential ban of the tools in the country.
·bleepingcomputer.com·
Mozilla warns Germany could soon declare ad blockers illegal
Instagram Map: What is it and how do I control it?
Instagram Map: What is it and how do I control it?
Meta has introduced Instagram Map. How can you control what others can see about your location? An explainer.
·malwarebytes.com·
Instagram Map: What is it and how do I control it?
USB Malware Campaign Spreads Cryptominer Worldwide
USB Malware Campaign Spreads Cryptominer Worldwide
A multi-stage attack delivered via USB devices has been observed installing cryptomining malware using DLL hijacking and PowerShell
·infosecurity-magazine.com·
USB Malware Campaign Spreads Cryptominer Worldwide
Popular npm Package Compromised in Phishing Attack
Popular npm Package Compromised in Phishing Attack
An incident involving the npm package eslint-config-prettier has been uncovered spreading Scavenger RAT
·infosecurity-magazine.com·
Popular npm Package Compromised in Phishing Attack