Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

30533 bookmarks
Custom sorting
« Quelqu’un d’autre a une coupure d’électricité ? » : qu’est-ce qui se passe quand une crise cyber se déclenche ?
« Quelqu’un d’autre a une coupure d’électricité ? » : qu’est-ce qui se passe quand une crise cyber se déclenche ?
Nous avons eu l'opportunité de vivre de l'intérieur une crise cyber majeure, du moins en simulation, dans des conditions proches du réel. Une méthode d'entraînement inspirée des stratégies militaires, de plus en plus adoptée dans l'univers de la cybersécurité, jusqu'au ministère des Armées. Esplanade de la Défense,
·numerama.com·
« Quelqu’un d’autre a une coupure d’électricité ? » : qu’est-ce qui se passe quand une crise cyber se déclenche ?
PerfektBlue BlueTooth flaws impact Mercedes, Volkswagen, Skoda cars
PerfektBlue BlueTooth flaws impact Mercedes, Volkswagen, Skoda cars
Four vulnerabilities dubbed PerfektBlue and affecting the BlueSDK Bluetooth stack from OpenSynergy can be exploited to achieve remote code execution and potentially allow access to critical elements in vehicles from multiple vendors, including Mercedes-Benz AG, Volkswagen, and Skoda.
·bleepingcomputer.com·
PerfektBlue BlueTooth flaws impact Mercedes, Volkswagen, Skoda cars
How Your Zero Trust Environment Affects Compliance | CSA
How Your Zero Trust Environment Affects Compliance | CSA
Explore the effects of Zero Trust implementation on your compliance assessments. Understand what to expect upon your first audit cycle with Zero Trust.
·cloudsecurityalliance.org·
How Your Zero Trust Environment Affects Compliance | CSA
LLMs Fall Short in Vulnerability Discovery and Exploitation
LLMs Fall Short in Vulnerability Discovery and Exploitation
Forescout found that most LLMs are unreliable in vulnerability research and exploit tasks, with threat actors still skeptical about using tools for these purposes
·infosecurity-magazine.com·
LLMs Fall Short in Vulnerability Discovery and Exploitation
FBI's CJIS demystified: Best practices for passwords, MFA & access control
FBI's CJIS demystified: Best practices for passwords, MFA & access control
FBI's Criminal Justice Information Services (CJIS) compliance isn't optional when handling law enforcement data. From MFA to password hygiene, see how Specops Software helps meet FBI standards while also securing your Windows Active Directory.
·bleepingcomputer.com·
FBI's CJIS demystified: Best practices for passwords, MFA & access control
McDonald’s AI bot spills data on job applicants
McDonald’s AI bot spills data on job applicants
The job applicants' personal information could be accessed by simply guessing a username and using the password “12345.”
·malwarebytes.com·
McDonald’s AI bot spills data on job applicants
Four arrested in UK over M&S, Co-op, Harrod cyberattacks
Four arrested in UK over M&S, Co-op, Harrod cyberattacks
The UK's National Crime Agency (NCA) arrested four people suspected of being involved in cyberattacks on major retailers in the country, including Marks & Spencer, Co-op, and Harrods.
·bleepingcomputer.com·
Four arrested in UK over M&S, Co-op, Harrod cyberattacks
Agentic AI, MCP, and the Identity Explosion | CSA
Agentic AI, MCP, and the Identity Explosion | CSA
Model Context Protocol (MCP) allows AI agents to interface with external systems. It powers a new class of software with unique identity security challenges.
·cloudsecurityalliance.org·
Agentic AI, MCP, and the Identity Explosion | CSA
Code highlighting with Cursor AI for $500,000
Code highlighting with Cursor AI for $500,000
Kaspersky GReAT experts uncover malicious extensions for Cursor AI that download the Quasar backdoor and a crypto stealer.
·securelist.com·
Code highlighting with Cursor AI for $500,000