Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29804 bookmarks
Custom sorting
Leak confirms OpenAI's ChatGPT will integrate MCP
Leak confirms OpenAI's ChatGPT will integrate MCP
ChatGPT is testing support for Model Context Protocol (MCP), which will allow the AI to connect to third-party services and use them as context.
·bleepingcomputer.com·
Leak confirms OpenAI's ChatGPT will integrate MCP
Xoxo to Prague
Xoxo to Prague
In this week’s newsletter, Thor inspects the LockBit leak, finding $10,000 “security tips,” ransom negotiations gone wrong and a rare glimpse into the human side of cybercrime.
·blog.talosintelligence.com·
Xoxo to Prague
Breachforums Boss to Pay $700k in Healthcare Breach
Breachforums Boss to Pay $700k in Healthcare Breach
In what experts are calling a novel legal outcome, the 22-year-old former administrator of the cybercrime community Breachforums will forfeit nearly $700,000 to settle a civil lawsuit from a health insurance company whose customer data was posted for sale on…
·krebsonsecurity.com·
Breachforums Boss to Pay $700k in Healthcare Breach
Government webmail hacked via XSS bugs in global spy campaign
Government webmail hacked via XSS bugs in global spy campaign
Hackers are running a worldwide cyberespionage campaign dubbed 'RoundPress,' leveraging zero-day and n-day flaws in webmail servers to steal email from high-value government organizations.
·bleepingcomputer.com·
Government webmail hacked via XSS bugs in global spy campaign
Ban sales of gear from China’s TP-Link, Republican lawmakers tell Trump administration
Ban sales of gear from China’s TP-Link, Republican lawmakers tell Trump administration
Senate Intelligence Committee Chairman Tom Cotton and 16 other GOP lawmakers wrote this week to Commerce Secretary Howard Lutnick, saying his department should block future sales of TP-Link’s popular small office/home office (SOHO) internet routers.
·therecord.media·
Ban sales of gear from China’s TP-Link, Republican lawmakers tell Trump administration
How Threat Modeling, Actor Attribution Grow Cyber Defenses
How Threat Modeling, Actor Attribution Grow Cyber Defenses
Want to enhance your threat modeling? By combining it with threat actor attribution, you can improve your cyber defenses. Read on to learn more.
·cisecurity.org·
How Threat Modeling, Actor Attribution Grow Cyber Defenses
1Password rend les passkeys sur Windows 11 plus commodes
1Password rend les passkeys sur Windows 11 plus commodes
Dans le cadre d'un travail conjoint avec Microsoft, 1Password a rendu la gestion des passkeys sur Windows 11 plus efficace. Ce changement s'appliquera à tout le monde bientôt. Comment survivre dans un monde sans mots de passe, lorsque l'on est un gestionnaire de mots de passe ? En s'adaptant à cette nouvelle donne,
·numerama.com·
1Password rend les passkeys sur Windows 11 plus commodes
Windows 11 and Red Hat Linux hacked on first day of Pwn2Own
Windows 11 and Red Hat Linux hacked on first day of Pwn2Own
On the first day of Pwn2Own Berlin 2025, security researchers were awarded $260,000 after successfully demonstrating zero-day exploits for Windows 11, Red Hat Linux, Docker Desktop, and Oracle VirtualBox.
·bleepingcomputer.com·
Windows 11 and Red Hat Linux hacked on first day of Pwn2Own
New Tor Oniux tool anonymizes any Linux app's network traffic
New Tor Oniux tool anonymizes any Linux app's network traffic
Tor has announced Oniux, a new command-line tool for routing any Linux application securely through the Tor network for anonymized network connections.
·bleepingcomputer.com·
New Tor Oniux tool anonymizes any Linux app's network traffic
Qu’est-ce que la stratégie 3-2-1-1-0 en cybersécurité ?
Qu’est-ce que la stratégie 3-2-1-1-0 en cybersécurité ?
En matière de protection des données, créer une sauvegarde et la mettre à jour régulièrement constitue un excellent moyen d’éviter la plupart des accidents. Du moins, pour les particuliers ou les petites structures. Car lorsque le volume de données, ou le nombre d’utilisateurs est élevé, un simple backup n’est plus
·numerama.com·
Qu’est-ce que la stratégie 3-2-1-1-0 en cybersécurité ?