Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31742 bookmarks
Custom sorting
Anne Neuberger on AI: ‘We have to challenge ourselves to be first’
Anne Neuberger on AI: ‘We have to challenge ourselves to be first’
The Click Here podcast caught up with Anne Neuberger, the former White House deputy national security advisor for cyber and emerging technologies on the sidelines of this year’s Munich Security Conference.
·therecord.media·
Anne Neuberger on AI: ‘We have to challenge ourselves to be first’
Millions of stalkerware users exposed again
Millions of stalkerware users exposed again
Three more stalkerware apps have been found to leak data of both victims and customers alike: Spyzie, Cocospy, and Spyic
·malwarebytes.com·
Millions of stalkerware users exposed again
Serbian police used Cellebrite zero-day hack to unlock Android phones
Serbian police used Cellebrite zero-day hack to unlock Android phones
Serbian authorities have reportedly used an Android zero-day exploit chain developed by Cellebrite to unlock the device of a student activist in the country and attempt to install spyware.
·bleepingcomputer.com·
Serbian police used Cellebrite zero-day hack to unlock Android phones
Global crackdown on AI-generated child sexual abuse material leads to 25 arrests
Global crackdown on AI-generated child sexual abuse material leads to 25 arrests
“Operation Cumberland,” led by Danish law enforcement, included the arrests of more than two dozen suspected members of a group distributing sexual images of minors generated by artificial intelligence.
·therecord.media·
Global crackdown on AI-generated child sexual abuse material leads to 25 arrests
Third-Party Attacks Drive Major Financial Losses in 2024
Third-Party Attacks Drive Major Financial Losses in 2024
Data from Resilience found that third-party attacks made up 23% of material cyber insurance claims in 2024, with ransomware attacks targeting vendors a major driver
·infosecurity-magazine.com·
Third-Party Attacks Drive Major Financial Losses in 2024
Old Vulnerabilities Among the Most Widely Exploited
Old Vulnerabilities Among the Most Widely Exploited
Four in ten flaws exploited by threat actors in 2024 were from 2020 or earlier, with some dating back to the 1990s, according to a GreyNoise report
·infosecurity-magazine.com·
Old Vulnerabilities Among the Most Widely Exploited
Qu’est-ce qu’un VPN et pourquoi en avez-vous besoin ?
Qu’est-ce qu’un VPN et pourquoi en avez-vous besoin ?
Un VPN, ou Virtual Private Network (rĂ©seau privĂ© virtuel), est un systĂšme sĂ©curisĂ© qui crĂ©e un « tunnel » chiffrĂ© entre votre appareil et un serveur distant. Ce mĂ©canisme permet Ă  deux ordinateurs de communiquer en toute confidentialitĂ©, en isolant les donnĂ©es Ă©changĂ©es du reste d’Internet. MĂȘme si vous n'avez jamais
·numerama.com·
Qu’est-ce qu’un VPN et pourquoi en avez-vous besoin ?
Prolific Data Extortion Actor Arrested in Thailand
Prolific Data Extortion Actor Arrested in Thailand
A joint operation between the Thai and Singapore police has resulted in the arrest of a man allegedly responsible for over 90 data extortion attacks worldwide
·infosecurity-magazine.com·
Prolific Data Extortion Actor Arrested in Thailand
The SOC files: Chasing the web shell
The SOC files: Chasing the web shell
Kaspersky SOC analysts discuss a recent incident where the well-known Behinder web shell was used as a post-exploitation backdoor, showing how web shells have evolved.
·securelist.com·
The SOC files: Chasing the web shell
Vo1d malware botnet grows to 1.6 million Android TVs worldwide
Vo1d malware botnet grows to 1.6 million Android TVs worldwide
A new variant of the Vo1d malware botnet has grown to 1,590,299 infected Android TV devices across 226 countries, recruiting devices as part of anonymous proxy server networks.
·bleepingcomputer.com·
Vo1d malware botnet grows to 1.6 million Android TVs worldwide
Sellers can get scammed too, and Joe goes off on a rant about imposter syndrome
Sellers can get scammed too, and Joe goes off on a rant about imposter syndrome
Joe has some advice for anyone experiencing self doubt or wondering about their next career move. Plus, catch up on the latest Talos research on scams targeting sellers, and the Lotus Blossom espionage group.
·blog.talosintelligence.com·
Sellers can get scammed too, and Joe goes off on a rant about imposter syndrome
Privacy tech firms warn France’s encryption and VPN laws threaten privacy
Privacy tech firms warn France’s encryption and VPN laws threaten privacy
Privacy-focused email provider Tuta (previously Tutanota) and the VPN Trust Initiative (VTI) are raising concerns over proposed laws in France set to backdoor encrypted messaging systems and restrict internet access.
·bleepingcomputer.com·
Privacy tech firms warn France’s encryption and VPN laws threaten privacy