Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31743 bookmarks
Custom sorting
Google Project Zero Changes Its Disclosure Policy - Schneier on Security
Google Project Zero Changes Its Disclosure Policy - Schneier on Security
Google’s vulnerability finding team is again pushing the envelope of responsible disclosure: Google’s Project Zero team will retain its existing 90+30 policy regarding vulnerability disclosures, in which it provides vendors with 90 days before full disclosure takes place, with a 30-day period allowed for patch adoption if the bug is fixed before the deadline. However, as of July 29, Project Zero will also release limited details about any discovery they make within one week of vendor disclosure. This information will encompass: The vendor or open-source project that received the report ...
·schneier.com·
Google Project Zero Changes Its Disclosure Policy - Schneier on Security
Microsoft 365 apps to soon block file access via FPRPC by default
Microsoft 365 apps to soon block file access via FPRPC by default
Microsoft has announced that the Microsoft 365 apps for Windows will start blocking access to files via the insecure FPRPC legacy authentication protocol by default starting late August.
·bleepingcomputer.com·
Microsoft 365 apps to soon block file access via FPRPC by default
Columbia University data breach impacts nearly 870,000 individuals
Columbia University data breach impacts nearly 870,000 individuals
​An unknown threat actor has stolen the sensitive personal, financial, and health information of nearly 870,000 Columbia University current and former students and employees after breaching the university's network in May.
·bleepingcomputer.com·
Columbia University data breach impacts nearly 870,000 individuals
Black Hat 2025 : comment une invitation Google Calendar piégée peut donner le contrôle de votre maison à un hacker via Gemini
Black Hat 2025 : comment une invitation Google Calendar piégée peut donner le contrôle de votre maison à un hacker via Gemini
Une équipe de chercheurs en cybersécurité a démontré, à l’été 2025, les risques liés à l'intégration du LLM de Google Gemini au cœur des objets connectés du quotidien. Leur recherche, intitulée « Invitation Is All You Need », prouve que l'injection d'un simple prompt malveillant dans une invitation Google Calendar
·numerama.com·
Black Hat 2025 : comment une invitation Google Calendar piégée peut donner le contrôle de votre maison à un hacker via Gemini
Bouygues Telecom Data Breach Exposes 6.4 Million Customer Records
Bouygues Telecom Data Breach Exposes 6.4 Million Customer Records
Bouygues Telecom revealed the attackers stole personal data of 6.4 million customers, including contact details, contractual data and international bank account numbers
·infosecurity-magazine.com·
Bouygues Telecom Data Breach Exposes 6.4 Million Customer Records
Royal and BlackSuit ransomware gangs hit over 450 US companies
Royal and BlackSuit ransomware gangs hit over 450 US companies
The U.S. Department of Homeland Security (DHS) says the cybercrime gang behind the Royal and BlackSuit ransomware operations had breached hundreds of U.S. companies before their infrastructure was dismantled last month.
·bleepingcomputer.com·
Royal and BlackSuit ransomware gangs hit over 450 US companies
Air France and KLM disclosed data breaches following the hack of a third-party platform - Security Affairs
Air France and KLM disclosed data breaches following the hack of a third-party platform - Security Affairs
Air France and KLM warn of a data breach exposing customer data via unauthorized access to a third-party platform. Air France and KLM reported a data breach after hackers accessed a third-party platform, potentially exposing some customers’ personal information. Both airlines confirmed that threat actors gained access to the platform of an unnamed service provider […]
·securityaffairs.com·
Air France and KLM disclosed data breaches following the hack of a third-party platform - Security Affairs
Fake WhatsApp developer libraries hide destructive data-wiping code
Fake WhatsApp developer libraries hide destructive data-wiping code
Two malicious NPM packages posing as WhatsApp development tools have been discovered deploying destructive data-wiping code that recursively deletes files on a developer's computers.
·bleepingcomputer.com·
Fake WhatsApp developer libraries hide destructive data-wiping code
Agentic AI & Zero Trust | Secure Non-Human Assistants | CSA
Agentic AI & Zero Trust | Secure Non-Human Assistants | CSA
AI agents are non-human identities that don’t just hold credentials—they do something with them. How can we apply Zero Trust to these autonomous actors?
·cloudsecurityalliance.org·
Agentic AI & Zero Trust | Secure Non-Human Assistants | CSA
CISA orders fed agencies to patch new Exchange flaw by Monday
CISA orders fed agencies to patch new Exchange flaw by Monday
CISA has issued an emergency directive ordering all Federal Civilian Executive Branch (FCEB) agencies to mitigate a critical Microsoft Exchange hybrid vulnerability tracked as CVE-2025-53786 by Monday morning at 9:00 AM ET.
·bleepingcomputer.com·
CISA orders fed agencies to patch new Exchange flaw by Monday
ChatGPT's GPT-5 models released: everything you need to know
ChatGPT's GPT-5 models released: everything you need to know
After a long wait, GPT-5 is finally rolling out. It's available for free, Plus, Pro and Team users today. This means everyone gets to try GPT-5 today, but paid users get higher limits.
·bleepingcomputer.com·
ChatGPT's GPT-5 models released: everything you need to know
AI wrote my code and all I got was this broken prototype
AI wrote my code and all I got was this broken prototype
Can AI really write safer code? Martin dusts off his software engineer skills to put it it to the test. Find out what AI code failed at, and what it was surprisingly good at. Also, we discuss new research on how AI LLM models can be used to assist in the reverse engineering of malware.
·blog.talosintelligence.com·
AI wrote my code and all I got was this broken prototype
New EDR killer tool used by eight different ransomware groups
New EDR killer tool used by eight different ransomware groups
A new Endpoint Detection and Response (EDR) killer that is considered to be the evolution of 'EDRKillShifter,' developed by RansomHub, has been observed in attacks by eight different ransomware gangs.
·bleepingcomputer.com·
New EDR killer tool used by eight different ransomware groups