Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29730 bookmarks
Custom sorting
AI Models Mislead Users on Login URLs
AI Models Mislead Users on Login URLs
A third of AI-generated login URLs lead to incorrect or dangerous domains, according to Netcraft
·infosecurity-magazine.com·
AI Models Mislead Users on Login URLs
Suspendu par son employeur, il sabote le réseau informatique de la boîte
Suspendu par son employeur, il sabote le réseau informatique de la boîte
L’ex-employé d’une entreprise basée dans le Yorkshire a été condamné à 7 mois de prison ferme, le 30 juin 2025, pour avoir volontairement saboté l’infrastructure informatique de son ancien employeur. L’homme a agi par vengeance, après avoir été suspendu de ses fonctions. Mohammed Umar Taj, 31 ans, travaillait comme
·numerama.com·
Suspendu par son employeur, il sabote le réseau informatique de la boîte
The Traditional Technology Adoption Curve vs. AI | CSA
The Traditional Technology Adoption Curve vs. AI | CSA
Explore how AI adoption dramatically compresses technology development cycles and how humans are resisting this shift. Learn how to help employees embrace AI.
·cloudsecurityalliance.org·
The Traditional Technology Adoption Curve vs. AI | CSA
Spain arrests two over data leaks targeting state officials, journalists
Spain arrests two over data leaks targeting state officials, journalists
Spain’s Interior Ministry said the suspects were responsible for stealing and leaking personal data belonging to high-ranking political figures, including Prime Minister Pedro Sánchez, President of the Congress of Deputies Francina Armengol and Catalonia’s President Salvador Illa.
·therecord.media·
Spain arrests two over data leaks targeting state officials, journalists
Dozens of fake wallet add-ons flood Firefox store to drain crypto
Dozens of fake wallet add-ons flood Firefox store to drain crypto
More than 40 fake extensions in Firefox's official add-ons store are impersonating popular cryptocurrency wallets from trusted providers to steal wallet credentials and sensitive data.
·bleepingcomputer.com·
Dozens of fake wallet add-ons flood Firefox store to drain crypto
PDFs: Portable documents, or perfect deliveries for phish?
PDFs: Portable documents, or perfect deliveries for phish?
A popular social engineering technique returns: callback phishing, or TOAD attacks, which leverage PDFs, VoIP anonymity and even QR code tricks.
·blog.talosintelligence.com·
PDFs: Portable documents, or perfect deliveries for phish?
MFA Made Easy: 8 Best Practices for Authentication | CSA
MFA Made Easy: 8 Best Practices for Authentication | CSA
Multi-Factor Authentication (MFA) is a core part of Zero Trust strategies. Yet, MFA adoption lags due to the poor user experience, leaving companies vulnerable.
·cloudsecurityalliance.org·
MFA Made Easy: 8 Best Practices for Authentication | CSA
Ubuntu Disables Spectre/Meltdown Protections - Schneier on Security
Ubuntu Disables Spectre/Meltdown Protections - Schneier on Security
A whole class of speculative execution attacks against CPUs were published in 2018. They seemed pretty catastrophic at the time. But the fixes were as well. Speculative execution was a way to speed up CPUs, and removing those enhancements resulted in significant performance drops. Now, people are rethinking the trade-off. Ubuntu has disabled some protections, resulting in 20% performance boost. After discussion between Intel and Canonical’s security teams, we are in agreement that Spectre no longer needs to be mitigated for the GPU at the Compute Runtime level. At this point, Spectre has been mitigated in the kernel, and a clear warning from the Compute Runtime build serves as a notification for those running modified kernels without those patches. For these reasons, we feel that Spectre mitigations in Compute Runtime no longer offer enough security impact to justify the current performance tradeoff...
·schneier.com·
Ubuntu Disables Spectre/Meltdown Protections - Schneier on Security
Laptop Farms : l’incroyable réseau de télétravailleurs nord-coréen démantelé par les États-Unis
Laptop Farms : l’incroyable réseau de télétravailleurs nord-coréen démantelé par les États-Unis
Fin juin 2025, la justice américaine a dévoilé l’opération DPRK RevGen, une initiative des principales agences de sécurité du pays (NSA, FBI, contre-espionnage) visant à démanteler un vaste réseau de travailleurs informatiques nord-coréens. Ils auraient infiltré plus de 100 entreprises américaines, dont plusieurs du
·numerama.com·
Laptop Farms : l’incroyable réseau de télétravailleurs nord-coréen démantelé par les États-Unis
gogs 0.13.0 - Remote Code Execution (RCE)
gogs 0.13.0 - Remote Code Execution (RCE)
gogs 0.13.0 - Remote Code Execution (RCE). CVE-2024-39930 . remote exploit for Multiple platform
·exploit-db.com·
gogs 0.13.0 - Remote Code Execution (RCE)