Toute l'actualité de la Cybersécurité


Marquis data breach impacts over 74 US banks, credit unions

2025-12-03 22:06:07
Financial software provider Marquis Software Solutions is warning that it suffered a data breach that impacted dozens of banks and credit unions across the US. [...]

Lire la suite »

Critical React Flaw Triggers Calls for Immediate Action

2025-12-03 21:51:03
The vulnerability, which was assigned two CVEs with maximum CVSS scores of 10, may affect more than a third of cloud service providers.

Lire la suite »

Best 5 Dark Web Intelligence Platforms

2025-12-03 21:39:42
Cybersecurity today is about a lot more than just firewalls and antivirus software. As organisations adopt cloud computing,…

Lire la suite »

Critical flaw in WordPress add-on for Elementor exploited in attacks

2025-12-03 21:31:20
Attackers are exploiting a critical-severity privilege escalation vulnerability (CVE-2025-8489) in the King Addons for Elementor plugin for WordPress, which lets them obtain administrative permissions...

Lire la suite »

Arizona AG Sues Temu Over 'Stealing' User Data

2025-12-03 21:00:58
The suit alleges the Chinese retailer's app secretly accesses and harvests users' sensitive information without their knowledge or consent.

Lire la suite »

French DIY retail giant Leroy Merlin discloses a data breach

2025-12-03 20:52:36
Leroy Merlin is sending security breach notifications to customers in France, informing them that their personal data was compromised. [...]

Lire la suite »

Freedom Mobile discloses data breach exposing customer data

2025-12-03 20:28:01
Freedom Mobile, the fourth-largest wireless carrier in Canada, has disclosed a data breach after attackers hacked into its customer account management platform and stole the personal information of an...

Lire la suite »

Shai Hulud 2.0, now with a wiper flavor

2025-12-03 20:10:47
Kaspersky researchers uncover a new version of the Shai Hulud npm worm, which is attacking targets in Russia, India, Brazil, China, and other countries, and has wiper features.

Lire la suite »

University of Pennsylvania and University of Phoenix disclose data breaches

2025-12-03 19:17:49
The University of Pennsylvania and the University of Phoenix confirm they were hit in the Oracle E-Business Suite hacking campaign. The University of Pennsylvania (Penn) and the University of Phoenix...

Lire la suite »

India's New SIM-Binding Rule for WhatsApp, Signal, Telegram and Other Messaging Platforms

2025-12-03 18:23:57
India has implemented a mandatory SIM-binding requirement for messaging applications, including WhatsApp, Telegram, Signal, Snapchat, and others. The Department of Telecommunications issued a directive...

Lire la suite »

Critical RSC Bugs in React and Next.js Allow Unauthenticated Remote Code Execution

2025-12-03 18:19:00
A maximum-severity security flaw has been disclosed in React Server Components (RSC) that, if successfully exploited, could result in remote code execution. The vulnerability, tracked as CVE-2025-55182,...

Lire la suite »

Discover the AI Tools Fueling the Next Cybercrime Wave — Watch the Webinar

2025-12-03 17:56:00
Remember when phishing emails were easy to spot? Bad grammar, weird formatting, and requests from a "Prince" in a distant country? Those days are over. Today, a 16-year-old with zero coding skills and...

Lire la suite »

Longwatch RCE Vulnerability Let Attackers Execute Remote Code With Elevated Privileges

2025-12-03 17:50:16
A critical security vulnerability has been discovered in Industrial Video & Control’s Longwatch video surveillance system, allowing attackers to execute malicious code with elevated privileges...

Lire la suite »

Hackers Can Weaponize Claude Skills to Execute MedusaLocker Ransomware Attack

2025-12-03 17:48:07
A new feature in Anthropic’s Claude AI, known as Claude Skills, has been identified as a potential vector for ransomware attacks. This feature, designed to extend the AI’s capabilities through...

Lire la suite »

Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation

2025-12-03 17:46:36
Microsoft has silently plugged a security flaw that has been exploited by several threat actors since 2017 as part of the company's November 2025 Patch Tuesday updates, according to ACROS Security's 0patch. The...

Lire la suite »

Fake ChatGPT Atlas Browser Used in ClickFix Attack to Steal Passwords

2025-12-03 17:34:37
Cybersecurity researchers have uncovered a critical ChatGPT Atlas browser attack, confirming the danger of the ongoing surge in the ClickFix threat.

Lire la suite »

Russia blocks Roblox over distribution of LGBT "propaganda"

2025-12-03 17:33:57
Roskomnadzor, Russia's telecommunications watchdog, has blocked access to the Roblox online gaming platform for failing to stop the distribution of what it described as LGBT propaganda and extremist materials....

Lire la suite »

WordPress King Addons Flaw Under Active Attack Lets Hackers Make Admin Accounts

2025-12-03 17:08:00
A critical security flaw impacting a WordPress plugin known as King Addons for Elementor has come under active exploitation in the wild. The vulnerability, CVE-2025-8489 (CVSS score: 9.8), is a case of...

Lire la suite »

Pour le cloud de confiance, SFR Business s'allie à Cloud Temple

2025-12-03 17:07:55
A l'avant-poste des offres de cloud de confiance en France (aux côtés d'Orange avec Cloudwatt) en 2012 avec Numergy (qui a sombré (...)

Lire la suite »

Google expands Android scam protection feature to Chase, Cash App in U.S.

2025-12-03 17:00:00
Google is expanding support for its Android's in-call scam protection to multiple banks and financial applications in the United States. [...]

Lire la suite »

AI Safety Index 2025 : un bilan inquiétant de la sécurité de l'IA

2025-12-03 16:59:41
Le Future of Life Institute tire la sonnette d'alarme : aucune des huit grandes entreprises d'IA évaluées n'obtient une note satisfaisante en matière de sécurité. The post AI Safety Index 2025 :...

Lire la suite »

Android expands pilot for in-call scam protection for financial apps

2025-12-03 16:59:00
Posted by Aden Haussmann, Associate Product Manager and Sumeet Sharma, Play Partnerships Trust & Safety Lead Android uses the best of Google AI and our advanced security expertise to tackle mobile scams...

Lire la suite »

HPE unifie ses forces réseau pour les usines IA

2025-12-03 16:58:21
Avec près de 5 000 personnes attendues (clients, partenaires et employés), l'événement HPE Discover Europe 2025, qui se tient (...)

Lire la suite »

Microsoft "mitigates" Windows LNK flaw exploited as zero-day

2025-12-03 16:45:30
Microsoft has silently "mitigated" a high-severity Windows LNK vulnerability exploited by multiple state-backed and cybercrime hacking groups in zero-day attacks. [...]

Lire la suite »

Hackers Exploit Critical Yearn Finance's yETH Pool Vulnerability to Steal Million in Ethereum

2025-12-03 16:41:41
The decentralized finance sector witnessed a devastating breach targeting Yearn Finance's yETH pool, resulting in the theft of approximately million on November 30, 2025. The attacker executed a...

Lire la suite »

Fonctions durables, instances managées… AWS Lambda devient plus flexible

2025-12-03 16:36:19
AWS donne davantage de latitude sur l'exécution des fonctions Lambda et sur le contrôle de l'infrastructure sous-jacente. The post Fonctions durables, instances managées… AWS Lambda devient plus...

Lire la suite »

Code Review Anti-Patterns: How to Stop Nitpicking Syntax and Start Improving Architecture

2025-12-03 16:30:12
Code reviews are expensive. If your team is spending valuable senior engineering hours arguing about semicolon placement or variable casing, you are wasting money. High-impact code reviews delegate the...

Lire la suite »

Inside the Research Project Examining Hidden Bias in News Coverage

2025-12-03 16:30:06
A research group is conducting an anonymous survey to understand how readers perceive subtle linguistic bias in news articles. Participants answer demographic questions, learn the difference between bias...

Lire la suite »

Formalizing Generative Active Learning for Instance Segmentation

2025-12-03 16:15:03
Proposes BSGAL, a Generative Active Learning algorithm that uses gradient cache to filter unlimited synthetic data.

Lire la suite »

29.7 Tbps DDoS Attack Via Aisuru Botnet Breaks Internet With New World Record

2025-12-03 16:14:27
A new 29.7 Tbps distributed denial-of-service (DDoS) blast from the Aisuru botnet has set a new world record for attack volume, underscoring how fragile core internet infrastructure remains under extreme...

Lire la suite »

Hackers Using Calendly-Themed Phishing Attack to Steal Google Workspace Account

2025-12-03 16:13:59
A sophisticated phishing campaign has emerged targeting business professionals with Calendly-themed emails, combining social engineering with advanced credential theft techniques. The attack specifically...

Lire la suite »

The HackerNoon Newsletter: Porting Scientific Algorithms from MATLAB to JavaScript (12/3/2025)

2025-12-03 16:02:24
How are you, hacker? 🪐 What's happening in tech today, December 3, 2025? The HackerNoon Newsletter brings the HackerNoon ...

Lire la suite »

Active Learning and Data Influence: Core Concepts and Evolution

2025-12-03 16:00:07
Highlights the novelty of applying these methods to generated data in complex instance segmentation.

Lire la suite »

Any and Some Keywords in Swift: A Guide to Understanding Both

2025-12-03 15:45:04
Learn how the any and some keywords enable flexible type handling and protocol usage in Swift, enhancing type safety and performance in your applications.

Lire la suite »

Attackers have a new way to slip past your MFA

2025-12-03 15:44:13
Attackers are using a tool called Evilginx to steal session cookies, letting them bypass the need for a multi-factor authentication (MFA) token.

Lire la suite »

Brazil Hit by Banking Trojan Spread via WhatsApp Worm and RelayNFC NFC Relay Fraud

2025-12-03 15:32:00
The threat actor known as Water Saci is actively evolving its tactics, switching to a sophisticated, highly layered infection chain that uses HTML Application (HTA) files and PDFs to propagate via WhatsApp...

Lire la suite »

The Deal Pipeline Illusion: How AI Projects Die Before They're Even Signed

2025-12-03 15:30:01
Most AI projects die in the pipeline under optimism, shifting scopes, and timelines that were never tied to physics. Kickoff only exposes the gap everyone pretended not to see. The only fix is to validate...

Lire la suite »

K7 Antivirus Vulnerability Allows Attackers Gain SYSTEM-level Privileges

2025-12-03 15:28:20
A serious privilege escalation vulnerability in K7 Ultimate Security, an antivirus product from K7 Computing, was found by abusing named pipes with overly permissive access control lists. This flaw enables...

Lire la suite »

Architecture Patterns That Enable Cycode alternatives at Scale

2025-12-03 15:26:36
Guide to scale ready code security with event driven scans unified data and API first design for large teams seeking strong growth aligned control.

Lire la suite »

Shai-Hulud 2.0 Malware Attack Compromised 30,000 Repositories and Stolen 500 GitHub Usernames and Tokens

2025-12-03 15:20:02
A significant supply chain security breach has emerged with the discovery of Shai-Hulud 2.0, a sophisticated malware that has compromised over 30,000 GitHub repositories since its emergence on November...

Lire la suite »

Deep dive into DragonForce ransomware and its Scattered Spider connection

2025-12-03 15:05:15
DragonForce expanded its ransomware operation in 2025 by working with English-speaking hackers known for advanced social engineering and initial access. Acronis explains how the "Scattered Spider" collaboration...

Lire la suite »

Eon lève 300 M$ pour transformer le back-up cloud

2025-12-03 14:52:58
Positionné comme une alternative cloud-native aux fournisseurs traditionnels de sauvegarde qui se concentrent d’abord sur la protection (...)

Lire la suite »

Malicious Rust Evm-Units Mimic as EVM Version Silently Executes OS-specific Payloads

2025-12-03 14:51:05
The open-source software supply chain recently encountered a deceptive threat in the form of evm-units, a malicious Rust crate published by the author ablerust. Masquerading as a standard utility for...

Lire la suite »

Big Tech Wants to Trade Electricity. What Could Go Wrong?

2025-12-03 14:46:46
Big Tech is pushing deeper into the energy sector, from Meta and Microsoft seeking approval to trade electricity to markets betting on Tesla's expanding energy business. Poll results show strong public...

Lire la suite »

Why Binary Feedback May Be Enough to Train Better Media-Bias Classifiers

2025-12-03 14:30:07
The article evaluates NewsUnfold, a human-in-the-loop news reader that collects user feedback to detect media bias. Findings show that ordinary readers can reliably correct misclassified sentences, improve...

Lire la suite »

Ubuntu 18.04: USN-7907-2 Linux Kernel Important Security Issues

2025-12-03 14:24:13
Several security issues were fixed in the Linux kernel.

Lire la suite »

Storm-0900 Hackers Leveraging Parking Ticket and Medical Test Themes in Massive Phishing Attack

2025-12-03 14:18:20
On Thanksgiving eve, a sophisticated threat actor known as Storm-0900 launched a high-volume phishing campaign targeting users across the United States. Microsoft Threat Intelligence security analysts...

Lire la suite »

AWS re:Invent : l'AI Factory, une grammaire désormais légitime ?

2025-12-03 14:13:41
La notion d'AI Factory devient une marque chez AWS, qui poursuit l'édification du socle technologique à l'occasion de la conférence re:Invent. The post AWS re:Invent : l’AI Factory, une grammaire...

Lire la suite »

How attackers use real IT tools to take over your computer

2025-12-03 14:12:59
We've seen a new wave of attacks exploiting legitimate Remote Monitoring and Management (RMM) tools to remotely control victims' systems.

Lire la suite »

Ubuntu 18.04 & 16.04: Linux Kernel Important Security Update USN-7907-1

2025-12-03 14:09:25
Several security issues were fixed in the Linux kernel.

Lire la suite »

Aisuru botnet behind new record-breaking 29.7 Tbps DDoS attack

2025-12-03 14:01:04
In just three months, the massive Aisuru botnet launched more than 1,300 distributed denial-of-service attacks, one of them setting a new record with a peak at 29.7 terabits per second. [...]

Lire la suite »

The Ransomware Holiday Bind: Burnout or Be Vulnerable

2025-12-03 13:52:29
Ransomware groups target enterprises during off-hours, weekends, and holidays when security teams are stretched thin and response times lag.

Lire la suite »

A Decade of Ransomware Chaos – How Much It Costs

2025-12-03 13:49:06
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Dec. 3, 2025 – Read the full story in IoT for all IoT for all reports that over the past decade, ransomware...

Lire la suite »

Apex Fusion Connects Three Blockchain Architectures: What This Means for DeFi's 0B Future

2025-12-03 13:45:22
Apex Fusion deployed bAP3X on Base through Skyline's Blade EVM infrastructure, connecting its tri-chain architecture (UTXO-based Vector, EVM-compatible Nexus, and Prime coordinator) to Coinbase's Layer...

Lire la suite »

Fileless protection explained: Blocking the invisible threat others miss

2025-12-03 13:33:07
Your antivirus scans files. But what about attacks that never create files? Here's how we catch the threats hiding on your family's computers.

Lire la suite »

Prédictions cybersécurité 2026 : l'IA et les réglementations changent la donne

2025-12-03 13:23:16
En cette fin d'année 2025, Rocket Software analyse l'importance que l'intelligence artificielle (IA) prend en matière de cybersécurité, mais aussi de cybermenaces.  Alors que les entreprises...

Lire la suite »

University of Phoenix discloses data breach after Oracle hack

2025-12-03 13:23:10
The University of Phoenix (UoPX) has joined a growing list of U.S. universities breached in a Clop data theft campaign targeting vulnerable Oracle E-Business Suite instances in August 2025. [...]

Lire la suite »

Researchers spotted Lazarus's remote IT workers in action

2025-12-03 13:21:17
Researchers exposed a Lazarus scheme using remote IT workers tied to North Korea's Famous Chollima APT group in a joint investigation. Researchers filmed Lazarus APT group's remote-worker scheme in...

Lire la suite »

Zimperium dévoile ses prédictions 2026 : l'IA et les nouvelles régulations vont remodeler la sécurité mobile

2025-12-03 13:20:05
À l'approche de 2026, le paysage de la cybersécurité mobile s'apprête à franchir un nouveau cap. Entre l'évolution rapide des usages, l'accélération des capacités offertes par l'IA...

Lire la suite »

Ubuntu 25.10: Major Authentication Vulnerability in KDE Connect USN-7905-1

2025-12-03 13:17:14
KDE Connect could allow authentication of impersonated devices.

Lire la suite »

Researchers Explain How Delay–Doppler Spread Affects Interference in Discrete Channel Models

2025-12-03 13:00:03
This section examines how wireless channels are discretized across time and frequency, explaining how delay and Doppler spreads generate ISI/ICI, how bi-orthogonality breaks down, and why pulse shape...

Lire la suite »

CRA and AI Regulation: What's Next for Software Compliance?

2025-12-03 13:00:01
The days of postponing cyber regulations are over.

Lire la suite »

Oracle Linux 7: ELSA-2025-21407 libtiff Important Buffer Overflow Issues

2025-12-03 12:41:42
The following updated rpms for Oracle Linux 7 have been uploaded to the Unbreakable Linux Network:

Lire la suite »

Oracle Linux 7: Kernel Important Update ELSA-2025-28026 CVE-2025-40019

2025-12-03 12:41:34
The following updated rpms for Oracle Linux 7 have been uploaded to the Unbreakable Linux Network:

Lire la suite »

Oracle Linux 8 ELSA-2025-22388 Kernel Moderate DoS Threat

2025-12-03 12:41:25
The following updated rpms for Oracle Linux 8 have been uploaded to the Unbreakable Linux Network:

Lire la suite »

Zoom sur les outils collaboratifs Work et Meet d'Oodrive

2025-12-03 12:39:50
Face aux besoins croissants de sécurité et de conformité des données, les entreprises recherchent des solutions collaboratives (...)

Lire la suite »

Simplon forme des demandeurs d'emploi à la cybersécurité avec Metsys

2025-12-03 12:39:19
En France, le secteur de la cybersécurité manque toujours de profils qualifiés alors que les menaces ne cessent d’augmenter. (...)

Lire la suite »

CoinAvatar Rolls Out Platform Optimizations Targeting Mainstream Web2 Adoption

2025-12-03 12:28:19
CoinAvatar has rolled out major platform optimizations across its multi-chain infrastructure. The updates focus on generation speed improvements, smart contract efficiency, and enhanced user experience....

Lire la suite »

Fixing a Slow SOC: Top 3 Solutions that Actually Work

2025-12-03 12:07:43
Smarter SOC performance with faster triage, proactive defence, and a unified stack powered by instant alert context from ANY.RUN to cut MTTD and MTTR.

Lire la suite »

AWS lance des agents IA pour le codage, la sécurité et le DevOps

2025-12-03 11:42:35
Progressivement, AWS se positionne sur l’IA agentique. Lors de son évènement Re :Invent à Las Vegas, le fournisseur a présenté (...)

Lire la suite »

AI Bolsters Python Variant of Brazilian WhatsApp Attacks

2025-12-03 10:56:24
Water Saci has upgraded its self-propagating malware to compromise banks and cryptocurrency exchanges by targeting enterprise users of the popular chat app.

Lire la suite »

7 Year Long ShadyPanda Attack Spied on 4.3M Chrome and Edge Users

2025-12-03 10:44:31
Koi Security exposes ShadyPanda, a group that used trusted Chrome/Edge extensions to infect 4.3 million users over 7 years for deep surveillance and corporate espionage.

Lire la suite »

The Vault or the Vulnerability? Why Your Password Manager Might Be the New Cyber Risk

2025-12-03 10:20:27
For years, the cybersecurity community has fought the scourge of weak, reused passwords. The solution, which was overwhelmingly adopted by both businesses and consumers, was the password manager (PM)....

Lire la suite »

Exploits and vulnerabilities in Q3 2025

2025-12-03 10:00:59
This report provides statistical data on vulnerabilities published and exploits we researched during the third quarter of 2025. It also includes summary data on the use of C2 frameworks.

Lire la suite »

Chopping AI Down to Size: Turning Disruptive Technology into a Strategic Advantage

2025-12-03 09:56:00
Most people know the story of Paul Bunyan. A giant lumberjack, a trusted axe, and a challenge from a machine that promised to outpace him. Paul doubled down on his old way of working, swung harder, and...

Lire la suite »

Picklescan Bugs Allow Malicious PyTorch Models to Evade Scans and Execute Code

2025-12-03 09:30:00
Three critical security flaws have been disclosed in an open-source utility called Picklescan that could allow malicious actors to execute arbitrary code by loading untrusted PyTorch models, effectively...

Lire la suite »

India mandates SIM-linked messaging apps to fight rising fraud

2025-12-03 09:20:36
India ordered messaging apps to work only with active SIM cards linked to users' phone numbers to curb fraud and misuse. India’s Department of Telecommunications (DoT) now requires providers of...

Lire la suite »

Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems

2025-12-03 08:39:00
Cybersecurity researchers have discovered a malicious Rust package that's capable of targeting Windows, macOS, and Linux systems, and features malicious functionality to stealthily execute on developer...

Lire la suite »

UNC1549 Critical Infrastructure Espionage Attack

2025-12-03 04:36:08
What is the Attack? A suspected Iran-linked espionage group tracked as UNC1549 is actively targeting aerospace, defense, and telecommunications organizations...

Lire la suite »

China Researches Ways to Disrupt Satellite Internet

2025-12-03 02:00:00
While satellite constellations — such as Starlink — are resilient, 2,000 drones could cut communications to a region the size of Taiwan, researchers find.

Lire la suite »

The Browser Defense Playbook: Stopping the Attacks That Start on Your Screen

2025-12-03 00:00:04
85% of daily work occurs in the browser. Unit 42 outlines key security controls and strategies to make sure yours is secure. The post The Browser Defense Playbook: Stopping the Attacks That Start on Your...

Lire la suite »

List of 24 new domains

2025-12-03 00:00:00
.fr app-pylib[.fr] (registrar: TLD Registrar Solutions Ltd) asctsncf[.fr] (registrar: KEY-SYSTEMS GmbH) betonredjouer[.fr] (registrar: NETIM) casiniajouer[.fr] (registrar: NETIM) felixspinjouer[.fr] (registrar:...

Lire la suite »

Multiples vulnérabilités dans Google Chrome (03 décembre 2025)

03/12/2025
De multiples vulnérabilités ont été découvertes dans Google Chrome. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.

Lire la suite »

Multiples vulnérabilités dans Google Pixel (03 décembre 2025)

03/12/2025
De multiples vulnérabilités ont été découvertes dans Google Pixel. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de...

Lire la suite »

Multiples vulnérabilités dans Python (03 décembre 2025)

03/12/2025
De multiples vulnérabilités ont été découvertes dans Python. Elles permettent à un attaquant de provoquer un déni de service à distance.

Lire la suite »