Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29738 bookmarks
Custom sorting
Airlines Secretly Selling Passenger Data to the Government - Schneier on Security
Airlines Secretly Selling Passenger Data to the Government - Schneier on Security
This is news: A data broker owned by the country’s major airlines, including Delta, American Airlines, and United, collected U.S. travellers’ domestic flight records, sold access to them to Customs and Border Protection (CBP), and then as part of the contract told CBP to not reveal where the data came from, according to internal CBP documents obtained by 404 Media. The data includes passenger names, their full flight itineraries, and financial details. Another article.
·schneier.com·
Airlines Secretly Selling Passenger Data to the Government - Schneier on Security
Belarusian hackers taunt Kaspersky over report detailing their attacks
Belarusian hackers taunt Kaspersky over report detailing their attacks
A recent Kaspersky report offers a rare glimpse into the alleged arsenal of politically motivated hackers waging a digital war against authoritarian regimes in Russia and Belarus.
·therecord.media·
Belarusian hackers taunt Kaspersky over report detailing their attacks
The $200,000 Zoom call
The $200,000 Zoom call
A crypto CEO shared his screen. What happened next unraveled his digital life.
·therecord.media·
The $200,000 Zoom call
Financement des start-up cyber : Moins de levées et des tickets plus gros
Financement des start-up cyber : Moins de levées et des tickets plus gros
Alors que les start-up françaises spécialisées dans la sécurité informatique lèvent davantage de fonds, le nombre d'opérations chute nettement...-CybersĂ©curitĂ©
·usine-digitale.fr·
Financement des start-up cyber : Moins de levées et des tickets plus gros
Password-spraying attacks target 80,000 Microsoft Entra ID accounts
Password-spraying attacks target 80,000 Microsoft Entra ID accounts
Hackers have been using the TeamFiltration pentesting framework to target more than 80,000 Microsoft Entra ID accounts at hundreds of organizations worldwide.
·bleepingcomputer.com·
Password-spraying attacks target 80,000 Microsoft Entra ID accounts
State of Data Security Report 2025
State of Data Security Report 2025
This week in cybersecurity from the editors at Cybercrime Magazine
·cybersecurityventures.com·
State of Data Security Report 2025
New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes | Read more hacking news on The Hacker News cybersecurity news website and learn how to protect against cyberattacks and software vulnerabilities.
·thehackernews.com·
New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
The AI Trustworthy Pledge Matters Now More Than Ever | CSA
The AI Trustworthy Pledge Matters Now More Than Ever | CSA
CSA’s AI Trustworthy Pledge is a commitment that signals an organization's dedication to four foundational principles that should underpin every AI initiative.
·cloudsecurityalliance.org·
The AI Trustworthy Pledge Matters Now More Than Ever | CSA
GitLab patches high severity account takeover, missing auth issues
GitLab patches high severity account takeover, missing auth issues
GitLab has released security updates to address multiple vulnerabilities in the company's DevSecOps platform, including ones enabling attackers to take over accounts and inject malicious jobs in future pipelines.
·bleepingcomputer.com·
GitLab patches high severity account takeover, missing auth issues
DNS Posture Management: Close DNS Security Gaps | CSA
DNS Posture Management: Close DNS Security Gaps | CSA
Secure enterprise DNS with posture management: gain visibility, detect phishing domains, plus certificate and PQC monitoring.
·cloudsecurityalliance.org·
DNS Posture Management: Close DNS Security Gaps | CSA
SHARED INTEL Q&A: A sharper lens on rising API logic abuse — and a framework to fight back
SHARED INTEL Q&A: A sharper lens on rising API logic abuse — and a framework to fight back
In today’s digital enterprise, API-driven infrastructure is the connective tissue holding everything together. Related: The DocuSign API-abuse hack From mobile apps to backend workflows, APIs are what keep digital services talking—and scaling. But this essential layer of connectivity is also where attackers are gaining traction, often quietly and with alarming precision. Jamison Utter, a cybersecurity
·lastwatchdog.com·
SHARED INTEL Q&A: A sharper lens on rising API logic abuse — and a framework to fight back
NIST Publishes New Zero Trust Implementation Guidance
NIST Publishes New Zero Trust Implementation Guidance
The new NIST guidance sets out 19 example implementations of zero trust using commercial, off-the-shelf technologies
·infosecurity-magazine.com·
NIST Publishes New Zero Trust Implementation Guidance
Windows 11 24H2 emergency update fixes Easy Anti-Cheat BSOD issue
Windows 11 24H2 emergency update fixes Easy Anti-Cheat BSOD issue
Microsoft has released an emergency Windows 11 24H2 update to address an incompatibility issue triggering restarts with blue screen of death (BSOD) errors on systems with Easy Anti-Cheat.
·bleepingcomputer.com·
Windows 11 24H2 emergency update fixes Easy Anti-Cheat BSOD issue
Montres connectées et ultrasons : le danger invisible qui menace même les ordinateurs les plus protégés
Montres connectées et ultrasons : le danger invisible qui menace même les ordinateurs les plus protégés
Des chercheurs israéliens ont prouvé que les montres connectées, objets du quotidien, peuvent servir à dérober des données sensibles depuis des ordinateurs pourtant totalement coupés d’Internet. Leur méthode, baptisée SmartAttack, repose sur la transmission de données par ultrasons et révèle une faille insoupçonnée
·numerama.com·
Montres connectées et ultrasons : le danger invisible qui menace même les ordinateurs les plus protégés