Twilio denies breach following leak of alleged Steam 2FA codes
Twilio has denied in a statement for BleepingComputer that it was breached after a threat actor claimed to be holding over 89 million Steam user records with one-time access codes.
Ivanti fixes EPMM zero-days chained in code execution attacks
Ivanti warned customers today to patch their Ivanti Endpoint Manager Mobile (EPMM) software against two security vulnerabilities chained in attacks to gain remote code execution.
Microsoft May 2025 Patch Tuesday fixes 5 exploited zero-days, 72 flaws
Today is Microsoft's May 2025 Patch Tuesday, which includes security updates for 72 flaws, including five actively exploited and two publicly disclosed zero-day vulnerabilities.
US extradites Kosovo national charged in operating illegal online marketplace
A 33-year-old Kosovo citizen, Liridon Masurica, has been extradited to the U.S. to face charges related to his alleged role in operating an illegal online marketplace.
Windows 10 KB5058379 update fixes SgrmBroker errors in Event Viewer
Microsoft has released the KB5058379 cumulative update for Windows 10 22H2 and Windows 10 21H2, with four fixes and changes, including one for an SGRMBroker bug.
Chinese-speaking hackers disrupt drone supply chains in Taiwan, researchers say
Earth Ammit, as the group is known, launched two waves of campaigns from 2023 to 2024, affecting a range of industries including military, satellite, heavy industry, media, technology, software services and healthcare.
Fortinet fixes critical zero-day exploited in FortiVoice attacks
Fortinet released security updates to patch a critical remote code execution vulnerability exploited as a zero-day in attacks targeting FortiVoice enterprise phone systems.
Cybersécurité : L’Europe se dote de sa propre base de données sur les vulnérabilités
L'Agence européenne pour la cybersécurité vient de mettre en ligne la première base de données européenne qui centralise les vulnérabilités...-Cybersécurité
Ivanti warns of critical Neurons for ITSM auth bypass flaw
Ivanti has released security updates for its Neurons for ITSM IT service management solution that mitigate a critical authentication bypass vulnerability.
Turkey-Aligned Hackers Targeted Iraq-Based Kurds with Zero-Day Exploit
Marbled Dust has been exploiting a vulnerability in user accounts associated with the Kurdish military operating in Iraq for over a year, according to Microsoft
New Intel CPU flaws leak sensitive data from privileged memory
A new "Branch Privilege Injection" flaw in all modern Intel CPUs allows attackers to leak sensitive data from memory regions allocated to privileged software like the operating system kernel.
EU launches vulnerability database to tackle cybersecurity threats
The European Union launched on Tuesday its new vulnerability database to provide aggregated information regarding cybersecurity issues affecting various products and services.
Microsoft will update Office apps on Windows 10 until 2028
Microsoft has backtracked on its plan to end support for Office apps on Windows 10 later this year and announced that it will continue providing security updates for three more years, until 2028.
State and local election officials plead with Congress for election security funding | CyberScoop
150 active and retired officials from across the country asked Senate and House appropriations leaders to set aside $400 million for the next fiscal year.
Increase Red Team Operations 10X with Adversarial Exposure Validation
Red teams uncover what others miss — but they can't be everywhere, all the time. Adversarial Exposure Validation combines BAS + Automated Pentesting to extend red team impact, uncover real attack paths, and validate defenses continuously. Learn more from Picus Security on how AEV can help protect your network.
Black-out en Espagne : La piste d'une cyberattaque contre les parcs solaires et éoliens
L'Institut national de cybersécurité espagnol serait en train d'enquêter sur la panne électrique géante auprès des entreprises gestionnaires...-Cybersécurité
Non, l'iPhone de Nicolas ne l'écoute pas (et le vôtre non plus) - Numerama
Dans un article du Parisien, on découvre qu'un utilisateur d'iPhone estime être écouté par son appareil qui afficherait ensuite des publicités basées sur ses conversations. Cette théorie populaire est fausse. C'est toujours la même histoire et elle est toujours fausse. Nos confrères du Parisien se font l'écho ce 13
Explore 2025's top security trends: AI governance, compliance automation, third-party risk, and building trust to enhance your organization's security strategy.
Alabama says ‘cybersecurity event’ could disrupt state government services
Alabama Governor Kay Ivey said the state is responding to a "cybersecurity event" that has prompted government IT staff to work "around-the-clock to identify and mitigate impacts."