Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31056 bookmarks
Custom sorting
compop.ca 3.5.3 - Arbitrary code Execution
compop.ca 3.5.3 - Arbitrary code Execution
compop.ca 3.5.3 - Arbitrary code Execution. CVE-2024-48445 . webapps exploit for Multiple platform
·exploit-db.com·
compop.ca 3.5.3 - Arbitrary code Execution
Windows NTLM hash leak flaw exploited in phishing attacks on governments
Windows NTLM hash leak flaw exploited in phishing attacks on governments
A Windows vulnerability that exposes NTLM hashes using .library-ms files is now actively exploited by hackers in phishing campaigns targeting government entities and private companies.
·bleepingcomputer.com·
Windows NTLM hash leak flaw exploited in phishing attacks on governments
Airport retailer agrees to $6.9 million settlement over ransomware data breach
Airport retailer agrees to $6.9 million settlement over ransomware data breach
According to a complaint filed by a former employee, cybercriminals exfiltrated records that held personal information like names and Social Security numbers belonging to 76,000 current and former employees of Paradies Shops.
·therecord.media·
Airport retailer agrees to $6.9 million settlement over ransomware data breach
Microsoft’s Secure by Design journey: One year of success
Microsoft’s Secure by Design journey: One year of success
Read about the initiatives Microsoft has undertaken over the past 18 months to support secure by design, secure by default, and secure in operations objectives as part of our SFI Initiative.
·microsoft.com·
Microsoft’s Secure by Design journey: One year of success
Usermin 2.100 - Username Enumeration
Usermin 2.100 - Username Enumeration
Usermin 2.100 - Username Enumeration. CVE-2024-44762 . webapps exploit for Multiple platform
·exploit-db.com·
Usermin 2.100 - Username Enumeration
Age Verification Using Facial Scans - Schneier on Security
Age Verification Using Facial Scans - Schneier on Security
Discord is testing the feature: “We’re currently running tests in select regions to age-gate access to certain spaces or user settings,” a spokesperson for Discord said in a statement. “The information shared to power the age verification method is only used for the one-time age verification process and is not stored by Discord or our vendor. For Face Scan, the solution our vendor uses operates on-device, which means there is no collection of any biometric information when you scan your face. For ID verification, the scan of your ID is deleted upon verification.”...
·schneier.com·
Age Verification Using Facial Scans - Schneier on Security
Chrome extensions with 6 million installs have hidden tracking code
Chrome extensions with 6 million installs have hidden tracking code
A set of 57 Chrome extensions with 6,000,000 users have been discovered with very risky capabilities, such as monitoring browsing behavior, accessing cookies for domains, and potentially executing remote scripts.
·bleepingcomputer.com·
Chrome extensions with 6 million installs have hidden tracking code
Le groupe Alain Afflelou victime d'une fuite de données personnelles
Le groupe Alain Afflelou victime d'une fuite de données personnelles
La célèbre chaîne française d'opticiens et d'acousticiens a subi une cyberattaque en raison d'une faille de sécurité chez l'un de ses...-Cybersécurité
·usine-digitale.fr·
Le groupe Alain Afflelou victime d'une fuite de données personnelles
CTM360 Tracks Global Surge in SMS-Based Reward and Toll Scams
CTM360 Tracks Global Surge in SMS-Based Reward and Toll Scams
Thousands tricked by fake reward & toll scam texts. CTM360 exposes PointyPhish & TollShark—SMS phishing campaigns powered by the Darcula PhaaS platform, with 5K+ domains stealing payment info worldwide.
·bleepingcomputer.com·
CTM360 Tracks Global Surge in SMS-Based Reward and Toll Scams
Cloud File Transfer: Most Secure Cloud Configuration | CSA
Cloud File Transfer: Most Secure Cloud Configuration | CSA
Here’s why a managed cloud file transfer (MFT) solution is the best answer to enterprise requirements surrounding modernization, security, and compliance.
·cloudsecurityalliance.org·
Cloud File Transfer: Most Secure Cloud Configuration | CSA