Toute l'actualité de la Cybersécurité


Germany warns of Signal account hijacking targeting senior figures

2026-02-06 20:00:33
Germany's domestic intelligence agency is warning of suspected state-sponsored threat actors targeting high-ranking individuals in phishing attacks via messaging apps like Signal. [...]

Lire la suite »

Transparent Tribe Hacker Group Attacking India's Startup Ecosystem

2026-02-06 19:46:29
The threat landscape for India’s technology sector has taken an unexpected turn. A Pakistan-based hacking group called Transparent Tribe has shifted its focus from traditional government targets...

Lire la suite »

Bulletproof Hosting Providers Leverage Legitimate ISPsystem to Supply Servers for Cybercriminals

2026-02-06 19:16:09
In the constantly shifting landscape of online threats, cybercriminals have found a new way to strengthen their attacks by hiding behind legitimate technology. Late in 2025, a series of ransomware incidents...

Lire la suite »

Metasploit Wrap-Up 02/06/2026

2026-02-06 18:52:32
Google Summer of Code 2026Our very own Jack Heysel has added some documentation which outlines the Metasploit Framework project ideas for GSoC 2026. For anyone interested in applying please see GSoC-How-To-Apply documentation,...

Lire la suite »

New FvncBot Attacking Android Users by Exploiting Accessibility Services

2026-02-06 18:42:00
A dangerous new malicious application has surfaced, targeting mobile banking customers in Poland. Observed on November 25, 2025, this threat masquerades as a legitimate security tool purportedly from...

Lire la suite »

DKnife Linux toolkit hijacks router traffic to spy, deliver malware

2026-02-06 18:35:11
A newly discovered toolkit called DKnife has been used since 2019 to hijack traffic at the edge-device level and deliver malware in espionage campaigns. [...]

Lire la suite »

Heroku passe officiellement en mode maintenance

2026-02-06 17:49:14
Heroku abandonne le développement de nouvelles fonctionnalités et ne commercialise plus son offre Enterprise. Les investissements se recentrent sur l'IA. The post Heroku passe officiellement en mode...

Lire la suite »

Avant la fin du support, Ingress Nginx corrige plusieurs failles

2026-02-06 17:36:25
Alerte sur la sécurité de l’outil open source Ingress Nginx - géré par la CNCF et à ne pas confondre avec le logiciel (...)

Lire la suite »

USN-8015-3: Linux kernel (FIPS) vulnerabilities

2026-02-06 17:34:32
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Cryptographic API; ...

Lire la suite »

CISA warns of SmarterMail RCE flaw used in ransomware attacks

2026-02-06 17:16:03
The Cybersecurity & Infrastructure Security Agency (CISA) in the U.S. has issued a warning about CVE-2026-24423, an unauthenticated remote code execution (RCE) flaw in SmarterMail that is used in ransomware...

Lire la suite »

How Parents Are Using Nori AI Families Assistant to Reduce Mental Load — Not Run Their Lives

2026-02-06 17:00:02
Modern family life isn't chaotic because parents are failing—it's complex because they're managing a multi-person system. This article explores how parents use Nori AI Families Assistant to reduce...

Lire la suite »

Crypto Market is Down T in 5 Months While This Cheap Altcoin is Surging

2026-02-06 16:50:05
Mutuum Finance is a decentralized protocol in development that focuses on crypto lending and borrowing without traditional intermediaries. The goal is to let users earn yield by lending their assets or...

Lire la suite »

Achats publics numériques : la souveraineté devient un critère de choix

2026-02-06 16:49:21
L'État français s'apprête à transformer sa doctrine d'achat dans le numérique. Une circulaire portée par trois ministres place désormais la souveraineté technologique au cœur des décisions,...

Lire la suite »

Shaping the Future of Sustainable AI: Key Takeaways from ICAIDISS 2026

2026-02-06 16:45:03
ICAIDISS 2026, hosted by Sharda University Agra, brought global researchers together to advance AI-driven intelligent systems for sustainability. With a highly selective peer-review process, the conference...

Lire la suite »

'Encrypt It Already' Campaign Pushes Big Tech to Prioritize E2E Encryption

2026-02-06 16:34:41
The Electronic Frontier Foundation is urging major technology companies to follow through on their promises to implement end-to-end encryption (E2E) by default across their services, as privacy concerns...

Lire la suite »

Shai-hulud: The Hidden Cost of Supply Chain Attacks

2026-02-06 16:25:14
Recent supply chain attacks involving self-propagating worms have spread far, but the damage and long-term impact is hard to quantify.

Lire la suite »

The HackerNoon Newsletter: The Weather-Report Lie: AI Isn't Fate (2/6/2026)

2026-02-06 16:03:21
How are you, hacker? 🪐 What's happening in tech today, February 6, 2026? The HackerNoon Newsletter brings the HackerNoon ...

Lire la suite »

Read This If You Want to Be an Inventor, Not an Imitator

2026-02-06 16:00:07
The goal of a conscious mind is to defeat entropy by creating new knowledge. Most people fail because they optimize for "looking the part" (credentials, networking, tutorials) rather than "doing the part." The...

Lire la suite »

Moltbook: Cutting Through the AI Hype to the Real Security Risks

2026-02-06 15:47:29
Moltbook has exploded into the security and AI communities with remarkable speed. In a matter of days, it has gone from an experimental curiosity to a viral talking point, with some observers framing...

Lire la suite »

Comment Alain Afflelou a lâché VMware

2026-02-06 15:45:22
Groupe Alain Afflelou a retenu Nutanix AHV comme alternative à Vmware et basculé 200 VM et 200 To en trois semaines avec l'intégrateur SPIE. The post Comment Alain Afflelou a lâché VMware appeared...

Lire la suite »

OpenClaw's Gregarious Insecurities Make Safe Usage Difficult

2026-02-06 15:42:15
Malicious "skills" and persnickety configuration settings are just some of the issues that security researchers have found when installing — and removing — the OpenClaw AI assistant.

Lire la suite »

Microsoft Teams et Google Meet entrent en connexion directe

2026-02-06 15:21:37
Google et Microsoft ont établi une interopérabilité sans passerelle tierce entre leurs solutions respectives et le hardware associé. The post Microsoft Teams et Google Meet entrent en connexion directe...

Lire la suite »

{ Tribune Expert } – Vibe Coding : un défi pour les développeurs

2026-02-06 15:05:55
Derrière la promesse d'un développement plus rapide et plus accessible, le Vibe Coding introduit des enjeux structurants pour les entreprises. The post { Tribune Expert } – Vibe Coding : un...

Lire la suite »

Record-breaking 31.4 Tbps DDoS attack hits in November 2025, stopped by Cloudflare

2026-02-06 15:05:29
AISURU/Kimwolf botnet hit a record 31.4 Tbps DDoS attack lasting 35 seconds in Nov 2025, which Cloudflare automatically detected and blocked. The AISURU/Kimwolf botnet was linked to a record-breaking...

Lire la suite »

EDR, Email, and SASE Miss This Entire Class of Browser Attacks

2026-02-06 15:01:11
Many modern attacks happen entirely inside the browser, leaving little evidence for traditional security tools. Keep Aware shows why EDR, email, and SASE miss browser-only attacks and how visibility changes...

Lire la suite »

China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery

2026-02-06 14:56:00
Cybersecurity researchers have taken the wraps off a gateway-monitoring and adversary-in-the-middle (AitM) framework dubbed DKnife that's operated by China-nexus threat actors since at least 2019. The...

Lire la suite »

Flickr Notifies Users of Data Breach After External Partner Security Flaw

2026-02-06 14:55:47
Flickr says a third-party email vendor flaw may have exposed user names, emails, IP data, and activity logs,…

Lire la suite »

CISA Orders Removal of Unsupported Active Network Edge Devices to Reduce Security Risks

2026-02-06 14:48:47
CISA has issued Binding Operational Directive (BOD) 26-02, ordering Federal Civilian Executive Branch (FCEB) agencies to eliminate “end of support” (EOS) edge devices from their networks....

Lire la suite »

Apple Pay phish uses fake support calls to steal payment details

2026-02-06 14:43:55
This Apple Pay phishing campaign is designed to funnel victims into fake Apple Support calls, where scammers steal payment details.

Lire la suite »

L'école IIM ouvre un Master en IA et cybersécurité

2026-02-06 13:55:55
Face à la multiplication des cybermenaces et à la montée en puissance de l’IA, les compétences spécialisées (...)

Lire la suite »

Higinio Ochoa, Hacktivist Turned White Hat, On The Cybercrime Magazine Podcast

2026-02-06 13:54:57
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Feb. 6, 2026 –Listen to the podcast On Jun. 25, 2012, 31-year-old Higinio O. Ochoa, III of Dallas, Texas,...

Lire la suite »

EU says TikTok faces large fine over "addictive design"

2026-02-06 13:53:53
The European Commission said today that TikTok is facing a fine because its addictive features, including infinite scroll, autoplay, push notifications, and personalized recommendation systems, are breaching...

Lire la suite »

CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk

2026-02-06 13:43:00
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ordered Federal Civilian Executive Branch (FCEB) agencies to strengthen asset lifecycle management for edge network devices and remove...

Lire la suite »

China-Nexus Hackers Hijacking Linux-Based Devices to Manipulate Traffic and Deploy Malware

2026-02-06 12:59:06
A sophisticated surveillance and attack framework dubbed “DKnife” has recently emerged, posing a significant threat to network security. Attributed to China-nexus threat actors, this malicious...

Lire la suite »

17% of 3rd-Party Add-Ons for OpenClaw Used in Crypto Theft and macOS Malware

2026-02-06 12:58:33
Bitdefender Labs reveals that 17% of OpenClaw AI skills analyzed in February 2026 are malicious. With over 160,000…

Lire la suite »

RenEngine Loader Using Stealthy Multi‑Stage Execution Chain to Bypass Security Controls

2026-02-06 12:46:12
Cracked game installers are again being used as a delivery channel for credential theft, but the latest wave adds an unusual twist: the malicious code hides behind a Ren'Py game launcher. The loader,...

Lire la suite »

Man pleads guilty to hacking nearly 600 women's Snapchat accounts

2026-02-06 12:34:30
An Illinois man pleaded guilty to hacking nearly 600 women's Snapchat accounts to steal nude photos that he kept, sold, or traded online, including accounts he compromised at the request of a former university...

Lire la suite »

New Wave of Odyssey Stealer Actively Targeting macOS Users

2026-02-06 12:25:49
A sophisticated and aggressive malware campaign known as Odyssey Stealer has surged recently, specifically aiming at macOS systems. This fresh wave of cyber threats has caught the attention of security...

Lire la suite »

APT-Q-27 Targeting Corporate Environments in Stealthy Attack Without Triggering Alerts

2026-02-06 12:09:56
In mid-January 2026, a highly sophisticated cyber campaign targeting financial institutions surfaced, characterized by its ability to infiltrate corporate environments without triggering standard security...

Lire la suite »

Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities

2026-02-06 12:07:00
A previously undocumented cyber espionage group operating from Asia broke into the networks of at least 70 government and critical infrastructure organizations across 37 countries over the past year,...

Lire la suite »

Flickr Confirms Data Breach – 35 million Users Data at Risk

2026-02-06 11:56:28
Flickr has disclosed a potential data breach stemming from a vulnerability in a third-party email service provider’s system. The incident, reported on February 5, 2026, may have exposed data for...

Lire la suite »

Phishing and OAuth Token Flaws Lead to Full Microsoft 365 Compromise

2026-02-06 11:30:31
Modern web applications frequently introduce unforeseen attack surfaces through seemingly harmless features designed for user engagement, such as newsletter signups, contact forms, and password resets....

Lire la suite »

From 120 Hours to 2: The Hybrid Validation Shift Behind Faster, Safer Releases

2026-02-06 11:27:38
A biographical look at how Kostiantyn Shkliar's career moved from setting up automation processes in large organizations to building validation systems that stay stable as Salesforce environments scale....

Lire la suite »

CodeXero Earns a 348 Proof of Usefulness Score by Building a Vibe Coding Engine for Web3 dApps

2026-02-06 11:22:50
CodeXero is an AI-native Web3 platform that lets creators build, launch, and monetize dApps from a single prompt, validated by a 348 Proof of Usefulness score reflecting strong user traction and real-world...

Lire la suite »

Netscout étend l'observabilité aux réseaux WiFi 7

2026-02-06 11:20:16
Le déploiement par les entreprises d’infrastructures toujours plus distribuées accroit le déficit de visibilité sur les (...)

Lire la suite »

The Deadly Arrival of Leithgow

2026-02-06 11:00:15
In this chapter of Astounding Stories of Super-Science (1932), Hawk Carse confronts the cost of betrayal as Master Scientist Eliot Leithgow is delivered into Ku Sui's hands. A tense meditation on intelligence,...

Lire la suite »

Protection des données : Cohesity et Google s'associent contre les malwares en sauvegarde

2026-02-06 10:53:19
Des intégrations natives avec Google Threat Intelligence et Google Private Scanning offrent de nouvelles façons d’identifier et d’éliminer les risques. Tribune – Cohesity, leader de...

Lire la suite »

Hoppscotch Earns a 133 Proof of Usefulness Score by Building an Open-Source, Lightweight API Development Ecosystem

2026-02-06 10:47:26
Hoppscotch is an open-source, lightweight API development platform. It helps developers test, document, and share APIs quickly and efficiently. It eliminates the bloat of traditional tools while keeping...

Lire la suite »

FinSight Earns a 55 Proof of Usefulness Score by Building an AI-Powered Finance System for Small Businesses

2026-02-06 10:38:47
FinSight is an AI-powered financial tracking platform for small businesses and freelancers that earned a 55 Proof of Usefulness score by making real-time accounting accessible through plain-language inputs....

Lire la suite »

Yubico révèle un ROI de 265 % et une réduction de 99,99 % du risque d'exposition aux coûts liés aux violations de données

2026-02-06 10:37:01
Yubico révèle un retour sur investissement de 265 % et une réduction de 99,99 % du risque d’exposition aux coûts liés aux violations de données, selon une étude sur l’impact économique...

Lire la suite »

Get-Star Earns a 27 Proof of Usefulness Score by Building Client-Side Parallel Search

2026-02-06 10:33:57
Get-Star is a fully client-side, browser-based meta-search tool that runs parallel queries across 42 sites, prioritizes user privacy, and earned a 27 Proof of Usefulness score for real-world utility.

Lire la suite »

How Samsung Knox Helps Stop Your Network Security Breach

2026-02-06 10:30:00
As you know, enterprise network security has undergone significant evolution over the past decade. Firewalls have become more intelligent, threat detection methods have advanced, and access controls are...

Lire la suite »

Safer Internet Day : KnowBe4 recommande la « pleine conscience numérique » et à la prudence face à l'IA

2026-02-06 10:22:23
Alors que le monde se prépare à célébrer la « Journée pour un Internet plus sûr », le 10 février 2026, KnowBe4 encourage les individus de tous âges à adopter un état d'esprit de pleine...

Lire la suite »

Les bases de données passent au régime « généré par IA »

2026-02-06 10:05:52
Sur l'offre Neon de Databricks, l'IA crée désormais l'essentiel des bases de données. En parallèle, les stratégies multi-LLM se répandent. The post Les bases de données passent au régime « généré...

Lire la suite »

MEXC Launches Commodity Zero-Fee Gala with Million in Trading Rewards

2026-02-06 10:00:22
MEXC has launched its Commodity Zero-Fee Gala, offering zero-fee trading on tokenized gold, silver, and select RWA assets, plus million in rewards. Running from Feb 5 to Mar 7, 2026, the event includes...

Lire la suite »

Next Gen Spotlights: AI Assurance for Autonomous Systems – Q&A with CybPass CEO PingChen Lin

2026-02-06 09:53:55
CybPass is on a mission to ensure that autonomous systems, from drones and robotics to self-driving vehicles, are safe, secure and ready for real-world deployment. In an era of fast, AI-driven automation,...

Lire la suite »

Nearly 5 Million Web Servers Found Exposing Git Metadata – Study Reveals Widespread Risk of Code and Credential Leaks

2026-02-06 09:53:07
A study found nearly 5 million servers exposing Git metadata, with 250,000 leaking deployment credentials via .git/config files. A new 2026 study by the Mysterium VPN research team reveals that nearly...

Lire la suite »

Flickr discloses potential data breach exposing users' names, emails

2026-02-06 09:43:10
Photo-sharing platform Flickr is notifying users of a potential data breach after a vulnerability at a third-party email service provider exposed their real names, email addresses, IP addresses, and...

Lire la suite »

Oracle Linux 8 ELSA-2026-2124 osbuild-composer Important Fix CVE-2025-61729

2026-02-06 09:36:00
The following updated rpms for Oracle Linux 8 have been uploaded to the Unbreakable Linux Network:

Lire la suite »

Oracle Linux 9 ELSA-2026-50095 Kernel Important Security Update

2026-02-06 09:35:48
The following updated rpms for Oracle Linux 9 have been uploaded to the Unbreakable Linux Network:

Lire la suite »

Oracle Linux 10 libsoup3 Important Update ELSA-2026-2182 CVE-2026-0719

2026-02-06 09:35:41
The following updated rpms for Oracle Linux 10 have been uploaded to the Unbreakable Linux Network:

Lire la suite »

Oracle Linux 10 ELSA-2026-1905 Fence-Agents Important Fix CVE-2026-23490

2026-02-06 09:35:39
The following updated rpms for Oracle Linux 10 have been uploaded to the Unbreakable Linux Network:

Lire la suite »

Oracle Linux 10 ELSA-2026-1838 image-builder Moderate CVE-2025-58183

2026-02-06 09:35:38
The following updated rpms for Oracle Linux 10 have been uploaded to the Unbreakable Linux Network:

Lire la suite »

From Log Aggregation to Threat Hunting: Maximizing Your SIEM Investment

2026-02-06 09:24:57
Here's the part nobody likes to admit in steering committee meetings: most organizations didn't fail… From Log Aggregation to Threat Hunting: Maximizing Your SIEM Investment on Latest Hacking...

Lire la suite »

U.S. CISA adds SmarterTools SmarterMail and React Native Community CLI flaws to its Known Exploited Vulnerabilities catalog

2026-02-06 09:22:15
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds SmarterTools SmarterMail and React Native Community CLI flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and...

Lire la suite »

Les lauréats des Trophées Go To Channel 2026

2026-02-06 08:55:35
La 5ème édition des Trophées GoToChannel dont IT Facto (maison-mère d'IT News Info, éditeur du Monde Informatique, Distributique (...)

Lire la suite »

L'Etat accélère la sortie de Microsoft Azure du Health Data Hub

2026-02-06 08:51:56
Sous le feu de vives critiques depuis sa création en 2019 pour son choix du cloud de Microsoft, le Health Data Hub annonce enfin sortir d'Azure (...)

Lire la suite »

CISA orders federal agencies to replace end-of-life edge devices

2026-02-06 08:41:11
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a new binding operational directive requiring federal agencies to identify and remove network edge devices that no longer receive...

Lire la suite »

Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

2026-02-06 08:40:00
Cybersecurity researchers have discovered a new supply chain attack in which legitimate packages on npm and the Python Package Index (PyPI) repository have been compromised to push malicious versions...

Lire la suite »

Eradicating trivial vulnerabilities, at scale

2026-02-06 08:11:58
A new NCSC research paper aims to reduce the presence of ‘unforgivable' vulnerabilities.

Lire la suite »

Thanking the vulnerability research community with NCSC Challenge Coins

2026-02-06 08:11:32
Reflecting on the positive impact of the Vulnerability Reporting Service – and introducing something new for selected contributors.

Lire la suite »

SQLi in administrative interface

2026-02-06 08:00:00
CVSSv3 Score: 9.1 An improper neutralization of special elements used in an SQL Command ('SQL Injection') vulnerability [CWE-89] in FortiClientEMS may allow an unauthenticated attacker to execute...

Lire la suite »

A2A, ACP, agents.json… Que deviennent ces protocoles agentiques ?

2026-02-06 07:15:12
En 2025, une université chinoise avait proposé une taxonomie d'une quinzaine de projets de protocoles agentiques. Où en sont-ils ? The post A2A, ACP, agents.json… Que deviennent ces protocoles...

Lire la suite »

Mageia 9 Python-Django Critical SQL Injection DoS MGASA-2026-0032

2026-02-06 06:12:34
MGASA-2026-0032 - Updated python-django packages fix security vulnerabilities

Lire la suite »

Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries

2026-02-06 05:49:00
Artificial intelligence (AI) company Anthropic revealed that its latest large language model (LLM), Claude Opus 4.6, has found more than 500 previously unknown high-severity security flaws in open-source...

Lire la suite »

Vulnérabilité dans les produits Juniper Networks (06 février 2026)

06/02/2026
Une vulnérabilité a été découverte dans les produits Juniper Networks. Elle permet à un attaquant de provoquer un déni de service à distance.

Lire la suite »

Multiples vulnérabilités dans Tenable Nessus (06 février 2026)

06/02/2026
De multiples vulnérabilités ont été découvertes dans Tenable Nessus. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.

Lire la suite »

Multiples vulnérabilités dans Asterisk (06 février 2026)

06/02/2026
De multiples vulnérabilités ont été découvertes dans Asterisk. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges...

Lire la suite »

Multiples vulnérabilités dans Microsoft Edge (06 février 2026)

06/02/2026
De multiples vulnérabilités ont été découvertes dans Microsoft Edge. Elles permettent à un attaquant de provoquer un contournement de la politique de sécurité et un problème de sécurité non...

Lire la suite »

Multiples vulnérabilités dans les produits Moxa (06 février 2026)

06/02/2026
De multiples vulnérabilités ont été découvertes dans les produits Moxa. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données et un déni de service. L'éditeur,...

Lire la suite »

Vulnérabilité dans ESET Management Agent (06 février 2026)

06/02/2026
Une vulnérabilité a été découverte dans ESET Management Agent. Elle permet à un attaquant de provoquer une élévation de privilèges.

Lire la suite »

Vulnérabilité dans NetApp ONTAP 9 (06 février 2026)

06/02/2026
Une vulnérabilité a été découverte dans NetApp ONTAP 9. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données et un déni de service.

Lire la suite »

Multiples vulnérabilités dans le noyau Linux de SUSE (06 février 2026)

06/02/2026
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité...

Lire la suite »

Multiples vulnérabilités dans le noyau Linux d'Ubuntu (06 février 2026)

06/02/2026
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.

Lire la suite »

Multiples vulnérabilités dans le noyau Linux de Red Hat (06 février 2026)

06/02/2026
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une...

Lire la suite »

Multiples vulnérabilités dans les produits IBM (06 février 2026)

06/02/2026
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation...

Lire la suite »