Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31742 bookmarks
Custom sorting
Chase will soon block Zelle payments to sellers on social media
Chase will soon block Zelle payments to sellers on social media
JPMorgan Chase Bank (Chase) will soon start blocking Zelle payments to social media contacts to combat a significant rise in online scams utilizing the service for fraud.
·bleepingcomputer.com·
Chase will soon block Zelle payments to sellers on social media
Microsoft to remove the Location History feature in Windows
Microsoft to remove the Location History feature in Windows
Microsoft announced the deprecation of the Location History feature from Windows, which let applications like the Cortana virtual assistant to fetch location history of the device.
·bleepingcomputer.com·
Microsoft to remove the Location History feature in Windows
X now blocks Signal contact links, flags them as malicious
X now blocks Signal contact links, flags them as malicious
Social media platform X (formerly Twitter) is now blocking links to "Signal.me," a URL used by the Signal encrypted messaging to share your account info with another person.
·bleepingcomputer.com·
X now blocks Signal contact links, flags them as malicious
Ne cliquez pas sur ce faux SMS de BNP Paribas, c’est un piège de hackers
Ne cliquez pas sur ce faux SMS de BNP Paribas, c’est un piège de hackers
Une campagne de phishing par SMS usurpe la banque BNP Paribas en prétextant une fausse alerte sur votre compte. Les hackers cherchent à dérober les données personnelles à travers des faux sites copiant l'établissement bancaire. Les clients de BNP Paribas sont actuellement victimes d'une nouvelle campagne de phishing.
·numerama.com·
Ne cliquez pas sur ce faux SMS de BNP Paribas, c’est un piège de hackers
Atlas of Surveillance - Schneier on Security
Atlas of Surveillance - Schneier on Security
The EFF has released its Atlas of Surveillance, which documents police surveillance technology across the US.
·schneier.com·
Atlas of Surveillance - Schneier on Security
Microsoft spots XCSSET macOS malware variant used for crypto theft
Microsoft spots XCSSET macOS malware variant used for crypto theft
A new variant of the XCSSET macOS modular malware has emerged in attacks that target users' sensitive information, including digital wallets and data from the legitimate Notes app.
·bleepingcomputer.com·
Microsoft spots XCSSET macOS malware variant used for crypto theft
Fintech giant Finastra notifies victims of October data breach
Fintech giant Finastra notifies victims of October data breach
Financial technology giant Finastra is notifying victims of a data breach after their personal information was stolen by unknown attackers who first breached its systems in October 2024.
·bleepingcomputer.com·
Fintech giant Finastra notifies victims of October data breach
2025 CompTIA A+ Update: 220-1101/1102 vs 220-1201/1202
2025 CompTIA A+ Update: 220-1101/1102 vs 220-1201/1202
Stay ahead with the 2025 CompTIA A+ Update! Compare 220-1101/1102 vs 220-1201/1202, explore key changes, and get expert exam prep tips.
·stationx.net·
2025 CompTIA A+ Update: 220-1101/1102 vs 220-1201/1202
CISO's Expert Guide To CTEM And Why It Matters
CISO's Expert Guide To CTEM And Why It Matters
Discover how Continuous Threat Exposure Management (CTEM) enhances cybersecurity by proactively detecting and neutralizing threats before they escalat
·thehackernews.com·
CISO's Expert Guide To CTEM And Why It Matters
Telegram Used as C2 Channel for New Golang Malware
Telegram Used as C2 Channel for New Golang Malware
A Golang backdoor is using Telegram as its command and control (C2) channel, an approach that makes detection harder for defenders, according to Netskope researchers
·infosecurity-magazine.com·
Telegram Used as C2 Channel for New Golang Malware
Estonian spy chief: ‘Hybrid schmybrid, what’s happening is attacks’
Estonian spy chief: ‘Hybrid schmybrid, what’s happening is attacks’
In a late panel discussion on Saturday at the Munich Security Conference, Kaupo Rosin protested the use of the word which has been applied to a range of hostile activities that are deemed to be deniable or below the threshold justifying an armed response.
·therecord.media·
Estonian spy chief: ‘Hybrid schmybrid, what’s happening is attacks’
Google Chrome's AI-powered security feature rolls out to everyone
Google Chrome's AI-powered security feature rolls out to everyone
Google Chrome has updated the existing "Enhanced protection" feature with AI to offer "real-time" protection against dangerous websites, downloads and extensions.
·bleepingcomputer.com·
Google Chrome's AI-powered security feature rolls out to everyone