Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31742 bookmarks
Custom sorting
Ghost CMS 5.59.1 - Arbitrary File Read
Ghost CMS 5.59.1 - Arbitrary File Read
Ghost CMS 5.59.1 - Arbitrary File Read. CVE-2023-40028 . webapps exploit for Multiple platform
·exploit-db.com·
Ghost CMS 5.59.1 - Arbitrary File Read
Ghost CMS 5.42.1 - Path Traversal
Ghost CMS 5.42.1 - Path Traversal
Ghost CMS 5.42.1 - Path Traversal. CVE-2023-32235 . webapps exploit for Multiple platform
·exploit-db.com·
Ghost CMS 5.42.1 - Path Traversal
OpenAI is testing 3,000-per-week limit for GPT-5 Thinking
OpenAI is testing 3,000-per-week limit for GPT-5 Thinking
OpenAI has responded to criticism that it shipped GPT-5 with token limits to minimize cost and maximize profit not with words, but rather with a new 3,000-per-week limit.
·bleepingcomputer.com·
OpenAI is testing 3,000-per-week limit for GPT-5 Thinking
Microsoft tests cloud-based Windows 365 disaster recovery PCs
Microsoft tests cloud-based Windows 365 disaster recovery PCs
Microsoft has announced the limited public preview of Windows 365 Reserve, a service that provides temporary desktop access to pre-configured cloud PCs for employees whose computers have become unavailable due to cyberattacks, hardware issues, or software problems.
·bleepingcomputer.com·
Microsoft tests cloud-based Windows 365 disaster recovery PCs
Comment Google se retrouve victime d’une cyberattaque qu’il avait lui-même documentée
Comment Google se retrouve victime d’une cyberattaque qu’il avait lui-même documentée
Le 8 août 2025, plusieurs dirigeants de petites et moyennes entreprises reçoivent un email inattendu de Google. Le géant américain les informe qu’une fuite a exposé leurs coordonnées, ainsi que des notes relatives à leurs activités commerciales. En cause : une cyberattaque ayant permis à des pirates d’accéder à l’une
·numerama.com·
Comment Google se retrouve victime d’une cyberattaque qu’il avait lui-même documentée
The Rise of Native Phishing: Microsoft 365 Apps Abused in Attacks
The Rise of Native Phishing: Microsoft 365 Apps Abused in Attacks
Native phishing turns trusted tools into attack delivery systems. Varonis shows how attackers weaponize Microsoft 365 apps, like OneNote & OneDrive, to send convincing internal lures and how to spot them before they spread.
·bleepingcomputer.com·
The Rise of Native Phishing: Microsoft 365 Apps Abused in Attacks
New WinRAR Zero-Day Exploited by RomCom Hackers
New WinRAR Zero-Day Exploited by RomCom Hackers
A flaw in WinRAR, tracked as CVE-2025-8088, has been exploited by the RomCom group to deploy malware
·infosecurity-magazine.com·
New WinRAR Zero-Day Exploited by RomCom Hackers
CyberScoop 50 reveals 2025 winners; honors Amit Yoran with lifetime award | CyberScoop
CyberScoop 50 reveals 2025 winners; honors Amit Yoran with lifetime award | CyberScoop
The cybersecurity world stands immeasurably stronger because of the vision, expertise, and leadership of Amit Yoran. Throughout his distinguished career, Amit fundamentally shaped the field of cybersecurity, setting new standards for excellence, innovation, and resilience. We are proud to honor Amit’s life with our first-ever lifetime CyberScoop 50 award.
·cyberscoop.com·
CyberScoop 50 reveals 2025 winners; honors Amit Yoran with lifetime award | CyberScoop
Announcing the winners of the 2025 CyberScoop 50 awards | CyberScoop
Announcing the winners of the 2025 CyberScoop 50 awards | CyberScoop
Scoop News Group is thrilled to honor the standout winners of the 2025 CyberScoop 50 Awards, recognizing the leaders who protect our networks, data, and infrastructure while driving innovation across cybersecurity.
·cyberscoop.com·
Announcing the winners of the 2025 CyberScoop 50 awards | CyberScoop
Cisco ISE 3.0 - Authorization Bypass
Cisco ISE 3.0 - Authorization Bypass
Cisco ISE 3.0 - Authorization Bypass. CVE-2025-20125 . remote exploit for Multiple platform
·exploit-db.com·
Cisco ISE 3.0 - Authorization Bypass
MuddyWater’s DarkBit ransomware cracked for free data recovery
MuddyWater’s DarkBit ransomware cracked for free data recovery
Cybersecurity firm Profero cracked the encryption of the DarkBit ransomware gang's encryptors, allowing them to recover a victim's files for free without paying a ransom.
·bleepingcomputer.com·
MuddyWater’s DarkBit ransomware cracked for free data recovery