Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31373 bookmarks
Custom sorting
Understanding the challenges of securing an NGO
Understanding the challenges of securing an NGO
Joe talks about how helping the helpers can put a fire in you and the importance of keeping nonprofits cybersecure.
·blog.talosintelligence.com·
Understanding the challenges of securing an NGO
Harrods the next UK retailer targeted in a cyberattack
Harrods the next UK retailer targeted in a cyberattack
London's iconic department store, Harrods, has confirmed it was targeted in a cyberattack, becoming the third major UK retailer to report cyberattacks in a week following incidents at M&S and the Co-op.
·bleepingcomputer.com·
Harrods the next UK retailer targeted in a cyberattack
State-of-the-art phishing: MFA bypass
State-of-the-art phishing: MFA bypass
Threat actors are bypassing MFA with adversary-in-the-middle attacks via reverse proxies. Phishing-as-a-Service tools like Evilproxy make these threats harder to detect.
·blog.talosintelligence.com·
State-of-the-art phishing: MFA bypass
US as a Surveillance State - Schneier on Security
US as a Surveillance State - Schneier on Security
Two essays were just published on DOGE’s data collection and aggregation, and how it ends with a modern surveillance state. It’s good to see this finally being talked about.
·schneier.com·
US as a Surveillance State - Schneier on Security
Claude Chatbot Used for Automated Political Messaging
Claude Chatbot Used for Automated Political Messaging
Anthropic has found its Claude chatbot is being used for automated political messaging, enabling AI-driven influence campaigns
·infosecurity-magazine.com·
Claude Chatbot Used for Automated Political Messaging
MY TAKE: RSAC 2025 – Conversing with vendors hanging out in the Marriott Marquis mezzanine
MY TAKE: RSAC 2025 – Conversing with vendors hanging out in the Marriott Marquis mezzanine
SAN FRANCISCO — Sometimes, the best insights come not from the keynote stage, but from the hotel lobby. Related: RSAC 2025 top takeaways In between sessions at RSAC 2025, I slipped over to the Marriott lobby and held quick, off-the-cuff interviews with a handful of cybersecurity vendors — each doing something genuinely different, often radical,
·lastwatchdog.com·
MY TAKE: RSAC 2025 – Conversing with vendors hanging out in the Marriott Marquis mezzanine
Large-Scale Phishing Campaigns Target Russia and Ukraine
Large-Scale Phishing Campaigns Target Russia and Ukraine
A large-scale phishing campaign using DarkWatchman and Sheriff malware has been observed targeting companies in Russia and Ukraine
·infosecurity-magazine.com·
Large-Scale Phishing Campaigns Target Russia and Ukraine
5 Security Questionnaire Steps to Automate Today | CSA
5 Security Questionnaire Steps to Automate Today | CSA
One way to lighten the load of security questionnaires is to automate certain parts of the process. Automate these 5 steps for a more efficient workflow.
·cloudsecurityalliance.org·
5 Security Questionnaire Steps to Automate Today | CSA
Mystery Box Scams Deployed to Steal Credit Card Data
Mystery Box Scams Deployed to Steal Credit Card Data
Bitdefender highlighted the growing use of subscription scams, in which victims are lured by adverts into recurring payments for fake products
·infosecurity-magazine.com·
Mystery Box Scams Deployed to Steal Credit Card Data
Backdoor found in popular ecommerce components
Backdoor found in popular ecommerce components
Multiple vendors were hacked in a coordinated supply chain attack, Sansec found 21 applications with the same backdoor. Curiously, the malware was injected 6...
·sansec.io·
Backdoor found in popular ecommerce components
The 3 biggest cybersecurity threats to small businesses
The 3 biggest cybersecurity threats to small businesses
These 3 cybersecurity threats may not be the most sophisticated, but they're the most effective—and serious—threats for small businesses.
·malwarebytes.com·
The 3 biggest cybersecurity threats to small businesses
AI vs. AI: The new cybersecurity battle | CSA
AI vs. AI: The new cybersecurity battle | CSA
​AI enables attackers to craft convincing scams at scale, using deepfakes and typosquatting to bypass traditional defenses. Proactive AI security is essential.​
·cloudsecurityalliance.org·
AI vs. AI: The new cybersecurity battle | CSA