Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29802 bookmarks
Custom sorting
Fini les ransomwares, le groupe Hunters International se contentera de voler vos données
Fini les ransomwares, le groupe Hunters International se contentera de voler vos données
Hunters International, l’un des groupes de ransomwares les plus actifs de ces dernières années, a officiellement annoncé la fermeture de ses opérations en juillet 2025. Le groupe se transforme en une nouvelle entité baptisée « World Leaks », axée uniquement sur l’extorsion de données. Dans le monde de la startup
·numerama.com·
Fini les ransomwares, le groupe Hunters International se contentera de voler vos données
Interpol identifies West Africa as potential new hotspot for cybercrime compounds
Interpol identifies West Africa as potential new hotspot for cybercrime compounds
Interpol said it analyzed five years of data about the illicit industry, which relies on human trafficking to staff up centers with people who are forced to conduct investment fraud, romance scams and other schemes.
·therecord.media·
Interpol identifies West Africa as potential new hotspot for cybercrime compounds
CVE Program Launches Two New Forums to Enhance CVE Utilization
CVE Program Launches Two New Forums to Enhance CVE Utilization
The CVE Board has launched a Consumer Working Group and a Researcher Working Group, allowing new stakeholders to shape the future of the CVE Program
·infosecurity-magazine.com·
CVE Program Launches Two New Forums to Enhance CVE Utilization
Hunters International ransomware group claims to be shutting down
Hunters International ransomware group claims to be shutting down
“After careful consideration and in light of recent developments, we have decided to close the Hunters International project,” the prolific cybercrime gang wrote on its darknet site.
·therecord.media·
Hunters International ransomware group claims to be shutting down
What We Can Learn from the 2024 CrowdStrike Outage | CSA
What We Can Learn from the 2024 CrowdStrike Outage | CSA
The 2024 CrowdStrike outage exposed issues with centralized security solutions, process management, software testing, and incident response planning.
·cloudsecurityalliance.org·
What We Can Learn from the 2024 CrowdStrike Outage | CSA
North Korean Hackers Target Crypto Firms with Novel macOS Malware
North Korean Hackers Target Crypto Firms with Novel macOS Malware
SentinelLabs observed North Korean actors deploying novel TTPs to target crypto firms, including a mix of programming languages and signal-based persistence
·infosecurity-magazine.com·
North Korean Hackers Target Crypto Firms with Novel macOS Malware
What MITRE ATT&CK v17 Means for ESXi Security | CSA
What MITRE ATT&CK v17 Means for ESXi Security | CSA
MITRE ATT&CK v17 introduces an ESXi matrix, highlighting hypervisors as critical points of attack. Learn about the new TTPs and how to secure ESXi environments.
·cloudsecurityalliance.org·
What MITRE ATT&CK v17 Means for ESXi Security | CSA
Hunters International ransomware shuts down after World Leaks rebrand
Hunters International ransomware shuts down after World Leaks rebrand
​The Hunters International Ransomware-as-a-Service (RaaS) operation announced today that it has officially closed down its operations and will offer free decryptors to help victims recover their data without paying a ransom.
·bleepingcomputer.com·
Hunters International ransomware shuts down after World Leaks rebrand
Surveillance Used by a Drug Cartel - Schneier on Security
Surveillance Used by a Drug Cartel - Schneier on Security
Once you build a surveillance system, you can’t control who will use it: A hacker working for the Sinaloa drug cartel was able to obtain an FBI official’s phone records and use Mexico City’s surveillance cameras to help track and kill the agency’s informants in 2018, according to a new US justice department report. The incident was disclosed in a justice department inspector general’s audit of the FBI’s efforts to mitigate the effects of “ubiquitous technical surveillance,” a term used to describe the global proliferation of cameras and the thriving trade in vast stores of communications, travel, and location data...
·schneier.com·
Surveillance Used by a Drug Cartel - Schneier on Security
ChatGPT vous renvoie vers de mauvaises URLs et c’est formidable pour les hackers
ChatGPT vous renvoie vers de mauvaises URLs et c’est formidable pour les hackers
Une étude de la société de cybersécurité Netcraft révèle que des cybercriminels exploitent les errances des LLMs comme ChatGPT ou Perplexity. Cette nouvelle méthode de piratage repose sur les faux liens renvoyés par les IA génératives. Il était une époque, pas si lointaine, où l'utilisateur lambda cherchait lui-même
·numerama.com·
ChatGPT vous renvoie vers de mauvaises URLs et c’est formidable pour les hackers
Microsoft asks users to ignore Windows Firewall config errors
Microsoft asks users to ignore Windows Firewall config errors
Microsoft asked customers this week to disregard incorrect Windows Firewall errors that appear after rebooting their systems following the installation of the June 2025 preview update.
·bleepingcomputer.com·
Microsoft asks users to ignore Windows Firewall config errors
Linux Users Urged to Patch Critical Sudo CVE
Linux Users Urged to Patch Critical Sudo CVE
Two elevation of privilege vulnerabilities have been discovered on the popular Sudo utility, affecting 30-50 million endpoints in the US alone
·infosecurity-magazine.com·
Linux Users Urged to Patch Critical Sudo CVE
Cette offre pCloud 2-en-1 est parfaite pour assurer la sécurité de vos données personnelles
Cette offre pCloud 2-en-1 est parfaite pour assurer la sécurité de vos données personnelles
À l’heure où les fuites de données sont devenues monnaies courantes, la protection des données personnelles n’a jamais été aussi importante. D’autant plus qu’il existe désormais pléthore d’outils plus puissants les uns que les autres pour accompagner les internautes dans cette tâche. En juin dernier, un fichier
·numerama.com·
Cette offre pCloud 2-en-1 est parfaite pour assurer la sécurité de vos données personnelles