Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31742 bookmarks
Custom sorting
Counterfeit Android devices found preloaded With Triada malware
Counterfeit Android devices found preloaded With Triada malware
A new version of the Triada trojan has been discovered preinstalled on thousands of new Android devices, allowing threat actors to steal data as soon as they are set up.
·bleepingcomputer.com·
Counterfeit Android devices found preloaded With Triada malware
The Reality Behind Security Control Failures—And How to Prevent Them
The Reality Behind Security Control Failures—And How to Prevent Them
Most orgs only discover their security controls failed after a breach. With OnDefend's continuous validation, you can test, measure, and prove your defenses work—before attackers exploit blind spots.
·bleepingcomputer.com·
The Reality Behind Security Control Failures—And How to Prevent Them
Police shuts down KidFlix child sexual exploitation platform
Police shuts down KidFlix child sexual exploitation platform
Kidflix, one of the largest platforms used to host, share, and stream child sexual abuse material (CSAM) on the dark web, was shut down on March 11 following a joint action coordinated by German law enforcement.
·bleepingcomputer.com·
Police shuts down KidFlix child sexual exploitation platform
Why Security Questionnaires Aren’t the Best for Risk | CSA
Why Security Questionnaires Aren’t the Best for Risk | CSA
Discover why traditional security questionnaires fail to provide accurate risk assessments and how companies can implement more effective evaluation methods.
·cloudsecurityalliance.org·
Why Security Questionnaires Aren’t the Best for Risk | CSA
Cisco warns of CSLU backdoor admin account used in attacks
Cisco warns of CSLU backdoor admin account used in attacks
Cisco warns admins to patch a critical Cisco Smart Licensing Utility (CSLU) vulnerability, which exposes a built-in backdoor admin account now used in attacks.
·bleepingcomputer.com·
Cisco warns of CSLU backdoor admin account used in attacks
North Korea's Fake IT Worker Scheme Sets Sights on Europe
North Korea's Fake IT Worker Scheme Sets Sights on Europe
Google has found a significant increase in North Korean actors attempting to gain employment as IT workers in European companies, leading to data theft and extortion
·infosecurity-magazine.com·
North Korea's Fake IT Worker Scheme Sets Sights on Europe
MFT and AI: Secure Data Movement for AI Success | CSA
MFT and AI: Secure Data Movement for AI Success | CSA
The challenges many enterprises face in harnessing AI’s potential are becoming more apparent. MFT plays a crucial role in enabling enterprises to leverage AI.
·cloudsecurityalliance.org·
MFT and AI: Secure Data Movement for AI Success | CSA
Rational Astrologies and Security - Schneier on Security
Rational Astrologies and Security - Schneier on Security
John Kelsey and I wrote a short paper for the Rossfest Festschrift: “Rational Astrologies and Security“: There is another non-security way that designers can spend their security budget: on making their own lives easier. Many of these fall into the category of what has been called rational astrology. First identified by Randy Steve Waldman [Wal12], the term refers to something people treat as though it works, generally for social or institutional reasons, even when there’s little evidence that it works—­and sometimes despite substantial evidence that it does not...
·schneier.com·
Rational Astrologies and Security - Schneier on Security
ProSSHD 1.2 - Denial of Service (DOS)
ProSSHD 1.2 - Denial of Service (DOS)
ProSSHD 1.2 - Denial of Service (DOS). CVE-2024-0725 . remote exploit for Windows platform
·exploit-db.com·
ProSSHD 1.2 - Denial of Service (DOS)
It takes two: The 2025 Sophos Active Adversary Report
It takes two: The 2025 Sophos Active Adversary Report
The dawn of our fifth year deepens our understanding of the enemies at the gate, and some tensions inside it; plus, an anniversary gift from us to you
·news.sophos.com·
It takes two: The 2025 Sophos Active Adversary Report
SHARED INTEL Q&A: Forrester’s Geoff Cairns on why IAM is overdue for a fundamental reset
SHARED INTEL Q&A: Forrester’s Geoff Cairns on why IAM is overdue for a fundamental reset
Identity and Access Management (IAM) is no longer just about keeping the wrong people out—it’s about ensuring the right people, machines, and AI-driven agents can securely operate in an increasingly complex digital world. Related: How IAM can be a growth engine If 2024 was the year of Zero Trust acceleration, 2025 is shaping up to
·lastwatchdog.com·
SHARED INTEL Q&A: Forrester’s Geoff Cairns on why IAM is overdue for a fundamental reset
Cybersécurité : quand les petits détails font les grandes failles
Cybersécurité : quand les petits détails font les grandes failles
Les grandes affaires de fuites de données secouent l'actualité, mais qu'en est-il du quotidien de la sécurité informatique dans les entreprises...-CybersĂ©curitĂ©
·usine-digitale.fr·
Cybersécurité : quand les petits détails font les grandes failles