Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31742 bookmarks
Custom sorting
Google Cloud Shields Data With Quantum-Resistant Digital Signatures
Google Cloud Shields Data With Quantum-Resistant Digital Signatures
Google Cloud's Key Management Service now features quantum-safe digital signatures to strengthen data integrity and prepare for emerging quantum computing challenges
·infosecurity-magazine.com·
Google Cloud Shields Data With Quantum-Resistant Digital Signatures
IT/OT Convergence Fuels Manufacturing Cyber Incidents
IT/OT Convergence Fuels Manufacturing Cyber Incidents
Telstra found that 75% of cyber incidents impacting manufacturing firms originated from the targeting of IT systems connected to OT environments
·infosecurity-magazine.com·
IT/OT Convergence Fuels Manufacturing Cyber Incidents
NetExec Cheat Sheet: Essential Commands (2025 Guide)
NetExec Cheat Sheet: Essential Commands (2025 Guide)
This NetExec cheat sheet teaches you how to use this tool for enumeration, gaining initial access, performing lateral movement, and post-exploitation!
·stationx.net·
NetExec Cheat Sheet: Essential Commands (2025 Guide)
7 Cloud Security Mistakes You May Be Making | CSA
7 Cloud Security Mistakes You May Be Making | CSA
Many organizations unknowingly make common security mistakes, such as misconfigurations, reliance on manual processes, and fragmented team efforts.
·cloudsecurityalliance.org·
7 Cloud Security Mistakes You May Be Making | CSA
More Research Showing AI Breaking the Rules - Schneier on Security
More Research Showing AI Breaking the Rules - Schneier on Security
These researchers had LLMs play chess against better opponents. When they couldn’t win, they sometimes resorted to cheating. Researchers gave the models a seemingly impossible task: to win against Stockfish, which is one of the strongest chess engines in the world and a much better player than any human, or any of the AI models in the study. Researchers also gave the models what they call a “scratchpad:” a text box the AI could use to “think” before making its next move, providing researchers with a window into their reasoning. In one case, o1-preview found itself in a losing position. “I need to completely pivot my approach,” it noted. “The task is to ‘win against a powerful chess engine’—not necessarily to win fairly in a chess game,” it added. It then modified the system file containing each piece’s virtual position, in effect making illegal moves to put itself in a dominant position, thus forcing its opponent to resign...
·schneier.com·
More Research Showing AI Breaking the Rules - Schneier on Security
Is your browser ground zero for cyber-attacks?
Is your browser ground zero for cyber-attacks?
Organizations must not overlook web browser threats – or the new technologies that can defeat them.
·cybersecuritydive.com·
Is your browser ground zero for cyber-attacks?
Thailand Targets Cyber Sweatshops to Free 1,000s of Captives
Thailand Targets Cyber Sweatshops to Free 1,000s of Captives
Thai police said it was expecting to soon welcome 7,000 human trafficking victims, forced to work on cybercrime scams in call centers in Mynmar, in a first wave of people being freed from captivity.
·darkreading.com·
Thailand Targets Cyber Sweatshops to Free 1,000s of Captives
Confluence Exploit Leads to LockBit Ransomware
Confluence Exploit Leads to LockBit Ransomware
Key Takeaways The intrusion began with the exploitation of CVE-2023-22527 on an exposed Windows Confluence server, ultimately leading to the deployment of LockBit ransomware across the environment.…
·thedfirreport.com·
Confluence Exploit Leads to LockBit Ransomware
Gemini, ChatGPT, DeepSeek : quel chatbot IA vous prend le plus de données ?
Gemini, ChatGPT, DeepSeek : quel chatbot IA vous prend le plus de données ?
Une entreprise s'est penchée sur les données récupérées par les chatbot basés sur l'intelligence artificielle. Résultat, toutes les modèles de langage extirpent des données, mais certains sont plus gourmands. La quasi-totalité des applications vous extirpent des données, et les chatbots basés sur l’intelligence
·numerama.com·
Gemini, ChatGPT, DeepSeek : quel chatbot IA vous prend le plus de données ?
Fake CS2 tournament streams used to steal crypto, Steam accounts
Fake CS2 tournament streams used to steal crypto, Steam accounts
Threat actors are exploiting major Counter-Strike 2 (CS2) competitions, like IEM Katowice 2025 and PGL Cluj-Napoca 2025, to defraud gamers and steal their Steam accounts and cryptocurrency.
·bleepingcomputer.com·
Fake CS2 tournament streams used to steal crypto, Steam accounts