Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

30533 bookmarks
Custom sorting
Ransomware gangs join ongoing SAP NetWeaver attacks
Ransomware gangs join ongoing SAP NetWeaver attacks
Ransomware gangs have joined ongoing SAP NetWeaver attacks, exploiting a maximum-severity vulnerability that allows threat actors to gain remote code execution on vulnerable servers.
·bleepingcomputer.com·
Ransomware gangs join ongoing SAP NetWeaver attacks
Australian Human Rights Commission leaks docs to search engines
Australian Human Rights Commission leaks docs to search engines
The Australian Human Rights Commission (AHRC) disclosed a data breach incident where private documents leaked online and were indexed by major search engines.
·bleepingcomputer.com·
Australian Human Rights Commission leaks docs to search engines
News alert: INE Security highlights monthly CVE Labs aimed at sharpening real-world defense
News alert: INE Security highlights monthly CVE Labs aimed at sharpening real-world defense
Cary, NC, May 14, 2025, CyberNewswire -- INE Security, a global leader in hands-on cybersecurity training and certifications, today highlighted how ongoing real-world practice with the latest CVEs (Common Vulnerabilities and Exposures) is essential for transforming security teams from reactive to proactive defenders. With over 26,000 new CVEs documented in the past year, security teams
·lastwatchdog.com·
News alert: INE Security highlights monthly CVE Labs aimed at sharpening real-world defense
Upcoming Speaking Engagements - Schneier on Security
Upcoming Speaking Engagements - Schneier on Security
This is a current list of where and when I am scheduled to speak: I’m speaking (remotely) at the Sektor 3.0 Festival in Warsaw, Poland, May 21-22, 2025. The list is maintained on this page.
·schneier.com·
Upcoming Speaking Engagements - Schneier on Security
Microsoft fixes Linux boot issues on dual-boot Windows systems
Microsoft fixes Linux boot issues on dual-boot Windows systems
​Microsoft has fixed a known issue preventing Linux from booting on dual-boot systems with Secure Boot enabled after installing the August 2024 Windows security updates.
·bleepingcomputer.com·
Microsoft fixes Linux boot issues on dual-boot Windows systems
Congress faces pressure to renew cyber information-sharing law
Congress faces pressure to renew cyber information-sharing law
The law’s expiration in September could jeopardize a wide range of information-sharing partnerships that have helped catch and thwart cyberattacks in the U.S.
·cybersecuritydive.com·
Congress faces pressure to renew cyber information-sharing law
89 millions de comptes Steam piratés ? Ce qu’on sait de ce potentiel piratage
89 millions de comptes Steam piratés ? Ce qu’on sait de ce potentiel piratage
Un pirate informatique affirme avoir récupéré plus de 89 millions de comptes Steam, soit deux tiers des comptes existants. Si elle s'avère véridique, il s'agirait d'une des plus grandes fuites de comptes du jeu vidéo. Ce pirate du nom de Machine1337 a-t-il réellement piraté Steam ? C'est en tout cas ce qu'il affirme
·numerama.com·
89 millions de comptes Steam piratés ? Ce qu’on sait de ce potentiel piratage
Steam piraté ? 7 gestes à suivre pour éviter les problèmes - Numerama
Steam piraté ? 7 gestes à suivre pour éviter les problèmes - Numerama
Une fuite pourrait avoir affecté la plateforme de jeux vidéo Steam. En raison du nombre de comptes potentiellement affectés, il est préférable de s'assurer que les bonnes pratiques de sécurisation sont appliquées pour protéger son profil. C'est une alerte à laquelle les internautes ayant un compte Steam devraient
·numerama.com·
Steam piraté ? 7 gestes à suivre pour éviter les problèmes - Numerama
Focused Phishing: Attack Targets Victims With Trusted Sites and Live Validation
Focused Phishing: Attack Targets Victims With Trusted Sites and Live Validation
New phishing tactics are abusing trusted domains, real CAPTCHAs, and server-side email validation to selectively target victims with customized fake login pages. Keep Aware's latest research breaks down the full attack chain and how these zero-day phish operate.
·bleepingcomputer.com·
Focused Phishing: Attack Targets Victims With Trusted Sites and Live Validation
France Identité passe le cap des deux millions d’usagers
France Identité passe le cap des deux millions d’usagers
L'application "France Identité" a atteint les deux millions d'utilisateurs. Permettant de prouver son identité, elle offre un portefeuille de...-IdentitĂ© numĂ©rique
·usine-digitale.fr·
France Identité passe le cap des deux millions d’usagers
Fashion giant Dior discloses cyberattack, warns of data breach
Fashion giant Dior discloses cyberattack, warns of data breach
House of Dior, the French luxury fashion brand commonly referred to as Dior, has disclosed a cybersecurity incident that has exposed customer information.
·bleepingcomputer.com·
Fashion giant Dior discloses cyberattack, warns of data breach
ISO 42001 Requirements Explained: Achieve Compliance | CSA
ISO 42001 Requirements Explained: Achieve Compliance | CSA
ISO 42001 mandates numerous requirements for the establishment, operation, monitoring, maintenance, and improvement of an organization’s AI management system.
·cloudsecurityalliance.org·
ISO 42001 Requirements Explained: Achieve Compliance | CSA
New Fortinet and Ivanti Zero Days Exploited in the Wild
New Fortinet and Ivanti Zero Days Exploited in the Wild
Fortinet and Ivanti published advisories on the same day revealing that attackers are exploiting new zero days, one of which is rated critical
·infosecurity-magazine.com·
New Fortinet and Ivanti Zero Days Exploited in the Wild
Patch Tuesday, May 2025 Edition
Patch Tuesday, May 2025 Edition
Microsoft on Tuesday released software updates to fix at least 70 vulnerabilities in Windows and related products, including five zero-day flaws that are already seeing active exploitation. Adding to the sense of urgency with this month's patch batch from Redmond…
·krebsonsecurity.com·
Patch Tuesday, May 2025 Edition