Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29739 bookmarks
Custom sorting
Xoxo to Prague
Xoxo to Prague
In this week’s newsletter, Thor inspects the LockBit leak, finding $10,000 “security tips,” ransom negotiations gone wrong and a rare glimpse into the human side of cybercrime.
·blog.talosintelligence.com·
Xoxo to Prague
Breachforums Boss to Pay $700k in Healthcare Breach
Breachforums Boss to Pay $700k in Healthcare Breach
In what experts are calling a novel legal outcome, the 22-year-old former administrator of the cybercrime community Breachforums will forfeit nearly $700,000 to settle a civil lawsuit from a health insurance company whose customer data was posted for sale on…
·krebsonsecurity.com·
Breachforums Boss to Pay $700k in Healthcare Breach
Government webmail hacked via XSS bugs in global spy campaign
Government webmail hacked via XSS bugs in global spy campaign
Hackers are running a worldwide cyberespionage campaign dubbed 'RoundPress,' leveraging zero-day and n-day flaws in webmail servers to steal email from high-value government organizations.
·bleepingcomputer.com·
Government webmail hacked via XSS bugs in global spy campaign
Ban sales of gear from China’s TP-Link, Republican lawmakers tell Trump administration
Ban sales of gear from China’s TP-Link, Republican lawmakers tell Trump administration
Senate Intelligence Committee Chairman Tom Cotton and 16 other GOP lawmakers wrote this week to Commerce Secretary Howard Lutnick, saying his department should block future sales of TP-Link’s popular small office/home office (SOHO) internet routers.
·therecord.media·
Ban sales of gear from China’s TP-Link, Republican lawmakers tell Trump administration
How Threat Modeling, Actor Attribution Grow Cyber Defenses
How Threat Modeling, Actor Attribution Grow Cyber Defenses
Want to enhance your threat modeling? By combining it with threat actor attribution, you can improve your cyber defenses. Read on to learn more.
·cisecurity.org·
How Threat Modeling, Actor Attribution Grow Cyber Defenses
1Password rend les passkeys sur Windows 11 plus commodes
1Password rend les passkeys sur Windows 11 plus commodes
Dans le cadre d'un travail conjoint avec Microsoft, 1Password a rendu la gestion des passkeys sur Windows 11 plus efficace. Ce changement s'appliquera à tout le monde bientôt. Comment survivre dans un monde sans mots de passe, lorsque l'on est un gestionnaire de mots de passe ? En s'adaptant à cette nouvelle donne,
·numerama.com·
1Password rend les passkeys sur Windows 11 plus commodes
Windows 11 and Red Hat Linux hacked on first day of Pwn2Own
Windows 11 and Red Hat Linux hacked on first day of Pwn2Own
On the first day of Pwn2Own Berlin 2025, security researchers were awarded $260,000 after successfully demonstrating zero-day exploits for Windows 11, Red Hat Linux, Docker Desktop, and Oracle VirtualBox.
·bleepingcomputer.com·
Windows 11 and Red Hat Linux hacked on first day of Pwn2Own
New Tor Oniux tool anonymizes any Linux app's network traffic
New Tor Oniux tool anonymizes any Linux app's network traffic
Tor has announced Oniux, a new command-line tool for routing any Linux application securely through the Tor network for anonymized network connections.
·bleepingcomputer.com·
New Tor Oniux tool anonymizes any Linux app's network traffic
Qu’est-ce que la stratégie 3-2-1-1-0 en cybersécurité ?
Qu’est-ce que la stratégie 3-2-1-1-0 en cybersécurité ?
En matière de protection des données, créer une sauvegarde et la mettre à jour régulièrement constitue un excellent moyen d’éviter la plupart des accidents. Du moins, pour les particuliers ou les petites structures. Car lorsque le volume de données, ou le nombre d’utilisateurs est élevé, un simple backup n’est plus
·numerama.com·
Qu’est-ce que la stratégie 3-2-1-1-0 en cybersécurité ?
GUESST ESSAY: Cybercrime for hire: small businesses are the new bullseye of the Dark Web
GUESST ESSAY: Cybercrime for hire: small businesses are the new bullseye of the Dark Web
Small businesses make up 90% of all companies worldwide and account for half of global GDP. Yet despite their importance, many lack the cybersecurity expertise and resources to fend off a rising tide of digital threats. Related: Protecting lateral networks in SMBs Rich in sensitive data and often connected to larger supply chains, small businesses
·lastwatchdog.com·
GUESST ESSAY: Cybercrime for hire: small businesses are the new bullseye of the Dark Web
Malicious NPM package uses Unicode steganography to evade detection
Malicious NPM package uses Unicode steganography to evade detection
A malicious package in the Node Package Manager index uses invisible Unicode characters to hide malicious code and Google Calendar links to host the URL for the command-and-control location.
·bleepingcomputer.com·
Malicious NPM package uses Unicode steganography to evade detection
Coinbase data breach exposes customer info and government IDs
Coinbase data breach exposes customer info and government IDs
Coinbase, a cryptocurrency exchange with over 100 million customers, has disclosed that cybercriminals working with rogue support agents stole customer data and demanded a $20 million ransom not to publish the stolen information.
·bleepingcomputer.com·
Coinbase data breach exposes customer info and government IDs
Malicious npm package using steganography downloaded by hundreds
Malicious npm package using steganography downloaded by hundreds
A malicious package in the Node Package Manager index uses invisible Unicode characters to hide malicious code and Google Calendar links to host the URL for the command-and-control location.
·bleepingcomputer.com·
Malicious npm package using steganography downloaded by hundreds