https://www.infosecurity-magazine.com/news/threat-actors-hexstrikeai/

Latest CyberSec News by @thecyberpicker
Healthcare Sector Takes 58 Days to Resolve Serious Vulnerabilities
A new Cobalt study finds healthcare organizations among the slowest at resolving serious vulnerabilities
Cette nouvelle arme électromagnétique pulvérise des drones en une poignée de secondes
Lors d’une phase test effectuée depuis une base militaire aux États-Unis le 26 août, une cinquantaine de drones ont été détruits en quelques instants grâce aux micro-ondes d’une arme révolutionnaire de la marque Epirus. Comme un orage métallique, le ciel a craché un essaim de drones sur le poste militaire de Camp
U.S. CISA adds TP-Link Archer C7(EU) and TL-WR841N flaws to its Known Exploited Vulnerabilities catalog
U.S. CISA adds TP-Link Archer C7(EU) and TL-WR841N vulnerabilities to its Known Exploited Vulnerabilities catalog.
Objective-See: Blog
Posts about macOS malware, exploits, and tools
Cloudflare, Proofpoint say hackers gained access to Salesforce instances in attack spree
The breaches are part of hundreds of potential supply chain attacks linked to Salesloft Drift.
End of support for Microsoft Windows and Microsoft Windows Server | Cyber.gov.au
Support for Microsoft Windows and Microsoft Windows Server users following the expiration of the specified servicing timeline.
Hardening Microsoft Windows 10 workstations | Cyber.gov.au
This publication provides recommendations on hardening workstations using Enterprise and Education editions of Microsoft Windows 10. While this publication refers to workstations, most recommendations are equally applicable to servers (with the exception of Domain Controllers) using Microsoft Windows Server. Security features discussed in this publication, along with the names and locations of Group Policy settings, are taken from Microsoft Windows 10 version 22H2.
Hardening Microsoft Windows 11 workstations | Cyber.gov.au
This publication provides recommendations on hardening workstations using Enterprise and Education editions of Microsoft Windows 11. While this publication refers to workstations, most recommendations are equally applicable to servers (with the exception of Domain Controllers) using Microsoft Windows Server. Security features discussed in this publication, along with the names and locations of Group Policy settings, are taken from Microsoft Windows 11 version 24H2.
A Shared Vision of Software Bill of Materials (SBOM) for Cybersecurity | Cyber.gov.au
This guidance, authored by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and international partners, presents a shared vision of Software Bill of Materials (SBOM) and the value that increased software component and supply chain transparency can offer to the global community.
Threat actors abuse X’s Grok AI to spread malicious links
Threat actors are using Grok, X's built-in AI assistant, to bypass link posting restrictions that the platform introduced to reduce malicious advertising.
Streameast, world’s largest pirated live sports network, shut down by Egyptian authorities | CyberScoop
An antipiracy coalition of entertainment companies applauded the takedown. The network’s two operators were arrested at their residences in Egypt.
Update your Android! Google patches 111 vulnerabilities, 2 are critical
Google has issued updates to patch a whopping 111 Android vulnerabilities, including two actively exploited ones.
Malicious npm Packages Exploit Ethereum Smart Contracts to Target Crypto Developers
Two npm packages hide downloader commands via Ethereum smart contracts; uploaded July 2025; targeting crypto developers.
Cato Networks acquires AI security startup Aim Security | CyberScoop
Israeli cybersecurity company Cato Networks has acquired AI security startup Aim Security in its first ever acquisition.
ViewState Deserialization Zero-Day Vulnerability in Sitecore Products (CVE-2025-53690)
An active ViewState deserialization attack affecting Sitecore products, where attackers achieved remote code execution.
CISA guide seeks a unified approach to software ‘ingredients lists’ | CyberScoop
Compiling an “ingredients list” for software can help organizations reduce cyber risks, avoid fines and save time, among other benefits, a Cybersecurity and Infrastructure Security Agency-led guide published Wednesday advises.
US offers $10 million bounty for info on Russian FSB hackers
The U.S. Department of State is offering a reward of up to $10 million for information on three Russian Federal Security Service (FSB) officers involved in cyberattacks targeting U.S. critical infrastructure organizations on behalf of the Russian government.
Two arrested in Egypt as authorities take down Streameast sports piracy platform
A trade group for media giants said it worked with Egyptian authorities to shut down Streameast, a website known for pirating broadcasts of major sports leagues.
Hackers use new HexStrike-AI tool to rapidly exploit n-day flaws
Hackers are increasingly using a new AI-powered offensive security framework called HexStrike-AI in real attacks to exploit newly disclosed n-day flaws.
Google addressed two Android flaws actively exploited in targeted attacks
Google addressed 120 Android vulnerabilities in September 2025, including two flaws actively exploited in targeted attacks.
House panel approves cyber information sharing, grant legislation as expiration deadlines loom | CyberScoop
The Homeland Security Committee also voted out bills addressing pipeline cybersecurity and terrorists’ use of AI.
A Look at New AI Control Frameworks from NIST & CSA | CSA
NIST and CSA have each released frameworks for securing AI. Explore the NIST Control Overlays for Securing AI Systems and the CSA AI Controls Matrix.
US sues robot toy maker for exposing children's data to Chinese devs
The U.S. Department of Justice has sued toy maker Apitor Technology for allegedly allowing a Chinese third party to collect children's geolocation data without their knowledge and parental consent.
Google patches two Android zero-days, 120 defects total in September security update | CyberScoop
The critical, actively exploited zero-day vulnerabilities affect the Linux kernel and Android runtime.
FTC announces settlement with toy robot makers that tracked location of children | CyberScoop
The FTC announced a settlement Tuesday with Chinese robot toy manufacturer Apitor, following an investigation that charged the company with illegally collecting the location data of U.S. children who buy its products.
SaaS giant Workiva discloses data breach after Salesforce attack
Workiva, a leading cloud-based SaaS (Software as a Service) provider, notified its customers that attackers who gained access to a third-party customer relationship management (CRM) system stole some of their data.
Police disrupts Streameast, the largest pirated sports platform
The Alliance for Creativity and Entertainment (ACE) and Egyptian authorities have shut down Streameast, the world's largest illegal live sports streaming network, and arrested two people allegedly associated with the operation.
Defining Machine Identities & How They Work | CSA
Explore what machine identities are, why they need protection, and how to manage them effectively to enforce a Zero Trust approach.
Le fabricant chinois Huawei exclu à la dernière minute d’un contrat européen
Le 29 août 2025, le gouvernement espagnol a subitement annulé un contrat visant à renforcer son réseau de fibre optique destiné à plusieurs institutions publiques, parmi lesquelles le ministère de la Défense du pays. Une décision motivée par l'intégration d'équipements de la marque chinoise Huawei au sein de