Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

30274 bookmarks
Custom sorting
7 Steps to Take After a Credential-Based Attack
7 Steps to Take After a Credential-Based Attack
Hackers don't break in—they log in. Credential-based attacks now fuel nearly half of all breaches. Learn how to scan your Active Directory for compromised passwords and stop attackers before they strike.
·bleepingcomputer.com·
7 Steps to Take After a Credential-Based Attack
Data Security Evolution: From DLP to DSPM | CSA
Data Security Evolution: From DLP to DSPM | CSA
Explore how Data Security Posture Management (DSPM) enhances traditional DLP by offering real-time visibility, risk assessment, and automated protection.
·cloudsecurityalliance.org·
Data Security Evolution: From DLP to DSPM | CSA
7 Steps to Take After a Credential-Based cyberattack
7 Steps to Take After a Credential-Based cyberattack
Hackers don't break in—they log in. Credential-based attacks now fuel nearly half of all breaches. Learn how to scan your Active Directory for compromised passwords and stop attackers before they strike.
·bleepingcomputer.com·
7 Steps to Take After a Credential-Based cyberattack
Chinese hackers target Russian govt with upgraded RAT malware
Chinese hackers target Russian govt with upgraded RAT malware
Chinese-speaking IronHusky hackers are targeting Russian and Mongolian government organizations using upgraded MysterySnail remote access trojan (RAT) malware.
·bleepingcomputer.com·
Chinese hackers target Russian govt with upgraded RAT malware
Cisco Webex bug lets hackers gain code execution via meeting links
Cisco Webex bug lets hackers gain code execution via meeting links
Cisco has released security updates for a high-severity Webex vulnerability that allows unauthenticated attackers to gain client-side remote code execution using malicious meeting invite links.
·bleepingcomputer.com·
Cisco Webex bug lets hackers gain code execution via meeting links
Defending Against SSRF Attacks in Cloud Native Apps | CSA
Defending Against SSRF Attacks in Cloud Native Apps | CSA
A Server-Side Request Forgery (SSRF) attack occurs when an attacker tricks a server into making requests to other services. Review a real-world SSRF attack.
·cloudsecurityalliance.org·
Defending Against SSRF Attacks in Cloud Native Apps | CSA
Inventio Lite 4 - SQL Injection
Inventio Lite 4 - SQL Injection
Inventio Lite 4 - SQL Injection. CVE-2024-44541 . webapps exploit for PHP platform
·exploit-db.com·
Inventio Lite 4 - SQL Injection
UJCMS 9.6.3 - User Enumeration via IDOR
UJCMS 9.6.3 - User Enumeration via IDOR
UJCMS 9.6.3 - User Enumeration via IDOR. CVE-2024-12483 . webapps exploit for Multiple platform
·exploit-db.com·
UJCMS 9.6.3 - User Enumeration via IDOR
Tatsu 3.3.11 - Unauthenticated RCE
Tatsu 3.3.11 - Unauthenticated RCE
Tatsu 3.3.11 - Unauthenticated RCE. CVE-2021-25094 . webapps exploit for PHP platform
·exploit-db.com·
Tatsu 3.3.11 - Unauthenticated RCE
Les applications pirates débarquent en masse sur les iPhone européens
Les applications pirates débarquent en masse sur les iPhone européens
Le Digital Markets Act, le règlement européen sur le droit du numérique, force Apple à autoriser l'installation de magasins concurrents de l'App Store sur ses iPhone et iPad. AltStore Classic, disponible depuis le 17 avril, permet d'installer des applications illégales avec du contenu pirate. Des mois avant l'entrée
·numerama.com·
Les applications pirates débarquent en masse sur les iPhone européens
Moving CVEs past one-nation control
Moving CVEs past one-nation control
A near-miss episode of attempted defunding spotlights a need for a better way
·news.sophos.com·
Moving CVEs past one-nation control
Moving CVEs past one-nation control
Moving CVEs past one-nation control
A near-miss episode of attempted defunding spotlights a need for a better way
·news.sophos.com·
Moving CVEs past one-nation control
Entertainment services giant Legends International discloses data breach
Entertainment services giant Legends International discloses data breach
Entertainment venue management firm Legends International warns it suffered a data breach in November 2024, which has impacted employees and people who visited venues under its management.
·bleepingcomputer.com·
Entertainment services giant Legends International discloses data breach
Test
Test
·cybersecurityventures.com·
Test
Care what you share
Care what you share
In this week’s newsletter, Thorsten muses on how search engines and AI quietly gather your data while trying to influence your buying choices. Explore privacy-friendly alternatives and get the scoop on why it's important to question the platforms you interact with online.
·blog.talosintelligence.com·
Care what you share
compop.ca 3.5.3 - Arbitrary code Execution
compop.ca 3.5.3 - Arbitrary code Execution
compop.ca 3.5.3 - Arbitrary code Execution. CVE-2024-48445 . webapps exploit for Multiple platform
·exploit-db.com·
compop.ca 3.5.3 - Arbitrary code Execution