Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29805 bookmarks
Custom sorting
Cette offre pCloud 2-en-1 est parfaite pour assurer la sécurité de vos données personnelles
Cette offre pCloud 2-en-1 est parfaite pour assurer la sécurité de vos données personnelles
À l’heure où les fuites de données sont devenues monnaies courantes, la protection des données personnelles n’a jamais été aussi importante. D’autant plus qu’il existe désormais pléthore d’outils plus puissants les uns que les autres pour accompagner les internautes dans cette tâche. En juin dernier, un fichier
·numerama.com·
Cette offre pCloud 2-en-1 est parfaite pour assurer la sécurité de vos données personnelles
STRATEGIC REEL: APIs are the new perimeter — and business logic attacks are slipping through
STRATEGIC REEL: APIs are the new perimeter — and business logic attacks are slipping through
APIs have become the digital glue of the enterprise — and attackers know it. Related: API security - the big picture In this debut edition of the Last Watchdog Strategic Reel (LWSR), A10 Networks’ Field CISO Jamison Utter cuts through the noise from RSAC 2025 with a sharp breakdown of today’s API threatscape. From 15,000
·lastwatchdog.com·
STRATEGIC REEL: APIs are the new perimeter — and business logic attacks are slipping through
News alert: SquareX research finds browser AI agents are proving riskier than human employees
News alert: SquareX research finds browser AI agents are proving riskier than human employees
Palo Alto, Calif., Jun. 30, 2025, CyberNewswire--Every security practitioner knows that employees are the weakest link in an organization, but this is no longer the case. SquareX’s research reveals that Browser AI Agents are more likely to fall prey to cyberattacks than employees, making them the new weakest link that enterprise security teams need to
·lastwatchdog.com·
News alert: SquareX research finds browser AI agents are proving riskier than human employees
NimDoor crypto-theft macOS malware revives itself when killed
NimDoor crypto-theft macOS malware revives itself when killed
North Korean state-backed hackers have been using a new family of macOS malware called NimDoor in a campaign that targets web3 and cryptocurrency organizations.
·bleepingcomputer.com·
NimDoor crypto-theft macOS malware revives itself when killed
DOJ investigates ex-ransomware negotiator over extortion kickbacks
DOJ investigates ex-ransomware negotiator over extortion kickbacks
An ex-ransomware negotiator is under criminal investigation by the Department of Justice for allegedly working with ransomware gangs to profit from extortion payment deals.
·bleepingcomputer.com·
DOJ investigates ex-ransomware negotiator over extortion kickbacks
Spain arrests hackers who targeted politicians and journalists
Spain arrests hackers who targeted politicians and journalists
The Spanish police have arrested two individuals in the province of Las Palmas for their alleged involvement in cybercriminal activity, including data theft from the country's government.
·bleepingcomputer.com·
Spain arrests hackers who targeted politicians and journalists
Cisco warns that Unified CM has hardcoded root SSH credentials
Cisco warns that Unified CM has hardcoded root SSH credentials
Cisco has removed a backdoor account from its Unified Communications Manager (Unified CM), which would have allowed remote attackers to log in to unpatched devices with root privileges.
·bleepingcomputer.com·
Cisco warns that Unified CM has hardcoded root SSH credentials
Strategic Synergy: CSA STAR, CCM, and FedRAMP 20x | CSA
Strategic Synergy: CSA STAR, CCM, and FedRAMP 20x | CSA
By strategically integrating CSA’s STAR program, FedRAMP 20x can deliver improved clarity, consistency, and trust in cloud security.
·cloudsecurityalliance.org·
Strategic Synergy: CSA STAR, CCM, and FedRAMP 20x | CSA
Citrix warns of login issues after NetScaler auth bypass patch
Citrix warns of login issues after NetScaler auth bypass patch
Citrix warns that patching recently disclosed vulnerabilities that can be exploited to bypass authentication and launch denial-of-service attacks may also break login pages on NetScaler ADC and Gateway appliances.
·bleepingcomputer.com·
Citrix warns of login issues after NetScaler auth bypass patch
Bluff ou futur scandale ? L’entourage de Trump victime d’un chantage de hackers pro-iraniens
Bluff ou futur scandale ? L’entourage de Trump victime d’un chantage de hackers pro-iraniens
Un groupe de hackers pro-iranien a revendiqué, le 30 juin 2025, le vol de près de 100 gigaoctets d’emails appartenant à des membres de l’entourage de Donald Trump. Cette annonce intervient dans un contexte de tensions accrues entre Washington et Téhéran, après les frappes américaines contre les sites nucléaires en
·numerama.com·
Bluff ou futur scandale ? L’entourage de Trump victime d’un chantage de hackers pro-iraniens
Android SMS Stealer Infects 100,000 Devices in Uzbekistan
Android SMS Stealer Infects 100,000 Devices in Uzbekistan
New Android malware Qwizzserial has infected 100,000 devices, primarily in Uzbekistan, stealing SMS data via Telegram distribution
·infosecurity-magazine.com·
Android SMS Stealer Infects 100,000 Devices in Uzbekistan
AI Models Mislead Users on Login URLs
AI Models Mislead Users on Login URLs
A third of AI-generated login URLs lead to incorrect or dangerous domains, according to Netcraft
·infosecurity-magazine.com·
AI Models Mislead Users on Login URLs
Suspendu par son employeur, il sabote le réseau informatique de la boîte
Suspendu par son employeur, il sabote le réseau informatique de la boîte
L’ex-employé d’une entreprise basée dans le Yorkshire a été condamné à 7 mois de prison ferme, le 30 juin 2025, pour avoir volontairement saboté l’infrastructure informatique de son ancien employeur. L’homme a agi par vengeance, après avoir été suspendu de ses fonctions. Mohammed Umar Taj, 31 ans, travaillait comme
·numerama.com·
Suspendu par son employeur, il sabote le réseau informatique de la boîte
The Traditional Technology Adoption Curve vs. AI | CSA
The Traditional Technology Adoption Curve vs. AI | CSA
Explore how AI adoption dramatically compresses technology development cycles and how humans are resisting this shift. Learn how to help employees embrace AI.
·cloudsecurityalliance.org·
The Traditional Technology Adoption Curve vs. AI | CSA
Spain arrests two over data leaks targeting state officials, journalists
Spain arrests two over data leaks targeting state officials, journalists
Spain’s Interior Ministry said the suspects were responsible for stealing and leaking personal data belonging to high-ranking political figures, including Prime Minister Pedro Sánchez, President of the Congress of Deputies Francina Armengol and Catalonia’s President Salvador Illa.
·therecord.media·
Spain arrests two over data leaks targeting state officials, journalists
Dozens of fake wallet add-ons flood Firefox store to drain crypto
Dozens of fake wallet add-ons flood Firefox store to drain crypto
More than 40 fake extensions in Firefox's official add-ons store are impersonating popular cryptocurrency wallets from trusted providers to steal wallet credentials and sensitive data.
·bleepingcomputer.com·
Dozens of fake wallet add-ons flood Firefox store to drain crypto