Ville futuriste
🛡️ Dernières actualités cybersécurité
The Hacker News06/05 09:13

🔥Google's Android Apps Get Public Verification to Stop Supply Chain Attacks

Google has announced expanded Binary Transparency for Android as a way to safeguard the ecosystem from supply chain attacks. "This new public ledger ensures the Google apps on your device are exactly

Flipboard06/05 08:55

🖥️Cybersécurité : lâché par ses actionnaires, Tehtris est placé en redressement judiciaire

Après un plan social, l'éditeur de logiciels toujours très endetté se place sous la protection du tribunal de commerce. L'ancienne pépite de la …

The Hacker News06/05 08:34

🔥Windows Phone Link Exploited by CloudZ RAT to Steal Credentials and OTPs

Cybersecurity researchers have disclosed details of an intrusion that involved the use of a CloudZ remote access tool (RAT) and a previous undocumented plugin dubbed Pheno with the aim of...

Flipboard06/05 08:12

🖥️Proton Mail redoute l’émergence des ordinateurs quantiques, mais a une parade pour les mails

La célèbre messagerie chiffrée n’attend pas l’arrivée des ordinateurs quantiques pour agir. Proton Mail intègre dès aujourd’hui un nouveau standard …

Flipboard06/05 08:11

🖥️Cyberattaque chinoise en cours sur Windows : ce logiciel populaire a été piraté, des milliers d'ordinateurs compromis

Depuis un mois, le site officiel de Daemon Tools distribue un logiciel malveillant à l’insu de ses utilisateurs et de ses propres développeurs. Des …

The Hacker News06/05 06:14

🔥Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Execution

Palo Alto Networks has released an advisory warning that a critical buffer overflow vulnerability in its PAN-OS software has been exploited in the wild. The vulnerability, tracked as CVE-2026-0300,...

Flipboard06/05 03:42

🖥️Bouclier démocratique: En Arménie, les Européens découvrent comment battre Poutine

Durant deux jours de sommet à Yerevan en Arménie, les 4 et 5 mai, les dirigeants européens ont convenu d'une mobilisation plus forte pour soutenir la …

Flipboard05/05 23:49

🖥️DÉLINQUANCE. Ces actions mises en avant par l’État en Calédonie pour “restaurer la sécurité du quotidien”

Comment réagir aux faits de délinquance en Calédonie, tels qu'ils apparaissent dans le bilan 2025 ? Le document diffusé mardi par le …

CyberScoop05/05 21:47

📰CISA wants critical infrastructure to operate ‘weeks to months’ in isolation during conflict

The agency will begin targeted assessments meant to help critical infrastructure entities operate while disconnecting OT networks from IT and third-party vendors. The post CISA wants critical...

CyberScoop05/05 19:18

📰CISA boasts AI automation improvements to threat analysis, mission support

Cybersecurity and Infrastructure Security Agency officials said it’s proven a boon in numerous areas, but there are some hurdles to adoption, still. The post CISA boasts AI automation improvements...

CyberScoop05/05 16:28

📰Latvian national sentenced for ransomware attacks run by former Conti leaders

Deniss Zolotarjovs was mostly tasked with putting pressure on the Russia-based crew’s victims, in one case leaking hundreds of children’s health records. The post Latvian national sentenced for...

The Hacker News05/05 16:19

🔥Critical Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS and Potential RCE

The Apache Software Foundation (ASF) has released security updates to address several security vulnerabilities in the HTTP Server, including a severe vulnerability that could potentially lead to...

The Hacker News05/05 16:07

🔥DAEMON Tools Supply Chain Attack Compromises Official Installers with Malware

A newly identified supply chain attack targeting DAEMON Tools software has compromised its installers to serve a malicious payload, according to findings from Kaspersky. "These installers are...

CyberScoop04/05 21:54

📰‘Copy Fail’ is a real Linux security crisis wrapped in AI slop

The actively exploited defect could affect every mainstream Linux distribution built since 2017, but some researchers found Theori’s AI-generated disclosure unhelpful and lacking. The post ‘Copy...

CyberScoop04/05 16:02

📰A college student is suing a dating app that allegedly used her TikTok videos to target men in her dormitory

The woman’s lawyer told CyberScoop they believe the company edited her video to suggest she was a “friend with benefits” and intentionally geofenced it to men around her.  The post A college...

The Hacker News06/05 09:13

🔥Google's Android Apps Get Public Verification to Stop Supply Chain Attacks

Google has announced expanded Binary Transparency for Android as a way to safeguard the ecosystem from supply chain attacks. "This new public ledger ensures the Google apps on your device are exactly

Flipboard06/05 08:55

🖥️Cybersécurité : lâché par ses actionnaires, Tehtris est placé en redressement judiciaire

Après un plan social, l'éditeur de logiciels toujours très endetté se place sous la protection du tribunal de commerce. L'ancienne pépite de la …

The Hacker News06/05 08:34

🔥Windows Phone Link Exploited by CloudZ RAT to Steal Credentials and OTPs

Cybersecurity researchers have disclosed details of an intrusion that involved the use of a CloudZ remote access tool (RAT) and a previous undocumented plugin dubbed Pheno with the aim of...

Flipboard06/05 08:12

🖥️Proton Mail redoute l’émergence des ordinateurs quantiques, mais a une parade pour les mails

La célèbre messagerie chiffrée n’attend pas l’arrivée des ordinateurs quantiques pour agir. Proton Mail intègre dès aujourd’hui un nouveau standard …

Flipboard06/05 08:11

🖥️Cyberattaque chinoise en cours sur Windows : ce logiciel populaire a été piraté, des milliers d'ordinateurs compromis

Depuis un mois, le site officiel de Daemon Tools distribue un logiciel malveillant à l’insu de ses utilisateurs et de ses propres développeurs. Des …

The Hacker News06/05 06:14

🔥Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Execution

Palo Alto Networks has released an advisory warning that a critical buffer overflow vulnerability in its PAN-OS software has been exploited in the wild. The vulnerability, tracked as CVE-2026-0300,...

Flipboard06/05 03:42

🖥️Bouclier démocratique: En Arménie, les Européens découvrent comment battre Poutine

Durant deux jours de sommet à Yerevan en Arménie, les 4 et 5 mai, les dirigeants européens ont convenu d'une mobilisation plus forte pour soutenir la …

Flipboard05/05 23:49

🖥️DÉLINQUANCE. Ces actions mises en avant par l’État en Calédonie pour “restaurer la sécurité du quotidien”

Comment réagir aux faits de délinquance en Calédonie, tels qu'ils apparaissent dans le bilan 2025 ? Le document diffusé mardi par le …

CyberScoop05/05 21:47

📰CISA wants critical infrastructure to operate ‘weeks to months’ in isolation during conflict

The agency will begin targeted assessments meant to help critical infrastructure entities operate while disconnecting OT networks from IT and third-party vendors. The post CISA wants critical...

CyberScoop05/05 19:18

📰CISA boasts AI automation improvements to threat analysis, mission support

Cybersecurity and Infrastructure Security Agency officials said it’s proven a boon in numerous areas, but there are some hurdles to adoption, still. The post CISA boasts AI automation improvements...

CyberScoop05/05 16:28

📰Latvian national sentenced for ransomware attacks run by former Conti leaders

Deniss Zolotarjovs was mostly tasked with putting pressure on the Russia-based crew’s victims, in one case leaking hundreds of children’s health records. The post Latvian national sentenced for...

The Hacker News05/05 16:19

🔥Critical Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS and Potential RCE

The Apache Software Foundation (ASF) has released security updates to address several security vulnerabilities in the HTTP Server, including a severe vulnerability that could potentially lead to...

The Hacker News05/05 16:07

🔥DAEMON Tools Supply Chain Attack Compromises Official Installers with Malware

A newly identified supply chain attack targeting DAEMON Tools software has compromised its installers to serve a malicious payload, according to findings from Kaspersky. "These installers are...

CyberScoop04/05 21:54

📰‘Copy Fail’ is a real Linux security crisis wrapped in AI slop

The actively exploited defect could affect every mainstream Linux distribution built since 2017, but some researchers found Theori’s AI-generated disclosure unhelpful and lacking. The post ‘Copy...

CyberScoop04/05 16:02

📰A college student is suing a dating app that allegedly used her TikTok videos to target men in her dormitory

The woman’s lawyer told CyberScoop they believe the company edited her video to suggest she was a “friend with benefits” and intentionally geofenced it to men around her.  The post A college...