Toute l'actualité de la Cybersécurité
“I Paid Twice” Scam Infects Booking.com Users with PureRAT via ClickFix
2025-11-07 15:50:09
Cybersecurity firm Sekoia reports a widespread fraud where criminals compromise hotel systems (Booking.com, Expedia and others) with PureRAT malware, then use stolen reservation data to phish and defraud...
Cisco: Actively exploited firewall flaws now abused for DoS attacks
2025-11-07 15:44:31
Cisco warned this week that two vulnerabilities, which have been exploited in zero-day attacks, are now being abused to force ASA and FTD firewalls into reboot loops. [...]
ID verification laws are fueling the next wave of breaches
2025-11-07 15:05:15
ID laws are forcing companies to store massive amounts of sensitive data, turning compliance into a security risk. Acronis explains how integrated backup and cybersecurity platforms help MSPs reduce complexity...
Fake CAPTCHA sites now have tutorial videos to help victims install malware
2025-11-07 15:01:33
ClickFix campaign pages now have embedded videos to helpfully walk users through the process of infecting their own systems.
AI Agents Are Going Rogue: Here's How to Rein Them In
2025-11-07 15:00:00
Human-centered identity frameworks are incorrectly being applied to AI agents, creating the potential for catastrophe at machine speed, Poghosyan argues.
New Analysis Uncovers LockBit 5.0 Key Capabilities and Two-Stage Execution Model
2025-11-07 14:38:17
LockBit 5.0 made its debut in late September 2025, marking a significant upgrade for one of the most notorious ransomware-as-a-service (RaaS) groups. With roots tracing back to the ABCD ransomware in...
AI Security Agents Get Personas to Make Them More Appealing
2025-11-07 14:29:08
New synthetic security staffers promise to bring artificial intelligence comfortably into the security operations center, but they will require governance to protect security.
New Android Malware ‘Fantasy Hub' Intercepts SMS Messages, Contacts and Call Logs
2025-11-07 14:20:47
Russian-based threat actors are distributing a sophisticated Android Remote Access Trojan through underground channels, offering it as a subscription service to other criminals. The malware, identified...
Microsoft Teams' New “Chat with Anyone” Feature Exposes Users to Phishing and Malware Attacks
2025-11-07 14:17:21
Microsoft’s upcoming Teams update, set for targeted releases in early November 2025 and worldwide by January 2026, will allow users to initiate chats with only an email address, even if the recipient...
Ollama, Nvidia Flaws Put AI Infrastructure at Risk
2025-11-07 14:00:00
Security researchers discovered multiple vulnerabilities in AI infrastructure products, including one capable of remote code execution.
German ISP aurologic GmbH Identified as Key Hub for Malicious Hosting Infrastructure
2025-11-07 13:32:52
German hosting provider aurologic GmbH has emerged as a critical hub within the global malicious infrastructure ecosystem, according to recent intelligence reporting. The Langen-based ISP, which operates...
Threat Actors Use Stolen RDP Credentials to Deploy Cephalus Ransomware
2025-11-07 13:22:49
A new ransomware group, Cephalus, has emerged in the cybersecurity threat landscape, targeting organizations through compromised Remote Desktop Protocol (RDP) accounts. First detected in mid-June 2025,...
De prompt en vibe coding, le lexique de l'IA générative entre dans l'usage
2025-11-07 13:17:00
Le vocabulaire de la GenAI s'immisce dans les dictionnaires français de référence. Tandis qu'au UK, le Collins a fait de "vibe coding" son mot de l'année 2025.
The post De prompt en vibe coding, le...
La Cour des comptes expose les errements IT du Louvre
2025-11-07 13:16:50
Le cambriolage du musée du Louvre a mis un éclairage sur plusieurs dysfonctionnements de l’établissement culturel. Si les (...)
CTRL, ALT, HACKED: Women In Gaming. Facing A Culture Of Stereotypes, Harassment, & Misogyny.
2025-11-07 13:11:16
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Nov. 7, 2025 – Listen to the podcast Over 40 percent of adolescent gamers in the U.S. avoid media depicting women...
Leak confirms Google Gemini 3 Pro and Nano Banana 2 could launch soon
2025-11-07 13:06:11
Google is planning to ship two new models. One is Gemini 3, which is optimised for coding and regular use, and the second is Nano Banano 2 for generating realistic images. [...]
ClickFix Attack Evolves: Weaponized Videos Trigger Self-Infection Tactics
2025-11-07 12:59:47
ClickFix attacks have surged dramatically over the past year, cementing their position as pivotal tools in the modern attacker's arsenal. These sophisticated social engineering campaigns coerce users...
Fake 0-Day Exploit Emails Trick Crypto Users Into Running Malicious Code
2025-11-07 12:44:04
Bolster AI reveals a new scam using a simple JS code via Emkei's Mailer to fake 37% profits and steal crypto. Act fast to secure your wallet.
USN-7853-3: Linux kernel (Azure) vulnerabilities
2025-11-07 12:43:43
Jean-Claude Graf, Sandro Rüegge, Ali Hajiabadi, and Kaveh Razavi discovered
that the Linux kernel contained insufficient branch predictor isolation
between a guest and a userspace hypervisor for certain...
15+ Weaponized npm Packages Attacking Windows Systems to Deliver Vidar Malware
2025-11-07 12:36:39
A sophisticated supply-chain attack has emerged targeting Windows systems through compromised npm packages, marking a critical vulnerability in open-source software distribution. Between October 21 and...
Herodotus Android Banking Trojan Takes Over Devices, Outsmarts Security Tools
2025-11-07 12:28:41
A new threat has surfaced in the mobile banking landscape Herodotus, a sophisticated Android banking Trojan that has been wreaking havoc in recent weeks. Offered under the notorious Malware-as-a-Service...
New Phising Attack Targeting Travellers from Hotel's Compromised Booking.com Account
2025-11-07 12:18:10
A sophisticated phishing campaign is actively targeting hotel establishments and their guests through compromised Booking.com accounts, according to research uncovered by security experts. The campaign,...
L'Union européenne va-t-elle reporter sa législation sur l'IA ?
2025-11-07 12:13:14
Selon le Financial Times, Bruxelles envisage un report partiel de son AI Act sous l'influence des géants technologiques et des États-Unis.
The post L'Union européenne va-t-elle reporter sa législation...
U.S. Congressional Budget Office Hit by Cyberattack, Sensitive Data Compromised
2025-11-07 11:56:13
The Congressional Budget Office (CBO), which serves as Congress’s official financial advisor, has been targeted in a suspected cyberattack by suspected foreign actors. The breach exposed sensitive...
New Analysis Reveals LockBit 5.0's Core Features and Dual-Stage Attack Model
2025-11-07 11:55:51
LockBit has remained one of the most dominant ransomware-as-a-service (RaaS) groups in the world since its emergence as ABCD ransomware in 2019 and official launch as LockBit in 2020. Despite high-profile...
Hidden Logic Bombs in Malware-Laced NuGet Packages Set to Detonate Years After Installation
2025-11-07 11:55:00
A set of nine malicious NuGet packages has been identified as capable of dropping time-delayed payloads to sabotage database operations and corrupt industrial control systems.
According to software supply...
Chinese Hackers Organization Influence U.S. Government Policy on International Issues
2025-11-07 11:37:15
China-linked threat actors have intensified their focus on influencing American governmental decision-making processes by targeting organizations involved in shaping international policy. In April 2025,...
Cisco fixes critical UCCX flaw allowing Root command execution
2025-11-07 11:37:10
Cisco patched a critical flaw in its Unified Contact Center Express (UCCX) software that allowed attackers to execute commands with root privileges. Cisco released security updates to address a critical...
Researchers Evaded Elastic EDR's Call Stack Signatures by Exploiting Call Gadgets
2025-11-07 11:31:13
Security researchers have successfully evaded Elastic EDR’s call stack signature detection by exploiting a technique involving “call gadgets” to bypass the security tool’s behavioral...
Une promotion teintée d'IA pour le programme French Tech 2030
2025-11-07 11:22:34
Après une première édition lancée en 2023, le programme French Tech 2030 visant à promouvoir les start-ups IT revient. (...)
New Android Malware ‘Fantasy Hub' Spies on Users' Calls, Contacts, and Messages
2025-11-07 11:15:10
Russian-based threat actors are actively distributing a sophisticated Android Remote Access Trojan called “Fantasy Hub” via Telegram-based Malware-as-a-Service channels, marking a significant...
Attackers Exploit Active Directory Sites to Escalate Privileges and Compromise Domain
2025-11-07 11:10:50
Security researchers have uncovered a dangerous attack vector targeting Active Directory Sites, a critical yet often overlooked component of enterprise network infrastructure. According to a recent...
LANDFALL: New Commercial-Grade Android Spyware in Exploit Chain Targeting Samsung Devices
2025-11-07 11:00:23
Commercial-grade LANDFALL spyware exploits CVE-2025-21042 in Samsung Android's image processing library. The spyware was embedded in malicious DNG files.
The post LANDFALL: New Commercial-Grade Android...
USN-7860-4: Linux kernel (Real-time) vulnerability
2025-11-07 10:37:29
Jean-Claude Graf, Sandro Rüegge, Ali Hajiabadi, and Kaveh Razavi discovered
that the Linux kernel contained insufficient branch predictor isolation
between a guest and a userspace hypervisor for certain...
USN-7860-3: Linux kernel (FIPS) vulnerability
2025-11-07 10:35:05
Jean-Claude Graf, Sandro Rüegge, Ali Hajiabadi, and Kaveh Razavi discovered
that the Linux kernel contained insufficient branch predictor isolation
between a guest and a userspace hypervisor for certain...
Enterprise Credentials at Risk – Same Old, Same Old?
2025-11-07 10:30:00
Imagine this: Sarah from accounting gets what looks like a routine password reset email from your organization’s cloud provider. She clicks the link, types in her credentials, and goes back to her...
LeakyInjector and LeakyStealer Malwares Attacks Users to Steal Crypto's and Browser History
2025-11-07 10:25:32
A dangerous two-stage malware threat, LeakyInjector and LeakyStealer, that targets cryptocurrency wallets and personal browser information explicitly. The malware duo works in tandem to steal sensitive...
Pourquoi la cybersécurité et la sobriété numérique sont indissociables dans la gestion actuelle des parcs informatiques
2025-11-07 10:17:55
2025 marque un tournant pour la gestion des actifs informatiques (ITAM). Avec l’augmentation des cyber-risques, le durcissement des réglementations et la pression croissante pour réduire les émissions,...
Cavalry Werewolf Attacking Government Organizations to Deploy Backdoor for Network Access
2025-11-07 10:10:53
In July 2025, a sophisticated hacker group known as Cavalry Werewolf executed a targeted campaign against Russian government institutions, compromising critical infrastructure through coordinated phishing...
EDF choisit Bleu et S3NS : une vision du cloud de confiance qui interpelle
2025-11-07 10:06:46
Entre dépendances structurelles et risques d'exposition à des lois extraterritoriales, le choix de Bleu et de S3NS par EDF fait réagir.
The post EDF choisit Bleu et S3NS : une vision du cloud de confiance...
Over 15 Malicious npm Packages Exploiting Windows to Deploy Vidar Malware
2025-11-07 09:44:57
Datadog Security Research has uncovered a sophisticated supply chain attack targeting the npm ecosystem, involving 17 malicious packages across 23 releases designed to deliver the Vidar infostealer malware...
Personnalité IT 2025 : Focus sur Johanna Brousse, vice-procureur en charge de la section de lutte contre la cybercriminalité
2025-11-07 09:34:40
Vous avez jusqu’au 30 novembre pour voter pour le ou la candidate qui deviendra la personnalité IT du Monde Informatique pour l’année (...)
Des cybercriminels s'attaquent au fret mondial
2025-11-07 09:30:54
Autrefois, les escrocs suivaient les camions de transport et les détournaient. Aujourd'hui, ils utilisent le phishing, le vishing, le smishing, (...)
Researchers Bypass Elastic EDR Call-Stack Signatures Using Call Gadgets
2025-11-07 09:24:43
Security researchers have developed a new technique that leverages call gadgets to insert arbitrary modules into the call stack during module loading, successfully bypassing Elastic EDR's signature-based...
USN-7795-5: Linux kernel (Raspberry Pi) vulnerabilities
2025-11-07 09:19:02
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Ext4 file system;
...
Google Launches New Maps Feature to Help Businesses Report Review-Based Extortion Attempts
2025-11-07 09:15:00
Google on Thursday said it's rolling out a dedicated form to allow businesses listed on Google Maps to report extortion attempts made by threat actors who post inauthentic bad reviews on the platform...
Ubuntu 24.04 LTS: Linux Kernel Real-time Critical Issues USN-7861-2
2025-11-07 09:13:56
Several security issues were fixed in the Linux kernel.
Ubuntu 22.04 & 24.04: Linux Kernel Critical Information Exposure USN-7864-1
2025-11-07 09:13:39
Several security issues were fixed in the Linux kernel.
USN-7861-2: Linux kernel (Real-time) vulnerabilities
2025-11-07 09:08:23
Jean-Claude Graf, Sandro Rüegge, Ali Hajiabadi, and Kaveh Razavi discovered
that the Linux kernel contained insufficient branch predictor isolation
between a guest and a userspace hypervisor for certain...
Amazon WorkSpaces For Linux Vulnerability Let Attackers Extract Valid Authentication Token
2025-11-07 09:06:39
Amazon has disclosed a significant security vulnerability in its WorkSpaces client for Linux that could allow unauthorized users to extract valid authentication tokens and gain unauthorized access to...
USN-7864-1: Linux kernel (GCP and GKE) vulnerabilities
2025-11-07 09:01:59
Jean-Claude Graf, Sandro Rüegge, Ali Hajiabadi, and Kaveh Razavi discovered
that the Linux kernel contained insufficient branch predictor isolation
between a guest and a userspace hypervisor for certain...
Russia-linked APT InedibleOchotense impersonates ESET to deploy backdoor on Ukrainian systems
2025-11-07 08:39:55
Russia-linked group InedibleOchotense used fake ESET installers in phishing attacks on Ukrainian targets in May 2025. Russia-linked group InedibleOchotense used trojanized ESET installers in phishing...
SUSE: Kernel Important Security Fix for DoS Advisory 2025:3983-1
2025-11-07 08:30:08
* bsc#1248631 * bsc#1249207 * bsc#1249208 Cross-References:
openSUSE Leap 15.6 Kernel Important Security Update 2025:3983-1
2025-11-07 08:30:08
An update that solves three vulnerabilities can now be installed.
What Determines How Much Funding African Startups Raise?
2025-11-07 08:00:06
This study explores the factors shaping how much funding African startups raise, revealing the strong influence of founder profiles, gender diversity, incubators, and exit strategies on deal amounts....
The TechBeat: React 19: New Tools To Work With Forms (11/7/2025)
2025-11-07 07:11:03
How are you, hacker?
🪐Want to know what's trending right now?:
The Techbeat by HackerNoon has got you covered with fresh content from our trending stories of the day! Set email preference here.
...
Gestion du travail collaboratif : un segment dont l'IA brouille les frontières
2025-11-07 07:02:05
À mesure que l'IA les gagne, les solutions de gestion du travail collaboratif entrent en concurrence avec des applications traditionnellement classées dans d'autres segments de marché.
The post Gestion...
Vibe-Coded Malicious VS Code Extension Found with Built-In Ransomware Capabilities
2025-11-07 06:48:00
Cybersecurity researchers have flagged a malicious Visual Studio Code (VS Code) extension with basic ransomware capabilities that appears to be created with the help of artificial intelligence – in...
Emerging Tech Companies Must Stop Using Decentralization As An Ideological Gimmick
2025-11-07 05:21:09
The stakes are much higher now with agentic AI, DePIN, and autonomous finance protocols.
Modular Game Engines: Building Scalable Architectures for Next-Gen Online Slots
2025-11-07 05:17:15
It explains separating stable core systems (assets, network, state machine) from variable feature modules, enforcing one-way dependencies, lifecycle control, and dependency injection. Key decisions include...
KPIs Are Destroying IT Teams: How to Actually Measure Developer Performance
2025-11-07 05:15:27
Traditional KPIs like ticket counts or lines of code harm developer productivity. Focus on measuring Cycle Time (how quickly tasks are delivered) and Story Points (task complexity) instead. Use metrics...
New Metalake Support Eliminates Hardcoded Credentials in SeaTunnel Tasks
2025-11-07 05:14:11
Big thanks to contributor Wu Tianyu from Shanghai Jiao Tong University for this powerful addition during OSPP.
Why We Migrated from Azkaban to DolphinScheduler
2025-11-07 05:10:57
Here's our full migration story — what went wrong, how we fixed it, and the lessons for every growing data team.
LP-Free Perpetuals Exchange Leverup Available Now, Powered By Monad
2025-11-07 05:08:56
LeverUp is a next-generation DeFi platform built on the layer-1 blockchain Monad. LeverUp delivers a decentralized trading experience with uncapped open interest, free liquidity provider perpetuals, and...
Saas Brands Are Scared to Stand Out
2025-11-07 05:08:04
SaaS companies are meant to stand out and shine like a diamond, but that rarely happens. Readers can hardly read past the first 3 sentences before getting bored. SaaS blogs use the same “Saas cliches”...
Stop Automating Work, Start Training Evolution
2025-11-07 05:06:26
We have built systems that run like clockwork. And maybe that is the problem.
A Look at Retail Holiday Shopping Trends
2025-11-07 05:01:02
The U.S. population on average has a lower Equifax Market Pulse Index than 4 years ago. Gen Z as a whole has had to start cutting back on discretionary spending and the holiday season is scarcely an exception....
Sonami Announces Presale Developments And Layer 2 Expansion
2025-11-07 04:59:21
Sonami ($SNMI) is a project developed to tackle performance challenges on the Solana network. It is the first token launched on Solana Layer 2, allowing Sonami to offload transactions and enhance network...
Mageia 9: java-1.8.0-openjdk Medium Network Access Threat MGASA-2025-0268
2025-11-07 02:55:40
MGASA-2025-0268 - Updated java-1.8.0-openjdk, java-11-openjdk, java-17-openjdk & java-latest-openjdk packages fix security vulnerabilities
Mageia 9: Critical Integer Truncation Fix for sqlite3 MGASA-2025-0267
2025-11-07 02:55:39
MGASA-2025-0267 - Updated sqlite3 packages fix security vulnerability
U.S. Congressional Budget Office hit by suspected foreign cyberattack
2025-11-07 00:22:30
The U.S. Congressional Budget Office (CBO) confirms it suffered a cybersecurity incident after a suspected foreign hacker breached its network, potentially exposing sensitive data. [...]
Vulnérabilité dans Elastic Defend (07 novembre 2025)
07/11/2025
Une vulnérabilité a été découverte dans Elastic Defend. Elle permet à un attaquant de provoquer une élévation de privilèges et une atteinte à l'intégrité des données.
Multiples vulnérabilités dans Microsoft Edge (07 novembre 2025)
07/11/2025
De multiples vulnérabilités ont été découvertes dans Microsoft Edge. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Multiples vulnérabilités dans le noyau Linux d'Ubuntu (07 novembre 2025)
07/11/2025
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité...
Multiples vulnérabilités dans le noyau Linux de Red Hat (07 novembre 2025)
07/11/2025
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service...
Multiples vulnérabilités dans le noyau Linux de SUSE (07 novembre 2025)
07/11/2025
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Multiples vulnérabilités dans les produits IBM (07 novembre 2025)
07/11/2025
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service...