🖥️Arnaque entre hackers et petites mains ultra-violentes : les dessous de l’enlèvement sanglant d’Eaubonne
Les enquêteurs de l’OCLCO ont interpellé une équipe de malfaiteurs qui avait kidnappé et blessé le père d’un pirate informatique à Eaubonne …
🖥️Suites de la cyberattaque dans les lycées : « Il y a encore pas mal de blocages »
Quatre mois après la cyberattaque massive qui a frappé les lycées de Hauts-de-France, la situation s’est amplement améliorée, mais n’est pas …
🖥️A Moscou, les attaques contre des élites militaires interrogent leur sécurité
Numéro 2 du renseignement militaire, Vladimir Alekseïev a joué un rôle essentiel en Syrie et en Ukraine. Blessé, il est sous sanctions occidentales …
🔥China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
Cybersecurity researchers have taken the wraps off a gateway-monitoring and adversary-in-the-middle (AitM) framework dubbed DKnife that's operated by China-nexus threat actors since at least 2019....
🔥CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ordered Federal Civilian Executive Branch (FCEB) agencies to strengthen asset lifecycle management for edge network devices and...
🔥Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities
A previously undocumented cyber espionage group operating from Asia broke into the networks of at least 70 government and critical infrastructure organizations across 37 countries over the past year,
🔥How Samsung Knox Helps Stop Your Network Security Breach
As you know, enterprise network security has undergone significant evolution over the past decade. Firewalls have become more intelligent, threat detection methods have advanced, and access controls...
🖥️"Influencer les populations pour qu'elles s'allient à notre cause" : à Nancy, des étudiants s'entraînent à la cyberguerre
Comment former et recruter des experts en cybersécurité ? Dans un contexte où les attaques informatiques se multiplient, l'Université de Lorraine a …
🔥Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware
Cybersecurity researchers have discovered a new supply chain attack in which legitimate packages on npm and the Python Package Index (PyPI) repository have been compromised to push malicious versions
🖥️Cybersécurité : Bye bye Microsoft… Les données de santé françaises bientôt chez un Européen
Des données trop sensibles pour quitter le territoire européen. Le grand entrepôt français de données de santé pour la recherche, le Health Data Hub, …
📰CISA tells agencies to stop using unsupported edge devices
A binding operational directive issued Thursday looks to combat an attack pathway that has been behind some of the biggest attacks and most common exploits in recent years. The post CISA tells...
📰Alleged 764 member arrested, charged with CSAM possession in New York
Authorities have arrested multiple members of 764 during the past year, reflecting heightened law enforcement activity targeting the violent extremist collective. The post Alleged 764 member...
📰Why boards should be obsessed with their most ‘boring’ systems
Following a series of high-profile cyberattacks, boards of directors are now requiring their organizations to take greater responsibility for the risks posed by enterprise resource planning (ERP)...
📰Cantwell claims telecoms blocked release of Salt Typhoon report
Senator Maria Cantwell, D-Wash., wants hearings to force AT&T and Verizon to disclose how they’ve responded to the hacks to protect telecom networks. The post Cantwell claims telecoms blocked...
📰What’s next for DHS’s forthcoming replacement critical infrastructure protection panel, AI information sharing
Nick Andersen, a top CISA official, discussed plans for improving CIPAC and developing an AI-ISAC. The post What’s next for DHS’s forthcoming replacement critical infrastructure protection panel,
🖥️Arnaque entre hackers et petites mains ultra-violentes : les dessous de l’enlèvement sanglant d’Eaubonne
Les enquêteurs de l’OCLCO ont interpellé une équipe de malfaiteurs qui avait kidnappé et blessé le père d’un pirate informatique à Eaubonne …
🖥️Suites de la cyberattaque dans les lycées : « Il y a encore pas mal de blocages »
Quatre mois après la cyberattaque massive qui a frappé les lycées de Hauts-de-France, la situation s’est amplement améliorée, mais n’est pas …
🖥️A Moscou, les attaques contre des élites militaires interrogent leur sécurité
Numéro 2 du renseignement militaire, Vladimir Alekseïev a joué un rôle essentiel en Syrie et en Ukraine. Blessé, il est sous sanctions occidentales …
🔥China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
Cybersecurity researchers have taken the wraps off a gateway-monitoring and adversary-in-the-middle (AitM) framework dubbed DKnife that's operated by China-nexus threat actors since at least 2019....
🔥CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ordered Federal Civilian Executive Branch (FCEB) agencies to strengthen asset lifecycle management for edge network devices and...
🔥Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities
A previously undocumented cyber espionage group operating from Asia broke into the networks of at least 70 government and critical infrastructure organizations across 37 countries over the past year,
🔥How Samsung Knox Helps Stop Your Network Security Breach
As you know, enterprise network security has undergone significant evolution over the past decade. Firewalls have become more intelligent, threat detection methods have advanced, and access controls...
🖥️"Influencer les populations pour qu'elles s'allient à notre cause" : à Nancy, des étudiants s'entraînent à la cyberguerre
Comment former et recruter des experts en cybersécurité ? Dans un contexte où les attaques informatiques se multiplient, l'Université de Lorraine a …
🔥Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware
Cybersecurity researchers have discovered a new supply chain attack in which legitimate packages on npm and the Python Package Index (PyPI) repository have been compromised to push malicious versions
🖥️Cybersécurité : Bye bye Microsoft… Les données de santé françaises bientôt chez un Européen
Des données trop sensibles pour quitter le territoire européen. Le grand entrepôt français de données de santé pour la recherche, le Health Data Hub, …
📰CISA tells agencies to stop using unsupported edge devices
A binding operational directive issued Thursday looks to combat an attack pathway that has been behind some of the biggest attacks and most common exploits in recent years. The post CISA tells...
📰Alleged 764 member arrested, charged with CSAM possession in New York
Authorities have arrested multiple members of 764 during the past year, reflecting heightened law enforcement activity targeting the violent extremist collective. The post Alleged 764 member...
📰Why boards should be obsessed with their most ‘boring’ systems
Following a series of high-profile cyberattacks, boards of directors are now requiring their organizations to take greater responsibility for the risks posed by enterprise resource planning (ERP)...
📰Cantwell claims telecoms blocked release of Salt Typhoon report
Senator Maria Cantwell, D-Wash., wants hearings to force AT&T and Verizon to disclose how they’ve responded to the hacks to protect telecom networks. The post Cantwell claims telecoms blocked...
📰What’s next for DHS’s forthcoming replacement critical infrastructure protection panel, AI information sharing
Nick Andersen, a top CISA official, discussed plans for improving CIPAC and developing an AI-ISAC. The post What’s next for DHS’s forthcoming replacement critical infrastructure protection panel,