Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31616 bookmarks
Custom sorting
Cette nouvelle arme électromagnétique pulvérise des drones en une poignée de secondes
Cette nouvelle arme électromagnétique pulvérise des drones en une poignée de secondes
Lors d’une phase test effectuée depuis une base militaire aux États-Unis le 26 août, une cinquantaine de drones ont été détruits en quelques instants grâce aux micro-ondes d’une arme révolutionnaire de la marque Epirus.  Comme un orage métallique, le ciel a craché un essaim de drones sur le poste militaire de Camp
·numerama.com·
Cette nouvelle arme électromagnétique pulvérise des drones en une poignée de secondes
Objective-See: Blog
Objective-See: Blog
Posts about macOS malware, exploits, and tools
·objective-see.org·
Objective-See: Blog
Hardening Microsoft Windows 10 workstations | Cyber.gov.au
Hardening Microsoft Windows 10 workstations | Cyber.gov.au
This publication provides recommendations on hardening workstations using Enterprise and Education editions of Microsoft Windows 10. While this publication refers to workstations, most recommendations are equally applicable to servers (with the exception of Domain Controllers) using Microsoft Windows Server. Security features discussed in this publication, along with the names and locations of Group Policy settings, are taken from Microsoft Windows 10 version 22H2.
·cyber.gov.au·
Hardening Microsoft Windows 10 workstations | Cyber.gov.au
Hardening Microsoft Windows 11 workstations | Cyber.gov.au
Hardening Microsoft Windows 11 workstations | Cyber.gov.au
This publication provides recommendations on hardening workstations using Enterprise and Education editions of Microsoft Windows 11. While this publication refers to workstations, most recommendations are equally applicable to servers (with the exception of Domain Controllers) using Microsoft Windows Server. Security features discussed in this publication, along with the names and locations of Group Policy settings, are taken from Microsoft Windows 11 version 24H2.
·cyber.gov.au·
Hardening Microsoft Windows 11 workstations | Cyber.gov.au
A Shared Vision of Software Bill of Materials (SBOM) for Cybersecurity | Cyber.gov.au
A Shared Vision of Software Bill of Materials (SBOM) for Cybersecurity | Cyber.gov.au
This guidance, authored by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and international partners, presents a shared vision of Software Bill of Materials (SBOM) and the value that increased software component and supply chain transparency can offer to the global community.
·cyber.gov.au·
A Shared Vision of Software Bill of Materials (SBOM) for Cybersecurity | Cyber.gov.au
Threat actors abuse X’s Grok AI to spread malicious links
Threat actors abuse X’s Grok AI to spread malicious links
Threat actors are using Grok, X's built-in AI assistant, to bypass link posting restrictions that the platform introduced to reduce malicious advertising.
·bleepingcomputer.com·
Threat actors abuse X’s Grok AI to spread malicious links
CISA guide seeks a unified approach to software ‘ingredients lists’ | CyberScoop
CISA guide seeks a unified approach to software ‘ingredients lists’ | CyberScoop
Compiling an “ingredients list” for software can help organizations reduce cyber risks, avoid fines and save time, among other benefits, a Cybersecurity and Infrastructure Security Agency-led guide published Wednesday advises.
·cyberscoop.com·
CISA guide seeks a unified approach to software ‘ingredients lists’ | CyberScoop
US offers $10 million bounty for info on Russian FSB hackers
US offers $10 million bounty for info on Russian FSB hackers
The U.S. Department of State is offering a reward of up to $10 million for information on three Russian Federal Security Service (FSB) officers involved in cyberattacks targeting U.S. critical infrastructure organizations on behalf of the Russian government.
·bleepingcomputer.com·
US offers $10 million bounty for info on Russian FSB hackers
Hackers use new HexStrike-AI tool to rapidly exploit n-day flaws
Hackers use new HexStrike-AI tool to rapidly exploit n-day flaws
Hackers are increasingly using a new AI-powered offensive security framework called HexStrike-AI in real attacks to exploit newly disclosed n-day flaws.
·bleepingcomputer.com·
Hackers use new HexStrike-AI tool to rapidly exploit n-day flaws
A Look at New AI Control Frameworks from NIST & CSA | CSA
A Look at New AI Control Frameworks from NIST & CSA | CSA
NIST and CSA have each released frameworks for securing AI. Explore the NIST Control Overlays for Securing AI Systems and the CSA AI Controls Matrix.
·cloudsecurityalliance.org·
A Look at New AI Control Frameworks from NIST & CSA | CSA
US sues robot toy maker for exposing children's data to Chinese devs
US sues robot toy maker for exposing children's data to Chinese devs
The U.S. Department of Justice has sued toy maker Apitor Technology for allegedly allowing a Chinese third party to collect children's geolocation data without their knowledge and parental consent.
·bleepingcomputer.com·
US sues robot toy maker for exposing children's data to Chinese devs
SaaS giant Workiva discloses data breach after Salesforce attack
SaaS giant Workiva discloses data breach after Salesforce attack
Workiva, a leading cloud-based SaaS (Software as a Service) provider, notified its customers that attackers who gained access to a third-party customer relationship management (CRM) system stole some of their data.
·bleepingcomputer.com·
SaaS giant Workiva discloses data breach after Salesforce attack
Police disrupts Streameast, the largest pirated sports platform
Police disrupts Streameast, the largest pirated sports platform
The Alliance for Creativity and Entertainment (ACE) and Egyptian authorities have shut down Streameast, the world's largest illegal live sports streaming network, and arrested two people allegedly associated with the operation.
·bleepingcomputer.com·
Police disrupts Streameast, the largest pirated sports platform
Defining Machine Identities & How They Work | CSA
Defining Machine Identities & How They Work | CSA
Explore what machine identities are, why they need protection, and how to manage them effectively to enforce a Zero Trust approach.
·cloudsecurityalliance.org·
Defining Machine Identities & How They Work | CSA
Le fabricant chinois Huawei exclu à la dernière minute d’un contrat européen
Le fabricant chinois Huawei exclu à la dernière minute d’un contrat européen
Le 29 août 2025, le gouvernement espagnol a subitement annulé un contrat visant à renforcer son réseau de fibre optique destiné à plusieurs institutions publiques, parmi lesquelles le ministère de la Défense du pays. Une décision motivée par l'intégration d'équipements de la marque chinoise Huawei au sein de
·numerama.com·
Le fabricant chinois Huawei exclu à la dernière minute d’un contrat européen