Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29805 bookmarks
Custom sorting
To Catch A Thief | Rubrik
To Catch A Thief | Rubrik
For this special live recording of To Catch a Thief at The New York Stock Exchange, host and former lead cybersecurity and digital espionage reporter for The...
·youtu.be·
To Catch A Thief | Rubrik
AI is getting “creepy good” at geo-guessing
AI is getting “creepy good” at geo-guessing
After hearing about ChatGPT o3 ability at geo-guessing we decided to run some tests and the tested AIs didn't fail to amaze us
·malwarebytes.com·
AI is getting “creepy good” at geo-guessing
Largest telecom in Africa warns of cyber incident exposing customer data
Largest telecom in Africa warns of cyber incident exposing customer data
MTN Group said an “unknown third-party has claimed to have accessed data linked” to parts of its system and that the incident “resulted in unauthorised access to personal information of some MTN customers in certain markets.”
·therecord.media·
Largest telecom in Africa warns of cyber incident exposing customer data
Marks & Spencer pauses online orders after cyberattack
Marks & Spencer pauses online orders after cyberattack
British retailer giant Marks & Spencer (M&S) has suspended online orders while working to recover from a recently disclosed cyberattack.
·bleepingcomputer.com·
Marks & Spencer pauses online orders after cyberattack
RSAC Fireside Chat: Attackers are exploiting gaps in business logic created by proliferation of APIs
RSAC Fireside Chat: Attackers are exploiting gaps in business logic created by proliferation of APIs
APIs have become foundational to digital business operations, serving as the behind-the-scenes glue that connects apps, platforms and partners. Related: OWASP’s Top 10 Web App Security Risks But this growing reliance has opened a new front in cybersecurity—one where attackers are quietly exploiting weaknesses buried deep in business logic. In this RSAC Fireside Chat, I
·lastwatchdog.com·
RSAC Fireside Chat: Attackers are exploiting gaps in business logic created by proliferation of APIs
Mobile provider MTN says cyberattack compromised customer data
Mobile provider MTN says cyberattack compromised customer data
African mobile giant MTN Group announced that a cybersecurity incident has compromised the personal information of some of its subscribers in certain countries.
·bleepingcomputer.com·
Mobile provider MTN says cyberattack compromised customer data
Baltimore City Public Schools data breach affects over 31,000 people
Baltimore City Public Schools data breach affects over 31,000 people
​Baltimore City Public Schools notified tens of thousands of employees and students of a data breach following an incident in February when unknown attackers hacked into its network.
·bleepingcomputer.com·
Baltimore City Public Schools data breach affects over 31,000 people
Implementing CCM: Enterprise Risk Management Controls | CSA
Implementing CCM: Enterprise Risk Management Controls | CSA
The CCM’s GRC domain helps organizations ensure that their enterprise risk management and cybersecurity compliance programs effectively address the cloud.
·cloudsecurityalliance.org·
Implementing CCM: Enterprise Risk Management Controls | CSA
SAP fixes critical Netweaver flaw exploited in attacks
SAP fixes critical Netweaver flaw exploited in attacks
SAP has released out-of-band emergency updates for NetWeaver to fix an actively exploited remote code execution (RCE) vulnerability used to hijack servers.
·bleepingcomputer.com·
SAP fixes critical Netweaver flaw exploited in attacks
SAP fixes suspected Netweaver zero-day exploited in attacks
SAP fixes suspected Netweaver zero-day exploited in attacks
SAP has released out-of-band emergency NetWeaver updates to fix a suspected remote code execution (RCE) zero-day flaw actively exploited to hijack servers.
·bleepingcomputer.com·
SAP fixes suspected Netweaver zero-day exploited in attacks
Comment Synology combine solutions matérielles et logicielles pour assurer la protection de vos données
Comment Synology combine solutions matérielles et logicielles pour assurer la protection de vos données
Spécialiste du stockage, reconnu pour ses NAS, Synology est aussi expert dans la gestion et la protection des données. Un savoir-faire que la société met à disposition des particuliers et des entreprises désireuses de sécuriser leurs données les plus sensibles. Contrairement à ce que l’on pourrait croire, il ne
·numerama.com·
Comment Synology combine solutions matérielles et logicielles pour assurer la protection de vos données
Getting Started with Kubernetes Security: A Guide | CSA
Getting Started with Kubernetes Security: A Guide | CSA
Walk through what makes Kubernetes security so challenging and how security teams can get started with it in a way that sets them up for long-term success.
·cloudsecurityalliance.org·
Getting Started with Kubernetes Security: A Guide | CSA