Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31294 bookmarks
Custom sorting
Critical Apache Tomcat RCE vulnerability exploited
Critical Apache Tomcat RCE vulnerability exploited
Attack attempts via CVE-2025-24813 are underway, but successful attacks require specific, non-default configurations.
·cybersecuritydive.com·
Critical Apache Tomcat RCE vulnerability exploited
What Is NIST 800-53? (Comprehensive Guide for 2025)
What Is NIST 800-53? (Comprehensive Guide for 2025)
Discover what is NIST 800-53 and get the full lowdown on this key information security standard, including a free NIST 800-53 checklist.
·stationx.net·
What Is NIST 800-53? (Comprehensive Guide for 2025)
How Can Organizations Secure Hybrid Work Environments? | CSA
How Can Organizations Secure Hybrid Work Environments? | CSA
Hybrid work expands cyber risks. Organizations must use Zero Trust, MFA, endpoint security, and secure collaboration tools to protect data and maintain productivity.
·cloudsecurityalliance.org·
How Can Organizations Secure Hybrid Work Environments? | CSA
Ukraine : une cyberattaque massive paralyse la principale gare de Kiev
Ukraine : une cyberattaque massive paralyse la principale gare de Kiev
La principale gare de Kiev, la capitale ukrainienne, tourne au ralenti ce 24 mars 2025 après une cyberattaque massive contre son système informatique. Après les attaques de drones dans la nuit, Kiev subit désormais une cyberattaque. Le système informatique de la gare de la capitale ukrainienne tourne au ralenti
·numerama.com·
Ukraine : une cyberattaque massive paralyse la principale gare de Kiev
The File Transfer Breach Crisis & MFT Security | CSA
The File Transfer Breach Crisis & MFT Security | CSA
The Amazon file transfer breach shows that even prominent players aren’t immune to MFT breaches. Investing in MFT security is now a necessity.
·cloudsecurityalliance.org·
The File Transfer Breach Crisis & MFT Security | CSA
More Countries are Demanding Back-Doors to Encrypted Apps - Schneier on Security
More Countries are Demanding Back-Doors to Encrypted Apps - Schneier on Security
Last month I wrote about the UK forcing Apple to break its Advanced Data Protection encryption in iCloud. More recently, both Sweden and France are contemplating mandating back doors. Both initiatives are attempting to scare people into supporting back doors, which are—of course—are terrible idea. Also: “A Feminist Argument Against Weakening Encryption.”
·schneier.com·
More Countries are Demanding Back-Doors to Encrypted Apps - Schneier on Security
Le fonctionnement peer-to-peer de FaceTime pose-t-il un problème de vie privée ?
Le fonctionnement peer-to-peer de FaceTime pose-t-il un problème de vie privée ?
Sur Twitter, plusieurs internautes s'offusquent d'une découverte dans les réglages de confidentialité d'Apple : les adresses IP de toutes les personnes que vous appelez en FaceTime sont stockées sur votre appareil. Y a-t-il un risque pour la vie privée des utilisateurs ? Le 7 juin 2010, le jour de l'annonce de
·numerama.com·
Le fonctionnement peer-to-peer de FaceTime pose-t-il un problème de vie privée ?
How ASPM gives you control over complex architectures
How ASPM gives you control over complex architectures
ASPM gives organizations control by unifying risk data, automating threat analysis, and prioritizing vulnerabilities based on their business impact.
·cybersecuritydive.com·
How ASPM gives you control over complex architectures
https://www.lastwatchdog.com/shared-intel-qa-forrester-highlights-why-companies-need-to-strive-for-cryptoagility-today/
https://www.lastwatchdog.com/shared-intel-qa-forrester-highlights-why-companies-need-to-strive-for-cryptoagility-today/
Quantum computing’s ability to break today’s encryption may still be years away—but security leaders can’t afford to wait. Forrester’s The Future of Quantum Security makes it clear: the transition to quantum-safe cryptography must start now. Related: Quantum standards come of age The real threat isn’t just the eventual arrival of quantum decryption—it’s that nation-state actors
·lastwatchdog.com·
https://www.lastwatchdog.com/shared-intel-qa-forrester-highlights-why-companies-need-to-strive-for-cryptoagility-today/
https://www.bleepingcomputer.com/news/artificial-intelligence/google-geminis-astra-screen-sharing-rolls-out-on-android-for-some-users/
https://www.bleepingcomputer.com/news/artificial-intelligence/google-geminis-astra-screen-sharing-rolls-out-on-android-for-some-users/
At MWC 2025, Google confirmed it was working on screen and video share capabilities for Gemini Live, codenamed "Project Astra". At that time, Google promised that the feature would begin rolling out soon, and now some users have spotted it in the wild.
·bleepingcomputer.com·
https://www.bleepingcomputer.com/news/artificial-intelligence/google-geminis-astra-screen-sharing-rolls-out-on-android-for-some-users/
https://www.numerama.com/cyberguerre/1930071-chatgpt-et-deepseek-peuvent-produire-un-logiciel-espion-si-on-sait-comment-leur-demander.html
https://www.numerama.com/cyberguerre/1930071-chatgpt-et-deepseek-peuvent-produire-un-logiciel-espion-si-on-sait-comment-leur-demander.html
Des experts en cybersécurité ont développé des logiciels malveillants pour dérober les mots de passe depuis ChatGPT et DeepSeek. Les chercheurs ont construit un monde immersif pour tromper l'IA et pousser les chatbots à produire du code malveillant. Les hackers voient leur rêve devenir réalité. Un rapport de
·numerama.com·
https://www.numerama.com/cyberguerre/1930071-chatgpt-et-deepseek-peuvent-produire-un-logiciel-espion-si-on-sait-comment-leur-demander.html