Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29738 bookmarks
Custom sorting
Interpol identifies West Africa as potential new hotspot for cybercrime compounds
Interpol identifies West Africa as potential new hotspot for cybercrime compounds
Interpol said it analyzed five years of data about the illicit industry, which relies on human trafficking to staff up centers with people who are forced to conduct investment fraud, romance scams and other schemes.
·therecord.media·
Interpol identifies West Africa as potential new hotspot for cybercrime compounds
CVE Program Launches Two New Forums to Enhance CVE Utilization
CVE Program Launches Two New Forums to Enhance CVE Utilization
The CVE Board has launched a Consumer Working Group and a Researcher Working Group, allowing new stakeholders to shape the future of the CVE Program
·infosecurity-magazine.com·
CVE Program Launches Two New Forums to Enhance CVE Utilization
Hunters International ransomware group claims to be shutting down
Hunters International ransomware group claims to be shutting down
“After careful consideration and in light of recent developments, we have decided to close the Hunters International project,” the prolific cybercrime gang wrote on its darknet site.
·therecord.media·
Hunters International ransomware group claims to be shutting down
What We Can Learn from the 2024 CrowdStrike Outage | CSA
What We Can Learn from the 2024 CrowdStrike Outage | CSA
The 2024 CrowdStrike outage exposed issues with centralized security solutions, process management, software testing, and incident response planning.
·cloudsecurityalliance.org·
What We Can Learn from the 2024 CrowdStrike Outage | CSA
North Korean Hackers Target Crypto Firms with Novel macOS Malware
North Korean Hackers Target Crypto Firms with Novel macOS Malware
SentinelLabs observed North Korean actors deploying novel TTPs to target crypto firms, including a mix of programming languages and signal-based persistence
·infosecurity-magazine.com·
North Korean Hackers Target Crypto Firms with Novel macOS Malware
What MITRE ATT&CK v17 Means for ESXi Security | CSA
What MITRE ATT&CK v17 Means for ESXi Security | CSA
MITRE ATT&CK v17 introduces an ESXi matrix, highlighting hypervisors as critical points of attack. Learn about the new TTPs and how to secure ESXi environments.
·cloudsecurityalliance.org·
What MITRE ATT&CK v17 Means for ESXi Security | CSA
Hunters International ransomware shuts down after World Leaks rebrand
Hunters International ransomware shuts down after World Leaks rebrand
​The Hunters International Ransomware-as-a-Service (RaaS) operation announced today that it has officially closed down its operations and will offer free decryptors to help victims recover their data without paying a ransom.
·bleepingcomputer.com·
Hunters International ransomware shuts down after World Leaks rebrand
Surveillance Used by a Drug Cartel - Schneier on Security
Surveillance Used by a Drug Cartel - Schneier on Security
Once you build a surveillance system, you can’t control who will use it: A hacker working for the Sinaloa drug cartel was able to obtain an FBI official’s phone records and use Mexico City’s surveillance cameras to help track and kill the agency’s informants in 2018, according to a new US justice department report. The incident was disclosed in a justice department inspector general’s audit of the FBI’s efforts to mitigate the effects of “ubiquitous technical surveillance,” a term used to describe the global proliferation of cameras and the thriving trade in vast stores of communications, travel, and location data...
·schneier.com·
Surveillance Used by a Drug Cartel - Schneier on Security
ChatGPT vous renvoie vers de mauvaises URLs et c’est formidable pour les hackers
ChatGPT vous renvoie vers de mauvaises URLs et c’est formidable pour les hackers
Une étude de la société de cybersécurité Netcraft révèle que des cybercriminels exploitent les errances des LLMs comme ChatGPT ou Perplexity. Cette nouvelle méthode de piratage repose sur les faux liens renvoyés par les IA génératives. Il était une époque, pas si lointaine, où l'utilisateur lambda cherchait lui-même
·numerama.com·
ChatGPT vous renvoie vers de mauvaises URLs et c’est formidable pour les hackers
Microsoft asks users to ignore Windows Firewall config errors
Microsoft asks users to ignore Windows Firewall config errors
Microsoft asked customers this week to disregard incorrect Windows Firewall errors that appear after rebooting their systems following the installation of the June 2025 preview update.
·bleepingcomputer.com·
Microsoft asks users to ignore Windows Firewall config errors
Linux Users Urged to Patch Critical Sudo CVE
Linux Users Urged to Patch Critical Sudo CVE
Two elevation of privilege vulnerabilities have been discovered on the popular Sudo utility, affecting 30-50 million endpoints in the US alone
·infosecurity-magazine.com·
Linux Users Urged to Patch Critical Sudo CVE
Cette offre pCloud 2-en-1 est parfaite pour assurer la sécurité de vos données personnelles
Cette offre pCloud 2-en-1 est parfaite pour assurer la sécurité de vos données personnelles
À l’heure où les fuites de données sont devenues monnaies courantes, la protection des données personnelles n’a jamais été aussi importante. D’autant plus qu’il existe désormais pléthore d’outils plus puissants les uns que les autres pour accompagner les internautes dans cette tâche. En juin dernier, un fichier
·numerama.com·
Cette offre pCloud 2-en-1 est parfaite pour assurer la sécurité de vos données personnelles
STRATEGIC REEL: APIs are the new perimeter — and business logic attacks are slipping through
STRATEGIC REEL: APIs are the new perimeter — and business logic attacks are slipping through
APIs have become the digital glue of the enterprise — and attackers know it. Related: API security - the big picture In this debut edition of the Last Watchdog Strategic Reel (LWSR), A10 Networks’ Field CISO Jamison Utter cuts through the noise from RSAC 2025 with a sharp breakdown of today’s API threatscape. From 15,000
·lastwatchdog.com·
STRATEGIC REEL: APIs are the new perimeter — and business logic attacks are slipping through
News alert: SquareX research finds browser AI agents are proving riskier than human employees
News alert: SquareX research finds browser AI agents are proving riskier than human employees
Palo Alto, Calif., Jun. 30, 2025, CyberNewswire--Every security practitioner knows that employees are the weakest link in an organization, but this is no longer the case. SquareX’s research reveals that Browser AI Agents are more likely to fall prey to cyberattacks than employees, making them the new weakest link that enterprise security teams need to
·lastwatchdog.com·
News alert: SquareX research finds browser AI agents are proving riskier than human employees
NimDoor crypto-theft macOS malware revives itself when killed
NimDoor crypto-theft macOS malware revives itself when killed
North Korean state-backed hackers have been using a new family of macOS malware called NimDoor in a campaign that targets web3 and cryptocurrency organizations.
·bleepingcomputer.com·
NimDoor crypto-theft macOS malware revives itself when killed