Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31320 bookmarks
Custom sorting
Windows XP, vétusté, mot de passe… la cyberattaque d’Aeroflot tourne à l’absurde
Windows XP, vétusté, mot de passe… la cyberattaque d’Aeroflot tourne à l’absurde
Depuis le 28 juillet, la compagnie aérienne russe Aeroflot connaît d'importantes perturbations. La faute à une cyberattaque revendiquée par des hackers ukrainiens et biélorusses. En attendant un retour à la normale, les pirates ne se privent pas de jubiler, en publiant des détails étonnants sur la manière dont ils
·numerama.com·
Windows XP, vétusté, mot de passe… la cyberattaque d’Aeroflot tourne à l’absurde
Gateway security guidance package: Gateway operations and management | Cyber.gov.au
Gateway security guidance package: Gateway operations and management | Cyber.gov.au
This guidance is one part of a package of documents that forms the Australian Signals Directorate (ASD)’s Gateway security guidance package written for audiences responsible for the operation and management of gateways.
·cyber.gov.au·
Gateway security guidance package: Gateway operations and management | Cyber.gov.au
Gateway security guidance package: Gateway technology guides | Cyber.gov.au
Gateway security guidance package: Gateway technology guides | Cyber.gov.au
This guidance is one part of a package of documents that forms the gateway security guidance package. When designing, procuring, operating, maintaining or disposing of a gateway, it is important to consider all the documents from the gateway security guidance package at different stages of governance, design and implementation, and not to consume this guidance in isolation.
·cyber.gov.au·
Gateway security guidance package: Gateway technology guides | Cyber.gov.au
Gateway security guidance package: Executive guidance | Cyber.gov.au
Gateway security guidance package: Executive guidance | Cyber.gov.au
The purpose of this guidance is to inform decision-makers at the executive level of their responsibilities, the appropriate considerations needed to make informed risk-based decisions, and to meet policy obligations when leading the design or consumption of their organisation’s gateway services.
·cyber.gov.au·
Gateway security guidance package: Executive guidance | Cyber.gov.au
Lovense sex toy app flaw leaks private user email addresses
Lovense sex toy app flaw leaks private user email addresses
The connected sex toy platform Lovense is vulnerable to a zero-day flaw that allows an attacker to get access to a member's email address simply by knowing their username, putting them at risk of doxxing and harassment.
·bleepingcomputer.com·
Lovense sex toy app flaw leaks private user email addresses
MY TAKE: The signal vs. the noise: email messaging in the era of my AI talking to your AI
MY TAKE: The signal vs. the noise: email messaging in the era of my AI talking to your AI
Not long ago, I found myself staring at a reply that could’ve come from a bot. Related: Microsoft purges 'knowledge workers' It was a polite follow-up from a PR rep reiterating a pitch I had already acknowledged — and responded to with a thoughtful, clearly outlined counter-offer. My reply wasn’t off-the-shelf. It was a handcrafted
·lastwatchdog.com·
MY TAKE: The signal vs. the noise: email messaging in the era of my AI talking to your AI
Tea app leak worsens with second database exposing user chats
Tea app leak worsens with second database exposing user chats
The Tea app data breach has grown into an even larger leak, with the stolen data now shared on hacking forums and a second database discovered that allegedly contains 1.1 million private messages exchanged between the app's members.
·bleepingcomputer.com·
Tea app leak worsens with second database exposing user chats
Adobe ColdFusion 2023.6 - Remote File Read
Adobe ColdFusion 2023.6 - Remote File Read
Adobe ColdFusion 2023.6 - Remote File Read. CVE-2024-20767 . webapps exploit for Multiple platform
·exploit-db.com·
Adobe ColdFusion 2023.6 - Remote File Read
Endgame Gear mouse config tool infected users with malware
Endgame Gear mouse config tool infected users with malware
Gaming peripherals maker Endgame Gear is warning that malware was hidden in its configuration tool for the OP1w 4k v2 mouse hosted on the official website between June 26 and July 9, 2025.
·bleepingcomputer.com·
Endgame Gear mouse config tool infected users with malware
Microsoft: macOS Sploitlight flaw leaks Apple Intelligence data
Microsoft: macOS Sploitlight flaw leaks Apple Intelligence data
Attackers could use a recently patched macOS vulnerability to bypass Transparency, Consent, and Control (TCC) security checks and steal sensitive user information, including Apple Intelligence cached data.
·bleepingcomputer.com·
Microsoft: macOS Sploitlight flaw leaks Apple Intelligence data
Exploit available for critical Cisco ISE bug exploited in attacks
Exploit available for critical Cisco ISE bug exploited in attacks
Security researcher Bobby Gould has published a blog post demonstrating a complete exploit chain for CVE-2025-20281, an unauthenticated remote code execution vulnerability in Cisco Identity Services Engine (ISE).
·bleepingcomputer.com·
Exploit available for critical Cisco ISE bug exploited in attacks
News alert: xonPlus launches real-time alerting platform to detect exposed enterprise credentials
News alert: xonPlus launches real-time alerting platform to detect exposed enterprise credentials
Chennai, India, July 25, 2025, CyberNewswire — xonPlus, a real-time digital risk alerting system, officially launches today to help security teams detect credential exposures before attackers exploit them. The platform detects data breaches and alerts teams and systems to respond instantly. Built by the team behind XposedOrNot, an open-source breach detection tool used by thousands,
·lastwatchdog.com·
News alert: xonPlus launches real-time alerting platform to detect exposed enterprise credentials