Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29738 bookmarks
Custom sorting
OpenAI working to fix ChatGPT outage affecting users worldwide
OpenAI working to fix ChatGPT outage affecting users worldwide
OpenAI is working to fix an ongoing outage impacting ChatGPT users worldwide and preventing them from accessing the chatbot on the web or via mobile and desktop apps.
·bleepingcomputer.com·
OpenAI working to fix ChatGPT outage affecting users worldwide
Prevent Downtime from Expired Secrets | CSA
Prevent Downtime from Expired Secrets | CSA
Learn how to avoid service outages by automating secret rotation, setting expiry alerts, and centralizing credential management.
·cloudsecurityalliance.org·
Prevent Downtime from Expired Secrets | CSA
Five plead guilty to laundering $36 million stolen in investment scams
Five plead guilty to laundering $36 million stolen in investment scams
Five men from China, the United States, and Turkey pleaded guilty to their involvement in an international crime ring and laundering nearly $37 million stolen from U.S. victims in cryptocurrency investment scams carried out from Cambodia.
·bleepingcomputer.com·
Five plead guilty to laundering $36 million stolen in investment scams
Trump rebat les cartes de la cybersécurité américaine
Trump rebat les cartes de la cybersécurité américaine
La Maison-Blanche a publié vendredi 6 juin 2025 un texte qui bouleverse la stratégie américaine en matière de cybersécurité. L'administration Trump marque une rupture nette avec les politiques menées sous Obama et Biden. C'est un décret exécutif, publié le 6 juin 2025, qui entend « réorienter » les efforts fédéraux
·numerama.com·
Trump rebat les cartes de la cybersécurité américaine
Early ISO 42001 Adoption: AI Governance | CSA
Early ISO 42001 Adoption: AI Governance | CSA
Discover how early adoption of ISO 42001 helps organizations stay ahead on AI compliance, reduce risk, and boost operational efficiency.
·cloudsecurityalliance.org·
Early ISO 42001 Adoption: AI Governance | CSA
Comment la Chine sème ses pièges ? Ce rapport dévoile une campagne d’infiltration cyber sans précédent
Comment la Chine sème ses pièges ? Ce rapport dévoile une campagne d’infiltration cyber sans précédent
La société de cybersécurité SentinelOne révèle comment des groupes liés à l’État chinois ont discrètement infiltré plus de 75 organisations stratégiques dans le monde entre l’été 2024 et le printemps 2025. L’objectif semble être de positionner des accès pour un usage en cas de conflit. Explications. Automne 2024 :
·numerama.com·
Comment la Chine sème ses pièges ? Ce rapport dévoile une campagne d’infiltration cyber sans précédent
Stolen Ticketmaster data from Snowflake attacks briefly for sale again
Stolen Ticketmaster data from Snowflake attacks briefly for sale again
The Arkana Security extortion gang briefly listed over the weekend what appeared to be newly stolen Ticketmaster data but is instead the data stolen during the 2024 Snowflake data theft attacks.
·bleepingcomputer.com·
Stolen Ticketmaster data from Snowflake attacks briefly for sale again
News alert: Seraphic launches BrowserTotal™ — a free AI-powered tool to stress test browser security
News alert: Seraphic launches BrowserTotal™ — a free AI-powered tool to stress test browser security
Tel Aviv, Israel, June 9, 2025, CyberNewswire -- Seraphic Security, a leader in enterprise browser security, today announced the launch of BrowserTotal, a unique and proprietary public service enabling enterprises to assess their browser security posture in real-time. The launch coincides with the Gartner Security & Risk Management Summit 2025, where Seraphic will be showcasing the
·lastwatchdog.com·
News alert: Seraphic launches BrowserTotal™ — a free AI-powered tool to stress test browser security
Been scammed online? Here’s what to do
Been scammed online? Here’s what to do
Have you been scammed online? Here are some tips to limit the damage and follow up steps you may find useful
·malwarebytes.com·
Been scammed online? Here’s what to do
How and where to report an online scam
How and where to report an online scam
Find out where and how victims can report online scams to prevent more victims and possibly recover funds.
·malwarebytes.com·
How and where to report an online scam
Over 84,000 Roundcube instances vulnerable to actively exploited flaw
Over 84,000 Roundcube instances vulnerable to actively exploited flaw
Over 84,000 instances of the Roundcube webmail software are vulnerable to CVE-2025-49113, a critical remote code execution (RCE) vulnerability with a publicly available exploit.
·bleepingcomputer.com·
Over 84,000 Roundcube instances vulnerable to actively exploited flaw
Google patched bug leaking phone numbers tied to accounts
Google patched bug leaking phone numbers tied to accounts
A vulnerability allowed researchers to brute-force any Google account's recovery phone number simply by knowing a their profile name and an easily retrieved partial phone number, creating a massive risk for phishing and SIM-swapping attacks.
·bleepingcomputer.com·
Google patched bug leaking phone numbers tied to accounts
SentinelOne shares new details on China-linked breach attempt
SentinelOne shares new details on China-linked breach attempt
SentinelOne has shared more details on an attempted supply chain attack by Chinese hackers through an IT services and logistics firm that manages hardware logistics for the cybersecurity firm.
·bleepingcomputer.com·
SentinelOne shares new details on China-linked breach attempt
Linux Foundation unveils decentralized WordPress plugin manager
Linux Foundation unveils decentralized WordPress plugin manager
A collective of former WordPress developers and contributors backed by the Linux Foundation has launched the FAIR Package Manager, a new and independent distribution system for trusted WordPress plugins and themes.
·bleepingcomputer.com·
Linux Foundation unveils decentralized WordPress plugin manager
Designing Blue Team playbooks with Wazuh for proactive incident response
Designing Blue Team playbooks with Wazuh for proactive incident response
Blue Team playbooks are essential—but tools like Wazuh take them to the next level. From credential dumping to web shells and brute-force attacks, see how Wazuh strengthens real-time detection and automated response.
·bleepingcomputer.com·
Designing Blue Team playbooks with Wazuh for proactive incident response