Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29738 bookmarks
Custom sorting
Focused Phishing: Attack Targets Victims With Trusted Sites and Live Validation
Focused Phishing: Attack Targets Victims With Trusted Sites and Live Validation
New phishing tactics are abusing trusted domains, real CAPTCHAs, and server-side email validation to selectively target victims with customized fake login pages. Keep Aware's latest research breaks down the full attack chain and how these zero-day phish operate.
·bleepingcomputer.com·
Focused Phishing: Attack Targets Victims With Trusted Sites and Live Validation
Dior victime d'une cyberattaque, des données personnelles de clients dérobées
Dior victime d'une cyberattaque, des données personnelles de clients dérobées
La maison de mode française a prévenu ses clients qu'un tiers non autorisé avait accédé à certaines données clients, parmi lesquelles des...-Cybersécurité
·usine-digitale.fr·
Dior victime d'une cyberattaque, des données personnelles de clients dérobées
France Identité passe le cap des deux millions d’usagers
France Identité passe le cap des deux millions d’usagers
L'application "France Identité" a atteint les deux millions d'utilisateurs. Permettant de prouver son identité, elle offre un portefeuille de...-Identité numérique
·usine-digitale.fr·
France Identité passe le cap des deux millions d’usagers
Fashion giant Dior discloses cyberattack, warns of data breach
Fashion giant Dior discloses cyberattack, warns of data breach
House of Dior, the French luxury fashion brand commonly referred to as Dior, has disclosed a cybersecurity incident that has exposed customer information.
·bleepingcomputer.com·
Fashion giant Dior discloses cyberattack, warns of data breach
ISO 42001 Requirements Explained: Achieve Compliance | CSA
ISO 42001 Requirements Explained: Achieve Compliance | CSA
ISO 42001 mandates numerous requirements for the establishment, operation, monitoring, maintenance, and improvement of an organization’s AI management system.
·cloudsecurityalliance.org·
ISO 42001 Requirements Explained: Achieve Compliance | CSA
New Fortinet and Ivanti Zero Days Exploited in the Wild
New Fortinet and Ivanti Zero Days Exploited in the Wild
Fortinet and Ivanti published advisories on the same day revealing that attackers are exploiting new zero days, one of which is rated critical
·infosecurity-magazine.com·
New Fortinet and Ivanti Zero Days Exploited in the Wild
Patch Tuesday, May 2025 Edition
Patch Tuesday, May 2025 Edition
Microsoft on Tuesday released software updates to fix at least 70 vulnerabilities in Windows and related products, including five zero-day flaws that are already seeing active exploitation. Adding to the sense of urgency with this month's patch batch from Redmond…
·krebsonsecurity.com·
Patch Tuesday, May 2025 Edition
Google's Advanced Protection Now on Android - Schneier on Security
Google's Advanced Protection Now on Android - Schneier on Security
Google has extended its Advanced Protection features to Android devices. It’s not for everybody, but something to be considered by high-risk users. Wired article, behind a paywall.
·schneier.com·
Google's Advanced Protection Now on Android - Schneier on Security
Fortinet fixed actively exploited FortiVoice zero-day
Fortinet fixed actively exploited FortiVoice zero-day
Fortinet fixed a critical remote code execution zero-day actively exploited in attacks targeting FortiVoice enterprise phone systems.
·securityaffairs.com·
Fortinet fixed actively exploited FortiVoice zero-day
What's new in Burp Suite Professional: A year of innovation
What's new in Burp Suite Professional: A year of innovation
Over the past year, we’ve been hard at work making Burp Suite Professional faster, smarter, and more powerful than ever before. From the launch of Burp AI to major performance upgrades, there's never
·portswigger.net·
What's new in Burp Suite Professional: A year of innovation
Microsoft Patch Tuesday for May 2025 — Snort rules and prominent vulnerabilities
Microsoft Patch Tuesday for May 2025 — Snort rules and prominent vulnerabilities
Microsoft has released its monthly security update for May of 2025 which includes 78 vulnerabilities affecting a range of products, including 11 that Microsoft marked as “critical”.   Microsoft noted five vulnerabilities that have been observed to be exploited in the wild. CVE-2025-30397 is a remote code execution vulnerability in the Microsoft Scripting Engine. There were also four elevation of privilege vulnerabilities being actively exploited, CVE-2025-32709, CVE-2025-30400, CVE-2025-32701 a
·blog.talosintelligence.com·
Microsoft Patch Tuesday for May 2025 — Snort rules and prominent vulnerabilities