Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31260 bookmarks
Custom sorting
Critical Docker Desktop flaw lets attackers hijack Windows hosts
Critical Docker Desktop flaw lets attackers hijack Windows hosts
A critical vulnerability in Docker Desktop for Windows and macOS allows compromising the host by running a malicious container, even if the Enhanced Container Isolation (ECI) protection is active.
·bleepingcomputer.com·
Critical Docker Desktop flaw lets attackers hijack Windows hosts
L’astuce pour contourner le contrôle d’âge sur les sites pornos est déjà en danger
L’astuce pour contourner le contrôle d’âge sur les sites pornos est déjà en danger
Des internautes misent sur les VPN pour échapper au contrôle de l'âge sur les sites pornographiques. Une piste aussi exploitée par les mineurs, qui n'est pas ignorée par les autorités. Au Royaume-Uni, des voix s'élèvent pour obliger les VPN à participer à ce contrôle. La France, qui marche dans les pas de son voisin,
·numerama.com·
L’astuce pour contourner le contrôle d’âge sur les sites pornos est déjà en danger
Defending against malware persistence techniques with Wazuh
Defending against malware persistence techniques with Wazuh
Malware persistence keeps attackers in your systems long after reboots or resets. Wazuh helps detect and block hidden techniques like scheduled tasks, startup scripts, and modified system files—before they turn into long-term compromise.
·bleepingcomputer.com·
Defending against malware persistence techniques with Wazuh
What Auditors Wish Every Company Knew About SOC 2 | CSA
What Auditors Wish Every Company Knew About SOC 2 | CSA
Information Security Analyst Ishaan Gulati has worked with both internal and external auditors. His hard-earned lessons can help you prepare for a SOC 2 audit.
·cloudsecurityalliance.org·
What Auditors Wish Every Company Knew About SOC 2 | CSA
Chinese Developer Jailed for Deploying Malicious Code at US Company
Chinese Developer Jailed for Deploying Malicious Code at US Company
A Chinese developer has been sentenced to four years in prison after being found to deploy malicious code in his employer’s network, including a “kill switch”
·infosecurity-magazine.com·
Chinese Developer Jailed for Deploying Malicious Code at US Company
Microsoft working on fix for ongoing Outlook email issues
Microsoft working on fix for ongoing Outlook email issues
​Microsoft is working to resolve an Exchange Online issue causing email access problems for Outlook mobile users who use Hybrid Modern Authentication (HMA).
·bleepingcomputer.com·
Microsoft working on fix for ongoing Outlook email issues
FTC warns tech giants not to bow to foreign pressure on encryption
FTC warns tech giants not to bow to foreign pressure on encryption
The Federal Trade Commission (FTC) is warning major U.S. tech companies against yielding to foreign government demands that weaken data security, compromise encryption, or impose censorship on their platforms.
·bleepingcomputer.com·
FTC warns tech giants not to bow to foreign pressure on encryption
New Android malware poses as antivirus from Russian intelligence agency
New Android malware poses as antivirus from Russian intelligence agency
A new Android malware posing as an antivirus tool software created by Russia's Federal Security Services agency (FSB) is being used to target executives of Russian businesses.
·bleepingcomputer.com·
New Android malware poses as antivirus from Russian intelligence agency
« Quitter le groupe investissements ? », tout comprendre sur les nouveaux outils de sécurité WhatsApp
« Quitter le groupe investissements ? », tout comprendre sur les nouveaux outils de sécurité WhatsApp
Depuis plusieurs jours, WhatAapp dévoile, à travers un message destiné à ses utilisateurs, de nouvelles fonctionnalités pour ne pas tomber dans les pièges de « groupes que vous ne connaissez pas ». Ces nouveaux outils répondent à un réel besoin de sécurisation de la plateforme aux 3 milliards d'utilisateurs mensuels.
·numerama.com·
« Quitter le groupe investissements ? », tout comprendre sur les nouveaux outils de sécurité WhatsApp
How a scam hunter got scammed (Lock and Code S06E17)
How a scam hunter got scammed (Lock and Code S06E17)
This week on the Lock and Code podcast, we speak with Julie-Anne Kearns about what it felt like, as a scam hunter, to fall for a scam.
·malwarebytes.com·
How a scam hunter got scammed (Lock and Code S06E17)
Murky Panda hackers exploit cloud trust to hack downstream customers
Murky Panda hackers exploit cloud trust to hack downstream customers
A Chinese state-sponsored hacking group known as Murky Panda (Silk Typhoon) exploits trusted relationships in cloud environments to gain initial access to the networks and data of downstream customers.
·bleepingcomputer.com·
Murky Panda hackers exploit cloud trust to hack downstream customers
Friday Squid Blogging: Bobtail Squid - Schneier on Security
Friday Squid Blogging: Bobtail Squid - Schneier on Security
Nice short article on the bobtail squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Blog moderation policy.
·schneier.com·
Friday Squid Blogging: Bobtail Squid - Schneier on Security
I'm Spending the Year at the Munk School - Schneier on Security
I'm Spending the Year at the Munk School - Schneier on Security
This academic year, I am taking a sabbatical from the Kennedy School and Harvard University. (It’s not a real sabbatical—I’m just an adjunct—but it’s the same idea.) I will be spending the Fall 2025 and Spring 2026 semesters at the Munk School at the University of Toronto. I will be organizing a reading group on AI security in the fall. I will be teaching my cybersecurity policy class in the Spring. I will be working with Citizen Lab, the Law School, and the Schwartz Reisman Institute. And I will be enjoying all the multicultural offerings of Toronto...
·schneier.com·
I'm Spending the Year at the Munk School - Schneier on Security
APT36 hackers abuse Linux .desktop files to install malware
APT36 hackers abuse Linux .desktop files to install malware
The Pakistani APT36 cyberspies are using Linux .desktop files to load malware in new attacks against government and defense entities in India.
·bleepingcomputer.com·
APT36 hackers abuse Linux .desktop files to install malware
« Il n’y a pas vraiment de moyen de s’en protéger » : cet outil peut déverrouiller près de 200 modèles de voitures
« Il n’y a pas vraiment de moyen de s’en protéger » : cet outil peut déverrouiller près de 200 modèles de voitures
Une enquête menée par 404 Media révèle les dessous d'un marché peu scrupuleux qui ne cesse d'évoluer. Celui des Flipper Zero, ou plus précisément celui des logiciels que cet outil peut embarquer. Les dernières versions, disponibles à l'achat sous le manteau, permettent de déverrouiller une très large gamme de modèles
·numerama.com·
« Il n’y a pas vraiment de moyen de s’en protéger » : cet outil peut déverrouiller près de 200 modèles de voitures