Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31441 bookmarks
Custom sorting
Volt Typhoon Accessed US OT Network for Nearly a Year
Volt Typhoon Accessed US OT Network for Nearly a Year
Volt Typhoon's ten-month intrusion of Littleton Electric Light and Water Departments exposes vulnerabilities in the US electric grid
·infosecurity-magazine.com·
Volt Typhoon Accessed US OT Network for Nearly a Year
Juniper patches bug that let Chinese cyberspies backdoor routers
Juniper patches bug that let Chinese cyberspies backdoor routers
​Juniper Networks has released emergency security updates to patch a Junos OS vulnerability exploited by Chinese hackers to backdoor routers for stealthy access.
·bleepingcomputer.com·
Juniper patches bug that let Chinese cyberspies backdoor routers
GitLab patches critical authentication bypass vulnerabilities
GitLab patches critical authentication bypass vulnerabilities
GitLab released security updates for Community Edition (CE) and Enterprise Edition (EE), fixing nine vulnerabilities, among which two critical severity ruby-saml library authentication bypass flaws.
·bleepingcomputer.com·
GitLab patches critical authentication bypass vulnerabilities
Phishing campaign impersonates Booking .com, delivers a suite of credential-stealing malware
Phishing campaign impersonates Booking .com, delivers a suite of credential-stealing malware
Starting in December 2024, leading up to some of the busiest travel days, Microsoft Threat Intelligence identified a phishing campaign that impersonates online travel agency Booking.com and targets organizations in the hospitality industry. The campaign uses a social engineering technique called ClickFix to deliver multiple credential-stealing malware in order to conduct financial fraud and theft. […]
·microsoft.com·
Phishing campaign impersonates Booking .com, delivers a suite of credential-stealing malware
Le gouvernement se prend un retour de manivelle sur les backdoors et le chiffrement
Le gouvernement se prend un retour de manivelle sur les backdoors et le chiffrement
Des sénateurs ont pris position contre l'avis du gouvernement en faisant voter un amendement anti-backdoor (porte dérobée) pour protéger le chiffrement. La mesure a été prise alors qu'un débat a eu lieu à l'Assemblée nationale. Il a concerné une proposition de loi, dont les contours ont fait craindre à un
·numerama.com·
Le gouvernement se prend un retour de manivelle sur les backdoors et le chiffrement
Red Report 2025: Unmasking a 3X Spike in Credential Theft and Debunking the AI Hype
Red Report 2025: Unmasking a 3X Spike in Credential Theft and Debunking the AI Hype
Credential theft surged 3× in a year—but AI-powered malware? More hype than reality. The Red Report 2025 by Picus Labs reveals attackers still rely on proven tactics like stealth & automation to execute the "perfect heist."
·bleepingcomputer.com·
Red Report 2025: Unmasking a 3X Spike in Credential Theft and Debunking the AI Hype
How Can Automation Transform GRC and Compliance? | CSA
How Can Automation Transform GRC and Compliance? | CSA
Automation in GRC streamlines compliance, reduces manual effort, and enhances security. Learn how Continuous Controls Monitoring and AI improve efficiency.
·cloudsecurityalliance.org·
How Can Automation Transform GRC and Compliance? | CSA
Abusing with style: Leveraging cascading style sheets for evasion and tracking
Abusing with style: Leveraging cascading style sheets for evasion and tracking
Cascading Style Sheets (CSS) are ever present in modern day web browsing, however its far from their own use. This blog will detail the ways adversaries use CSS in email campaigns for evasion and tracking.
·blog.talosintelligence.com·
Abusing with style: Leveraging cascading style sheets for evasion and tracking
Tech Complexity Puts UK Cybersecurity at Risk
Tech Complexity Puts UK Cybersecurity at Risk
Palo Alto Networks found that nearly two-thirds of UK organizations cited technology complexity as the most significant challenge towards building a sophisticated security posture
·infosecurity-magazine.com·
Tech Complexity Puts UK Cybersecurity at Risk
AI Agents: Human or Non-Human? | CSA
AI Agents: Human or Non-Human? | CSA
AI agents seem like digital employees - they assist with IT support, customer service, and even decision-making - but they differ from humans in critical ways.
·cloudsecurityalliance.org·
AI Agents: Human or Non-Human? | CSA