Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29819 bookmarks
Custom sorting
Security Vulnerabilities in ICEBlock - Schneier on Security
Security Vulnerabilities in ICEBlock - Schneier on Security
The ICEBlock tool has vulnerabilities: The developer of ICEBlock, an iOS app for anonymously reporting sightings of US Immigration and Customs Enforcement (ICE) officials, promises that it “ensures user privacy by storing no personal data.” But that claim has come under scrutiny. ICEBlock creator Joshua Aaron has been accused of making false promises regarding user anonymity and privacy, being “misguided” about the privacy offered by iOS, and of being an Apple fanboy. The issue isn’t what ICEBlock stores. It’s about what it could accidentally reveal through its tight integration with iOS...
·schneier.com·
Security Vulnerabilities in ICEBlock - Schneier on Security
Comment la Chine a infiltré la Garde Nationale américaine pendant 9 mois
Comment la Chine a infiltré la Garde Nationale américaine pendant 9 mois
Une unité de la Garde nationale américaine a été « massivement » compromise par le groupe de cyberespionnage chinois « Salt Typhoon ». Survenue entre mars et décembre 2024, l'opération aurait permis aux pirates d’accéder à des informations sensibles, compromettant potentiellement la sécurité de multiples
·numerama.com·
Comment la Chine a infiltré la Garde Nationale américaine pendant 9 mois
One in 12 US/UK Employees Uses Chinese GenAI Tools
One in 12 US/UK Employees Uses Chinese GenAI Tools
Harmonic Security raises the alarm as one in 12 British and American employees uses Chinese GenAI tools
·infosecurity-magazine.com·
One in 12 US/UK Employees Uses Chinese GenAI Tools
Microsoft Exposes Scattered Spider’s Latest Tactics
Microsoft Exposes Scattered Spider’s Latest Tactics
Microsoft has reported Scattered Spider continues to evolve tactics to compromise both on-premises infrastructure and cloud environments
·infosecurity-magazine.com·
Microsoft Exposes Scattered Spider’s Latest Tactics
Chinese Hackers Target Taiwan's Semiconductor Sector with Cobalt Strike, Custom Backdoors
Chinese Hackers Target Taiwan's Semiconductor Sector with Cobalt Strike, Custom Backdoors
Chinese Hackers Target Taiwan's Semiconductor Sector with Cobalt Strike, Custom Backdoors | Read more hacking news on The Hacker News cybersecurity news website and learn how to protect against cyberattacks and software vulnerabilities.
·thehackernews.com·
Chinese Hackers Target Taiwan's Semiconductor Sector with Cobalt Strike, Custom Backdoors
Most European Financial Firms Still Lagging on DORA Compliance
Most European Financial Firms Still Lagging on DORA Compliance
A Veeam survey found that 96% of financial services organizations believe their current levels of data resilience falls short of DORA compliance, citing major challenges
·infosecurity-magazine.com·
Most European Financial Firms Still Lagging on DORA Compliance
Co-op confirms data of 6.5 million members stolen in cyberattack
Co-op confirms data of 6.5 million members stolen in cyberattack
UK retailer Co-op has confirmed that personal data of 6.5 million members was stolen in the massive cyberattack in April that shut down systems and caused food shortages in its grocery stores.
·bleepingcomputer.com·
Co-op confirms data of 6.5 million members stolen in cyberattack
U.S. Army soldier pleads guilty to extorting 10 tech, telecom firms
U.S. Army soldier pleads guilty to extorting 10 tech, telecom firms
A 21-year old former U.S. Army soldier pleaded guilty to charges of hacking and extorting at least ten telecommunications and technology companies in the country.
·bleepingcomputer.com·
U.S. Army soldier pleads guilty to extorting 10 tech, telecom firms
Louis Vuitton says regional data breaches tied to same cyberattack
Louis Vuitton says regional data breaches tied to same cyberattack
Luxury fashion giant Louis Vuitton confirmed that breaches impacting customers in the UK, South Korea, and Turkey stem from the same security incident, which is believed to be linked to the ShinyHunters extortion group.
·bleepingcomputer.com·
Louis Vuitton says regional data breaches tied to same cyberattack
Hacking Trains - Schneier on Security
Hacking Trains - Schneier on Security
Seems like an old system system that predates any care about security: The flaw has to do with the protocol used in a train system known as the End-of-Train and Head-of-Train. A Flashing Rear End Device (FRED), also known as an End-of-Train (EOT) device, is attached to the back of a train and sends data via radio signals to a corresponding device in the locomotive called the Head-of-Train (HOT). Commands can also be sent to the FRED to apply the brakes at the rear of the train. These devices were first installed in the 1980s as a replacement for caboose cars, and unfortunately, they lack encryption and authentication protocols. Instead, the current system uses data packets sent between the front and back of a train that include a simple BCH checksum to detect errors or interference. But now, the CISA is warning that someone using a software-defined radio could potentially send fake data packets and interfere with train operations...
·schneier.com·
Hacking Trains - Schneier on Security
Cloudflare says 1.1.1.1 outage not caused by attack or BGP hijack
Cloudflare says 1.1.1.1 outage not caused by attack or BGP hijack
To quash speculation of a cyberattack or BGP hijack incident causing the recent 1.1.1.1 Resolver service outage, Cloudflare explains in a post mortem that the incident was caused by an internal misconfiguration.
·bleepingcomputer.com·
Cloudflare says 1.1.1.1 outage not caused by attack or BGP hijack
« Des milliers de drones n'arriveront pas au front » : des hackers ukrainiens auraient volé les plans d'un fabricant russe - Numerama
« Des milliers de drones n'arriveront pas au front » : des hackers ukrainiens auraient volé les plans d'un fabricant russe - Numerama
Les services de renseignement ukrainiens et des groupes de hackers alliés déclarent avoir mené une cyberattaque d'envergure contre l’un des principaux fabricants russes de drones militaires. Près de 50 téraoctets de données auraient été dérobés, notamment les plans de modèles de drones militaires en cours de
·numerama.com·
« Des milliers de drones n'arriveront pas au front » : des hackers ukrainiens auraient volé les plans d'un fabricant russe - Numerama
International operation disrupts pro-Russian hacker group NoName057(16)
International operation disrupts pro-Russian hacker group NoName057(16)
European and U.S. law enforcement have disrupted the operations of a pro-Russian hacker group known for launching distributed denial-of-service attacks against Ukraine and its allies.
·therecord.media·
International operation disrupts pro-Russian hacker group NoName057(16)