Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31742 bookmarks
Custom sorting
UK fines software provider £3.07 million for 2022 ransomware breach
UK fines software provider £3.07 million for 2022 ransomware breach
The UK Information Commissioner's Office (ICO) has fined Advanced Computer Software Group Ltd £3.07 million over a 2022 ransomware attack that exposed the sensitive personal data of 79,404 people, including National Health Service (NHS) patients.
·bleepingcomputer.com·
UK fines software provider £3.07 million for 2022 ransomware breach
Security expert Troy Hunt hit by phishing attack
Security expert Troy Hunt hit by phishing attack
Tory Hunt, security expert and Have I Been Pwned owner, disclosed a phishing attack against him in a commendable display of transparency.
·malwarebytes.com·
Security expert Troy Hunt hit by phishing attack
Oracle customers confirm data stolen in alleged cloud breach is valid
Oracle customers confirm data stolen in alleged cloud breach is valid
Despite Oracle denying a breach of its Oracle Cloud federated SSO login servers and the theft of account data for 6 million people, BleepingComputer has confirmed with multiple companies that associated data samples shared by the threat actor are valid.
·bleepingcomputer.com·
Oracle customers confirm data stolen in alleged cloud breach is valid
StreamElements discloses third-party data breach after hacker leaks data
StreamElements discloses third-party data breach after hacker leaks data
Cloud-based streaming company StreamElements confirms it suffered a data breach at a third-party service provider after a threat actor leaked samples of stolen data on a hacking forum.
·bleepingcomputer.com·
StreamElements discloses third-party data breach after hacker leaks data
New 'Atlantis AIO' automates credential stuffing on 140 services
New 'Atlantis AIO' automates credential stuffing on 140 services
A new cybercrime platform named 'Atlantis AIO' provides an automated credential stuffing service against 140 online platforms, including email services, e-commerce sites, banks, and VPNs.
·bleepingcomputer.com·
New 'Atlantis AIO' automates credential stuffing on 140 services
SecurityScorecard Observes Surge in Third-Party Breaches
SecurityScorecard Observes Surge in Third-Party Breaches
In its 2025 Global Third-Party Breach Report, SecurityScorecard has found that 35.5% of all cyber breaches in 2024 were third-party related, up from 29% in 2023
·infosecurity-magazine.com·
SecurityScorecard Observes Surge in Third-Party Breaches
Claude is testing ChatGPT-like Deep Research feature Compass
Claude is testing ChatGPT-like Deep Research feature Compass
Claude could be getting a ChatGPT-like Deep Research feature called Compass. You can tell Claude's Compass what you need, and the AI agent will take care of everything.
·bleepingcomputer.com·
Claude is testing ChatGPT-like Deep Research feature Compass
Rethinking Data Risk in the AI Era: A Unified Approach | CSA
Rethinking Data Risk in the AI Era: A Unified Approach | CSA
The explosive growth of data, the rapid adoption of AI, & an evolving threat landscape have outpaced traditional security. Legacy solutions are not enough.
·cloudsecurityalliance.org·
Rethinking Data Risk in the AI Era: A Unified Approach | CSA
The 7 technology trends that could replace passwords
The 7 technology trends that could replace passwords
230M stolen passwords met complexity requirements—and were still compromised. Passwords aren't going away for now, but there are new technologies that may increasingly replace them. Learn more from Specops Software about how to protect your passwords.
·bleepingcomputer.com·
The 7 technology trends that could replace passwords
RedCurl cyberspies create ransomware to encrypt Hyper-V servers
RedCurl cyberspies create ransomware to encrypt Hyper-V servers
A threat actor named 'RedCurl,' known for stealthy corporate espionage operations since 2018, is now using a ransomware encryptor designed to target Hyper-V virtual machines.
·bleepingcomputer.com·
RedCurl cyberspies create ransomware to encrypt Hyper-V servers
EncryptHub Exploits Windows Zero-Day to Deploy Rhadamanthys and StealC Malware
EncryptHub Exploits Windows Zero-Day to Deploy Rhadamanthys and StealC Malware
EncryptHub Exploits Windows Zero-Day to Deploy Rhadamanthys and StealC Malware | Read more hacking news on The Hacker News cybersecurity news website and learn how to protect against cyberattacks and software vulnerabilities.
·thehackernews.com·
EncryptHub Exploits Windows Zero-Day to Deploy Rhadamanthys and StealC Malware
How Does Continuous Controls Monitoring Improve GRC? | CSA
How Does Continuous Controls Monitoring Improve GRC? | CSA
Continuous Controls Monitoring (CCM) automates compliance oversight, reducing manual effort, improving accuracy, and enhancing security posture for organizations.
·cloudsecurityalliance.org·
How Does Continuous Controls Monitoring Improve GRC? | CSA