Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29800 bookmarks
Custom sorting
AWS, Google Drive, Dropbox : quand le cloud est détourné pour espionner des négociations
AWS, Google Drive, Dropbox : quand le cloud est détourné pour espionner des négociations
Depuis fin 2024, une campagne d’espionnage d’une sophistication inédite vise les gouvernements d’Asie du Sud-Est. L’outil au cœur de cette opération : HazyBeacon, un logiciel malveillant capable de se dissimuler dans le trafic légitime des services cloud d’Amazon, afin de collecter des informations sensibles sur des
·numerama.com·
AWS, Google Drive, Dropbox : quand le cloud est détourné pour espionner des négociations
Grok 4 benchmark results: Tops math, ranks second in coding
Grok 4 benchmark results: Tops math, ranks second in coding
Grok 4 is a huge leap from Grok 3, but how good is it compared to other models in the market, such as Gemini 2.5 Pro? We now have answers, thanks to new independent benchmarks.
·bleepingcomputer.com·
Grok 4 benchmark results: Tops math, ranks second in coding
Google fixes actively exploited sandbox escape zero day in Chrome
Google fixes actively exploited sandbox escape zero day in Chrome
Google has released a security update for Chrome to address half a dozen vulnerabilities, one of them actively exploited by attackers to escape the browser's sandbox protection.
·bleepingcomputer.com·
Google fixes actively exploited sandbox escape zero day in Chrome
Cloudflare Blocks Record-Breaking 7.3 Tbps DDoS Attack
Cloudflare Blocks Record-Breaking 7.3 Tbps DDoS Attack
Cloudflare highlighted a huge rise in hyper-volumetric DDoS attacks in Q2 2025, with attackers seeking to overwhelm defenses
·infosecurity-magazine.com·
Cloudflare Blocks Record-Breaking 7.3 Tbps DDoS Attack
Education Sector is Most Exposed to Remote Attacks
Education Sector is Most Exposed to Remote Attacks
CyCognito research finds that a third of education sector APIs, web apps and cloud assets are exposed to attack
·infosecurity-magazine.com·
Education Sector is Most Exposed to Remote Attacks
NodeJS 24.x - Path Traversal
NodeJS 24.x - Path Traversal
NodeJS 24.x - Path Traversal. CVE-2025-27210 . remote exploit for NodeJS platform
·exploit-db.com·
NodeJS 24.x - Path Traversal
GUEST ESSAY: Why IoT security must start at the module—a blueprint for scaling IoT security
GUEST ESSAY: Why IoT security must start at the module—a blueprint for scaling IoT security
A few years ago, a casino was breached via a smart fish tank thermometer. Related: NIST's IoT security standard It’s a now-famous example of how a single overlooked IoT device can become an entry point for attackers — and a cautionary tale that still applies today. The Internet of Things (IoT) is expanding at an
·lastwatchdog.com·
GUEST ESSAY: Why IoT security must start at the module—a blueprint for scaling IoT security
SugarCRM 14.0.0 - SSRF/Code Injection
SugarCRM 14.0.0 - SSRF/Code Injection
SugarCRM 14.0.0 - SSRF/Code Injection. CVE-2024-58258 . webapps exploit for Multiple platform
·exploit-db.com·
SugarCRM 14.0.0 - SSRF/Code Injection
MikroTik RouterOS 7.19.1 - Reflected XSS
MikroTik RouterOS 7.19.1 - Reflected XSS
MikroTik RouterOS 7.19.1 - Reflected XSS. CVE-2025-6563 . remote exploit for Multiple platform
·exploit-db.com·
MikroTik RouterOS 7.19.1 - Reflected XSS
TOTOLINK N300RB 8.54 - Command Execution
TOTOLINK N300RB 8.54 - Command Execution
TOTOLINK N300RB 8.54 - Command Execution. CVE-2025-52089 . hardware exploit for Multiple platform
·exploit-db.com·
TOTOLINK N300RB 8.54 - Command Execution
Langflow 1.2.x - Remote Code Execution (RCE)
Langflow 1.2.x - Remote Code Execution (RCE)
Langflow 1.2.x - Remote Code Execution (RCE). CVE-2025-3248 . webapps exploit for Multiple platform
·exploit-db.com·
Langflow 1.2.x - Remote Code Execution (RCE)
Keras 2.15 - Remote Code Execution (RCE)
Keras 2.15 - Remote Code Execution (RCE)
Keras 2.15 - Remote Code Execution (RCE). CVE-2025-1550 . remote exploit for Python platform
·exploit-db.com·
Keras 2.15 - Remote Code Execution (RCE)
Google AI "Big Sleep" Stops Exploitation of Critical SQLite Vulnerability Before Hackers Act
Google AI "Big Sleep" Stops Exploitation of Critical SQLite Vulnerability Before Hackers Act
Google AI "Big Sleep" Stops Exploitation of Critical SQLite Vulnerability Before Hackers Act | Read more hacking news on The Hacker News cybersecurity news website and learn how to protect against cyberattacks and software vulnerabilities.
·thehackernews.com·
Google AI "Big Sleep" Stops Exploitation of Critical SQLite Vulnerability Before Hackers Act