Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31606 bookmarks
Custom sorting
Threat actors abuse X’s Grok AI to spread malicious links
Threat actors abuse X’s Grok AI to spread malicious links
Threat actors are using Grok, X's built-in AI assistant, to bypass link posting restrictions that the platform introduced to reduce malicious advertising.
·bleepingcomputer.com·
Threat actors abuse X’s Grok AI to spread malicious links
CISA guide seeks a unified approach to software ‘ingredients lists’ | CyberScoop
CISA guide seeks a unified approach to software ‘ingredients lists’ | CyberScoop
Compiling an “ingredients list” for software can help organizations reduce cyber risks, avoid fines and save time, among other benefits, a Cybersecurity and Infrastructure Security Agency-led guide published Wednesday advises.
·cyberscoop.com·
CISA guide seeks a unified approach to software ‘ingredients lists’ | CyberScoop
US offers $10 million bounty for info on Russian FSB hackers
US offers $10 million bounty for info on Russian FSB hackers
The U.S. Department of State is offering a reward of up to $10 million for information on three Russian Federal Security Service (FSB) officers involved in cyberattacks targeting U.S. critical infrastructure organizations on behalf of the Russian government.
·bleepingcomputer.com·
US offers $10 million bounty for info on Russian FSB hackers
Hackers use new HexStrike-AI tool to rapidly exploit n-day flaws
Hackers use new HexStrike-AI tool to rapidly exploit n-day flaws
Hackers are increasingly using a new AI-powered offensive security framework called HexStrike-AI in real attacks to exploit newly disclosed n-day flaws.
·bleepingcomputer.com·
Hackers use new HexStrike-AI tool to rapidly exploit n-day flaws
A Look at New AI Control Frameworks from NIST & CSA | CSA
A Look at New AI Control Frameworks from NIST & CSA | CSA
NIST and CSA have each released frameworks for securing AI. Explore the NIST Control Overlays for Securing AI Systems and the CSA AI Controls Matrix.
·cloudsecurityalliance.org·
A Look at New AI Control Frameworks from NIST & CSA | CSA
US sues robot toy maker for exposing children's data to Chinese devs
US sues robot toy maker for exposing children's data to Chinese devs
The U.S. Department of Justice has sued toy maker Apitor Technology for allegedly allowing a Chinese third party to collect children's geolocation data without their knowledge and parental consent.
·bleepingcomputer.com·
US sues robot toy maker for exposing children's data to Chinese devs
SaaS giant Workiva discloses data breach after Salesforce attack
SaaS giant Workiva discloses data breach after Salesforce attack
Workiva, a leading cloud-based SaaS (Software as a Service) provider, notified its customers that attackers who gained access to a third-party customer relationship management (CRM) system stole some of their data.
·bleepingcomputer.com·
SaaS giant Workiva discloses data breach after Salesforce attack
Police disrupts Streameast, the largest pirated sports platform
Police disrupts Streameast, the largest pirated sports platform
The Alliance for Creativity and Entertainment (ACE) and Egyptian authorities have shut down Streameast, the world's largest illegal live sports streaming network, and arrested two people allegedly associated with the operation.
·bleepingcomputer.com·
Police disrupts Streameast, the largest pirated sports platform
Defining Machine Identities & How They Work | CSA
Defining Machine Identities & How They Work | CSA
Explore what machine identities are, why they need protection, and how to manage them effectively to enforce a Zero Trust approach.
·cloudsecurityalliance.org·
Defining Machine Identities & How They Work | CSA
Le fabricant chinois Huawei exclu à la dernière minute d’un contrat européen
Le fabricant chinois Huawei exclu à la dernière minute d’un contrat européen
Le 29 août 2025, le gouvernement espagnol a subitement annulé un contrat visant à renforcer son réseau de fibre optique destiné à plusieurs institutions publiques, parmi lesquelles le ministère de la Défense du pays. Une décision motivée par l'intégration d'équipements de la marque chinoise Huawei au sein de
·numerama.com·
Le fabricant chinois Huawei exclu à la dernière minute d’un contrat européen
They know where you are: Cybersecurity and the shadow world of geolocation
They know where you are: Cybersecurity and the shadow world of geolocation
Geolocation is the invisible attack vector. From Stuxnet to today's APTs, malware now lies dormant until it hits the right place—turning location data into a weapon. Acronis' TRU explains why defenses must evolve beyond VPNs and perimeter controls.
·bleepingcomputer.com·
They know where you are: Cybersecurity and the shadow world of geolocation
Disney to pay $10M to settle claims it collected kids’ data on YouTube
Disney to pay $10M to settle claims it collected kids’ data on YouTube
Disney will pay $10 million to settle claims by the U.S. Federal Trade Commission that it mislabeled videos for children on YouTube, which allowed the collection of kids' personal information without their consent or notification to their parents.
·bleepingcomputer.com·
Disney to pay $10M to settle claims it collected kids’ data on YouTube
Google fixes actively exploited Android flaws in September update
Google fixes actively exploited Android flaws in September update
Google has released the September 2025 security update for Android devices, addressing a total of 84 vulnerabilities, including two actively exploited flaws.
·bleepingcomputer.com·
Google fixes actively exploited Android flaws in September update
Moscou recrute des hackers coupables d’avoir piraté la plateforme éducative de la ville
Moscou recrute des hackers coupables d’avoir piraté la plateforme éducative de la ville
Le 29 août 2025, des responsables politiques moscovites ont annoncé avoir embauché plusieurs pirates informatiques pour travailler sur la plateforme éducative de la ville. Particularité de ce recrutement, tous les candidats retenus ont hacké cette même plateforme quelques années plus tôt. L'École Électronique de
·numerama.com·
Moscou recrute des hackers coupables d’avoir piraté la plateforme éducative de la ville