Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29738 bookmarks
Custom sorting
CCM: Avoid Vendor Lock-In with Portability Controls | CSA
CCM: Avoid Vendor Lock-In with Portability Controls | CSA
Implement the 11th domain of CCM: Interoperability & Portability. Avoid vendor lock-in and ensure seamless data exchange across multiple platforms and CSPs.
·cloudsecurityalliance.org·
CCM: Avoid Vendor Lock-In with Portability Controls | CSA
Victoria’s Secret restores critical systems after cyberattack
Victoria’s Secret restores critical systems after cyberattack
Victoria's Secret has restored all critical systems impacted by a May 24 security incident that forced it to shut down corporate systems and the e-commerce website.
·bleepingcomputer.com·
Victoria’s Secret restores critical systems after cyberattack
Runtime Integrity Measurement Overview | CSA
Runtime Integrity Measurement Overview | CSA
Dive into the details of a real world rootkit & learn how Kernel Integrity Measurement technology detects novel rootkits that exploit zero day vulnerabilities.
·cloudsecurityalliance.org·
Runtime Integrity Measurement Overview | CSA
Paragon Spyware used to Spy on European Journalists - Schneier on Security
Paragon Spyware used to Spy on European Journalists - Schneier on Security
Paragon is a Israeli spyware company, increasingly in the news (now that NSO Group seems to be waning). “Graphite” is the name of their product. Citizen Lab caught them spying on multiple European journalists with a zero-click iOS exploit: On April 29, 2025, a select group of iOS users were notified by Apple that they were targeted with advanced spyware. Among the group were two journalists that consented for the technical analysis of their cases. The key findings from our forensic analysis of their devices are summarized below: Our analysis finds forensic evidence confirming with high confidence that both a prominent European journalist (who requests anonymity), and Italian journalist Ciro Pellegrino, were targeted with Paragon’s Graphite mercenary spyware. ...
·schneier.com·
Paragon Spyware used to Spy on European Journalists - Schneier on Security
DanaBleed : l’erreur fatale qui a fait tomber les maîtres du hacking
DanaBleed : l’erreur fatale qui a fait tomber les maîtres du hacking
Pendant près de trois ans, des chercheurs ont pu collecter des milliers de données confidentielles sur Danabot, un des réseaux cybercriminels les plus recherchés au monde. La faute à une faille dans leur infrastructure, baptisée DanaBleed. Nous sommes en mai 2025, et le botnet DanaBot, l’un des réseaux de
·numerama.com·
DanaBleed : l’erreur fatale qui a fait tomber les maîtres du hacking
CIS Benchmarks June 2025 Update
CIS Benchmarks June 2025 Update
Here is an overview of the CIS Benchmarks that the Center for Internet Security (CIS) updated or released for June 2025.
·cisecurity.org·
CIS Benchmarks June 2025 Update
Know thyself, know thy environment
Know thyself, know thy environment
In this week's edition, Bill explores the importance of self-awareness and building repeatable processes to better secure your environment.
·blog.talosintelligence.com·
Know thyself, know thy environment
Trend Micro fixes critical vulnerabilities in multiple products
Trend Micro fixes critical vulnerabilities in multiple products
Trend Micro has released security updates to address multiple critical-severity remote code execution and authentication bypass vulnerabilities that impact its Apex Central and Endpoint Encryption (TMEE) PolicyServer products.
·bleepingcomputer.com·
Trend Micro fixes critical vulnerabilities in multiple products
Graphite spyware used in Apple iOS zero-click attacks on journalists
Graphite spyware used in Apple iOS zero-click attacks on journalists
Forensic investigation has confirmed the use of Paragon's Graphite spyware platform in zero-click attacks that targeted Apple iOS devices of at least two journalists in Europe.
·bleepingcomputer.com·
Graphite spyware used in Apple iOS zero-click attacks on journalists
Cyber resilience begins before the crisis
Cyber resilience begins before the crisis
Microsoft’s Deputy CISO for Customer Security, Ann Johnson, talks about the need for having a proactive cyber resilience plan.
·microsoft.com·
Cyber resilience begins before the crisis