Ville futuriste
🛡️ Dernières actualités cybersécurité
Flipboard18/04 18:00

🖥️Cybercriminalité : Elon Musk convoqué lundi devant la justice française

Le multimilliardaire américain est attendu lundi, en audition libre, dans le cadre de l’enquête menée par la justice française sur son réseau social X …

Flipboard18/04 17:10

🖥️Olivier Minne victime de hackers, il alerte ses followers et dénonce l'abandon de "X"

L'ancien animateur phare de France Télévisions et maintenant de M6, Olivier Minne, traverse une zone de turbulences sur les réseaux sociaux. Celui qui …

Flipboard18/04 16:09

🖥️Affaire Pegasus : la justice française a entendu les créateurs du logiciel espion

Selon les informations de « Mediapart », deux anciens dirigeants de la société israélienne NSO ont été placés sous le statut de témoins assistés dans …

Flipboard18/04 09:25

🖥️Quand la Russie teste l’Europe et l’OTAN: retour sur l’invention de la "République populaire de Narva", faux Etat séparatiste estonien et "véritable supercherie de propagande" russe en ligne

Le cyberespace est devenu un véritable terrain de confrontation sur le flanc est de l’Europe et de l’OTAN. Face à la Russie, l’Estonie se retrouve …

The Hacker News18/04 08:07

🔥[Webinar] Eliminate Ghost Identities Before They Expose Your Enterprise Data

In 2024, compromised service accounts and forgotten API keys were behind 68% of cloud breaches. Not phishing. Not weak passwords. Unmanaged non-human identities that nobody was watching. For every

The Hacker News18/04 07:59

🔥$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

Grinex, a Kyrgyzstan-incorporated cryptocurrency exchange sanctioned by the U.K. and the U.S. last year, said it's suspending operations after it blamed Western intelligence agencies for a $13.74...

Flipboard18/04 06:52

🖥️Danger sur votre IBAN : ce que les cybercriminels peuvent vraiment faire avec votre simple RIB

On le pensait inoffensif, mais il est devenu une arme de choix pour les cybercriminels. Loin d'être une simple coordonnée de réception, votre IBAN …

The Hacker News18/04 06:01

🔥Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

Threat actors are exploiting security flaws in TBK DVR and end‑of‑life (EoL) TP-Link Wi-Fi routers to deploy Mirai-botnet variants on compromised devices, according to findings from Fortinet...

CyberScoop17/04 17:31

📰The surveillance law Congress can’t quit — and can’t explain

Congress overhauled Section 702 in 2024 with 56 changes. Now, as the law nears expiration, supporters and critics can’t even agree on what the numbers show. The post The surveillance law Congress...

The Hacker News17/04 13:21

🔥Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

Huntress is warning that threat actors are exploiting three recently disclosed security flaws in Microsoft Defender to gain elevated privileges in compromised systems. The activity involves the...

The Hacker News17/04 10:47

🔥Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

Google this week announced a new set of Play policy updates to strengthen user privacy and protect businesses against fraud, even as it revealed it blocked or removed over 8.3 billion ads globally...

CyberScoop16/04 23:05

📰US nationals sentenced for aiding North Korea’s tech worker scheme

Kejia Wang and Zhenxing Wang established shell companies and hosted laptop farms to help operatives obtain jobs at more than 100 U.S. companies. The post US nationals sentenced for aiding North...

CyberScoop16/04 17:26

📰Officials seize 53 DDoS-for-hire domains in ongoing crackdown

Operation PowerOFF’s latest globally coordinated action identified more than 75,000 alleged cybercriminals. Officials warned each of them to stop jamming up traffic. The post Officials seize 53...

CyberScoop16/04 10:00

📰Ghost breaches: How AI-mediated narratives have become a new threat vector

Three incidents. No actual breaches. Full-scale crisis response. AI hallucinations are creating a new threat vector that most organizations have yet to prepare for. The post Ghost breaches: How...

CyberScoop15/04 20:17

📰NIST narrows scope of CVE analysis to keep up with rising tide of vulnerabilities

The National Vulnerability Database will now only analyze vulnerabilities in critical software, systems used in the federal government and those under active exploitation. The post NIST narrows scope

Flipboard18/04 18:00

🖥️Cybercriminalité : Elon Musk convoqué lundi devant la justice française

Le multimilliardaire américain est attendu lundi, en audition libre, dans le cadre de l’enquête menée par la justice française sur son réseau social X …

Flipboard18/04 17:10

🖥️Olivier Minne victime de hackers, il alerte ses followers et dénonce l'abandon de "X"

L'ancien animateur phare de France Télévisions et maintenant de M6, Olivier Minne, traverse une zone de turbulences sur les réseaux sociaux. Celui qui …

Flipboard18/04 16:09

🖥️Affaire Pegasus : la justice française a entendu les créateurs du logiciel espion

Selon les informations de « Mediapart », deux anciens dirigeants de la société israélienne NSO ont été placés sous le statut de témoins assistés dans …

Flipboard18/04 09:25

🖥️Quand la Russie teste l’Europe et l’OTAN: retour sur l’invention de la "République populaire de Narva", faux Etat séparatiste estonien et "véritable supercherie de propagande" russe en ligne

Le cyberespace est devenu un véritable terrain de confrontation sur le flanc est de l’Europe et de l’OTAN. Face à la Russie, l’Estonie se retrouve …

The Hacker News18/04 08:07

🔥[Webinar] Eliminate Ghost Identities Before They Expose Your Enterprise Data

In 2024, compromised service accounts and forgotten API keys were behind 68% of cloud breaches. Not phishing. Not weak passwords. Unmanaged non-human identities that nobody was watching. For every

The Hacker News18/04 07:59

🔥$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

Grinex, a Kyrgyzstan-incorporated cryptocurrency exchange sanctioned by the U.K. and the U.S. last year, said it's suspending operations after it blamed Western intelligence agencies for a $13.74...

Flipboard18/04 06:52

🖥️Danger sur votre IBAN : ce que les cybercriminels peuvent vraiment faire avec votre simple RIB

On le pensait inoffensif, mais il est devenu une arme de choix pour les cybercriminels. Loin d'être une simple coordonnée de réception, votre IBAN …

The Hacker News18/04 06:01

🔥Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

Threat actors are exploiting security flaws in TBK DVR and end‑of‑life (EoL) TP-Link Wi-Fi routers to deploy Mirai-botnet variants on compromised devices, according to findings from Fortinet...

CyberScoop17/04 17:31

📰The surveillance law Congress can’t quit — and can’t explain

Congress overhauled Section 702 in 2024 with 56 changes. Now, as the law nears expiration, supporters and critics can’t even agree on what the numbers show. The post The surveillance law Congress...

The Hacker News17/04 13:21

🔥Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

Huntress is warning that threat actors are exploiting three recently disclosed security flaws in Microsoft Defender to gain elevated privileges in compromised systems. The activity involves the...

The Hacker News17/04 10:47

🔥Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

Google this week announced a new set of Play policy updates to strengthen user privacy and protect businesses against fraud, even as it revealed it blocked or removed over 8.3 billion ads globally...

CyberScoop16/04 23:05

📰US nationals sentenced for aiding North Korea’s tech worker scheme

Kejia Wang and Zhenxing Wang established shell companies and hosted laptop farms to help operatives obtain jobs at more than 100 U.S. companies. The post US nationals sentenced for aiding North...

CyberScoop16/04 17:26

📰Officials seize 53 DDoS-for-hire domains in ongoing crackdown

Operation PowerOFF’s latest globally coordinated action identified more than 75,000 alleged cybercriminals. Officials warned each of them to stop jamming up traffic. The post Officials seize 53...

CyberScoop16/04 10:00

📰Ghost breaches: How AI-mediated narratives have become a new threat vector

Three incidents. No actual breaches. Full-scale crisis response. AI hallucinations are creating a new threat vector that most organizations have yet to prepare for. The post Ghost breaches: How...

CyberScoop15/04 20:17

📰NIST narrows scope of CVE analysis to keep up with rising tide of vulnerabilities

The National Vulnerability Database will now only analyze vulnerabilities in critical software, systems used in the federal government and those under active exploitation. The post NIST narrows scope