Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

30631 bookmarks
Custom sorting
Massive IPTV piracy service with 28,000 channels taken offline
Massive IPTV piracy service with 28,000 channels taken offline
The Alliance for Creativity and Entertainment (ACE) announced the shutdown of Rare Breed TV, a major illegal IPTV service provider, after reaching a financial settlement with its operators.
·bleepingcomputer.com·
Massive IPTV piracy service with 28,000 channels taken offline
Air France and KLM disclose data breaches impacting customers
Air France and KLM disclose data breaches impacting customers
Air France and KLM announced on Wednesday that attackers had breached a customer service platform and stolen the data of an undisclosed number of customers.
·bleepingcomputer.com·
Air France and KLM disclose data breaches impacting customers
Comment empĂȘcher les prĂ©lĂšvements SEPA frauduleux aprĂšs la fuite d’IBAN chez Bouygues Telecom
Comment empĂȘcher les prĂ©lĂšvements SEPA frauduleux aprĂšs la fuite d’IBAN chez Bouygues Telecom
Bouygues Telecom a rĂ©vĂ©lĂ© avoir Ă©tĂ© victime d’une cyberattaque d’ampleur exceptionnelle : les donnĂ©es personnelles de millions de clients ont Ă©tĂ© dĂ©robĂ©es. CoordonnĂ©es, informations contractuelles, IBAN
 des donnĂ©es sensibles sont dans la nature. La menace : celui de voir un prĂ©lĂšvement SEPA non autorisĂ© apparaĂźtre
·numerama.com·
Comment empĂȘcher les prĂ©lĂšvements SEPA frauduleux aprĂšs la fuite d’IBAN chez Bouygues Telecom
Comment cette puce de sĂ©curitĂ© met en danger des millions d’ordinateurs Dell ?
Comment cette puce de sĂ©curitĂ© met en danger des millions d’ordinateurs Dell ?
Dell est au centre d'une alerte de cybersĂ©curitĂ© depuis le 5 aoĂ»t 2025 et la dĂ©couverte des failles « ReVault », qui touchent plus de 100 modĂšles de ses ordinateurs portables Latitude, Precision et XPS. Ces vulnĂ©rabilitĂ©s dans la puce de sĂ©curitĂ© ControlVault3 permettent Ă  des attaquants d’accĂ©der de façon
·numerama.com·
Comment cette puce de sĂ©curitĂ© met en danger des millions d’ordinateurs Dell ?
Microsoft warns of high-severity flaw in hybrid Exchange deployments
Microsoft warns of high-severity flaw in hybrid Exchange deployments
Microsoft has warned customers to mitigate a high-severity vulnerability in Exchange Server hybrid deployments that could allow attackers to escalate their privileges in Exchange Online cloud environments without leaving any traces.
·bleepingcomputer.com·
Microsoft warns of high-severity flaw in hybrid Exchange deployments
Voici comment vous protéger aprÚs la cyberattaque contre Bouygues Telecom
Voici comment vous protéger aprÚs la cyberattaque contre Bouygues Telecom
Dans la soirĂ©e du 6 aoĂ»t, Bouygues Telecom a rĂ©vĂ©lĂ© avoir Ă©tĂ© victime d’une cyberattaque d’ampleur exceptionnelle : les donnĂ©es personnelles de 6,4 millions de clients ont Ă©tĂ© dĂ©robĂ©es. Des coordonnĂ©es, indications contractuelles, informations bancaires (IBAN) et donnĂ©es personnelles sont affectĂ©es. La cyberattaque
·numerama.com·
Voici comment vous protéger aprÚs la cyberattaque contre Bouygues Telecom
News alert: SpyCloud’s AI-powered platform mimics veteran analysts, speeds threat detection
News alert: SpyCloud’s AI-powered platform mimics veteran analysts, speeds threat detection
Austin, TX, Aug. 6, 2025, CyberNewswire: SpyCloud, the leader in identity threat protection, today announced a significant enhancement to its SaaS Investigations solution: the integration of advanced AI-powered insights that mirror the tradecraft of SpyCloud’s seasoned investigators. Building on the foundation of its industry-leading IDLink identity analytics, this new capability further automates and accelerates complex
·lastwatchdog.com·
News alert: SpyCloud’s AI-powered platform mimics veteran analysts, speeds threat detection
The Desync Delusion: Are You Really Protected Against HTTP Request Smuggling?
The Desync Delusion: Are You Really Protected Against HTTP Request Smuggling?
The Hidden Threat That's Slipping Past Your Security HTTP request smuggling remains one of the most dangerous yet frequently overlooked web vulnerabilities today. Despite being a widely known issue si
·portswigger.net·
The Desync Delusion: Are You Really Protected Against HTTP Request Smuggling?
Akira ransomware abuses CPU tuning tool to disable Microsoft Defender
Akira ransomware abuses CPU tuning tool to disable Microsoft Defender
Akira ransomware is abusing a legitimate Intel CPU tuning driver to turn off Microsoft Defender in attacks from security tools and EDRs running on target machines.
·bleepingcomputer.com·
Akira ransomware abuses CPU tuning tool to disable Microsoft Defender
Black Hat Fireside Chat: Inside the ‘Mind of a Hacker’ — A10’s plan for unified threat detection
Black Hat Fireside Chat: Inside the ‘Mind of a Hacker’ — A10’s plan for unified threat detection
In today's threat landscape, attackers are no longer just exploiting technical flaws — they're exploiting business logic. Think gaps in workflows, permissions, and overlooked assumptions in how applications behave. This subtle shift is creating powerful new footholds for cybercriminals and evading traditional defenses. A10 Networks’ Field CISO Jamison Utter calls this the new front in
·lastwatchdog.com·
Black Hat Fireside Chat: Inside the ‘Mind of a Hacker’ — A10’s plan for unified threat detection