Toute l'actualité de la Cybersécurité
Sha1-Hulud Supply Chain Attack: 800+ npm Packages and Thousands of GitHub Repos Compromised
2025-11-24 15:36:00
A massive resurgence of the Sha1-Hulud supply chain malware has struck the open-source ecosystem, compromising over 800 npm packages and tens of thousands of GitHub repositories in a campaign the attackers...
Shai Hulud npm Worm Infects 19,000 Packages in Major Supply Chain Attack
2025-11-24 15:32:01
The Shai Hulud worm's "Second Coming" has compromised over 19,000 public repositories. We detail the attacker's mistake, the target packages, and mandatory security tips.
Les gangs de ransomware attaquent le stockage S3 d'AWS
2025-11-24 15:25:52
Traditionnellement, les cybercriminels s’attaquent aux sauvegardes sur site dans le cadre d’attaques par rançongiciel. Avec la montée (...)
Dropping Elephant Hacker Group Attacks Defense Sector Using Python Backdoor via MSBuild Dropper
2025-11-24 15:11:41
India-aligned threat group Dropping Elephant has launched a sophisticated multi-stage cyberattack targeting Pakistan’s defense sector using a Python-based remote access trojan disguised within an...
SCCM and WSUS in a Hybrid World: Why It's Time for Cloud-native Patching
2025-11-24 15:01:11
Hybrid work exposes the limits of SCCM and WSUS, with remote devices often missing updates and WSUS now deprecated. Action1's cloud-native patching keeps devices updated from any location, strengthening...
Windows 365 accueille un espace sécurisé pour les agents IA
2025-11-24 14:57:03
Microsoft a dévoilé une dernière fonction pour son service de PC as a Service Windows 365 : un environnement sécurisé (...)
Delta Dental of Virginia data breach impacts 145,918 customers
2025-11-24 14:49:51
Delta Dental of Virginia suffered a data breach that exposed personal and health data of about 146,000 customers after the hack of an email account. A security breach at the dental care provider Delta...
Shai-Hulud malware infects 500 npm packages, leaks secrets on GitHub
2025-11-24 14:32:40
Hundreds of trojanized versions of well-known packages such as Zapier, ENS Domains, PostHog, and Postman have been planted in the npm registry in a new Shai-Hulud supply-chain campaign. [...]
popEVE : l'IA qui révolutionne le diagnostic des maladies génétiques rares
2025-11-24 14:23:25
Des chercheurs ont développé un modèle d'IA capable d'identifier les mutations génétiques pathogènes avec une précision de 98%. Cette avancée majeure pourrait transformer la prise en charge de...
APT35 Hacker Groups Internal Documents Leak Exposes their Targets and Attack Methods
2025-11-24 14:22:02
In October 2025, a significant breach exposed the internal workings of APT35, also known as Charming Kitten, a cyber unit operating within Iran’s Islamic Revolutionary Guard Corps Intelligence Organization....
NIS 2 : les entités assujetties peuvent se pré-enregistrer
2025-11-24 14:07:26
NIS 2 : les entités assujetties peuvent se pré-enregistrer
anssiadm
lun 24/11/2025 - 14:07
Le service de pré-enregistrement des entités assujetties à la directive...
Harvard University discloses data breach affecting alumni, donors
2025-11-24 14:06:36
Harvard University disclosed over the weekend that its Alumni Affairs and Development systems were compromised in a voice phishing attack, exposing the personal information of students, alumni, donors,...
True Cybersecurity Story: How FreakyClown Robs Banks
2025-11-24 13:43:34
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Nov. 24, 2025 – Listen to the podcast In “How I Rob Banks: And Other Such Places,” renowned ethical...
Tenda N300 Vulnerabilities Let Attacker to Execute Arbitrary Commands as Root User
2025-11-24 13:36:22
Tenda N300 wireless routers and 4G03 Pro portable LTE devices face severe security threats from multiple command injection vulnerabilities that allow attackers to execute arbitrary commands with root...
LLMs Tools Like GPT-3.5-Turbo and GPT-4 Fuels the Development of Fully Autonomous Malware
2025-11-24 13:24:25
Large language models like GPT-3.5-Turbo and GPT-4 are transforming how we work, but they are also opening doors for cybercriminals to create a new generation of malware. Researchers have demonstrated...
Microsoft tests File Explorer preloading for faster performance
2025-11-24 13:08:08
Microsoft is testing a new optional feature that preloads File Explorer in the background to improve launch times on Windows 11 systems. [...]
Second Sha1-Hulud Wave Affects 25,000+ Repositories via npm Preinstall Credential Theft
2025-11-24 13:03:00
Multiple security vendors are sounding the alarm about a second wave of attacks targeting the npm registry in a manner that's reminiscent of the Shai-Hulud attack.
The new supply chain campaign, dubbed...
New EtherHiding Attack Uses Web-Based Attacks to Deliver Malware and Rotate Payloads
2025-11-24 13:02:45
A new threat known as EtherHiding is reshaping how malware spreads through the internet. Unlike older methods that rely on traditional servers to deliver harmful code, this attack uses blockchain smart...
Elite Cyber Veterans Launch Blast Security with M to Turn Cloud Detection into Prevention
2025-11-24 13:00:56
Tel Aviv, Israel, 24th November 2025, CyberNewsWire
ToddyCat APT Accessing Organizations Internal Communications of Employees at Target Companies
2025-11-24 12:53:26
The ToddyCat APT group has developed new ways to access corporate email communications at target organizations. Email remains the main way companies handle business communications, whether through their...
Fake Prettier Extension on VSCode Marketplace Dropped Anivia Stealer
2025-11-24 12:43:57
Cybersecurity firm Checkmarx Zero, in collaboration with Microsoft, removed a malicious 'prettier-vscode-plus' extension from the VSCode Marketplace. The fake coding tool was a Brandjacking attempt designed...
USN-7878-2: cups-filters vulnerabilities
2025-11-24 12:40:41
USN-7878-1 fixed vulnerabilities in cups-filters, This update provides the
corresponding update for CVE-2025-64524 for Ubuntu 25.04.
Original advisory details:
It was discovered that cups-filters incorrectly...
Attackers deliver ShadowPad via newly patched WSUS RCE bug
2025-11-24 12:35:42
Attackers exploited a patched WSUS flaw (CVE-2025-59287) to gain access, use PowerCat for a shell, and deploy the ShadowPad malware. AhnLab SEcurity intelligence Center (ASEC) researchers reported that...
⚡ Weekly Recap: Fortinet Exploit, Chrome 0-Day, BadIIS Malware, Record DDoS, SaaS Breach & More
2025-11-24 12:32:00
This week saw a lot of new cyber trouble. Hackers hit Fortinet and Chrome with new 0-day bugs. They also broke into supply chains and SaaS tools. Many hid inside trusted apps, browser alerts, and software...
To buy or not to buy: How cybercriminals capitalize on Black Friday
2025-11-24 12:30:49
How cybercriminals prepare for Black Friday: phishing, scams and malware targeting online shoppers and gamers, fake sales in spam and real sales on the dark web.
Zapier's NPM Account Hacked – Multiple Packages Infected with Self-Propagating Shai Hulud Malware
2025-11-24 12:12:06
A massive supply chain attack targeting the NPM accounts of automation giant Zapier and the Ethereum Name Service (ENS). Identified by Aikido Security, the campaign is being orchestrated by the same threat...
New RadzaRat Spyware Poses as File Manager to Hijack Android Devices
2025-11-24 11:47:21
Certo Software found RadzaRat, an Android RAT disguised as a file manager that has a 0/66 detection rate on VirusTotal. It keylogs passwords and steals files.
Microsoft to remove WINS support after Windows Server 2025
2025-11-24 11:47:01
Microsoft has warned IT administrators to prepare for the removal of Windows Internet Name Service (WINS) from Windows Server releases starting in November 2034. [...]
{ Tribune Expert } – Comment préparer les agents IA de demain
2025-11-24 11:33:30
Pour les entreprises, il ne s'agit plus de se demander si elles sont en mesure de concevoir un agent pour réaliser un objectif donné, mais s'il s'agit véritablement d'une bonne idée.
The post...
Threats Actors Leverage Python-based Malware to Inject Process into a Legitimate Windows Binary
2025-11-24 11:30:39
Cybersecurity researchers have uncovered a sophisticated Python-based malware that employs process injection techniques to hide inside legitimate Windows binaries. This threat represents a new evolution...
USN-7851-2: runC regression
2025-11-24 11:21:36
USN-7851-1 fixed vulnerabilities in runC. The introduction of a new
upstream release has caused regressions in runc-app and runc-stable.
This update fixes the problem.
Original advisory details:
Lei...
Comment le Shadow AI fait exploser le risque de fuite de données
2025-11-24 11:20:42
Si les grandes entreprises ont cadré les usages de l'IA générative, le risque de voir leurs collaborateurs développer des pratiques de Shadow AI en utilisant des modèles américains ou chinois est...
Chinese DeepSeek-R1 AI Generates Insecure Code When Prompts Mention Tibet or Uyghurs
2025-11-24 11:07:00
New research from CrowdStrike has revealed that DeepSeek's artificial intelligence (AI) reasoning model DeepSeek-R1 produces more security vulnerabilities in response to prompts that contain topics deemed...
Arista et Palo Alto Networks renforcent la sécurité des datacenters
2025-11-24 11:06:49
En matière de sécurité, toutes les initiatives de partenariat sont utiles pour améliorer la protection. Dans ce cadre, les (...)
The "Quiet Quitting" Driver Nobody Talks About: Why Your Performance Reviews Are Backfiring
2025-11-24 10:46:28
74% of high-performing employees say they would consider leaving their job after receiving a vague or generic performance review. The average manager spends less than two hours preparing for what is arguably...
Microsoft: Windows 11 24H2 bug crashes Explorer and Start Menu
2025-11-24 10:41:50
Microsoft has confirmed a critical Windows 11 24H2 bug that causes the File Explorer, the Start Menu, and other key system components to crash when provisioning systems with cumulative updates released...
Is Lasta App Worth It? A Full Breakdown After a Month of Use
2025-11-24 10:33:02
After one month of testing Lasta, this all-in-one wellness app successfully replaced multiple health apps on my phone. It combines workouts (no equipment needed), intermittent fasting programs, meal planning...
The Writer's Paradox: Why Tech's Most Lucrative Skill Is Being Systematically Undervalued
2025-11-24 10:28:18
This article challenges the notion that content creation is expendable in the age of AI, arguing that clarity and strategy remain irreplaceable business assets.
L'OTAN signe un accord de plusieurs millions avec Google Cloud
2025-11-24 10:26:26
Google Cloud annonce un contrat de plusieurs millions de dollars avec l'Agence de communication et d'information de l'OTAN (NCIA).
The post L'OTAN signe un accord de plusieurs millions avec Google Cloud...
The Four-Month Silence: How Microsoft Left Enterprise IT Burning
2025-11-24 10:11:24
Microsoft released KB5062553 on 8 July 2025 as a [cumulative security update for Windows 11 version 24H2] What followed wasn't a bug—it was systemic collapse dressed in update packaging. Microsoft stayed...
AI attack agents are accelerators, not autonomous weapons: the Anthropic attack
2025-11-24 09:38:37
Why today's AI attack agents boost human attackers but still fall far from becoming real autonomous weapons. Anthropic recently published a report that sparked a lively debate about what AI agents can...
Davantage de sécurité et d'hyperviseurs pour Veeam Data Plaform 13
2025-11-24 09:19:31
Si certains pensent que le chiffre 13 porte malheur, ce n’est pas le cas de Veeam qui vient de l’utiliser pour la dernière édition (...)
Choosing a managed service provider (MSP)
2025-11-24 09:10:25
An SME's guide to selecting and working with managed service providers.
Scattered Spider alleged members deny TfL charges
2025-11-24 08:24:35
Two UK teens linked to Scattered Spider pleaded not guilty to charges over last year's TfL cyberattack at a Southwark Crown Court hearing. Two British teens accused of Computer Misuse Act offenses for...
A week in security (November 17 – November 23)
2025-11-24 08:03:00
A list of topics we covered in the week of November 17 to November 23 of 2025
ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access
2025-11-24 07:18:00
A recently patched security flaw in Microsoft Windows Server Update Services (WSUS) has been exploited by threat actors to distribute malware known as ShadowPad.
"The attacker targeted Windows Servers...
The TechBeat: The Fork Reshaping MCP Testing: How a 24-Year-Old CTO Is Taking On One of AI's Biggest Players (11/24/2025)
2025-11-24 07:10:55
How are you, hacker?
🪐Want to know what's trending right now?:
The Techbeat by HackerNoon has got you covered with fresh content from our trending stories of the day! Set email preference here.
...
Fedora 43: Advisory for Chromium High Type Confusion CVE-2025-13223
2025-11-24 01:27:49
Update to 142.0.7444.175 * High CVE-2025-13223: Type Confusion in V8 * High CVE-2025-13224: Type Confusion in V8
Fedora 43: calibre 8.14.0 Critical Update to Prevent Code Execution Risks
2025-11-24 01:27:46
Update to 8.14.0. Fixes rhbz#2413304
Fedora 43: kubernetes1.33 Important Security Update 2025-298add9246
2025-11-24 01:27:45
Update to release v1.33.6 Resolves: rhbz#2398588, rhbz#2398849, rhbz#2399250, rhbz#2399523 Resolves: rhbz#2407789, rhbz#2408059, rhbz#2408316, rhbz#2408610 Resolves: rhbz#2408673, rhbz#2408731, rhbz#2409238,...
Fedora 43: Critical Update for Kubernetes 1.34.2 Cross-Origin Bypass
2025-11-24 01:27:41
Update to release v1.34.2 Resolves: rhbz#2398589, rhbz#2398850, rhbz#2399251, rhbz#2399524 Resolves: rhbz#2407790, rhbz#2408060, rhbz#2408317, rhbz#2408611 Resolves: rhbz#2408674, rhbz#2408732, rhbz#2409239,...
Multiples vulnérabilités dans les produits Synology (24 novembre 2025)
24/11/2025
De multiples vulnérabilités ont été découvertes dans les produits Synology. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte...
Multiples vulnérabilités dans les produits VMware (24 novembre 2025)
24/11/2025
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.