Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31391 bookmarks
Custom sorting
https://www.numerama.com/pop-culture/1928017-football-en-streaming-par-iptv-des-dizaines-de-sites-pirates-se-font-encore-bloquer.html
https://www.numerama.com/pop-culture/1928017-football-en-streaming-par-iptv-des-dizaines-de-sites-pirates-se-font-encore-bloquer.html
Ce sont encore des dizaines de noms de domaine qui ont été bloqués lors du match PSG-OM, pour empêcher les pirates d'accéder à des retransmissions illicites. Des actions organisées de façon à ennuyer au maximum les resquilleurs, mais qui sont jugées encore trop insuffisantes par les titulaires de droits. La lutte
·numerama.com·
https://www.numerama.com/pop-culture/1928017-football-en-streaming-par-iptv-des-dizaines-de-sites-pirates-se-font-encore-bloquer.html
https://www.lastwatchdog.com/news-alert-link11s-research-shows-ddos-attacks-are-more-targeted-and-doubled-year-over-year/
https://www.lastwatchdog.com/news-alert-link11s-research-shows-ddos-attacks-are-more-targeted-and-doubled-year-over-year/
Frankfurt, Germany, Mar. 17, 2025, CyberNewswire -- Cyberattacks are no longer an abstract threat - they dominate risk planning for companies worldwide. The latest Link11 European Cyber Report shows an alarming trend: the number of DDoS attacks has more than doubled, and they are shorter, more targeted, and more technically sophisticated. Organizations that do not
·lastwatchdog.com·
https://www.lastwatchdog.com/news-alert-link11s-research-shows-ddos-attacks-are-more-targeted-and-doubled-year-over-year/
https://www.microsoft.com/en-us/security/blog/2025/03/17/stilachirat-analysis-from-system-reconnaissance-to-cryptocurrency-theft/
https://www.microsoft.com/en-us/security/blog/2025/03/17/stilachirat-analysis-from-system-reconnaissance-to-cryptocurrency-theft/
Microsoft Incident Response uncovered a novel remote access trojan (RAT) named StilachiRAT, which demonstrates sophisticated techniques to evade detection, persist in the target environment, and exfiltrate sensitive data. This blog primarily focuses on analysis of the WWStartupCtrl64.dll module that contains the RAT capabilities and summarizes the malware’s key behaviors, capabilities, and the potential risk posed to systems and users.
·microsoft.com·
https://www.microsoft.com/en-us/security/blog/2025/03/17/stilachirat-analysis-from-system-reconnaissance-to-cryptocurrency-theft/
https://www.schneier.com/blog/archives/2025/03/improvements-in-brute-force-attacks.html
https://www.schneier.com/blog/archives/2025/03/improvements-in-brute-force-attacks.html
New paper: “GPU Assisted Brute Force Cryptanalysis of GPRS, GSM, RFID, and TETRA: Brute Force Cryptanalysis of KASUMI, SPECK, and TEA3.” Abstract: Key lengths in symmetric cryptography are determined with respect to the brute force attacks with current technology. While nowadays at least 128-bit keys are recommended, there are many standards and real-world applications that use shorter keys. In order to estimate the actual threat imposed by using those short keys, precise estimates for attacks are crucial. In this work we provide optimized implementations of several widely used algorithms on GPUs, leading to interesting insights on the cost of brute force attacks on several real-word applications...
·schneier.com·
https://www.schneier.com/blog/archives/2025/03/improvements-in-brute-force-attacks.html
https://www.stationx.net/tor-vs-vpn/
https://www.stationx.net/tor-vs-vpn/
Discover the key differences between Tor vs VPN. Learn about their benefits, drawbacks, and use cases to enhance your online privacy and security.
·stationx.net·
https://www.stationx.net/tor-vs-vpn/