Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31742 bookmarks
Custom sorting
Cryptomonnaies : la plateforme Bybit est victime du plus gros vol de l’histoire
Cryptomonnaies : la plateforme Bybit est victime du plus gros vol de l’histoire
La plateforme de cryptomonnaies Bybit a été victime d'un hack historique, conduisant à un vol de 1,46 milliard de dollars en Ethereum, attribué au Group Lazarus. Son PDG s'est voulu rassurant sur la solvabilité future. C'est un vendredi noir pour la plateforme de cryptomonnaies Bybit. Dans un communiqué publié sur X
·numerama.com·
Cryptomonnaies : la plateforme Bybit est victime du plus gros vol de l’histoire
Black Basta Goes Dark Amid Infighting, Chat Leaks Show
Black Basta Goes Dark Amid Infighting, Chat Leaks Show
One of 2024's most active ransomware outfits has been asleep through early 2025, thanks to reality-show-style, behind-the-scenes drama.
·darkreading.com·
Black Basta Goes Dark Amid Infighting, Chat Leaks Show
Google Chrome disables uBlock Origin for some in Manifest v3 rollout
Google Chrome disables uBlock Origin for some in Manifest v3 rollout
Google continues its rollout of gradually disabling uBlock Origin and other Manifest V2-based extensions in the Chrome web browser as part of its efforts to push users to Manifest V3-based extensions.
·bleepingcomputer.com·
Google Chrome disables uBlock Origin for some in Manifest v3 rollout
Cisco Confirms Salt Typhoon Exploitation in Telecom Hits
Cisco Confirms Salt Typhoon Exploitation in Telecom Hits
In addition to using CVE-2018-0171 and other Cisco bugs to break into telecom networks, the China-sponsored APT is also using using stolen login credentials for initial access.
·darkreading.com·
Cisco Confirms Salt Typhoon Exploitation in Telecom Hits
SpyLend Android malware downloaded 100,000 times from Google Play
SpyLend Android malware downloaded 100,000 times from Google Play
An Android malware app called SpyLend has been downloaded over 100,000 times from Google Play, where it masqueraded as a financial tool but became a predatory loan app for those in India.
·bleepingcomputer.com·
SpyLend Android malware downloaded 100,000 times from Google Play
Zero Day sur Netflix : et si cette cyberattaque arrivait vraiment ? Un expert décrypte la série
Zero Day sur Netflix : et si cette cyberattaque arrivait vraiment ? Un expert décrypte la série
Une cyberattaque spectaculaire plonge les États-Unis dans le chaos : c’est le point de départ de Zero Day, la nouvelle mini-série de Netflix avec Robert De Niro. Mais un tel scénario pourrait-il vraiment se produire ? Un expert en cybersécurité de la société Nomios nous répond. La cyberattaque du siècle débarque sur
·numerama.com·
Zero Day sur Netflix : et si cette cyberattaque arrivait vraiment ? Un expert décrypte la série
Feds fine Warby Parker $1.5 million for failing to protect customer health data
Feds fine Warby Parker $1.5 million for failing to protect customer health data
The eyewear retailer Warby Parker was hit with a $1.5 million fine by the Department of Health and Human Services on Thursday following a credential stuffing attack in 2018 that compromised the personal information of nearly 200,000 people.
·therecord.media·
Feds fine Warby Parker $1.5 million for failing to protect customer health data
Hacker steals record $1.46 billion from Bybit ETH cold wallet
Hacker steals record $1.46 billion from Bybit ETH cold wallet
Cryptocurrency exchange Bybit revealed today that an unknown attacker stole over $1.46 billion worth of cryptocurrency from one of its ETH cold wallets.
·bleepingcomputer.com·
Hacker steals record $1.46 billion from Bybit ETH cold wallet
How Can You Keep Your Compliance Program on Track? | CSA
How Can You Keep Your Compliance Program on Track? | CSA
Maintaining compliance requires continuous monitoring, clear policies, and proactive risk management. Avoid last-minute fixes and manual processes to prevent compliance failures.
·cloudsecurityalliance.org·
How Can You Keep Your Compliance Program on Track? | CSA
Nations Open 'Data Embassies' to Protect Critical Info
Nations Open 'Data Embassies' to Protect Critical Info
Estonia and Monaco back up their citizens' information to a data center in Luxembourg, while Singapore looks to India as its safe haven for data. But geopolitical challenges remain.
·darkreading.com·
Nations Open 'Data Embassies' to Protect Critical Info
AI-Powered Deception is a Menace to Our Societies
AI-Powered Deception is a Menace to Our Societies
AI-generated misinformation is rising, with 1,150 fake news sites identified. Deepfakes, voice cloning, and LLM-driven deception threaten elections an
·thehackernews.com·
AI-Powered Deception is a Menace to Our Societies
Global tech spend to approach $5 trillion this year: Forrester
Global tech spend to approach $5 trillion this year: Forrester
The U.S. market is expected to exceed $2 trillion for the first time, with financial services and insurance leading the charge, the analyst firm said.
·cybersecuritydive.com·
Global tech spend to approach $5 trillion this year: Forrester
Healthcare security lapses keep piling up
Healthcare security lapses keep piling up
Healthcare security is failing patients time and again. This week DM Clinical Research and Helath Net Federal Services take the spotlight
·malwarebytes.com·
Healthcare security lapses keep piling up
Implementing Cryptography in AI Systems - Schneier on Security
Implementing Cryptography in AI Systems - Schneier on Security
Interesting research: “How to Securely Implement Cryptography in Deep Neural Networks.” Abstract: The wide adoption of deep neural networks (DNNs) raises the question of how can we equip them with a desired cryptographic functionality (e.g, to decrypt an encrypted input, to verify that this input is authorized, or to hide a secure watermark in the output). The problem is that cryptographic primitives are typically designed to run on digital computers that use Boolean gates to map sequences of bits to sequences of bits, whereas DNNs are a special type of analog computer that uses linear mappings and ReLUs to map vectors of real numbers to vectors of real numbers. This discrepancy between the discrete and continuous computational models raises the question of what is the best way to implement standard cryptographic primitives as DNNs, and whether DNN implementations of secure cryptosystems remain secure in the new setting, in which an attacker can ask the DNN to process a message whose “bits” are arbitrary real numbers...
·schneier.com·
Implementing Cryptography in AI Systems - Schneier on Security