Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29738 bookmarks
Custom sorting
Increase Red Team Operations 10X with Adversarial Exposure Validation
Increase Red Team Operations 10X with Adversarial Exposure Validation
Red teams uncover what others miss — but they can't be everywhere, all the time. Adversarial Exposure Validation combines BAS + Automated Pentesting to extend red team impact, uncover real attack paths, and validate defenses continuously. Learn more from Picus Security on how AEV can help protect your network.
·bleepingcomputer.com·
Increase Red Team Operations 10X with Adversarial Exposure Validation
Non, l'iPhone de Nicolas ne l'écoute pas (et le vôtre non plus) - Numerama
Non, l'iPhone de Nicolas ne l'écoute pas (et le vôtre non plus) - Numerama
Dans un article du Parisien, on découvre qu'un utilisateur d'iPhone estime être écouté par son appareil qui afficherait ensuite des publicités basées sur ses conversations. Cette théorie populaire est fausse. C'est toujours la même histoire et elle est toujours fausse. Nos confrères du Parisien se font l'écho ce 13
·numerama.com·
Non, l'iPhone de Nicolas ne l'écoute pas (et le vôtre non plus) - Numerama
2025 Trust Trends Shaping Security Strategies | CSA
2025 Trust Trends Shaping Security Strategies | CSA
Explore 2025's top security trends: AI governance, compliance automation, third-party risk, and building trust to enhance your organization's security strategy.
·cloudsecurityalliance.org·
2025 Trust Trends Shaping Security Strategies | CSA
RDPGuard 9.9.9 - Privilege Escalation
RDPGuard 9.9.9 - Privilege Escalation
RDPGuard 9.9.9 - Privilege Escalation. CVE-n/a . local exploit for Multiple platform
·exploit-db.com·
RDPGuard 9.9.9 - Privilege Escalation
Defining a new methodology for modeling and tracking compartmentalized threats
Defining a new methodology for modeling and tracking compartmentalized threats
How do you profile actors and defend your systems when multiple threat actors are working together? In Part 2, Cisco Talos proposes an extended Diamond Model to analyze complex relationships between attackers.
·blog.talosintelligence.com·
Defining a new methodology for modeling and tracking compartmentalized threats
North Korean hackers target Ukrainian government in new espionage campaign
North Korean hackers target Ukrainian government in new espionage campaign
The latest wave of activity in Ukraine suggests that Pyongyang is seeking to “better understand the appetite to continue fighting against the Russian invasion” and “the medium-term outlook of the conflict,” according to the latest report by cybersecurity firm Proofpoint.
·therecord.media·
North Korean hackers target Ukrainian government in new espionage campaign
Deepfake Defense in the Age of AI
Deepfake Defense in the Age of AI
Voice phishing rose 442% in late 2024 as AI deepfakes bypass detection tools, forcing shift to prevention.
·thehackernews.com·
Deepfake Defense in the Age of AI
SaaS Security Lessons from Recent Attacks | CSA
SaaS Security Lessons from Recent Attacks | CSA
Explore how recent cyberattacks reveal gaps in cloud and SaaS security for critical infrastructure and learn what steps can mitigate future threats.
·cloudsecurityalliance.org·
SaaS Security Lessons from Recent Attacks | CSA
Court Rules Against NSO Group - Schneier on Security
Court Rules Against NSO Group - Schneier on Security
The case is over: A jury has awarded WhatsApp $167 million in punitive damages in a case the company brought against Israel-based NSO Group for exploiting a software vulnerability that hijacked the phones of thousands of users. I’m sure it’ll be appealed. Everything always is.
·schneier.com·
Court Rules Against NSO Group - Schneier on Security
M&S Confirms Customer Data Stolen in Cyber-Attack
M&S Confirms Customer Data Stolen in Cyber-Attack
M&S Chief Executive, Stuart Machin, said that the firm has written to customers to inform them that some personal information was accessed by threat actors
·infosecurity-magazine.com·
M&S Confirms Customer Data Stolen in Cyber-Attack
La cybersécurité freine le déploiement IoT de 9 entreprises sur 10
La cybersécurité freine le déploiement IoT de 9 entreprises sur 10
Selon une étude, ces entreprises exigent des solutions avancées pour surveiller leurs appareils connectés, mettant les fournisseurs de...-Cybersécurité
·usine-digitale.fr·
La cybersécurité freine le déploiement IoT de 9 entreprises sur 10
UK Considers New Enterprise IoT Security Law
UK Considers New Enterprise IoT Security Law
The UK government wants to hear feedback on a possible new standard or legislation to improve enterprise IoT security
·infosecurity-magazine.com·
UK Considers New Enterprise IoT Security Law
Author’s Q&A: It’s high time for CISOs to start leading strategically — or risk being scapegoated - The Last Watchdog
Author’s Q&A: It’s high time for CISOs to start leading strategically — or risk being scapegoated - The Last Watchdog
The cybersecurity landscape has never moved faster — and the people tasked with defending it have never felt more exposed. Related: How real people are really using GenAI Today’s Chief Information Security Officers (CISOs) operate in a pressure cooker: responsible for protecting critical assets, expected to show up in the boardroom with fluency, yet rarely
·lastwatchdog.com·
Author’s Q&A: It’s high time for CISOs to start leading strategically — or risk being scapegoated - The Last Watchdog