Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29730 bookmarks
Custom sorting
Twilio denies breach following leak of alleged Steam 2FA codes
Twilio denies breach following leak of alleged Steam 2FA codes
Twilio has denied in a statement for BleepingComputer that it was breached after a threat actor claimed to be holding over 89 million Steam user records with one-time access codes.
·bleepingcomputer.com·
Twilio denies breach following leak of alleged Steam 2FA codes
Ivanti fixes EPMM zero-days chained in code execution attacks
Ivanti fixes EPMM zero-days chained in code execution attacks
Ivanti warned customers today to patch their Ivanti Endpoint Manager Mobile (EPMM) software against two security vulnerabilities chained in attacks to gain remote code execution.
·bleepingcomputer.com·
Ivanti fixes EPMM zero-days chained in code execution attacks
Microsoft May 2025 Patch Tuesday fixes 5 exploited zero-days, 72 flaws
Microsoft May 2025 Patch Tuesday fixes 5 exploited zero-days, 72 flaws
Today is Microsoft's May 2025 Patch Tuesday, which includes security updates for 72 flaws, including five actively exploited and two publicly disclosed zero-day vulnerabilities.
·bleepingcomputer.com·
Microsoft May 2025 Patch Tuesday fixes 5 exploited zero-days, 72 flaws
Chinese-speaking hackers disrupt drone supply chains in Taiwan, researchers say
Chinese-speaking hackers disrupt drone supply chains in Taiwan, researchers say
Earth Ammit, as the group is known, launched two waves of campaigns from 2023 to 2024, affecting a range of industries including military, satellite, heavy industry, media, technology, software services and healthcare.
·therecord.media·
Chinese-speaking hackers disrupt drone supply chains in Taiwan, researchers say
Windows 11 KB5058411 and KB5058405 cumulative updates released
Windows 11 KB5058411 and KB5058405 cumulative updates released
Microsoft has released Windows 11 KB5058411 and KB5058405 cumulative updates for versions 24H2 and 23H2 to fix security vulnerabilities and issues.
·bleepingcomputer.com·
Windows 11 KB5058411 and KB5058405 cumulative updates released
Fortinet fixes critical zero-day exploited in FortiVoice attacks
Fortinet fixes critical zero-day exploited in FortiVoice attacks
Fortinet released security updates to patch a critical remote code execution vulnerability exploited as a zero-day in attacks targeting FortiVoice enterprise phone systems.
·bleepingcomputer.com·
Fortinet fixes critical zero-day exploited in FortiVoice attacks
Ivanti warns of critical Neurons for ITSM auth bypass flaw
Ivanti warns of critical Neurons for ITSM auth bypass flaw
​Ivanti has released security updates for its Neurons for ITSM IT service management solution that mitigate a critical authentication bypass vulnerability.
·bleepingcomputer.com·
Ivanti warns of critical Neurons for ITSM auth bypass flaw
New Intel CPU flaws leak sensitive data from privileged memory
New Intel CPU flaws leak sensitive data from privileged memory
A new "Branch Privilege Injection" flaw in all modern Intel CPUs allows attackers to leak sensitive data from memory regions allocated to privileged software like the operating system kernel.
·bleepingcomputer.com·
New Intel CPU flaws leak sensitive data from privileged memory
EU launches vulnerability database to tackle cybersecurity threats
EU launches vulnerability database to tackle cybersecurity threats
The European Union launched on Tuesday its new vulnerability database to provide aggregated information regarding cybersecurity issues affecting various products and services.
·therecord.media·
EU launches vulnerability database to tackle cybersecurity threats
Microsoft will update Office apps on Windows 10 until 2028
Microsoft will update Office apps on Windows 10 until 2028
Microsoft has backtracked on its plan to end support for Office apps on Windows 10 later this year and announced that it will continue providing security updates for three more years, until 2028.
·bleepingcomputer.com·
Microsoft will update Office apps on Windows 10 until 2028
Increase Red Team Operations 10X with Adversarial Exposure Validation
Increase Red Team Operations 10X with Adversarial Exposure Validation
Red teams uncover what others miss — but they can't be everywhere, all the time. Adversarial Exposure Validation combines BAS + Automated Pentesting to extend red team impact, uncover real attack paths, and validate defenses continuously. Learn more from Picus Security on how AEV can help protect your network.
·bleepingcomputer.com·
Increase Red Team Operations 10X with Adversarial Exposure Validation
Non, l'iPhone de Nicolas ne l'écoute pas (et le vôtre non plus) - Numerama
Non, l'iPhone de Nicolas ne l'écoute pas (et le vôtre non plus) - Numerama
Dans un article du Parisien, on découvre qu'un utilisateur d'iPhone estime être écouté par son appareil qui afficherait ensuite des publicités basées sur ses conversations. Cette théorie populaire est fausse. C'est toujours la même histoire et elle est toujours fausse. Nos confrères du Parisien se font l'écho ce 13
·numerama.com·
Non, l'iPhone de Nicolas ne l'écoute pas (et le vôtre non plus) - Numerama
2025 Trust Trends Shaping Security Strategies | CSA
2025 Trust Trends Shaping Security Strategies | CSA
Explore 2025's top security trends: AI governance, compliance automation, third-party risk, and building trust to enhance your organization's security strategy.
·cloudsecurityalliance.org·
2025 Trust Trends Shaping Security Strategies | CSA