Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29738 bookmarks
Custom sorting
Largest telecom in Africa warns of cyber incident exposing customer data
Largest telecom in Africa warns of cyber incident exposing customer data
MTN Group said an “unknown third-party has claimed to have accessed data linked” to parts of its system and that the incident “resulted in unauthorised access to personal information of some MTN customers in certain markets.”
·therecord.media·
Largest telecom in Africa warns of cyber incident exposing customer data
Marks & Spencer pauses online orders after cyberattack
Marks & Spencer pauses online orders after cyberattack
British retailer giant Marks & Spencer (M&S) has suspended online orders while working to recover from a recently disclosed cyberattack.
·bleepingcomputer.com·
Marks & Spencer pauses online orders after cyberattack
RSAC Fireside Chat: Attackers are exploiting gaps in business logic created by proliferation of APIs
RSAC Fireside Chat: Attackers are exploiting gaps in business logic created by proliferation of APIs
APIs have become foundational to digital business operations, serving as the behind-the-scenes glue that connects apps, platforms and partners. Related: OWASP’s Top 10 Web App Security Risks But this growing reliance has opened a new front in cybersecurity—one where attackers are quietly exploiting weaknesses buried deep in business logic. In this RSAC Fireside Chat, I
·lastwatchdog.com·
RSAC Fireside Chat: Attackers are exploiting gaps in business logic created by proliferation of APIs
Mobile provider MTN says cyberattack compromised customer data
Mobile provider MTN says cyberattack compromised customer data
African mobile giant MTN Group announced that a cybersecurity incident has compromised the personal information of some of its subscribers in certain countries.
·bleepingcomputer.com·
Mobile provider MTN says cyberattack compromised customer data
Baltimore City Public Schools data breach affects over 31,000 people
Baltimore City Public Schools data breach affects over 31,000 people
​Baltimore City Public Schools notified tens of thousands of employees and students of a data breach following an incident in February when unknown attackers hacked into its network.
·bleepingcomputer.com·
Baltimore City Public Schools data breach affects over 31,000 people
Implementing CCM: Enterprise Risk Management Controls | CSA
Implementing CCM: Enterprise Risk Management Controls | CSA
The CCM’s GRC domain helps organizations ensure that their enterprise risk management and cybersecurity compliance programs effectively address the cloud.
·cloudsecurityalliance.org·
Implementing CCM: Enterprise Risk Management Controls | CSA
SAP fixes critical Netweaver flaw exploited in attacks
SAP fixes critical Netweaver flaw exploited in attacks
SAP has released out-of-band emergency updates for NetWeaver to fix an actively exploited remote code execution (RCE) vulnerability used to hijack servers.
·bleepingcomputer.com·
SAP fixes critical Netweaver flaw exploited in attacks
SAP fixes suspected Netweaver zero-day exploited in attacks
SAP fixes suspected Netweaver zero-day exploited in attacks
SAP has released out-of-band emergency NetWeaver updates to fix a suspected remote code execution (RCE) zero-day flaw actively exploited to hijack servers.
·bleepingcomputer.com·
SAP fixes suspected Netweaver zero-day exploited in attacks
Comment Synology combine solutions matérielles et logicielles pour assurer la protection de vos données
Comment Synology combine solutions matérielles et logicielles pour assurer la protection de vos données
Spécialiste du stockage, reconnu pour ses NAS, Synology est aussi expert dans la gestion et la protection des données. Un savoir-faire que la société met à disposition des particuliers et des entreprises désireuses de sécuriser leurs données les plus sensibles. Contrairement à ce que l’on pourrait croire, il ne
·numerama.com·
Comment Synology combine solutions matérielles et logicielles pour assurer la protection de vos données
Getting Started with Kubernetes Security: A Guide | CSA
Getting Started with Kubernetes Security: A Guide | CSA
Walk through what makes Kubernetes security so challenging and how security teams can get started with it in a way that sets them up for long-term success.
·cloudsecurityalliance.org·
Getting Started with Kubernetes Security: A Guide | CSA
Popular LLMs Found to Produce Vulnerable Code by Default
Popular LLMs Found to Produce Vulnerable Code by Default
Backslash Security found that naĂŻve prompts resulted in code vulnerable to at least four of the of the 10 most common vulnerabilities across popular LLMs
·infosecurity-magazine.com·
Popular LLMs Found to Produce Vulnerable Code by Default
FBI seeks help to unmask Salt Typhoon hackers behind telecom breaches
FBI seeks help to unmask Salt Typhoon hackers behind telecom breaches
The FBI has asked the public for information on Chinese Salt Typhoon hackers behind widespread breaches of telecommunications providers in the United States and worldwide.
·bleepingcomputer.com·
FBI seeks help to unmask Salt Typhoon hackers behind telecom breaches
defcon.org
defcon.org
The largest hacking and security conference with presentations, workshops, contests, villages and the premier Capture The Flag Contest.
·defcon.org·
defcon.org