Ville futuriste
🛡️ Dernières actualités cybersécurité
The Hacker News13/05 08:08

🔥GemStuffer Abuses 150+ RubyGems to Exfiltrate Scraped U.K. Council Portal Data

Cybersecurity researchers are calling attention to a new campaign dubbed GemStuffer that has targeted the RubyGems repository with more than 150 gems that use the registry as a data exfiltration...

The Hacker News13/05 06:55

🔥Android Adds Intrusion Logging for Sophisticated Spyware Forensics

Google on Tuesday unveiled a new opt-in Android feature called Intrusion Logging for storing forensic logs to better analyze sophisticated spyware attacks. Intrusion Logging, available as part of...

Flipboard13/05 03:52

🖥️VRAI OU FAUX. "C'est juste du sensationnel et du mensonge" : les appels silencieux ont-ils vraiment pour objectif de cloner votre voix ?

Vous recevez l'appel d'un numéro inconnu, mais lorsque vous décrochez, personne ne répond. Selon des articles de presse, cette opération permettrait …

Krebs on Security12/05 21:46

🕵️Patch Tuesday, May 2026 Edition

Artificial intelligence platforms may be just as susceptible to social engineering as human beings, but they are proving remarkably good at finding security vulnerabilities in human-made computer...

CyberScoop12/05 21:38

📰‘Mini Shai-Hulud’ malware compromises hundreds of open-source packages in sprawling supply-chain attack

The campaign hit major registries and hid behind legitimate-looking release signatures, showing how attackers can weaponize the software update process itself. The post ‘Mini Shai-Hulud’ malware...

CyberScoop12/05 21:09

📰Major world economies spell out key elements of AI ‘ingredients list’

Experts on the topic say the G7 guidance is good, but could still use some improvements. The post Major world economies spell out key elements of AI ‘ingredients list’ appeared first on...

CyberScoop12/05 21:00

📰Microsoft addresses 137 vulnerabilities in May’s Patch Tuesday, including 13 rated critical

The high volume of vulnerabilities reflects a growing trend researchers have been anticipating as artificial intelligence models are deployed to find previously uncovered defects in code. The post...

CyberScoop12/05 17:00

📰Google and Amnesty International teamed up to make it harder for spyware vendors to hide

Intrusion Logging marks the first feature from a major device vendor to aid with forensic detection of sophisticated threats, Amnesty International said. The post Google and Amnesty International...

The Hacker News12/05 16:44

🔥New Exim BDAT Vulnerability Exposes GnuTLS Builds to Potential Code Execution

Exim has released security updates to address a severe security issue affecting certain configurations that could enable memory corruption and potential code execution. Exim is an open-source Mail...

The Hacker News12/05 14:47

🔥RubyGems Suspends New Signups After Hundreds of Malicious Packages Are Uploaded

RubyGems, the standard package manager for the Ruby programming language, has temporarily paused account sign ups following what has been described as a "major malicious attack." "We're dealing with...

The Hacker News12/05 12:50

🔥New TrickMo Variant Uses TON C2 and SOCKS5 to Create Android Network Pivots

Cybersecurity researchers have flagged a new version of the TrickMo Android banking trojan that uses The Open Network (TON) for command-and-control (C2). The new variant, observed by ThreatFabric...

Flipboard12/05 12:06

🖥️Exportation des outils de surveillance : l’Europe « détourne le regard »

Coup de pokerL’ONG Human Rights Watch pointe le laisser-faire de l’Europe concernant la vente des technologies de surveillance à des pays bien connus …

Flipboard12/05 10:06

🖥️Google a découvert que des cybercriminels ont utilisé l’IA pour exploiter une faille inconnue, une première historique: ses experts en cybersécurité ont pu déjouer l’attaque à temps

Les chercheurs du Google Threat Intelligence Group révèlent dans un rapport qu'un cybercriminel s'est servi de l'IA pour découvrir et exploiter une …

CyberScoop12/05 10:00

📰AI is separating the companies built to scale from the ones built to sell

Startups are scaling faster, attackers are getting smarter, and investors are getting more selective. The cybersecurity industry is in the middle of a reset. The post AI is separating the companies...

Flipboard11/05 14:24

🖥️Nouvelle cyberattaque sur Windows et Linux : ce logiciel gratuit, utilisé par des millions d'utilisateurs, a été piégé

Pendant plus de 24 heures, le site officiel de JDownloader a distribué des fichiers d’installation piégés. Un virus, capable de prendre le contrôle …

The Hacker News13/05 08:08

🔥GemStuffer Abuses 150+ RubyGems to Exfiltrate Scraped U.K. Council Portal Data

Cybersecurity researchers are calling attention to a new campaign dubbed GemStuffer that has targeted the RubyGems repository with more than 150 gems that use the registry as a data exfiltration...

The Hacker News13/05 06:55

🔥Android Adds Intrusion Logging for Sophisticated Spyware Forensics

Google on Tuesday unveiled a new opt-in Android feature called Intrusion Logging for storing forensic logs to better analyze sophisticated spyware attacks. Intrusion Logging, available as part of...

Flipboard13/05 03:52

🖥️VRAI OU FAUX. "C'est juste du sensationnel et du mensonge" : les appels silencieux ont-ils vraiment pour objectif de cloner votre voix ?

Vous recevez l'appel d'un numéro inconnu, mais lorsque vous décrochez, personne ne répond. Selon des articles de presse, cette opération permettrait …

Krebs on Security12/05 21:46

🕵️Patch Tuesday, May 2026 Edition

Artificial intelligence platforms may be just as susceptible to social engineering as human beings, but they are proving remarkably good at finding security vulnerabilities in human-made computer...

CyberScoop12/05 21:38

📰‘Mini Shai-Hulud’ malware compromises hundreds of open-source packages in sprawling supply-chain attack

The campaign hit major registries and hid behind legitimate-looking release signatures, showing how attackers can weaponize the software update process itself. The post ‘Mini Shai-Hulud’ malware...

CyberScoop12/05 21:09

📰Major world economies spell out key elements of AI ‘ingredients list’

Experts on the topic say the G7 guidance is good, but could still use some improvements. The post Major world economies spell out key elements of AI ‘ingredients list’ appeared first on...

CyberScoop12/05 21:00

📰Microsoft addresses 137 vulnerabilities in May’s Patch Tuesday, including 13 rated critical

The high volume of vulnerabilities reflects a growing trend researchers have been anticipating as artificial intelligence models are deployed to find previously uncovered defects in code. The post...

CyberScoop12/05 17:00

📰Google and Amnesty International teamed up to make it harder for spyware vendors to hide

Intrusion Logging marks the first feature from a major device vendor to aid with forensic detection of sophisticated threats, Amnesty International said. The post Google and Amnesty International...

The Hacker News12/05 16:44

🔥New Exim BDAT Vulnerability Exposes GnuTLS Builds to Potential Code Execution

Exim has released security updates to address a severe security issue affecting certain configurations that could enable memory corruption and potential code execution. Exim is an open-source Mail...

The Hacker News12/05 14:47

🔥RubyGems Suspends New Signups After Hundreds of Malicious Packages Are Uploaded

RubyGems, the standard package manager for the Ruby programming language, has temporarily paused account sign ups following what has been described as a "major malicious attack." "We're dealing with...

The Hacker News12/05 12:50

🔥New TrickMo Variant Uses TON C2 and SOCKS5 to Create Android Network Pivots

Cybersecurity researchers have flagged a new version of the TrickMo Android banking trojan that uses The Open Network (TON) for command-and-control (C2). The new variant, observed by ThreatFabric...

Flipboard12/05 12:06

🖥️Exportation des outils de surveillance : l’Europe « détourne le regard »

Coup de pokerL’ONG Human Rights Watch pointe le laisser-faire de l’Europe concernant la vente des technologies de surveillance à des pays bien connus …

Flipboard12/05 10:06

🖥️Google a découvert que des cybercriminels ont utilisé l’IA pour exploiter une faille inconnue, une première historique: ses experts en cybersécurité ont pu déjouer l’attaque à temps

Les chercheurs du Google Threat Intelligence Group révèlent dans un rapport qu'un cybercriminel s'est servi de l'IA pour découvrir et exploiter une …

CyberScoop12/05 10:00

📰AI is separating the companies built to scale from the ones built to sell

Startups are scaling faster, attackers are getting smarter, and investors are getting more selective. The cybersecurity industry is in the middle of a reset. The post AI is separating the companies...

Flipboard11/05 14:24

🖥️Nouvelle cyberattaque sur Windows et Linux : ce logiciel gratuit, utilisé par des millions d'utilisateurs, a été piégé

Pendant plus de 24 heures, le site officiel de JDownloader a distribué des fichiers d’installation piégés. Un virus, capable de prendre le contrôle …