🖥️Quishing : cette arnaque aux QR codes qui peut vider votre compte en quelques secondes
De faux QR codes apparaissent sur des horodateurs, des affiches ou des courriers. Derrière ce geste devenu banal, une escroquerie redoutable en …
🔥CPUID Breach Distributes STX RAT via Trojanized CPU-Z and HWMonitor Downloads
Unknown threat actors compromised CPUID ("cpuid[.]com"), a website that hosts popular hardware monitoring tools like CPU-Z, HWMonitor, HWMonitor Pro, and PerfMonitor, for less than 24 hours to serve
🔥Adobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621
Adobe has released emergency updates to fix a critical security flaw in Acrobat Reader that has come under active exploitation in the wild. The vulnerability, assigned the CVE identifier...
🔥Citizen Lab: Law Enforcement Used Webloc to Track 500 Million Devices via Ad Data
Hungarian domestic intelligence, the national police in El Salvador, and several U.S. law enforcement and police departments have been attributed to the use of an advertising-based global...
🖥️Des hackers ont activé la conduite autonome Tesla en Europe : le constructeur réagit avec des mesures radicales
Alors que la conduite autonome de Tesla est interdite dans certaines régions, des pirates ont trouvé un moyen de forcer l’activation de la FSD. Face …
📰Commerce setting up new AI export regime to push adoption of ‘American AI’ abroad
The department is looking to create a “menu of priority AI export packages that the U.S. Government will promote to allies and partners around the world.” The post Commerce setting up new AI...
🖥️IA : l'administration Trump alerte les banques face à la menace Mythos, le nouveau modèle d'Anthropic
Le Trésor américain et la Fed ont convoqué en urgence les grandes banques américaines pour évoquer la hausse du risque cyber lié au nouveau modèle …
🔥GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs
Cybersecurity researchers have flagged yet another evolution of the ongoing GlassWorm campaign, which employs a new Zig dropper that's designed to stealthily infect all integrated development...
🖥️La Russie accusée d'avoir mené une campagne mondiale de piratage de routeurs Wi-Fi.
Une vaste opération de cyberespionnage attribuée au service de renseignement militaire russe, le GRU, aurait compromis des centaines de routeurs Wi-Fi à travers le monde afin de faciliter la...
🔥Browser Extensions Are the New AI Consumption Channel That No One Is Talking About
While much of the discussion on AI security centers around protecting ‘shadow’ AI and GenAI consumption, there's a wide-open window nobody's guarding: AI browser extensions. A new report...
📰Iranian attacks on US critical infrastructure puts 3,900 devices in crosshairs
Censys researchers warned that thousands of devices are exposed to the Iranian government’s campaign targeting energy, water, and U.S. government services and facilities. The post Iranian attacks...
📰Why is the timeline to quantum-proof everything constantly shrinking?
Experts say advancements in hardware, mathematics and growing fear of Chinese scientific breakthroughs are pushing Google and others to call for speedier migration. The post Why is the timeline to...
📰Inside the FBI’s router takedown that cut off APT28’s ‘tremendous access’
FBI cyber chief Brett Leatherman told CyberScoop the Russian GRU campaign was unique in how it could propagate from routers to beyond. The post Inside the FBI’s router takedown that cut off...
🖥️Comment créer un mot de passe inviolable que vous n'oublierez jamais grâce à la méthode des passphrases ?
Les mots de passe trop sécurisés s'oublient, ceux faciles à retenir se piratent en quelques secondes. La méthode des passphrases résout ce paradoxe. …
📰Don’t just fight fraud, hunt it
As traditional fraud markers become obsolete, we must treat digital identity as critical infrastructure and adopt a layered, real-time defense to neutralize sophisticated crime rings. The post...
🖥️Quishing : cette arnaque aux QR codes qui peut vider votre compte en quelques secondes
De faux QR codes apparaissent sur des horodateurs, des affiches ou des courriers. Derrière ce geste devenu banal, une escroquerie redoutable en …
🔥CPUID Breach Distributes STX RAT via Trojanized CPU-Z and HWMonitor Downloads
Unknown threat actors compromised CPUID ("cpuid[.]com"), a website that hosts popular hardware monitoring tools like CPU-Z, HWMonitor, HWMonitor Pro, and PerfMonitor, for less than 24 hours to serve
🔥Adobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621
Adobe has released emergency updates to fix a critical security flaw in Acrobat Reader that has come under active exploitation in the wild. The vulnerability, assigned the CVE identifier...
🔥Citizen Lab: Law Enforcement Used Webloc to Track 500 Million Devices via Ad Data
Hungarian domestic intelligence, the national police in El Salvador, and several U.S. law enforcement and police departments have been attributed to the use of an advertising-based global...
🖥️Des hackers ont activé la conduite autonome Tesla en Europe : le constructeur réagit avec des mesures radicales
Alors que la conduite autonome de Tesla est interdite dans certaines régions, des pirates ont trouvé un moyen de forcer l’activation de la FSD. Face …
📰Commerce setting up new AI export regime to push adoption of ‘American AI’ abroad
The department is looking to create a “menu of priority AI export packages that the U.S. Government will promote to allies and partners around the world.” The post Commerce setting up new AI...
🖥️IA : l'administration Trump alerte les banques face à la menace Mythos, le nouveau modèle d'Anthropic
Le Trésor américain et la Fed ont convoqué en urgence les grandes banques américaines pour évoquer la hausse du risque cyber lié au nouveau modèle …
🔥GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs
Cybersecurity researchers have flagged yet another evolution of the ongoing GlassWorm campaign, which employs a new Zig dropper that's designed to stealthily infect all integrated development...
🖥️La Russie accusée d'avoir mené une campagne mondiale de piratage de routeurs Wi-Fi.
Une vaste opération de cyberespionnage attribuée au service de renseignement militaire russe, le GRU, aurait compromis des centaines de routeurs Wi-Fi à travers le monde afin de faciliter la...
🔥Browser Extensions Are the New AI Consumption Channel That No One Is Talking About
While much of the discussion on AI security centers around protecting ‘shadow’ AI and GenAI consumption, there's a wide-open window nobody's guarding: AI browser extensions. A new report...
📰Iranian attacks on US critical infrastructure puts 3,900 devices in crosshairs
Censys researchers warned that thousands of devices are exposed to the Iranian government’s campaign targeting energy, water, and U.S. government services and facilities. The post Iranian attacks...
📰Why is the timeline to quantum-proof everything constantly shrinking?
Experts say advancements in hardware, mathematics and growing fear of Chinese scientific breakthroughs are pushing Google and others to call for speedier migration. The post Why is the timeline to...
📰Inside the FBI’s router takedown that cut off APT28’s ‘tremendous access’
FBI cyber chief Brett Leatherman told CyberScoop the Russian GRU campaign was unique in how it could propagate from routers to beyond. The post Inside the FBI’s router takedown that cut off...
🖥️Comment créer un mot de passe inviolable que vous n'oublierez jamais grâce à la méthode des passphrases ?
Les mots de passe trop sécurisés s'oublient, ceux faciles à retenir se piratent en quelques secondes. La méthode des passphrases résout ce paradoxe. …
📰Don’t just fight fraud, hunt it
As traditional fraud markers become obsolete, we must treat digital identity as critical infrastructure and adopt a layered, real-time defense to neutralize sophisticated crime rings. The post...