Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29738 bookmarks
Custom sorting
Nearly 70,000 impacted by Coinbase breach involving $20 million ransom demand
Nearly 70,000 impacted by Coinbase breach involving $20 million ransom demand
In documents filed with regulators in Maine on Tuesday, Coinbase said the information leaked included details like photos of passports and government IDs, as well as account information such as balances and transaction history.
·therecord.media·
Nearly 70,000 impacted by Coinbase breach involving $20 million ransom demand
3AM ransomware uses spoofed IT calls, email bombing to breach networks
3AM ransomware uses spoofed IT calls, email bombing to breach networks
A 3AM ransomware affiliate is conducting highly targeted attacks using email bombing and spoofed IT support calls to socially engineer employees into giving credentials for remote access to corporate systems.
·bleepingcomputer.com·
3AM ransomware uses spoofed IT calls, email bombing to breach networks
Lumma Stealer toppled by globally coordinated takedown | CyberScoop
Lumma Stealer toppled by globally coordinated takedown | CyberScoop
Global law enforcement authorities and Microsoft seized or disrupted the prolific infostealer’s central command infrastructure, malicious domains and marketplaces where the malware was sold.
·cyberscoop.com·
Lumma Stealer toppled by globally coordinated takedown | CyberScoop
College student to plead guilty to PowerSchool hack
College student to plead guilty to PowerSchool hack
The 19-year-old Assumption College student, Matthew Lane, also was charged Tuesday with hacking and demanding a ransom payment from an unnamed telecommunications company, according to Massachusetts federal prosecutors.
·therecord.media·
College student to plead guilty to PowerSchool hack
Lumma infostealer malware operation disrupted, 2,300 domains seized
Lumma infostealer malware operation disrupted, 2,300 domains seized
Earlier this month, a coordinated disruption action targeting the Lumma malware-as-a-service (MaaS) information stealer operation seized thousands of domains, part of its infrastructure backbone worldwide.
·bleepingcomputer.com·
Lumma infostealer malware operation disrupted, 2,300 domains seized
Lumma Stealer: Breaking down the delivery techniques and capabilities of a prolific infostealer
Lumma Stealer: Breaking down the delivery techniques and capabilities of a prolific infostealer
Over the past year, Microsoft Threat Intelligence observed the persistent growth and operational sophistication of Lumma Stealer, an info-stealing malware used by multiple financially motivated threat actors to target various industries. Microsoft, partnering with others across industry and international law enforcement, facilitated the disruption of Lumma infrastructure.
·microsoft.com·
Lumma Stealer: Breaking down the delivery techniques and capabilities of a prolific infostealer
AI drives cyber strategies, security execs say
AI drives cyber strategies, security execs say
Basic vulnerabilities account for most cyberattacks, but security leaders say they’re more concerned about the risks of AI, new research shows.
·cybersecuritydive.com·
AI drives cyber strategies, security execs say
M&S warns April cyberattack will cut $400 million from profits
M&S warns April cyberattack will cut $400 million from profits
The U.K. department store chain warns online transactions will be disrupted through July and says food, fashion and home goods have experienced disruptions.
·cybersecuritydive.com·
M&S warns April cyberattack will cut $400 million from profits
ThreatLocker Patch Management: A Security-First Approach to Closing Vulnerability Windows
ThreatLocker Patch Management: A Security-First Approach to Closing Vulnerability Windows
Patching is basic cyber hygiene — but executing it at scale, securely, and fast? That's the real challenge. ThreatLocker's Patch Management flips the script with control, visibility, and Zero Trust workflows built for today's threat landscape.
·bleepingcomputer.com·
ThreatLocker Patch Management: A Security-First Approach to Closing Vulnerability Windows
Data-stealing Chrome extensions impersonate Fortinet, YouTube, VPNs
Data-stealing Chrome extensions impersonate Fortinet, YouTube, VPNs
A Google Chrome Web Store campaign uses over 100 malicious browser extensions that mimic legitimate tools, such as VPNs, AI assistants, and crypto utilities, to steal browser cookies and execute remote scripts secretly.
·bleepingcomputer.com·
Data-stealing Chrome extensions impersonate Fortinet, YouTube, VPNs
Trojanized RVTools push Bumblebee malware in SEO poisoning campaign
Trojanized RVTools push Bumblebee malware in SEO poisoning campaign
The official website for the RVTools VMware management tool was taken offline in what appears to be a supply chain attack that distributed a trojanized installer to drop the Bumblebee malware loader on users' machines.
·bleepingcomputer.com·
Trojanized RVTools push Bumblebee malware in SEO poisoning campaign
Coinbase data breach impacted 69,461 individuals
Coinbase data breach impacted 69,461 individuals
Cryptocurrency exchange Coinbase announced that the recent data breach exposed data belonging to 69,461 individuals.
·securityaffairs.com·
Coinbase data breach impacted 69,461 individuals
News alert: Attaxion integrates its EASM Platform with ENISA’s EU Vulnerability Database (EUVD)
News alert: Attaxion integrates its EASM Platform with ENISA’s EU Vulnerability Database (EUVD)
Dover, Del., May 21, 2025, CyberNewswire -- Attaxion, the external attack surface management (EASM) vendor with industry-leading asset coverage, announces the integration of the European Vulnerability Database (EUVD) into its platform. Operated by the European Union Agency for Cybersecurity (ENISA), the EUVD is a publicly accessible vulnerability repository developed in response to the NIS2 Directive.
·lastwatchdog.com·
News alert: Attaxion integrates its EASM Platform with ENISA’s EU Vulnerability Database (EUVD)
News alert: DataHub secures $35M Series B to enable AI to safely manage and use data
News alert: DataHub secures $35M Series B to enable AI to safely manage and use data
Palo Alto, Calif., May 21, 2025 – DataHub, by Acryl Data, the leading open source metadata platform, today announced it has raised $35 million in Series B funding led by Bessemer Venture Partners. This latest round brings the company's total funding to $65 million, enabling accelerated development of its context management platform that provides discovery,
·lastwatchdog.com·
News alert: DataHub secures $35M Series B to enable AI to safely manage and use data
European Union sanctions Stark Industries for enabling cyberattacks
European Union sanctions Stark Industries for enabling cyberattacks
The European Union has imposed strict sanctions against web-hosting provider Stark Industries and the two individuals running it, CEO Iurie Neculiti and owner Ivan Neculiti, for enabling "destabilising activities" against the Union.
·bleepingcomputer.com·
European Union sanctions Stark Industries for enabling cyberattacks
Managing Identities to Strengthen Business Continuity | CSA
Managing Identities to Strengthen Business Continuity | CSA
Identity plays a vital role in keeping cloud platforms operating smoothly. Organizations require an identity framework that can adapt to a wide range of events.
·cloudsecurityalliance.org·
Managing Identities to Strengthen Business Continuity | CSA
Google Chrome pourra changer vos mots de passe lui-même s’ils encourent un risque
Google Chrome pourra changer vos mots de passe lui-même s’ils encourent un risque
Google tente une nouvelle approche pour accompagner les internautes à avoir une hygiène numérique de meilleure qualité. Avec Chrome, le géant du net proposera un mécanisme permettant de renouveler automatiquement un mot de passe à risque, sans avoir à se rendre sur le site. Tout se fera en quelques instants en
·numerama.com·
Google Chrome pourra changer vos mots de passe lui-même s’ils encourent un risque