📰The surveillance law Congress can’t quit — and can’t explain
Congress overhauled Section 702 in 2024 with 56 changes. Now, as the law nears expiration, supporters and critics can’t even agree on what the numbers show. The post The surveillance law Congress...
🔥Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched
Huntress is warning that threat actors are exploiting three recently disclosed security flaws in Microsoft Defender to gain elevated privileges in compromised systems. The activity involves the...
🔥Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul
Google this week announced a new set of Play policy updates to strengthen user privacy and protect businesses against fraud, even as it revealed it blocked or removed over 8.3 billion ads globally...
🖥️La plateforme Grinex liée à la Russie suspend ses opérations après un piratage « soutenu par l'État » de 13 millions de dollars
La plateforme d’échange, anciennement connue sous le nom de Garantex et basée au Kirghizistan, a été sanctionnée par les États-Unis, le Royaume-Uni …
🔥NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions
The National Institute of Standards and Technology (NIST) has announced changes to the way it handles cybersecurity vulnerabilities and exposures (CVEs) listed in its National Vulnerability Database...
🖥️« Intraçables » sur Prime Video : c’est quoi cette série avec Sofia Essaïdi où la menace vient de la technologie
Mis en ligne sur Prime Video ce 17 avril, ce thriller franco-suisse de 6 épisodes suit une mère et son fils traqués par un hacker redoutable et …
🖥️Cyberattaques à la demande : 75 000 internautes ont reçu un avertissement des autorités
Le marché du DDoS vient de subir un nouveau revers. Plus de 75 000 hackers ont par ailleurs reçu un avertissement des forces de l’ordre. Une vingtaine …
🔥Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts
An international law enforcement operation has taken down 53 domains and arrested four people in connection with commercial distributed denial-of-service (DDoS) operations that were used by more than
🖥️« L’open source est mort » : ce projet majeur ferme subitement son code par peur de l’IA
Cal, application de planification parmi les plus importantes de l’écosystème open source, abandonne sa licence ouverte. En cause : la capacité des IA …
🖥️Un gendarme jugé pour pédopornographie, des familles normandes dénoncent le silence des autorités
L'affaire n'avait pas vocation à être médiatisée mais, depuis des mois, elle ronge d'inquiétude des familles manchoises en manque d'informations. Le …
🔥Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation
A recently disclosed high-severity security flaw in Apache ActiveMQ Classic has come under active exploitation in the wild, per the U.S. Cybersecurity and Infrastructure Security Agency (CISA). To...
📰US nationals sentenced for aiding North Korea’s tech worker scheme
Kejia Wang and Zhenxing Wang established shell companies and hosted laptop farms to help operatives obtain jobs at more than 100 U.S. companies. The post US nationals sentenced for aiding North...
📰Officials seize 53 DDoS-for-hire domains in ongoing crackdown
Operation PowerOFF’s latest globally coordinated action identified more than 75,000 alleged cybercriminals. Officials warned each of them to stop jamming up traffic. The post Officials seize 53...
📰Ghost breaches: How AI-mediated narratives have become a new threat vector
Three incidents. No actual breaches. Full-scale crisis response. AI hallucinations are creating a new threat vector that most organizations have yet to prepare for. The post Ghost breaches: How...
📰NIST narrows scope of CVE analysis to keep up with rising tide of vulnerabilities
The National Vulnerability Database will now only analyze vulnerabilities in critical software, systems used in the federal government and those under active exploitation. The post NIST narrows scope
📰The surveillance law Congress can’t quit — and can’t explain
Congress overhauled Section 702 in 2024 with 56 changes. Now, as the law nears expiration, supporters and critics can’t even agree on what the numbers show. The post The surveillance law Congress...
🔥Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched
Huntress is warning that threat actors are exploiting three recently disclosed security flaws in Microsoft Defender to gain elevated privileges in compromised systems. The activity involves the...
🔥Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul
Google this week announced a new set of Play policy updates to strengthen user privacy and protect businesses against fraud, even as it revealed it blocked or removed over 8.3 billion ads globally...
🖥️La plateforme Grinex liée à la Russie suspend ses opérations après un piratage « soutenu par l'État » de 13 millions de dollars
La plateforme d’échange, anciennement connue sous le nom de Garantex et basée au Kirghizistan, a été sanctionnée par les États-Unis, le Royaume-Uni …
🔥NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions
The National Institute of Standards and Technology (NIST) has announced changes to the way it handles cybersecurity vulnerabilities and exposures (CVEs) listed in its National Vulnerability Database...
🖥️« Intraçables » sur Prime Video : c’est quoi cette série avec Sofia Essaïdi où la menace vient de la technologie
Mis en ligne sur Prime Video ce 17 avril, ce thriller franco-suisse de 6 épisodes suit une mère et son fils traqués par un hacker redoutable et …
🖥️Cyberattaques à la demande : 75 000 internautes ont reçu un avertissement des autorités
Le marché du DDoS vient de subir un nouveau revers. Plus de 75 000 hackers ont par ailleurs reçu un avertissement des forces de l’ordre. Une vingtaine …
🔥Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts
An international law enforcement operation has taken down 53 domains and arrested four people in connection with commercial distributed denial-of-service (DDoS) operations that were used by more than
🖥️« L’open source est mort » : ce projet majeur ferme subitement son code par peur de l’IA
Cal, application de planification parmi les plus importantes de l’écosystème open source, abandonne sa licence ouverte. En cause : la capacité des IA …
🖥️Un gendarme jugé pour pédopornographie, des familles normandes dénoncent le silence des autorités
L'affaire n'avait pas vocation à être médiatisée mais, depuis des mois, elle ronge d'inquiétude des familles manchoises en manque d'informations. Le …
🔥Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation
A recently disclosed high-severity security flaw in Apache ActiveMQ Classic has come under active exploitation in the wild, per the U.S. Cybersecurity and Infrastructure Security Agency (CISA). To...
📰US nationals sentenced for aiding North Korea’s tech worker scheme
Kejia Wang and Zhenxing Wang established shell companies and hosted laptop farms to help operatives obtain jobs at more than 100 U.S. companies. The post US nationals sentenced for aiding North...
📰Officials seize 53 DDoS-for-hire domains in ongoing crackdown
Operation PowerOFF’s latest globally coordinated action identified more than 75,000 alleged cybercriminals. Officials warned each of them to stop jamming up traffic. The post Officials seize 53...
📰Ghost breaches: How AI-mediated narratives have become a new threat vector
Three incidents. No actual breaches. Full-scale crisis response. AI hallucinations are creating a new threat vector that most organizations have yet to prepare for. The post Ghost breaches: How...
📰NIST narrows scope of CVE analysis to keep up with rising tide of vulnerabilities
The National Vulnerability Database will now only analyze vulnerabilities in critical software, systems used in the federal government and those under active exploitation. The post NIST narrows scope