Ville futuriste
🛡️ Dernières actualités cybersécurité
Flipboard13/02 18:53

🖥️Voici pourquoi il ne faut jamais recharger votre téléphone dans un aéroport

Recharger son téléphone ou se connecter au Wi-Fi avant d’embarquer semble anodin, mais ces gestes peuvent ouvrir la porte à des cyberattaques …

The Hacker News13/02 17:27

🔥Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs

A previously undocumented threat actor has been attributed to attacks targeting Ukrainian organizations with malware known as CANFAIL. Google Threat Intelligence Group (GTIG) described the hack group

The Hacker News13/02 16:23

🔥Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations

Several state-sponsored actors, hacktivist entities, and criminal groups from China, Iran, North Korea, and Russia have trained their sights on the defense industrial base (DIB) sector, according to...

The Hacker News13/02 15:23

🔥UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors

A previously unknown threat actor tracked as UAT-9921 has been observed leveraging a new modular framework called VoidLink in its campaigns targeting the technology and financial services sectors,...

Flipboard13/02 11:30

🖥️Ciblées par les criminels, comment les PME s’arment-elles face aux cyberrisques ?

Les attaques deviennent plus rapides et plus précises, grâce à l’intelligence artificielle. Mais les chefs d’entreprise sont aussi plus …

The Hacker News13/02 11:25

🔥Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History

Cybersecurity researchers have discovered a malicious Google Chrome extension that's designed to steal data associated with Meta Business Suite and Facebook Business Manager. The extension, named CL...

The Hacker News13/02 10:45

🔥npm’s Update to Harden Their Supply Chain, and Points to Consider

In December 2025, in response to the Sha1-Hulud incident, npm completed a major authentication overhaul intended to reduce supply-chain attacks. While the overhaul is a solid step forward, the...

CyberScoop13/02 00:04

📰Proofpoint acquires Acuvity to tackle the security risks of agentic AI

Proofpoint is snapping up the startup to solve the industry’s newest headache: knowing what your autonomous AI is actually doing. The post Proofpoint acquires Acuvity to tackle the security risks...

CyberScoop12/02 23:48

📰Apple discloses first actively exploited zero-day of 2026

The vendor said the memory-corruption defect was exploited to target specific people, but it did not describe the objectives of the attack. The post Apple discloses first actively exploited zero-day...

CyberScoop12/02 21:24

📰Google finds state-sponsored hackers use AI at ‘all stages’ of attack cycle 

The research underscores how AI tools have matured in their cyber offensive capabilities, even as it doesn’t reveal novel or paradigm shifting uses of the technology. The post Google finds...

CyberScoop12/02 17:09

📰CISA to host industry feedback sessions on cyber incident reporting regulation

One industry official told CyberScoop the town halls are probably not what CIRCIA needs right now. The post CISA to host industry feedback sessions on cyber incident reporting regulation appeared...

Flipboard12/02 14:47

🖥️Puissant, mais à double-tranchant : Gemini est la nouvelle coqueluche des hackers

Google vient de dévoiler l'autre face de son IA vedette : Gemini est massivement détourné par des groupes de pirates sponsorisés par la Chine, …

Flipboard12/02 08:16

🖥️Alerte sur l'iPhone : Apple met en garde contre une cyberattaque « extrêmement sophistiquée »

Une faille de sécurité zero day a été découverte sur l’iPhone. Débusquée par Google, la vulnérabilité est exploitée dans le cadre d’une cyberattaque …

CyberScoop11/02 22:29

📰0APT ransomware group rises swiftly with bluster, along with genuine threat of attack

Most signs suggest the group is running a massive hoax by claiming hundreds of initial victims, but at least some of the threat 0APT poses is grounded in truth backed by proven capabilities. The post

Krebs on Security11/02 16:08

🕵️Kimwolf Botnet Swamps Anonymity Network I2P

For the past week, the massive "Internet of Things" (IoT) botnet known as Kimwolf has been disrupting the The Invisible Internet Project (I2P), a decentralized, encrypted communications network...

Flipboard13/02 18:53

🖥️Voici pourquoi il ne faut jamais recharger votre téléphone dans un aéroport

Recharger son téléphone ou se connecter au Wi-Fi avant d’embarquer semble anodin, mais ces gestes peuvent ouvrir la porte à des cyberattaques …

The Hacker News13/02 17:27

🔥Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs

A previously undocumented threat actor has been attributed to attacks targeting Ukrainian organizations with malware known as CANFAIL. Google Threat Intelligence Group (GTIG) described the hack group

The Hacker News13/02 16:23

🔥Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations

Several state-sponsored actors, hacktivist entities, and criminal groups from China, Iran, North Korea, and Russia have trained their sights on the defense industrial base (DIB) sector, according to...

The Hacker News13/02 15:23

🔥UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors

A previously unknown threat actor tracked as UAT-9921 has been observed leveraging a new modular framework called VoidLink in its campaigns targeting the technology and financial services sectors,...

Flipboard13/02 11:30

🖥️Ciblées par les criminels, comment les PME s’arment-elles face aux cyberrisques ?

Les attaques deviennent plus rapides et plus précises, grâce à l’intelligence artificielle. Mais les chefs d’entreprise sont aussi plus …

The Hacker News13/02 11:25

🔥Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History

Cybersecurity researchers have discovered a malicious Google Chrome extension that's designed to steal data associated with Meta Business Suite and Facebook Business Manager. The extension, named CL...

The Hacker News13/02 10:45

🔥npm’s Update to Harden Their Supply Chain, and Points to Consider

In December 2025, in response to the Sha1-Hulud incident, npm completed a major authentication overhaul intended to reduce supply-chain attacks. While the overhaul is a solid step forward, the...

CyberScoop13/02 00:04

📰Proofpoint acquires Acuvity to tackle the security risks of agentic AI

Proofpoint is snapping up the startup to solve the industry’s newest headache: knowing what your autonomous AI is actually doing. The post Proofpoint acquires Acuvity to tackle the security risks...

CyberScoop12/02 23:48

📰Apple discloses first actively exploited zero-day of 2026

The vendor said the memory-corruption defect was exploited to target specific people, but it did not describe the objectives of the attack. The post Apple discloses first actively exploited zero-day...

CyberScoop12/02 21:24

📰Google finds state-sponsored hackers use AI at ‘all stages’ of attack cycle 

The research underscores how AI tools have matured in their cyber offensive capabilities, even as it doesn’t reveal novel or paradigm shifting uses of the technology. The post Google finds...

CyberScoop12/02 17:09

📰CISA to host industry feedback sessions on cyber incident reporting regulation

One industry official told CyberScoop the town halls are probably not what CIRCIA needs right now. The post CISA to host industry feedback sessions on cyber incident reporting regulation appeared...

Flipboard12/02 14:47

🖥️Puissant, mais à double-tranchant : Gemini est la nouvelle coqueluche des hackers

Google vient de dévoiler l'autre face de son IA vedette : Gemini est massivement détourné par des groupes de pirates sponsorisés par la Chine, …

Flipboard12/02 08:16

🖥️Alerte sur l'iPhone : Apple met en garde contre une cyberattaque « extrêmement sophistiquée »

Une faille de sécurité zero day a été découverte sur l’iPhone. Débusquée par Google, la vulnérabilité est exploitée dans le cadre d’une cyberattaque …

CyberScoop11/02 22:29

📰0APT ransomware group rises swiftly with bluster, along with genuine threat of attack

Most signs suggest the group is running a massive hoax by claiming hundreds of initial victims, but at least some of the threat 0APT poses is grounded in truth backed by proven capabilities. The post

Krebs on Security11/02 16:08

🕵️Kimwolf Botnet Swamps Anonymity Network I2P

For the past week, the massive "Internet of Things" (IoT) botnet known as Kimwolf has been disrupting the The Invisible Internet Project (I2P), a decentralized, encrypted communications network...