Toute l'actualité de la Cybersécurité


Des chercheurs cassent les enclaves sécurisées des CPU

2026-01-05 09:01:15
L'informatique confidentielle, qui s'appuie sur des technologies matérielles comme que Intel SGX (Software Guard Extensions) et AMD SEV (Secure (...)

Lire la suite »

A week in security (December 29 – January 4)

2026-01-05 08:02:00
A list of topics we covered in the week of December 29 2025 to January 4 of 2026

Lire la suite »

Fusions & acquisitions : De la Due Diligence à l'intégration IT

2026-01-05 07:30:21
A l'image de l'importance prise par l'IT dans le fonctionnement des entreprises, le process de Due Diligence de l'entreprise cible d'une fusion/acquisition doit absolument intégrer un volet...

Lire la suite »

Threat Actor Allegedly Claim Leak of NordVPN Salesforce Database with Source Codes

2026-01-05 07:28:01
A threat actor operating under the identifier 1011 has publicly claimed to have obtained and leaked sensitive data from NordVPN’s development infrastructure on a dark web forum. The breach reportedly...

Lire la suite »

GHOSTCREW – AI-based Red Team Toolkit for Penetration Testing Invoking Metasploit, Nmap and Other Tools

2026-01-05 07:21:47
GHOSTCREW emerges as a game-changing open-source toolkit for red teamers and penetration testers. This AI-powered assistant leverages large language models, integrates the MCP protocol, and supports the...

Lire la suite »

Sedgwick discloses data breach after TridentLocker ransomware attack

2026-01-05 06:50:03
Sedgwick confirmed a cyber incident at its federal contractor unit after TridentLocker claimed to steal 3.4GB of data. Sedgwick is a leading global claims management and risk services provider operating...

Lire la suite »

Multiple Vulnerabilities in QNAP Tools Let Attackers Obtain Secret Data

2026-01-05 05:59:07
QNAP has patched multiple security vulnerabilities in its License Center application that could allow attackers to access sensitive information or disrupt services on affected NAS devices. The issues,...

Lire la suite »

My Top 5 Recommendations on OT Cybersecurity Student Upskilling

2026-01-05 04:21:55
I get asked about where to start learning OT cybersecurity as a student a lot. I fully realize that attention spans are short and people are busy, so without further ado let’s get to my top five...

Lire la suite »

Destination Cyber Podcast on OT

2026-01-05 03:52:11
Please see my recent podcast on OT foundations and current events with Destination Cyber from KBI.FM!

Lire la suite »

Hackers Trapped in Resecurity's Honeypot During Targeted Attack on Employee Network

2026-01-05 02:28:11
Resecurity deploys synthetic data honeypots to outsmart threat actors, turning reconnaissance into actionable intelligence. A recent operation not only trapped an Egyptian-linked hacker but also duped...

Lire la suite »

Researcher Wipes White Supremacist Dating Sites, Leaks Data on okstupid.lol

2026-01-05 01:36:49
Security researcher in "Martha Root" in Pink Power Ranger deletes white supremacist dating sites live onstage, leaks 8,000 profiles and 100GB of data at Chaos Communication Congress (CCC) 2025.

Lire la suite »

Les cybercriminels achètent de plus en plus des accés d'employés

2026-01-05 00:32:47
Alerte sur l'achat d'insiders : des employés payés par des pirates pour offrir leur accés professionnel....

Lire la suite »

Piratage de la Fédération française de tir : nouveau cambriolage

2026-01-05 00:13:08
Novembre 2025, un fichier présenté comme la liste des détenteurs d'armes en France circule à la vente dans un blackmarket. Trois mois plus tard, un nouveau licencié a été braqué chez lui....

Lire la suite »