📰Network ‘background noise’ may predict the next big edge-device vulnerability
GreyNoise researchers spotted a consistent trend in forthcoming vulnerabilities affecting security tools, providing defenders an early-warning system for likely imminent attacks. The post Network...
🖥️Fuite massive en France : des millions de données d'état civil volées à l'Agence Nationale des Titres Sécurisés
L’Agence nationale des titres sécurisés (ANTS) a subi une attaque informatique. Les données d’état civil de nombreux Français ont été compromises. …
🖥️Cyberattaques Windows : une faille transforme l'antivirus Defender en arme pour les pirates
Une série d’outils capables d’exploiter une faille zero-day dans Windows Defender ont été divulgués par un chercheur en conflit avec Microsoft. Ils …
🖥️Le vol d'identifiants explose, plus d'un million de comptes bancaires déjà compromis
En 2025, plus d'un million de comptes bancaires ont atterri sur le dark web. Les chercheurs de Kaspersky ont passé l’année à surveiller les marchés …
🔥Researchers Detect ZionSiphon Malware Targeting Israeli Water, Desalination OT Systems
Cybersecurity researchers have flagged a new malware called ZionSiphon that appears to be specifically designed to target Israeli water treatment and desalination systems. The malware has been...
🖥️Elon Musk convoqué par la justice française : vers une confrontation judiciaire et diplomatique
Attendu ce lundi 20 avril 2026 pour une audition libre, Elon Musk devrait briller par son absence. Derrière ce bras de fer entre le Parquet de Paris …
🖥️ENQUETE. Russie, narcotrafic, darknet... Plongée dans les coulisses du très discret service espion des douanes françaises
Moins connue que d'autres services de renseignement, la DNRED joue un rôle clé dans la lutte contre les trafics ou encore le contournement des …
🔥Vercel Breach Tied to Context AI Hack Exposes Limited Customer Credentials
Web infrastructure provider Vercel has disclosed a security breach that allows bad actors to gain unauthorized access to "certain" internal Vercel systems. The incident stemmed from the compromise of
🔥[Webinar] Eliminate Ghost Identities Before They Expose Your Enterprise Data
In 2024, compromised service accounts and forgotten API keys were behind 68% of cloud breaches. Not phishing. Not weak passwords. Unmanaged non-human identities that nobody was watching. For every
🔥$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims
Grinex, a Kyrgyzstan-incorporated cryptocurrency exchange sanctioned by the U.K. and the U.S. last year, said it's suspending operations after it blamed Western intelligence agencies for a $13.74...
🔥Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet
Threat actors are exploiting security flaws in TBK DVR and end‑of‑life (EoL) TP-Link Wi-Fi routers to deploy Mirai-botnet variants on compromised devices, according to findings from Fortinet...
📰The surveillance law Congress can’t quit — and can’t explain
Congress overhauled Section 702 in 2024 with 56 changes. Now, as the law nears expiration, supporters and critics can’t even agree on what the numbers show. The post The surveillance law Congress...
📰US nationals sentenced for aiding North Korea’s tech worker scheme
Kejia Wang and Zhenxing Wang established shell companies and hosted laptop farms to help operatives obtain jobs at more than 100 U.S. companies. The post US nationals sentenced for aiding North...
📰Officials seize 53 DDoS-for-hire domains in ongoing crackdown
Operation PowerOFF’s latest globally coordinated action identified more than 75,000 alleged cybercriminals. Officials warned each of them to stop jamming up traffic. The post Officials seize 53...
📰Ghost breaches: How AI-mediated narratives have become a new threat vector
Three incidents. No actual breaches. Full-scale crisis response. AI hallucinations are creating a new threat vector that most organizations have yet to prepare for. The post Ghost breaches: How...
📰Network ‘background noise’ may predict the next big edge-device vulnerability
GreyNoise researchers spotted a consistent trend in forthcoming vulnerabilities affecting security tools, providing defenders an early-warning system for likely imminent attacks. The post Network...
🖥️Fuite massive en France : des millions de données d'état civil volées à l'Agence Nationale des Titres Sécurisés
L’Agence nationale des titres sécurisés (ANTS) a subi une attaque informatique. Les données d’état civil de nombreux Français ont été compromises. …
🖥️Cyberattaques Windows : une faille transforme l'antivirus Defender en arme pour les pirates
Une série d’outils capables d’exploiter une faille zero-day dans Windows Defender ont été divulgués par un chercheur en conflit avec Microsoft. Ils …
🖥️Le vol d'identifiants explose, plus d'un million de comptes bancaires déjà compromis
En 2025, plus d'un million de comptes bancaires ont atterri sur le dark web. Les chercheurs de Kaspersky ont passé l’année à surveiller les marchés …
🔥Researchers Detect ZionSiphon Malware Targeting Israeli Water, Desalination OT Systems
Cybersecurity researchers have flagged a new malware called ZionSiphon that appears to be specifically designed to target Israeli water treatment and desalination systems. The malware has been...
🖥️Elon Musk convoqué par la justice française : vers une confrontation judiciaire et diplomatique
Attendu ce lundi 20 avril 2026 pour une audition libre, Elon Musk devrait briller par son absence. Derrière ce bras de fer entre le Parquet de Paris …
🖥️ENQUETE. Russie, narcotrafic, darknet... Plongée dans les coulisses du très discret service espion des douanes françaises
Moins connue que d'autres services de renseignement, la DNRED joue un rôle clé dans la lutte contre les trafics ou encore le contournement des …
🔥Vercel Breach Tied to Context AI Hack Exposes Limited Customer Credentials
Web infrastructure provider Vercel has disclosed a security breach that allows bad actors to gain unauthorized access to "certain" internal Vercel systems. The incident stemmed from the compromise of
🔥[Webinar] Eliminate Ghost Identities Before They Expose Your Enterprise Data
In 2024, compromised service accounts and forgotten API keys were behind 68% of cloud breaches. Not phishing. Not weak passwords. Unmanaged non-human identities that nobody was watching. For every
🔥$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims
Grinex, a Kyrgyzstan-incorporated cryptocurrency exchange sanctioned by the U.K. and the U.S. last year, said it's suspending operations after it blamed Western intelligence agencies for a $13.74...
🔥Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet
Threat actors are exploiting security flaws in TBK DVR and end‑of‑life (EoL) TP-Link Wi-Fi routers to deploy Mirai-botnet variants on compromised devices, according to findings from Fortinet...
📰The surveillance law Congress can’t quit — and can’t explain
Congress overhauled Section 702 in 2024 with 56 changes. Now, as the law nears expiration, supporters and critics can’t even agree on what the numbers show. The post The surveillance law Congress...
📰US nationals sentenced for aiding North Korea’s tech worker scheme
Kejia Wang and Zhenxing Wang established shell companies and hosted laptop farms to help operatives obtain jobs at more than 100 U.S. companies. The post US nationals sentenced for aiding North...
📰Officials seize 53 DDoS-for-hire domains in ongoing crackdown
Operation PowerOFF’s latest globally coordinated action identified more than 75,000 alleged cybercriminals. Officials warned each of them to stop jamming up traffic. The post Officials seize 53...
📰Ghost breaches: How AI-mediated narratives have become a new threat vector
Three incidents. No actual breaches. Full-scale crisis response. AI hallucinations are creating a new threat vector that most organizations have yet to prepare for. The post Ghost breaches: How...