Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29873 bookmarks
Custom sorting
Age Verification Using Facial Scans - Schneier on Security
Age Verification Using Facial Scans - Schneier on Security
Discord is testing the feature: “We’re currently running tests in select regions to age-gate access to certain spaces or user settings,” a spokesperson for Discord said in a statement. “The information shared to power the age verification method is only used for the one-time age verification process and is not stored by Discord or our vendor. For Face Scan, the solution our vendor uses operates on-device, which means there is no collection of any biometric information when you scan your face. For ID verification, the scan of your ID is deleted upon verification.”...
·schneier.com·
Age Verification Using Facial Scans - Schneier on Security
Chrome extensions with 6 million installs have hidden tracking code
Chrome extensions with 6 million installs have hidden tracking code
A set of 57 Chrome extensions with 6,000,000 users have been discovered with very risky capabilities, such as monitoring browsing behavior, accessing cookies for domains, and potentially executing remote scripts.
·bleepingcomputer.com·
Chrome extensions with 6 million installs have hidden tracking code
Le groupe Alain Afflelou victime d'une fuite de données personnelles
Le groupe Alain Afflelou victime d'une fuite de données personnelles
La célèbre chaîne française d'opticiens et d'acousticiens a subi une cyberattaque en raison d'une faille de sécurité chez l'un de ses...-CybersĂ©curitĂ©
·usine-digitale.fr·
Le groupe Alain Afflelou victime d'une fuite de données personnelles
NTLM Hash Exploit Targets Poland and Romania Days After Patch
NTLM Hash Exploit Targets Poland and Romania Days After Patch
An NTLM hash disclosure spoofing vulnerability that leaks hashes with minimal user interaction has been observed being exploited in the wild
·infosecurity-magazine.com·
NTLM Hash Exploit Targets Poland and Romania Days After Patch
CTM360 Tracks Global Surge in SMS-Based Reward and Toll Scams
CTM360 Tracks Global Surge in SMS-Based Reward and Toll Scams
Thousands tricked by fake reward & toll scam texts. CTM360 exposes PointyPhish & TollShark—SMS phishing campaigns powered by the Darcula PhaaS platform, with 5K+ domains stealing payment info worldwide.
·bleepingcomputer.com·
CTM360 Tracks Global Surge in SMS-Based Reward and Toll Scams
Cloud File Transfer: Most Secure Cloud Configuration | CSA
Cloud File Transfer: Most Secure Cloud Configuration | CSA
Here’s why a managed cloud file transfer (MFT) solution is the best answer to enterprise requirements surrounding modernization, security, and compliance.
·cloudsecurityalliance.org·
Cloud File Transfer: Most Secure Cloud Configuration | CSA
Node.js malvertising campaign targets crypto users
Node.js malvertising campaign targets crypto users
Microsoft warns of a malvertising campaign using Node.js to deliver malware via fake crypto trading sites like Binance and TradingView.
·securityaffairs.com·
Node.js malvertising campaign targets crypto users
CISA warns of increased breach risks following Oracle Cloud leak
CISA warns of increased breach risks following Oracle Cloud leak
On Wednesday, CISA warned of heightened breach risks after the compromise of legacy Oracle Cloud servers earlier this year and highlighted the significant threat to enterprise networks.
·bleepingcomputer.com·
CISA warns of increased breach risks following Oracle Cloud leak
Zero Trust & the Evolution of Cyber Security | CSA
Zero Trust & the Evolution of Cyber Security | CSA
Zero Trust isn't enough in 2025. Explore the next wave of cloud security with AI, XDR, decentralized identity, and adaptive trust for evolving threats.
·cloudsecurityalliance.org·
Zero Trust & the Evolution of Cyber Security | CSA
Unmasking the new XorDDoS controller and infrastructure
Unmasking the new XorDDoS controller and infrastructure
Cisco Talos observed the ongoing global spread of the XorDDoS malware, predominantly targeting the United States, with evidence suggesting Chinese-speaking operators are using sophisticated tools to orchestrate widespread attacks.
·blog.talosintelligence.com·
Unmasking the new XorDDoS controller and infrastructure