🔥Citizen Lab: Law Enforcement Used Webloc to Track 500 Million Devices via Ad Data
Hungarian domestic intelligence, the national police in El Salvador, and several U.S. law enforcement and police departments have been attributed to the use of an advertising-based global...
🖥️Des hackers ont activé la conduite autonome Tesla en Europe : le constructeur réagit avec des mesures radicales
Alors que la conduite autonome de Tesla est interdite dans certaines régions, des pirates ont trouvé un moyen de forcer l’activation de la FSD. Face …
📰Commerce setting up new AI export regime to push adoption of ‘American AI’ abroad
The department is looking to create a “menu of priority AI export packages that the U.S. Government will promote to allies and partners around the world.” The post Commerce setting up new AI...
🖥️IA : l'administration Trump alerte les banques face à la menace Mythos, le nouveau modèle d'Anthropic
Le Trésor américain et la Fed ont convoqué en urgence les grandes banques américaines pour évoquer la hausse du risque cyber lié au nouveau modèle …
🔥GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs
Cybersecurity researchers have flagged yet another evolution of the ongoing GlassWorm campaign, which employs a new Zig dropper that's designed to stealthily infect all integrated development...
🖥️La Russie accusée d'avoir mené une campagne mondiale de piratage de routeurs Wi-Fi.
Une vaste opération de cyberespionnage attribuée au service de renseignement militaire russe, le GRU, aurait compromis des centaines de routeurs Wi-Fi à travers le monde afin de faciliter la...
🔥Browser Extensions Are the New AI Consumption Channel That No One Is Talking About
While much of the discussion on AI security centers around protecting ‘shadow’ AI and GenAI consumption, there's a wide-open window nobody's guarding: AI browser extensions. A new report...
🔥Google Rolls Out DBSC in Chrome 146 to Block Session Theft on Windows
Google has made Device Bound Session Credentials (DBSC) generally available to all Windows users of its Chrome web browser, months after it began testing the security feature in open beta. The...
🔥Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure
A critical security vulnerability in Marimo, an open-source Python notebook for data science and analysis, has been exploited within 10 hours of public disclosure, according to findings...
🖥️BlueHammer : Quand Windows Defender devient le complice des attaquants - ZDNET
Une vulnérabilité zero-day baptisée "BlueHammer" permet à un utilisateur sans privilèges de prendre le contrôle total d'un système Windows en …
📰Iranian attacks on US critical infrastructure puts 3,900 devices in crosshairs
Censys researchers warned that thousands of devices are exposed to the Iranian government’s campaign targeting energy, water, and U.S. government services and facilities. The post Iranian attacks...
📰Why is the timeline to quantum-proof everything constantly shrinking?
Experts say advancements in hardware, mathematics and growing fear of Chinese scientific breakthroughs are pushing Google and others to call for speedier migration. The post Why is the timeline to...
📰Inside the FBI’s router takedown that cut off APT28’s ‘tremendous access’
FBI cyber chief Brett Leatherman told CyberScoop the Russian GRU campaign was unique in how it could propagate from routers to beyond. The post Inside the FBI’s router takedown that cut off...
🖥️Comment créer un mot de passe inviolable que vous n'oublierez jamais grâce à la méthode des passphrases ?
Les mots de passe trop sécurisés s'oublient, ceux faciles à retenir se piratent en quelques secondes. La méthode des passphrases résout ce paradoxe. …
📰Don’t just fight fraud, hunt it
As traditional fraud markers become obsolete, we must treat digital identity as critical infrastructure and adopt a layered, real-time defense to neutralize sophisticated crime rings. The post...
🔥Citizen Lab: Law Enforcement Used Webloc to Track 500 Million Devices via Ad Data
Hungarian domestic intelligence, the national police in El Salvador, and several U.S. law enforcement and police departments have been attributed to the use of an advertising-based global...
🖥️Des hackers ont activé la conduite autonome Tesla en Europe : le constructeur réagit avec des mesures radicales
Alors que la conduite autonome de Tesla est interdite dans certaines régions, des pirates ont trouvé un moyen de forcer l’activation de la FSD. Face …
📰Commerce setting up new AI export regime to push adoption of ‘American AI’ abroad
The department is looking to create a “menu of priority AI export packages that the U.S. Government will promote to allies and partners around the world.” The post Commerce setting up new AI...
🖥️IA : l'administration Trump alerte les banques face à la menace Mythos, le nouveau modèle d'Anthropic
Le Trésor américain et la Fed ont convoqué en urgence les grandes banques américaines pour évoquer la hausse du risque cyber lié au nouveau modèle …
🔥GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs
Cybersecurity researchers have flagged yet another evolution of the ongoing GlassWorm campaign, which employs a new Zig dropper that's designed to stealthily infect all integrated development...
🖥️La Russie accusée d'avoir mené une campagne mondiale de piratage de routeurs Wi-Fi.
Une vaste opération de cyberespionnage attribuée au service de renseignement militaire russe, le GRU, aurait compromis des centaines de routeurs Wi-Fi à travers le monde afin de faciliter la...
🔥Browser Extensions Are the New AI Consumption Channel That No One Is Talking About
While much of the discussion on AI security centers around protecting ‘shadow’ AI and GenAI consumption, there's a wide-open window nobody's guarding: AI browser extensions. A new report...
🔥Google Rolls Out DBSC in Chrome 146 to Block Session Theft on Windows
Google has made Device Bound Session Credentials (DBSC) generally available to all Windows users of its Chrome web browser, months after it began testing the security feature in open beta. The...
🔥Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure
A critical security vulnerability in Marimo, an open-source Python notebook for data science and analysis, has been exploited within 10 hours of public disclosure, according to findings...
🖥️BlueHammer : Quand Windows Defender devient le complice des attaquants - ZDNET
Une vulnérabilité zero-day baptisée "BlueHammer" permet à un utilisateur sans privilèges de prendre le contrôle total d'un système Windows en …
📰Iranian attacks on US critical infrastructure puts 3,900 devices in crosshairs
Censys researchers warned that thousands of devices are exposed to the Iranian government’s campaign targeting energy, water, and U.S. government services and facilities. The post Iranian attacks...
📰Why is the timeline to quantum-proof everything constantly shrinking?
Experts say advancements in hardware, mathematics and growing fear of Chinese scientific breakthroughs are pushing Google and others to call for speedier migration. The post Why is the timeline to...
📰Inside the FBI’s router takedown that cut off APT28’s ‘tremendous access’
FBI cyber chief Brett Leatherman told CyberScoop the Russian GRU campaign was unique in how it could propagate from routers to beyond. The post Inside the FBI’s router takedown that cut off...
🖥️Comment créer un mot de passe inviolable que vous n'oublierez jamais grâce à la méthode des passphrases ?
Les mots de passe trop sécurisés s'oublient, ceux faciles à retenir se piratent en quelques secondes. La méthode des passphrases résout ce paradoxe. …
📰Don’t just fight fraud, hunt it
As traditional fraud markers become obsolete, we must treat digital identity as critical infrastructure and adopt a layered, real-time defense to neutralize sophisticated crime rings. The post...