🖥️La proximité avec les É-U accroît le risque de cyberattaques
Il y a de l'intérêt pour le Canada. Une des raisons est qu’on est voisins des États-Unis, qui sont très ciblés [par des cybermenaces], explique la …
🖥️Piratage de l’ANTS : ce que l’on sait sur « Breach 3D », le hacker de 15 ans arrêté en Corse
Ce jeune mineur corse, passionné de cybersécurité, est soupçonné d’être derrière l’attaque informatique ayant visé, mi-avril, le portail de l’Agence …
🖥️Stockage en ligne : jusqu'à 5 To à -90% pour les French Days
Du stockage cloud, et bien plus encore. Pour vous permettre de disposer d’un vaste espace en ligne pour y enregistrer de nombreux fichiers, la suite …
🖥️Le SMS Blaster, un nouvel outil d'arnaque aussi simple qu'efficace, se répand en Suisse | RTS
Le SMS Blaster, un appareil mobile discret qui envoie de faux SMS en masse, se répand à travers toute la Suisse. Après les cas répertoriés dans les …
🔥CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a recently disclosed security flaw impacting various Linux distributions to its Known Exploited Vulnerabilities (KEV)...
🖥️French Days : arnaques en ligne, pourquoi utiliser un VPN ?
Les French Days attirent aussi bien les bonnes affaires que les arnaques. Faux sites, phishing, offres trop belles pour être vraies… les risques se …
🔥Trellix Confirms Source Code Breach With Unauthorized Repository Access
Cybersecurity company Trellix has announced that it suffered a breach that enabled unauthorized access to a "portion" of its source code. It said it "recently identified" the compromise of its source
🔥30,000 Facebook Accounts Hacked via Google AppSheet Phishing Campaign
A newly discovered Vietnamese-linked operation has been observed using a Google AppSheet as a "phishing relay" to distribute phishing emails with an aim to compromise Facebook accounts. The activity...
📰US government, allies publish guidance on how to safely deploy AI agents
The guidance warns that agents capable of taking real-world actions on networks are already inside critical infrastructure, and most organizations are granting them far more access than they can...
🔥Cybercrime Groups Using Vishing and SSO Abuse in Rapid SaaS Extortion Attacks
Cybersecurity researchers are warning of two cybercrime groups that are carrying out "rapid, high-impact attacks" operating almost within the confines of SaaS environments, while leaving minimal...
🔥China-Linked Hackers Target Asian Governments, NATO State, Journalists, and Activists
Cybersecurity researchers have disclosed details of a new China-aligned espionage campaign targeting government and defense sectors across South, East, and Southeast Asia, along with one European...
📰Former incident responders sentenced to 4 years in prison for committing ransomware attacks
Ryan Goldberg and Kevin Martin attacked five companies in 2023 and extorted nearly $1.3 million from one of their victims. The post Former incident responders sentenced to 4 years in prison for...
📰FCC tightens KYC rules for telecoms, closes loophole for banned foreign services
The commission wants telecoms to do more to verify their callers and prevent illegal calls and scams from reaching Americans. The post FCC tightens KYC rules for telecoms, closes loophole for banned...
📰Congress kicks the can down the road on surveillance law (again)
It’s the second extension of Section 702 of the Foreign Intelligence Surveillance Act in 10 days, and a regular ritual for the Hill. The post Congress kicks the can down the road on surveillance...
📰cPanel’s authentication bypass bug is being exploited in the wild, CISA warns
The agency added the flaw to the KEV list days after hosting providers confirmed active, ongoing attacks. The post cPanel’s authentication bypass bug is being exploited in the wild, CISA warns...
🖥️La proximité avec les É-U accroît le risque de cyberattaques
Il y a de l'intérêt pour le Canada. Une des raisons est qu’on est voisins des États-Unis, qui sont très ciblés [par des cybermenaces], explique la …
🖥️Piratage de l’ANTS : ce que l’on sait sur « Breach 3D », le hacker de 15 ans arrêté en Corse
Ce jeune mineur corse, passionné de cybersécurité, est soupçonné d’être derrière l’attaque informatique ayant visé, mi-avril, le portail de l’Agence …
🖥️Stockage en ligne : jusqu'à 5 To à -90% pour les French Days
Du stockage cloud, et bien plus encore. Pour vous permettre de disposer d’un vaste espace en ligne pour y enregistrer de nombreux fichiers, la suite …
🖥️Le SMS Blaster, un nouvel outil d'arnaque aussi simple qu'efficace, se répand en Suisse | RTS
Le SMS Blaster, un appareil mobile discret qui envoie de faux SMS en masse, se répand à travers toute la Suisse. Après les cas répertoriés dans les …
🔥CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a recently disclosed security flaw impacting various Linux distributions to its Known Exploited Vulnerabilities (KEV)...
🖥️French Days : arnaques en ligne, pourquoi utiliser un VPN ?
Les French Days attirent aussi bien les bonnes affaires que les arnaques. Faux sites, phishing, offres trop belles pour être vraies… les risques se …
🔥Trellix Confirms Source Code Breach With Unauthorized Repository Access
Cybersecurity company Trellix has announced that it suffered a breach that enabled unauthorized access to a "portion" of its source code. It said it "recently identified" the compromise of its source
🔥30,000 Facebook Accounts Hacked via Google AppSheet Phishing Campaign
A newly discovered Vietnamese-linked operation has been observed using a Google AppSheet as a "phishing relay" to distribute phishing emails with an aim to compromise Facebook accounts. The activity...
📰US government, allies publish guidance on how to safely deploy AI agents
The guidance warns that agents capable of taking real-world actions on networks are already inside critical infrastructure, and most organizations are granting them far more access than they can...
🔥Cybercrime Groups Using Vishing and SSO Abuse in Rapid SaaS Extortion Attacks
Cybersecurity researchers are warning of two cybercrime groups that are carrying out "rapid, high-impact attacks" operating almost within the confines of SaaS environments, while leaving minimal...
🔥China-Linked Hackers Target Asian Governments, NATO State, Journalists, and Activists
Cybersecurity researchers have disclosed details of a new China-aligned espionage campaign targeting government and defense sectors across South, East, and Southeast Asia, along with one European...
📰Former incident responders sentenced to 4 years in prison for committing ransomware attacks
Ryan Goldberg and Kevin Martin attacked five companies in 2023 and extorted nearly $1.3 million from one of their victims. The post Former incident responders sentenced to 4 years in prison for...
📰FCC tightens KYC rules for telecoms, closes loophole for banned foreign services
The commission wants telecoms to do more to verify their callers and prevent illegal calls and scams from reaching Americans. The post FCC tightens KYC rules for telecoms, closes loophole for banned...
📰Congress kicks the can down the road on surveillance law (again)
It’s the second extension of Section 702 of the Foreign Intelligence Surveillance Act in 10 days, and a regular ritual for the Hill. The post Congress kicks the can down the road on surveillance...
📰cPanel’s authentication bypass bug is being exploited in the wild, CISA warns
The agency added the flaw to the KEV list days after hosting providers confirmed active, ongoing attacks. The post cPanel’s authentication bypass bug is being exploited in the wild, CISA warns...