Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29707 bookmarks
Custom sorting
Windows 11 now uses JScript9Legacy engine for improved security
Windows 11 now uses JScript9Legacy engine for improved security
Microsoft announced that it has replaced the default scripting engine JScript with the newer and more secure JScript9Legacy on Windows 11 version 24H2 and later.
·bleepingcomputer.com·
Windows 11 now uses JScript9Legacy engine for improved security
Patch, track, repeat
Patch, track, repeat
Thorsten takes stock of a rapidly evolving vulnerability landscape: record-setting CVE publication rates, the growing fragmentation of reporting systems, and why consistent tracking and patching remain critical as we move through 2025.
·blog.talosintelligence.com·
Patch, track, repeat
Former Mexican president investigated over allegedly taking bribes from spyware industry
Former Mexican president investigated over allegedly taking bribes from spyware industry
The investigation comes in response to an account in the Israeli business publication TheMarker, which reported that the contracts included a deal to buy Pegasus — the powerful spyware manufactured by Israel-based NSO Group.
·therecord.media·
Former Mexican president investigated over allegedly taking bribes from spyware industry
UK Charges Four in ‘Scattered Spider’ Ransom Group
UK Charges Four in ‘Scattered Spider’ Ransom Group
Authorities in the United Kingdom this week arrested four alleged members of "Scattered Spider," a prolific data theft and extortion group whose recent victims include multiple airlines and the U.K. retail chain Marks & Spencer.
·krebsonsecurity.com·
UK Charges Four in ‘Scattered Spider’ Ransom Group
Asus and Adobe vulnerabilities
Asus and Adobe vulnerabilities
Cisco Talos’ Vulnerability Discovery & Research team recently disclosed two vulnerabilities each in Asus Armoury Crate and Adobe Acrobat products.
·blog.talosintelligence.com·
Asus and Adobe vulnerabilities
News alert: INE Security debuts advanced eMAPT certification to close mobile security talent gap
News alert: INE Security debuts advanced eMAPT certification to close mobile security talent gap
Cary, NC, July 10, 2025, CyberNewsire—INE Security, a leading provider of cybersecurity education and cybersecurity certifications, today launched its significantly enhanced eMAPT (Mobile Application Penetration Testing) certification. The updated certification delivers the industry's most comprehensive and practical approach to mobile application security testing. CSO Magazine recently recognized eMAPT among the Top 16 OffSec, pen-testing, and
·lastwatchdog.com·
News alert: INE Security debuts advanced eMAPT certification to close mobile security talent gap
Introducing the CSA AI Controls Matrix | CSA
Introducing the CSA AI Controls Matrix | CSA
The AI Controls Matrix helps organizations securely develop, implement, and use AI technologies. Learn why such a framework is essential in today’s landscape.
·cloudsecurityalliance.org·
Introducing the CSA AI Controls Matrix | CSA
« Quelqu’un d’autre a une coupure d’électricitĂ© ? » : qu’est-ce qui se passe quand une crise cyber se dĂ©clenche ?
« Quelqu’un d’autre a une coupure d’électricitĂ© ? » : qu’est-ce qui se passe quand une crise cyber se dĂ©clenche ?
Nous avons eu l'opportunité de vivre de l'intérieur une crise cyber majeure, du moins en simulation, dans des conditions proches du réel. Une méthode d'entraßnement inspirée des stratégies militaires, de plus en plus adoptée dans l'univers de la cybersécurité, jusqu'au ministÚre des Armées. Esplanade de la Défense,
·numerama.com·
« Quelqu’un d’autre a une coupure d’électricitĂ© ? » : qu’est-ce qui se passe quand une crise cyber se dĂ©clenche ?
PerfektBlue BlueTooth flaws impact Mercedes, Volkswagen, Skoda cars
PerfektBlue BlueTooth flaws impact Mercedes, Volkswagen, Skoda cars
Four vulnerabilities dubbed PerfektBlue and affecting the BlueSDK Bluetooth stack from OpenSynergy can be exploited to achieve remote code execution and potentially allow access to critical elements in vehicles from multiple vendors, including Mercedes-Benz AG, Volkswagen, and Skoda.
·bleepingcomputer.com·
PerfektBlue BlueTooth flaws impact Mercedes, Volkswagen, Skoda cars
Ingram Micro restores global operations following hack
Ingram Micro restores global operations following hack
The company is still assessing the full impact of the ransomware attack, which has been linked to the SafePay hacker group.
·cybersecuritydive.com·
Ingram Micro restores global operations following hack
How Your Zero Trust Environment Affects Compliance | CSA
How Your Zero Trust Environment Affects Compliance | CSA
Explore the effects of Zero Trust implementation on your compliance assessments. Understand what to expect upon your first audit cycle with Zero Trust.
·cloudsecurityalliance.org·
How Your Zero Trust Environment Affects Compliance | CSA
LLMs Fall Short in Vulnerability Discovery and Exploitation
LLMs Fall Short in Vulnerability Discovery and Exploitation
Forescout found that most LLMs are unreliable in vulnerability research and exploit tasks, with threat actors still skeptical about using tools for these purposes
·infosecurity-magazine.com·
LLMs Fall Short in Vulnerability Discovery and Exploitation
FBI's CJIS demystified: Best practices for passwords, MFA & access control
FBI's CJIS demystified: Best practices for passwords, MFA & access control
FBI's Criminal Justice Information Services (CJIS) compliance isn't optional when handling law enforcement data. From MFA to password hygiene, see how Specops Software helps meet FBI standards while also securing your Windows Active Directory.
·bleepingcomputer.com·
FBI's CJIS demystified: Best practices for passwords, MFA & access control
McDonald’s AI bot spills data on job applicants
McDonald’s AI bot spills data on job applicants
The job applicants' personal information could be accessed by simply guessing a username and using the password “12345.”
·malwarebytes.com·
McDonald’s AI bot spills data on job applicants