Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31645 bookmarks
Custom sorting
Foundations for OT cybersecurity: Asset inventory guidance for owners and operators | Cyber.gov.au
Foundations for OT cybersecurity: Asset inventory guidance for owners and operators | Cyber.gov.au
This guidance outlines how OT owners and operators can create and maintain an asset inventory and OT taxonomy, to protect their most vital assets. It includes steps for defining scope and objectives for the inventory, identifying assets, collecting attributes, creating a taxonomy, managing data, and implementing asset life cycle management.
·cyber.gov.au·
Foundations for OT cybersecurity: Asset inventory guidance for owners and operators | Cyber.gov.au
Cyberattack on Jaguar Land Rover threatens to hit British economic growth
Cyberattack on Jaguar Land Rover threatens to hit British economic growth
The disruption is the latest to hit a high-profile brand in the United Kingdom, and follows repeated delays in the British government introducing cybersecurity regulations that would require businesses to better protect themselves from attacks.
·therecord.media·
Cyberattack on Jaguar Land Rover threatens to hit British economic growth
Signal adds secure cloud backups to save and restore chats
Signal adds secure cloud backups to save and restore chats
Signal has introduced a new opt-in feature that helps users create end-to-end encrypted backups of their chats, allowing them to restore messages even if their phones are damaged or lost.
·bleepingcomputer.com·
Signal adds secure cloud backups to save and restore chats
US sanctions companies behind cyber scam centers in Cambodia, Myanmar
US sanctions companies behind cyber scam centers in Cambodia, Myanmar
Secretary of State Marco Rubio said U.S. officials sanctioned nine people and companies involved in running Shwe Kokko — a hub for scam centers in Myanmar — as well as four individuals and six entities for their roles operating forced labor compounds in Cambodia.
·therecord.media·
US sanctions companies behind cyber scam centers in Cambodia, Myanmar
Lovesac confirms data breach after ransomware attack claims
Lovesac confirms data breach after ransomware attack claims
American furniture brand Lovesac is warning that it suffered a data breach impacting an undisclosed number of individuals, stating their personal data was exposed in a cybersecurity incident.
·bleepingcomputer.com·
Lovesac confirms data breach after ransomware attack claims
Signed Copies of Rewiring Democracy - Schneier on Security
Signed Copies of Rewiring Democracy - Schneier on Security
When I announced my latest book last week, I forgot to mention that you can pre-order a signed copy here. I will ship the books the week of 10/20, when it is published.
·schneier.com·
Signed Copies of Rewiring Democracy - Schneier on Security
Sports streaming piracy service with 123M yearly visits shut down
Sports streaming piracy service with 123M yearly visits shut down
​Calcio, a large piracy sports streaming platform with more than 120 million visits in the past year, was shut down following a collaborative effort by the Alliance for Creativity and Entertainment (ACE) and DAZN.
·bleepingcomputer.com·
Sports streaming piracy service with 123M yearly visits shut down
SHARED INTEL Q&A: Is your antivirus catching fresh threats — or just echoing VirusTotal?
SHARED INTEL Q&A: Is your antivirus catching fresh threats — or just echoing VirusTotal?
In cybersecurity, trust often hinges on what users think their software is doing — versus what’s actually happening under the hood. Related: Eddy Willem's 'Borrowed Brains' findings Take antivirus, for example. Many users assume threat detection is based on proprietary research, unique signatures, and internal analysis. But what happens when a product’s detection engine is
·lastwatchdog.com·
SHARED INTEL Q&A: Is your antivirus catching fresh threats — or just echoing VirusTotal?
Hackers hijack npm packages with 2 billion weekly downloads in supply chain attack
Hackers hijack npm packages with 2 billion weekly downloads in supply chain attack
In what is being called the largest supply chain attack in history, attackers have injected malware into NPM packages with over 2.6 billion weekly downloads after compromising maintainers' accounts in a phishing attack.
·bleepingcomputer.com·
Hackers hijack npm packages with 2 billion weekly downloads in supply chain attack
Sans avocat au procès, ce hacker de Switch finit par devoir une fortune à Nintendo
Sans avocat au procès, ce hacker de Switch finit par devoir une fortune à Nintendo
Dans un accord signé le 5 septembre 2025, Nintendo et le propriétaire d'un site de piratage de Switch ont mis fin à une bataille judiciaire entamée plus d'un an auparavant. Pour éviter une procédure qui aurait pu s’éterniser, le hacker a choisi d’accepter les conditions du géant japonais, auquel il doit désormais la
·numerama.com·
Sans avocat au procès, ce hacker de Switch finit par devoir une fortune à Nintendo
Salesloft: March GitHub repo breach led to Salesforce data theft attacks
Salesloft: March GitHub repo breach led to Salesforce data theft attacks
Salesloft says attackers first breached its GitHub account in March, leading to the theft of Drift OAuth tokens later used in widespread Salesforce data theft attacks in August.
·bleepingcomputer.com·
Salesloft: March GitHub repo breach led to Salesforce data theft attacks
Data security gaps stymy enterprise AI plans
Data security gaps stymy enterprise AI plans
Nearly three-quarters of CIOs and CISOs see information complexity as an adoption roadblock, according to a Ponemon Institute study commissioned by OpenText.
·cybersecuritydive.com·
Data security gaps stymy enterprise AI plans
Action1 vs. Microsoft WSUS: A Better Approach to Modern Patch Management
Action1 vs. Microsoft WSUS: A Better Approach to Modern Patch Management
With WSUS deprecated, it's time to move from an outdated legacy patching system to a modern one. Learn from Action1 how its modern patching platform offers cloud-native speed, 3rd-party coverage, real-time compliance, and zero infrastructure. Try it free now!
·bleepingcomputer.com·
Action1 vs. Microsoft WSUS: A Better Approach to Modern Patch Management
La diplomatie française lance French Response, un « compte officiel de riposte » sur X
La diplomatie française lance French Response, un « compte officiel de riposte » sur X
Pour contrer les campagnes de désinformation orchestrées par des acteurs étrangers sur les réseaux sociaux, en particulier sur X, le ministère des Affaires étrangères a annoncé le lancement d’un compte officiel dédié à la riposte. Une initiative qui s’inscrit dans une stratégie de communication plus offensive de la
·numerama.com·
La diplomatie française lance French Response, un « compte officiel de riposte » sur X
Remote Access Abuse Biggest Pre-Ransomware Indicator
Remote Access Abuse Biggest Pre-Ransomware Indicator
Cisco Talos found that abuse of remote services and remote access software are the most prevalent ‘pre-ransomware’ tactics deployed by threat actors
·infosecurity-magazine.com·
Remote Access Abuse Biggest Pre-Ransomware Indicator
What is Continuous Compliance & How Do You Achieve It? | CSA
What is Continuous Compliance & How Do You Achieve It? | CSA
Continuous compliance is how modern teams stay secure, agile, and trusted. With the right systems in place, compliance stops being a burden.
·cloudsecurityalliance.org·
What is Continuous Compliance & How Do You Achieve It? | CSA