Toute l'actualité de la Cybersécurité


Un lycée d'Anvers piraté, les parents pris pour cibles

2026-02-14 19:07:38
Après le piratage d'un lycée d'Anvers, des hackers ciblent les parents : 50 euros par enfant, sous menace de fuite de données, dans une opération qui imite LockBit....

Lire la suite »

Un Taïwanais prend 30 ans pour Incognito Market

2026-02-14 18:50:35
Rui-Siang Lin, alias « Pharaon », écope de 30 ans pour Incognito Market, marché darknet, après une enquête du FBI et une erreur de traçabilité crypto....

Lire la suite »

Fintech firm Figure disclosed data breach after employee phishing attack

2026-02-14 17:10:33
Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an employee and steal a limited number of files. Blockchain-based lending firm Figure confirmed a data breach...

Lire la suite »

Growth Hacking Is Dead - Systems Are Eating Marketing

2026-02-14 17:00:02
Growth hacking was once a simple way to find a high-leverage tactic and grow. But the environment has fundamentally changed and tactics are no longer repeatable. Marketing teams are now chasing new tools...

Lire la suite »

One threat actor responsible for 83% of recent Ivanti RCE attacks

2026-02-14 16:02:34
Threat intelligence observations show that a single threat actor is responsible for most of the active exploitation of two critical vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), tracked...

Lire la suite »

The HackerNoon Newsletter: Courts Are Drowning in Cases. Can AI Save the Day Without Becoming a Liability? (2/14/2026)

2026-02-14 16:02:34
How are you, hacker? 🪐 What's happening in tech today, February 14, 2026? The HackerNoon Newsletter brings the HackerNoon ...

Lire la suite »

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

2026-02-14 15:54:34
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security...

Lire la suite »

Snail mail letters target Trezor and Ledger users in crypto-theft attacks

2026-02-14 15:15:25
Threat actors are sending physical letters pretending to be from Trezor and Ledger, makers of cryptocurrency hardware wallets, to trick users into submitting recovery phrases in crypto theft attacks....

Lire la suite »

Looking Back at the Changes That Rust 1.77.1 Brought In

2026-02-14 15:00:01
Rust 1.77.1 therefore disables the new Cargo behavior on Windows for targets that use MSVC. There are no changes for other targets. We plan to eventually re-enable debuginfo stripping in release mode...

Lire la suite »

Courts Are Drowning in Cases. Can AI Save the Day Without Becoming a Liability?

2026-02-14 13:00:02
Artificial intelligence (AI) is being used in courts around the world to speed up proceedings and reduce administrative burdens. But the growing presence of AI in justice systems raises urgent questions....

Lire la suite »

A Face Scan Could Be Required if You're Touring a Rental

2026-02-14 12:00:03
Landlords are asking renters to submit to 3D facial recognition scans to verify their identity. Some landlords also use facial recognition incorporated into smart lockboxes.

Lire la suite »

New Clickfix Exploit Tricks Users into Changing DNS Settings for Malware Installation

2026-02-14 11:11:39
A new evolution in the ClickFix social engineering campaign, which now employs a custom DNS hijacking technique to deliver malware. This attack method tricks users into executing malicious commands that...

Lire la suite »

Suspected Russian hackers deploy CANFAIL malware against Ukraine

2026-02-14 11:05:33
A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL malware. Google Threat Intelligence Group identified a previously undocumented threat actor...

Lire la suite »

Designing for AI Agents

2026-02-14 09:55:35
An agent does not wait for instruction. It monitors context, forms intentions, takes actions, and adapts its strategy over time.

Lire la suite »

Judging the Future of Mobile AI: An Interview with Ivan Mishchenko

2026-02-14 09:54:08
As artificial intelligence becomes deeply embedded in mobile applications, the role of engineering judgment is changing.

Lire la suite »

Threat Actors Exploit Claude Artifacts and Google Ads to Target macOS Users

2026-02-14 09:25:12
A sophisticated malware campaign targeting macOS users through Google-sponsored search results and legitimate platforms, including Anthropic’s Claude AI and Medium. The campaign has already reached...

Lire la suite »

Threat Actor Allegedly Selling Critical Severity OpenSea 0-day Exploit Chain on Hacking Forums

2026-02-14 07:53:47
A threat actor is reportedly selling a purported critical severity zero-day exploit chain targeting OpenSea for 0,000 USD in Bitcoin or Monero. The listing claims the vulnerability remains unpatched...

Lire la suite »

CISA Warns of Microsoft Configuration Manager SQL Injection Vulnerability Exploited in Attacks

2026-02-14 03:27:55
CISA has issued an urgent alert about a critical SQL injection vulnerability in Microsoft Configuration Manager (SCCM). Tracked as CVE-2024-43468, this flaw lets unauthenticated attackers run malicious...

Lire la suite »

Lorentzian Logic: Solving Unknown Cluster Numbers via Differentiable Graph Entropy

2026-02-14 02:37:43
Optimize network analysis with LSEnet, a deep learning model that eliminates the need to predefined cluster numbers. By leveraging the Lorentz model of hyperbolic space and differentiable structural information,...

Lire la suite »

LSEnet: Mastering Automated Data Grouping in Curved Hyperbolic Space

2026-02-14 02:29:28
Meet LSEnet, the neural net that organizes complex networks into optimal partitioning trees using the Lorentz model. By ditching flat Euclidean space for curved hyperbolic geometry, it recursively learns...

Lire la suite »

Smart Data Grouping: LSEnet & Automated Graph Clustering in Curved Space

2026-02-14 02:25:26
Stop guessing your cluster numbers. Discover LSEnet, a deep graph clustering model that uses Differentiable Structural Information (DSI) and the Lorentz model of hyperbolic space to organize complex networks...

Lire la suite »

Smart Graph Clustering: Organizing Networks Automatically

2026-02-14 02:19:12
Explore the frontier of geometric deep learning and non-Euclidean optimization. Master Kuramoto model training, hyperbolic reinforcement learning, and deep graph clustering without predefined cluster...

Lire la suite »

I'm Building a Tower Defense Game Where VCs Are the Enemy

2026-02-14 02:00:48
StartupTD is a browser-based tower defense game with a simple premise: survive as long as possible while your startup gets attacked by increasingly difficult waves of enemies. Each enemy type represents...

Lire la suite »

Fedora 43 linux-sgx Critical Nodejs Update CVE-2026-23745

2026-02-14 01:09:25
Update nodejs modules used by pccs daemon for CVE-2026-23745, CVE-2026-23950, CVE-2026-24842, CVE-2025-13465, CVE-2025-15284. Remove Fedora override of default pccs daemon port. Remove redundant dep on...

Lire la suite »

Fedora 43 python-aiohttp Important Security Advisory FEDORA-2026-66cb8ecfc2

2026-02-14 01:09:18
https://github.com/aio-libs/aiohttp/blob/v3.13.3/CHANGES.rst

Lire la suite »

openSUSE htmldoc Important Buffer Overflow Fix Advisory 2026-0046-1

2026-02-14 00:05:03
An update that fixes one vulnerability is now available.

Lire la suite »

openSUSE htmldoc Important Buffer Overflow Fix CVE-2024-46478 2026-0047-1

2026-02-14 00:04:47
An update that fixes one vulnerability is now available.

Lire la suite »