Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29738 bookmarks
Custom sorting
Major food wholesaler says cyberattack impacting distribution systems
Major food wholesaler says cyberattack impacting distribution systems
The statement said the Rhode Island-based company identified unauthorized activity on its systems on Thursday, prompting officials to take systems offline. The action “has temporarily impacted the Company’s ability to fulfill and distribute customer orders.”
·therecord.media·
Major food wholesaler says cyberattack impacting distribution systems
Designing Blue Team playbooks with Wazuh for proactive cyber defense
Designing Blue Team playbooks with Wazuh for proactive cyber defense
Blue Team playbooks are essential—but tools like Wazuh take them to the next level. From credential dumping to web shells and brute-force attacks, see how Wazuh strengthens real-time detection and automated response.
·bleepingcomputer.com·
Designing Blue Team playbooks with Wazuh for proactive cyber defense
Shared Intel Q&A: Can risk-informed patching finally align OT security with real-world threats?
Shared Intel Q&A: Can risk-informed patching finally align OT security with real-world threats?
Cyber threats to the U.S. electric grid are mounting. Attackers—from nation-state actors to ransomware gangs—are growing more creative and persistent in probing utility networks and operational technology systems that underpin modern life. Related: The evolution of OT security And yet, many utility companies remain trapped in a compliance-first model that often obscures real risks rather
·lastwatchdog.com·
Shared Intel Q&A: Can risk-informed patching finally align OT security with real-world threats?
Grocery wholesale giant United Natural Foods hit by cyberattack
Grocery wholesale giant United Natural Foods hit by cyberattack
United Natural Foods (UNFI), North America's largest publicly traded wholesale distributor, was forced to shut down some systems following a recent cyberattack.
·bleepingcomputer.com·
Grocery wholesale giant United Natural Foods hit by cyberattack
Data security is a CX issue, too
Data security is a CX issue, too
A string of cyberattacks have targeted retailers like Adidas and North Face. Incidents like these can weaken customer trust and lead to lost business, experts say.
·cybersecuritydive.com·
Data security is a CX issue, too
Case Study: Inadequate Configuration & Change Control | CSA
Case Study: Inadequate Configuration & Change Control | CSA
The Football Australia 2024 breach resulted from developers misconfiguring their AWS S3 buckets (an example of Misconfiguration and Inadequate Change Control).
·cloudsecurityalliance.org·
Case Study: Inadequate Configuration & Change Control | CSA
Réseaux de désinformation : OpenAI bloque des comptes ChatGPT pilotés par des puissances étrangères
Réseaux de désinformation : OpenAI bloque des comptes ChatGPT pilotés par des puissances étrangères
OpenAI annonce avoir identifié et fermé les comptes ChatGPT de plusieurs groupes liés à des puissances étrangères. L’outil d’IA générative servait à orchestrer des opérations d’influence et de désinformation sur les réseaux sociaux. Leur objectif est clair : polariser les débats publics, diffuser des contenus
·numerama.com·
Réseaux de désinformation : OpenAI bloque des comptes ChatGPT pilotés par des puissances étrangères
New Way to Track Covertly Android Users - Schneier on Security
New Way to Track Covertly Android Users - Schneier on Security
Researchers have discovered a new way to covertly track Android users. Both Meta and Yandex were using it, but have suddenly stopped now that they have been caught. The details are interesting, and worth reading in detail: >Tracking code that Meta and Russia-based Yandex embed into millions of websites is de-anonymizing visitors by abusing legitimate Internet protocols, causing Chrome and other browsers to surreptitiously send unique identifiers to native apps installed on a device, researchers have discovered. Google says it’s investigating the abuse, which allows Meta and Yandex to convert ephemeral web identifiers into persistent mobile app user identities...
·schneier.com·
New Way to Track Covertly Android Users - Schneier on Security
Securing Agentic AI in the Enterprise | CSA
Securing Agentic AI in the Enterprise | CSA
Agentic AI is transforming automation and identity. Learn how to secure these autonomous systems before they reshape your attack surface.
·cloudsecurityalliance.org·
Securing Agentic AI in the Enterprise | CSA
Sleep with one eye open: how Librarian Ghouls steal data by night
Sleep with one eye open: how Librarian Ghouls steal data by night
According to Kaspersky, Librarian Ghouls APT continues its series of attacks on Russian entities. A detailed analysis of a malicious campaign utilizing RAR archives and BAT scripts.
·securelist.com·
Sleep with one eye open: how Librarian Ghouls steal data by night