Toute l'actualité de la Cybersécurité


SimonMed says 1.2 million patients impacted in January data breach

2025-10-13 20:12:04
U.S. medical imaging provider SimonMed Imaging is notifying more than 1.2 million individuals of a data breach that exposed their sensitive information. [...]

Lire la suite »

Customer payment data stolen in Unity Technologies's SpeedTree website compromise

2025-10-13 18:18:49
Malicious code on Unity Technologies's SpeedTree site skimmed sensitive data from hundreds of customers, the company confirmed. Video game software development firm Unity Technologies revealed that...

Lire la suite »

Massive multi-country botnet targets RDP services in the US

2025-10-13 18:05:56
A large-scale botnet is targeting Remote Desktop Protocol (RDP) services in the United States from more than 100,000 IP addresses. [...]

Lire la suite »

Hackers Leveraging Microsoft Edge Internet Explorer Mode to Gain Access to Users' Devices

2025-10-13 17:37:26
The cybersecurity landscape witnessed a concerning development as threat actors discovered a novel attack vector targeting Microsoft Edge’s Internet Explorer mode functionality. This sophisticated...

Lire la suite »

ShinyHunters Leak Alleged Data from Qantas, Vietnam Airlines and Other Major Firms

2025-10-13 17:04:44
ShinyHunters and its affiliate hackers have leaked data from 6 firms, including Qantas and Vietnam Airlines, after claiming to breach 39 companies via a Salesforce vulnerability.

Lire la suite »

North Korean Hackers Attacking Developers with 338 Malicious npm Packages

2025-10-13 16:41:39
North Korean state-sponsored threat actors have intensified their supply chain attacks against software developers through a sophisticated campaign dubbed “Contagious Interview,” deploying...

Lire la suite »

Hexacon 2025 : Apple double sa prime aux bugs de sécurité

2025-10-13 16:38:31
Si vous possédez des compétences en sécurité des plateformes, vous n'avez pas besoin de vendre vos découvertes à (...)

Lire la suite »

USN-7820-1: Linux kernel (Oracle) vulnerabilities

2025-10-13 16:35:02
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Ext4 file system; ...

Lire la suite »

USN-7796-4: Linux kernel (Azure FIPS) kernel vulnerabilities

2025-10-13 16:24:55
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Framebuffer layer; ...

Lire la suite »

Building a lasting security culture at Microsoft

2025-10-13 16:00:00
At Microsoft, building a lasting security culture is more than a strategic priority—it is a call to action. Security begins and ends with people, which is why every employee plays a critical role in...

Lire la suite »

Can ChatGPT Outperform the Market? Week 9

2025-10-13 15:59:59
Doubles Down On 1 Stock...

Lire la suite »

SonicWall VPN accounts breached using stolen creds in widespread attacks

2025-10-13 15:58:45
Researchers warn that threat actors have compromised more than a hundred SonicWall SSLVPN accounts in a large-scale campaign using stolen, valid credentials. [...]

Lire la suite »

Microsoft investigates outage affecting Microsoft 365 apps

2025-10-13 15:58:17
Microsoft is investigating an ongoing incident that is preventing some customers from accessing Microsoft 365 applications. [...]

Lire la suite »

Gestion des API : le sourcing multiple est devenu standard

2025-10-13 15:55:53
L'approvisionnement chez de multiples fournisseurs s'est développé, en parallèle des architectures fédérées. Qui se distingue sur ce marché ? The post Gestion des API : le sourcing multiple est...

Lire la suite »

Tapbit Delivers a Strong Presence at TOKEN2049 Singapore

2025-10-13 15:54:59
Tapbit is a leading compliant cryptocurrency exchange. ToKEN2049 Singapore was held at the Marina Bay Sands Expo and Convention Centre. The Tapbit booth emerged as one of the most visited spots at the...

Lire la suite »

New WhatsApp Worm Attacks Users with Banking Malware to Users Login Credentials

2025-10-13 15:41:33
Security researchers have identified a sophisticated malware campaign that exploits WhatsApp’s messaging platform to deploy banking trojans targeting Brazilian financial institutions and cryptocurrency...

Lire la suite »

Avec ses Xeon 6+ E-Core, Intel privilégie la maitrise énergétique

2025-10-13 15:25:52
Intel a révélé plus de détails sur sa gamme de processeurs Xeon 6+ E-core, baptisés Clearwater Forest et gravés (...)

Lire la suite »

PoC Exploit Unveiled for Lenovo Code Execution Vulnerability Enabling Privilege Escalation

2025-10-13 15:25:49
A critical vulnerability in Lenovo’s Dispatcher drivers has come under the spotlight after researchers released a proof-of-concept exploit that demonstrates privilege escalation on affected Windows...

Lire la suite »

Alliance OpenAI-Broadcom : c'est signé

2025-10-13 15:25:20
OpenAI mise sur la co-conception avec Broadcom pour sécuriser sa puissance de calcul et optimiser le traitement des requêtes IA. The post Alliance OpenAI-Broadcom : c’est signé appeared first...

Lire la suite »

AI vs AI: The Future of Cybersecurity Is Machine vs. Machine. Is the human factor still relevant?

2025-10-13 15:22:06
How Artificial Intelligence is transforming both cyber defense and cybercrime by Venkatesh Apsingekar, Senior Engineering Manager – Illumio I recently watched Terminator 2 with my 9-year-old son....

Lire la suite »

Linux Kernel 6.18-rc1 Released With Extensive Updates Following a Steady Merge Window

2025-10-13 15:16:06
Linus Torvalds has announced the release of Linux 6.18-rc1, marking the start of the release candidate phase for the upcoming kernel version. In his typical straightforward style, Torvalds noted that...

Lire la suite »

OpenAI's Guardrails Can Be Bypassed by Simple Prompt Injection Attack

2025-10-13 15:15:14
Just weeks after its release, OpenAI's Guardrails system was quickly bypassed by researchers. Read how simple prompt injection attacks fooled the system's AI judges and exposed an ongoing security...

Lire la suite »

Scattered Lapsus$ Hunters Claim to Have Stolen More Than 1 Billion Salesforce Records

2025-10-13 15:05:46
Scattered Lapsus$ Hunters, a threat group previously associated with high-profile data thefts, recently claimed responsibility for exfiltrating over one billion records from Salesforce environments worldwide....

Lire la suite »

Financial, Other Industries Urged to Prepare for Quantum Computers

2025-10-13 15:01:28
Despite daunting technical challenges, a quantum computer capable of breaking public-key encryption systems may only be a decade or two off.

Lire la suite »

Your Alerts Are Increasing Your Cybersecurity Risk

2025-10-13 15:00:46
At their core, alerts exist to bring attention to something meaningful: an indicator of compromise (IOC), an indicator of attack (IOA), or a suspicious behavior worth investigating. But in any... The...

Lire la suite »

Infrastructure de données : Fivetran et dbt Labs fusionnent

2025-10-13 14:59:59
Fivetran et dbt Labs fusionnent dans le cadre d'un échange d'actions et prévoit 600 millions $ de revenus annuels. The post Infrastructure de données : Fivetran et dbt Labs fusionnent appeared...

Lire la suite »

Moderniser sans rupture : pourquoi COBOL reste essentiel

2025-10-13 14:53:47
Alors que les entreprises cherchent à suivre le rythme des innovations technologiques, la modernisation est trop souvent perçue comme une refonte totale, impliquant la réécriture d'applications...

Lire la suite »

Ubuntu 20.04 LTS: USN-7819-1 Linux-Azure Kernel Critical Network Flaws

2025-10-13 14:52:57
Several security issues were fixed in the Linux kernel.

Lire la suite »

Le gouvernement britannique pousse le secteur financier vers la blockchain

2025-10-13 14:47:17
Le gouvernement britannique prévoit de nommer un « champion des marchés numériques » pour répondre à sa (...)

Lire la suite »

USN-7819-1: Linux kernel (Azure) vulnerabilities

2025-10-13 14:47:04
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Network drivers; ...

Lire la suite »

Debian 11: libfcgi Critical Integer Overflow Buffer Overflow DLA-4329-1

2025-10-13 14:45:27
An issue has been found in libfcgi, a FastCGI bridge from CGI. The issue is related to an integer overflow (and resultant heap-based buffer overflow) via crafted nameLen or valueLen values in data to...

Lire la suite »

Oracle releases emergency patch for new E-Business Suite flaw

2025-10-13 14:42:16
Oracle has issued an emergency security update over the weekend to patch another E-Business Suite (EBS) vulnerability that can be exploited remotely by unauthenticated attackers. [...]

Lire la suite »

USN-7818-1: Apache Subversion vulnerability

2025-10-13 14:39:24
It was discovered that Apache Subversion incorrectly parsed control characters in filenames. An attacker could possibly use this issue to commit a corrupted revision to a repository, leading to a denial...

Lire la suite »

Building with Clarity: Yusuke Kawano on Scaling Startups Through Data Discipline

2025-10-13 14:29:59
Yusuke Kawano, Product Growth & Analytics Leader at Meta, reveals how startups can turn raw data into clarity and culture. His 10-point playbook—from defining objectives and ensuring data trust to documenting...

Lire la suite »

Le CSIRT Bourgogne-Franche-Comté confirmé dans son rôle d'expert cyber

2025-10-13 14:24:22
Lauréat de l'appel à manifestation d'intérêt RALEC lancé par l'ANSSI, le CSIRT Bourgogne-Franche-Comté voit son rôle d'expert en cybersécurité renforcé. The post Le CSIRT Bourgogne-Franche-Comté...

Lire la suite »

Meet Varonis Interceptor: AI-Native Email Security

2025-10-13 14:04:14
AI-generated phishing and social engineering attacks outpace traditional email defenses. Varonis' new Interceptor platform uses multimodal AI — vision, language, and behavior models — to detect zero-hour...

Lire la suite »

SimonMed Imaging discloses a data breach impacting over 1.2 million people

2025-10-13 14:02:49
Medusa ransomware hit SimonMed Imaging, stealing 200 GB of data and impacting over 1.2 million people in a major healthcare data breach. SimonMed Imaging suffered a ransomware attack by the Medusa group,...

Lire la suite »

Critical infrastructure CISOs Can't Ignore 'Back-Office Clutter' Data

2025-10-13 14:00:00
OT and ICS systems indeed hold the crown jewels of critical infrastructure organizations, but unmonitored data sprawl is proving to be pure gold for increasingly brazen nation-state threat actors like...

Lire la suite »

Vyana's “Replace-Don't-Dilute” Smart Vent Could Redefine Home Air Quality

2025-10-13 13:59:59
Vyana, founded by Arjun Gupta, introduces a smart ventilation system that replaces, not dilutes, indoor air. Using CO₂, VOC, and pollen sensors with predictive algorithms, it optimizes airflow for health...

Lire la suite »

Russian Cybercrime Marketplace Shifting from RDP Access to Malware Stealer Log Exploits

2025-10-13 13:32:56
The online cybercrime marketplace, Russian Market, has evolved from selling Remote Desktop Protocol (RDP) access to becoming one of the most active underground hubs for information-stealing malware logs....

Lire la suite »

Generation AI: Why Today's Tech Graduates Are At a Disadvantage

2025-10-13 13:30:00
With artificial intelligence supplanting entry-level security jobs, new cyber professionals will have to up their game to stay competitive in the industry.

Lire la suite »

Microsoft Intune MDM and Entra ID Leveraged to Elevate your Trust in Device Identity

2025-10-13 13:27:13
New research uncovers valuable insights hidden within Microsoft Intune’s Mobile Device Management (MDM) certificates, offering a more reliable way to verify device and tenant identities compared...

Lire la suite »

Microsoft: Windows 11 Media Creation Tool broken on Windows 10 PCs

2025-10-13 13:22:16
Microsoft says the latest version of the Windows 11 Media Creation Tool (MCT) no longer works correctly on Windows 10 22H2 computers. [...]

Lire la suite »

⚡ Weekly Recap: WhatsApp Worm, Critical CVEs, Oracle 0-Day, Ransomware Cartel & More

2025-10-13 13:18:00
Every week, the cyber world reminds us that silence doesn't mean safety. Attacks often begin quietly — one unpatched flaw, one overlooked credential, one backup left unencrypted. By the time alarms...

Lire la suite »

Microsoft revamps Internet Explorer Mode in Edge after August attacks

2025-10-13 13:17:43
Microsoft updated Edge's Internet Explorer mode after August 2025 reports that attackers exploited it to access users' devices without authorization. Microsoft updated Edge's Internet Explorer mode...

Lire la suite »

Hackers Target macOS Users with Fake Homebrew Websites to Deliver Malicious Payloads

2025-10-13 13:09:21
In September 2025, Kandji's security researchers uncovered a sophisticated campaign in which attackers deployed multiple spoofed Homebrew installer sites that perfectly mimic the official brew.sh page....

Lire la suite »

Astaroth Banking Malware Leveraging GitHub to Host Malware Configurations

2025-10-13 13:07:41
A new wave of the Astaroth banking trojan has emerged, leveraging a novel approach to distribute its malicious configuration files. First detected in late 2025, this latest campaign employs GitHub's...

Lire la suite »

Cybercrime Is The Greatest Transfer Of Economic Wealth In History

2025-10-13 13:07:09
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Oct. 13, 2025 – Read the full story from Techloy With ransomware attacks, phishing, financial fraud, and other...

Lire la suite »

Is Hacking Back Ever a Good Strategy?

2025-10-13 13:00:26
Hacking back aims to retaliate against cyberattackers by launching a counterattack to disrupt their systems, recover stolen data or send a message. As cyberthreats grow more frequent and sophisticated,...

Lire la suite »

CyberSmart Become a National Ambassador of the NCRCG

2025-10-13 12:54:17
With Cyber Security Awareness Month firmly underway, the National Cyber Resilience Centre Group (NCRCG) has proudly welcomed CyberSmart on board as a National Ambassador. Funded and supported by the...

Lire la suite »

Pro-Russian Hacktivist Targets OT/ICS Systems to Harvest Credentials

2025-10-13 12:42:18
In September, a nascent pro-Russian hacktivist group known as TwoNet staged its first operational technology and industrial control systems (OT/ICS) intrusion against our water treatment utility honeypot....

Lire la suite »

New RMPocalypse Attack Let Hackers Break AMD SEV-SNP To Exfiltrate Confidential Data

2025-10-13 12:33:01
A critical vulnerability in AMD’s Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP), a cornerstone of confidential computing deployed by major cloud providers like AWS, Azure,...

Lire la suite »

Hidden Cost of MFT Vulnerabilities: Why CVE-2025-10035 Demands a New Security Playbook

2025-10-13 12:32:12
When Fortra disclosed CVE-2025-10035 in GoAnywhere MFT last month, many security teams likely experienced a familiar sinking feeling. Another critical vulnerability. Another emergency patch cycle. Another...

Lire la suite »

Axis Communications Vulnerability Exposes Azure Storage Credentials

2025-10-13 12:07:13
Axis Communications, a leading provider of network video and surveillance solutions, has confirmed a critical vulnerability in its Autodesk® Revit® plugin that exposed Azure Storage Account credentials...

Lire la suite »

Où en est SAP Joule dans son tournant agentique ?

2025-10-13 12:02:43
D'assistant générique, Joule se décline en agents que SAP embarque progressivement dans ses logiciels, avec un ciblage par métier. The post Où en est SAP Joule dans son tournant agentique ? appeared...

Lire la suite »

Threat Actors Weaponize Discord Webhooks for Command and Control with npm, PyPI, and Ruby Packages

2025-10-13 11:59:07
Cybercriminals have discovered a novel way to co-opt Discord webhooks as surrogate command-and-control (C2) channels across popular language ecosystems. Unlike traditional C2 servers, webhooks offer free,...

Lire la suite »

Lightship Security and the OpenSSL Corporation Submit OpenSSL 3.5.4 for FIPS 140-3 Validation

2025-10-13 11:50:05
The OpenSSL 3.5.4 FIPS Object Module provides an open-source, standards-compliant cryptographic module aligned with the FIPS 140-3 standard. This submission is the first step toward a FIPS-140 validated...

Lire la suite »

Why Unmonitored JavaScript Is Your Biggest Holiday Security Risk

2025-10-13 11:50:00
Think your WAF has you covered? Think again. This holiday season, unmonitored JavaScript is a critical oversight allowing attackers to steal payment data while your WAF and intrusion detection systems...

Lire la suite »

EDR-Freeze: Technical Mechanics and Forensic Artifacts Exposed

2025-10-13 11:36:58
EDR-Freeze is a proof-of-concept tool that forces endpoint detection and response (EDR) or antivirus processes into a temporary “coma.” Instead of installing a vulnerable driver, it leverages...

Lire la suite »

Anne Le Hénanff nommée ministre de l'IA et du Numérique

2025-10-13 11:29:32
Après la (re)nomination de Sébastien Lecornu au poste de Premier ministre vendredi soir, celle de l'équipe gouvernementale a été dévoilée pendant...

Lire la suite »

Harvard investigating breach linked to Oracle zero-day exploit

2025-10-13 11:14:21
Harvard University is investigating a data breach after the Clop ransomware gang listed the school on its data leak site, saying the alleged breach was likely caused by a recently disclosed zero-day vulnerability...

Lire la suite »

Hackers Exploit Microsoft Edge's Internet Explorer Mode to Compromise User Devices

2025-10-13 11:11:32
Microsoft Edge has identified and mitigated a critical threat exploiting its Internet Explorer (IE) compatibility mode, closing off high-risk entry points and reinforcing security for both individual...

Lire la suite »

Invoicely Database Leak Exposes 180,000 Sensitive Records

2025-10-13 11:08:16
Cybersecurity researcher Jeremiah Fowler discovered nearly 180,000 files, including PII and banking details, left exposed on an unprotected database linked to the Invoicely platform. Read about the identity...

Lire la suite »

North Korean Hackers Target Developers with 338 Malicious Software Packages

2025-10-13 10:31:05
North Korean threat actors have escalated their Contagious Interview campaign, deploying 338 malicious npm packages with over 50,000 downloads to target cryptocurrency and blockchain developers through...

Lire la suite »

Researchers Warn RondoDox Botnet is Weaponizing Over 50 Flaws Across 30+ Vendors

2025-10-13 10:12:00
Malware campaigns distributing the RondoDox botnet have expanded their targeting focus to exploit more than 50 vulnerabilities across over 30 vendors. The activity, described as akin to an "exploit shotgun"...

Lire la suite »

Mutuum Finance (MUTM): Official Development Milestone Announcement

2025-10-13 10:10:53
In a year when many crypto presales have struggled to maintain momentum after their initial hype, Mutuum Finance (MUTM) has taken a more disciplined approach. Through structured fundraising, transparent...

Lire la suite »

Astaroth Trojan abuses GitHub to host configs and evade takedowns

2025-10-13 10:08:33
The Astaroth banking Trojan uses GitHub to host malware configs, evade C2 takedowns and stay active by pulling new settings from the platform. McAfee discovered a new Astaroth campaign using GitHub repositories...

Lire la suite »

Microsoft Locks Down IE Mode After Hackers Turned Legacy Feature Into Backdoor

2025-10-13 09:54:00
Microsoft said it has revamped the Internet Explorer (IE) mode in its Edge browser after receiving "credible reports" in August 2025 that unknown threat actors were abusing the backward compatibility...

Lire la suite »

CVE-2025-11371: Linux Security Must Prepare for Cross-Stack Breach

2025-10-13 09:53:28
CVE-2025-11371 doesn't target Linux directly. It doesn't need to.

Lire la suite »

Debian 11 LTS: linux-6.1 Critical Security Update DLA-4328-1

2025-10-13 09:16:34
Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.

Lire la suite »

Debian 11: DLA-4327-1 linux Critical Priv Escalation Denial of Service

2025-10-13 09:16:04
Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.

Lire la suite »

Binance Is Back — Or Why the October 10 Crash Was Yet Another CEX Attack on the Crypto World

2025-10-13 09:13:39
Binance's internal pricing flaw made such a massive attack possible. CZ is not just a crypto whale but someone willing to use any means necessary to advance his projects. After settling his U.S. case,...

Lire la suite »

Microsoft Finally Resolves Persistent Windows 11 ‘Update and Shut Down' Glitch

2025-10-13 08:54:54
Microsoft has successfully addressed one of Windows 11’s most frustrating issues with its latest preview builds, finally fixing the notorious “update and shut down” glitch that has plagued...

Lire la suite »

Pressés par l'IA, les RSSI entament une mue organisationnelle

2025-10-13 08:45:48
L'évolution constante du paysage de la cybersécurité a longtemps tenu les RSSI en haleine, et l'IA pose désormais de nouveaux (...)

Lire la suite »

Happy DOM Flaw Allows Remote Code Execution Affecting 2.7 Million Users

2025-10-13 08:38:31
A critical security vulnerability has been discovered in Happy DOM, a popular JavaScript library used for server-side rendering and testing frameworks. The flaw, tracked as CVE-2025-61927, enables attackers...

Lire la suite »

openSUSE: docker-stable Important Fixes for 53 Issues 2025:03545-1

2025-10-13 08:38:00
An update that solves 53 vulnerabilities, contains one feature and has 137 security fixes can now be installed.

Lire la suite »

SUSE: docker-stable Important Security Update 2025:03545-1 CVE References

2025-10-13 08:37:59
* bsc#1001161 * bsc#1004490 * bsc#1007249 * bsc#1009961 * bsc#1012568

Lire la suite »

Google, Mandiant expose malware and zero-day behind Oracle EBS extortion

2025-10-13 08:35:36
Google and Mandiant link Oracle EBS extortion emails to known July-patched flaws and a likely zero-day, CVE-2025-61882. Google Threat Intelligence and Mandiant analyzed the Oracle E-Business Suite extortion...

Lire la suite »

Fin du Support de Windows 10 et conséquences pour la vie privée

2025-10-13 08:25:11
Avec la fin de vie (EOL) de Windows 10 prévue pour le 14 octobre 2025, la plupart des utilisateurs vont être contraints de migrer vers Windows 11 afin de continuer à recevoir les mises à jour de sécurité,...

Lire la suite »

Knative, la couche serverless pour Kubernetes, arrive à maturité

2025-10-13 08:18:58
Sept ans après sa mise en open source, Knative atteint le stade de maturité le plus élevé à la CNCF. The post Knative, la couche serverless pour Kubernetes, arrive à maturité appeared first on...

Lire la suite »

“The Overlooked P4 Goldmine: Turning Simple Flaws into Consistent Bounties"

2025-10-13 07:44:59
We’ve all been there — scrolling through bug bounty platforms, seeing hunters post about critical RCEs and complex chain exploits, while…Continue reading on InfoSec...

Lire la suite »

CVE Deep Dive : CVE-2025–32462

2025-10-13 07:44:46
CVE Deep Dive : CVE-2025–32462Sudo Host Option Bypass — 12-Year-Old Privilege Escalation FlawPublished : Sept 16, 2025 | by : OptExecutive SummaryRisk Level: Low (CVSS 2.8) — However :...

Lire la suite »

Master Web Fuzzing: A Cheat‑Sheet to Finding Hidden Paths

2025-10-13 07:43:50
Hey there, back again with another post! 😄Continue reading on InfoSec Write-ups »

Lire la suite »

Hash Me If You Can — How I Beat a 2-Second Hashing Challenge on RingZer0Team

2025-10-13 07:38:20
Hash Me If You Can — How I Beat a 2-Second Hashing Challenge on RingZer0TeamYou have 2 seconds to hash this message using the SHA512 algorithm.Two seconds? I leaned back in my chair, staring at...

Lire la suite »

How to Use AI to Learn Bug Hunting & Cybersecurity Like a Pro (in 2025)

2025-10-13 07:29:28
Hey there 👋,  I’m Vipul, the mind behind The Hacker’s Log — where I break down the hacker’s mindset, tools, and secrets 🧠💻Continue...

Lire la suite »

The Access Control Apocalypse: How Broken Permissions Gave Me Keys to Every Digital Door

2025-10-13 07:28:08
Hey there😁Continue reading on InfoSec Write-ups »

Lire la suite »

Stealit Malware spreads via fake game & VPN installers on Mediafire and Discord

2025-10-13 07:26:43
Stealit malware abuses Node.js SEA and Electron to spread via fake game and VPN installers shared on Mediafire and Discord. Fortinet FortiGuard Labs researchers spotted Stealit malware campaign abusing...

Lire la suite »

Authentication bypass via sequential user IDs in Microsoft SSO integration | Critical Vulnerability

2025-10-13 07:26:04
If you’re a penetration tester or bug bounty hunter, never skip SSO in your tests. It’s one of those features that everyone assumes is…Continue reading on InfoSec Write-ups »

Lire la suite »

Account Take Over | P1 — Critical

2025-10-13 07:24:47
It started off like any other day until I got an unexpected email — an invite to a private bug bounty program. Curious, I jumped in. The…Continue reading on InfoSec Write-ups...

Lire la suite »

WhatsApp Worm Targets Users with Banking Malware, Steals Login Information

2025-10-13 07:23:37
Cybersecurity researchers have uncovered a sophisticated new campaign targeting WhatsApp users in Brazil with self-propagating malware designed to steal banking credentials and cryptocurrency exchange...

Lire la suite »

AI-Powered Social Engineering: The New Cybercrime Playbook | Cyber Codex

2025-10-13 07:19:50
It's never the AI you should fear. It's the human pulling its strings.IntroductionSocial Engineering is one of the oldest and most effective forms of cybercrime. It relies not on hacking systems,...

Lire la suite »

A week in security (October 6 – October 12)

2025-10-13 07:19:20
A list of topics we covered in the week of October 6 to October 12 of 2025

Lire la suite »

The weirdest bug:When Reflected XSS Won't Let a Page Breathe

2025-10-13 07:12:27
Hello Pentesters — hope you're well. Today I'm sharing a short write-up of a reflected XSS I discovered while conducting a contracted pentest for a company that runs a critical website and needs...

Lire la suite »

Astaroth Banking Trojan Abuses GitHub to Remain Operational After Takedowns

2025-10-13 06:52:00
Cybersecurity researchers are calling attention to a new campaign that delivers the Astaroth banking trojan that employs GitHub as a backbone for its operations to stay resilient in the face of infrastructure...

Lire la suite »

The TechBeat: Klink Finance Disrupts Failing Web2 Ads - Launching $KLINK Token This October (10/13/2025)

2025-10-13 06:10:47
How are you, hacker? 🪐Want to know what's trending right now?: The Techbeat by HackerNoon has got you covered with fresh content from our trending stories of the day! Set email preference here. ...

Lire la suite »

The AI Co-Founder You'll Never See Join the Board

2025-10-13 05:15:21
The next generation of startups won't be built by teams; they'll be built. by hybrids. Half human ambition, half machine cognition. The one-man startup has quietly evolved into a one-mind hive.

Lire la suite »

New Rust-Based Malware "ChaosBot" Uses Discord Channels to Control Victims' PCs

2025-10-13 05:12:00
Cybersecurity researchers have disclosed details of a new Rust-based backdoor called ChaosBot that can allow operators to conduct reconnaissance and execute arbitrary commands on compromised hosts. "Threat...

Lire la suite »

Forgeting Funnels and Building Feelings - The Future of Content Marketing

2025-10-13 04:59:27
The next era of content marketing won't be defined by who automates best — it'll be defined by who connects deepest.

Lire la suite »

From Months to Minutes: I Discovered Just-In-Time App Generation with "Imagine with Claude"

2025-10-13 04:57:58
Imagine with Claude introduces Just-In-Time App Generation a paradigm shift where applications build themselves based on user navigation rather than predetermined code. With a single prompt, I created...

Lire la suite »

Democratize Financial Modeling With Perplexity Pro (100+ Prompts & Templates for Market Analysis)

2025-10-13 04:56:47
Perplexity Pro transforms a simple prompt into comprehensive market analysis, competitive intelligence reports, and revenue forecasting models—all with live data, interactive charts, and working calculations....

Lire la suite »

List of 14 new domains

2025-10-13 00:00:00
.fr bouyguesbatimentidf[.fr] (registrar: One.com A/S) drmartens-outlet[.fr] (registrar: KEY-SYSTEMS GmbH) en-attente-prime[.fr] (registrar: PDR Ltd. d/b/a PublicDomainRegistry.com) en-cours-prime[.fr]...

Lire la suite »

Vulnérabilité dans Belden HiOS Switch Platform (13 octobre 2025)

13/10/2025
Une vulnérabilité a été découverte dans Belden HiOS Switch Platform. Elle permet à un attaquant de provoquer un déni de service à distance.

Lire la suite »

Multiples vulnérabilités dans VMware Tanzu (13 octobre 2025)

13/10/2025
De multiples vulnérabilités ont été découvertes dans VMware Tanzu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de...

Lire la suite »

Vulnérabilité dans Oracle E-Business Suite (13 octobre 2025)

13/10/2025
Une vulnérabilité a été découverte dans Oracle E-Business Suite. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données.

Lire la suite »