Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31239 bookmarks
Custom sorting
Le pouvoir russe tente de piéger ses opposants en imitant la CIA sur le web
Le pouvoir russe tente de piéger ses opposants en imitant la CIA sur le web
De faux sites imitent les groupes d'opposition russes, des plateformes ukrainiennes et même la CIA pour tromper les citoyens hostiles au Kremlin. D'après un rapport de l'entreprise Silent Push, publié le 27 mars 2025, un réseau de sites frauduleux imite les plateformes officielles de groupes d'opposition, de services
·numerama.com·
Le pouvoir russe tente de piéger ses opposants en imitant la CIA sur le web
Why we’re no longer doing April Fools’ Day
Why we’re no longer doing April Fools’ Day
The internet is so filled with falsehoods that April Fools hits different these days. That's why, as a cybersecurity company, we're out.
·malwarebytes.com·
Why we’re no longer doing April Fools’ Day
How Each Pillar of the 1st Amendment is Under Attack
How Each Pillar of the 1st Amendment is Under Attack
In an address to Congress this month, President Trump claimed he had "brought free speech back to America." But barely two months into his second term, the president has waged an unprecedented attack on the First Amendment rights of journalists,…
·krebsonsecurity.com·
How Each Pillar of the 1st Amendment is Under Attack
Fake Zoom Ends in BlackSuit Ransomware
Fake Zoom Ends in BlackSuit Ransomware
Key Takeaways The threat actor gained initial access by a fake Zoom installer that used d3f@ckloader and IDAT loader to drop SectopRAT. After nine days of dwell time, the SectopRAT malware dropped …
·thedfirreport.com·
Fake Zoom Ends in BlackSuit Ransomware
Microsoft tests new Windows 11 tool to remotely fix boot crashes
Microsoft tests new Windows 11 tool to remotely fix boot crashes
Microsoft has begun testing a new Windows 11 tool called Quick Machine Recovery, which is designed to remotely deploy fixes for buggy drivers and configurations that prevent the operating system from starting.
·bleepingcomputer.com·
Microsoft tests new Windows 11 tool to remotely fix boot crashes
Microsoft's killing script used to avoid Microsoft Account in Windows 11
Microsoft's killing script used to avoid Microsoft Account in Windows 11
Microsoft has removed the 'BypassNRO.cmd' script from Windows 11 preview builds, which allowed users to bypass the requirement to use a Microsoft Account when installing the operating system.
·bleepingcomputer.com·
Microsoft's killing script used to avoid Microsoft Account in Windows 11
New Crocodilus malware steals Android users’ crypto wallet keys
New Crocodilus malware steals Android users’ crypto wallet keys
A newly discovered Android malware dubbed Crocodilus tricks users into providing the seed phrase for the cryptocurrency wallet using a warning to back up the key to avoid losing access.
·bleepingcomputer.com·
New Crocodilus malware steals Android users’ crypto wallet keys
News alert: SquareX discloses nasty browser-native ransomware that’s undetectable by antivirus
News alert: SquareX discloses nasty browser-native ransomware that’s undetectable by antivirus
Palo Alto, Calif., Mar 28, 2025, CyberNewswire -- From WannaCry to the MGM Resorts Hack, ransomware remains one of the most damaging cyberthreats to plague enterprises. Chainalysis estimates that corporations spend nearly $1 billion dollars on ransom each year, but the greater cost often comes from the reputational damage and operational disruption caused by the
·lastwatchdog.com·
News alert: SquareX discloses nasty browser-native ransomware that’s undetectable by antivirus
Friday Squid Blogging: Squid Werewolf Hacking Group - Schneier on Security
Friday Squid Blogging: Squid Werewolf Hacking Group - Schneier on Security
In another rare squid/cybersecurity intersection, APT37 is also known as “Squid Werewolf.” As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
·schneier.com·
Friday Squid Blogging: Squid Werewolf Hacking Group - Schneier on Security
TCCing is Believing
TCCing is Believing
Apple finally adds TCC events to Endpoint Security!
·objective-see.org·
TCCing is Believing
Autosur victime d'une fuite de données, 4 millions de clients concernés
Autosur victime d'une fuite de données, 4 millions de clients concernés
Le spécialiste français du contrôle technique a subi un “incident de sécurité” entraînant un accès non autorisé à de nombreuses données...-Cybersécurité
·usine-digitale.fr·
Autosur victime d'une fuite de données, 4 millions de clients concernés
OpenAI now pays researchers $100,000 for critical vulnerabilities
OpenAI now pays researchers $100,000 for critical vulnerabilities
Artificial intelligence company OpenAI has announced a fivefold increase in the maximum bug bounty rewards for "exceptional and differentiated" critical security vulnerabilities from $20,000 to $100,000.
·bleepingcomputer.com·
OpenAI now pays researchers $100,000 for critical vulnerabilities
Phishing-as-a-service operation uses DNS-over-HTTPS for evasion
Phishing-as-a-service operation uses DNS-over-HTTPS for evasion
A newly discovered phishing-as-a-service (PhaaS) operation that researchers call Morphing Meerkat, has been using the DNS over HTTPS (DoH) protocol to evade detection.
·bleepingcomputer.com·
Phishing-as-a-service operation uses DNS-over-HTTPS for evasion
« Il n'a jamais été question de donner la liberté d'expression aux bots », insiste la ministre de l'IA - Numerama
« Il n'a jamais été question de donner la liberté d'expression aux bots », insiste la ministre de l'IA - Numerama
Le Premier ministre François Bayrou et la ministre responsable de l'IA et du numérique Clara Chappaz sont intervenus lors d'un forum organisé par Viginum, un service gouvernemental focalisé sur les manipulations de l'information sur Internet. Ce 28 mars était l'occasion pour le gouvernement de mettre en lumière
·numerama.com·
« Il n'a jamais été question de donner la liberté d'expression aux bots », insiste la ministre de l'IA - Numerama