Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29804 bookmarks
Custom sorting
IA générative : Comment Zalando a sécurisé son assistant mode
IA générative : Comment Zalando a sécurisé son assistant mode
En octobre 2024, Zalando a déployé un assistant dopé à l'IA générative sur ses 25 marchés, offrant des conseils mode personnalisés. Florence...-CybersĂ©curitĂ©
·usine-digitale.fr·
IA générative : Comment Zalando a sécurisé son assistant mode
Huawei aurait pour objectif de graver des puces 3 nm dĂšs 2026 : un exploit pour la Chine
Huawei aurait pour objectif de graver des puces 3 nm dĂšs 2026 : un exploit pour la Chine
Huawei chercherait Ă  graver des puces en 3 nm dĂšs l'annĂ©e prochaine, grĂące Ă  une nouvelle technologie de gravure. L'objectif : arrĂȘter de dĂ©pendre du bon vouloir des États-Unis qui peuvent bloquer les entreprises chinoises. Cela sera-t-il suffisant pour rattraper des entreprises amĂ©ricaines ? Le retour de Trump au
·numerama.com·
Huawei aurait pour objectif de graver des puces 3 nm dĂšs 2026 : un exploit pour la Chine
Les États-Unis craignent un usage militaire des puces amĂ©ricaines en Chine
Les États-Unis craignent un usage militaire des puces amĂ©ricaines en Chine
Washington frappe un nouveau coup dans la guerre des semi-conducteurs : les États-Unis imposent depuis fin mai des restrictions inĂ©dites sur l’exportation des logiciels de conception de puces Ă©lectroniques vers la Chine. Un geste qui vise Ă  prĂ©server la suprĂ©matie technologique occidentale et Ă  empĂȘcher PĂ©kin
·numerama.com·
Les États-Unis craignent un usage militaire des puces amĂ©ricaines en Chine
US Banks Urge SEC to Repeal Cyber Disclosure Rule
US Banks Urge SEC to Repeal Cyber Disclosure Rule
Five major banking associations in the US claim the new SEC cyber incident disclosure rule puts a strain on their resources
·infosecurity-magazine.com·
US Banks Urge SEC to Repeal Cyber Disclosure Rule
Implementing CCM: Identity & Access Management | CSA
Implementing CCM: Identity & Access Management | CSA
Identity & Access Management (IAM) is all about managing identities and access in the cloud. Key principles include least privilege and segregation of duties.
·cloudsecurityalliance.org·
Implementing CCM: Identity & Access Management | CSA
Exploits and vulnerabilities in Q1 2025
Exploits and vulnerabilities in Q1 2025
This report contains statistics on vulnerabilities and published exploits, along with an analysis of the most noteworthy vulnerabilities we observed in the first quarter of 2025.
·securelist.com·
Exploits and vulnerabilities in Q1 2025
Why Take9 Won't Improve Cybersecurity - Schneier on Security
Why Take9 Won't Improve Cybersecurity - Schneier on Security
There’s a new cybersecurity awareness campaign: Take9. The idea is that people—you, me, everyone—should just pause for nine seconds and think more about the link they are planning to click on, the file they are planning to download, or whatever it is they are planning to share. There’s a website—of course—and a video, well-produced and scary. But the campaign won’t do much to improve cybersecurity. The advice isn’t reasonable, it won’t make either individuals or nations appreciably safer, and it deflects blame from the real causes of our cyberspace insecurities...
·schneier.com·
Why Take9 Won't Improve Cybersecurity - Schneier on Security
AI Compliance Challenges for CISOs in 2025 | CSA
AI Compliance Challenges for CISOs in 2025 | CSA
As AI regulations expand globally, CISOs must balance innovation with compliance—adopting frameworks like GDPR, CCPA, and NIST AI RMF to stay secure.
·cloudsecurityalliance.org·
AI Compliance Challenges for CISOs in 2025 | CSA
RSAC Fireside Chat: Human and machine identity risks are converging — and they’re finally visible
RSAC Fireside Chat: Human and machine identity risks are converging — and they’re finally visible
Non-human service accounts have quietly become one of the biggest liabilities in enterprise security. Related: Why identity is the cornerstone of cyber defense These machine credentials — used to automate connections between systems — now outnumber humans by 30 to 1. That gap is likely even wider in cloud-intensive environments. Yet despite their scale, service
·lastwatchdog.com·
RSAC Fireside Chat: Human and machine identity risks are converging — and they’re finally visible
PortSwigger Honored with the King's Award for Enterprise in International Trade
PortSwigger Honored with the King's Award for Enterprise in International Trade
We’re proud to announce that PortSwigger has been awarded the prestigious King’s Award for Enterprise in the category of International Trade - a recognition that reflects our sustained international s
·portswigger.net·
PortSwigger Honored with the King's Award for Enterprise in International Trade
UK MoD Launches New Cyber Warfare Command
UK MoD Launches New Cyber Warfare Command
The UK MoD has unveiled a new Cyber and Electromagnetic Command, which will focus on offensive cyber operations and “electromagnetic warfare” capabilities
·infosecurity-magazine.com·
UK MoD Launches New Cyber Warfare Command
U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams
U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams
The U.S. government today imposed economic sanctions on Funnull Technology Inc., a Philippines-based company that provides computer infrastructure for hundreds of thousands of websites involved in virtual currency investment scams, commonly known as “pig butchering." In January 2025, KrebsOnSecurity detailed

·krebsonsecurity.com·
U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams
Microsoft Authenticator now warns to export passwords before July cutoff
Microsoft Authenticator now warns to export passwords before July cutoff
The Microsoft Authenticator app is now issuing notifications warning that the password autofill feature is being deprecated in July, suggesting users move to Microsoft Edge instead.
·bleepingcomputer.com·
Microsoft Authenticator now warns to export passwords before July cutoff
Outage disrupts some SentinelOne services
Outage disrupts some SentinelOne services
Company executives said there was no indication the incident was the result of a security issue.
·cybersecuritydive.com·
Outage disrupts some SentinelOne services
Offensive OSINT s05e09 - Open Source Surveillance - Anomaly detection
Offensive OSINT s05e09 - Open Source Surveillance - Anomaly detection
The one and only situational awareness platform OS-Surveillance is evolving faster than ever, integrating powerful new data sources and innovative features designed to make real-time geospatial intelligence gathering super intuitive. In today’s episode, I will walk you through the latest enhancements to the platform and share insights into the world of live geospatial OSINT. We will explore why geospatial context is crucial for situational awareness, how to harness real-time data feeds effecti
·offensiveosint.io·
Offensive OSINT s05e09 - Open Source Surveillance - Anomaly detection
Parties behind 2024 Biden AI robocall reach deal in lawsuit | CyberScoop
Parties behind 2024 Biden AI robocall reach deal in lawsuit | CyberScoop
The defendants will increase reporting on spoofing, create a compliance team or AI and conduct regular training for staff on how to identify deceptive messages and the dangers of misinformation in U.S. elections.
·cyberscoop.com·
Parties behind 2024 Biden AI robocall reach deal in lawsuit | CyberScoop