Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

30533 bookmarks
Custom sorting
Don’t let DOGE destroy CISA | CyberScoop
Don’t let DOGE destroy CISA | CyberScoop
Elon Musk’s DOGE isn’t about efficiency — it’s about destruction. We should not let this administration tear down our best defenses against those trying to attack us in cyberspace.
·cyberscoop.com·
Don’t let DOGE destroy CISA | CyberScoop
Why CTEM is the Winning Bet for CISOs in 2025
Why CTEM is the Winning Bet for CISOs in 2025
CTEM adoption in 2025 improves risk visibility and enables 3x breach reduction by 2026 via real-time validation.
·thehackernews.com·
Why CTEM is the Winning Bet for CISOs in 2025
The NSA's "Fifty Years of Mathematical Cryptanalysis (1937–1987)" - Schneier on Security
The NSA's "Fifty Years of Mathematical Cryptanalysis (1937–1987)" - Schneier on Security
“Fifty Years of Mathematical Cryptanalysis (1937-1987),” by Glenn F. Stahly, was just declassified—with a lot of redactions—by the NSA. I have not read it yet. If you find anything interesting in the document, please tell us about it in the comments.
·schneier.com·
The NSA's "Fifty Years of Mathematical Cryptanalysis (1937–1987)" - Schneier on Security
Legal Aid Agency Admits Major Breach of Applicant Data
Legal Aid Agency Admits Major Breach of Applicant Data
The UK government says that hackers accessed a “large amount” of personal information in attack on Legal Aid Agency
·infosecurity-magazine.com·
Legal Aid Agency Admits Major Breach of Applicant Data
Geo-blocking in context: Realities, risks and recommendations | Cyber.gov.au
Geo-blocking in context: Realities, risks and recommendations | Cyber.gov.au
This guidance is intended for decision makers and cybersecurity practitioners. It highlights what to be aware of when identifying the source of a threat and the potential implications of geo-blocking in a broader cybersecurity strategy.
·cyber.gov.au·
Geo-blocking in context: Realities, risks and recommendations | Cyber.gov.au
Another Confluence Bites the Dust: Falling to ELPACO-team Ransomware
Another Confluence Bites the Dust: Falling to ELPACO-team Ransomware
Key Takeaways The threat actor first gained entry by exploiting a known vulnerability (CVE-2023-22527) on an internet-facing Confluence server, allowing for remote code execution. Using this access…
·thedfirreport.com·
Another Confluence Bites the Dust: Falling to ELPACO-team Ransomware
CrushFTP 11.3.1 - Authentication Bypass
CrushFTP 11.3.1 - Authentication Bypass
CrushFTP 11.3.1 - Authentication Bypass. CVE-2025-31161 . remote exploit for Multiple platform
·exploit-db.com·
CrushFTP 11.3.1 - Authentication Bypass
Friday Squid Blogging: Pet Squid Simulation - Schneier on Security
Friday Squid Blogging: Pet Squid Simulation - Schneier on Security
From Hackaday.com, this is a neural network simulation of a pet squid. Autonomous Behavior: The squid moves autonomously, making decisions based on his current state (hunger, sleepiness, etc.). Implements a vision cone for food detection, simulating realistic foraging behavior. Neural network can make decisions and form associations. Weights are analysed, tweaked and trained by Hebbian learning algorithm. Experiences from short-term and long-term memory can influence decision-making. Squid can create new neurons in response to his environment (Neurogenesis) ...
·schneier.com·
Friday Squid Blogging: Pet Squid Simulation - Schneier on Security
Hack could cost Coinbase up to $400M: filing
Hack could cost Coinbase up to $400M: filing
The crypto exchange is offering a $20 million reward for information leading to the hackers’ arrest. Coinbase terminated customer support agents who leaked customer data.
·cybersecuritydive.com·
Hack could cost Coinbase up to $400M: filing
Microsoft confirms May Windows 10 updates trigger BitLocker recovery
Microsoft confirms May Windows 10 updates trigger BitLocker recovery
​Microsoft has confirmed that some Windows 10 and Windows 10 Enterprise LTSC 2021 systems will boot into BitLocker recovery after installing the May 2025 security updates.
·bleepingcomputer.com·
Microsoft confirms May Windows 10 updates trigger BitLocker recovery
Feds charge 12 more suspects in RICO case over crypto crime spree
Feds charge 12 more suspects in RICO case over crypto crime spree
Some of the suspects allegedly “cold-called victims and used social engineering to convince them their accounts were the subject of cyberattacks and the enterprise callers were attempting to help secure their accounts,” according to the DOJ.
·therecord.media·
Feds charge 12 more suspects in RICO case over crypto crime spree
Ekinops s'empare de l'éditeur de logiciels en cybersécurité Olfeo
Ekinops s'empare de l'éditeur de logiciels en cybersécurité Olfeo
Le fournisseur français de solutions télécoms ajoute une corde à son arc en mettant la main sur Olfeo, un éditeur de logiciels spécialisé dans...-CybersĂ©curitĂ©
·usine-digitale.fr·
Ekinops s'empare de l'éditeur de logiciels en cybersécurité Olfeo