Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

30531 bookmarks
Custom sorting
That seemingly innocent text is probably a scam
That seemingly innocent text is probably a scam
Scammers are using texts that appear to have been sent to a wrong number to get targets to engage in a conversation.
·malwarebytes.com·
That seemingly innocent text is probably a scam
Cheating on Quantum Computing Benchmarks - Schneier on Security
Cheating on Quantum Computing Benchmarks - Schneier on Security
Peter Gutmann and Stephan Neuhaus have a new paper—I think it’s new, even though it has a March 2025 date—that makes the argument that we shouldn’t trust any of the quantum factorization benchmarks, because everyone has been cooking the books: Similarly, quantum factorisation is performed using sleight-of-hand numbers that have been selected to make them very easy to factorise using a physics experiment and, by extension, a VIC-20, an abacus, and a dog. A standard technique is to ensure that the factors differ by only a few bits that can then be found using a simple search-based approach that has nothing to do with factorisation
. Note that such a value would never be encountered in the real world since the RSA key generation process typically requires that |p-q| > 100 or more bits [9]. As one analysis puts it, “Instead of waiting for the hardware to improve by yet further orders of magnitude, researchers began inventing better and better tricks for factoring numbers by exploiting their hidden structure” [10]...
·schneier.com·
Cheating on Quantum Computing Benchmarks - Schneier on Security
Using LLMs as a reverse engineering sidekick
Using LLMs as a reverse engineering sidekick
LLMs may serve as powerful assistants to malware analysts to streamline workflows, enhance efficiency, and provide actionable insights during malware analysis.
·blog.talosintelligence.com·
Using LLMs as a reverse engineering sidekick
Cybercriminals ‘Spooked’ After Scattered Spider Arrests
Cybercriminals ‘Spooked’ After Scattered Spider Arrests
The arrest of members of the Scattered Spider cyber-attack group have temporarily halted new intrusions, however, similar threat actors continue to pose risks
·infosecurity-magazine.com·
Cybercriminals ‘Spooked’ After Scattered Spider Arrests
AprĂšs Aeroflot, c'est au tour des pharmacies russes d'ĂȘtre visĂ©es par des hackers - Numerama
AprĂšs Aeroflot, c'est au tour des pharmacies russes d'ĂȘtre visĂ©es par des hackers - Numerama
Depuis fin juillet, des centaines de pharmacies russes n'accueillent plus aucun patient. La raison ? Deux des plus grands réseaux d'officines du pays sont victimes d'une cyberattaque majeure. Réservation de médicaments en ligne indisponible, personnel mis au chÎmage forcé : un nouveau pan de l'économie russe est visé
·numerama.com·
AprĂšs Aeroflot, c'est au tour des pharmacies russes d'ĂȘtre visĂ©es par des hackers - Numerama
SHARED INTEL Q&A: Inside the access mess no one sees — and the identity risk no one owns
SHARED INTEL Q&A: Inside the access mess no one sees — and the identity risk no one owns
For decades, identity and access management (IAM) and privileged access management (PAM) sat on the sidelines of cybersecurity strategy—viewed more as IT maintenance than frontline defense. Related: The hidden threat of rogue access But that’s changing. Fast. Historically, security investments prioritized the visible: firewalls, antivirus software, endpoint monitoring. IAM and PAM—meant to control who gets
·lastwatchdog.com·
SHARED INTEL Q&A: Inside the access mess no one sees — and the identity risk no one owns
5 ans aprĂšs, Dropbox renonce Ă  son gestionnaire de mots de passe
5 ans aprĂšs, Dropbox renonce Ă  son gestionnaire de mots de passe
Dropbox a pris la dĂ©cision d'arrĂȘter son aventure du gestionnaire de mots de passe, dĂ©marrĂ©e en 2020. L'outil sera progressivement coupĂ© dans les mois Ă  venir. Les internautes concernĂ©s doivent migrer sans tarder. C'Ă©tait en 2020. En pleine pĂ©riode de pandĂ©mie de coronavirus, et de forte croissance dans le secteur du
·numerama.com·
5 ans aprĂšs, Dropbox renonce Ă  son gestionnaire de mots de passe
ShinyHunters behind Salesforce data theft attacks at Qantas, Allianz Life, and LVMH
ShinyHunters behind Salesforce data theft attacks at Qantas, Allianz Life, and LVMH
A wave of data breaches impacting companies like Qantas, Allianz Life, LVMH, and Adidas has been linked to the ShinyHunters extortion group, which has been using voice phishing attacks to steal data from Salesforce CRM instances.
·bleepingcomputer.com·
ShinyHunters behind Salesforce data theft attacks at Qantas, Allianz Life, and LVMH
Hackers target Python devs in phishing attacks using fake PyPI site
Hackers target Python devs in phishing attacks using fake PyPI site
The Python Software Foundation warned users this week that threat actors are trying to steal their credentials in phishing attacks using a fake Python Package Index (PyPI) website.
·bleepingcomputer.com·
Hackers target Python devs in phishing attacks using fake PyPI site
Scammers Unleash Flood of Slick Online Gaming Sites
Scammers Unleash Flood of Slick Online Gaming Sites
Fraudsters are flooding Discord and other social media platforms with ads for hundreds of polished online gaming and wagering websites that lure people with free credits and eventually abscond with any cryptocurrency funds deposited by players. Here's a closer look

·krebsonsecurity.com·
Scammers Unleash Flood of Slick Online Gaming Sites
Army Secretary forces West Point to rescind appointment given to Easterly | CyberScoop
Army Secretary forces West Point to rescind appointment given to Easterly | CyberScoop
The United States Military Academy abruptly ended the appointment of Jen Easterly to a high-profile academic position in West Point’s Department of Social Sciences, according to a memorandum issued Wednesday by the Secretary of the Army.
·cyberscoop.com·
Army Secretary forces West Point to rescind appointment given to Easterly | CyberScoop