Ville futuriste
🛡️ Dernières actualités cybersécurité
Flipboard19/04 19:54

🖥️"On a vraiment des lacunes" en matière de défense sol-air, selon le chef de l'armée | RTS

L’armée suisse affronte depuis plusieurs mois un déluge de déconvenues, dans un contexte de guerre hybride et de situation géopolitique instable. Le …

Flipboard19/04 18:01

🖥️Un simple clic peut vous ruiner : des PDF piégés circulent, voici comment vous protéger

Adobe a publié des mises à jour pour réparer une faille de sécurité très dangereuse. Elle est utilisée par des hackers pour distribuer des fichiers …

Flipboard19/04 18:00

🖥️Microsoft Defender fragilisé par trois failles zero-day critiques

Plus d’un milliard d’utilisateurs de Windows se retrouvent exposés après la divulgation de failles critiques dans Microsoft Defender par un chercheur …

Flipboard19/04 17:00

🖥️Délinquance : Quimper face à la montée des cambriolages et de la cybercriminalité

Le bilan de la délinquance à Quimper, en 2025, montre que la violence hors cadre familial stagne, mais les cambriolages explosent. Le narcotrafic, …

Flipboard19/04 15:00

🖥️Elon Musk convoqué lundi par la justice française après quinze mois d’une enquête tendue

Le parquet de Paris enquête depuis janvier 2025 sur de nombreux abus prêtés au réseau social X et à son dirigeant. Le milliardaire a été convoqué, …

The Hacker News18/04 08:07

🔥[Webinar] Eliminate Ghost Identities Before They Expose Your Enterprise Data

In 2024, compromised service accounts and forgotten API keys were behind 68% of cloud breaches. Not phishing. Not weak passwords. Unmanaged non-human identities that nobody was watching. For every

The Hacker News18/04 07:59

🔥$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

Grinex, a Kyrgyzstan-incorporated cryptocurrency exchange sanctioned by the U.K. and the U.S. last year, said it's suspending operations after it blamed Western intelligence agencies for a $13.74...

The Hacker News18/04 06:01

🔥Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

Threat actors are exploiting security flaws in TBK DVR and end‑of‑life (EoL) TP-Link Wi-Fi routers to deploy Mirai-botnet variants on compromised devices, according to findings from Fortinet...

CyberScoop17/04 17:31

📰The surveillance law Congress can’t quit — and can’t explain

Congress overhauled Section 702 in 2024 with 56 changes. Now, as the law nears expiration, supporters and critics can’t even agree on what the numbers show. The post The surveillance law Congress...

The Hacker News17/04 13:21

🔥Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

Huntress is warning that threat actors are exploiting three recently disclosed security flaws in Microsoft Defender to gain elevated privileges in compromised systems. The activity involves the...

The Hacker News17/04 10:47

🔥Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

Google this week announced a new set of Play policy updates to strengthen user privacy and protect businesses against fraud, even as it revealed it blocked or removed over 8.3 billion ads globally...

CyberScoop16/04 23:05

📰US nationals sentenced for aiding North Korea’s tech worker scheme

Kejia Wang and Zhenxing Wang established shell companies and hosted laptop farms to help operatives obtain jobs at more than 100 U.S. companies. The post US nationals sentenced for aiding North...

CyberScoop16/04 17:26

📰Officials seize 53 DDoS-for-hire domains in ongoing crackdown

Operation PowerOFF’s latest globally coordinated action identified more than 75,000 alleged cybercriminals. Officials warned each of them to stop jamming up traffic. The post Officials seize 53...

CyberScoop16/04 10:00

📰Ghost breaches: How AI-mediated narratives have become a new threat vector

Three incidents. No actual breaches. Full-scale crisis response. AI hallucinations are creating a new threat vector that most organizations have yet to prepare for. The post Ghost breaches: How...

CyberScoop15/04 20:17

📰NIST narrows scope of CVE analysis to keep up with rising tide of vulnerabilities

The National Vulnerability Database will now only analyze vulnerabilities in critical software, systems used in the federal government and those under active exploitation. The post NIST narrows scope

Flipboard19/04 19:54

🖥️"On a vraiment des lacunes" en matière de défense sol-air, selon le chef de l'armée | RTS

L’armée suisse affronte depuis plusieurs mois un déluge de déconvenues, dans un contexte de guerre hybride et de situation géopolitique instable. Le …

Flipboard19/04 18:01

🖥️Un simple clic peut vous ruiner : des PDF piégés circulent, voici comment vous protéger

Adobe a publié des mises à jour pour réparer une faille de sécurité très dangereuse. Elle est utilisée par des hackers pour distribuer des fichiers …

Flipboard19/04 18:00

🖥️Microsoft Defender fragilisé par trois failles zero-day critiques

Plus d’un milliard d’utilisateurs de Windows se retrouvent exposés après la divulgation de failles critiques dans Microsoft Defender par un chercheur …

Flipboard19/04 17:00

🖥️Délinquance : Quimper face à la montée des cambriolages et de la cybercriminalité

Le bilan de la délinquance à Quimper, en 2025, montre que la violence hors cadre familial stagne, mais les cambriolages explosent. Le narcotrafic, …

Flipboard19/04 15:00

🖥️Elon Musk convoqué lundi par la justice française après quinze mois d’une enquête tendue

Le parquet de Paris enquête depuis janvier 2025 sur de nombreux abus prêtés au réseau social X et à son dirigeant. Le milliardaire a été convoqué, …

The Hacker News18/04 08:07

🔥[Webinar] Eliminate Ghost Identities Before They Expose Your Enterprise Data

In 2024, compromised service accounts and forgotten API keys were behind 68% of cloud breaches. Not phishing. Not weak passwords. Unmanaged non-human identities that nobody was watching. For every

The Hacker News18/04 07:59

🔥$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

Grinex, a Kyrgyzstan-incorporated cryptocurrency exchange sanctioned by the U.K. and the U.S. last year, said it's suspending operations after it blamed Western intelligence agencies for a $13.74...

The Hacker News18/04 06:01

🔥Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

Threat actors are exploiting security flaws in TBK DVR and end‑of‑life (EoL) TP-Link Wi-Fi routers to deploy Mirai-botnet variants on compromised devices, according to findings from Fortinet...

CyberScoop17/04 17:31

📰The surveillance law Congress can’t quit — and can’t explain

Congress overhauled Section 702 in 2024 with 56 changes. Now, as the law nears expiration, supporters and critics can’t even agree on what the numbers show. The post The surveillance law Congress...

The Hacker News17/04 13:21

🔥Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

Huntress is warning that threat actors are exploiting three recently disclosed security flaws in Microsoft Defender to gain elevated privileges in compromised systems. The activity involves the...

The Hacker News17/04 10:47

🔥Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

Google this week announced a new set of Play policy updates to strengthen user privacy and protect businesses against fraud, even as it revealed it blocked or removed over 8.3 billion ads globally...

CyberScoop16/04 23:05

📰US nationals sentenced for aiding North Korea’s tech worker scheme

Kejia Wang and Zhenxing Wang established shell companies and hosted laptop farms to help operatives obtain jobs at more than 100 U.S. companies. The post US nationals sentenced for aiding North...

CyberScoop16/04 17:26

📰Officials seize 53 DDoS-for-hire domains in ongoing crackdown

Operation PowerOFF’s latest globally coordinated action identified more than 75,000 alleged cybercriminals. Officials warned each of them to stop jamming up traffic. The post Officials seize 53...

CyberScoop16/04 10:00

📰Ghost breaches: How AI-mediated narratives have become a new threat vector

Three incidents. No actual breaches. Full-scale crisis response. AI hallucinations are creating a new threat vector that most organizations have yet to prepare for. The post Ghost breaches: How...

CyberScoop15/04 20:17

📰NIST narrows scope of CVE analysis to keep up with rising tide of vulnerabilities

The National Vulnerability Database will now only analyze vulnerabilities in critical software, systems used in the federal government and those under active exploitation. The post NIST narrows scope