Toute l'actualité de la Cybersécurité


BeatBanker: A dual‑mode Android Trojan

2026-03-10 10:00:44
Kaspersky researchers identified a new Android Trojan dubbed BeatBanker targeting Brazil, posing as government apps and Google Play Store, and capable of both crypto mining and stealing banking data.

Lire la suite »

Auditing the Gatekeepers: Fuzzing "AI Judges" to Bypass Security Controls

2026-03-10 10:00:29
Unit 42 research reveals AI judges are vulnerable to stealthy prompt injection. Benign formatting symbols can bypass security controls. The post Auditing the Gatekeepers: Fuzzing "AI Judges"...

Lire la suite »

Eighteen Years Unchanged

2026-03-10 10:00:04
Dorian rides through rain-soaked London to an opium den, desperate to escape guilt. There he is recognized as “Prince Charming.” Outside, James Vane, Sibyl's brother, ambushes him and vows revenge....

Lire la suite »

APT28 hackers deploy customized variant of Covenant open-source tool

2026-03-10 10:00:00
The Russian state-sponsored APT28 threat group is using a custom variant of the open-source Covenant post-exploitation framework for long-term espionage operations. [...]

Lire la suite »

OpenClaw Advisory Surge Exposes Gap Between GitHub and CVE Vulnerability Tracking

2026-03-10 09:47:07
OpenClaw, a self-hosted AI agent, rose to become GitHub’s most-starred repository weeks after its launch, drawing a large developer community and immediate researcher attention. Nobody anticipated...

Lire la suite »

After the Acid, the Opium

2026-03-10 09:30:04
Dorian attends a society dinner and flawlessly performs charm while suppressing panic over his crime. Lord Henry's probing questions unsettle him, reviving his fear. Back home, he destroys Basil's...

Lire la suite »

Leading Myanmar Fleet Management Company Yoma Fleet Selects AccuKnox SIEM to Replace Legacy Tools

2026-03-10 09:12:52
Menlo Park, USA, 10th March 2026, CyberNewswire

Lire la suite »

Armis facilite l'automatisation et la prise de décision

2026-03-10 09:05:59
L’éditeur américain Armis, spécialisé dans la gestion de l'exposition aux cybermenaces, vient de dévoiler son (...)

Lire la suite »

Aakriti Kharel: Bridging Cultures, Empowering Women in STEM

2026-03-10 09:00:07
Aakriti Kharel's journey from Nepal to Texas spans biology, hospital labs, and artificial intelligence, reflecting the evolving role of women in STEM. Drawing on cross-cultural experience, grassroots...

Lire la suite »

NexPoint Services, une SSII spécialisée dans la sécurité des terminaux

2026-03-10 08:59:55
Ancien directeur général de Cegedim Outsourcing, Fabien Fudalej vient de créer l'ESN NexPoint Services, qui se focalise (...)

Lire la suite »

Ericsson US confirms breach after third-party provider attack

2026-03-10 08:44:55
Ericsson US reports a data breach after attackers hacked a service provider, exposing employee and customer information. Ericsson Inc., the U.S. branch of the Swedish telecom giant, disclosed a data breach...

Lire la suite »

Law enforcement disrupted Tycoon 2FA phishing-as-a-service platform

2026-03-10 08:30:52
Authorities disrupted the Tycoon 2FA phishing-as-a-service platform used to send millions of phishing emails to over 500,000 orgs worldwide. The joint effort, led by Microsoft, Europol, and industry partners,...

Lire la suite »

Anthropic Sued the U.S. Government for Labelling Claude as ‘Supply Chain Risk'

2026-03-10 08:22:28
Artificial intelligence leader Anthropic has filed an unprecedented lawsuit against the United States government after being designated a “supply chain risk”. The legal action, filed in a...

Lire la suite »

Apache ZooKeeper Vulnerability Allow Attackers to Access Sensitive Data

2026-03-10 08:09:08
Two “Important” severity vulnerabilities have been disclosed in Apache ZooKeeper, a widely used service for configuration management and naming in distributed applications, making timely security...

Lire la suite »

iPhone Exploit Toolkit Used by Russian Spies Likely Originated from U.S. Contractor

2026-03-10 08:02:53
A powerful iPhone exploit kit named “Coruna,” initially created for Western intelligence by U.S. contractor L3Harris, has fallen into the hands of Russian spies and Chinese cybercriminals.​...

Lire la suite »

Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector Tool

2026-03-10 07:17:00
Salesforce has warned of an increase in threat actor activity that's aimed at exploiting misconfigurations in publicly accessible Experience Cloud sites by making use of a customized version of an open-source...

Lire la suite »

AdsorbML: How AI Is Transforming Catalyst Discovery for Clean Energy and Chemicals

2026-03-10 07:00:07
Researchers developed AdsorbML, a hybrid AI + physics method that finds the best way molecules bind to catalyst surfaces—critical for designing fuels and chemicals. Using machine-learning potentials...

Lire la suite »

Signed Malware Masquerading as Teams, Zoom Apps Drops RMM Backdoors

2026-03-10 06:47:26
A newly uncovered phishing campaign is actively targeting enterprise users by disguising malware as widely used workplace applications, including Microsoft Teams, Zoom, and Adobe Acrobat Reader. What...

Lire la suite »

Facebook Echo Chambers Are Real But They May Not Be Driving Polarization

2026-03-10 06:30:07
A massive field experiment led by researchers including Brendan Nyhan and Matthew Gentzkow analyzed how echo chambers affect political views on Facebook. In a study of 23,377 users during the 2020 United...

Lire la suite »

CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited

2026-03-10 06:17:00
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added three security flaws to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The...

Lire la suite »

The TechBeat: Inside Tencent Games' Real-Time Event-Driven Analytics System (3/10/2026)

2026-03-10 06:11:01
How are you, hacker? 🪐Want to know what's trending right now?: The Techbeat by HackerNoon has got you covered with fresh content from our trending stories of the day! Set email preference here. ...

Lire la suite »

Chinese APT Campaign Targets Qatar With PlugX Lures Tied to Middle East Conflict

2026-03-10 06:02:41
A Chinese-linked advanced persistent threat group known as Camaro Dragon launched a targeted cyberespionage campaign against entities in Qatar just one day after the outbreak of new hostilities in the...

Lire la suite »

GhostClaw Mimic as OpenClaw to Steal Everything from Developers

2026-03-10 04:37:58
A dangerous malware campaign targeting software developers has surfaced, with a rogue npm package posing as a trusted developer tool to silently drain credentials, crypto wallets, SSH keys, browser sessions,...

Lire la suite »

ScamAgent- AI Agent Built by Researchers that Run Fully Autonomous Scam Calls

2026-03-10 03:27:15
ScamAgent is an autonomous, multi-turn AI framework developed by researcher Sanket Badhe at Rutgers University that demonstrates how large language models (LLMs) can be weaponized to conduct fully automated...

Lire la suite »

Hackers Attack Employees Over Microsoft Teams to Trick Them Into Granting Remote Access

2026-03-10 02:59:33
A social-engineering campaign abusing Microsoft Teams and Windows Quick Assist is evolving again, with BlueVoyant warning that the attackers are now deploying a newly identified malware family called...

Lire la suite »

Port Scanning Explained: Tools, Techniques, and Best Open-Source Port Scanners for Linux

2026-03-10 02:12:17
Most Linux admins assume they know which TCP/IP ports their servers expose, until a scan reveals something unexpected. A database port listening on all interfaces, a forgotten development service, or...

Lire la suite »

Walbi Launches No-Code AI Trading Agents For Retail Crypto Traders

2026-03-10 01:49:36
Walbi has introduced no-code AI trading agents for retail crypto users. Traders can now build, test, and launch their own AI-driven agents without writing a single line of code.

Lire la suite »

Comedian Insights: AI Bias, Censorship, and the "Bland" Humor Gap

2026-03-10 01:42:05
This article presents the results of focus group discussions on the use of AI in comedy writing. We also discuss the major themes that emerged from the discussions. We conclude with a list of the main...

Lire la suite »

Policy-Driven AI: Designing Configuration-Driven Model Selection for Enterprise Systems

2026-03-10 01:31:46
Hardcoding AI model calls is the new technical debt. This article walks through how to architect a configuration-driven model selection layer that lets enterprise teams route prompts to the right model...

Lire la suite »

Fedora 42 Chromium Update FEDORA-2026-06657d1811 Integer Overflow

2026-03-10 01:10:45
Update to 145.0.7632.159 CVE-2026-3536: Integer overflow in ANGLE CVE-2026-3537: Object lifecycle issue in PowerVR CVE-2026-3538: Integer overflow in Skia CVE-2026-3539: Object lifecycle issue in DevTools...

Lire la suite »

OpenSUSE Leap 16.3 gcc-compiler Major Memory Leak Patch 2027-fb92dc34b0

2026-03-10 01:10:37
Update to 1.3.2.

Lire la suite »

Fedora 42 perl-Net-CIDR Critical Leading Zeros Issue 2026-baf8782c7a

2026-03-10 01:10:37
Net::CIDR versions before 0.24 for Perl mishandle leading zeros in IP CIDR addresses, which may have unspecified impact. The functions addr2cidr and cidrlookup may return leading zeros in a CIDR string,...

Lire la suite »

Idempotency: The Secret to Production-Grade Data Pipelines

2026-03-10 01:09:19
Idempotency is the ability to perform the same operation multiple times without changing the result beyond the initial application. In a clinical data environment, duplicates in pharmacy claims or patient...

Lire la suite »

The Internet Is Now Built for AI, Not Humans

2026-03-10 00:59:30
AI already consumes 51% of internet traffic. Soon humans won't be in the buying loop at all. When that happens, only four marketing channels survive: government-mandated vendors, AI picking the objectively...

Lire la suite »

Fedora 43 Chromium Integer Overflow Issues DevTools 2026-f62db6b372

2026-03-10 00:54:29
Update to 145.0.7632.159 CVE-2026-3536: Integer overflow in ANGLE CVE-2026-3537: Object lifecycle issue in PowerVR CVE-2026-3538: Integer overflow in Skia CVE-2026-3539: Object lifecycle issue in DevTools...

Lire la suite »

Fedora 43 polkit Security Advisory FEDORA-2026-0e9ef494fc

2026-03-10 00:54:28
backport of upstream commits 9dca831, 4e67dde

Lire la suite »

Fedora 43 rust-pythonize Critical Update DoS Threat FEDORA-2026-151bfcc2af

2026-03-10 00:54:23
Update matrix-synapse to v1.147.1

Lire la suite »

MacBook Neo Review: Apple's Budget Laptop Comes With Big Tradeoffs

2026-03-10 00:54:16
Apple announced the MacBook Neo two days ago. 9. iPhone chip. I have mixed feelings.

Lire la suite »