Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29735 bookmarks
Custom sorting
Hacker targets other hackers and gamers with backdoored GitHub code
Hacker targets other hackers and gamers with backdoored GitHub code
A hacker targets other hackers, gamers, and researchers with exploits, bots, and game cheats in source code hosted on GitHub that contain hidden backdoors to give the threat actor remote access to infected devices.
·bleepingcomputer.com·
Hacker targets other hackers and gamers with backdoored GitHub code
Kerberos AS-REP roasting attacks: What you need to know
Kerberos AS-REP roasting attacks: What you need to know
Think your passwords are strong enough? AS-REP Roasting is back in the spotlight — and it's targeting weak spots in Active Directory. Learn more from Specops Software how attackers exploit missing Kerberos pre-auth and how to stop them with strong password policies.
·bleepingcomputer.com·
Kerberos AS-REP roasting attacks: What you need to know
Google: Hackers target Salesforce accounts in data extortion attacks
Google: Hackers target Salesforce accounts in data extortion attacks
Google has observed hackers claiming to be the ShinyHunters extortion group conducting social engineering attacks against multi-national companies to steal data from organization's SalesForce platforms.
·bleepingcomputer.com·
Google: Hackers target Salesforce accounts in data extortion attacks
Dynamic Identity Security for Enterprises | CSA
Dynamic Identity Security for Enterprises | CSA
Explore event-driven identity systems that enable real-time access decisions, improve security posture, and support zero trust strategies.
·cloudsecurityalliance.org·
Dynamic Identity Security for Enterprises | CSA
Expert Guide to Ransomware Recovery
Expert Guide to Ransomware Recovery
This week in cybersecurity from the editors at Cybercrime Magazine
·cybersecurityventures.com·
Expert Guide to Ransomware Recovery
Comment Synology bouscule le petit monde de la vidéosurveillance avec C2 Backup for Surveillance
Comment Synology bouscule le petit monde de la vidéosurveillance avec C2 Backup for Surveillance
Lors du salon Computex 2025 qui se tenait à Taïwan il y a quelques jours, Synology a dévoilé une solution de surveillance, C2 Backup for Surveillance, à destination des entreprises. Ses points forts : elle est très simple à mettre en place, peu coûteuse et s’appuie sur l’expertise de Synology dans le stockage de
·numerama.com·
Comment Synology bouscule le petit monde de la vidéosurveillance avec C2 Backup for Surveillance
The Ramifications of Ukraine's Drone Attack - Schneier on Security
The Ramifications of Ukraine's Drone Attack - Schneier on Security
You can read the details of Operation Spiderweb elsewhere. What interests me are the implications for future warfare: If the Ukrainians could sneak drones so close to major air bases in a police state such as Russia, what is to prevent the Chinese from doing the same with U.S. air bases? Or the Pakistanis with Indian air bases? Or the North Koreans with South Korean air bases? Militaries that thought they had secured their air bases with electrified fences and guard posts will now have to reckon with the threat from the skies posed by cheap, ubiquitous drones that cFan be easily modified for military use. This will necessitate a massive investment in counter-drone systems. Money spent on conventional manned weapons systems increasingly looks to be as wasted as spending on the cavalry in the 1930s...
·schneier.com·
The Ramifications of Ukraine's Drone Attack - Schneier on Security
4 Mindset Shifts for Making Zero Trust Work | CSA
4 Mindset Shifts for Making Zero Trust Work | CSA
Zero Trust security requires organizations to rethink how they define trust and enforce controls. John Kindervag reveals 4 truths that are often missed.
·cloudsecurityalliance.org·
4 Mindset Shifts for Making Zero Trust Work | CSA
Fin de Pornhub, RedTube et YouPorn en France : peut-on utiliser un VPN ? - Numerama
Fin de Pornhub, RedTube et YouPorn en France : peut-on utiliser un VPN ? - Numerama
Les fournisseurs de VPN seront vraisemblablement les grands gagnants de la décision de trois gros sites pornographiques (Pornhub, RedTube et YouPorn) de quitter le marché français. Ces sites protestent ainsi contre les règles françaises de contrôle obligatoire de l'âge sous peine de blocage. D'ores et déjà, les
·numerama.com·
Fin de Pornhub, RedTube et YouPorn en France : peut-on utiliser un VPN ? - Numerama
OpenAI is hopeful GPT-5 will compete a little more
OpenAI is hopeful GPT-5 will compete a little more
OpenAI's next big foundational model is GPT-5, and the AI startup is hoping that the model will compete a little more with rivals.
·bleepingcomputer.com·
OpenAI is hopeful GPT-5 will compete a little more
Hewlett Packard Enterprise warns of critical StoreOnce auth bypass
Hewlett Packard Enterprise warns of critical StoreOnce auth bypass
Hewlett Packard Enterprise (HPE) has issued a security bulletin to warn about eight vulnerabilities impacting StoreOnce, its disk-based backup and deduplication solution.
·bleepingcomputer.com·
Hewlett Packard Enterprise warns of critical StoreOnce auth bypass