Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31294 bookmarks
Custom sorting
The Missing Piece in GRC | AI-Powered Governance | CSA
The Missing Piece in GRC | AI-Powered Governance | CSA
Mere automation tools will struggle in the agentic AI era. For GRC, this means it’s time to move beyond checklists and focus on risk-aware decision-making.
·cloudsecurityalliance.org·
The Missing Piece in GRC | AI-Powered Governance | CSA
'Chairmen' of $100 million scam operation extradited to US
'Chairmen' of $100 million scam operation extradited to US
The U.S. Department of Justice charged four Ghanaian nationals for their roles in a massive fraud ring linked to the theft of over $100 million in romance scams and business email compromise attacks.
·bleepingcomputer.com·
'Chairmen' of $100 million scam operation extradited to US
What Are the Best GDPR Certifications & Where to Get Them?
What Are the Best GDPR Certifications & Where to Get Them?
Still, if data governance and protection aren’t exactly your area of expertise, you may be unsure where to find the best GDPR certifications to stay
·stationx.net·
What Are the Best GDPR Certifications & Where to Get Them?
Embargo Ransomware Gang Amasses $34.2m in Attack Proceeds
Embargo Ransomware Gang Amasses $34.2m in Attack Proceeds
TRM Labs observed crypto payments worth $34.2m moved from victims addresses to a range of destinations likely associated with the group
·infosecurity-magazine.com·
Embargo Ransomware Gang Amasses $34.2m in Attack Proceeds
MY TAKE: Black Hat 2025 vendors define early contours for a hard pivot to AI security architecture
MY TAKE: Black Hat 2025 vendors define early contours for a hard pivot to AI security architecture
Black Hat USA 2025 concluded amid a noticeable shift in tone. Compared to prior years, the discussions were more grounded, and the stakes more clearly defined. Related: GenAI security gaps few see While generative AI remained the central theme, what stood out was the growing consensus that the security community must now contend with a
·lastwatchdog.com·
MY TAKE: Black Hat 2025 vendors define early contours for a hard pivot to AI security architecture
Over 29,000 Exchange servers unpatched against high-severity flaw
Over 29,000 Exchange servers unpatched against high-severity flaw
Over 29,000 Exchange servers exposed online remain unpatched against a high-severity vulnerability that can let attackers move laterally in Microsoft cloud environments, potentially leading to complete domain compromise.
·bleepingcomputer.com·
Over 29,000 Exchange servers unpatched against high-severity flaw
Attention sur la route des vacances, l’arnaque au « péage Ulys » reprend de plus belle
Attention sur la route des vacances, l’arnaque au « péage Ulys » reprend de plus belle
Cet été 2025, les automobilistes français doivent faire face à un nouveau piège sur la route des vacances : les faux SMS et mail Ulys. Depuis la mise en place du péage en flux libre, les cybercriminels profitent du flou qui entoure ce nouveau procédé pour arnaquer les voyageurs. Depuis le début de l’été, au moins
·numerama.com·
Attention sur la route des vacances, l’arnaque au « péage Ulys » reprend de plus belle
Connex Credit Union data breach impacts 172,000 members
Connex Credit Union data breach impacts 172,000 members
Connex, one of Connecticut's largest credit unions, warned tens of thousands of members that unknown attackers had stolen their personal and financial information after breaching its systems in early June.
·bleepingcomputer.com·
Connex Credit Union data breach impacts 172,000 members
How to restore GPT-4o when you've GPT-5
How to restore GPT-4o when you've GPT-5
Sam Altman overhyped GPT-5 and the results are underwhelming. Some users are upset with GPT-5's new personality, but you can restore GPT-4o if you pay for the Plus plan.
·bleepingcomputer.com·
How to restore GPT-4o when you've GPT-5
Qu'est-ce qu'une APT ? (Advanced Persistent Threat) - Numerama
Qu'est-ce qu'une APT ? (Advanced Persistent Threat) - Numerama
Une menace persistante avancée (MPA), ou Advanced Persistent Threat (APT), est une cyberattaque à la fois sophistiquée, discrète et prolongée dans le temps. Elle nécessite des moyens financiers et techniques colossaux, et cible souvent les secteurs les plus sensibles pour espionner, saboter ou dérober des données. En
·numerama.com·
Qu'est-ce qu'une APT ? (Advanced Persistent Threat) - Numerama