Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29739 bookmarks
Custom sorting
Why MFT Matters for Compliance and Risk Reduction | CSA
Why MFT Matters for Compliance and Risk Reduction | CSA
Look at evolving compliance challenges and how secure Managed File Transfer (MFT) is helping organizations keep up with stringent standards.
·cloudsecurityalliance.org·
Why MFT Matters for Compliance and Risk Reduction | CSA
Microsoft: Windows 11 24H2 now ready to rollout to everyone
Microsoft: Windows 11 24H2 now ready to rollout to everyone
​Microsoft announced over the weekend that the Windows 11 24H2 update is ready to roll out to all compatible PCs, excluding those with safeguard holds.
·bleepingcomputer.com·
Microsoft: Windows 11 24H2 now ready to rollout to everyone
MY TAKE: RSAC 2025’s big takeaway — GenAI is growing up fast, but still needs human direction
MY TAKE: RSAC 2025’s big takeaway — GenAI is growing up fast, but still needs human direction
SAN FRANCISCO — The cybersecurity industry showed up here in force last week: 44,000 attendees, 730 speakers, 650 exhibitors and 400 members of the media flooding Moscone Convention Center in the City by the Bay. Related: RSAC 2025 by the numbers Beneath the cacophony of GenAI-powered product rollouts, the signal that stood out was subtler:
·lastwatchdog.com·
MY TAKE: RSAC 2025’s big takeaway — GenAI is growing up fast, but still needs human direction
Ransomware Attacks Fall in April Amid RansomHub Outage
Ransomware Attacks Fall in April Amid RansomHub Outage
Comparitech observed a significant decline in ransomware attacks in April, partly as a result of the RansomHub gang “going dark”
·infosecurity-magazine.com·
Ransomware Attacks Fall in April Amid RansomHub Outage
OpenAI document explains when to use each ChatGPT model
OpenAI document explains when to use each ChatGPT model
OpenAI admitted that it can be confusing for users to choose between all the different models, but the company has quietly published a document that makes it easier to understand ChatGPT.
·bleepingcomputer.com·
OpenAI document explains when to use each ChatGPT model
StealC malware enhanced with stealth upgrades and data theft tools
StealC malware enhanced with stealth upgrades and data theft tools
The creators of StealC, a widely-used information stealer and malware downloader, have released its second major version, bringing multiple stealth and data theft enhancements.
·bleepingcomputer.com·
StealC malware enhanced with stealth upgrades and data theft tools
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 44
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 44
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape
·securityaffairs.com·
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 44
DEF CON TRAINING Las Vegas 2025
DEF CON TRAINING Las Vegas 2025
DEF CON Training 2025 will be located at: Las Vegas Convention Center.3150 Paradise Rd Las Vegas, NV 89109 Jeff Moss and Seeyew Mo will host an evening social mixer for trainers and students on August 11. This will be a great opportunity to network and discuss cybersecurity and policy. Please email for wire payment ins
·training.defcon.org·
DEF CON TRAINING Las Vegas 2025
Microsoft ends Authenticator password autofill, moves users to Edge
Microsoft ends Authenticator password autofill, moves users to Edge
Microsoft has announced that it will discontinue the password storage and autofill feature in the Authenticator app starting in July and will complete the deprecation in August 2025.
·bleepingcomputer.com·
Microsoft ends Authenticator password autofill, moves users to Edge
Google NotebookLM is now using Gemini 2.5 Flash
Google NotebookLM is now using Gemini 2.5 Flash
Google NotebookLM, which is a research and note-taking AI tool, is getting upgraded to Gemini 2.5 Flash.
·bleepingcomputer.com·
Google NotebookLM is now using Gemini 2.5 Flash
Une guerre nucléaire est-elle vraiment possible en Europe ?
Une guerre nucléaire est-elle vraiment possible en Europe ?
L’arme nucléaire, du fait des conséquences désastreuses qu’entraînerait son emploi, est vouée à rester un élément de dissuasion. Si la menace du recours à cette arme ultime est fréquemment brandie côté russe, il n’en demeure pas moins que les responsables au Kremlin ont pleinement conscience des coûts pratiquement
·numerama.com·
Une guerre nucléaire est-elle vraiment possible en Europe ?
Friday Squid Blogging: Pyjama Squid - Schneier on Security
Friday Squid Blogging: Pyjama Squid - Schneier on Security
The small pyjama squid (Sepioloidea lineolata) produces toxic slime, “a rare example of a poisonous predatory mollusc.” As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
·schneier.com·
Friday Squid Blogging: Pyjama Squid - Schneier on Security
Co-op confirms data theft after DragonForce ransomware claims attack
Co-op confirms data theft after DragonForce ransomware claims attack
The Co-op cyberattack is far worse than initially reported, with the company now confirming that data was stolen for a significant number of current and past customers.
·bleepingcomputer.com·
Co-op confirms data theft after DragonForce ransomware claims attack
US indicts Yemeni man in Black Kingdom ransomware attacks
US indicts Yemeni man in Black Kingdom ransomware attacks
The U.S. Attorney's Office for the Central District of California announced charges against Rami Khaled Ahmed for allegedly helping to develop and deploy Black Kingdom, which infected “approximately 1,500 computer systems."
·therecord.media·
US indicts Yemeni man in Black Kingdom ransomware attacks