Ville futuriste
🛡️ Dernières actualités cybersécurité
The Hacker News17/02 19:08

🔥Webinar: How Modern SOC Teams Use AI and Context to Investigate Cloud Breaches Faster

Cloud attacks move fast — faster than most incident response teams. In data centers, investigations had time. Teams could collect disk images, review logs, and build timelines over days. In the...

CyberScoop17/02 18:23

📰Polish authorities arrest alleged Phobos ransomware affiliate

The 47-year-old man, who was not identified, faces up to five years in prison for producing, obtaining and sharing computer programs used to conduct cyberattacks. The post Polish authorities arrest...

The Hacker News17/02 18:08

🔥Researchers Show Copilot and Grok Can Be Abused as Malware C2 Proxies

Cybersecurity researchers have disclosed that artificial intelligence (AI) assistants that support web browsing or URL fetching capabilities can be turned into stealthy command-and-control (C2)...

CyberScoop17/02 16:55

📰Palo Alto Networks’ Koi acquisition is all about keeping AI agents in check

The company says it will integrate Koi’s technology into its security offerings to improve visibility into AI-driven activity on workplace devices. The post Palo Alto Networks’ Koi acquisition is

The Hacker News17/02 16:41

🔥Keenadu Firmware Backdoor Infects Android Tablets via Signed OTA Updates

A new Android backdoor that's embedded deep into the device firmware can silently harvest data and remotely control its behavior, according to new findings from Kaspersky. The Russian cybersecurity...

Flipboard17/02 14:03

🖥️Contacts, photos, mots de passe compromis... une nouvelle arnaque fait rage en Belgique

Les parquets d’Anvers et du Limbourg mettent en garde. Les parquets d’Anvers et du Limbourg, en collaboration avec la police judiciaire fédérale, ont …

The Hacker News17/02 12:42

🔥SmartLoader Attack Uses Trojanized Oura MCP Server to Deploy StealC Infostealer

Cybersecurity researchers have disclosed details of a new SmartLoader campaign that involves distributing a trojanized version of a Model Context Protocol (MCP) server associated with Oura Health to...

The Hacker News17/02 11:30

🔥My Day Getting My Hands Dirty with an NDR System

My objectiveThe role of NDR in SOC workflowsStarting up the NDR systemHow AI complements the human responseWhat else did I try out?What could I see with NDR that I wouldn’t otherwise?Am I ready to...

CyberScoop17/02 11:00

📰Unit 42: Nearly two-thirds of breaches now start with identity abuse

Palo Alto Network’s incident response firm said identity-based attacks are exploding as poor security controls stretch across a widening mosaic of integrated tools and systems. The post Unit 42:...

CyberScoop17/02 11:00

📰Citizen Lab links Cellebrite to the hacking of a Kenyan presidential candidate’s phone

The research lab says forensic evidence suggests the phone-cracking technology was used against Boniface Mwangi after his July arrest. The post Citizen Lab links Cellebrite to the hacking of a Kenyan

CyberScoop17/02 11:00

📰Why ‘secure-by-design’ systems are non-negotiable in the AI era

Trillions in AI infrastructure face systemic failure unless security begins at the chip and ends with the grid. The post Why ‘secure-by-design’ systems are non-negotiable in the AI era appeared...

Flipboard16/02 18:15

🖥️Attention : des hackers utilisent Claude AI pour piéger les utilisateurs Mac

Des chercheurs en sécurité ont découvert une campagne de piratage qui exploite les artefacts de Claude, l'IA d'Anthropic, pour piéger les …

Flipboard15/02 07:52

🖥️Fuite de données en France : 40,3 millions de comptes français piratés en 2025, le cauchemar continue

En 2025, les fuites de données ont explosé, avec 425,7 millions de comptes compromis dans le monde, soit près d’un compte piraté chaque seconde. Avec …

Flipboard14/02 16:30

🖥️Pourquoi effacer votre historique ne suffit pas : voici la solution radicale pour ne laisser aucune trace

Vous pensez qu'ouvrir un nouvel onglet en choisissant la navigation privée ou qu'une simple suppression de l'historique suffit à ne laisser aucune …

Flipboard14/02 10:55

🖥️La Russie étend sa guerre énergétique hors des frontières ukrainiennes et s'attaque à l'Europe

Entre frappes contre le réseau électrique ukrainien et cyberattaques visant des infrastructures en Pologne, Moscou semble élargir son usage de …

The Hacker News17/02 19:08

🔥Webinar: How Modern SOC Teams Use AI and Context to Investigate Cloud Breaches Faster

Cloud attacks move fast — faster than most incident response teams. In data centers, investigations had time. Teams could collect disk images, review logs, and build timelines over days. In the...

CyberScoop17/02 18:23

📰Polish authorities arrest alleged Phobos ransomware affiliate

The 47-year-old man, who was not identified, faces up to five years in prison for producing, obtaining and sharing computer programs used to conduct cyberattacks. The post Polish authorities arrest...

The Hacker News17/02 18:08

🔥Researchers Show Copilot and Grok Can Be Abused as Malware C2 Proxies

Cybersecurity researchers have disclosed that artificial intelligence (AI) assistants that support web browsing or URL fetching capabilities can be turned into stealthy command-and-control (C2)...

CyberScoop17/02 16:55

📰Palo Alto Networks’ Koi acquisition is all about keeping AI agents in check

The company says it will integrate Koi’s technology into its security offerings to improve visibility into AI-driven activity on workplace devices. The post Palo Alto Networks’ Koi acquisition is

The Hacker News17/02 16:41

🔥Keenadu Firmware Backdoor Infects Android Tablets via Signed OTA Updates

A new Android backdoor that's embedded deep into the device firmware can silently harvest data and remotely control its behavior, according to new findings from Kaspersky. The Russian cybersecurity...

Flipboard17/02 14:03

🖥️Contacts, photos, mots de passe compromis... une nouvelle arnaque fait rage en Belgique

Les parquets d’Anvers et du Limbourg mettent en garde. Les parquets d’Anvers et du Limbourg, en collaboration avec la police judiciaire fédérale, ont …

The Hacker News17/02 12:42

🔥SmartLoader Attack Uses Trojanized Oura MCP Server to Deploy StealC Infostealer

Cybersecurity researchers have disclosed details of a new SmartLoader campaign that involves distributing a trojanized version of a Model Context Protocol (MCP) server associated with Oura Health to...

The Hacker News17/02 11:30

🔥My Day Getting My Hands Dirty with an NDR System

My objectiveThe role of NDR in SOC workflowsStarting up the NDR systemHow AI complements the human responseWhat else did I try out?What could I see with NDR that I wouldn’t otherwise?Am I ready to...

CyberScoop17/02 11:00

📰Unit 42: Nearly two-thirds of breaches now start with identity abuse

Palo Alto Network’s incident response firm said identity-based attacks are exploding as poor security controls stretch across a widening mosaic of integrated tools and systems. The post Unit 42:...

CyberScoop17/02 11:00

📰Citizen Lab links Cellebrite to the hacking of a Kenyan presidential candidate’s phone

The research lab says forensic evidence suggests the phone-cracking technology was used against Boniface Mwangi after his July arrest. The post Citizen Lab links Cellebrite to the hacking of a Kenyan

CyberScoop17/02 11:00

📰Why ‘secure-by-design’ systems are non-negotiable in the AI era

Trillions in AI infrastructure face systemic failure unless security begins at the chip and ends with the grid. The post Why ‘secure-by-design’ systems are non-negotiable in the AI era appeared...

Flipboard16/02 18:15

🖥️Attention : des hackers utilisent Claude AI pour piéger les utilisateurs Mac

Des chercheurs en sécurité ont découvert une campagne de piratage qui exploite les artefacts de Claude, l'IA d'Anthropic, pour piéger les …

Flipboard15/02 07:52

🖥️Fuite de données en France : 40,3 millions de comptes français piratés en 2025, le cauchemar continue

En 2025, les fuites de données ont explosé, avec 425,7 millions de comptes compromis dans le monde, soit près d’un compte piraté chaque seconde. Avec …

Flipboard14/02 16:30

🖥️Pourquoi effacer votre historique ne suffit pas : voici la solution radicale pour ne laisser aucune trace

Vous pensez qu'ouvrir un nouvel onglet en choisissant la navigation privée ou qu'une simple suppression de l'historique suffit à ne laisser aucune …

Flipboard14/02 10:55

🖥️La Russie étend sa guerre énergétique hors des frontières ukrainiennes et s'attaque à l'Europe

Entre frappes contre le réseau électrique ukrainien et cyberattaques visant des infrastructures en Pologne, Moscou semble élargir son usage de …