Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29804 bookmarks
Custom sorting
Qualcomm fixes three Adreno GPU zero-days exploited in attacks
Qualcomm fixes three Adreno GPU zero-days exploited in attacks
Qualcomm has released security patches for three zero-day vulnerabilities in the Adreno Graphics Processing Unit (GPU) driver that impact dozens of chipsets and are actively exploited in targeted attacks.
·bleepingcomputer.com·
Qualcomm fixes three Adreno GPU zero-days exploited in attacks
Vers une recrudescence des piratages avec clonage de la voix
Vers une recrudescence des piratages avec clonage de la voix
Une cyberattaque visant Susie Wiles, cheffe de cabinet de Trump, fait actuellement l'objet d'une enquête des autorités américaines. Des pirates...-Cybersécurité
·usine-digitale.fr·
Vers une recrudescence des piratages avec clonage de la voix
SHARED INTEL Q&A: When every IoT Device and AI assistant has an identity — who’s in control?
SHARED INTEL Q&A: When every IoT Device and AI assistant has an identity — who’s in control?
As enterprise adoption of generative AI accelerates, security teams face a new identity dilemma — not just more users and devices, but a growing swarm of non-human agents and autonomous systems requesting access to sensitive assets. Related: Top 10 Microsoft Copilot risks At the same time, traditional identity and access management (IAM) tools are buckling
·lastwatchdog.com·
SHARED INTEL Q&A: When every IoT Device and AI assistant has an identity — who’s in control?
What does Facebook know about me? (Lock and Code S06E11)
What does Facebook know about me? (Lock and Code S06E11)
This week on the Lock and Code podcast, host David Ruiz digs into his own Facebook data to see what the social media giant knows about him.
·malwarebytes.com·
What does Facebook know about me? (Lock and Code S06E11)
Two flaws in vBulletin forum software are under attack
Two flaws in vBulletin forum software are under attack
Experts found two vulnerabilities in the vBulletin forum software, one of which is already being exploited in real-world attacks.
·securityaffairs.com·
Two flaws in vBulletin forum software are under attack
Exploit details for max severity Cisco IOS XE flaw now public
Exploit details for max severity Cisco IOS XE flaw now public
Technical details about a maximum-severity Cisco IOS XE WLC arbitrary file upload flaw tracked as CVE-2025-20188 have been made publicly available, bringing us closer to a working exploit.
·bleepingcomputer.com·
Exploit details for max severity Cisco IOS XE flaw now public
Top counter antivirus service disrupted in global takedown | CyberScoop
Top counter antivirus service disrupted in global takedown | CyberScoop
AVCheck and related crypting services helped cybercriminals make malware difficult to detect and confirm that malware could slip through various antivirus tools undetected, officials said.
·cyberscoop.com·
Top counter antivirus service disrupted in global takedown | CyberScoop
Hackers are exploiting critical flaw in vBulletin forum software
Hackers are exploiting critical flaw in vBulletin forum software
Two critical vulnerabilities affecting the open-source forum software vBulletin have been discovered, with one confirmed to be actively exploited in the wild.
·bleepingcomputer.com·
Hackers are exploiting critical flaw in vBulletin forum software
Senate Democrats urge DHS to reconstitute CSRB
Senate Democrats urge DHS to reconstitute CSRB
The lawmakers said the Cyber Safety Review Board’s work has made government agencies and private businesses more secure.
·cybersecuritydive.com·
Senate Democrats urge DHS to reconstitute CSRB
Police takes down AVCheck site used by cybercriminals to scan malware
Police takes down AVCheck site used by cybercriminals to scan malware
An international law enforcement operation has taken down AVCheck, a service used by cybercriminals to test whether their malware is detected by commercial antivirus software before deploying it in the wild.
·bleepingcomputer.com·
Police takes down AVCheck site used by cybercriminals to scan malware
Comment des hackers chinois ont transformé Google Calendar en centre de pilotage de cyberattaques
Comment des hackers chinois ont transformé Google Calendar en centre de pilotage de cyberattaques
Google Threat Intelligence dévoile une campagne de cyberattaques inédite orchestrée par le groupe chinois APT41. Leur arme secrète ? Google Calendar, détourné pour servir de centre de commande et de contrôle à distance. Explications. C'est un rapport publié le 28 mai par Google Threat Intelligence qui alerte une
·numerama.com·
Comment des hackers chinois ont transformé Google Calendar en centre de pilotage de cyberattaques
Getting Exposure Management Right: Insights from 500 CISOs
Getting Exposure Management Right: Insights from 500 CISOs
Pentesting isn't just about finding flaws — it's about knowing which ones matter. Pentera's 2025 State of Pentesting report uncovers which assets attackers target most, where security teams are making progress, and which exposures still fly under the radar. Focus on reducing breach impact, not just breach count.
·bleepingcomputer.com·
Getting Exposure Management Right: Insights from 500 CISOs
Germany doxxes Conti ransomware and TrickBot ring leader
Germany doxxes Conti ransomware and TrickBot ring leader
The Federal Criminal Police Office of Germany (Bundeskriminalamt or BKA) claims that Stern, the leader of the Trickbot and Conti cybercrime gangs, is a 36-year-old Russian named Vitaly Nikolaevich Kovalev.
·bleepingcomputer.com·
Germany doxxes Conti ransomware and TrickBot ring leader