Toute l'actualité de la Cybersécurité


“I Paid Twice” Scam Infects Booking.com Users with PureRAT via ClickFix

2025-11-07 15:50:09
Cybersecurity firm Sekoia reports a widespread fraud where criminals compromise hotel systems (Booking.com, Expedia and others) with PureRAT malware, then use stolen reservation data to phish and defraud...

Lire la suite »

Cisco: Actively exploited firewall flaws now abused for DoS attacks

2025-11-07 15:44:31
Cisco warned this week that two vulnerabilities, which have been exploited in zero-day attacks, are now being abused to force ASA and FTD firewalls into reboot loops. [...]

Lire la suite »

ID verification laws are fueling the next wave of breaches

2025-11-07 15:05:15
ID laws are forcing companies to store massive amounts of sensitive data, turning compliance into a security risk. Acronis explains how integrated backup and cybersecurity platforms help MSPs reduce complexity...

Lire la suite »

Fake CAPTCHA sites now have tutorial videos to help victims install malware

2025-11-07 15:01:33
ClickFix campaign pages now have embedded videos to helpfully walk users through the process of infecting their own systems.

Lire la suite »

AI Agents Are Going Rogue: Here's How to Rein Them In

2025-11-07 15:00:00
Human-centered identity frameworks are incorrectly being applied to AI agents, creating the potential for catastrophe at machine speed, Poghosyan argues.

Lire la suite »

New Analysis Uncovers LockBit 5.0 Key Capabilities and Two-Stage Execution Model

2025-11-07 14:38:17
LockBit 5.0 made its debut in late September 2025, marking a significant upgrade for one of the most notorious ransomware-as-a-service (RaaS) groups. With roots tracing back to the ABCD ransomware in...

Lire la suite »

AI Security Agents Get Personas to Make Them More Appealing

2025-11-07 14:29:08
New synthetic security staffers promise to bring artificial intelligence comfortably into the security operations center, but they will require governance to protect security.

Lire la suite »

New Android Malware ‘Fantasy Hub' Intercepts SMS Messages, Contacts and Call Logs

2025-11-07 14:20:47
Russian-based threat actors are distributing a sophisticated Android Remote Access Trojan through underground channels, offering it as a subscription service to other criminals. The malware, identified...

Lire la suite »

Microsoft Teams' New “Chat with Anyone” Feature Exposes Users to Phishing and Malware Attacks

2025-11-07 14:17:21
Microsoft’s upcoming Teams update, set for targeted releases in early November 2025 and worldwide by January 2026, will allow users to initiate chats with only an email address, even if the recipient...

Lire la suite »

Ollama, Nvidia Flaws Put AI Infrastructure at Risk

2025-11-07 14:00:00
Security researchers discovered multiple vulnerabilities in AI infrastructure products, including one capable of remote code execution.

Lire la suite »

German ISP aurologic GmbH Identified as Key Hub for Malicious Hosting Infrastructure

2025-11-07 13:32:52
German hosting provider aurologic GmbH has emerged as a critical hub within the global malicious infrastructure ecosystem, according to recent intelligence reporting. The Langen-based ISP, which operates...

Lire la suite »

Threat Actors Use Stolen RDP Credentials to Deploy Cephalus Ransomware

2025-11-07 13:22:49
A new ransomware group, Cephalus, has emerged in the cybersecurity threat landscape, targeting organizations through compromised Remote Desktop Protocol (RDP) accounts. First detected in mid-June 2025,...

Lire la suite »

De prompt en vibe coding, le lexique de l'IA générative entre dans l'usage

2025-11-07 13:17:00
Le vocabulaire de la GenAI s'immisce dans les dictionnaires français de référence. Tandis qu'au UK, le Collins a fait de "vibe coding" son mot de l'année 2025. The post De prompt en vibe coding, le...

Lire la suite »

La Cour des comptes expose les errements IT du Louvre

2025-11-07 13:16:50
Le cambriolage du musée du Louvre a mis un éclairage sur plusieurs dysfonctionnements de l’établissement culturel. Si les (...)

Lire la suite »

CTRL, ALT, HACKED: Women In Gaming. Facing A Culture Of Stereotypes, Harassment, & Misogyny.

2025-11-07 13:11:16
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Nov. 7, 2025 – Listen to the podcast Over 40 percent of adolescent gamers in the U.S. avoid media depicting women...

Lire la suite »

Leak confirms Google Gemini 3 Pro and Nano Banana 2 could launch soon

2025-11-07 13:06:11
Google is planning to ship two new models. One is Gemini 3, which is optimised for coding and regular use, and the second is Nano Banano 2 for generating realistic images. [...]

Lire la suite »

ClickFix Attack Evolves: Weaponized Videos Trigger Self-Infection Tactics

2025-11-07 12:59:47
ClickFix attacks have surged dramatically over the past year, cementing their position as pivotal tools in the modern attacker's arsenal. These sophisticated social engineering campaigns coerce users...

Lire la suite »

Fake 0-Day Exploit Emails Trick Crypto Users Into Running Malicious Code

2025-11-07 12:44:04
Bolster AI reveals a new scam using a simple JS code via Emkei's Mailer to fake 37% profits and steal crypto. Act fast to secure your wallet.

Lire la suite »

USN-7853-3: Linux kernel (Azure) vulnerabilities

2025-11-07 12:43:43
Jean-Claude Graf, Sandro Rüegge, Ali Hajiabadi, and Kaveh Razavi discovered that the Linux kernel contained insufficient branch predictor isolation between a guest and a userspace hypervisor for certain...

Lire la suite »

15+ Weaponized npm Packages Attacking Windows Systems to Deliver Vidar Malware

2025-11-07 12:36:39
A sophisticated supply-chain attack has emerged targeting Windows systems through compromised npm packages, marking a critical vulnerability in open-source software distribution. Between October 21 and...

Lire la suite »

Herodotus Android Banking Trojan Takes Over Devices, Outsmarts Security Tools

2025-11-07 12:28:41
A new threat has surfaced in the mobile banking landscape Herodotus, a sophisticated Android banking Trojan that has been wreaking havoc in recent weeks. Offered under the notorious Malware-as-a-Service...

Lire la suite »

New Phising Attack Targeting Travellers from Hotel's Compromised Booking.com Account

2025-11-07 12:18:10
A sophisticated phishing campaign is actively targeting hotel establishments and their guests through compromised Booking.com accounts, according to research uncovered by security experts. The campaign,...

Lire la suite »

L'Union européenne va-t-elle reporter sa législation sur l'IA ?

2025-11-07 12:13:14
Selon le Financial Times, Bruxelles envisage un report partiel de son AI Act sous l'influence des géants technologiques et des États-Unis. The post L'Union européenne va-t-elle reporter sa législation...

Lire la suite »

U.S. Congressional Budget Office Hit by Cyberattack, Sensitive Data Compromised

2025-11-07 11:56:13
The Congressional Budget Office (CBO), which serves as Congress’s official financial advisor, has been targeted in a suspected cyberattack by suspected foreign actors. The breach exposed sensitive...

Lire la suite »

New Analysis Reveals LockBit 5.0's Core Features and Dual-Stage Attack Model

2025-11-07 11:55:51
LockBit has remained one of the most dominant ransomware-as-a-service (RaaS) groups in the world since its emergence as ABCD ransomware in 2019 and official launch as LockBit in 2020. Despite high-profile...

Lire la suite »

Hidden Logic Bombs in Malware-Laced NuGet Packages Set to Detonate Years After Installation

2025-11-07 11:55:00
A set of nine malicious NuGet packages has been identified as capable of dropping time-delayed payloads to sabotage database operations and corrupt industrial control systems. According to software supply...

Lire la suite »

Chinese Hackers Organization Influence U.S. Government Policy on International Issues

2025-11-07 11:37:15
China-linked threat actors have intensified their focus on influencing American governmental decision-making processes by targeting organizations involved in shaping international policy. In April 2025,...

Lire la suite »

Cisco fixes critical UCCX flaw allowing Root command execution

2025-11-07 11:37:10
Cisco patched a critical flaw in its Unified Contact Center Express (UCCX) software that allowed attackers to execute commands with root privileges. Cisco released security updates to address a critical...

Lire la suite »

Researchers Evaded Elastic EDR's Call Stack Signatures by Exploiting Call Gadgets

2025-11-07 11:31:13
Security researchers have successfully evaded Elastic EDR’s call stack signature detection by exploiting a technique involving “call gadgets” to bypass the security tool’s behavioral...

Lire la suite »

Une promotion teintée d'IA pour le programme French Tech 2030

2025-11-07 11:22:34
Après une première édition lancée en 2023, le programme French Tech 2030 visant à promouvoir les start-ups IT revient. (...)

Lire la suite »

New Android Malware ‘Fantasy Hub' Spies on Users' Calls, Contacts, and Messages

2025-11-07 11:15:10
Russian-based threat actors are actively distributing a sophisticated Android Remote Access Trojan called “Fantasy Hub” via Telegram-based Malware-as-a-Service channels, marking a significant...

Lire la suite »

Attackers Exploit Active Directory Sites to Escalate Privileges and Compromise Domain

2025-11-07 11:10:50
Security researchers have uncovered a dangerous attack vector targeting Active Directory Sites, a critical yet often overlooked component of enterprise network infrastructure.  According to a recent...

Lire la suite »

LANDFALL: New Commercial-Grade Android Spyware in Exploit Chain Targeting Samsung Devices

2025-11-07 11:00:23
Commercial-grade LANDFALL spyware exploits CVE-2025-21042 in Samsung Android's image processing library. The spyware was embedded in malicious DNG files. The post LANDFALL: New Commercial-Grade Android...

Lire la suite »

USN-7860-4: Linux kernel (Real-time) vulnerability

2025-11-07 10:37:29
Jean-Claude Graf, Sandro Rüegge, Ali Hajiabadi, and Kaveh Razavi discovered that the Linux kernel contained insufficient branch predictor isolation between a guest and a userspace hypervisor for certain...

Lire la suite »

USN-7860-3: Linux kernel (FIPS) vulnerability

2025-11-07 10:35:05
Jean-Claude Graf, Sandro Rüegge, Ali Hajiabadi, and Kaveh Razavi discovered that the Linux kernel contained insufficient branch predictor isolation between a guest and a userspace hypervisor for certain...

Lire la suite »

Enterprise Credentials at Risk – Same Old, Same Old?

2025-11-07 10:30:00
Imagine this: Sarah from accounting gets what looks like a routine password reset email from your organization’s cloud provider. She clicks the link, types in her credentials, and goes back to her...

Lire la suite »

LeakyInjector and LeakyStealer Malwares Attacks Users to Steal Crypto's and Browser History

2025-11-07 10:25:32
A dangerous two-stage malware threat, LeakyInjector and LeakyStealer, that targets cryptocurrency wallets and personal browser information explicitly. The malware duo works in tandem to steal sensitive...

Lire la suite »

Pourquoi la cybersécurité et la sobriété numérique sont indissociables dans la gestion actuelle des parcs informatiques

2025-11-07 10:17:55
2025 marque un tournant pour la gestion des actifs informatiques (ITAM). Avec l’augmentation des cyber-risques, le durcissement des réglementations et la pression croissante pour réduire les émissions,...

Lire la suite »

Cavalry Werewolf Attacking Government Organizations to Deploy Backdoor for Network Access

2025-11-07 10:10:53
In July 2025, a sophisticated hacker group known as Cavalry Werewolf executed a targeted campaign against Russian government institutions, compromising critical infrastructure through coordinated phishing...

Lire la suite »

EDF choisit Bleu et S3NS : une vision du cloud de confiance qui interpelle

2025-11-07 10:06:46
Entre dépendances structurelles et risques d'exposition à des lois extraterritoriales, le choix de Bleu et de S3NS par EDF fait réagir. The post EDF choisit Bleu et S3NS : une vision du cloud de confiance...

Lire la suite »

Over 15 Malicious npm Packages Exploiting Windows to Deploy Vidar Malware

2025-11-07 09:44:57
Datadog Security Research has uncovered a sophisticated supply chain attack targeting the npm ecosystem, involving 17 malicious packages across 23 releases designed to deliver the Vidar infostealer malware...

Lire la suite »

Personnalité IT 2025 : Focus sur Johanna Brousse, vice-procureur en charge de la section de lutte contre la cybercriminalité

2025-11-07 09:34:40
Vous avez jusqu’au 30 novembre pour voter pour le ou la candidate qui deviendra la personnalité IT du Monde Informatique pour l’année (...)

Lire la suite »

Des cybercriminels s'attaquent au fret mondial

2025-11-07 09:30:54
Autrefois, les escrocs suivaient les camions de transport et les détournaient. Aujourd'hui, ils utilisent le phishing, le vishing, le smishing, (...)

Lire la suite »

Researchers Bypass Elastic EDR Call-Stack Signatures Using Call Gadgets

2025-11-07 09:24:43
Security researchers have developed a new technique that leverages call gadgets to insert arbitrary modules into the call stack during module loading, successfully bypassing Elastic EDR's signature-based...

Lire la suite »

USN-7795-5: Linux kernel (Raspberry Pi) vulnerabilities

2025-11-07 09:19:02
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Ext4 file system; ...

Lire la suite »

Google Launches New Maps Feature to Help Businesses Report Review-Based Extortion Attempts

2025-11-07 09:15:00
Google on Thursday said it's rolling out a dedicated form to allow businesses listed on Google Maps to report extortion attempts made by threat actors who post inauthentic bad reviews on the platform...

Lire la suite »

Ubuntu 24.04 LTS: Linux Kernel Real-time Critical Issues USN-7861-2

2025-11-07 09:13:56
Several security issues were fixed in the Linux kernel.

Lire la suite »

Ubuntu 22.04 & 24.04: Linux Kernel Critical Information Exposure USN-7864-1

2025-11-07 09:13:39
Several security issues were fixed in the Linux kernel.

Lire la suite »

USN-7861-2: Linux kernel (Real-time) vulnerabilities

2025-11-07 09:08:23
Jean-Claude Graf, Sandro Rüegge, Ali Hajiabadi, and Kaveh Razavi discovered that the Linux kernel contained insufficient branch predictor isolation between a guest and a userspace hypervisor for certain...

Lire la suite »

Amazon WorkSpaces For Linux Vulnerability Let Attackers Extract Valid Authentication Token

2025-11-07 09:06:39
Amazon has disclosed a significant security vulnerability in its WorkSpaces client for Linux that could allow unauthorized users to extract valid authentication tokens and gain unauthorized access to...

Lire la suite »

USN-7864-1: Linux kernel (GCP and GKE) vulnerabilities

2025-11-07 09:01:59
Jean-Claude Graf, Sandro Rüegge, Ali Hajiabadi, and Kaveh Razavi discovered that the Linux kernel contained insufficient branch predictor isolation between a guest and a userspace hypervisor for certain...

Lire la suite »

Russia-linked APT InedibleOchotense impersonates ESET to deploy backdoor on Ukrainian systems

2025-11-07 08:39:55
Russia-linked group InedibleOchotense used fake ESET installers in phishing attacks on Ukrainian targets in May 2025. Russia-linked group InedibleOchotense used trojanized ESET installers in phishing...

Lire la suite »

SUSE: Kernel Important Security Fix for DoS Advisory 2025:3983-1

2025-11-07 08:30:08
* bsc#1248631 * bsc#1249207 * bsc#1249208 Cross-References:

Lire la suite »

openSUSE Leap 15.6 Kernel Important Security Update 2025:3983-1

2025-11-07 08:30:08
An update that solves three vulnerabilities can now be installed.

Lire la suite »

What Determines How Much Funding African Startups Raise?

2025-11-07 08:00:06
This study explores the factors shaping how much funding African startups raise, revealing the strong influence of founder profiles, gender diversity, incubators, and exit strategies on deal amounts....

Lire la suite »

The TechBeat: React 19: New Tools To Work With Forms (11/7/2025)

2025-11-07 07:11:03
How are you, hacker? 🪐Want to know what's trending right now?: The Techbeat by HackerNoon has got you covered with fresh content from our trending stories of the day! Set email preference here. ...

Lire la suite »

Gestion du travail collaboratif : un segment dont l'IA brouille les frontières

2025-11-07 07:02:05
À mesure que l'IA les gagne, les solutions de gestion du travail collaboratif entrent en concurrence avec des applications traditionnellement classées dans d'autres segments de marché. The post Gestion...

Lire la suite »

Vibe-Coded Malicious VS Code Extension Found with Built-In Ransomware Capabilities

2025-11-07 06:48:00
Cybersecurity researchers have flagged a malicious Visual Studio Code (VS Code) extension with basic ransomware capabilities that appears to be created with the help of artificial intelligence – in...

Lire la suite »

Emerging Tech Companies Must Stop Using Decentralization As An Ideological Gimmick

2025-11-07 05:21:09
The stakes are much higher now with agentic AI, DePIN, and autonomous finance protocols.

Lire la suite »

Modular Game Engines: Building Scalable Architectures for Next-Gen Online Slots

2025-11-07 05:17:15
It explains separating stable core systems (assets, network, state machine) from variable feature modules, enforcing one-way dependencies, lifecycle control, and dependency injection. Key decisions include...

Lire la suite »

KPIs Are Destroying IT Teams: How to Actually Measure Developer Performance

2025-11-07 05:15:27
Traditional KPIs like ticket counts or lines of code harm developer productivity. Focus on measuring Cycle Time (how quickly tasks are delivered) and Story Points (task complexity) instead. Use metrics...

Lire la suite »

New Metalake Support Eliminates Hardcoded Credentials in SeaTunnel Tasks

2025-11-07 05:14:11
Big thanks to contributor Wu Tianyu from Shanghai Jiao Tong University for this powerful addition during OSPP.

Lire la suite »

Why We Migrated from Azkaban to DolphinScheduler

2025-11-07 05:10:57
Here's our full migration story — what went wrong, how we fixed it, and the lessons for every growing data team.

Lire la suite »

LP-Free Perpetuals Exchange Leverup Available Now, Powered By Monad

2025-11-07 05:08:56
LeverUp is a next-generation DeFi platform built on the layer-1 blockchain Monad. LeverUp delivers a decentralized trading experience with uncapped open interest, free liquidity provider perpetuals, and...

Lire la suite »

Saas Brands Are Scared to Stand Out

2025-11-07 05:08:04
SaaS companies are meant to stand out and shine like a diamond, but that rarely happens. Readers can hardly read past the first 3 sentences before getting bored. SaaS blogs use the same “Saas cliches”...

Lire la suite »

Stop Automating Work, Start Training Evolution

2025-11-07 05:06:26
We have built systems that run like clockwork. And maybe that is the problem.

Lire la suite »

A Look at Retail Holiday Shopping Trends

2025-11-07 05:01:02
The U.S. population on average has a lower Equifax Market Pulse Index than 4 years ago. Gen Z as a whole has had to start cutting back on discretionary spending and the holiday season is scarcely an exception....

Lire la suite »

Sonami Announces Presale Developments And Layer 2 Expansion

2025-11-07 04:59:21
Sonami ($SNMI) is a project developed to tackle performance challenges on the Solana network. It is the first token launched on Solana Layer 2, allowing Sonami to offload transactions and enhance network...

Lire la suite »

Mageia 9: java-1.8.0-openjdk Medium Network Access Threat MGASA-2025-0268

2025-11-07 02:55:40
MGASA-2025-0268 - Updated java-1.8.0-openjdk, java-11-openjdk, java-17-openjdk & java-latest-openjdk packages fix security vulnerabilities

Lire la suite »

Mageia 9: Critical Integer Truncation Fix for sqlite3 MGASA-2025-0267

2025-11-07 02:55:39
MGASA-2025-0267 - Updated sqlite3 packages fix security vulnerability

Lire la suite »

U.S. Congressional Budget Office hit by suspected foreign cyberattack

2025-11-07 00:22:30
The U.S. Congressional Budget Office (CBO) confirms it suffered a cybersecurity incident after a suspected foreign hacker breached its network, potentially exposing sensitive data. [...]

Lire la suite »

Vulnérabilité dans Elastic Defend (07 novembre 2025)

07/11/2025
Une vulnérabilité a été découverte dans Elastic Defend. Elle permet à un attaquant de provoquer une élévation de privilèges et une atteinte à l'intégrité des données.

Lire la suite »

Multiples vulnérabilités dans Microsoft Edge (07 novembre 2025)

07/11/2025
De multiples vulnérabilités ont été découvertes dans Microsoft Edge. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.

Lire la suite »

Multiples vulnérabilités dans le noyau Linux d'Ubuntu (07 novembre 2025)

07/11/2025
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité...

Lire la suite »

Multiples vulnérabilités dans le noyau Linux de Red Hat (07 novembre 2025)

07/11/2025
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service...

Lire la suite »

Multiples vulnérabilités dans le noyau Linux de SUSE (07 novembre 2025)

07/11/2025
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.

Lire la suite »

Multiples vulnérabilités dans les produits IBM (07 novembre 2025)

07/11/2025
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service...

Lire la suite »