Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29805 bookmarks
Custom sorting
AWS CISO stumps for security as an AI enabler
AWS CISO stumps for security as an AI enabler
AI's rapid development underscores the need for secure foundations, Amy Herzog said Tuesday during the company's annual cybersecurity conference.
·cybersecuritydive.com·
AWS CISO stumps for security as an AI enabler
M&S and Co-op Hacks Classified as Single Cyber Event
M&S and Co-op Hacks Classified as Single Cyber Event
The UK’s Cyber Monitoring Centre (CMC) assessed the incident as a Category 2 systemic event, based on the significant economic impact
·infosecurity-magazine.com·
M&S and Co-op Hacks Classified as Single Cyber Event
Human Risk Mitigation is at the Core of Email Security | CSA
Human Risk Mitigation is at the Core of Email Security | CSA
Humans are a weak spot that cybersecurity must compensate for. Email security tools can ensure that employees are not responsible for stopping attacks.
·cloudsecurityalliance.org·
Human Risk Mitigation is at the Core of Email Security | CSA
Personal Data of Oxford City Council Officers Exposed
Personal Data of Oxford City Council Officers Exposed
Oxford City Council revealed that attackers accessed data of individuals who worked on Council-administered elections between 2001 and 2022
·infosecurity-magazine.com·
Personal Data of Oxford City Council Officers Exposed
Faux agents d'entretiens, soirées mondaines et mouchards : les dessous de l'espionnage au Bourget - Numerama
Faux agents d'entretiens, soirées mondaines et mouchards : les dessous de l'espionnage au Bourget - Numerama
Le Salon du Bourget ouvre ses portes au grand public ce vendredi 20 juin 2025 : l’occasion idéale de revenir sur quelques affaires d’espionnage industriel survenues lors de la précédente édition. Entre clés USB piégées, vols d'ordinateurs et espions infiltrés en agents d'entretien, les coulisses du plus grand
·numerama.com·
Faux agents d'entretiens, soirées mondaines et mouchards : les dessous de l'espionnage au Bourget - Numerama
6 Cloud Security Trends to Watch in 2025 | CSA
6 Cloud Security Trends to Watch in 2025 | CSA
Explore six key cloud security trends for 2025 and learn how to address identity risks, visibility gaps, and misaligned architectures effectively.
·cloudsecurityalliance.org·
6 Cloud Security Trends to Watch in 2025 | CSA
Surveillance in the US - Schneier on Security
Surveillance in the US - Schneier on Security
Good article from 404 Media on the cozy surveillance relationship between local Oregon police and ICE: In the email thread, crime analysts from several local police departments and the FBI introduced themselves to each other and made lists of surveillance tools and tactics they have access to and felt comfortable using, and in some cases offered to perform surveillance for their colleagues in other departments. The thread also includes a member of ICE’s Homeland Security Investigations (HSI) and members of Oregon’s State Police. In the thread, called the “Southern Oregon Analyst Group,” some members talked about making fake social media profiles to surveil people, and others discussed being excited to learn and try new surveillance techniques. The emails show both the wide array of surveillance tools that are available to even small police departments in the United States and also shows informal collaboration between local police departments and federal agencies, when ordinarily agencies like ICE are expected to follow their own legal processes for carrying out the surveillance...
·schneier.com·
Surveillance in the US - Schneier on Security
No, the 16 billion credentials leak is not a new data breach
No, the 16 billion credentials leak is not a new data breach
News broke today of a "mother of all breaches," sparking wide media coverage filled with warnings and fear-mongering. However, it appears to be a compilation of previously leaked credentials stolen by infostealers, exposed in data breaches, and via credential stuffing attacks.
·bleepingcomputer.com·
No, the 16 billion credentials leak is not a new data breach
Webinar: Stolen credentials are the new front door to your network
Webinar: Stolen credentials are the new front door to your network
Cybercriminals no longer need zero-days to breach your systems—these days, they just log in. Join BleepingComputer, SC Media, and Specops Software's Darren Siegel on July 9 at 2:00 PM ET for a live webinar on how attackers are using stolen credentials to infiltrate networks and how you can stop them.
·bleepingcomputer.com·
Webinar: Stolen credentials are the new front door to your network
DOJ moves to seize $225 million in crypto stolen by scammers
DOJ moves to seize $225 million in crypto stolen by scammers
A civil forfeiture complaint was filed in U.S. District Court for the District of Columbia this week, where investigators from the FBI and U.S. Secret Service said they used blockchain analysis to trace the funds back to fraud schemes perpetrated by actors in the Philippines.
·therecord.media·
DOJ moves to seize $225 million in crypto stolen by scammers