Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31149 bookmarks
Custom sorting
Perplexity’s Comet AI browser tricked into buying fake items online
Perplexity’s Comet AI browser tricked into buying fake items online
A study looking into agentic AI browsers has found that these emerging tools are vulnerable to both new and old schemes that could make them interact with malicious pages and prompts.
·bleepingcomputer.com·
Perplexity’s Comet AI browser tricked into buying fake items online
Pharmaceutical Company Inotiv Confirms Ransomware Attack
Pharmaceutical Company Inotiv Confirms Ransomware Attack
Indiana-based pharmaceutical research company Inotiv has confirmed it suffered a ransomware attack, disrupting operations and compromising data
·infosecurity-magazine.com·
Pharmaceutical Company Inotiv Confirms Ransomware Attack
TRM Launches Industry-Wide Platform to Fight Crypto Crimes
TRM Launches Industry-Wide Platform to Fight Crypto Crimes
With Beacon Network, TRM Labs has brought together law enforcement and some of the largest crypto exchanges to fight against crypto crimes
·infosecurity-magazine.com·
TRM Launches Industry-Wide Platform to Fight Crypto Crimes
Russian cyber group exploits seven-year-old network vulnerabilities for long-term espionage | CyberScoop
Russian cyber group exploits seven-year-old network vulnerabilities for long-term espionage | CyberScoop
A Russian state-sponsored group known as Static Tundra has persistently exploited the Cisco CVE-2018-0171 vulnerability to compromise network devices worldwide, targeting key industries and evading detection for years, according to new findings by Cisco Talos.
·cyberscoop.com·
Russian cyber group exploits seven-year-old network vulnerabilities for long-term espionage | CyberScoop
Announcing the AI Controls Matrix & ISO 42001 Mapping | CSA
Announcing the AI Controls Matrix & ISO 42001 Mapping | CSA
CSA has mapped the AI Controls Matrix to ISO/IEC 42001:2023. This guide helps organizations integrate AI-specific controls into existing ISMS programs.
·cloudsecurityalliance.org·
Announcing the AI Controls Matrix & ISO 42001 Mapping | CSA
Mule Operators in META Adopt Advanced Fraud Schemes
Mule Operators in META Adopt Advanced Fraud Schemes
A new report has mapped the tactical evolution of mule operators in the META region from VPNs to advanced fraud networks
·infosecurity-magazine.com·
Mule Operators in META Adopt Advanced Fraud Schemes
Major password managers can leak logins in clickjacking attacks
Major password managers can leak logins in clickjacking attacks
Six major password managers with tens of millions of users are currently vulnerable to unpatched clickjacking flaws that could allow attackers to steal account credentials, 2FA codes, and credit card details.
·bleepingcomputer.com·
Major password managers can leak logins in clickjacking attacks
Why email security needs its EDR moment to move beyond prevention
Why email security needs its EDR moment to move beyond prevention
Email security is stuck where antivirus was a decade ago—focused only on prevention. Learn from Material Security why it's time for an "EDR for email" mindset: visibility, post-compromise controls, and SaaS-wide protection.
·bleepingcomputer.com·
Why email security needs its EDR moment to move beyond prevention
Microsoft investigates outage impacting Copilot, Office.com
Microsoft investigates outage impacting Copilot, Office.com
Microsoft is investigating an ongoing issue preventing users across North America from accessing Office.com and the company's Copilot AI-powered assistant.
·bleepingcomputer.com·
Microsoft investigates outage impacting Copilot, Office.com
SecurityX vs CISSP: Which One’s Better for Pros?
SecurityX vs CISSP: Which One’s Better for Pros?
Read this expert SecurityX vs CISSP comparison guide to learn all you need to know about these top certifications and decide which suits you the best.
·stationx.net·
SecurityX vs CISSP: Which One’s Better for Pros?
« Ça a commencé par des nuggets gratuits », comment une hackeuse a mis McDonald’s face à ses failles de sécurité
« Ça a commencé par des nuggets gratuits », comment une hackeuse a mis McDonald’s face à ses failles de sécurité
Une hackeuse professionnelle, connue sous le pseudonyme « Bobdahacker », raconte comment sa chasse aux vulnérabilités chez McDonald's, entamée par une simple commande de nuggets gratuits, a révélé d'autres failles de sécurité et conduit au licenciement d’une employée qui avait accepté de l’aider. Un rapport de
·numerama.com·
« Ça a commencé par des nuggets gratuits », comment une hackeuse a mis McDonald’s face à ses failles de sécurité
Major Belgian telecom firm says cyberattack compromised data on 850,000 accounts
Major Belgian telecom firm says cyberattack compromised data on 850,000 accounts
The company said no critical data was accessed, but the hacker "gained access to one of our IT systems that contains the following data: name, first name, telephone number, SIM card number, PUK code, tariff plan.”
·therecord.media·
Major Belgian telecom firm says cyberattack compromised data on 850,000 accounts
"Set It and Forget It” Access Control is Not Enough | CSA
"Set It and Forget It” Access Control is Not Enough | CSA
We don’t need to throw out RBAC, but we need to evolve beyond it. Modern identity security requires understanding the full picture of effective permissions.
·cloudsecurityalliance.org·
"Set It and Forget It” Access Control is Not Enough | CSA
Global Port Disruptions are Redefining Supply Chain Strategies - interos.ai
Global Port Disruptions are Redefining Supply Chain Strategies - interos.ai
Recent headlines about the Panama Canal, port concessions in Latin America, and strategic realignments in global shipping have reignited conversations across the logistics and procurement world. For organizations, these developments are immediate signals to assess risk exposure, optimize routing decisions and reevaluate resilience strategies. At interos.ai, our latest analysis shows that these developments are already....
·interos.ai·
Global Port Disruptions are Redefining Supply Chain Strategies - interos.ai
Hackers Weaponize QR Codes in New 'Quishing' Attacks
Hackers Weaponize QR Codes in New 'Quishing' Attacks
Researchers discovered two new phishing techniques where attackers split malicious QR codes or embed them into legitimate ones
·infosecurity-magazine.com·
Hackers Weaponize QR Codes in New 'Quishing' Attacks