Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31190 bookmarks
Custom sorting
Threat actors thrive in chaos
Threat actors thrive in chaos
Martin delves into how threat actors exploit chaos, offering insights from Talos' 2024 Year in Review on how to fortify defenses against evolving email lures and frequently targeted vulnerabilities, even amidst economic disruption.
·blog.talosintelligence.com·
Threat actors thrive in chaos
Hackers exploit WordPress plugin auth bypass hours after disclosure
Hackers exploit WordPress plugin auth bypass hours after disclosure
Hackers started exploiting a high-severity flaw that allows bypassing authentication in the OttoKit (formerly SureTriggers) plugin for WordPress just hours after public disclosure.
·bleepingcomputer.com·
Hackers exploit WordPress plugin auth bypass hours after disclosure
Trump administration planning major workforce cuts at CISA
Trump administration planning major workforce cuts at CISA
The agency is looking to remove some 1,300 people by cutting about half its full-time staff and another 40 percent of its contractors, a source with direct knowledge of the developing plans told Recorded Future News.
·therecord.media·
Trump administration planning major workforce cuts at CISA
Microsoft releases emergency update to fix Office 2016 crashes
Microsoft releases emergency update to fix Office 2016 crashes
​Microsoft has released an out-of-band Office update to fix a known issue that caused Word, Excel, and Outlook to crash after installing the KB5002700 security update for Office 2016.
·bleepingcomputer.com·
Microsoft releases emergency update to fix Office 2016 crashes
Unraveling the U.S. toll road smishing scams
Unraveling the U.S. toll road smishing scams
Cisco Talos has observed a widespread and ongoing financial theft SMS phishing (smishing) campaign since October 2024 that targets toll road users in the United States of America.
·blog.talosintelligence.com·
Unraveling the U.S. toll road smishing scams
China-based SMS Phishing Triad Pivots to Banks
China-based SMS Phishing Triad Pivots to Banks
China-based purveyors of SMS phishing kits are enjoying remarkable success converting phished payment card data into mobile wallets from Apple and Google. Until recently, the so-called “Smishing Triad” mainly impersonated toll road operators and shipping companies. But experts say these…
·krebsonsecurity.com·
China-based SMS Phishing Triad Pivots to Banks
News alert: NTT unveils AI inference chip enabling real-time 4K processing of ultra-high-def video
News alert: NTT unveils AI inference chip enabling real-time 4K processing of ultra-high-def video
TOKYO, Apr. 10, 2025 — Today, NTT Corporation (NTT) announced a new, large-scale integration (LSI) for the real-time AI inference processing of ultra-high-definition video up to 4K resolution and 30 frames per second (fps). This low-power technology is designed for edge and power-constrained terminal deployments in which conventional AI inferencing requires the compression of ultra-high-definition
·lastwatchdog.com·
News alert: NTT unveils AI inference chip enabling real-time 4K processing of ultra-high-def video
My Take: NTT’s physicists confront the mystery Big Tech keep dodging — what are we really creating?
My Take: NTT’s physicists confront the mystery Big Tech keep dodging — what are we really creating?
SAN FRANCISCO — If large language AI models are shaping our digital reality, then who—exactly—is shaping those models? And how the heck are they doing it? Related: What exactly is GenAI? Those are the questions Dr. Hidenori Tanaka wants to answer in an effort to put GenAI on solid scientific footing. And it’s the guiding
·lastwatchdog.com·
My Take: NTT’s physicists confront the mystery Big Tech keep dodging — what are we really creating?
Revolut est en colère contre Facebook, qui diffuse trop d’escroqueries
Revolut est en colère contre Facebook, qui diffuse trop d’escroqueries
Un rapport de Revolut sur les arnaques financières en ligne rapporte que Facebook, Instagram et WhatsApp représentent plus de la moitié des signalements faits à Revolut. L'application bancaire Revolut a publié ce 10 avril un rapport sur la sécurité des consommateurs et la criminalité financière. Elle y épingle
·numerama.com·
Revolut est en colère contre Facebook, qui diffuse trop d’escroqueries
Google Cloud: China Achieves “Cyber Superpower” Status
Google Cloud: China Achieves “Cyber Superpower” Status
Google Cloud’s Sandra Joyce said that Chinese state actors’ advanced techniques and ability to stay undetected pose huge challenges
·infosecurity-magazine.com·
Google Cloud: China Achieves “Cyber Superpower” Status
Russian hackers attack Western military mission using malicious drive
Russian hackers attack Western military mission using malicious drive
The Russian state-backed hacking group Gamaredon (aka "Shuckworm") has been targeting a military mission of a Western country in Ukraine in attacks likely deployed from removable drives.
·bleepingcomputer.com·
Russian hackers attack Western military mission using malicious drive
Over 40% of UK Businesses Faced Cybersecurity Breaches in 2024
Over 40% of UK Businesses Faced Cybersecurity Breaches in 2024
The Cyber Security Breaches Survey 2025 has been released by the UK Home Office and DSIT today, reporting a slight decline in incidents compared to 2024 report
·infosecurity-magazine.com·
Over 40% of UK Businesses Faced Cybersecurity Breaches in 2024
Real-Time Credit Data: Fueling Banking Innovation | CSA
Real-Time Credit Data: Fueling Banking Innovation | CSA
Data offers insights into consumer behavior, credit trends, and competitor strategies. This is why using real-time credit data is your key to success!
·cloudsecurityalliance.org·
Real-Time Credit Data: Fueling Banking Innovation | CSA