Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31294 bookmarks
Custom sorting
L’Amérique prévient la Silicon Valley : « ne cédez pas à l’Europe sur le chiffrement »
L’Amérique prévient la Silicon Valley : « ne cédez pas à l’Europe sur le chiffrement »
Les géants de la tech doivent résister aux demandes visant à affaiblir le chiffrement. Voilà le rappel que vient de faire une autorité américaine aux grandes entreprises de la Silicon Valley, en nommant spécifiquement certaines législations récentes en Europe. Motif ? Cela pourrait nuire aux droits des Américains.
·numerama.com·
L’Amérique prévient la Silicon Valley : « ne cédez pas à l’Europe sur le chiffrement »
Tech Manufacturer Data I/O Hit by Ransomware
Tech Manufacturer Data I/O Hit by Ransomware
Data I/O has revealed operational disruption following a ransomware breach that forced it to take some systems offline
·infosecurity-magazine.com·
Tech Manufacturer Data I/O Hit by Ransomware
Lingdang CRM 8.6.4.7 - SQL Injection
Lingdang CRM 8.6.4.7 - SQL Injection
Lingdang CRM 8.6.4.7 - SQL Injection. CVE-2025-9140 . webapps exploit for Multiple platform
·exploit-db.com·
Lingdang CRM 8.6.4.7 - SQL Injection
Managing cryptographic keys and secrets | Cyber.gov.au
Managing cryptographic keys and secrets | Cyber.gov.au
This guide has been developed to help organisational personnel in understanding the threat environment and the value of implementing secure keys and secrets management to make better informed decisions.
·cyber.gov.au·
Managing cryptographic keys and secrets | Cyber.gov.au
Surge in coordinated scans targets Microsoft RDP auth servers
Surge in coordinated scans targets Microsoft RDP auth servers
Internet intelligence firm GreyNoise reports that it has recorded a significant spike in scanning activity consisting of nearly 1,971 IP addresses probing Microsoft Remote Desktop Web Access and RDP Web Client authentication portals in unison, suggesting a coordinated reconnaissance campaign.
·bleepingcomputer.com·
Surge in coordinated scans targets Microsoft RDP auth servers
Docker fixes critical Desktop flaw allowing container escapes
Docker fixes critical Desktop flaw allowing container escapes
Docker fixed a critical flaw in Docker Desktop app for Windows and macOS that could potentially allow to escape the confines of a container
·securityaffairs.com·
Docker fixes critical Desktop flaw allowing container escapes
New AI attack hides data-theft prompts in downscaled images
New AI attack hides data-theft prompts in downscaled images
Researchers have developed a novel attack that steals user data by injecting malicious prompts in images processed by AI systems before delivering them to a large language model.
·bleepingcomputer.com·
New AI attack hides data-theft prompts in downscaled images
Farmers Insurance data breach impacts 1.1M people after Salesforce attack
Farmers Insurance data breach impacts 1.1M people after Salesforce attack
U.S. insurance giant Farmers Insurance has disclosed a data breach impacting 1.1 million customers, with BleepingComputer learning that the data was stolen in the widespread Salesforce attacks.
·bleepingcomputer.com·
Farmers Insurance data breach impacts 1.1M people after Salesforce attack
Auchan retailer data breach impacts hundreds of thousands of customers
Auchan retailer data breach impacts hundreds of thousands of customers
French retailer Auchan is informing that some sensitive data associated with loyalty accounts of several hundred thousand of its customers was exposed in a cyberattack.
·bleepingcomputer.com·
Auchan retailer data breach impacts hundreds of thousands of customers
News alert: Attaxion launches agentless traffic monitoring to flag threats and prioritize risk
News alert: Attaxion launches agentless traffic monitoring to flag threats and prioritize risk
Dover, Del., Aug. 25, 2025, CyberNewswire—Attaxion announces the addition of the Agentless Traffic Monitoring capability to its exposure management platform. Agentless Traffic Monitoring is a new capability designed to give cybersecurity teams actionable visibility into network traffic flowing to and from their digital assets – all without the need to deploy any agents or sensors
·lastwatchdog.com·
News alert: Attaxion launches agentless traffic monitoring to flag threats and prioritize risk
Malicious Android apps with 19M installs removed from Google Play
Malicious Android apps with 19M installs removed from Google Play
Seventy-seven malicious Android apps containing different types of malware were found on Google Play after being downloaded more than 19 million times.
·bleepingcomputer.com·
Malicious Android apps with 19M installs removed from Google Play