Toute l'actualité de la Cybersécurité


AI-Slop ransomware test sneaks on to VS Code marketplace

2025-11-06 21:52:47
A malicious extension with basic ransomware capabilities seemingly created with the help of AI, has been published on Microsoft's official VS Code marketplace. [...]

Lire la suite »

Sora 2 Makes Videos So Believable, Reality Checks Are Required

2025-11-06 21:42:34
Threat actors will continue to abuse deepfake technology to conduct fraudulent activity, so organizations need to implement strong security protocols – even if it adds to user friction.

Lire la suite »

Sandworm Hackers Attacking Ukranian Organizations with Data Wiper Malwares

2025-11-06 21:28:07
The Russia-aligned Sandworm threat group has intensified its destructive cyberattacks against Ukrainian organizations, deploying sophisticated data wiper malware designed to cripple critical infrastructure...

Lire la suite »

AI Browsers Bypass Content PayWall Mimicking as a Human-User

2025-11-06 20:56:15
The emergence of advanced AI browsing platforms such as OpenAI’s Atlas and Perplexity’s Comet has created a sophisticated challenge for digital publishers worldwide. These tools leverage agentic...

Lire la suite »

SonicWall Firewall Backups Stolen by Nation-State Actor

2025-11-06 20:51:47
The network security vendor said the MySonicWall breach was unrelated to the recent wave of Akira ransomware attacks targeting the company's devices.

Lire la suite »

Midnight Ransomware Decrypter Flaws Opens the Door to File Recovery

2025-11-06 20:17:06
The cybersecurity landscape continues to evolve as new ransomware variants emerge from the remnants of previous campaigns. Midnight ransomware represents one such development, drawing substantial inspiration...

Lire la suite »

Hackers commit highway robbery, stealing cargo and goods

2025-11-06 19:39:44
There's a modern-day train heist happening across America, and some of the bandana-masked robbers are sitting behind screens.

Lire la suite »

Iranian Hackers Targeting Academics and Foreign Policy Experts Using RMM Tools

2025-11-06 19:16:47
A previously unidentified Iranian threat actor has emerged with sophisticated social engineering tactics aimed at academics and foreign policy experts across the United States. Operating between June...

Lire la suite »

How a ransomware gang encrypted Nevada government's systems

2025-11-06 19:02:16
The State of Nevada has completed its recovery from a ransomware attack it suffered on August 24, 2025, which impacted 60 state agencies, disrupting critical services related to health and public safety....

Lire la suite »

Cisco became aware of a new attack variant against Secure Firewall ASA and FTD devices

2025-11-06 18:26:17
Cisco warns of a new attack variant exploiting CVE-2025-20333 and CVE-2025-20362 in Secure Firewall ASA and FTD devices. Cisco warned of a new attack variant targeting vulnerable Secure Firewall ASA and...

Lire la suite »

Threat Actors May Abuse VS Code Extensions to Deploy Ransomware and Use GitHub as C2 Server

2025-11-06 17:57:55
North Korean threat actors are evolving their attack strategies by leveraging developer-focused tools as infection vectors. Recent security discoveries reveal that Kimsuky, a nation-state group operating...

Lire la suite »

CVE-2025-12815 - RES web portal may display preview of Virtual Desktops that the user shouldn't have access to

2025-11-06 17:56:25
Bulletin ID: AWS-2025-026 Scope: AWS Content Type: Important (requires attention) Publication Date: 2025/11/6 09:15 AM PDT Description: Research and Engineering Studio on AWS (RES) is an open source,...

Lire la suite »

Red Hat garde le cap sur le cloud et l'IA

2025-11-06 17:53:26
La foule était nombreuse à la Maison de la Mutualité à Paris pour le Red Hat Summit qui se déroule du 5 au 6 novembre (...)

Lire la suite »

List of AI Tools Promoted by Threat Actors in Underground Forums and Their Capabilities

2025-11-06 17:52:10
The cybercrime landscape has undergone a dramatic transformation in 2025, with artificial intelligence emerging as a cornerstone technology for malicious actors operating in underground forums. According...

Lire la suite »

Google sounds alarm on self-modifying AI malware

2025-11-06 17:45:55
Google warns malware now uses AI to mutate, adapt, and collect data during execution, boosting evasion and persistence. Google's Threat Intelligence Group (GTIG) warn of a new generation of malware...

Lire la suite »

New IDC research highlights a major cloud security shift

2025-11-06 17:00:00
New IDC research shows why CISOs must move toward AI-powered, integrated platforms like CNAPP, XDR, and SIEM to reduce risk, cut complexity, and strengthen resilience. The post New IDC research highlights...

Lire la suite »

Keerthi Amistapuram Pioneers Federated Learning for Secure Insurance Fraud Detection

2025-11-06 16:59:59
Researcher Keerthi Amistapuram introduces a federated learning model that lets insurers jointly detect fraud without sharing private data. Her privacy-preserving, fairness-driven system combines encryption,...

Lire la suite »

Airstalk Malware Leverages AirWatch API MDM Platform to Establish Covert C2 Communication

2025-11-06 16:56:34
Security researchers have uncovered a sophisticated new malware family targeting enterprise environments through a supply chain compromise. The malware, tracked as Airstalk, represents a significant shift...

Lire la suite »

Android malware steals your card details and PIN to make instant ATM withdrawals

2025-11-06 16:48:11
Forget card skimmers—this Android malware uses your phone's NFC to help criminals pull cash straight from ATMs.

Lire la suite »

Federated Cloud for Secure and Scalable Cross-Border Payments: A Study by Avinash Reddy Segireddy

2025-11-06 16:45:00
In his latest research, Avinash Reddy Segireddy introduces federated cloud architectures to modernize cross-border payment systems. The framework enables secure, compliant, and low-latency financial messaging...

Lire la suite »

Dwaraka Nath Kummari Champions Machine Learning to Reinvent Industrial Compliance

2025-11-06 16:44:59
Researcher Dwaraka Nath Kummari is redefining industrial compliance through machine learning. His work shows how AI can shift audits from manual oversight to predictive monitoring—detecting risks, ensuring...

Lire la suite »

Multi-Staged ValleyRAT Uses WeChat and DingTalk to Attack Windows Users

2025-11-06 16:40:05
ValleyRAT has emerged as a sophisticated multi-stage remote access trojan targeting Windows systems, with particular focus on Chinese-language users and organizations. First observed in early 2023, this...

Lire la suite »

Take control of your privacy with updates on Malwarebytes for Windows

2025-11-06 16:40:02
Malwarebytes for Windows introduces powerful privacy controls, so you get to decide how Microsoft uses your data—all from one simple screen.

Lire la suite »

New ChatGPT Vulnerabilities Let Hackers Steal Data, Hijack Memory

2025-11-06 16:15:12
Seven vulnerabilities in ChatGPT (including GPT-5) allow attackers to use '0-click' and 'memory injection' to bypass safety features and persistently steal private user data and chat history. Tenable...

Lire la suite »

Guaranteed PR Delivers A 20:1 ROI As Spynn's Win Rate Jumps 29%

2025-11-06 16:14:59
Spynn's guaranteed PR model generated a 20:1 ROI and a 29% rise in conversion rate in 2024. With a fixed-price, 72-hour publication guarantee, clients see faster media placements and measurable traffic...

Lire la suite »

New EndClient RAT Attacking Users by Leveraging Stolen Code-Signing to Bypass AV Detections

2025-11-06 16:08:57
A sophisticated Remote Access Trojan labeled EndClient RAT has emerged as a significant threat targeting human rights defenders in North Korea, marking another escalation in advanced malware operations...

Lire la suite »

The HackerNoon Newsletter: Chowa Widgets: Smarter Writing at Your Fingertips (11/6/2025)

2025-11-06 16:02:48
How are you, hacker? 🪐 What's happening in tech today, November 6, 2025? The HackerNoon Newsletter brings the HackerNoon ...

Lire la suite »

The Invisible Hand of Fundraising: Why Startups Must Learn to Be Seen

2025-11-06 16:00:08
Because in the next funding cycle, capital will chase conviction - and conviction travels fastest through stories well told.

Lire la suite »

Eleven11 : Le « fantôme DDoS » vieux de quatre ans

2025-11-06 15:59:05
NETSCOUT vient de publier une nouvelle analyse portant sur le botnet Eleven11. L'article révèle que cette menace, signalée comme nouvelle en février 2025, est en réalité le « fantôme » d’un...

Lire la suite »

Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine

2025-11-06 15:31:00
A previously unknown threat activity cluster has been observed impersonating Slovak cybersecurity company ESET as part of phishing attacks targeting Ukrainian entities. The campaign, detected in May 2025,...

Lire la suite »

Avinash Reddy Aitha Advances Generative AI for Smarter Insurance Claims Processing

2025-11-06 15:29:59
AI researcher Avinash Reddy Aitha developed a Generative AI framework that automates workers' compensation claim processing, transforming unstructured data into structured insights. His agentic AI model...

Lire la suite »

MAI Superintelligence Team : Microsoft mise sur l'IA médicale

2025-11-06 15:17:48
Avec la création du MAI Superintelligence Team, Microsoft veut développer une intelligence artificielle capable de performances supérieures à celles des humains, en commençant par le diagnostic médical. The...

Lire la suite »

Un étudiant condamné à 4 ans pour la cyberattaque massive contre PowerSchool

2025-11-06 15:03:09
Un étudiant de 19 ans condamné à quatre ans pour la cyberattaque mondiale contre PowerSchool....

Lire la suite »

Continuous Purple Teaming: Turning Red-Blue Rivalry into Real Defense

2025-11-06 15:02:12
Red and blue teams often operate independently, but attackers don't. Picus Security shows how continuous purple teaming and BAS turn red-blue rivalry into real defense, validating controls and closing...

Lire la suite »

Chowa Widgets: Smarter Writing at Your Fingertips

2025-11-06 15:00:32
Write better, faster, and smarter with Chowa's new widgets. Activate Writing Mode for focus, hear your draft read aloud, get AI-powered feedback, and create stunning graphs - all without leaving the editor....

Lire la suite »

Mastering Gemini CLI - Top Tips for Better AI Coding

2025-11-06 15:00:10
Gemini is a command-line tool that can be used to run commands in a terminal. The tool is designed to help you work faster with your coding projects. Here are 10 tips to help with using the Gemini CLI....

Lire la suite »

Global Recognition Awards Crown 50 Hotels As Guest Scores Rise 21%

2025-11-06 14:59:59
Fifty hotels across 18 countries earned Global Recognition Awards after boosting guest satisfaction by 21% in one year. Winners improved service through technology adoption, staff training, and guest...

Lire la suite »

Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362

2025-11-06 14:58:00
Cisco on Wednesday disclosed that it became aware of a new attack variant that's designed to target devices running Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall...

Lire la suite »

TikTok, Google et Comcast livrent les données d'un suspect pour menaces 2.0

2025-11-06 14:57:12
Le FBI identifie un suspect grâce à TikTok, Google et Comcast après une vidéo menaçant la procureure générale Pam Bondi....

Lire la suite »

L'IA générative commence à alimenter l'exécution des malwares

2025-11-06 14:49:45
Le recours à l'IA générative dépasse la phase de développement des malwares et vient enrichir leur exécution. The post L’IA générative commence à alimenter l’exécution des malwares...

Lire la suite »

Gootloader is Back with New ZIP File Trickery that Decive the Malicious Payload

2025-11-06 14:40:32
The Gootloader malware campaign has resurfaced with sophisticated evasion techniques that allow it to bypass automated security analysis. This persistent threat has been targeting victims for over five...

Lire la suite »

Pourquoi externaliser la cybersécurité devient crucial

2025-11-06 14:40:05
Les SOC managés offrent expertise, conformité et surveillance 24/7 : une réponse vitale à la pénurie mondiale de talents en cybersécurité....

Lire la suite »

HTTP/2 ‘MadeYouReset' Vulnerability Enable Denial-of-Service (DoS) Attacks

2025-11-06 14:40:02
A critical vulnerability discovered across numerous HTTP/2 implementations has exposed a dangerous protocol-level vulnerability that enables threat actors to orchestrate potent denial-of-service (DoS)...

Lire la suite »

Test Manipulation Analyser : l'outil ZATAZ pour s'entraîner à détecter l'ingénierie sociale

2025-11-06 14:26:29
Test Manipulation Analyser de ZATAZ : un outil pédagogique pour repérer le langage manipulateur, s'entraîner à l'ingénierie sociale et renforcer ses réflexes de défense....

Lire la suite »

AI Browsers That Beat Paywalls by Imitating Humans

2025-11-06 14:17:24
The emergence of AI-powered browsers represents a significant shift in how artificial intelligence interacts with web content. However, it has also introduced unprecedented challenges for digital publishers...

Lire la suite »

ClickFix malware attacks evolve with multi-OS support, video tutorials

2025-11-06 14:00:00
ClickFix attacks have evolved to feature videos that guide victims through the self-infection process, a timer to pressure targets into taking risky actions, and automatic  detection of the operating...

Lire la suite »

Critical Bug in Midnight Ransomware Tool Unlocks File Recovery

2025-11-06 13:54:22
In the ever-evolving landscape of cyber threats, a new ransomware strain, Midnight, has emerged, echoing the notorious tactics of its predecessor, Babuk. First detected by Gen researchers, Midnight blends...

Lire la suite »

Google investit dans la reforestation pour compenser son empreinte carbone

2025-11-06 13:50:54
Google porte à 200 000 tonnes le volume de crédits carbone achetés à la start-up brésilienne qui travaille à la reforestation amazonienne. The post Google investit dans la reforestation pour compenser...

Lire la suite »

USN-7860-2: Linux kernel (Real-time) vulnerability

2025-11-06 13:32:32
Jean-Claude Graf, Sandro Rüegge, Ali Hajiabadi, and Kaveh Razavi discovered that the Linux kernel contained insufficient branch predictor isolation between a guest and a userspace hypervisor for certain...

Lire la suite »

Critical Cisco UCCX flaw lets attackers run commands as root

2025-11-06 13:31:10
Cisco has released security updates to patch a critical vulnerability in the Unified Contact Center Express (UCCX) software, which could enable attackers to execute commands with root privileges. [...]...

Lire la suite »

Iranian Hackers Exploit RMM Tools to Target Academics and Foreign-Policy Experts

2025-11-06 13:30:56
Proofpoint Threat Research has identified a previously unknown Iranian threat actor, dubbed UNK_SmudgedSerpent, that conducted sophisticated phishing campaigns against academics and foreign policy experts...

Lire la suite »

Cybercrime Magazine On Instagram: Hacking The Latest Cybersecurity Stories

2025-11-06 13:28:29
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Nov. 6, 2025 – Listen to the podcast Taylor Fox, Instagram and social media contributor at Cybercrime Magazine,...

Lire la suite »

Amazon vs Perplexity : un premier litige emblématique pour le commerce agentique

2025-11-06 13:26:42
Le torchon brûle entre Amazon et Perplexity concernant l'usage du navigateur Comet pour le commerce agentique. The post Amazon vs Perplexity : un premier litige emblématique pour le commerce agentique...

Lire la suite »

Cavalry Werewolf Hit Russian Government with New ShellNET Backdoor

2025-11-06 13:19:10
Doctor Web uncovers a targeted cyberattack on a Russian government body by the Cavalry Werewolf group using a new ShellNET backdoor and Telegram-based control.

Lire la suite »

Cisco Confirms Active Exploitation of Secure ASA and FTD RCE Vulnerability

2025-11-06 13:15:09
Cisco has issued a critical warning about ongoing attacks targeting a severe remote code execution vulnerability affecting its Secure Firewall, Adaptive Security Appliance, and Threat Defense Software....

Lire la suite »

Cyberattaque américaine contre le « temps » chinois ?

2025-11-06 13:06:22
La cyberattaque de la NSA contre le centre chinois du temps révèle l'enjeu stratégique mondial du contrôle de la précision horaire....

Lire la suite »

WhatsApp Rolls Out Passkey-Secured Backups On Android, iOS

2025-11-06 13:05:53
After the recent update, WhatsApp users can experience passkey-secured backups for their conversations. WhatsApp has… WhatsApp Rolls Out Passkey-Secured Backups On Android, iOS on Latest Hacking...

Lire la suite »

Threat Actors Exploit VS Code Extensions for Ransomware via GitHub C2

2025-11-06 12:51:45
Security researchers have uncovered a sophisticated attack campaign attributed to Kimsuky, the North Korean-backed threat group known for conducting espionage operations against government entities and...

Lire la suite »

Étude Google Threat Intelligence / L'IA transforme les logiciels malveillants

2025-11-06 12:48:41
Google Threat Intelligence a publié son rapport AI Threat Tracker : Advances in threat actor usage of IA tools, mettant en lumière la manière dont les acteurs étatiques et les cybercriminels exploitent...

Lire la suite »

Une API d'OpenAI détournée pour exfiltrer des données

2025-11-06 12:39:12
Baptisée SesameOp, cette porte dérobée jusqu'alors inconnue exploite l'API Assistants d'OpenAI pour relayer des commandes et exfiltrer (...)

Lire la suite »

SUSE Linux Enterprise: flake-pilot Moderate CVE-2025-55159 Advisory

2025-11-06 12:30:58
* bsc#1248004 Cross-References: * CVE-2025-55159

Lire la suite »

SUSE Advisory 2025:3961-1 on TIFF Write-What-Where Issue CVE-2025-9900

2025-11-06 12:30:33
* bsc#1250413 Cross-References: * CVE-2025-9900

Lire la suite »

SUSE: java-1_8_0-ibm Important Unauth Access Fix CVE-2025-53057 2025:3964-1

2025-11-06 12:30:25
* bsc#1252414 * bsc#1252417 * bsc#1252418 * bsc#1252758

Lire la suite »

SUSE: Java 1.8 IBM Important Security Issues CVE-2025-53057 CVE-2025-53066

2025-11-06 12:30:21
* bsc#1252414 * bsc#1252417 * bsc#1252418 * bsc#1252758

Lire la suite »

openSUSE: java-1_8_0-ibm Important Data Access Issues 2025:3965-1

2025-11-06 12:30:21
An update that solves three vulnerabilities and has one security fix can now be installed.

Lire la suite »

SUSE: Fetchmail Moderate Denial of Service Fix CVE-2025-61962 2025:3966-1

2025-11-06 12:30:16
* bsc#1251194 Cross-References: * CVE-2025-61962

Lire la suite »

Checkpoint Analysis: Dissecting the 8M Balancer Pool Drain in Under 30 Minutes

2025-11-06 12:28:57
In the early hours of November 3, 2025, Check Point Research's blockchain threat monitoring systems flagged a suspicious pattern on the Ethereum mainnet. The alert stemmed from Balancer V2's Vault...

Lire la suite »

Cisco UCCX Vulnerabilities Allow Remote Attackers to Execute Arbitrary Code

2025-11-06 12:10:04
Cisco has issued a critical security advisory addressing two severe vulnerabilities in its Unified Contact Center Express (CCX) platform that could enable remote attackers to execute arbitrary commands...

Lire la suite »

Airstalk Malware Exploits AirWatch MDM for Covert C2 Communication

2025-11-06 12:05:58
Security researchers have identified a sophisticated new malware family, Airstalk, that exploits VMware’s AirWatch API—now known as Workspace ONE Unified Endpoint Management—to establish covert...

Lire la suite »

From Tabletop to Turnkey: Building Cyber Resilience in Financial Services

2025-11-06 11:59:00
Introduction Financial institutions are facing a new reality: cyber-resilience has passed from being a best practice, to an operational necessity, to a prescriptive regulatory requirement. Crisis management...

Lire la suite »

ThreatsDay Bulletin: AI Tools in Malware, Botnets, GDI Flaws, Election Attacks & More

2025-11-06 11:40:00
Cybercrime has stopped being a problem of just the internet — it’s becoming a problem of the real world. Online scams now fund organized crime, hackers rent violence like a service, and even...

Lire la suite »

Top 7 Companies Specializing in Product Discovery Phase in 2025

2025-11-06 11:33:35
Finding the right partner is less about headcount and more about repeatable outcomes, which is why the profiles…

Lire la suite »

Doctolib sanctionné d'une amende de 4,6 millions € pour abus de position dominante

2025-11-06 11:32:58
L'Autorité de la concurrence sanctionne Doctolib d'une amende de 4,6 millions € pour avoir verrouillé son marché par des pratiques anticoncurrentielles. Doctolib fait appel de la décision. The post...

Lire la suite »

USN-7835-5: Linux kernel (Oracle) vulnerabilities

2025-11-06 11:12:21
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; ...

Lire la suite »

Keeper Security launches Forcefield to defend against memory-based attacks on Windows devices

2025-11-06 10:55:16
Keeper Security has unveiled Keeper Forcefield™, a new kernel-level endpoint security product designed to stop one of the fastest-growing cyber threats: memory-based attacks. The company, known for...

Lire la suite »

Bitdefender Named a Representative Vendor in the 2025 Gartner® Market Guide for Managed Detection and Response

2025-11-06 10:43:00
Bitdefender has once again been recognized as a Representative Vendor in the Gartner® Market Guide for Managed Detection and Response (MDR) — marking the fourth consecutive year of inclusion. According...

Lire la suite »

Cyberattacks on UK water systems reveal rising risks to critical infrastructure

2025-11-06 10:29:56
New data shows hackers targeted UK water systems five times since 2024, raising concerns about critical infrastructure defenses worldwide.

Lire la suite »

Rapport phishing secteur hôtelier : quand les clients payent leur réservation une fois à l'hôtel et une fois au cybercriminel

2025-11-06 10:22:49
Sekoia.io (société française de cybersécurité) vient de réaliser un rapport sur une campagne de phishing ciblant l'industrie touristique. Voici une synthèse du rapport : Le nouveau rapport de...

Lire la suite »

Rapport APT d'ESET : une guerre silencieuse entre puissances numériques (Avril-Septembre 2025)

2025-11-06 10:19:32
ESET Research publie son rapport d'activité APT couvrant la période d'avril à septembre 2025, mettant en lumière les opérations de plusieurs groupes de Menaces Persistantes Avancées (APT) surveillés...

Lire la suite »

USN-7863-1: Linux kernel vulnerabilities

2025-11-06 10:05:48
Jean-Claude Graf, Sandro Rüegge, Ali Hajiabadi, and Kaveh Razavi discovered that the Linux kernel contained insufficient branch predictor isolation between a guest and a userspace hypervisor for certain...

Lire la suite »

Sandworm hackers use data wipers to disrupt Ukraine's grain sector

2025-11-06 10:01:28
Russian state-backed hacker group Sandworm has deployed multiple data-wiping malware families in attacks targeting Ukraine's education, government, and the grain sector, the country's main revenue source....

Lire la suite »

Multiple ChatGPT Security Bugs Allow Rampant Data Theft

2025-11-06 10:00:00
Attackers can use them to inject arbitrary prompts, exfiltrate personal user information, bypass safety mechanisms, and take other malicious actions.

Lire la suite »

Amazon contre les agents IA de Perplexity Comet

2025-11-06 09:48:05
Comme d’autres navigateurs basés sur l'IA, Comet développé par Perplexity, peut enchaîner plusieurs tâches à (...)

Lire la suite »

Black Friday et Cyber Monday : vigilance accrue pour les commerçants face aux risques cyber

2025-11-06 09:43:29
A l’approche du Black Friday, le 28 novembre, et du Cyber Monday, le 1er décembre, les commerçants se préparent à une période de forte activité, où la performance et la sécurité de leurs...

Lire la suite »

Alleged Russia-linked Curly COMrades exploit Windows Hyper-V to evade EDRs

2025-11-06 09:41:07
Curly COMrades threat actors exploit Windows Hyper-V to hide Linux VMs, evade EDR tools, and deploy custom malware undetected. Bitdefender researchers, aided by Georgia's CERT, uncovered that Curly...

Lire la suite »

Lux Courtage lance une cyber-assurance

2025-11-06 09:35:35
Depuis quelques mois, nous assistons à une prolifération des cyber-assurances ciblant surtout les PME et les collectivités et pour (...)

Lire la suite »

Multiple Django Flaws Could Allow SQL Injection and Denial-of-Service Attacks

2025-11-06 09:22:52
The Django development team has released critical security patches addressing two significant vulnerabilities that could expose applications to denial-of-service attacks and SQL injection exploits. The...

Lire la suite »

USN-7862-1: Linux kernel vulnerability

2025-11-06 09:16:50
Jean-Claude Graf, Sandro Rüegge, Ali Hajiabadi, and Kaveh Razavi discovered that the Linux kernel contained insufficient branch predictor isolation between a guest and a userspace hypervisor for certain...

Lire la suite »

USN-7861-1: Linux kernel vulnerabilities

2025-11-06 09:10:53
Jean-Claude Graf, Sandro Rüegge, Ali Hajiabadi, and Kaveh Razavi discovered that the Linux kernel contained insufficient branch predictor isolation between a guest and a userspace hypervisor for certain...

Lire la suite »

Comment Poclain et Schneider Electric protègent leurs systèmes IT/OT

2025-11-06 09:07:06
Dans le cadre du Grand Théma CIO/Le Monde Informatique consacré à la cybersécurité, nous avons reçu Sébastien (...)

Lire la suite »

USN-7860-1: Linux kernel vulnerability

2025-11-06 09:02:26
Jean-Claude Graf, Sandro Rüegge, Ali Hajiabadi, and Kaveh Razavi discovered that the Linux kernel contained insufficient branch predictor isolation between a guest and a userspace hypervisor for certain...

Lire la suite »

WatchGuard Fireware OS IKEv2 Out-of-Bounds Vulnerability

2025-11-06 07:36:48
What is the Vulnerability? A critical Out-of-Bounds Write vulnerability (CVE-2025-9242) exists in the WatchGuard Fireware OS iked process, which handles...

Lire la suite »

Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection

2025-11-06 07:22:00
The threat actor known as Curly COMrades has been observed exploiting virtualization technologies as a way to bypass security solutions and execute custom malware. According to a new report from Bitdefender,...

Lire la suite »

The TechBeat: Nvidia Hits Trillion Valuation (11/6/2025)

2025-11-06 07:10:57
How are you, hacker? 🪐Want to know what's trending right now?: The Techbeat by HackerNoon has got you covered with fresh content from our trending stories of the day! Set email preference here. ...

Lire la suite »

The Painful Joy of Refusing Documentation

2025-11-06 06:12:55
From AI hallucinations to debugging disasters, this essay explores the reasons why developers should stop fumbling around and start reading the docs.

Lire la suite »

SonicWall Confirms State-Sponsored Hackers Behind September Cloud Backup Breach

2025-11-06 05:40:00
SonicWall has formally implicated state-sponsored threat actors as behind the September security breach that led to the unauthorized exposure of firewall configuration backup files. "The malicious activity...

Lire la suite »

Synthient Credential Stuffing Threat Data - 1,957,476,021 breached accounts

2025-11-06 04:58:49
During 2025, the threat-intelligence firm Synthient aggregated 2 billion unique email addresses disclosed in credential-stuffing lists found across multiple malicious internet sources. Comprised of email...

Lire la suite »

Cloudflare Scrubs Aisuru Botnet from Top Domains List

2025-11-06 02:04:36
For the past week, domains associated with the massive Aisuru botnet have repeatedly usurped Amazon, Apple, Google and Microsoft in Cloudflare's public ranking of the most frequently requested websites....

Lire la suite »

APT 'Bronze Butler' Exploits Zero-Day to Root Japan Orgs

2025-11-06 02:00:00
A critical security issue in a popular endpoint manager (CVE-2025-61932) allowed Chinese state-sponsored attackers to backdoor Japanese businesses.

Lire la suite »

List of 13 new domains

2025-11-06 00:00:00
.fr acces-suspendu[.fr] (registrar: GANDI) aiglefrance[.fr] (registrar: Hosting Concepts B.V. d/b/a Openprovider) allenedmondsfrance[.fr] (registrar: Hosting Concepts B.V. d/b/a Openprovider) betwinnerfrance[.fr]...

Lire la suite »

Multiples vulnérabilités dans les produits Cisco (06 novembre 2025)

06/11/2025
De multiples vulnérabilités ont été découvertes dans les produits Cisco. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et un déni de service à distance....

Lire la suite »

Multiples vulnérabilités dans les produits VMware (06 novembre 2025)

06/11/2025
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.

Lire la suite »

Multiples vulnérabilités dans Synacor Zimbra Collaboration (06 novembre 2025)

06/11/2025
De multiples vulnérabilités ont été découvertes dans Synacor Zimbra Collaboration. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données,...

Lire la suite »

Vulnérabilité dans Mattermost Server (06 novembre 2025)

06/11/2025
Une vulnérabilité a été découverte dans Mattermost Server. Elle permet à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.

Lire la suite »

Multiples vulnérabilités dans Suricata (06 novembre 2025)

06/11/2025
De multiples vulnérabilités ont été découvertes dans Suricata. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.

Lire la suite »

Multiples vulnérabilités dans Google Chrome (06 novembre 2025)

06/11/2025
De multiples vulnérabilités ont été découvertes dans Google Chrome. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.

Lire la suite »

Multiples vulnérabilités dans Apple iOS et iPadOS (06 novembre 2025)

06/11/2025
De multiples vulnérabilités ont été découvertes dans Apple iOS et iPadOS. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données...

Lire la suite »