Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29804 bookmarks
Custom sorting
Microsoft fixes Linux boot issues on dual-boot Windows systems
Microsoft fixes Linux boot issues on dual-boot Windows systems
​Microsoft has fixed a known issue preventing Linux from booting on dual-boot systems with Secure Boot enabled after installing the August 2024 Windows security updates.
·bleepingcomputer.com·
Microsoft fixes Linux boot issues on dual-boot Windows systems
Congress faces pressure to renew cyber information-sharing law
Congress faces pressure to renew cyber information-sharing law
The law’s expiration in September could jeopardize a wide range of information-sharing partnerships that have helped catch and thwart cyberattacks in the U.S.
·cybersecuritydive.com·
Congress faces pressure to renew cyber information-sharing law
89 millions de comptes Steam piratés ? Ce qu’on sait de ce potentiel piratage
89 millions de comptes Steam piratés ? Ce qu’on sait de ce potentiel piratage
Un pirate informatique affirme avoir récupéré plus de 89 millions de comptes Steam, soit deux tiers des comptes existants. Si elle s'avère véridique, il s'agirait d'une des plus grandes fuites de comptes du jeu vidéo. Ce pirate du nom de Machine1337 a-t-il réellement piraté Steam ? C'est en tout cas ce qu'il affirme
·numerama.com·
89 millions de comptes Steam piratés ? Ce qu’on sait de ce potentiel piratage
Steam piraté ? 7 gestes à suivre pour éviter les problèmes - Numerama
Steam piraté ? 7 gestes à suivre pour éviter les problèmes - Numerama
Une fuite pourrait avoir affecté la plateforme de jeux vidéo Steam. En raison du nombre de comptes potentiellement affectés, il est préférable de s'assurer que les bonnes pratiques de sécurisation sont appliquées pour protéger son profil. C'est une alerte à laquelle les internautes ayant un compte Steam devraient
·numerama.com·
Steam piraté ? 7 gestes à suivre pour éviter les problèmes - Numerama
Focused Phishing: Attack Targets Victims With Trusted Sites and Live Validation
Focused Phishing: Attack Targets Victims With Trusted Sites and Live Validation
New phishing tactics are abusing trusted domains, real CAPTCHAs, and server-side email validation to selectively target victims with customized fake login pages. Keep Aware's latest research breaks down the full attack chain and how these zero-day phish operate.
·bleepingcomputer.com·
Focused Phishing: Attack Targets Victims With Trusted Sites and Live Validation
France Identité passe le cap des deux millions d’usagers
France Identité passe le cap des deux millions d’usagers
L'application "France Identité" a atteint les deux millions d'utilisateurs. Permettant de prouver son identité, elle offre un portefeuille de...-IdentitĂ© numĂ©rique
·usine-digitale.fr·
France Identité passe le cap des deux millions d’usagers
Fashion giant Dior discloses cyberattack, warns of data breach
Fashion giant Dior discloses cyberattack, warns of data breach
House of Dior, the French luxury fashion brand commonly referred to as Dior, has disclosed a cybersecurity incident that has exposed customer information.
·bleepingcomputer.com·
Fashion giant Dior discloses cyberattack, warns of data breach
ISO 42001 Requirements Explained: Achieve Compliance | CSA
ISO 42001 Requirements Explained: Achieve Compliance | CSA
ISO 42001 mandates numerous requirements for the establishment, operation, monitoring, maintenance, and improvement of an organization’s AI management system.
·cloudsecurityalliance.org·
ISO 42001 Requirements Explained: Achieve Compliance | CSA
New Fortinet and Ivanti Zero Days Exploited in the Wild
New Fortinet and Ivanti Zero Days Exploited in the Wild
Fortinet and Ivanti published advisories on the same day revealing that attackers are exploiting new zero days, one of which is rated critical
·infosecurity-magazine.com·
New Fortinet and Ivanti Zero Days Exploited in the Wild
Patch Tuesday, May 2025 Edition
Patch Tuesday, May 2025 Edition
Microsoft on Tuesday released software updates to fix at least 70 vulnerabilities in Windows and related products, including five zero-day flaws that are already seeing active exploitation. Adding to the sense of urgency with this month's patch batch from Redmond…
·krebsonsecurity.com·
Patch Tuesday, May 2025 Edition
Google's Advanced Protection Now on Android - Schneier on Security
Google's Advanced Protection Now on Android - Schneier on Security
Google has extended its Advanced Protection features to Android devices. It’s not for everybody, but something to be considered by high-risk users. Wired article, behind a paywall.
·schneier.com·
Google's Advanced Protection Now on Android - Schneier on Security
What You Wish You Knew About Preventing Data Breaches | CSA
What You Wish You Knew About Preventing Data Breaches | CSA
This guide helps you assess the current state of your MFT security strategy. Build an unbreachable fortress around your MFT operations.
·cloudsecurityalliance.org·
What You Wish You Knew About Preventing Data Breaches | CSA
Fortinet fixed actively exploited FortiVoice zero-day
Fortinet fixed actively exploited FortiVoice zero-day
Fortinet fixed a critical remote code execution zero-day actively exploited in attacks targeting FortiVoice enterprise phone systems.
·securityaffairs.com·
Fortinet fixed actively exploited FortiVoice zero-day