Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29730 bookmarks
Custom sorting
CISA: AMI MegaRAC bug enabling server hijacks exploited in attacks
CISA: AMI MegaRAC bug enabling server hijacks exploited in attacks
CISA says a maximum severity vulnerability in AMI's MegaRAC Baseboard Management Controller (BMC) software, which enables attackers to hijack and brick servers, is currently under active exploitation.
·bleepingcomputer.com·
CISA: AMI MegaRAC bug enabling server hijacks exploited in attacks
freeSSHd 1.0.9 - Denial of Service (DoS)
freeSSHd 1.0.9 - Denial of Service (DoS)
freeSSHd 1.0.9 - Denial of Service (DoS). CVE-2024-0723 . remote exploit for Windows platform
·exploit-db.com·
freeSSHd 1.0.9 - Denial of Service (DoS)
British hacker 'IntelBroker' charged with $25M in cybercrime damages
British hacker 'IntelBroker' charged with $25M in cybercrime damages
A British national known online as "IntelBroker" has been charged by the U.S. for stealing and selling sensitive data from dozens of victims, causing an estimated $25 million in damages.
·bleepingcomputer.com·
British hacker 'IntelBroker' charged with $25M in cybercrime damages
Hackers turn ScreenConnect into malware using Authenticode stuffing
Hackers turn ScreenConnect into malware using Authenticode stuffing
Threat actors are abusing the ConnectWise ScreenConnect installer to build signed remote access malware by modifying hidden settings within the client's  Authenticode signature.
·bleepingcomputer.com·
Hackers turn ScreenConnect into malware using Authenticode stuffing
Many data brokers aren’t registering across state lines, privacy groups say | CyberScoop
Many data brokers aren’t registering across state lines, privacy groups say | CyberScoop
Hundreds of companies registered as data brokers in one U.S. state are not recognized as such in other states with similar disclosure laws, according to a new analysis by the Privacy Rights Clearinghouse and the Electronic Frontier Foundation.
·cyberscoop.com·
Many data brokers aren’t registering across state lines, privacy groups say | CyberScoop
Hackers abuse Microsoft ClickOnce and AWS services for stealthy attacks
Hackers abuse Microsoft ClickOnce and AWS services for stealthy attacks
A sophisticated malicious campaign that researchers call OneClik has been leveraging Microsoft's ClickOnce software deployment tool and custom Golang backdoors to compromise organizations within the energy, oil, and gas sectors.
·bleepingcomputer.com·
Hackers abuse Microsoft ClickOnce and AWS services for stealthy attacks
Microsoft Named a Leader in the IDC MarketScape for CNAPP: Key Takeaways for Security Buyers
Microsoft Named a Leader in the IDC MarketScape for CNAPP: Key Takeaways for Security Buyers
  The cloud-native application protection platform (CNAPP) market continues to evolve rapidly as organizations look to secure increasingly complex cloud environments. In the recently published IDC MarketScape: Worldwide CNAPP 2025 Vendor Assessment, Microsoft has been recognized as a Leader. We believe this recognition reaffirms Microsoft’s commitment to delivering comprehensive, AI-powered, and integrated security solutions for multicloud environments.     IDC MarketScape vendor analysis model is designed to provide an overview of the competitive fitness of technology and suppliers in a given market. The research methodology utilizes a rigorous scoring methodology based on both qualitative and quantitative criteria that results in a single graphical illustration of each supplier’s position within a given market. The Capabilities score measures supplier product, go-to-market and business execution in the short-term. The Strategy score measures alignment of supplier strategies with customer requirements in a 3-5-year timeframe. Supplier market share is represented by the size of the icons. Why Microsoft was recognized The IDC MarketScape noted the following strengths for Microsoft: “Defender for Cloud provides visibility into cloud attacks across the entire environment, from enterprise endpoints and exposed identities to on-premises secrets. This holistic approach examines attack vectors inside and outside the cloud. Prebreach posture graphs are integrated with live incidents, offering exposure risk assessment through blast radius analysis.” “Microsoft Defender for Cloud was also recognized for providing detailed threat analytics, combining information from various sources to create comprehensive attack paths, helping understand the severity of alerts in context, and making it easier to prioritize and respond to threats. Additional commentary addressed Security Explorer and automatic detection of sensitive data without additional configuration, enhancing the security posture by providing valuable insights and automating critical security tasks.” “Customers also highlighted the strong partnership with Microsoft, which includes dedicated support and consulting, ensuring quick resolution of issues and access to experts for optimal product use.” Key Advice for CNAPP Buyers As cloud security needs grow, selecting the right CNAPP solution means looking beyond vendor consolidation. Here are some of the key areas the IDC MarketScape advises buyers to prioritize: “Integration and enrichment of existing security data: Choose a CNAPP vendor that can easily integrate with your current deployments. The value lies in how the solution enriches your existing security data, providing deeper insights and more comprehensive protection.” “Comprehensive capabilities: Look for a solution that offers robust monitoring and reporting on cloud security posture, runtime, and application security. The goal is to select a platform based on its aggregate capabilities rather than merely reducing the vendor footprint.” “Ease of setup and support: Note that many vendors provide extensive support and make the initial setup straightforward with minimal technical effort required. However, the real value comes from planning and strategizing with stakeholders to ensure that the implementation aligns with your organizational goals.” In conclusion Defender for Cloud’s comprehensive approach blends proactive risk management, real-time monitoring, and integrated threat protection. This makes it a strong CNAPP solution for organizations seeking to future-proof their cloud security investments. For buyers navigating this dynamic market, aligning platform capabilities with operational needs, compliance demands, and long-term cloud strategies is essential. Microsoft’s CNAPP strategy, backed by a powerful ecosystem and customer-centric support model, offers a compelling path forward. Learn more Download the report excerpt here.  Visit our solution webpage to learn more about Microsoft’s CNAPP solution.    
·techcommunity.microsoft.com·
Microsoft Named a Leader in the IDC MarketScape for CNAPP: Key Takeaways for Security Buyers
Google releases Gemini CLI with free Gemini 2.5 Pro
Google releases Gemini CLI with free Gemini 2.5 Pro
Google has released Gemini 2.5 Pro-powered Gemini CLI, which allows you to use Gemini inside your terminal, including Windows Terminal.
·bleepingcomputer.com·
Google releases Gemini CLI with free Gemini 2.5 Pro
Citrix warns of NetScaler vulnerability exploited in DoS attacks
Citrix warns of NetScaler vulnerability exploited in DoS attacks
Citrix is warning that a vulnerability in NetScaler appliances tracked as CVE-2025-6543 is being actively exploited in the wild, causing devices to enter a denial of service condition.
·bleepingcomputer.com·
Citrix warns of NetScaler vulnerability exploited in DoS attacks
WinRAR patches bug letting malware launch from extracted archives
WinRAR patches bug letting malware launch from extracted archives
WinRAR has addressed a directory traversal vulnerability tracked as CVE-2025-6218 that, under certain circumstances, allows malware to be executed after extracting a malicious archive.
·bleepingcomputer.com·
WinRAR patches bug letting malware launch from extracted archives
Interpellation de hackers : 4 Français cachés derrière le réseau cybercriminel Breach Forums ?
Interpellation de hackers : 4 Français cachés derrière le réseau cybercriminel Breach Forums ?
La scène cyber française vient de connaître un séisme : 4 jeunes hackers sont soupçonnés d’avoir administré le célèbre site cybercriminel Breach Forums. Ils ont été interpellés, le 25 juin 2025, par la Brigade de lutte contre la cybercriminalité (BL2C) de la préfecture de police de Paris.  La chute de Breach Forums
·numerama.com·
Interpellation de hackers : 4 Français cachés derrière le réseau cybercriminel Breach Forums ?
New ‘CitrixBleed 2’ NetScaler flaw let hackers hijack sessions
New ‘CitrixBleed 2’ NetScaler flaw let hackers hijack sessions
A recent vulnerability in Citrix NetScaler ADC and Gateway is dubbed "CitrixBleed 2," after its similarity to an older exploited flaw that allowed unauthenticated attackers to hijack authentication session cookies from vulnerable devices.
·bleepingcomputer.com·
New ‘CitrixBleed 2’ NetScaler flaw let hackers hijack sessions