Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

30380 bookmarks
Custom sorting
Microsoft strengthens in-house cyber governance, training
Microsoft strengthens in-house cyber governance, training
The technology giant, as part of its Secure Future Initiative program, has overhauled security practices following a series of crippling nation-state-linked cyberattacks.
·cybersecuritydive.com·
Microsoft strengthens in-house cyber governance, training
Virtual Patching: How to Protect VMware ESXi | CSA
Virtual Patching: How to Protect VMware ESXi | CSA
Recent CVEs were patched amid concerns of exploitation. While traditional patching requires downtime, virtual patching allows critical systems to stay online.
·cloudsecurityalliance.org·
Virtual Patching: How to Protect VMware ESXi | CSA
State-sponsored hackers embrace ClickFix social engineering tactic
State-sponsored hackers embrace ClickFix social engineering tactic
ClickFix attacks are being increasingly adopted by threat actors of all levels, with researchers now seeing multiple advanced persistent threat (APT) groups from North Korea, Iran, and Russia utilizing the tactic to breach networks.
·bleepingcomputer.com·
State-sponsored hackers embrace ClickFix social engineering tactic
Phishers abuse Google OAuth to spoof Google in DKIM replay attack
Phishers abuse Google OAuth to spoof Google in DKIM replay attack
In a rather clever attack, hackers leveraged a weakness that allowed them to send a fake email that seemed delivered from Google's systems, passing all verifications but pointing to a fraudulent page that collected logins.
·bleepingcomputer.com·
Phishers abuse Google OAuth to spoof Google in DKIM replay attack
WordPress ad-fraud plugins generated 1.4 billion ad requests per day
WordPress ad-fraud plugins generated 1.4 billion ad requests per day
A large-scale ad fraud operation called 'Scallywag' is monetizing pirating and URL shortening sites through specially crafted WordPress plugins that generate billions of daily fraudulent requests.
·bleepingcomputer.com·
WordPress ad-fraud plugins generated 1.4 billion ad requests per day
Five Keys to Choosing a Cloud Security Provider | CSA
Five Keys to Choosing a Cloud Security Provider | CSA
Cloud security providers aren't all the same, and knowing what to look for and what questions to ask when making a decision comes down to five keys to success.
·cloudsecurityalliance.org·
Five Keys to Choosing a Cloud Security Provider | CSA
Pour piéger les diplomates européens, les hackers russes les invitent « à boire un excellent verre de vin »
Pour piéger les diplomates européens, les hackers russes les invitent « à boire un excellent verre de vin »
Une campagne d'espionnage menée depuis la Russie tente de piéger les politiques européens avec de fausses invitations envoyées par mail. Une fois la pièce jointe ouverte, l'ordinateur de la victime sera infecté et va offrir toutes ses informations aux hackers. Les pirates de Moscou mènent une nouvelle campagne de
·numerama.com·
Pour piéger les diplomates européens, les hackers russes les invitent « à boire un excellent verre de vin »
AI Red Teaming: Insights from the Front Lines | CSA
AI Red Teaming: Insights from the Front Lines | CSA
Uncover key insights from AI red teaming experts on securing generative AI systems against adversarial attacks, harmful outputs, and infrastructure risks.​
·cloudsecurityalliance.org·
AI Red Teaming: Insights from the Front Lines | CSA
Une cyberattaque sur une maquette en LEGO permet d'illustrer l'arrêt d'une usine - Numerama
Une cyberattaque sur une maquette en LEGO permet d'illustrer l'arrêt d'une usine - Numerama
Un expert en cybersécurité démontre aux entreprises, à travers une maquette en LEGO, comment une cyberattaque peut mettre en péril une chaîne de production. Un simple zéro tapé sur un clavier et la machine s’arrête. En quelques secondes, une chaîne de production peut être paralysée et une entreprise mise à l'arrêt
·numerama.com·
Une cyberattaque sur une maquette en LEGO permet d'illustrer l'arrêt d'une usine - Numerama
Widespread Microsoft Entra lockouts tied to new security feature rollout
Widespread Microsoft Entra lockouts tied to new security feature rollout
Windows administrators from numerous organizations report widespread account lockouts triggered by false positives in the rollout of a new Microsoft Entra ID's "leaked credentials" detection app called MACE.
·bleepingcomputer.com·
Widespread Microsoft Entra lockouts tied to new security feature rollout
Critical Erlang/OTP SSH RCE bug now has public exploits, patch now
Critical Erlang/OTP SSH RCE bug now has public exploits, patch now
Public exploits are now available for a critical Erlang/OTP SSH vulnerability tracked as CVE-2025-32433, allowing unauthenticated attackers to remotely execute code on impacted devices.
·bleepingcomputer.com·
Critical Erlang/OTP SSH RCE bug now has public exploits, patch now
New Android malware steals your credit cards for NFC relay attacks
New Android malware steals your credit cards for NFC relay attacks
A new malware-as-a-service (MaaS) platform named 'SuperCard X' has emerged, targeting Android devices via NFC relay attacks that enable point-of-sale and ATM transactions using compromised payment card data.
·bleepingcomputer.com·
New Android malware steals your credit cards for NFC relay attacks