Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

30533 bookmarks
Custom sorting
Primer on Model Context Protocol (MCP) Implementation | CSA
Primer on Model Context Protocol (MCP) Implementation | CSA
Walk through how to build a complete system using the Model Context Protocol (MCP), a framework designed to bridge the gap between LLMs and external tools.
·cloudsecurityalliance.org·
Primer on Model Context Protocol (MCP) Implementation | CSA
Steel giant Nucor confirms hackers stole data in recent breach
Steel giant Nucor confirms hackers stole data in recent breach
Nucor, North America's largest steel producer and recycler, has confirmed that attackers behind a recent cybersecurity incident have also stolen data from the company's network.
·bleepingcomputer.com·
Steel giant Nucor confirms hackers stole data in recent breach
Largest DDoS Attack to Date - Schneier on Security
Largest DDoS Attack to Date - Schneier on Security
It was a recently unimaginable 7.3 Tbps: The vast majority of the attack was delivered in the form of User Datagram Protocol packets. Legitimate UDP-based transmissions are used in especially time-sensitive communications, such as those for video playback, gaming applications, and DNS lookups. It speeds up communications by not formally establishing a connection before data is transferred. Unlike the more common Transmission Control Protocol, UDP doesn’t wait for a connection between two computers to be established through a handshake and doesn’t check whether data is properly received by the other party. Instead, it immediately sends data from one machine to another...
·schneier.com·
Largest DDoS Attack to Date - Schneier on Security
Cloud Security: Who Owns the Responsibility? | CSA
Cloud Security: Who Owns the Responsibility? | CSA
Explore how cloud, DevOps, SOC teams share security roles, combat alert fatigue, and work with AI-powered purple teaming for effective threat response.
·cloudsecurityalliance.org·
Cloud Security: Who Owns the Responsibility? | CSA
La double authentification de Gmail n’arrête plus les hackers russes
La double authentification de Gmail n’arrête plus les hackers russes
Des hackers russes, soupçonnés d’appartenir au groupe APT29 (alias Cozy Bear), ont réussi à contourner la double authentification de Gmail sans exploiter de faille technique, mais en visant le maillon faible de la chaîne : l'humain. On fait le point sur cette opération de social engineering d’une rare sophistication
·numerama.com·
La double authentification de Gmail n’arrête plus les hackers russes
WordPress Motors theme flaw mass-exploited to hijack admin accounts
WordPress Motors theme flaw mass-exploited to hijack admin accounts
Hackers are exploiting a critical privilege escalation vulnerability in the WordPress theme "Motors" to hijack administrator accounts and gain complete control of a targeted site.
·bleepingcomputer.com·
WordPress Motors theme flaw mass-exploited to hijack admin accounts
Russian hackers bypass Gmail MFA using stolen app passwords
Russian hackers bypass Gmail MFA using stolen app passwords
Russian hackers bypass multi-factor authentication and access Gmail accounts by leveraging app-specific passwords in advanced social engineering attacks that impersonate U.S. Department of State officials.
·bleepingcomputer.com·
Russian hackers bypass Gmail MFA using stolen app passwords
CoinMarketCap briefly hacked to drain crypto wallets via fake Web3 popup
CoinMarketCap briefly hacked to drain crypto wallets via fake Web3 popup
CoinMarketCap, the popular cryptocurrency price tracking site, suffered a website supply chain attack that exposed site visitors to a wallet drainer campaign to steal visitors' crypto.
·bleepingcomputer.com·
CoinMarketCap briefly hacked to drain crypto wallets via fake Web3 popup
Friday Squid Blogging: Gonate Squid Video - Schneier on Security
Friday Squid Blogging: Gonate Squid Video - Schneier on Security
This is the first ever video of the Antarctic Gonate Squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
·schneier.com·
Friday Squid Blogging: Gonate Squid Video - Schneier on Security
6 Steps to 24/7 In-House SOC Success
6 Steps to 24/7 In-House SOC Success
24/7 SOCs are essential for off-hours breach protection. Discover how to build one with AI and efficient staffing.
·thehackernews.com·
6 Steps to 24/7 In-House SOC Success
BitoPro exchange links Lazarus hackers to $11 million crypto heist
BitoPro exchange links Lazarus hackers to $11 million crypto heist
The Taiwanese cryptocurrency exchange BitoPro claims the North Korean hacking group Lazarus is behind a cyberattack that led to the theft of $11,000,000 worth of cryptocurrency on May 8, 2025.
·bleepingcomputer.com·
BitoPro exchange links Lazarus hackers to $11 million crypto heist