Ville futuriste
🛡️ Dernières actualités cybersécurité
CyberScoop21/05 18:37

📰Trump postpones executive order focused on AI security 

Under a draft executive order, the NSA, Treasury Department and other federal agencies would get 90-days to test new models for cybersecurity and national security concerns. The post Trump postpones...

CyberScoop21/05 17:05

📰CISA chief frets about open-source vulnerabilities, delayed security improvements

Acting director Nick Andersen’s comments came as a wave of malware attacks hit tech that’s publicly available for collaboration. The post CISA chief frets about open-source vulnerabilities,...

CyberScoop21/05 16:05

📰European authorities take down prolific cybercrime VPN service

Officials arrested the alleged administrator of First VPN, seized its servers and domains. Europol said the service appeared in almost every major recent cybercrime investigation. The post European...

The Hacker News21/05 14:17

🔥Showboat Linux Malware Hits Middle East Telecom with SOCKS5 Proxy Backdoor

Cybersecurity researchers have disclosed details of a new Linux malware dubbed Showboat that has been put to use in a campaign targeting a telecommunications provider in the Middle East since at...

The Hacker News21/05 11:52

🔥ThreatsDay Bulletin: Linux Rootkits, Router 0-Day, AI Intrusions, Scam Kits and 25 New Stories

This week starts small. A token leaks. A bad package slips in. A login trick works. An old tool shows up again. At first, it feels like the usual mess. Then you see the pattern: attackers are not...

The Hacker News21/05 10:55

🔥Microsoft Warns of Two Actively Exploited Defender Vulnerabilities

Microsoft has disclosed that a privilege escalation and a denial-of-service flaw in Defender has come under active exploitation in the wild. The former, tracked as CVE-2026-41091, is rated 7.8 on the

The Hacker News21/05 10:30

🔥When Identity is the Attack Path

Consider a cached access key on a single Windows machine. It got there the way most cached credentials do - a user logged in, and the key stored itself automatically. Standard AWS behavior. No one...

CyberScoop21/05 10:00

📰The readiness paradox: Why a false sense of cyber confidence is becoming a liability

As AI expands the attack surface and alert fatigue grows, cyber exposure management offers a clearer path to understanding where risk truly concentrates and how to reduce it before a crisis hits. The

The Hacker News21/05 07:35

🔥9-Year-Old Linux Kernel Flaw Enables Root Command Execution on Major Distros

Cybersecurity researchers have disclosed details of a vulnerability in the Linux kernel that remained undetected for nine years. The vulnerability, tracked as CVE-2026-46333 (CVSS score: 5.5), is a...

CyberScoop20/05 20:25

📰Meet Rampart and Clarity, Microsoft’s new red team combo AI agents

Microsoft’s AI red team lead talked to CyberScoop about the goals behind open sourcing a pair of security tools meant for developers and incident responders. The post Meet Rampart and Clarity,...

Flipboard19/05 12:00

🖥️Microsoft met fin à la double authentification par SMS : une source « de fraude »

Microsoft a officiellement annoncé la fin des codes de vérification envoyés par SMS. Selon l’éditeur, ces codes, utilisés depuis des années pour …

Flipboard19/05 11:48

🖥️Piratage de plusieurs sites de réservations de séjours : pourquoi les données des vacanciers intéressent autant les escrocs | TF1 Info

Pour vos vacances d'été, peut-être avez-vous prévu de vous rendre chez ces géants du tourisme. Pierre & Vacances, Center Parcs, Belambra... tous ont …

Flipboard19/05 08:25

🖥️Blackout numérique de la délégation Trump en Chine, rien de nouveau sous le soleil de Pékin

Espionnage mutuel généralisé, protocoles anti-écoute des deux côtés du Pacifique et de l'Atlantique, logiciels espions vendus à 26 pays : l'ère de la …

Flipboard19/05 08:20

🖥️« France Travail, ANTS… Le florilège des défaillances informatiques s'allonge chaque jour » : « L'Etat français a organisé sa propre irresponsabilité »

Les données de dizaines de millions de Français fuient des systèmes publics vieillissants, pendant que l'IA et les cyberattaques étrangères …

Flipboard19/05 05:21

🖥️Windows 11 : BitLocker vulnérable en quelques secondes

Une manipulation déconcertante de simplicité Contourner BitLocker, le système de chiffrement intégré à Windows 11, ne nécessiterait ni logiciel …

CyberScoop21/05 18:37

📰Trump postpones executive order focused on AI security 

Under a draft executive order, the NSA, Treasury Department and other federal agencies would get 90-days to test new models for cybersecurity and national security concerns. The post Trump postpones...

CyberScoop21/05 17:05

📰CISA chief frets about open-source vulnerabilities, delayed security improvements

Acting director Nick Andersen’s comments came as a wave of malware attacks hit tech that’s publicly available for collaboration. The post CISA chief frets about open-source vulnerabilities,...

CyberScoop21/05 16:05

📰European authorities take down prolific cybercrime VPN service

Officials arrested the alleged administrator of First VPN, seized its servers and domains. Europol said the service appeared in almost every major recent cybercrime investigation. The post European...

The Hacker News21/05 14:17

🔥Showboat Linux Malware Hits Middle East Telecom with SOCKS5 Proxy Backdoor

Cybersecurity researchers have disclosed details of a new Linux malware dubbed Showboat that has been put to use in a campaign targeting a telecommunications provider in the Middle East since at...

The Hacker News21/05 11:52

🔥ThreatsDay Bulletin: Linux Rootkits, Router 0-Day, AI Intrusions, Scam Kits and 25 New Stories

This week starts small. A token leaks. A bad package slips in. A login trick works. An old tool shows up again. At first, it feels like the usual mess. Then you see the pattern: attackers are not...

The Hacker News21/05 10:55

🔥Microsoft Warns of Two Actively Exploited Defender Vulnerabilities

Microsoft has disclosed that a privilege escalation and a denial-of-service flaw in Defender has come under active exploitation in the wild. The former, tracked as CVE-2026-41091, is rated 7.8 on the

The Hacker News21/05 10:30

🔥When Identity is the Attack Path

Consider a cached access key on a single Windows machine. It got there the way most cached credentials do - a user logged in, and the key stored itself automatically. Standard AWS behavior. No one...

CyberScoop21/05 10:00

📰The readiness paradox: Why a false sense of cyber confidence is becoming a liability

As AI expands the attack surface and alert fatigue grows, cyber exposure management offers a clearer path to understanding where risk truly concentrates and how to reduce it before a crisis hits. The

The Hacker News21/05 07:35

🔥9-Year-Old Linux Kernel Flaw Enables Root Command Execution on Major Distros

Cybersecurity researchers have disclosed details of a vulnerability in the Linux kernel that remained undetected for nine years. The vulnerability, tracked as CVE-2026-46333 (CVSS score: 5.5), is a...

CyberScoop20/05 20:25

📰Meet Rampart and Clarity, Microsoft’s new red team combo AI agents

Microsoft’s AI red team lead talked to CyberScoop about the goals behind open sourcing a pair of security tools meant for developers and incident responders. The post Meet Rampart and Clarity,...

Flipboard19/05 12:00

🖥️Microsoft met fin à la double authentification par SMS : une source « de fraude »

Microsoft a officiellement annoncé la fin des codes de vérification envoyés par SMS. Selon l’éditeur, ces codes, utilisés depuis des années pour …

Flipboard19/05 11:48

🖥️Piratage de plusieurs sites de réservations de séjours : pourquoi les données des vacanciers intéressent autant les escrocs | TF1 Info

Pour vos vacances d'été, peut-être avez-vous prévu de vous rendre chez ces géants du tourisme. Pierre & Vacances, Center Parcs, Belambra... tous ont …

Flipboard19/05 08:25

🖥️Blackout numérique de la délégation Trump en Chine, rien de nouveau sous le soleil de Pékin

Espionnage mutuel généralisé, protocoles anti-écoute des deux côtés du Pacifique et de l'Atlantique, logiciels espions vendus à 26 pays : l'ère de la …

Flipboard19/05 08:20

🖥️« France Travail, ANTS… Le florilège des défaillances informatiques s'allonge chaque jour » : « L'Etat français a organisé sa propre irresponsabilité »

Les données de dizaines de millions de Français fuient des systèmes publics vieillissants, pendant que l'IA et les cyberattaques étrangères …

Flipboard19/05 05:21

🖥️Windows 11 : BitLocker vulnérable en quelques secondes

Une manipulation déconcertante de simplicité Contourner BitLocker, le système de chiffrement intégré à Windows 11, ne nécessiterait ni logiciel …