Ville futuriste
🛡️ Dernières actualités cybersécurité
CyberScoop04/05 10:00

📰Why data centers now belong on the critical infrastructure list

As AI drives deeper dependence across business, supply chains, and national security, the buildings that run the cloud are becoming critical infrastructure — and increasingly attractive targets....

The Hacker News04/05 09:27

🔥Critical cPanel Vulnerability Weaponized to Target Government and MSP Networks

A previously unknown threat actor has been observed targeting government and military entities in Southeast Asia, alongside a smaller cluster of managed service providers (MSPs) and hosting providers

Flipboard04/05 09:12

🖥️GPT-5.5-Cyber, le nouveau modèle d’OpenAI qui rivalise avec Mythos

Capable de détecter des vulnérabilités, d’analyser des malwares ou d’effectuer des pentests, GPT-5.5-Cyber s’annonce comme le pendant d’OpenAI à …

Flipboard04/05 08:22

🖥️Assurance multirisque, pour les menaces accrues

En 2026, l’environnement économique ne peut laisser la place à l’improvisation tant les risques sont multiples et en croissance. Coincées dans un …

Flipboard04/05 06:37

🖥️Guerre en Ukraine : Kiev développe une technologie capable de détecter des drones et des missiles grâce au son

Le système acoustique FENEK, développé puis adopté par l’armée ukrainienne, est capable de repérer des missiles de croisière et des drones kamikazes …

The Hacker News04/05 05:59

🔥Global Crackdown Arrests 276, Shuts 9 Crypto Scam Centers, Seizes $701M

A coordinated international operation involving U.S. and Chinese authorities has arrested at least 276 suspects and shut down nine scam centers used for cryptocurrency investment fraud schemes...

Flipboard04/05 05:48

🖥️Comment une loi américaine rend vulnérables vos mots de passe (même protégés par un gestionnaire de mots de passe)

Vous utilisez un gestionnaire de mots de passe et vous vous pensez enfin à l’abri ? Rien n’est moins sûr. Désormais, la question n’est plus seulement …

Flipboard04/05 04:41

🖥️Vous répondez, personne ne parle… mais votre voix est enregistrée : attention à l’arnaque des appels silencieux

Un numéro inconnu s’affiche, au bout du fil… personne. Cet appel silencieux n’est pas une erreur, mais une arnaque en deux temps. Un simple « Allô » …

The Hacker News03/05 06:26

🔥CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a recently disclosed security flaw impacting various Linux distributions to its Known Exploited Vulnerabilities (KEV)...

The Hacker News02/05 06:41

🔥Trellix Confirms Source Code Breach With Unauthorized Repository Access

Cybersecurity company Trellix has announced that it suffered a breach that enabled unauthorized access to a "portion" of its source code. It said it "recently identified" the compromise of its source

The Hacker News01/05 18:09

🔥30,000 Facebook Accounts Hacked via Google AppSheet Phishing Campaign

A newly discovered Vietnamese-linked operation has been observed using a Google AppSheet as a "phishing relay" to distribute phishing emails with an aim to compromise Facebook accounts. The activity...

CyberScoop01/05 16:49

📰US government, allies publish guidance on how to safely deploy AI agents

The guidance warns that agents capable of taking real-world actions on networks are already inside critical infrastructure, and most organizations are granting them far more access than they can...

CyberScoop30/04 23:29

📰Former incident responders sentenced to 4 years in prison for committing ransomware attacks

Ryan Goldberg and Kevin Martin attacked five companies in 2023 and extorted nearly $1.3 million from one of their victims. The post Former incident responders sentenced to 4 years in prison for...

CyberScoop30/04 21:46

📰FCC tightens KYC rules for telecoms, closes loophole for banned foreign services

The commission wants telecoms to do more to verify their callers and prevent illegal calls and scams from reaching Americans. The post FCC tightens KYC rules for telecoms, closes loophole for banned...

CyberScoop30/04 20:53

📰Congress kicks the can down the road on surveillance law (again)

It’s the second extension of Section 702 of the Foreign Intelligence Surveillance Act in 10 days, and a regular ritual for the Hill. The post Congress kicks the can down the road on surveillance...

CyberScoop04/05 10:00

📰Why data centers now belong on the critical infrastructure list

As AI drives deeper dependence across business, supply chains, and national security, the buildings that run the cloud are becoming critical infrastructure — and increasingly attractive targets....

The Hacker News04/05 09:27

🔥Critical cPanel Vulnerability Weaponized to Target Government and MSP Networks

A previously unknown threat actor has been observed targeting government and military entities in Southeast Asia, alongside a smaller cluster of managed service providers (MSPs) and hosting providers

Flipboard04/05 09:12

🖥️GPT-5.5-Cyber, le nouveau modèle d’OpenAI qui rivalise avec Mythos

Capable de détecter des vulnérabilités, d’analyser des malwares ou d’effectuer des pentests, GPT-5.5-Cyber s’annonce comme le pendant d’OpenAI à …

Flipboard04/05 08:22

🖥️Assurance multirisque, pour les menaces accrues

En 2026, l’environnement économique ne peut laisser la place à l’improvisation tant les risques sont multiples et en croissance. Coincées dans un …

Flipboard04/05 06:37

🖥️Guerre en Ukraine : Kiev développe une technologie capable de détecter des drones et des missiles grâce au son

Le système acoustique FENEK, développé puis adopté par l’armée ukrainienne, est capable de repérer des missiles de croisière et des drones kamikazes …

The Hacker News04/05 05:59

🔥Global Crackdown Arrests 276, Shuts 9 Crypto Scam Centers, Seizes $701M

A coordinated international operation involving U.S. and Chinese authorities has arrested at least 276 suspects and shut down nine scam centers used for cryptocurrency investment fraud schemes...

Flipboard04/05 05:48

🖥️Comment une loi américaine rend vulnérables vos mots de passe (même protégés par un gestionnaire de mots de passe)

Vous utilisez un gestionnaire de mots de passe et vous vous pensez enfin à l’abri ? Rien n’est moins sûr. Désormais, la question n’est plus seulement …

Flipboard04/05 04:41

🖥️Vous répondez, personne ne parle… mais votre voix est enregistrée : attention à l’arnaque des appels silencieux

Un numéro inconnu s’affiche, au bout du fil… personne. Cet appel silencieux n’est pas une erreur, mais une arnaque en deux temps. Un simple « Allô » …

The Hacker News03/05 06:26

🔥CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a recently disclosed security flaw impacting various Linux distributions to its Known Exploited Vulnerabilities (KEV)...

The Hacker News02/05 06:41

🔥Trellix Confirms Source Code Breach With Unauthorized Repository Access

Cybersecurity company Trellix has announced that it suffered a breach that enabled unauthorized access to a "portion" of its source code. It said it "recently identified" the compromise of its source

The Hacker News01/05 18:09

🔥30,000 Facebook Accounts Hacked via Google AppSheet Phishing Campaign

A newly discovered Vietnamese-linked operation has been observed using a Google AppSheet as a "phishing relay" to distribute phishing emails with an aim to compromise Facebook accounts. The activity...

CyberScoop01/05 16:49

📰US government, allies publish guidance on how to safely deploy AI agents

The guidance warns that agents capable of taking real-world actions on networks are already inside critical infrastructure, and most organizations are granting them far more access than they can...

CyberScoop30/04 23:29

📰Former incident responders sentenced to 4 years in prison for committing ransomware attacks

Ryan Goldberg and Kevin Martin attacked five companies in 2023 and extorted nearly $1.3 million from one of their victims. The post Former incident responders sentenced to 4 years in prison for...

CyberScoop30/04 21:46

📰FCC tightens KYC rules for telecoms, closes loophole for banned foreign services

The commission wants telecoms to do more to verify their callers and prevent illegal calls and scams from reaching Americans. The post FCC tightens KYC rules for telecoms, closes loophole for banned...

CyberScoop30/04 20:53

📰Congress kicks the can down the road on surveillance law (again)

It’s the second extension of Section 702 of the Foreign Intelligence Surveillance Act in 10 days, and a regular ritual for the Hill. The post Congress kicks the can down the road on surveillance...