Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

30533 bookmarks
Custom sorting
Taming the Wild West of SaaS Data Sharing | CSA
Taming the Wild West of SaaS Data Sharing | CSA
As security leaders, it’s crucial to understand the risks of data sharing in SaaS applications to protect your organization’s most valuable assets.
·cloudsecurityalliance.org·
Taming the Wild West of SaaS Data Sharing | CSA
Le Japon ouvre la voie aux cyberattaques préventives
Le Japon ouvre la voie aux cyberattaques préventives
Depuis la mi-mai 2025, le Japon autorise officiellement ses forces à mener des cyber-opérations offensives préventives, y compris en l'absence d'attaque avérée. Une rupture stratégique majeure : le pays rejoint ainsi le cercle restreint des démocraties dotées d’une doctrine cyber offensive explicite, avec un niveau
·numerama.com·
Le Japon ouvre la voie aux cyberattaques préventives
Microsoft ships emergency patch to fix Windows 11 installation issues
Microsoft ships emergency patch to fix Windows 11 installation issues
Microsoft has released an out-of-band update to address a known issue causing some Windows 11 systems to enter recovery and fail to start while trying to install the KB5058405 May 2025 security update.
·bleepingcomputer.com·
Microsoft ships emergency patch to fix Windows 11 installation issues
Navigating Global AI Laws & ISO 42001 | CSA
Navigating Global AI Laws & ISO 42001 | CSA
Explore key global AI regulations and how ISO 42001 helps ensure ethical, transparent, and compliant AI system deployment.
·cloudsecurityalliance.org·
Navigating Global AI Laws & ISO 42001 | CSA
Qualcomm fixes three Adreno GPU zero-days exploited in attacks
Qualcomm fixes three Adreno GPU zero-days exploited in attacks
Qualcomm has released security patches for three zero-day vulnerabilities in the Adreno Graphics Processing Unit (GPU) driver that impact dozens of chipsets and are actively exploited in targeted attacks.
·bleepingcomputer.com·
Qualcomm fixes three Adreno GPU zero-days exploited in attacks
Vers une recrudescence des piratages avec clonage de la voix
Vers une recrudescence des piratages avec clonage de la voix
Une cyberattaque visant Susie Wiles, cheffe de cabinet de Trump, fait actuellement l'objet d'une enquête des autorités américaines. Des pirates...-Cybersécurité
·usine-digitale.fr·
Vers une recrudescence des piratages avec clonage de la voix
SHARED INTEL Q&A: When every IoT Device and AI assistant has an identity — who’s in control?
SHARED INTEL Q&A: When every IoT Device and AI assistant has an identity — who’s in control?
As enterprise adoption of generative AI accelerates, security teams face a new identity dilemma — not just more users and devices, but a growing swarm of non-human agents and autonomous systems requesting access to sensitive assets. Related: Top 10 Microsoft Copilot risks At the same time, traditional identity and access management (IAM) tools are buckling
·lastwatchdog.com·
SHARED INTEL Q&A: When every IoT Device and AI assistant has an identity — who’s in control?
What does Facebook know about me? (Lock and Code S06E11)
What does Facebook know about me? (Lock and Code S06E11)
This week on the Lock and Code podcast, host David Ruiz digs into his own Facebook data to see what the social media giant knows about him.
·malwarebytes.com·
What does Facebook know about me? (Lock and Code S06E11)
Two flaws in vBulletin forum software are under attack
Two flaws in vBulletin forum software are under attack
Experts found two vulnerabilities in the vBulletin forum software, one of which is already being exploited in real-world attacks.
·securityaffairs.com·
Two flaws in vBulletin forum software are under attack
Exploit details for max severity Cisco IOS XE flaw now public
Exploit details for max severity Cisco IOS XE flaw now public
Technical details about a maximum-severity Cisco IOS XE WLC arbitrary file upload flaw tracked as CVE-2025-20188 have been made publicly available, bringing us closer to a working exploit.
·bleepingcomputer.com·
Exploit details for max severity Cisco IOS XE flaw now public
Two Linux flaws can lead to the disclosure of sensitive data
Two Linux flaws can lead to the disclosure of sensitive data
Qualys warns of two flaws in apport and systemd-coredump, the core dump handlers in Ubuntu, Red Hat Enterprise Linux, and Fedora distros.
·securityaffairs.com·
Two Linux flaws can lead to the disclosure of sensitive data
Top counter antivirus service disrupted in global takedown | CyberScoop
Top counter antivirus service disrupted in global takedown | CyberScoop
AVCheck and related crypting services helped cybercriminals make malware difficult to detect and confirm that malware could slip through various antivirus tools undetected, officials said.
·cyberscoop.com·
Top counter antivirus service disrupted in global takedown | CyberScoop
Hackers are exploiting critical flaw in vBulletin forum software
Hackers are exploiting critical flaw in vBulletin forum software
Two critical vulnerabilities affecting the open-source forum software vBulletin have been discovered, with one confirmed to be actively exploited in the wild.
·bleepingcomputer.com·
Hackers are exploiting critical flaw in vBulletin forum software