Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31742 bookmarks
Custom sorting
Framework to Protect Digital Identities in Agentic AI | CSA
Framework to Protect Digital Identities in Agentic AI | CSA
The Digital Identity Rights Framework safeguards digital identities in AI environments by integrating legal & technical controls that ensure traceability.
·cloudsecurityalliance.org·
Framework to Protect Digital Identities in Agentic AI | CSA
Navigating Global Headwinds: Frances Townsend Joins interos.ai’s Risk Intelligence Summit - interos.ai
Navigating Global Headwinds: Frances Townsend Joins interos.ai’s Risk Intelligence Summit - interos.ai
From international conflicts and cyber warfare to tariffs and trade protectionism, today’s geopolitical landscape is creating unprecedented challenges for global supply chains. These forces directly affect material costs, logistics and overall operational stability, leaving companies to navigate increasing uncertainty. Now more than ever, leaders must understand how national security concerns and international politics can quickly....
·interos.ai·
Navigating Global Headwinds: Frances Townsend Joins interos.ai’s Risk Intelligence Summit - interos.ai
Healthcare Services Group data breach impacts 624,000 people
Healthcare Services Group data breach impacts 624,000 people
The Healthcare Services Group (HSGI) is alerting more than 600,000 individuals that their personal information was exposed in a security breach last year.
·bleepingcomputer.com·
Healthcare Services Group data breach impacts 624,000 people
77 malicious apps removed from Google Play Store
77 malicious apps removed from Google Play Store
Researchers have found 77 malicious apps in the official Google Play Store ranging from adware to state of the art banking Trojans.
·malwarebytes.com·
77 malicious apps removed from Google Play Store
Risk-Based vs. Compliance-Based Security | CSA
Risk-Based vs. Compliance-Based Security | CSA
Compliance frameworks often fall short of addressing the nuanced nature of cyber risks. Risk-based security measures enhance your overall security posture.
·cloudsecurityalliance.org·
Risk-Based vs. Compliance-Based Security | CSA
The 5 Golden Rules of Safe AI Adoption
The 5 Golden Rules of Safe AI Adoption
Employees adopt AI rapidly; lack of safeguards demands 5 golden rules for CISOs to secure usage.
·thehackernews.com·
The 5 Golden Rules of Safe AI Adoption
We Are Still Unable to Secure LLMs from Malicious Inputs - Schneier on Security
We Are Still Unable to Secure LLMs from Malicious Inputs - Schneier on Security
Nice indirect prompt injection attack: Bargury’s attack starts with a poisoned document, which is shared to a potential victim’s Google Drive. (Bargury says a victim could have also uploaded a compromised file to their own account.) It looks like an official document on company meeting policies. But inside the document, Bargury hid a 300-word malicious prompt that contains instructions for ChatGPT. The prompt is written in white text in a size-one font, something that a human is unlikely to see but a machine will still read. In a proof of concept video of the attack...
·schneier.com·
We Are Still Unable to Secure LLMs from Malicious Inputs - Schneier on Security
Les américains risquent de se souvenir longtemps du DOGE d’Elon Musk et pas pour de bonnes raisons
Les américains risquent de se souvenir longtemps du DOGE d’Elon Musk et pas pour de bonnes raisons
L’histoire du DOGE n’est peut-être pas close, du moins pas ses répercussions. Le 26 août 2025, un employé de l'Administration de la Sécurité Sociale américaine (SSA) s’est mué en lanceur d’alerte. Il affirme que des fonctionnaires du département fondé par Elon Musk auraient dupliqué l’ensemble des données de Sécurité
·numerama.com·
Les américains risquent de se souvenir longtemps du DOGE d’Elon Musk et pas pour de bonnes raisons
Exploits and vulnerabilities in Q2 2025
Exploits and vulnerabilities in Q2 2025
This report provides statistical data on published vulnerabilities and exploits we researched in Q2 2025. It also includes summary data on the use of C2 frameworks.
·securelist.com·
Exploits and vulnerabilities in Q2 2025
Google to verify all Android devs to block malware on Google Play
Google to verify all Android devs to block malware on Google Play
Google is introducing a new defense for Android called 'Developer Verification' to block malware installations from sideloaded apps sourced from outside the official Google Play app store.
·bleepingcomputer.com·
Google to verify all Android devs to block malware on Google Play
Citrix fixes critical NetScaler RCE flaw exploited in zero-day attacks
Citrix fixes critical NetScaler RCE flaw exploited in zero-day attacks
Citrix fixed three NetScaler ADC and NetScaler Gateway flaws today, including a critical remote code execution flaw tracked as CVE-2025-7775 that was actively exploited in attacks as a zero-day vulnerability.
·bleepingcomputer.com·
Citrix fixes critical NetScaler RCE flaw exploited in zero-day attacks
DOGE employees uploaded Social Security database to ‘vulnerable’ cloud, agency whistleblower says | FedScoop
DOGE employees uploaded Social Security database to ‘vulnerable’ cloud, agency whistleblower says | FedScoop
Department of Government Efficiency members stored a copy of a massive Social Security Administration database in a “vulnerable” custom cloud environment, putting more than 300 million people’s personal information at risk, the agency’s chief data officer said in a new whistleblower complaint.
·fedscoop.com·
DOGE employees uploaded Social Security database to ‘vulnerable’ cloud, agency whistleblower says | FedScoop