Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31742 bookmarks
Custom sorting
Microsoft shares guidance on upcoming Publisher deprecation
Microsoft shares guidance on upcoming Publisher deprecation
Microsoft has published guidance for users of Microsoft Publisher as it will no longer be supported after October 2026 and removed from Microsoft 365.
·bleepingcomputer.com·
Microsoft shares guidance on upcoming Publisher deprecation
FTC will send $25.5 million to victims of tech support scams
FTC will send $25.5 million to victims of tech support scams
​Later this week, the Federal Trade Commission (FTC) will start distributing over $25.5 million in refunds to those misled by tech support companies Restoro and Reimage's scare tactics.
·bleepingcomputer.com·
FTC will send $25.5 million to victims of tech support scams
Scam spoofs Binance website and uses TRUMP coin as lure for malware
Scam spoofs Binance website and uses TRUMP coin as lure for malware
Researchers at phishing defense company Cofense say hackers are spreading a malicious remote access tool through a fake Binance page that offers access to the TRUMP coin.
·therecord.media·
Scam spoofs Binance website and uses TRUMP coin as lure for malware
SIM Swapping Fraud Surges in the Middle East
SIM Swapping Fraud Surges in the Middle East
SIM swapping fraud surges in the Middle East as cybercriminals exploit websites mimicking legitimate services to steal personal data
·infosecurity-magazine.com·
SIM Swapping Fraud Surges in the Middle East
Que s’est-il passé entre Elon Musk et la Pologne ?
Que s’est-il passé entre Elon Musk et la Pologne ?
Un échange entre Elon Musk et Radosław Sikorski, ministre polonais des Affaires étrangères, a reposé la question de la dépendance de l'Ukraine au réseau Internet satellitaire Starlink. Sur fond de crainte d'une interruption de service, démentie par Elon Musk, l'Europe travaille sur ses alternatives. L'Ukraine
·numerama.com·
Que s’est-il passé entre Elon Musk et la Pologne ?
Les hackers pro-russes harcèlent encore la France avec des cyberattaques low cost
Les hackers pro-russes harcèlent encore la France avec des cyberattaques low cost
Un groupe d'hacktivistes russes, des hackers militants, a mis en panne les sites de plusieurs départements français. Ces cyberattaques provoquent peu de dégâts réels et visent avant tout à alimenter l’anxiété collective. Plusieurs régions et départements français ont été ciblés ce 10 mars 2025 par un groupe bien
·numerama.com·
Les hackers pro-russes harcèlent encore la France avec des cyberattaques low cost
Swiss critical sector faces new 24-hour cyberattack reporting rule
Swiss critical sector faces new 24-hour cyberattack reporting rule
Switzerland's National Cybersecurity Centre (NCSC) has announced a new reporting obligation for critical infrastructure organizations in the country, requiring them to report cyberattacks to the agency within 24 hours of their discovery.
·bleepingcomputer.com·
Swiss critical sector faces new 24-hour cyberattack reporting rule
3 bonnes raisons d’adopter un client mail souverain pour son activité professionnelle
3 bonnes raisons d’adopter un client mail souverain pour son activité professionnelle
Ma boîte mail est-elle réellement sécurisée ? Puis-je faire confiance à mon client mail pour protéger mes données et mes intérêts ? Des questions légitimes que tout le monde, surtout les professionnels, devraient se poser. Si les applications de messagerie mobile comme WhatsApp, Telegram ou Facebook Messenger restent
·numerama.com·
3 bonnes raisons d’adopter un client mail souverain pour son activité professionnelle
Quantum leap: Passwords in the new era of computing security
Quantum leap: Passwords in the new era of computing security
Quantum computing threatens to break traditional encryption, putting sensitive data at risk. Learn more from Specops Software about the risks of quantum computing and how to prepare for them.
·bleepingcomputer.com·
Quantum leap: Passwords in the new era of computing security
Cryptography, Encryption, & Key Management for Cloud | CSA
Cryptography, Encryption, & Key Management for Cloud | CSA
The CEK domain of the Cloud Controls Matrix helps protect data through cryptography & key management techniques, ensuring compliance with encryption standards.
·cloudsecurityalliance.org·
Cryptography, Encryption, & Key Management for Cloud | CSA
Microsoft lifts Windows 11 update block for some AutoCAD users
Microsoft lifts Windows 11 update block for some AutoCAD users
Microsoft has removed a compatibility hold that prevented some AutoCAD users from installing the Windows 11 2024 Update due to launch and crash issues.
·bleepingcomputer.com·
Microsoft lifts Windows 11 update block for some AutoCAD users
UK AI Research Under Threat From Nation-State Hackers
UK AI Research Under Threat From Nation-State Hackers
The Alan Turing institute urged government and academia to address systemic cultural and structural security barriers in UK AI research
·infosecurity-magazine.com·
UK AI Research Under Threat From Nation-State Hackers
Why The Modern Google Workspace Needs Unified Security
Why The Modern Google Workspace Needs Unified Security
Google Workspace security demands a unified approach—eliminate blind spots, automate remediation, and stop threats before they strike.
·thehackernews.com·
Why The Modern Google Workspace Needs Unified Security
How Does UEBA Enhance Cybersecurity Detection? | CSA
How Does UEBA Enhance Cybersecurity Detection? | CSA
UEBA leverages AI and machine learning to detect insider threats, compromised accounts, and privilege abuse by analyzing behavioral anomalies in real time.
·cloudsecurityalliance.org·
How Does UEBA Enhance Cybersecurity Detection? | CSA
Thousands of WordPress Websites Infected with Malware - Schneier on Security
Thousands of WordPress Websites Infected with Malware - Schneier on Security
The malware includes four separate backdoors: Creating four backdoors facilitates the attackers having multiple points of re-entry should one be detected and removed. A unique case we haven’t seen before. Which introduces another type of attack made possibly by abusing websites that don’t monitor 3rd party dependencies in the browser of their users. The four backdoors: The functions of the four backdoors are explained below: Backdoor 1, which uploads and installs a fake plugin named “Ultra SEO Processor,” which is then used to execute attacker-issued commands ...
·schneier.com·
Thousands of WordPress Websites Infected with Malware - Schneier on Security
Texas Developer Convicted After Kill Switch Sabotage Plot
Texas Developer Convicted After Kill Switch Sabotage Plot
Software developer Davis Lu cost his employer hundreds of thousands after deploying malware that caused crashes and failed logins
·infosecurity-magazine.com·
Texas Developer Convicted After Kill Switch Sabotage Plot