In this week’s newsletter, Thor inspects the LockBit leak, finding $10,000 “security tips,” ransom negotiations gone wrong and a rare glimpse into the human side of cybercrime.
Breachforums Boss to Pay $700k in Healthcare Breach
In what experts are calling a novel legal outcome, the 22-year-old former administrator of the cybercrime community Breachforums will forfeit nearly $700,000 to settle a civil lawsuit from a health insurance company whose customer data was posted for sale on…
FBI warns of fake texts, deepfake calls impersonating senior U.S. officials | CyberScoop
The FB has warned of a new AI deepfake phishing campaign where attackers impersonate senior government officials using texts and voice messages to steal account access.
Researchers warn threat actors in UK retail attacks are targeting US sector
Google Threat Intelligence researchers say the hackers behind intrusions at multiple British retailers are launching similar social engineering attacks against American companies.
Government webmail hacked via XSS bugs in global spy campaign
Hackers are running a worldwide cyberespionage campaign dubbed 'RoundPress,' leveraging zero-day and n-day flaws in webmail servers to steal email from high-value government organizations.
Ban sales of gear from China’s TP-Link, Republican lawmakers tell Trump administration
Senate Intelligence Committee Chairman Tom Cotton and 16 other GOP lawmakers wrote this week to Commerce Secretary Howard Lutnick, saying his department should block future sales of TP-Link’s popular small office/home office (SOHO) internet routers.
How the Microsoft Secure Future Initiative brings Zero Trust to life
Read how you can improve your security posture by applying Zero Trust framework and principles based on learnings from the April 2025 Secure Future Initiative progress report.
1Password rend les passkeys sur Windows 11 plus commodes
Dans le cadre d'un travail conjoint avec Microsoft, 1Password a rendu la gestion des passkeys sur Windows 11 plus efficace. Ce changement s'appliquera à tout le monde bientôt. Comment survivre dans un monde sans mots de passe, lorsque l'on est un gestionnaire de mots de passe ? En s'adaptant à cette nouvelle donne,
Nova Scotia Power confirms hackers stole customer data in cyberattack
Nova Scotia Power confirms it suffered a data breach after threat actors stole sensitive customer data in a cybersecurity incident discovered last month.
Windows 11 and Red Hat Linux hacked on first day of Pwn2Own
On the first day of Pwn2Own Berlin 2025, security researchers were awarded $260,000 after successfully demonstrating zero-day exploits for Windows 11, Red Hat Linux, Docker Desktop, and Oracle VirtualBox.
Aux Etats-Unis, des mouchards découverts dans des équipements chinois pour panneaux solaires
En démontant des équipements lors d'une inspection de sécurité, des experts américains ont découvert plusieurs dispositifs de communication non...-Cybersécurité
New Tor Oniux tool anonymizes any Linux app's network traffic
Tor has announced Oniux, a new command-line tool for routing any Linux application securely through the Tor network for anonymized network connections.
[tl;dr sec] #279 - Security for High Velocity Engineering, Cloud Incident Readiness, AI-powered Malware Implants
How to build a Paved Road that improves dev productivity and security, what to do before/after a cloud breach, command & control (C2) that executes attacks using natural language
Qu’est-ce que la stratégie 3-2-1-1-0 en cybersécurité ?
En matière de protection des données, créer une sauvegarde et la mettre à jour régulièrement constitue un excellent moyen d’éviter la plupart des accidents. Du moins, pour les particuliers ou les petites structures. Car lorsque le volume de données, ou le nombre d’utilisateurs est élevé, un simple backup n’est plus
Kremlin-linked hackers target webmail servers of Eastern European government agencies
Russia-linked hackers known as APT28 mainly targeted entities in Ukraine, Bulgaria and Romania, but governments in Africa, South America and other parts of Europe were also affected.
GUESST ESSAY: Cybercrime for hire: small businesses are the new bullseye of the Dark Web
Small businesses make up 90% of all companies worldwide and account for half of global GDP. Yet despite their importance, many lack the cybersecurity expertise and resources to fend off a rising tide of digital threats. Related: Protecting lateral networks in SMBs Rich in sensitive data and often connected to larger supply chains, small businesses
Malicious NPM package uses Unicode steganography to evade detection
A malicious package in the Node Package Manager index uses invisible Unicode characters to hide malicious code and Google Calendar links to host the URL for the command-and-control location.
Coinbase data breach exposes customer info and government IDs
Coinbase, a cryptocurrency exchange with over 100 million customers, has disclosed that cybercriminals working with rogue support agents stole customer data and demanded a $20 million ransom not to publish the stolen information.
Malicious npm package using steganography downloaded by hundreds
A malicious package in the Node Package Manager index uses invisible Unicode characters to hide malicious code and Google Calendar links to host the URL for the command-and-control location.