Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31472 bookmarks
Custom sorting
GAO-25-107283 Analysis: Defense Supply Chain Risks Are Escalating - interos.ai
GAO-25-107283 Analysis: Defense Supply Chain Risks Are Escalating - interos.ai
The defense supply chain is stronger with continuous, real-time monitoring. GAO‑25‑107283, a report recently released by the U.S. Government Accountability Office (GAO), highlights critical supply chain vulnerabilities across the Department of Defense’s 200,000+ supplier ecosystem. Areas for improvement include limited traceability of foreign-origin materials, visibility into lower-tier vendors, and streamlined contractual reporting. The dangers aren’t....
·interos.ai·
GAO-25-107283 Analysis: Defense Supply Chain Risks Are Escalating - interos.ai
Microsoft to enforce MFA for Azure resource management in October
Microsoft to enforce MFA for Azure resource management in October
Starting in October, Microsoft will enforce multi-factor authentication (MFA) for all Azure resource management actions to protect Azure clients from unauthorized access attempts.
·bleepingcomputer.com·
Microsoft to enforce MFA for Azure resource management in October
Microsoft says recent Windows update didn't kill your SSD
Microsoft says recent Windows update didn't kill your SSD
Microsoft has found no link between the August 2025 KB5063878 security update and customer reports of failure and data corruption issues affecting solid-state drives (SSDs) and hard disk drives (HDDs).
·bleepingcomputer.com·
Microsoft says recent Windows update didn't kill your SSD
Experts warn of actively exploited FreePBX zero-day
Experts warn of actively exploited FreePBX zero-day
Sangoma warns of an actively exploited FreePBX zero-day affecting systems with publicly exposed admin control panels.
·securityaffairs.com·
Experts warn of actively exploited FreePBX zero-day
Extorsion automatisée, chantage ciblé… quand Claude Code pilote une immense opération de « vibe hacking »
Extorsion automatisée, chantage ciblé… quand Claude Code pilote une immense opération de « vibe hacking »
La société américaine Anthropic dévoile une campagne de vols de données orchestrée à l’aide de son modèle de génération de code Claude Code. En un mois, l'opération aurait mis en danger 17 organisations. Le mode opératoire repose sur ce qu’Anthropic désigne comme du vibe hacking. Vibe coding. Voilà le terme tendance
·numerama.com·
Extorsion automatisée, chantage ciblé… quand Claude Code pilote une immense opération de « vibe hacking »
Achieving Resilience through Zero Trust | CSA
Achieving Resilience through Zero Trust | CSA
Zero Trust’s foundational concept of “always verify” is essential to building resilience. Reduce the blast radius to reduce the impact of incidents.
·cloudsecurityalliance.org·
Achieving Resilience through Zero Trust | CSA
Ransomware gang takedowns causing explosion of new, smaller groups
Ransomware gang takedowns causing explosion of new, smaller groups
The ransomware ecosystem continues to splinter, with new gangs proliferating in the wake of law enforcement takedowns that have scattered affiliates and prompted criminal rebrands.
·therecord.media·
Ransomware gang takedowns causing explosion of new, smaller groups
Baggage Tag Scam - Schneier on Security
Baggage Tag Scam - Schneier on Security
I just heard about this: There’s a travel scam warning going around the internet right now: You should keep your baggage tags on your bags until you get home, then shred them, because scammers are using luggage tags to file fraudulent claims for missing baggage with the airline. First, the scam is possible. I had a bag destroyed by baggage handlers on a recent flight, and all the information I needed to file a claim was on my luggage tag. I have no idea if I will successfully get any money from the airline, or what form it will be in, or how it will be tied to my name, but at least the first step is possible...
·schneier.com·
Baggage Tag Scam - Schneier on Security
Understanding HIPAA: Key Regulations and Compliance | CSA
Understanding HIPAA: Key Regulations and Compliance | CSA
HIPAA ensures the confidential handling of protected health information and mandates stringent guidelines for the privacy and security of patient data.
·cloudsecurityalliance.org·
Understanding HIPAA: Key Regulations and Compliance | CSA
Google: Salesloft Drift breach hits all integrations
Google: Salesloft Drift breach hits all integrations
Google warns that Salesloft Drift OAuth breach affects all integrations, not just Salesforce. All tokens should be treated as compromised.
·securityaffairs.com·
Google: Salesloft Drift breach hits all integrations
How attackers adapt to built-in macOS protection
How attackers adapt to built-in macOS protection
We analyze the built-in protection mechanisms in macOS: how they work, how threat actors can attack them or deceive users, and how to detect such attacks.
·securelist.com·
How attackers adapt to built-in macOS protection
TransUnion Data Breach Impacts 4.5 Million US Customers
TransUnion Data Breach Impacts 4.5 Million US Customers
The credit rating giant revealed that the breach, which occurred on July 28, was caused by unauthorized access to a third-party application
·infosecurity-magazine.com·
TransUnion Data Breach Impacts 4.5 Million US Customers
Pour décrocher une place à la fac, il hacke la plateforme éducative de toute la région et modifie ses notes
Pour décrocher une place à la fac, il hacke la plateforme éducative de toute la région et modifie ses notes
Les autorités espagnoles ont annoncé le 25 août 2025 avoir procédé à l'arrestation d'un jeune homme de 21 ans en Andalousie. Suspecté d'avoir piraté la plateforme éducative de la région, l'étudiant aurait entre autres modifié ses notes pour décrocher une place dans l'enseignement supérieur. Mars 2025, une première
·numerama.com·
Pour décrocher une place à la fac, il hacke la plateforme éducative de toute la région et modifie ses notes