🖥️Ciblées par les criminels, comment les PME s’arment-elles face aux cyberrisques ?
Les attaques deviennent plus rapides et plus précises, grâce à l’intelligence artificielle. Mais les chefs d’entreprise sont aussi plus …
🔥Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History
Cybersecurity researchers have discovered a malicious Google Chrome extension that's designed to steal data associated with Meta Business Suite and Facebook Business Manager. The extension, named CL...
🔥npm’s Update to Harden Their Supply Chain, and Points to Consider
In December 2025, in response to the Sha1-Hulud incident, npm completed a major authentication overhaul intended to reduce supply-chain attacks. While the overhaul is a solid step forward, the...
🖥️Madeleine et Daisy, ces fausses grands-mères qui piègent les escrocs
Sept Britanniques sur dix disent avoir été l’objet de démarchage abusif au cours de l’année 2024. Face à un tel constat, un opérateur téléphonique …
🖥️+281% en dix ans, face à l'explosion de la cybercriminalité, la police fédérale lance #SCAM une campagne de prévention contre les arnaques en ligne
La police fédérale lance une campagne de prévention contre les arnaques en ligne à l'occasion du Safer Internet Day. En dix ans, la cybercriminalité …
🔥Researchers Observe In-the-Wild Exploitation of BeyondTrust CVSS 9.9 Vulnerability
Threat actors have started to exploit a recently disclosed critical security flaw impacting BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) products, according to watchTowr....
📰Proofpoint acquires Acuvity to tackle the security risks of agentic AI
Proofpoint is snapping up the startup to solve the industry’s newest headache: knowing what your autonomous AI is actually doing. The post Proofpoint acquires Acuvity to tackle the security risks...
📰Apple discloses first actively exploited zero-day of 2026
The vendor said the memory-corruption defect was exploited to target specific people, but it did not describe the objectives of the attack. The post Apple discloses first actively exploited zero-day...
📰Google finds state-sponsored hackers use AI at ‘all stages’ of attack cycle
The research underscores how AI tools have matured in their cyber offensive capabilities, even as it doesn’t reveal novel or paradigm shifting uses of the technology. The post Google finds...
🔥Google Reports State-Backed Hackers Using Gemini AI for Recon and Attack Support
Google on Thursday said it observed the North Korea-linked threat actor known as UNC2970 using its generative artificial intelligence (AI) model Gemini to conduct reconnaissance on its targets, as...
📰CISA to host industry feedback sessions on cyber incident reporting regulation
One industry official told CyberScoop the town halls are probably not what CIRCIA needs right now. The post CISA to host industry feedback sessions on cyber incident reporting regulation appeared...
🔥Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems
Cybersecurity researchers have discovered a fresh set of malicious packages across npm and the Python Package Index (PyPI) repository linked to a fake recruitment-themed campaign orchestrated by the...
🖥️Puissant, mais à double-tranchant : Gemini est la nouvelle coqueluche des hackers
Google vient de dévoiler l'autre face de son IA vedette : Gemini est massivement détourné par des groupes de pirates sponsorisés par la Chine, …
🖥️Alerte sur l'iPhone : Apple met en garde contre une cyberattaque « extrêmement sophistiquée »
Une faille de sécurité zero day a été découverte sur l’iPhone. Débusquée par Google, la vulnérabilité est exploitée dans le cadre d’une cyberattaque …
📰0APT ransomware group rises swiftly with bluster, along with genuine threat of attack
Most signs suggest the group is running a massive hoax by claiming hundreds of initial victims, but at least some of the threat 0APT poses is grounded in truth backed by proven capabilities. The post
🖥️Ciblées par les criminels, comment les PME s’arment-elles face aux cyberrisques ?
Les attaques deviennent plus rapides et plus précises, grâce à l’intelligence artificielle. Mais les chefs d’entreprise sont aussi plus …
🔥Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History
Cybersecurity researchers have discovered a malicious Google Chrome extension that's designed to steal data associated with Meta Business Suite and Facebook Business Manager. The extension, named CL...
🔥npm’s Update to Harden Their Supply Chain, and Points to Consider
In December 2025, in response to the Sha1-Hulud incident, npm completed a major authentication overhaul intended to reduce supply-chain attacks. While the overhaul is a solid step forward, the...
🖥️Madeleine et Daisy, ces fausses grands-mères qui piègent les escrocs
Sept Britanniques sur dix disent avoir été l’objet de démarchage abusif au cours de l’année 2024. Face à un tel constat, un opérateur téléphonique …
🖥️+281% en dix ans, face à l'explosion de la cybercriminalité, la police fédérale lance #SCAM une campagne de prévention contre les arnaques en ligne
La police fédérale lance une campagne de prévention contre les arnaques en ligne à l'occasion du Safer Internet Day. En dix ans, la cybercriminalité …
🔥Researchers Observe In-the-Wild Exploitation of BeyondTrust CVSS 9.9 Vulnerability
Threat actors have started to exploit a recently disclosed critical security flaw impacting BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) products, according to watchTowr....
📰Proofpoint acquires Acuvity to tackle the security risks of agentic AI
Proofpoint is snapping up the startup to solve the industry’s newest headache: knowing what your autonomous AI is actually doing. The post Proofpoint acquires Acuvity to tackle the security risks...
📰Apple discloses first actively exploited zero-day of 2026
The vendor said the memory-corruption defect was exploited to target specific people, but it did not describe the objectives of the attack. The post Apple discloses first actively exploited zero-day...
📰Google finds state-sponsored hackers use AI at ‘all stages’ of attack cycle
The research underscores how AI tools have matured in their cyber offensive capabilities, even as it doesn’t reveal novel or paradigm shifting uses of the technology. The post Google finds...
🔥Google Reports State-Backed Hackers Using Gemini AI for Recon and Attack Support
Google on Thursday said it observed the North Korea-linked threat actor known as UNC2970 using its generative artificial intelligence (AI) model Gemini to conduct reconnaissance on its targets, as...
📰CISA to host industry feedback sessions on cyber incident reporting regulation
One industry official told CyberScoop the town halls are probably not what CIRCIA needs right now. The post CISA to host industry feedback sessions on cyber incident reporting regulation appeared...
🔥Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems
Cybersecurity researchers have discovered a fresh set of malicious packages across npm and the Python Package Index (PyPI) repository linked to a fake recruitment-themed campaign orchestrated by the...
🖥️Puissant, mais à double-tranchant : Gemini est la nouvelle coqueluche des hackers
Google vient de dévoiler l'autre face de son IA vedette : Gemini est massivement détourné par des groupes de pirates sponsorisés par la Chine, …
🖥️Alerte sur l'iPhone : Apple met en garde contre une cyberattaque « extrêmement sophistiquée »
Une faille de sécurité zero day a été découverte sur l’iPhone. Débusquée par Google, la vulnérabilité est exploitée dans le cadre d’une cyberattaque …
📰0APT ransomware group rises swiftly with bluster, along with genuine threat of attack
Most signs suggest the group is running a massive hoax by claiming hundreds of initial victims, but at least some of the threat 0APT poses is grounded in truth backed by proven capabilities. The post