Ville futuriste
🛡️ Dernières actualités cybersécurité
Flipboard18/04 06:52

🖥️Danger sur votre IBAN : ce que les cybercriminels peuvent vraiment faire avec votre simple RIB

On le pensait inoffensif, mais il est devenu une arme de choix pour les cybercriminels. Loin d'être une simple coordonnée de réception, votre IBAN …

Flipboard18/04 06:15

🖥️Basic Fit piraté : quelles informations ont fuité ?

► En bref Basic Fit a récemment subi un piratage de ses bases de données • Les mots de passe et pièces d’identité ne semblent pas concernés • Certaines …

Flipboard18/04 06:01

🖥️Un million de comptes bancaires piratés en 2025 : le dark web est au cœur du problème

En 2025, plus d’un million de comptes bancaires ont été compromis par des cybercriminels. Dans la plupart des cas, les comptes en banque ont été …

The Hacker News18/04 06:01

🔥Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

Threat actors are exploiting security flaws in TBK DVR and end‑of‑life (EoL) TP-Link Wi-Fi routers to deploy Mirai-botnet variants on compromised devices, according to findings from Fortinet...

CyberScoop17/04 17:31

📰The surveillance law Congress can’t quit — and can’t explain

Congress overhauled Section 702 in 2024 with 56 changes. Now, as the law nears expiration, supporters and critics can’t even agree on what the numbers show. The post The surveillance law Congress...

The Hacker News17/04 13:21

🔥Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

Huntress is warning that threat actors are exploiting three recently disclosed security flaws in Microsoft Defender to gain elevated privileges in compromised systems. The activity involves the...

Flipboard17/04 12:00

🖥️90 vidéos, chantage et silence : le bilan d’un weekend noir qui pourrait tout changer pour GTA 6

Le calme après la tempête numériqueLa deadline est tombée le 14 avril dernier. Le groupe de hackers, qui affirmait détenir des données sensibles sur …

The Hacker News17/04 10:47

🔥Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

Google this week announced a new set of Play policy updates to strengthen user privacy and protect businesses against fraud, even as it revealed it blocked or removed over 8.3 billion ads globally...

The Hacker News17/04 07:14

🔥NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions

The National Institute of Standards and Technology (NIST) has announced changes to the way it handles cybersecurity vulnerabilities and exposures (CVEs) listed in its National Vulnerability Database...

The Hacker News17/04 05:46

🔥Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts

An international law enforcement operation has taken down 53 domains and arrested four people in connection with commercial distributed denial-of-service (DDoS) operations that were used by more than

Flipboard17/04 05:30

🖥️« L’open source est mort » : ce projet majeur ferme subitement son code par peur de l’IA

Cal, application de planification parmi les plus importantes de l’écosystème open source, abandonne sa licence ouverte. En cause : la capacité des IA …

CyberScoop16/04 23:05

📰US nationals sentenced for aiding North Korea’s tech worker scheme

Kejia Wang and Zhenxing Wang established shell companies and hosted laptop farms to help operatives obtain jobs at more than 100 U.S. companies. The post US nationals sentenced for aiding North...

CyberScoop16/04 17:26

📰Officials seize 53 DDoS-for-hire domains in ongoing crackdown

Operation PowerOFF’s latest globally coordinated action identified more than 75,000 alleged cybercriminals. Officials warned each of them to stop jamming up traffic. The post Officials seize 53...

CyberScoop16/04 10:00

📰Ghost breaches: How AI-mediated narratives have become a new threat vector

Three incidents. No actual breaches. Full-scale crisis response. AI hallucinations are creating a new threat vector that most organizations have yet to prepare for. The post Ghost breaches: How...

CyberScoop15/04 20:17

📰NIST narrows scope of CVE analysis to keep up with rising tide of vulnerabilities

The National Vulnerability Database will now only analyze vulnerabilities in critical software, systems used in the federal government and those under active exploitation. The post NIST narrows scope

Flipboard18/04 06:52

🖥️Danger sur votre IBAN : ce que les cybercriminels peuvent vraiment faire avec votre simple RIB

On le pensait inoffensif, mais il est devenu une arme de choix pour les cybercriminels. Loin d'être une simple coordonnée de réception, votre IBAN …

Flipboard18/04 06:15

🖥️Basic Fit piraté : quelles informations ont fuité ?

► En bref Basic Fit a récemment subi un piratage de ses bases de données • Les mots de passe et pièces d’identité ne semblent pas concernés • Certaines …

Flipboard18/04 06:01

🖥️Un million de comptes bancaires piratés en 2025 : le dark web est au cœur du problème

En 2025, plus d’un million de comptes bancaires ont été compromis par des cybercriminels. Dans la plupart des cas, les comptes en banque ont été …

The Hacker News18/04 06:01

🔥Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

Threat actors are exploiting security flaws in TBK DVR and end‑of‑life (EoL) TP-Link Wi-Fi routers to deploy Mirai-botnet variants on compromised devices, according to findings from Fortinet...

CyberScoop17/04 17:31

📰The surveillance law Congress can’t quit — and can’t explain

Congress overhauled Section 702 in 2024 with 56 changes. Now, as the law nears expiration, supporters and critics can’t even agree on what the numbers show. The post The surveillance law Congress...

The Hacker News17/04 13:21

🔥Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

Huntress is warning that threat actors are exploiting three recently disclosed security flaws in Microsoft Defender to gain elevated privileges in compromised systems. The activity involves the...

Flipboard17/04 12:00

🖥️90 vidéos, chantage et silence : le bilan d’un weekend noir qui pourrait tout changer pour GTA 6

Le calme après la tempête numériqueLa deadline est tombée le 14 avril dernier. Le groupe de hackers, qui affirmait détenir des données sensibles sur …

The Hacker News17/04 10:47

🔥Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

Google this week announced a new set of Play policy updates to strengthen user privacy and protect businesses against fraud, even as it revealed it blocked or removed over 8.3 billion ads globally...

The Hacker News17/04 07:14

🔥NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions

The National Institute of Standards and Technology (NIST) has announced changes to the way it handles cybersecurity vulnerabilities and exposures (CVEs) listed in its National Vulnerability Database...

The Hacker News17/04 05:46

🔥Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts

An international law enforcement operation has taken down 53 domains and arrested four people in connection with commercial distributed denial-of-service (DDoS) operations that were used by more than

Flipboard17/04 05:30

🖥️« L’open source est mort » : ce projet majeur ferme subitement son code par peur de l’IA

Cal, application de planification parmi les plus importantes de l’écosystème open source, abandonne sa licence ouverte. En cause : la capacité des IA …

CyberScoop16/04 23:05

📰US nationals sentenced for aiding North Korea’s tech worker scheme

Kejia Wang and Zhenxing Wang established shell companies and hosted laptop farms to help operatives obtain jobs at more than 100 U.S. companies. The post US nationals sentenced for aiding North...

CyberScoop16/04 17:26

📰Officials seize 53 DDoS-for-hire domains in ongoing crackdown

Operation PowerOFF’s latest globally coordinated action identified more than 75,000 alleged cybercriminals. Officials warned each of them to stop jamming up traffic. The post Officials seize 53...

CyberScoop16/04 10:00

📰Ghost breaches: How AI-mediated narratives have become a new threat vector

Three incidents. No actual breaches. Full-scale crisis response. AI hallucinations are creating a new threat vector that most organizations have yet to prepare for. The post Ghost breaches: How...

CyberScoop15/04 20:17

📰NIST narrows scope of CVE analysis to keep up with rising tide of vulnerabilities

The National Vulnerability Database will now only analyze vulnerabilities in critical software, systems used in the federal government and those under active exploitation. The post NIST narrows scope