🖥️Voici pourquoi il ne faut jamais recharger votre téléphone dans un aéroport
Recharger son téléphone ou se connecter au Wi-Fi avant d’embarquer semble anodin, mais ces gestes peuvent ouvrir la porte à des cyberattaques …
🔥Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs
A previously undocumented threat actor has been attributed to attacks targeting Ukrainian organizations with malware known as CANFAIL. Google Threat Intelligence Group (GTIG) described the hack group
🔥Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations
Several state-sponsored actors, hacktivist entities, and criminal groups from China, Iran, North Korea, and Russia have trained their sights on the defense industrial base (DIB) sector, according to...
🔥UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors
A previously unknown threat actor tracked as UAT-9921 has been observed leveraging a new modular framework called VoidLink in its campaigns targeting the technology and financial services sectors,...
🖥️Ciblées par les criminels, comment les PME s’arment-elles face aux cyberrisques ?
Les attaques deviennent plus rapides et plus précises, grâce à l’intelligence artificielle. Mais les chefs d’entreprise sont aussi plus …
🔥Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History
Cybersecurity researchers have discovered a malicious Google Chrome extension that's designed to steal data associated with Meta Business Suite and Facebook Business Manager. The extension, named CL...
🔥npm’s Update to Harden Their Supply Chain, and Points to Consider
In December 2025, in response to the Sha1-Hulud incident, npm completed a major authentication overhaul intended to reduce supply-chain attacks. While the overhaul is a solid step forward, the...
📰Proofpoint acquires Acuvity to tackle the security risks of agentic AI
Proofpoint is snapping up the startup to solve the industry’s newest headache: knowing what your autonomous AI is actually doing. The post Proofpoint acquires Acuvity to tackle the security risks...
📰Apple discloses first actively exploited zero-day of 2026
The vendor said the memory-corruption defect was exploited to target specific people, but it did not describe the objectives of the attack. The post Apple discloses first actively exploited zero-day...
📰Google finds state-sponsored hackers use AI at ‘all stages’ of attack cycle
The research underscores how AI tools have matured in their cyber offensive capabilities, even as it doesn’t reveal novel or paradigm shifting uses of the technology. The post Google finds...
📰CISA to host industry feedback sessions on cyber incident reporting regulation
One industry official told CyberScoop the town halls are probably not what CIRCIA needs right now. The post CISA to host industry feedback sessions on cyber incident reporting regulation appeared...
🖥️Puissant, mais à double-tranchant : Gemini est la nouvelle coqueluche des hackers
Google vient de dévoiler l'autre face de son IA vedette : Gemini est massivement détourné par des groupes de pirates sponsorisés par la Chine, …
🖥️Alerte sur l'iPhone : Apple met en garde contre une cyberattaque « extrêmement sophistiquée »
Une faille de sécurité zero day a été découverte sur l’iPhone. Débusquée par Google, la vulnérabilité est exploitée dans le cadre d’une cyberattaque …
📰0APT ransomware group rises swiftly with bluster, along with genuine threat of attack
Most signs suggest the group is running a massive hoax by claiming hundreds of initial victims, but at least some of the threat 0APT poses is grounded in truth backed by proven capabilities. The post
🕵️Kimwolf Botnet Swamps Anonymity Network I2P
For the past week, the massive "Internet of Things" (IoT) botnet known as Kimwolf has been disrupting the The Invisible Internet Project (I2P), a decentralized, encrypted communications network...
🖥️Voici pourquoi il ne faut jamais recharger votre téléphone dans un aéroport
Recharger son téléphone ou se connecter au Wi-Fi avant d’embarquer semble anodin, mais ces gestes peuvent ouvrir la porte à des cyberattaques …
🔥Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs
A previously undocumented threat actor has been attributed to attacks targeting Ukrainian organizations with malware known as CANFAIL. Google Threat Intelligence Group (GTIG) described the hack group
🔥Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations
Several state-sponsored actors, hacktivist entities, and criminal groups from China, Iran, North Korea, and Russia have trained their sights on the defense industrial base (DIB) sector, according to...
🔥UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors
A previously unknown threat actor tracked as UAT-9921 has been observed leveraging a new modular framework called VoidLink in its campaigns targeting the technology and financial services sectors,...
🖥️Ciblées par les criminels, comment les PME s’arment-elles face aux cyberrisques ?
Les attaques deviennent plus rapides et plus précises, grâce à l’intelligence artificielle. Mais les chefs d’entreprise sont aussi plus …
🔥Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History
Cybersecurity researchers have discovered a malicious Google Chrome extension that's designed to steal data associated with Meta Business Suite and Facebook Business Manager. The extension, named CL...
🔥npm’s Update to Harden Their Supply Chain, and Points to Consider
In December 2025, in response to the Sha1-Hulud incident, npm completed a major authentication overhaul intended to reduce supply-chain attacks. While the overhaul is a solid step forward, the...
📰Proofpoint acquires Acuvity to tackle the security risks of agentic AI
Proofpoint is snapping up the startup to solve the industry’s newest headache: knowing what your autonomous AI is actually doing. The post Proofpoint acquires Acuvity to tackle the security risks...
📰Apple discloses first actively exploited zero-day of 2026
The vendor said the memory-corruption defect was exploited to target specific people, but it did not describe the objectives of the attack. The post Apple discloses first actively exploited zero-day...
📰Google finds state-sponsored hackers use AI at ‘all stages’ of attack cycle
The research underscores how AI tools have matured in their cyber offensive capabilities, even as it doesn’t reveal novel or paradigm shifting uses of the technology. The post Google finds...
📰CISA to host industry feedback sessions on cyber incident reporting regulation
One industry official told CyberScoop the town halls are probably not what CIRCIA needs right now. The post CISA to host industry feedback sessions on cyber incident reporting regulation appeared...
🖥️Puissant, mais à double-tranchant : Gemini est la nouvelle coqueluche des hackers
Google vient de dévoiler l'autre face de son IA vedette : Gemini est massivement détourné par des groupes de pirates sponsorisés par la Chine, …
🖥️Alerte sur l'iPhone : Apple met en garde contre une cyberattaque « extrêmement sophistiquée »
Une faille de sécurité zero day a été découverte sur l’iPhone. Débusquée par Google, la vulnérabilité est exploitée dans le cadre d’une cyberattaque …
📰0APT ransomware group rises swiftly with bluster, along with genuine threat of attack
Most signs suggest the group is running a massive hoax by claiming hundreds of initial victims, but at least some of the threat 0APT poses is grounded in truth backed by proven capabilities. The post
🕵️Kimwolf Botnet Swamps Anonymity Network I2P
For the past week, the massive "Internet of Things" (IoT) botnet known as Kimwolf has been disrupting the The Invisible Internet Project (I2P), a decentralized, encrypted communications network...