Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

30707 bookmarks
Custom sorting
FTC: older adults lost record $700 million to scammers in 2024
FTC: older adults lost record $700 million to scammers in 2024
Americans aged 60 and older lost a staggering $700 million to online scams in 2024, marking a sharp rise in fraud targeting seniors, according to the Federal Trade Commission.
·bleepingcomputer.com·
FTC: older adults lost record $700 million to scammers in 2024
DCTV
DCTV
DEFCON TV Information
·dctv.defcon.org·
DCTV
U.S. Judiciary confirms breach of court electronic records service
U.S. Judiciary confirms breach of court electronic records service
The U.S. Federal Judiciary confirms that it suffered a cyberattack on its electronic case management systems hosting confidential court documents and is strengthening cybersecurity measures.
·bleepingcomputer.com·
U.S. Judiciary confirms breach of court electronic records service
Australian Regulator Sues Optus Over 2022 Data Breach
Australian Regulator Sues Optus Over 2022 Data Breach
The Information Commissioner has applied for a civil penalty against Optus following the 2022 data breach that exposed the personal details of 9.5 million Australians
·infosecurity-magazine.com·
Australian Regulator Sues Optus Over 2022 Data Breach
Strategic Implementation of the CSA AI Controls Matrix | CSA
Strategic Implementation of the CSA AI Controls Matrix | CSA
CSA's AI Controls Matrix represents a paradigm shift in AI governance, providing the first comprehensive framework designed for trustworthy AI implementation.
·cloudsecurityalliance.org·
Strategic Implementation of the CSA AI Controls Matrix | CSA
Comment pirater un satellite ? Ce n'est peut-être pas aussi dur qu'on l'imagine - Numerama
Comment pirater un satellite ? Ce n'est peut-être pas aussi dur qu'on l'imagine - Numerama
Lors d'une conférence au Black Hat à Las Vegas, deux chercheurs allemands ont réalisé une démonstration marquante sur la cybersécurité spatiale. Pirater un satellite moderne pourrait s’avérer bien plus simple et bien moins coûteux que de le détruire avec un missile. Une démonstration renforcée par un contexte. Le
·numerama.com·
Comment pirater un satellite ? Ce n'est peut-être pas aussi dur qu'on l'imagine - Numerama
Google Project Zero Changes Its Disclosure Policy - Schneier on Security
Google Project Zero Changes Its Disclosure Policy - Schneier on Security
Google’s vulnerability finding team is again pushing the envelope of responsible disclosure: Google’s Project Zero team will retain its existing 90+30 policy regarding vulnerability disclosures, in which it provides vendors with 90 days before full disclosure takes place, with a 30-day period allowed for patch adoption if the bug is fixed before the deadline. However, as of July 29, Project Zero will also release limited details about any discovery they make within one week of vendor disclosure. This information will encompass: The vendor or open-source project that received the report ...
·schneier.com·
Google Project Zero Changes Its Disclosure Policy - Schneier on Security
Microsoft 365 apps to soon block file access via FPRPC by default
Microsoft 365 apps to soon block file access via FPRPC by default
Microsoft has announced that the Microsoft 365 apps for Windows will start blocking access to files via the insecure FPRPC legacy authentication protocol by default starting late August.
·bleepingcomputer.com·
Microsoft 365 apps to soon block file access via FPRPC by default
Columbia University data breach impacts nearly 870,000 individuals
Columbia University data breach impacts nearly 870,000 individuals
​An unknown threat actor has stolen the sensitive personal, financial, and health information of nearly 870,000 Columbia University current and former students and employees after breaching the university's network in May.
·bleepingcomputer.com·
Columbia University data breach impacts nearly 870,000 individuals
Black Hat 2025 : comment une invitation Google Calendar piégée peut donner le contrôle de votre maison à un hacker via Gemini
Black Hat 2025 : comment une invitation Google Calendar piégée peut donner le contrôle de votre maison à un hacker via Gemini
Une équipe de chercheurs en cybersécurité a démontré, à l’été 2025, les risques liés à l'intégration du LLM de Google Gemini au cœur des objets connectés du quotidien. Leur recherche, intitulée « Invitation Is All You Need », prouve que l'injection d'un simple prompt malveillant dans une invitation Google Calendar
·numerama.com·
Black Hat 2025 : comment une invitation Google Calendar piégée peut donner le contrôle de votre maison à un hacker via Gemini
Bouygues Telecom Data Breach Exposes 6.4 Million Customer Records
Bouygues Telecom Data Breach Exposes 6.4 Million Customer Records
Bouygues Telecom revealed the attackers stole personal data of 6.4 million customers, including contact details, contractual data and international bank account numbers
·infosecurity-magazine.com·
Bouygues Telecom Data Breach Exposes 6.4 Million Customer Records
Royal and BlackSuit ransomware gangs hit over 450 US companies
Royal and BlackSuit ransomware gangs hit over 450 US companies
The U.S. Department of Homeland Security (DHS) says the cybercrime gang behind the Royal and BlackSuit ransomware operations had breached hundreds of U.S. companies before their infrastructure was dismantled last month.
·bleepingcomputer.com·
Royal and BlackSuit ransomware gangs hit over 450 US companies