📰Global coalition dismantles Tycoon 2FA phishing kit
Microsoft, which led the effort, said it seized 330 domains that powered the phishing platform’s core infrastructure. The alleged creator was also named in a civil complaint. The post Global...
📰LLMs are getting better at unmasking people online
The author of a new study told CyberScoop he's "very worried,” describing deanonymization capabilities of AI as a “large scale invasion of privacy.” The post LLMs are getting better at...
📰Authorities from 14 countries shut down major cybercrime forum LeakBase
The marketplace was one of the world’s largest hubs for cybercrime with more than 142,000 members. Officials identified and arrested multiple suspects after seizing the site’s database. The post...
🔥149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict
Cybersecurity researchers have warned of a surge in retaliatory hacktivist activity following the U.S.-Israel coordinated military campaign against Iran, codenamed Epic Fury and Roaring Lion. "The...
📰Attackers are using your network against you, according to Cloudflare
Blind spots in complex cloud environments allow identity-based attacks to achieve the same outcome as complex malware or zero-day exploits. Sophistication need not apply. The post Attackers are using
🔥Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1
Google said it identified a "new and powerful" exploit kit dubbed Coruna (aka CryptoWaters) targeting Apple iPhone models running iOS versions between 13.0 and 17.2.1. The exploit kit featured five...
🖥️Sécurité : mettez à jour votre iPhone immédiatement pour éviter ce virus
Apple assure que ses iPhone disposent d’un système de protection parmi les plus sophistiqués du marché. Ces protections sont indéniables, mais elles …
🔥New RFP Template for AI Usage Control and AI Governance
As AI becomes the central engine for enterprise productivity, security leaders are finally getting the green light — and the budget — to secure it. But there’s a quiet crisis unfolding in the...
🖥️Threat intelligence et adversarial exposure validation : quand le renseignement sur la menace devient actionnable
Comment valider que vous êtes protégé contre Salt Typhoon ou d'autres APT sans déployer de vrai malware ? L'approche CTI-driven AEV apporte enfin la …
🖥️À Madagascar, les autorités veulent refonder une police nationale décriée par les collectifs d'usagers
À Madagascar, les autorités ont lancé une opération d'envergure en vue de reprendre en mains une police nationale en pleine crise de confiance. Le 3 mars 2026 à Antananarivo, les autorités ont...
🖥️Pourquoi l'informatique autonome est l'avenir des organisations résilientes, efficaces et sécurisées
Dans les centres opérationnels de sécurité, les analystes font face à un flux incessant d'alertes. Combien sont réellement traitées dans les délais ? …
🔥Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux
Cybersecurity researchers have flagged malicious Packagist PHP packages masquerading as Laravel utilities that act as a conduit for a cross-platform remote access trojan (RAT) that's functional on...
🔥APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2
Cybersecurity researchers have disclosed details of an advanced persistent threat (APT) group dubbed Silver Dragon that has been linked to cyber attacks targeting entities in Europe and Southeast...
🖥️YggTorrent « ferme définitivement » : un hacker se venge et pirate le plus gros répertoire de torrents en France
Le piratage est énorme et résulte de l’exploitation de plusieurs erreurs de configuration de la plateforme. YggTorrent n’a rien pu faire. Son hacker …
📰Possible U.S.-developed exploits linked to first known ‘mass’ iOS attack
Researchers traced the kit moving from a spyware vendor’s customer to Russian hackers to Chinese cybercriminals. The post Possible U.S.-developed exploits linked to first known ‘mass’ iOS...
📰Global coalition dismantles Tycoon 2FA phishing kit
Microsoft, which led the effort, said it seized 330 domains that powered the phishing platform’s core infrastructure. The alleged creator was also named in a civil complaint. The post Global...
📰LLMs are getting better at unmasking people online
The author of a new study told CyberScoop he's "very worried,” describing deanonymization capabilities of AI as a “large scale invasion of privacy.” The post LLMs are getting better at...
📰Authorities from 14 countries shut down major cybercrime forum LeakBase
The marketplace was one of the world’s largest hubs for cybercrime with more than 142,000 members. Officials identified and arrested multiple suspects after seizing the site’s database. The post...
🔥149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict
Cybersecurity researchers have warned of a surge in retaliatory hacktivist activity following the U.S.-Israel coordinated military campaign against Iran, codenamed Epic Fury and Roaring Lion. "The...
📰Attackers are using your network against you, according to Cloudflare
Blind spots in complex cloud environments allow identity-based attacks to achieve the same outcome as complex malware or zero-day exploits. Sophistication need not apply. The post Attackers are using
🔥Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1
Google said it identified a "new and powerful" exploit kit dubbed Coruna (aka CryptoWaters) targeting Apple iPhone models running iOS versions between 13.0 and 17.2.1. The exploit kit featured five...
🖥️Sécurité : mettez à jour votre iPhone immédiatement pour éviter ce virus
Apple assure que ses iPhone disposent d’un système de protection parmi les plus sophistiqués du marché. Ces protections sont indéniables, mais elles …
🔥New RFP Template for AI Usage Control and AI Governance
As AI becomes the central engine for enterprise productivity, security leaders are finally getting the green light — and the budget — to secure it. But there’s a quiet crisis unfolding in the...
🖥️Threat intelligence et adversarial exposure validation : quand le renseignement sur la menace devient actionnable
Comment valider que vous êtes protégé contre Salt Typhoon ou d'autres APT sans déployer de vrai malware ? L'approche CTI-driven AEV apporte enfin la …
🖥️À Madagascar, les autorités veulent refonder une police nationale décriée par les collectifs d'usagers
À Madagascar, les autorités ont lancé une opération d'envergure en vue de reprendre en mains une police nationale en pleine crise de confiance. Le 3 mars 2026 à Antananarivo, les autorités ont...
🖥️Pourquoi l'informatique autonome est l'avenir des organisations résilientes, efficaces et sécurisées
Dans les centres opérationnels de sécurité, les analystes font face à un flux incessant d'alertes. Combien sont réellement traitées dans les délais ? …
🔥Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux
Cybersecurity researchers have flagged malicious Packagist PHP packages masquerading as Laravel utilities that act as a conduit for a cross-platform remote access trojan (RAT) that's functional on...
🔥APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2
Cybersecurity researchers have disclosed details of an advanced persistent threat (APT) group dubbed Silver Dragon that has been linked to cyber attacks targeting entities in Europe and Southeast...
🖥️YggTorrent « ferme définitivement » : un hacker se venge et pirate le plus gros répertoire de torrents en France
Le piratage est énorme et résulte de l’exploitation de plusieurs erreurs de configuration de la plateforme. YggTorrent n’a rien pu faire. Son hacker …
📰Possible U.S.-developed exploits linked to first known ‘mass’ iOS attack
Researchers traced the kit moving from a spyware vendor’s customer to Russian hackers to Chinese cybercriminals. The post Possible U.S.-developed exploits linked to first known ‘mass’ iOS...