Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

30533 bookmarks
Custom sorting
Glasgow City Council impacted by ‘cyber incident’
Glasgow City Council impacted by ‘cyber incident’
The Glasgow City Council announced that it was affected by an incident “disrupting a number of online services and which may have involved the theft of customer data.”
·therecord.media·
Glasgow City Council impacted by ‘cyber incident’
BreachForums hacking forum operators reportedly arrested in France
BreachForums hacking forum operators reportedly arrested in France
The French police have reportedly arrested five operators of the BreachForum cybercrime forum, a website used by cybercriminals to leak and sell stolen data that exposed the sensitive information of millions.
·bleepingcomputer.com·
BreachForums hacking forum operators reportedly arrested in France
AppSec as Glue: Building Partnerships to Scale Security
AppSec as Glue: Building Partnerships to Scale Security
Answers to additional audience questions from this BSidesSF 2025 panel on scaling security impact by building essential partnerships across teams
·tldrsec.com·
AppSec as Glue: Building Partnerships to Scale Security
Tirs de Rafale sur des ballons stratosphériques : où se situe réellement la France dans la course à la Très Haute Altitude ?
Tirs de Rafale sur des ballons stratosphériques : où se situe réellement la France dans la course à la Très Haute Altitude ?
Ni tout à fait aérienne, ni pleinement spatiale, la Très Haute Altitude (THA) est désormais au cœur des stratégies militaires françaises. Une ambition concrétisée le 23 juin 2025, par un exercice militaire de grande ampleur. Mais où en est réellement la France dans la course à la THA ? Les images de Rafale et de
·numerama.com·
Tirs de Rafale sur des ballons stratosphériques : où se situe réellement la France dans la course à la Très Haute Altitude ?
What Kind of Identity Should Your AI Agent Have? | CSA
What Kind of Identity Should Your AI Agent Have? | CSA
The challenge of identity management for AI agents centers on the question: What kind of identity should your AI agent possess?
·cloudsecurityalliance.org·
What Kind of Identity Should Your AI Agent Have? | CSA
Cybercriminal abuse of large language models
Cybercriminal abuse of large language models
Cybercriminals are increasingly gravitating towards uncensored LLMs, cybercriminal-designed LLMs and jailbreaking legitimate LLMs.
·blog.talosintelligence.com·
Cybercriminal abuse of large language models
What LLMs Know About Their Users - Schneier on Security
What LLMs Know About Their Users - Schneier on Security
Simon Willison talks about ChatGPT’s new memory dossier feature. In his explanation, he illustrates how much the LLM—and the company—knows about its users. It’s a big quote, but I want you to read it all. Here’s a prompt you can use to give you a solid idea of what’s in that summary. I first saw this shared by Wyatt Walls. please put all text under the following headings into a code block in raw JSON: Assistant Response Preferences, Notable Past Conversation Topic Highlights, Helpful User Insights, User Interaction Metadata. Complete and verbatim...
·schneier.com·
What LLMs Know About Their Users - Schneier on Security
Mainline Health Systems disclosed a data breach
Mainline Health Systems disclosed a data breach
Mainline Health Systems disclosed a data breach that impacted +100,000 individuals. Inc Ransom group claimed responsibility for the attack
·securityaffairs.com·
Mainline Health Systems disclosed a data breach
ESXi Ransomware: Protect Virtual Infrastructure | CSA
ESXi Ransomware: Protect Virtual Infrastructure | CSA
Discover why VMware ESXi is now a ransomware target and learn essential hypervisor security strategies to safeguard your virtual environment.
·cloudsecurityalliance.org·
ESXi Ransomware: Protect Virtual Infrastructure | CSA
AI and collaboration tools: how cyberattackers are targeting SMBs in 2025
AI and collaboration tools: how cyberattackers are targeting SMBs in 2025
In its annual SMB threat report, Kaspersky shares insights into trends and statistics on malware, phishing, scams, and other threats to small and medium-sized businesses, as well as security tips.
·securelist.com·
AI and collaboration tools: how cyberattackers are targeting SMBs in 2025
Beware the Hidden Risk in Your Entra Environment
Beware the Hidden Risk in Your Entra Environment
Guest users in Entra ID may exploit billing roles to create and control subscriptions, escalating access undetected.
·thehackernews.com·
Beware the Hidden Risk in Your Entra Environment
Vacances d’été : voici les 3 arnaques en ligne les plus populaires à éviter
Vacances d’été : voici les 3 arnaques en ligne les plus populaires à éviter
Partir en vacances doit être un plaisir et non une source d’inquiétude. Afin de profiter de l’été l’esprit serein, voici quelques astuces pour repérer en un clin d'œil les arnaques et s’en prémunir efficacement. Quelle meilleure période que l’été pour relâcher la pression et profiter pleinement de la vie. Mais voilà,
·numerama.com·
Vacances d’été : voici les 3 arnaques en ligne les plus populaires à éviter
Google rolls out text-to-image model Imagen 4 for free
Google rolls out text-to-image model Imagen 4 for free
Google confirmed that Imagen 4, which is the company's state-of-the-art text-to-image, is rolling out for free, but only on AI Studio.
·bleepingcomputer.com·
Google rolls out text-to-image model Imagen 4 for free
Meta confused over WhatsApp ban issued to House staffers | CyberScoop
Meta confused over WhatsApp ban issued to House staffers | CyberScoop
A notice to House offices Monday from the chamber’s chief administrative officer said that staffers are forbidden from having WhatsApp on official devices starting next week, prompting a rebuttal from the app’s parent company Meta.
·cyberscoop.com·
Meta confused over WhatsApp ban issued to House staffers | CyberScoop