🔥Google's Android Apps Get Public Verification to Stop Supply Chain Attacks
Google has announced expanded Binary Transparency for Android as a way to safeguard the ecosystem from supply chain attacks. "This new public ledger ensures the Google apps on your device are exactly
🖥️Cybersécurité : lâché par ses actionnaires, Tehtris est placé en redressement judiciaire
Après un plan social, l'éditeur de logiciels toujours très endetté se place sous la protection du tribunal de commerce. L'ancienne pépite de la …
🔥Windows Phone Link Exploited by CloudZ RAT to Steal Credentials and OTPs
Cybersecurity researchers have disclosed details of an intrusion that involved the use of a CloudZ remote access tool (RAT) and a previous undocumented plugin dubbed Pheno with the aim of...
🖥️Proton Mail redoute l’émergence des ordinateurs quantiques, mais a une parade pour les mails
La célèbre messagerie chiffrée n’attend pas l’arrivée des ordinateurs quantiques pour agir. Proton Mail intègre dès aujourd’hui un nouveau standard …
🖥️Cyberattaque chinoise en cours sur Windows : ce logiciel populaire a été piraté, des milliers d'ordinateurs compromis
Depuis un mois, le site officiel de Daemon Tools distribue un logiciel malveillant à l’insu de ses utilisateurs et de ses propres développeurs. Des …
🔥Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Execution
Palo Alto Networks has released an advisory warning that a critical buffer overflow vulnerability in its PAN-OS software has been exploited in the wild. The vulnerability, tracked as CVE-2026-0300,...
🖥️Bouclier démocratique: En Arménie, les Européens découvrent comment battre Poutine
Durant deux jours de sommet à Yerevan en Arménie, les 4 et 5 mai, les dirigeants européens ont convenu d'une mobilisation plus forte pour soutenir la …
🖥️DÉLINQUANCE. Ces actions mises en avant par l’État en Calédonie pour “restaurer la sécurité du quotidien”
Comment réagir aux faits de délinquance en Calédonie, tels qu'ils apparaissent dans le bilan 2025 ? Le document diffusé mardi par le …
📰CISA wants critical infrastructure to operate ‘weeks to months’ in isolation during conflict
The agency will begin targeted assessments meant to help critical infrastructure entities operate while disconnecting OT networks from IT and third-party vendors. The post CISA wants critical...
📰CISA boasts AI automation improvements to threat analysis, mission support
Cybersecurity and Infrastructure Security Agency officials said it’s proven a boon in numerous areas, but there are some hurdles to adoption, still. The post CISA boasts AI automation improvements...
📰Latvian national sentenced for ransomware attacks run by former Conti leaders
Deniss Zolotarjovs was mostly tasked with putting pressure on the Russia-based crew’s victims, in one case leaking hundreds of children’s health records. The post Latvian national sentenced for...
🔥Critical Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS and Potential RCE
The Apache Software Foundation (ASF) has released security updates to address several security vulnerabilities in the HTTP Server, including a severe vulnerability that could potentially lead to...
🔥DAEMON Tools Supply Chain Attack Compromises Official Installers with Malware
A newly identified supply chain attack targeting DAEMON Tools software has compromised its installers to serve a malicious payload, according to findings from Kaspersky. "These installers are...
📰‘Copy Fail’ is a real Linux security crisis wrapped in AI slop
The actively exploited defect could affect every mainstream Linux distribution built since 2017, but some researchers found Theori’s AI-generated disclosure unhelpful and lacking. The post ‘Copy...
📰A college student is suing a dating app that allegedly used her TikTok videos to target men in her dormitory
The woman’s lawyer told CyberScoop they believe the company edited her video to suggest she was a “friend with benefits” and intentionally geofenced it to men around her. The post A college...
🔥Google's Android Apps Get Public Verification to Stop Supply Chain Attacks
Google has announced expanded Binary Transparency for Android as a way to safeguard the ecosystem from supply chain attacks. "This new public ledger ensures the Google apps on your device are exactly
🖥️Cybersécurité : lâché par ses actionnaires, Tehtris est placé en redressement judiciaire
Après un plan social, l'éditeur de logiciels toujours très endetté se place sous la protection du tribunal de commerce. L'ancienne pépite de la …
🔥Windows Phone Link Exploited by CloudZ RAT to Steal Credentials and OTPs
Cybersecurity researchers have disclosed details of an intrusion that involved the use of a CloudZ remote access tool (RAT) and a previous undocumented plugin dubbed Pheno with the aim of...
🖥️Proton Mail redoute l’émergence des ordinateurs quantiques, mais a une parade pour les mails
La célèbre messagerie chiffrée n’attend pas l’arrivée des ordinateurs quantiques pour agir. Proton Mail intègre dès aujourd’hui un nouveau standard …
🖥️Cyberattaque chinoise en cours sur Windows : ce logiciel populaire a été piraté, des milliers d'ordinateurs compromis
Depuis un mois, le site officiel de Daemon Tools distribue un logiciel malveillant à l’insu de ses utilisateurs et de ses propres développeurs. Des …
🔥Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Execution
Palo Alto Networks has released an advisory warning that a critical buffer overflow vulnerability in its PAN-OS software has been exploited in the wild. The vulnerability, tracked as CVE-2026-0300,...
🖥️Bouclier démocratique: En Arménie, les Européens découvrent comment battre Poutine
Durant deux jours de sommet à Yerevan en Arménie, les 4 et 5 mai, les dirigeants européens ont convenu d'une mobilisation plus forte pour soutenir la …
🖥️DÉLINQUANCE. Ces actions mises en avant par l’État en Calédonie pour “restaurer la sécurité du quotidien”
Comment réagir aux faits de délinquance en Calédonie, tels qu'ils apparaissent dans le bilan 2025 ? Le document diffusé mardi par le …
📰CISA wants critical infrastructure to operate ‘weeks to months’ in isolation during conflict
The agency will begin targeted assessments meant to help critical infrastructure entities operate while disconnecting OT networks from IT and third-party vendors. The post CISA wants critical...
📰CISA boasts AI automation improvements to threat analysis, mission support
Cybersecurity and Infrastructure Security Agency officials said it’s proven a boon in numerous areas, but there are some hurdles to adoption, still. The post CISA boasts AI automation improvements...
📰Latvian national sentenced for ransomware attacks run by former Conti leaders
Deniss Zolotarjovs was mostly tasked with putting pressure on the Russia-based crew’s victims, in one case leaking hundreds of children’s health records. The post Latvian national sentenced for...
🔥Critical Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS and Potential RCE
The Apache Software Foundation (ASF) has released security updates to address several security vulnerabilities in the HTTP Server, including a severe vulnerability that could potentially lead to...
🔥DAEMON Tools Supply Chain Attack Compromises Official Installers with Malware
A newly identified supply chain attack targeting DAEMON Tools software has compromised its installers to serve a malicious payload, according to findings from Kaspersky. "These installers are...
📰‘Copy Fail’ is a real Linux security crisis wrapped in AI slop
The actively exploited defect could affect every mainstream Linux distribution built since 2017, but some researchers found Theori’s AI-generated disclosure unhelpful and lacking. The post ‘Copy...
📰A college student is suing a dating app that allegedly used her TikTok videos to target men in her dormitory
The woman’s lawyer told CyberScoop they believe the company edited her video to suggest she was a “friend with benefits” and intentionally geofenced it to men around her. The post A college...