Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31279 bookmarks
Custom sorting
New AI attack hides data-theft prompts in downscaled images
New AI attack hides data-theft prompts in downscaled images
Researchers have developed a novel attack that steals user data by injecting malicious prompts in images processed by AI systems before delivering them to a large language model.
·bleepingcomputer.com·
New AI attack hides data-theft prompts in downscaled images
Farmers Insurance data breach impacts 1.1M people after Salesforce attack
Farmers Insurance data breach impacts 1.1M people after Salesforce attack
U.S. insurance giant Farmers Insurance has disclosed a data breach impacting 1.1 million customers, with BleepingComputer learning that the data was stolen in the widespread Salesforce attacks.
·bleepingcomputer.com·
Farmers Insurance data breach impacts 1.1M people after Salesforce attack
News alert: Attaxion launches agentless traffic monitoring to flag threats and prioritize risk
News alert: Attaxion launches agentless traffic monitoring to flag threats and prioritize risk
Dover, Del., Aug. 25, 2025, CyberNewswire—Attaxion announces the addition of the Agentless Traffic Monitoring capability to its exposure management platform. Agentless Traffic Monitoring is a new capability designed to give cybersecurity teams actionable visibility into network traffic flowing to and from their digital assets – all without the need to deploy any agents or sensors
·lastwatchdog.com·
News alert: Attaxion launches agentless traffic monitoring to flag threats and prioritize risk
Pavel Durov utilise (encore) sa plateforme Telegram pour défier la justice française
Pavel Durov utilise (encore) sa plateforme Telegram pour défier la justice française
Depuis août 2024, Pavel Durov, fondateur et dirigeant de Telegram, accumule les coups d'éclats médiatiques contre la justice française. Mis en examen pour complicité de diffusion d'images pédopornographiques, de trafic de stupéfiants et d'escroquerie en bande organisée, le Russe de 40 ans vient de s'en prendre à une
·numerama.com·
Pavel Durov utilise (encore) sa plateforme Telegram pour défier la justice française
Critical Docker Desktop flaw lets attackers hijack Windows hosts
Critical Docker Desktop flaw lets attackers hijack Windows hosts
A critical vulnerability in Docker Desktop for Windows and macOS allows compromising the host by running a malicious container, even if the Enhanced Container Isolation (ECI) protection is active.
·bleepingcomputer.com·
Critical Docker Desktop flaw lets attackers hijack Windows hosts
L’astuce pour contourner le contrôle d’âge sur les sites pornos est déjà en danger
L’astuce pour contourner le contrôle d’âge sur les sites pornos est déjà en danger
Des internautes misent sur les VPN pour échapper au contrôle de l'âge sur les sites pornographiques. Une piste aussi exploitée par les mineurs, qui n'est pas ignorée par les autorités. Au Royaume-Uni, des voix s'élèvent pour obliger les VPN à participer à ce contrôle. La France, qui marche dans les pas de son voisin,
·numerama.com·
L’astuce pour contourner le contrôle d’âge sur les sites pornos est déjà en danger
Defending against malware persistence techniques with Wazuh
Defending against malware persistence techniques with Wazuh
Malware persistence keeps attackers in your systems long after reboots or resets. Wazuh helps detect and block hidden techniques like scheduled tasks, startup scripts, and modified system files—before they turn into long-term compromise.
·bleepingcomputer.com·
Defending against malware persistence techniques with Wazuh
What Auditors Wish Every Company Knew About SOC 2 | CSA
What Auditors Wish Every Company Knew About SOC 2 | CSA
Information Security Analyst Ishaan Gulati has worked with both internal and external auditors. His hard-earned lessons can help you prepare for a SOC 2 audit.
·cloudsecurityalliance.org·
What Auditors Wish Every Company Knew About SOC 2 | CSA
Chinese Developer Jailed for Deploying Malicious Code at US Company
Chinese Developer Jailed for Deploying Malicious Code at US Company
A Chinese developer has been sentenced to four years in prison after being found to deploy malicious code in his employer’s network, including a “kill switch”
·infosecurity-magazine.com·
Chinese Developer Jailed for Deploying Malicious Code at US Company
Microsoft working on fix for ongoing Outlook email issues
Microsoft working on fix for ongoing Outlook email issues
​Microsoft is working to resolve an Exchange Online issue causing email access problems for Outlook mobile users who use Hybrid Modern Authentication (HMA).
·bleepingcomputer.com·
Microsoft working on fix for ongoing Outlook email issues