Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31240 bookmarks
Custom sorting
« Il n'a jamais été question de donner la liberté d'expression aux bots », insiste la ministre de l'IA - Numerama
« Il n'a jamais été question de donner la liberté d'expression aux bots », insiste la ministre de l'IA - Numerama
Le Premier ministre François Bayrou et la ministre responsable de l'IA et du numérique Clara Chappaz sont intervenus lors d'un forum organisé par Viginum, un service gouvernemental focalisé sur les manipulations de l'information sur Internet. Ce 28 mars était l'occasion pour le gouvernement de mettre en lumière
·numerama.com·
« Il n'a jamais été question de donner la liberté d'expression aux bots », insiste la ministre de l'IA - Numerama
Microsoft fixes button that restores classic Outlook client
Microsoft fixes button that restores classic Outlook client
Microsoft resolved an issue that caused the new Outlook email client to crash when users clicked a button designed to switch back to classic Outlook.
·bleepingcomputer.com·
Microsoft fixes button that restores classic Outlook client
Solar Power System Vulnerabilities Could Result in Blackouts
Solar Power System Vulnerabilities Could Result in Blackouts
Forescout researchers found multiple vulnerabilities in leading solar power system manufacturers, which could be exploited to cause emergencies and blackouts
·infosecurity-magazine.com·
Solar Power System Vulnerabilities Could Result in Blackouts
Proton VPN débarque dans Vivaldi pour faciliter la navigation confidentielle
Proton VPN débarque dans Vivaldi pour faciliter la navigation confidentielle
Un VPN accessible gratuitement dans un navigateur web. C'est ce que proposent Proton et Vivaldi, qui viennent de s'associer pour inclure Proton VPN dans le navigateur des power users. C'est une nouveauté qui pourrait bien réussir à faire gagner quelques points de parts de marché à Vivaldi. Le navigateur web, qui
·numerama.com·
Proton VPN débarque dans Vivaldi pour faciliter la navigation confidentielle
New Ubuntu Linux security bypasses require manual mitigations
New Ubuntu Linux security bypasses require manual mitigations
Three security bypasses have been discovered in Ubuntu Linux's unprivileged user namespace restrictions, which could be enable a local attacker to exploit vulnerabilities in kernel components.
·bleepingcomputer.com·
New Ubuntu Linux security bypasses require manual mitigations
Questions to Ask Before Network Pen Tests | CSA
Questions to Ask Before Network Pen Tests | CSA
Learn key questions to ask before purchasing a network penetration test to ensure comprehensive security assessment and maximum value for your organization.
·cloudsecurityalliance.org·
Questions to Ask Before Network Pen Tests | CSA
Trump CISA Cuts Threaten US Election Integrity, Experts Warn
Trump CISA Cuts Threaten US Election Integrity, Experts Warn
Expert speakers discussed the impact of reported cutbacks to CISA on the ability of local officials to protect against surging cyber-attacks on US election infrastructure
·infosecurity-magazine.com·
Trump CISA Cuts Threaten US Election Integrity, Experts Warn
Microsoft fixes Remote Desktop issues caused by Windows updates
Microsoft fixes Remote Desktop issues caused by Windows updates
Microsoft has fixed a known issue that caused problems with Remote Desktop and RDS connections after installing Windows updates released since January 2025.
·bleepingcomputer.com·
Microsoft fixes Remote Desktop issues caused by Windows updates
AI Pilot Programs & Adoption | CSA
AI Pilot Programs & Adoption | CSA
Explore how AI pilot programs help businesses strategically test and implement AI, addressing challenges and unlocking new opportunities for innovation.
·cloudsecurityalliance.org·
AI Pilot Programs & Adoption | CSA
AIs as Trusted Third Parties - Schneier on Security
AIs as Trusted Third Parties - Schneier on Security
This is a truly fascinating paper: “Trusted Machine Learning Models Unlock Private Inference for Problems Currently Infeasible with Cryptography.” The basic idea is that AIs can act as trusted third parties: Abstract: We often interact with untrusted parties. Prioritization of privacy can limit the effectiveness of these interactions, as achieving certain goals necessitates sharing private data. Traditionally, addressing this challenge has involved either seeking trusted intermediaries or constructing cryptographic protocols that restrict how much data is revealed, such as multi-party computations or zero-knowledge proofs. While significant advances have been made in scaling cryptographic approaches, they remain limited in terms of the size and complexity of applications they can be used for. In this paper, we argue that capable machine learning models can fulfill the role of a trusted third party, thus enabling secure computations for applications that were previously infeasible. In particular, we describe Trusted Capable Model Environments (TCMEs) as an alternative approach for scaling secure computation, where capable machine learning model(s) interact under input/output constraints, with explicit information flow control and explicit statelessness. This approach aims to achieve a balance between privacy and computational efficiency, enabling private inference where classical cryptographic solutions are currently infeasible. We describe a number of use cases that are enabled by TCME, and show that even some simple classic cryptographic problems can already be solved with TCME. Finally, we outline current limitations and discuss the path forward in implementing them...
·schneier.com·
AIs as Trusted Third Parties - Schneier on Security
Gamaredon campaign abuses LNK files to distribute Remcos backdoor
Gamaredon campaign abuses LNK files to distribute Remcos backdoor
Cisco Talos is actively tracking an ongoing campaign, targeting users in Ukraine with malicious LNK files which run a PowerShell downloader since at least November 2024.
·blog.talosintelligence.com·
Gamaredon campaign abuses LNK files to distribute Remcos backdoor
Morphing Meerkat PhaaS Platform Spoofs 100+ Brands
Morphing Meerkat PhaaS Platform Spoofs 100+ Brands
A PhaaS platform, dubbed 'Morphing Meerkat,' uses DNS MX records to spoof over 100 brands and steal credentials, according to Infoblox Threat Intel
·infosecurity-magazine.com·
Morphing Meerkat PhaaS Platform Spoofs 100+ Brands
Cyberattaque chez Autosur : quelles informations clients ont été exposées ?
Cyberattaque chez Autosur : quelles informations clients ont été exposées ?
Autosur, la société spécialisée dans le contrôle technique de véhicules, a subi une cyberattaque. Les données personnelles de plus de 10 millions de clients ont été exposées sur un forum de pirates. Autosur, l'enseigne spécialisée dans le contrôle technique, a été victime d'une cyberattaque. Plusieurs clients
·numerama.com·
Cyberattaque chez Autosur : quelles informations clients ont été exposées ?