Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29804 bookmarks
Custom sorting
APT28 hackers use Signal chats to launch new malware attacks on Ukraine
APT28 hackers use Signal chats to launch new malware attacks on Ukraine
The Russian state-sponsored threat group APT28聽is using Signal chats to target government targets in Ukraine with two previously undocumented malware families named BeardShell and SlimAgent.
bleepingcomputer.com
APT28 hackers use Signal chats to launch new malware attacks on Ukraine
US Homeland Security warns of escalating Iranian cyberattack risks
US Homeland Security warns of escalating Iranian cyberattack risks
The U.S. Department of Homeland Security (DHS) warned over the weekend of escalating cyberattack risks by Iran-backed hacking groups and pro-Iranian hacktivists.
bleepingcomputer.com
US Homeland Security warns of escalating Iranian cyberattack risks
Espionnage (tr猫s) amateur au profit de la Chine : un ex-soldat am茅ricain plaide coupable
Espionnage (tr猫s) amateur au profit de la Chine : un ex-soldat am茅ricain plaide coupable
Un ancien sergent du renseignement militaire am茅ricain a tent茅 de vendre des secrets 脿 la Chine. Joseph Daniel Schmidt a plaid茅 coupable, le 18 juin 2025, devant la justice f茅d茅rale de son pays. Mais ce qui frappe dans cette affaire d'espionnage, c鈥檈st la maladresse presque na茂ve de son ex茅cution. Confront茅 au juge
numerama.com
Espionnage (tr猫s) amateur au profit de la Chine : un ex-soldat am茅ricain plaide coupable
Canada says Salt Typhoon hacked telecom firm via Cisco flaw
Canada says Salt Typhoon hacked telecom firm via Cisco flaw
The Canadian Centre for Cyber Security and the FBI confirm聽that the Chinese state-sponsored聽'Salt Typhoon'聽hacking group is also targeting Canadian telecommunication firms,聽breaching a telecom provider in February.
bleepingcomputer.com
Canada says Salt Typhoon hacked telecom firm via Cisco flaw
Businesses average 21 AI projects in production
Businesses average 21 AI projects in production
Enterprises plan to expand their portfolios by the end of the year, according to a Rackspace Technology survey.
cybersecuritydive.com
Businesses average 21 AI projects in production
McLaren Health Care says data breach impacts 743,000 patients
McLaren Health Care says data breach impacts 743,000 patients
McLaren Health Care is warning 743,000 patients that the health system suffered a data breach caused by a July 2024 attack by the INC ransomware gang.
bleepingcomputer.com
McLaren Health Care says data breach impacts 743,000 patients
Primer on Model Context Protocol (MCP) Implementation | CSA
Primer on Model Context Protocol (MCP) Implementation | CSA
Walk through how to build a complete system using the Model Context Protocol (MCP), a framework designed to bridge the gap between LLMs and external tools.
cloudsecurityalliance.org
Primer on Model Context Protocol (MCP) Implementation | CSA
Steel giant Nucor confirms hackers stole data in recent breach
Steel giant Nucor confirms hackers stole data in recent breach
Nucor, North America's largest steel producer and recycler, has confirmed that attackers behind a recent cybersecurity incident have also stolen data from the company's network.
bleepingcomputer.com
Steel giant Nucor confirms hackers stole data in recent breach
Largest DDoS Attack to Date - Schneier on Security
Largest DDoS Attack to Date - Schneier on Security
It was a recently unimaginable 7.3 Tbps: The vast majority of the attack was delivered in the form of User Datagram Protocol packets. Legitimate UDP-based transmissions are used in especially time-sensitive communications, such as those for video playback, gaming applications, and DNS lookups. It speeds up communications by not formally establishing a connection before data is transferred. Unlike the more common Transmission Control Protocol, UDP doesn鈥檛 wait for a connection between two computers to be established through a handshake and doesn鈥檛 check whether data is properly received by the other party. Instead, it immediately sends data from one machine to another...
schneier.com
Largest DDoS Attack to Date - Schneier on Security
Cloud Security: Who Owns the Responsibility? | CSA
Cloud Security: Who Owns the Responsibility? | CSA
Explore how cloud, DevOps, SOC teams share security roles, combat alert fatigue, and work with AI-powered purple teaming for effective threat response.
cloudsecurityalliance.org
Cloud Security: Who Owns the Responsibility? | CSA