Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29804 bookmarks
Custom sorting
Hackers abuse Microsoft ClickOnce and AWS services for stealthy attacks
Hackers abuse Microsoft ClickOnce and AWS services for stealthy attacks
A sophisticated malicious campaign that researchers call OneClik has been leveraging Microsoft's ClickOnce software deployment tool and custom Golang backdoors to compromise organizations within the energy, oil, and gas sectors.
·bleepingcomputer.com·
Hackers abuse Microsoft ClickOnce and AWS services for stealthy attacks
Microsoft Named a Leader in the IDC MarketScape for CNAPP: Key Takeaways for Security Buyers
Microsoft Named a Leader in the IDC MarketScape for CNAPP: Key Takeaways for Security Buyers
  The cloud-native application protection platform (CNAPP) market continues to evolve rapidly as organizations look to secure increasingly complex cloud environments. In the recently published IDC MarketScape: Worldwide CNAPP 2025 Vendor Assessment, Microsoft has been recognized as a Leader. We believe this recognition reaffirms Microsoft’s commitment to delivering comprehensive, AI-powered, and integrated security solutions for multicloud environments.     IDC MarketScape vendor analysis model is designed to provide an overview of the competitive fitness of technology and suppliers in a given market. The research methodology utilizes a rigorous scoring methodology based on both qualitative and quantitative criteria that results in a single graphical illustration of each supplier’s position within a given market. The Capabilities score measures supplier product, go-to-market and business execution in the short-term. The Strategy score measures alignment of supplier strategies with customer requirements in a 3-5-year timeframe. Supplier market share is represented by the size of the icons. Why Microsoft was recognized The IDC MarketScape noted the following strengths for Microsoft: “Defender for Cloud provides visibility into cloud attacks across the entire environment, from enterprise endpoints and exposed identities to on-premises secrets. This holistic approach examines attack vectors inside and outside the cloud. Prebreach posture graphs are integrated with live incidents, offering exposure risk assessment through blast radius analysis.” “Microsoft Defender for Cloud was also recognized for providing detailed threat analytics, combining information from various sources to create comprehensive attack paths, helping understand the severity of alerts in context, and making it easier to prioritize and respond to threats. Additional commentary addressed Security Explorer and automatic detection of sensitive data without additional configuration, enhancing the security posture by providing valuable insights and automating critical security tasks.” “Customers also highlighted the strong partnership with Microsoft, which includes dedicated support and consulting, ensuring quick resolution of issues and access to experts for optimal product use.” Key Advice for CNAPP Buyers As cloud security needs grow, selecting the right CNAPP solution means looking beyond vendor consolidation. Here are some of the key areas the IDC MarketScape advises buyers to prioritize: “Integration and enrichment of existing security data: Choose a CNAPP vendor that can easily integrate with your current deployments. The value lies in how the solution enriches your existing security data, providing deeper insights and more comprehensive protection.” “Comprehensive capabilities: Look for a solution that offers robust monitoring and reporting on cloud security posture, runtime, and application security. The goal is to select a platform based on its aggregate capabilities rather than merely reducing the vendor footprint.” “Ease of setup and support: Note that many vendors provide extensive support and make the initial setup straightforward with minimal technical effort required. However, the real value comes from planning and strategizing with stakeholders to ensure that the implementation aligns with your organizational goals.” In conclusion Defender for Cloud’s comprehensive approach blends proactive risk management, real-time monitoring, and integrated threat protection. This makes it a strong CNAPP solution for organizations seeking to future-proof their cloud security investments. For buyers navigating this dynamic market, aligning platform capabilities with operational needs, compliance demands, and long-term cloud strategies is essential. Microsoft’s CNAPP strategy, backed by a powerful ecosystem and customer-centric support model, offers a compelling path forward. Learn more Download the report excerpt here.  Visit our solution webpage to learn more about Microsoft’s CNAPP solution.    
·techcommunity.microsoft.com·
Microsoft Named a Leader in the IDC MarketScape for CNAPP: Key Takeaways for Security Buyers
Google releases Gemini CLI with free Gemini 2.5 Pro
Google releases Gemini CLI with free Gemini 2.5 Pro
Google has released Gemini 2.5 Pro-powered Gemini CLI, which allows you to use Gemini inside your terminal, including Windows Terminal.
·bleepingcomputer.com·
Google releases Gemini CLI with free Gemini 2.5 Pro
Citrix warns of NetScaler vulnerability exploited in DoS attacks
Citrix warns of NetScaler vulnerability exploited in DoS attacks
Citrix is warning that a vulnerability in NetScaler appliances tracked as CVE-2025-6543 is being actively exploited in the wild, causing devices to enter a denial of service condition.
·bleepingcomputer.com·
Citrix warns of NetScaler vulnerability exploited in DoS attacks
WinRAR patches bug letting malware launch from extracted archives
WinRAR patches bug letting malware launch from extracted archives
WinRAR has addressed a directory traversal vulnerability tracked as CVE-2025-6218 that, under certain circumstances, allows malware to be executed after extracting a malicious archive.
·bleepingcomputer.com·
WinRAR patches bug letting malware launch from extracted archives
Interpellation de hackers : 4 Français cachés derriÚre le réseau cybercriminel Breach Forums ?
Interpellation de hackers : 4 Français cachés derriÚre le réseau cybercriminel Breach Forums ?
La scĂšne cyber française vient de connaĂźtre un sĂ©isme : 4 jeunes hackers sont soupçonnĂ©s d’avoir administrĂ© le cĂ©lĂšbre site cybercriminel Breach Forums. Ils ont Ă©tĂ© interpellĂ©s, le 25 juin 2025, par la Brigade de lutte contre la cybercriminalitĂ© (BL2C) de la prĂ©fecture de police de Paris.  La chute de Breach Forums
·numerama.com·
Interpellation de hackers : 4 Français cachés derriÚre le réseau cybercriminel Breach Forums ?
New ‘CitrixBleed 2’ NetScaler flaw let hackers hijack sessions
New ‘CitrixBleed 2’ NetScaler flaw let hackers hijack sessions
A recent vulnerability in Citrix NetScaler ADC and Gateway is dubbed "CitrixBleed 2," after its similarity to an older exploited flaw that allowed unauthenticated attackers to hijack authentication session cookies from vulnerable devices.
·bleepingcomputer.com·
New ‘CitrixBleed 2’ NetScaler flaw let hackers hijack sessions
French police reportedly arrest suspected BreachForums administrators
French police reportedly arrest suspected BreachForums administrators
Several suspects tied to the cybercrime site BreachForums have been arrested in France, according to a local news report, including alleged administrators known as ShinyHunters and Intelbroker.
·therecord.media·
French police reportedly arrest suspected BreachForums administrators
Glasgow City Council impacted by ‘cyber incident’
Glasgow City Council impacted by ‘cyber incident’
The Glasgow City Council announced that it was affected by an incident “disrupting a number of online services and which may have involved the theft of customer data.”
·therecord.media·
Glasgow City Council impacted by ‘cyber incident’
BreachForums hacking forum operators reportedly arrested in France
BreachForums hacking forum operators reportedly arrested in France
The French police have reportedly arrested five operators of the BreachForum cybercrime forum, a website used by cybercriminals to leak and sell stolen data that exposed the sensitive information of millions.
·bleepingcomputer.com·
BreachForums hacking forum operators reportedly arrested in France
AppSec as Glue: Building Partnerships to Scale Security
AppSec as Glue: Building Partnerships to Scale Security
Answers to additional audience questions from this BSidesSF 2025 panel on scaling security impact by building essential partnerships across teams
·tldrsec.com·
AppSec as Glue: Building Partnerships to Scale Security
Tirs de Rafale sur des ballons stratosphĂ©riques : oĂč se situe rĂ©ellement la France dans la course Ă  la TrĂšs Haute Altitude ?
Tirs de Rafale sur des ballons stratosphĂ©riques : oĂč se situe rĂ©ellement la France dans la course Ă  la TrĂšs Haute Altitude ?
Ni tout Ă  fait aĂ©rienne, ni pleinement spatiale, la TrĂšs Haute Altitude (THA) est dĂ©sormais au cƓur des stratĂ©gies militaires françaises. Une ambition concrĂ©tisĂ©e le 23 juin 2025, par un exercice militaire de grande ampleur. Mais oĂč en est rĂ©ellement la France dans la course Ă  la THA ? Les images de Rafale et de
·numerama.com·
Tirs de Rafale sur des ballons stratosphĂ©riques : oĂč se situe rĂ©ellement la France dans la course Ă  la TrĂšs Haute Altitude ?
What Kind of Identity Should Your AI Agent Have? | CSA
What Kind of Identity Should Your AI Agent Have? | CSA
The challenge of identity management for AI agents centers on the question: What kind of identity should your AI agent possess?
·cloudsecurityalliance.org·
What Kind of Identity Should Your AI Agent Have? | CSA