Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29738 bookmarks
Custom sorting
Hackers exploit OttoKit WordPress plugin flaw to add admin accounts
Hackers exploit OttoKit WordPress plugin flaw to add admin accounts
Hackers are exploiting a critical unauthenticated privilege escalation vulnerability in the OttoKit WordPress plugin to create rogue admin accounts on targeted sites.
·bleepingcomputer.com·
Hackers exploit OttoKit WordPress plugin flaw to add admin accounts
PowerSchool hacker now extorting individual school districts
PowerSchool hacker now extorting individual school districts
PowerSchool is warning that the hacker behind its December cyberattack is now individually extorting schools, threatening to release the previously stolen student and teacher data if a ransom is not paid.
·bleepingcomputer.com·
PowerSchool hacker now extorting individual school districts
CrowdStrike to cut 500 jobs in plan to scale business
CrowdStrike to cut 500 jobs in plan to scale business
The cybersecurity firm has faced increasing market pressures amid a scramble by rivals to consolidate enterprise customers on unified platforms.
·cybersecuritydive.com·
CrowdStrike to cut 500 jobs in plan to scale business
Unpacking the 2024 Snowflake Data Breach | CSA
Unpacking the 2024 Snowflake Data Breach | CSA
Get a technical breakdown of the 2024 Snowflake data breach, including a description of the Advanced Persistent Threat and how the breach impacted the business.
·cloudsecurityalliance.org·
Unpacking the 2024 Snowflake Data Breach | CSA
Play ransomware exploited Windows logging flaw in zero-day attacks
Play ransomware exploited Windows logging flaw in zero-day attacks
The Play ransomware gang has exploited a high-severity Windows Common Log File System flaw in zero-day attacks to gain SYSTEM privileges and deploy malware on compromised systems.
·bleepingcomputer.com·
Play ransomware exploited Windows logging flaw in zero-day attacks
Doubling down: How Universal 2nd Factor (U2F) boosts online security
Doubling down: How Universal 2nd Factor (U2F) boosts online security
Passwords alone aren't cutting it—31% of breaches involve stolen credentials. Learn from Specops Software about how Universal 2nd Factor (U2F) and strong password policies can work together to keep your organization secure.
·bleepingcomputer.com·
Doubling down: How Universal 2nd Factor (U2F) boosts online security
NSO Group fined $167M for spyware attacks on 1,400 WhatsApp users
NSO Group fined $167M for spyware attacks on 1,400 WhatsApp users
A U.S. federal jury has ordered Israeli spyware vendor NSO Group to pay WhatsApp $167,254,000 in punitive damages and $444,719 in compensatory damages for a 2019 campaign that targeted 1,400 users of the communication app.
·bleepingcomputer.com·
NSO Group fined $167M for spyware attacks on 1,400 WhatsApp users
5 Essential Pillars of SaaS Security | CSA
5 Essential Pillars of SaaS Security | CSA
Discover the 5 essential pillars of SaaS security to transform your organization's security posture and effectively manage decentralized SaaS environments.
·cloudsecurityalliance.org·
5 Essential Pillars of SaaS Security | CSA
CISA warns of hackers targeting critical oil infrastructure
CISA warns of hackers targeting critical oil infrastructure
CISA warned critical infrastructure organizations of "unsophisticated" threat actors actively targeting the U.S. oil and natural gas sectors.
·bleepingcomputer.com·
CISA warns of hackers targeting critical oil infrastructure
Chinese AI Submersible - Schneier on Security
Chinese AI Submersible - Schneier on Security
A Chinese company has developed an AI-piloted submersible that can reach speeds “similar to a destroyer or a US Navy torpedo,” dive “up to 60 metres underwater,” and “remain static for more than a month, like the stealth capabilities of a nuclear submarine.” In case you’re worried about the military applications of this, you can relax because the company says that the submersible is “designated for civilian use” and can “launch research rockets.” “Research rockets.” Sure. ...
·schneier.com·
Chinese AI Submersible - Schneier on Security