Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29765 bookmarks
Custom sorting
Windows 11 now uses JScript9Legacy engine for improved security
Windows 11 now uses JScript9Legacy engine for improved security
Microsoft announced that it has replaced the default scripting engine JScript with the newer and more secure JScript9Legacy on Windows 11 version 24H2 and later.
·bleepingcomputer.com·
Windows 11 now uses JScript9Legacy engine for improved security
Patch, track, repeat
Patch, track, repeat
Thorsten takes stock of a rapidly evolving vulnerability landscape: record-setting CVE publication rates, the growing fragmentation of reporting systems, and why consistent tracking and patching remain critical as we move through 2025.
·blog.talosintelligence.com·
Patch, track, repeat
UK Charges Four in ‘Scattered Spider’ Ransom Group
UK Charges Four in ‘Scattered Spider’ Ransom Group
Authorities in the United Kingdom this week arrested four alleged members of "Scattered Spider," a prolific data theft and extortion group whose recent victims include multiple airlines and the U.K. retail chain Marks & Spencer.
·krebsonsecurity.com·
UK Charges Four in ‘Scattered Spider’ Ransom Group
Asus and Adobe vulnerabilities
Asus and Adobe vulnerabilities
Cisco Talos’ Vulnerability Discovery & Research team recently disclosed two vulnerabilities each in Asus Armoury Crate and Adobe Acrobat products.
·blog.talosintelligence.com·
Asus and Adobe vulnerabilities
News alert: INE Security debuts advanced eMAPT certification to close mobile security talent gap
News alert: INE Security debuts advanced eMAPT certification to close mobile security talent gap
Cary, NC, July 10, 2025, CyberNewsire—INE Security, a leading provider of cybersecurity education and cybersecurity certifications, today launched its significantly enhanced eMAPT (Mobile Application Penetration Testing) certification. The updated certification delivers the industry's most comprehensive and practical approach to mobile application security testing. CSO Magazine recently recognized eMAPT among the Top 16 OffSec, pen-testing, and
·lastwatchdog.com·
News alert: INE Security debuts advanced eMAPT certification to close mobile security talent gap
Introducing the CSA AI Controls Matrix | CSA
Introducing the CSA AI Controls Matrix | CSA
The AI Controls Matrix helps organizations securely develop, implement, and use AI technologies. Learn why such a framework is essential in today’s landscape.
·cloudsecurityalliance.org·
Introducing the CSA AI Controls Matrix | CSA
« Quelqu’un d’autre a une coupure d’électricité ? » : qu’est-ce qui se passe quand une crise cyber se déclenche ?
« Quelqu’un d’autre a une coupure d’électricité ? » : qu’est-ce qui se passe quand une crise cyber se déclenche ?
Nous avons eu l'opportunité de vivre de l'intérieur une crise cyber majeure, du moins en simulation, dans des conditions proches du réel. Une méthode d'entraînement inspirée des stratégies militaires, de plus en plus adoptée dans l'univers de la cybersécurité, jusqu'au ministère des Armées. Esplanade de la Défense,
·numerama.com·
« Quelqu’un d’autre a une coupure d’électricité ? » : qu’est-ce qui se passe quand une crise cyber se déclenche ?
PerfektBlue BlueTooth flaws impact Mercedes, Volkswagen, Skoda cars
PerfektBlue BlueTooth flaws impact Mercedes, Volkswagen, Skoda cars
Four vulnerabilities dubbed PerfektBlue and affecting the BlueSDK Bluetooth stack from OpenSynergy can be exploited to achieve remote code execution and potentially allow access to critical elements in vehicles from multiple vendors, including Mercedes-Benz AG, Volkswagen, and Skoda.
·bleepingcomputer.com·
PerfektBlue BlueTooth flaws impact Mercedes, Volkswagen, Skoda cars
How Your Zero Trust Environment Affects Compliance | CSA
How Your Zero Trust Environment Affects Compliance | CSA
Explore the effects of Zero Trust implementation on your compliance assessments. Understand what to expect upon your first audit cycle with Zero Trust.
·cloudsecurityalliance.org·
How Your Zero Trust Environment Affects Compliance | CSA
LLMs Fall Short in Vulnerability Discovery and Exploitation
LLMs Fall Short in Vulnerability Discovery and Exploitation
Forescout found that most LLMs are unreliable in vulnerability research and exploit tasks, with threat actors still skeptical about using tools for these purposes
·infosecurity-magazine.com·
LLMs Fall Short in Vulnerability Discovery and Exploitation
FBI's CJIS demystified: Best practices for passwords, MFA & access control
FBI's CJIS demystified: Best practices for passwords, MFA & access control
FBI's Criminal Justice Information Services (CJIS) compliance isn't optional when handling law enforcement data. From MFA to password hygiene, see how Specops Software helps meet FBI standards while also securing your Windows Active Directory.
·bleepingcomputer.com·
FBI's CJIS demystified: Best practices for passwords, MFA & access control
McDonald’s AI bot spills data on job applicants
McDonald’s AI bot spills data on job applicants
The job applicants' personal information could be accessed by simply guessing a username and using the password “12345.”
·malwarebytes.com·
McDonald’s AI bot spills data on job applicants
Four arrested in UK over M&S, Co-op, Harrod cyberattacks
Four arrested in UK over M&S, Co-op, Harrod cyberattacks
The UK's National Crime Agency (NCA) arrested four people suspected of being involved in cyberattacks on major retailers in the country, including Marks & Spencer, Co-op, and Harrods.
·bleepingcomputer.com·
Four arrested in UK over M&S, Co-op, Harrod cyberattacks