Ville futuriste
🛡️ Dernières actualités cybersécurité
Flipboard19/04 07:16

🖥️WhatsApp ment et espionne vos conversations selon Durov !

► En bref WhatsApp ne protégerait pas réellement vos échanges • C’est ce qu’affirme le fondateur de Telegram, Pavel Durov • La réalité est bien plus …

Flipboard19/04 06:50

🖥️Proton VPN bloque pubs, traqueurs et malwares grâce à NetShield 🔒

Que ce soit du côté des annonceurs comme des sites Web que vous visitez à chacune de vos navigations en ligne, les collectes de données sont monnaie …

Flipboard19/04 06:01

🖥️Une arnaque Booking tente de vous piéger juste après une réservation, le timing est redoutable

À l’approche des vacances, une nouvelle vague d’arnaques vise les utilisateurs de Booking. Les cybercriminels ont mis au point des messages …

Flipboard19/04 05:30

🖥️Le crime à portée de clic : l’inquiétante mutation du banditisme

Violence exacerbée, sous-traitance, rajeunissement des suspects : le renseignement criminel alerte sur l’expansion de la criminalité organisée, …

Flipboard18/04 18:00

🖥️Cybercriminalité : Elon Musk convoqué lundi devant la justice française

Le multimilliardaire américain est attendu lundi, en audition libre, dans le cadre de l’enquête menée par la justice française sur son réseau social X …

The Hacker News18/04 08:07

🔥[Webinar] Eliminate Ghost Identities Before They Expose Your Enterprise Data

In 2024, compromised service accounts and forgotten API keys were behind 68% of cloud breaches. Not phishing. Not weak passwords. Unmanaged non-human identities that nobody was watching. For every

The Hacker News18/04 07:59

🔥$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

Grinex, a Kyrgyzstan-incorporated cryptocurrency exchange sanctioned by the U.K. and the U.S. last year, said it's suspending operations after it blamed Western intelligence agencies for a $13.74...

The Hacker News18/04 06:01

🔥Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

Threat actors are exploiting security flaws in TBK DVR and end‑of‑life (EoL) TP-Link Wi-Fi routers to deploy Mirai-botnet variants on compromised devices, according to findings from Fortinet...

CyberScoop17/04 17:31

📰The surveillance law Congress can’t quit — and can’t explain

Congress overhauled Section 702 in 2024 with 56 changes. Now, as the law nears expiration, supporters and critics can’t even agree on what the numbers show. The post The surveillance law Congress...

The Hacker News17/04 13:21

🔥Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

Huntress is warning that threat actors are exploiting three recently disclosed security flaws in Microsoft Defender to gain elevated privileges in compromised systems. The activity involves the...

The Hacker News17/04 10:47

🔥Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

Google this week announced a new set of Play policy updates to strengthen user privacy and protect businesses against fraud, even as it revealed it blocked or removed over 8.3 billion ads globally...

CyberScoop16/04 23:05

📰US nationals sentenced for aiding North Korea’s tech worker scheme

Kejia Wang and Zhenxing Wang established shell companies and hosted laptop farms to help operatives obtain jobs at more than 100 U.S. companies. The post US nationals sentenced for aiding North...

CyberScoop16/04 17:26

📰Officials seize 53 DDoS-for-hire domains in ongoing crackdown

Operation PowerOFF’s latest globally coordinated action identified more than 75,000 alleged cybercriminals. Officials warned each of them to stop jamming up traffic. The post Officials seize 53...

CyberScoop16/04 10:00

📰Ghost breaches: How AI-mediated narratives have become a new threat vector

Three incidents. No actual breaches. Full-scale crisis response. AI hallucinations are creating a new threat vector that most organizations have yet to prepare for. The post Ghost breaches: How...

CyberScoop15/04 20:17

📰NIST narrows scope of CVE analysis to keep up with rising tide of vulnerabilities

The National Vulnerability Database will now only analyze vulnerabilities in critical software, systems used in the federal government and those under active exploitation. The post NIST narrows scope

Flipboard19/04 07:16

🖥️WhatsApp ment et espionne vos conversations selon Durov !

► En bref WhatsApp ne protégerait pas réellement vos échanges • C’est ce qu’affirme le fondateur de Telegram, Pavel Durov • La réalité est bien plus …

Flipboard19/04 06:50

🖥️Proton VPN bloque pubs, traqueurs et malwares grâce à NetShield 🔒

Que ce soit du côté des annonceurs comme des sites Web que vous visitez à chacune de vos navigations en ligne, les collectes de données sont monnaie …

Flipboard19/04 06:01

🖥️Une arnaque Booking tente de vous piéger juste après une réservation, le timing est redoutable

À l’approche des vacances, une nouvelle vague d’arnaques vise les utilisateurs de Booking. Les cybercriminels ont mis au point des messages …

Flipboard19/04 05:30

🖥️Le crime à portée de clic : l’inquiétante mutation du banditisme

Violence exacerbée, sous-traitance, rajeunissement des suspects : le renseignement criminel alerte sur l’expansion de la criminalité organisée, …

Flipboard18/04 18:00

🖥️Cybercriminalité : Elon Musk convoqué lundi devant la justice française

Le multimilliardaire américain est attendu lundi, en audition libre, dans le cadre de l’enquête menée par la justice française sur son réseau social X …

The Hacker News18/04 08:07

🔥[Webinar] Eliminate Ghost Identities Before They Expose Your Enterprise Data

In 2024, compromised service accounts and forgotten API keys were behind 68% of cloud breaches. Not phishing. Not weak passwords. Unmanaged non-human identities that nobody was watching. For every

The Hacker News18/04 07:59

🔥$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

Grinex, a Kyrgyzstan-incorporated cryptocurrency exchange sanctioned by the U.K. and the U.S. last year, said it's suspending operations after it blamed Western intelligence agencies for a $13.74...

The Hacker News18/04 06:01

🔥Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

Threat actors are exploiting security flaws in TBK DVR and end‑of‑life (EoL) TP-Link Wi-Fi routers to deploy Mirai-botnet variants on compromised devices, according to findings from Fortinet...

CyberScoop17/04 17:31

📰The surveillance law Congress can’t quit — and can’t explain

Congress overhauled Section 702 in 2024 with 56 changes. Now, as the law nears expiration, supporters and critics can’t even agree on what the numbers show. The post The surveillance law Congress...

The Hacker News17/04 13:21

🔥Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

Huntress is warning that threat actors are exploiting three recently disclosed security flaws in Microsoft Defender to gain elevated privileges in compromised systems. The activity involves the...

The Hacker News17/04 10:47

🔥Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

Google this week announced a new set of Play policy updates to strengthen user privacy and protect businesses against fraud, even as it revealed it blocked or removed over 8.3 billion ads globally...

CyberScoop16/04 23:05

📰US nationals sentenced for aiding North Korea’s tech worker scheme

Kejia Wang and Zhenxing Wang established shell companies and hosted laptop farms to help operatives obtain jobs at more than 100 U.S. companies. The post US nationals sentenced for aiding North...

CyberScoop16/04 17:26

📰Officials seize 53 DDoS-for-hire domains in ongoing crackdown

Operation PowerOFF’s latest globally coordinated action identified more than 75,000 alleged cybercriminals. Officials warned each of them to stop jamming up traffic. The post Officials seize 53...

CyberScoop16/04 10:00

📰Ghost breaches: How AI-mediated narratives have become a new threat vector

Three incidents. No actual breaches. Full-scale crisis response. AI hallucinations are creating a new threat vector that most organizations have yet to prepare for. The post Ghost breaches: How...

CyberScoop15/04 20:17

📰NIST narrows scope of CVE analysis to keep up with rising tide of vulnerabilities

The National Vulnerability Database will now only analyze vulnerabilities in critical software, systems used in the federal government and those under active exploitation. The post NIST narrows scope