Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29777 bookmarks
Custom sorting
Microsoft Authenticator on iOS moves backups fully to iCloud
Microsoft Authenticator on iOS moves backups fully to iCloud
Microsoft is rolling out a new backup system in September for its Authenticator app on iOS, removing the requirement to use a Microsoft personal account to back up TOTP secrets and account names.
·bleepingcomputer.com·
Microsoft Authenticator on iOS moves backups fully to iCloud
News alert: Reflectiz expands Datadog’s security scope to cover client-side web vulnerabilities
News alert: Reflectiz expands Datadog’s security scope to cover client-side web vulnerabilities
BOSTON, July 9, 2025, CyberNewswire -- Reflectiz, a leading cybersecurity company specializing in web exposure management, today announced a new integration with Datadog, Inc. (NASDAQ: DDOG), the monitoring and security platform for cloud applications. This integration combines advanced website security intelligence with enterprise-grade observability, empowering organizations with continuous visibility and control over their expanding attack
·lastwatchdog.com·
News alert: Reflectiz expands Datadog’s security scope to cover client-side web vulnerabilities
Microsoft confirms Windows Server Update Services (WSUS) sync is broken
Microsoft confirms Windows Server Update Services (WSUS) sync is broken
Microsoft has confirmed a widespread issue in Windows Server Update Services (WSUS) that prevents organizations from syncing with Microsoft Update and deploying the latest Windows updates.
·bleepingcomputer.com·
Microsoft confirms Windows Server Update Services (WSUS) sync is broken
Qantas confirms data breach impacts 5.7 million customers
Qantas confirms data breach impacts 5.7 million customers
Australian airline Qantas has confirmed that 5.7 million people have been impacted by a recent data breach, in which threat actors stole customers' data.
·bleepingcomputer.com·
Qantas confirms data breach impacts 5.7 million customers
More than $40 million stolen from GMX crypto platform
More than $40 million stolen from GMX crypto platform
Decentralized exchange GMX disabled trading after it “experienced an exploit." The heist involved more than $40 million in user funds.
·therecord.media·
More than $40 million stolen from GMX crypto platform
Microsoft expands Zero Trust workshop to cover network, SecOps, and more
Microsoft expands Zero Trust workshop to cover network, SecOps, and more
The Microsoft Zero Trust workshop has been expanded to cover all six pillars of Microsoft's Zero Trust model, providing a comprehensive guide for organizations to modernize their security posture.
·microsoft.com·
Microsoft expands Zero Trust workshop to cover network, SecOps, and more
CompTIA Security+ Cheat Sheet (SY0-601)
CompTIA Security+ Cheat Sheet (SY0-601)
Taking your cyber security skills up a level? Use our comprehensive cheat sheet to ace your CompTIA Security+ exam and kickstart your cyber security career.
·stationx.net·
CompTIA Security+ Cheat Sheet (SY0-601)
Scattered Spider Behind Major ESXi Ransomware Attacks | CSA
Scattered Spider Behind Major ESXi Ransomware Attacks | CSA
Scattered Spider (aka UNC3944, 0ktapus, & Muddled Libra) is one of the most dangerous threat clusters in operation. Their most damaging operations target ESXi.
·cloudsecurityalliance.org·
Scattered Spider Behind Major ESXi Ransomware Attacks | CSA
Qantas says cyberattack affected 5.7 million customers
Qantas says cyberattack affected 5.7 million customers
The incident follows a notorious hacker gang’s pivot to targeting transportation companies with its trademark social-engineering attacks.
·cybersecuritydive.com·
Qantas says cyberattack affected 5.7 million customers
Ingram Micro starts restoring systems after ransomware attack
Ingram Micro starts restoring systems after ransomware attack
Ingram Micro has begun restoring systems and business services after suffering a massive SafePay ransomware attack right before the July 4th holiday.
·bleepingcomputer.com·
Ingram Micro starts restoring systems after ransomware attack
Treasury sanctions North Korean over IT worker malware scheme
Treasury sanctions North Korean over IT worker malware scheme
The U.S. Department of the Treasury sanctioned cyber actor Song Kum Hyok for his association with North Korea's hacking group Andariel and for facilitating IT worker schemes that generated revenue for the Pyongyang regime.
·bleepingcomputer.com·
Treasury sanctions North Korean over IT worker malware scheme
Fake CNN and BBC sites used to push investment scams
Fake CNN and BBC sites used to push investment scams
Thousands of web pages falsely branded as popular news sites are conduits for fake cryptocurrency investment scams, researchers said.
·therecord.media·
Fake CNN and BBC sites used to push investment scams
New ServiceNow flaw lets attackers enumerate restricted data
New ServiceNow flaw lets attackers enumerate restricted data
A new vulnerability in ServiceNow, dubbed Count(er) Strike, allows low-privileged users to extract sensitive data from tables to which they should not have access.
·bleepingcomputer.com·
New ServiceNow flaw lets attackers enumerate restricted data
The MFA You Trust Is Lying to You – and Here's How Attackers Exploit It
The MFA You Trust Is Lying to You – and Here's How Attackers Exploit It
MFA Authenticator apps aren't cutting it anymore. Attackers are bypassing legacy MFA with fake sites and real-time phishing. Token Ring and BioStick stop them cold—with fingerprint-bound hardware. Learn more from Token.
·bleepingcomputer.com·
The MFA You Trust Is Lying to You – and Here's How Attackers Exploit It
Ransomware Attack Stops Nova Scotia Power Meter Readings
Ransomware Attack Stops Nova Scotia Power Meter Readings
Nova Scotia Power revealed that a ransomware attack has prevented meters from sending energy usage data to its systems, impacting billing
·infosecurity-magazine.com·
Ransomware Attack Stops Nova Scotia Power Meter Readings
EU Cybersecurity Compliance is a Competitive Advantage | CSA
EU Cybersecurity Compliance is a Competitive Advantage | CSA
The EU has taken a bold, proactive stance with one of the world’s most comprehensive regulatory frameworks for cybersecurity and data protection.
·cloudsecurityalliance.org·
EU Cybersecurity Compliance is a Competitive Advantage | CSA