Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31742 bookmarks
Custom sorting
Loi narcotrafic : pourquoi les idées de Bruno Retailleau sur le chiffrement sont dangereuses
Loi narcotrafic : pourquoi les idées de Bruno Retailleau sur le chiffrement sont dangereuses
Le ministre de l'Intérieur a tenté une explication visant à démontrer que la proposition de loi contre le narcotrafic n'affaiblit pas le chiffrement, car elle n'introduit pas de porte dérobée (backdoor). Il s'avère que le stratagème proposé constitue malgré tout un énorme problème. Même sans backdoor, même sans
·numerama.com·
Loi narcotrafic : pourquoi les idées de Bruno Retailleau sur le chiffrement sont dangereuses
US charges Chinese hackers linked to critical infrastructure breaches
US charges Chinese hackers linked to critical infrastructure breaches
The US Justice Department has charged Chinese state security officers along with APT27 and i-Soon hackers for network breaches and cyberattacks that have targeted victims globally since 2011.
·bleepingcomputer.com·
US charges Chinese hackers linked to critical infrastructure breaches
How the OWASP Top 10 for LLM Applications Supports AI | CSA
How the OWASP Top 10 for LLM Applications Supports AI | CSA
OWASP recently introduced a new version of the OWASP Top 10 for Large Language Model Applications to help defenders secure tech services that incorporate AI.
·cloudsecurityalliance.org·
How the OWASP Top 10 for LLM Applications Supports AI | CSA
BadBox malware disrupted on 500K infected Android devices
BadBox malware disrupted on 500K infected Android devices
The BadBox Android malware botnet has been disrupted again by removing 24 malicious apps from Google Play and sinkholing communications for half a million infected devices.
·bleepingcomputer.com·
BadBox malware disrupted on 500K infected Android devices
Look up: The new frontier of cyberthreats is in the sky
Look up: The new frontier of cyberthreats is in the sky
With increased unidentified drone sightings worldwide, some are concerned they pose a cybersecurity risk. Learn more from Acronis about these risks and a real attack on a Taiwan drone manufacturer.
·bleepingcomputer.com·
Look up: The new frontier of cyberthreats is in the sky
Defending against USB drive attacks with Wazuh
Defending against USB drive attacks with Wazuh
USB attacks exploit common devices to spread malware. Wazuh detects threats like Stuxnet and Raspberry Robin across OS platforms.
·thehackernews.com·
Defending against USB drive attacks with Wazuh
I spoke to a task scammer. Here’s how it went
I spoke to a task scammer. Here’s how it went
Task scams are increasingly in volume. We followed up on an invitation by a task scammer to get a first hand look on how they work.
·malwarebytes.com·
I spoke to a task scammer. Here’s how it went
How Can Companies Build Effective AI Governance? | CSA
How Can Companies Build Effective AI Governance? | CSA
AI governance requires clear policies, data protection, and oversight. Learn how companies can manage AI risks, ensure compliance, and establish responsible AI practices.
·cloudsecurityalliance.org·
How Can Companies Build Effective AI Governance? | CSA
New Eleven11bot botnet infected +86K IoT devices
New Eleven11bot botnet infected +86K IoT devices
The Eleven11bot botnet has infected over 86,000 IoT devices, mainly security cameras and network video recorders (NVRs).
·securityaffairs.com·
New Eleven11bot botnet infected +86K IoT devices
Toronto Zoo shares update on last year's ransomware attack
Toronto Zoo shares update on last year's ransomware attack
The Toronto Zoo, the largest zoo in Canada, has provided more information about the data stolen during a ransomware attack in January 2024.
·bleepingcomputer.com·
Toronto Zoo shares update on last year's ransomware attack
The Evolution of DDoS Attacks: APIs in the Crosshairs | CSA
The Evolution of DDoS Attacks: APIs in the Crosshairs | CSA
A recent research report highlighted that India faced an alarming 3000% rise in API-targeted Distributed Denial of Service (DDoS) attacks in just three months.
·cloudsecurityalliance.org·
The Evolution of DDoS Attacks: APIs in the Crosshairs | CSA
Identity: The New Cybersecurity Battleground
Identity: The New Cybersecurity Battleground
80% of breaches stem from compromised Identity credentials. Learn why centralizing Identity is crucial for security resilience.
·thehackernews.com·
Identity: The New Cybersecurity Battleground