Toute l'actualité de la Cybersécurité


Une API d'OpenAI détournée pour exfiltrer des données

2025-11-06 12:39:12
Baptisée SesameOp, cette porte dérobée jusqu'alors inconnue exploite l'API Assistants d'OpenAI pour relayer des commandes et exfiltrer (...)

Lire la suite »

Cisco Unified Contact Center Express Vulnerabilities Let Remote Attacker Execute Malicious Code

2025-11-06 11:42:59
Cisco has disclosed multiple critical vulnerabilities in Unified Contact Center Express (CCX) that allow unauthenticated remote attackers to execute malicious code and escalate privileges. The vulnerabilities...

Lire la suite »

Top 7 Companies Specializing in Product Discovery Phase in 2025

2025-11-06 11:33:35
Finding the right partner is less about headcount and more about repeatable outcomes, which is why the profiles…

Lire la suite »

Doctolib sanctionné d'une amende de 4,6 millions € pour abus de position dominante

2025-11-06 11:32:58
L'Autorité de la concurrence sanctionne Doctolib d'une amende de 4,6 millions € pour avoir verrouillé son marché par des pratiques anticoncurrentielles. Doctolib fait appel de la décision. The post...

Lire la suite »

USN-7835-5: Linux kernel (Oracle) vulnerabilities

2025-11-06 11:12:21
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; ...

Lire la suite »

Keeper Security launches Forcefield to defend against memory-based attacks on Windows devices

2025-11-06 10:55:16
Keeper Security has unveiled Keeper Forcefield™, a new kernel-level endpoint security product designed to stop one of the fastest-growing cyber threats: memory-based attacks. The company, known for...

Lire la suite »

Multiple Django Vulnerabilities Enable SQL injection and DoS Attack

2025-11-06 10:48:20
Django, one of the most popular Python web development frameworks, has disclosed two critical security vulnerabilities that could allow attackers to execute SQL injection attacks and launch denial-of-service...

Lire la suite »

Bitdefender Named a Representative Vendor in the 2025 Gartner® Market Guide for Managed Detection and Response

2025-11-06 10:43:00
Bitdefender has once again been recognized as a Representative Vendor in the Gartner® Market Guide for Managed Detection and Response (MDR) — marking the fourth consecutive year of inclusion. According...

Lire la suite »

Cyberattacks on UK water systems reveal rising risks to critical infrastructure

2025-11-06 10:29:56
New data shows hackers targeted UK water systems five times since 2024, raising concerns about critical infrastructure defenses worldwide.

Lire la suite »

Rapport phishing secteur hôtelier : quand les clients payent leur réservation une fois à l'hôtel et une fois au cybercriminel

2025-11-06 10:22:49
Sekoia.io (société française de cybersécurité) vient de réaliser un rapport sur une campagne de phishing ciblant l'industrie touristique. Voici une synthèse du rapport : Le nouveau rapport de...

Lire la suite »

Rapport APT d'ESET : une guerre silencieuse entre puissances numériques (Avril-Septembre 2025)

2025-11-06 10:19:32
ESET Research publie son rapport d'activité APT couvrant la période d'avril à septembre 2025, mettant en lumière les opérations de plusieurs groupes de Menaces Persistantes Avancées (APT) surveillés...

Lire la suite »

USN-7863-1: Linux kernel vulnerabilities

2025-11-06 10:05:48
Jean-Claude Graf, Sandro Rüegge, Ali Hajiabadi, and Kaveh Razavi discovered that the Linux kernel contained insufficient branch predictor isolation between a guest and a userspace hypervisor for certain...

Lire la suite »

Authorities Dismanteled Major Credit Card Fraud Operation Impacting 4.3 Million Cardholders

2025-11-06 10:05:28
International law enforcement agencies have taken down three sophisticated fraud and money laundering networks in a coordinated operation that uncovered one of the largest credit card fraud schemes in...

Lire la suite »

Sandworm hackers use data wipers to disrupt Ukraine's grain sector

2025-11-06 10:01:28
Russian state-backed hacker group Sandworm has deployed multiple data-wiping malware families in attacks targeting Ukraine's education, government, and the grain sector, the country's main revenue source....

Lire la suite »

Multiple ChatGPT Security Bugs Allow Rampant Data Theft

2025-11-06 10:00:00
Attackers can use them to inject arbitrary prompts, exfiltrate personal user information, bypass safety mechanisms, and take other malicious actions.

Lire la suite »

Amazon contre les agents IA de Perplexity Comet

2025-11-06 09:48:05
Comme d’autres navigateurs basés sur l'IA, Comet développé par Perplexity, peut enchaîner plusieurs tâches à (...)

Lire la suite »

Black Friday et Cyber Monday : vigilance accrue pour les commerçants face aux risques cyber

2025-11-06 09:43:29
A l’approche du Black Friday, le 28 novembre, et du Cyber Monday, le 1er décembre, les commerçants se préparent à une période de forte activité, où la performance et la sécurité de leurs...

Lire la suite »

Alleged Russia-linked Curly COMrades exploit Windows Hyper-V to evade EDRs

2025-11-06 09:41:07
Curly COMrades threat actors exploit Windows Hyper-V to hide Linux VMs, evade EDR tools, and deploy custom malware undetected. Bitdefender researchers, aided by Georgia's CERT, uncovered that Curly...

Lire la suite »

Lux Courtage lance une cyber-assurance

2025-11-06 09:35:35
Depuis quelques mois, nous assistons à une prolifération des cyber-assurances ciblant surtout les PME et les collectivités et pour (...)

Lire la suite »

Multiple Django Flaws Could Allow SQL Injection and Denial-of-Service Attacks

2025-11-06 09:22:52
The Django development team has released critical security patches addressing two significant vulnerabilities that could expose applications to denial-of-service attacks and SQL injection exploits. The...

Lire la suite »

USN-7862-1: Linux kernel vulnerability

2025-11-06 09:16:50
Jean-Claude Graf, Sandro Rüegge, Ali Hajiabadi, and Kaveh Razavi discovered that the Linux kernel contained insufficient branch predictor isolation between a guest and a userspace hypervisor for certain...

Lire la suite »

USN-7861-1: Linux kernel vulnerabilities

2025-11-06 09:10:53
Jean-Claude Graf, Sandro Rüegge, Ali Hajiabadi, and Kaveh Razavi discovered that the Linux kernel contained insufficient branch predictor isolation between a guest and a userspace hypervisor for certain...

Lire la suite »

Cisco Warns of Hackers Actively Exploiting ASA and FTD 0-day RCE Vulnerability in the Wild

2025-11-06 09:10:12
Cisco has confirmed that threat actors are actively exploiting a critical remote code execution (RCE) flaw in its Secure Firewall Adaptive Security Appliance (ASA) and Threat Defense (FTD) software. First...

Lire la suite »

Comment Poclain et Schneider Electric protègent leurs systèmes IT/OT

2025-11-06 09:07:06
Dans le cadre du Grand Théma CIO/Le Monde Informatique consacré à la cybersécurité, nous avons reçu Sébastien (...)

Lire la suite »

USN-7860-1: Linux kernel vulnerability

2025-11-06 09:02:26
Jean-Claude Graf, Sandro Rüegge, Ali Hajiabadi, and Kaveh Razavi discovered that the Linux kernel contained insufficient branch predictor isolation between a guest and a userspace hypervisor for certain...

Lire la suite »

ValleyRAT Campaign Targets Windows via WeChat and DingTalk

2025-11-06 08:55:46
A sophisticated Windows remote-access trojan known as ValleyRAT has emerged as a high-confidence indicator of targeted intrusions against Chinese-language users and organizations. ValleyRAT’s operational...

Lire la suite »

Clop Ransomware Actors Exploiting the Latest 0-Day Exploits in the Wild

2025-11-06 08:54:14
Cl0p, a prominent ransomware group operating since early 2019, has emerged as one of the most dangerous threats in the cybersecurity landscape. With over 1,025 confirmed victims and more than 0 million...

Lire la suite »

Three Infamous Cybercriminal Groups Form a New Alliance Dubbed ‘Scattered LAPSUS$ Hunters'

2025-11-06 08:09:58
Three well-known threat groups have consolidated into a unified cybercriminal entity that represents a significant shift in underground tactics. Scattered LAPSUS$ Hunters (SLH) emerged in early August...

Lire la suite »

EndClient RAT Leverages Compromised Code-Signing to Slip Past Antivirus

2025-11-06 07:51:48
A sophisticated Remote Access Trojan (RAT) is actively targeting North Korean Human Rights Defenders (HRDs) through a campaign leveraging stolen code-signing certificates to evade antivirus detection....

Lire la suite »

Authorities Dismantle Large-Scale Credit Card Fraud Scheme Affecting 4.3 Million Users

2025-11-06 07:50:17
 Authorities across nine countries executed a coordinated crackdown on one of the largest credit card fraud networks ever dismantled. Operation Chargeback, led by German prosecutors and the Bundeskriminalamt,...

Lire la suite »

Hyundai AutoEver Confirms Data Breach Exposing Users' Personal Information and SSNs

2025-11-06 07:47:05
Hyundai AutoEver America has disclosed a significant data breach that compromised sensitive personal information of customers, including Social Security numbers and driver’s license details. The...

Lire la suite »

WatchGuard Fireware OS IKEv2 Out-of-Bounds Vulnerability

2025-11-06 07:36:48
What is the Vulnerability? A critical Out-of-Bounds Write vulnerability (CVE-2025-9242) exists in the WatchGuard Fireware OS iked process, which handles...

Lire la suite »

Cybersecurity Forecast 2026 – Google Warns Threat Actors Use AI to Enhance Speed and Effectiveness

2025-11-06 07:36:28
The cybersecurity landscape stands at a critical inflection point as organizations prepare for unprecedented challenges in 2026. Google Cloud researchers have released their annual Cybersecurity Forecast,...

Lire la suite »

Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection

2025-11-06 07:22:00
The threat actor known as Curly COMrades has been observed exploiting virtualization technologies as a way to bypass security solutions and execute custom malware. According to a new report from Bitdefender,...

Lire la suite »

The TechBeat: Nvidia Hits Trillion Valuation (11/6/2025)

2025-11-06 07:10:57
How are you, hacker? 🪐Want to know what's trending right now?: The Techbeat by HackerNoon has got you covered with fresh content from our trending stories of the day! Set email preference here. ...

Lire la suite »

Google Warns of PROMPTFLUX Malware That Uses Gemini API for Self-Rewriting Attacks

2025-11-06 06:44:31
Cybersecurity researchers at Google Threat Intelligence Group (GTIG) have identified a significant shift in how threat actors are leveraging artificial intelligence in their operations. The discovery...

Lire la suite »

NGate Malware Enables Unauthorized Cash Withdrawals at ATMs Using Victims' Payment Cards

2025-11-06 06:43:24
A sophisticated Android-based NFC relay attack dubbed NGate has emerged as a serious threat to banking security across Poland, targeting financial institutions and their customers through coordinated...

Lire la suite »

CISA Warns of Gladinet CentreStack and Triofox Files Vulnerability Exploited in Attacks

2025-11-06 06:24:21
The Cybersecurity and Infrastructure Security Agency has issued a critical warning regarding a newly identified vulnerability affecting Gladinet CentreStack and Triofox platforms. The flaw, tracked as...

Lire la suite »

Hyundai AutoEver Confirms Data Breach Exposing Personal Data, Including SSNs and License Info

2025-11-06 06:21:09
Hyundai AutoEver America, LLC has formally confirmed a significant data breach that compromised sensitive customer information. The automotive software provider disclosed the incident through official...

Lire la suite »

The Painful Joy of Refusing Documentation

2025-11-06 06:12:55
From AI hallucinations to debugging disasters, this essay explores the reasons why developers should stop fumbling around and start reading the docs.

Lire la suite »

If Data Is the New Oil, We Already Built a Planet-Sized Spill

2025-11-06 06:12:32
The U.S. Library of Congress is 1.8 billion unique digital objects, growing by 1.5 to 10 million per week, spanning. 100-200PB end-to-end. The future is structured curation, ETL, ELT, semantic normalization,...

Lire la suite »

AI Is Making Critical Decisions. Verifiable Machine Learning Makes Them Accountable.

2025-11-06 06:12:28
Zero-Knowledge Proofs (ZKPs), specifically ZK-SNARKs, deliver powerful solutions.

Lire la suite »

Why Machine Learning Loves GPUs: Moore's Law, Dennard Scaling, and the Rise of CUDA & HIP

2025-11-06 06:11:44
Moore's Law and Dennard Scaling drove explosive growth in computing power. But in the early 2000s, things hit a wall when transistors became so tiny. Multi-Core Processors let chip work on multiple...

Lire la suite »

Google Issues Emergency Chrome Update to Fix Critical RCE Flaw

2025-11-06 06:07:45
Google has released an emergency security update for Chrome across all platforms, rolling out version 142.0.7444.134 and 142.0.7444.135 to address five critical and medium-severity vulnerabilities. The...

Lire la suite »

Key Factors Influencing Deal Sizes in African Startup Investments

2025-11-06 06:00:24
This discussion analyzes what determines startup deal sizes across Africa, revealing how gender diversity, founder education, human capital, and exit potential influence investment outcomes. It challenges...

Lire la suite »

Confusion Matrix Explained: The Real Foundation of Model Evaluation

2025-11-06 05:55:20
Confusion Matrix is one of the core foundations of evaluating AI model performance. Accuracy is the simplest metric built on top of it.

Lire la suite »

Minimal Viable Kubernetes: Finally, a Self-Hosted Cluster You Can Actually Run

2025-11-06 05:54:26
Minimal Viable Kubernetes (MVK) is a streamlined, self-contained Kubernetes implementation designed for maximum portability and ease of management. It's engineered to run on self hosted virtual machines....

Lire la suite »

Gootloader Returns with a New ZIP File Tactic to Conceal Malicious Payloads

2025-11-06 05:50:28
Cybersecurity researchers have discovered a resurgent Gootloader malware campaign employing sophisticated new evasion techniques that exploit ZIP archive manipulation to evade detection and analysis....

Lire la suite »

You Don't Have to Like Tommy Robinson to See Why This Ruling Matters

2025-11-06 05:46:14
Tom Robinson was cleared of terrorism related charges for refusing to give border officials access to his phone.

Lire la suite »

HackedGPT: New Vulnerabilities in GPT Models Allow Attackers to Launch 0-Click Attacks

2025-11-06 05:45:09
Cybersecurity researchers at Tenable have uncovered a series of critical vulnerabilities in OpenAI’s ChatGPT that could allow malicious actors to steal private user data and launch attacks without...

Lire la suite »

AI in the SDLC Starts With Clarity, Not Tools.

2025-11-06 05:44:56
Everyone talks about “AI in software delivery,” but few know where to start.

Lire la suite »

Rethinking Reactivity: ScrollForge Links UI and Style Through a Single Causal Graph

2025-11-06 05:42:51
TL;DR Paradigm: Causal Graph Programming (CGP) — you wire functions, not components; the framework auto-detects what each function needs and “snaps” it into a single causal graph (UI ⇄ logic ⇄...

Lire la suite »

SonicWall Confirms State-Sponsored Hackers Behind September Cloud Backup Breach

2025-11-06 05:40:00
SonicWall has formally implicated state-sponsored threat actors as behind the September security breach that led to the unauthorized exposure of firewall configuration backup files. "The malicious activity...

Lire la suite »

The Real Fix for React Native + pnpm: Hoist Everything

2025-11-06 05:39:49
Learn why React Native projects break under pnpm's default linking, and why switching to node-linker=hoisted is the simplest, most reliable fix in monorepos.

Lire la suite »

Synthient Credential Stuffing Threat Data - 1,957,476,021 breached accounts

2025-11-06 04:58:49
During 2025, the threat-intelligence firm Synthient aggregated 2 billion unique email addresses disclosed in credential-stuffing lists found across multiple malicious internet sources. Comprised of email...

Lire la suite »

Fedora 41: xorg-x11-server Urgent Security Update 2025-a47b9d3f0d6

2025-11-06 03:01:13
Update to xserver 21.1.20, CVE fix for: CVE-2025-62229, CVE-2025-62230, CVE-2025-62231

Lire la suite »

Fedora 41: FontForge Important Memory Leak Issue CVE-2025-50949

2025-11-06 03:01:11
CVE-2025-50949

Lire la suite »

Fedora 43: Critical Vulnerabilities in golang-github-openprinting-ipp-usb

2025-11-06 02:45:50
Rebuild with the latest golang in repos

Lire la suite »

Fedora 43: Critical xorg-x11-server CVE Fixes CVE-2025-62229 Alert

2025-11-06 02:44:47
Update to xserver 21.1.20, CVE fix for: CVE-2025-62229, CVE-2025-62230, CVE-2025-62231

Lire la suite »

Fedora 42: Qt5 Bugfix Release Version 2025-976ccd79ae Available Now

2025-11-06 02:24:05
Qt 5.15.18 bugfix release. Qt5 WebEngine update to 5.15.19.

Lire la suite »

Fedora 42: qt5-qtwebview Important Bugfix 2025-976ccd79ae

2025-11-06 02:24:05
Qt 5.15.18 bugfix release. Qt5 WebEngine update to 5.15.19.

Lire la suite »

Cloudflare Scrubs Aisuru Botnet from Top Domains List

2025-11-06 02:04:36
For the past week, domains associated with the massive Aisuru botnet have repeatedly usurped Amazon, Apple, Google and Microsoft in Cloudflare's public ranking of the most frequently requested websites....

Lire la suite »

APT 'Bronze Butler' Exploits Zero-Day to Root Japan Orgs

2025-11-06 02:00:00
A critical security issue in a popular endpoint manager (CVE-2025-61932) allowed Chinese state-sponsored attackers to backdoor Japanese businesses.

Lire la suite »