Toute l'actualité de la Cybersécurité


Microsoft intègre Cowork d'Anthropic à Copilot

2026-03-31 17:55:18
Si Microsoft est historiquement proche d’Open AI, cela ne l’empêche pas d’aller aussi voir ailleurs pour étendre ses projets (...)

Lire la suite »

Cisco source code stolen in Trivy-linked dev environment breach

2026-03-31 17:53:04
Cisco has suffered a cyberattack after threat actors used stolen credentials from the recent Trivy supply chain attack to breach its internal development environment and steal source code belonging to...

Lire la suite »

Opération Alice, le dark web sous pression

2026-03-31 16:59:00
Opération Alice : 373 000 sites onion fermés, 440 clients identifiés et un vaste réseau cybercriminel exposé.

Lire la suite »

VRP 2025 Year in Review

2026-03-31 16:55:00
Posted by Dirk Göhmann, Tony Mendez, and the Vulnerability Rewards Program Team2025 marked a special year in the history of vulnerability rewards and bug bounty programs at Google: our 15th anniversary...

Lire la suite »

Le faux live GTA qui a mené à la prison à vie !

2026-03-31 16:28:52
Faux live GTA, vidéosurveillance, effacement des traces : comment un alibi numérique a conduit un youtubeur à la perpétuité.

Lire la suite »

En commission d'enquête, Capgemini défend sa « neutralité »

2026-03-31 16:20:37
Capgemini n'a « pas d'intérêt à proposer une solution plutôt qu'une autre », selon son P-DG, qui réfute aussi toute prise de décision technologique pour le compte des clients. The post En commission...

Lire la suite »

Le pirate était une influenceuse

2026-03-31 16:14:16
Adva Lavie, alias Mia Ventura, accusée d'avoir utilisé la confiance en ligne pour voler des victimes.

Lire la suite »

Axios Hijacked: npm Account Takeover Deploys Cross-Platform RAT to Millions

2026-03-31 16:10:12
Axios Hijacked: npm Account Takeover Deploys Cross-Platform RAT to Millions

Lire la suite »

TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks

2026-03-31 16:03:00
A high-severity security flaw in the TrueConf client video conferencing software has been exploited in the wild as a zero-day as part of a campaign targeting government entities in Southeast Asia dubbed...

Lire la suite »

Applying security fundamentals to AI: Practical advice for CISOs

2026-03-31 16:00:00
Read actionable advice for CISOs on securing AI, managing risk, and applying core security principles in today's AI‑powered environment. The post Applying security fundamentals to AI: Practical advice...

Lire la suite »

Application Maison Blanche, les risques concrets

2026-03-31 15:57:58
Application Maison Blanche : GPS, profilage, scripts tiers, les risques concrets pour vos données et votre vie privée.

Lire la suite »

Kali Linux 2026.1 muscle l'arsenal offensif

2026-03-31 15:48:04
Kali Linux 2026.1 modernise le pentest avec nouveaux outils, refonte visuelle et avancées NetHunter.

Lire la suite »

Rethinking Vulnerability Management Strategies for Mid-Market Security

2026-03-31 15:35:55
Intruder's Chris Wallis argues mid-market teams should prioritize CVE remediation speed over vulnerability counts, while expanding defenses beyond CVEs to include attack surface management.

Lire la suite »

AI and Quantum Are Forcing a Rethink of Digital Trust

2026-03-31 15:29:11
In a conversation with Dark Reading's Terry Sweeney, DigiCert CEO Amit Sinha explains how AI-driven identities and quantum threats are reshaping the foundations of digital trust.

Lire la suite »

HackerOne touché par la fuite chez Navia

2026-03-31 15:16:05
Fuite chez Navia : 287 salariés de HackerOne exposés, avec un risque élevé de phishing ciblé et d'ingénierie sociale.

Lire la suite »

Proton lance son service de visioconférence Meet

2026-03-31 15:15:47
Après avoir intégré un éditeur de texte en 2024 et un tableur en décembre dernier, Proton ajoute à (...)

Lire la suite »

Le marché noir des données et la riposte Zataz

2026-03-31 15:02:51
Darknet, fuites et données volées : pourquoi la veille Zataz aide, sans remplacer la prévention.

Lire la suite »

Axios supply chain attack chops away at npm trust

2026-03-31 14:53:15
Developers using the axios package from npm may have downloaded a malicous version that drops a Remote Access Trojan

Lire la suite »

L'Anssi croit en un clone de SecNumCloud au niveau européen

2026-03-31 14:46:38
En début d'année, Bruxelles dévoilait une première version de la révision de la directive européenne sur la cybersécurité, (...)

Lire la suite »

How to Improve Your Debounce and Get It to Stop Lying to You

2026-03-31 14:00:38
Debouncing is a pattern that coalesces a burst of calls into one invocation after a quiet window. It gives the feeling that requests are "under control," but it does not control the request lifecycle:...

Lire la suite »

How to Categorize AI Agents and Prioritize Risk

2026-03-31 14:00:10
AI agent risk isn't equal, it scales with access to systems and level of autonomy. Token Security explains how CISOs should categorize agents and prioritize what to secure first. [...]

Lire la suite »

Nearly half a Million mobile customers of Lloyds Banking Group affected by security incident

2026-03-31 13:58:48
Lloyds Banking Group data incident exposed transactions of ~450,000 mobile banking users due to a faulty update. A faulty software update at Lloyds Banking Group exposed transaction details of nearly...

Lire la suite »

Kaplan face à une fuite de données massive

2026-03-31 13:54:52
Kaplan revoit à 1,4 million le nombre de victimes d'une fuite impliquant des données sensibles et un accès réseau prolongé.

Lire la suite »

Hackers compromise Axios npm package to drop cross-platform malware

2026-03-31 13:53:43
Hackers hijacked the npm account of the Axios package, a JavaScript HTTP client with 100M+ weekly downloads, to deliver remote access trojans to Linux, Windows, and macOS systems. [...]

Lire la suite »

Hackers Poison Axios npm Package with 100 Million Weekly Downloads

2026-03-31 13:49:04
Axios npm Package compromised in a supply chain attack, exposing developers to malware, data theft, and full system takeover risks worldwide.

Lire la suite »

WhatsApp malware campaign delivers VBS payloads and MSI backdoors

2026-03-31 13:43:05
A malware campaign uses WhatsApp messages to deliver VBS scripts that initiate a multi-stage infection chain. The attack leverages renamed Windows tools and cloud-hosted payloads to install MSI backdoors...

Lire la suite »

Un courtier d'accès russe condamné dans l'affaire Yanluowang

2026-03-31 13:36:18
Aleksei Volkov, lié à Yanluowang, condamné à 81 mois dans une affaire révélatrice des rouages du ransomware.

Lire la suite »

Iran Deploys 'Pseudo-Ransomware,' Revives Pay2Key Operations

2026-03-31 13:31:33
Iranian APTs are blurring the lines between state-sponsored and cybercriminal activities to target high-impact US organizations.

Lire la suite »

Crunchyroll confirme une fuite via un sous-traitant

2026-03-31 13:11:20
Crunchyroll confirme une fuite liée au support client, révélatrice du risque cyber majeur porté par les sous-traitants.

Lire la suite »

Vertex AI Vulnerability Exposes Google Cloud Data and Private Artifacts

2026-03-31 13:09:00
Cybersecurity researchers have disclosed a security "blind spot" in Google Cloud's Vertex AI platform that could allow artificial intelligence (AI) agents to be weaponized by an attacker to gain unauthorized...

Lire la suite »

Hackers Weaponize Legitimate Windows Tools to Disable Antivirus Before Ransomware Attacks

2026-03-31 13:02:27
Ransomware attacks have gone far beyond simple malicious code. Today, attackers operate with the precision of a well-planned business, using trusted Windows tools to quietly tear down defenses before...

Lire la suite »

Is Your Repository Ready for What's Next?

2026-03-31 13:00:04
Most software teams don't start out planning to adopt an enterprise artifact repository.

Lire la suite »

Initial Access Brokers have Shifted to High-Value Targets and Premium Pricing

2026-03-31 13:00:00
Initial Access Brokers (IABs) are a key component of the cybercrime ecosystem, offering hassle-free building blocks for ransomware, data theft, and extortion. Rapid7's analysis of H2 2025 activity across...

Lire la suite »

Proton Launches Encrypted Video Conferencing and Unified Workspace to Take On Google and Microsoft

2026-03-31 12:57:16
Swiss privacy company Proton has today announced the simultaneous launch of Proton Workspace and Proton Meet, its most significant expansion yet into the enterprise productivity market and a direct challenge...

Lire la suite »

Google Unveils Ransomware Detection and File Restoration for Google Drive

2026-03-31 12:47:59
Google has officially moved its ransomware detection and file restoration features for Google Drive into General Availability. Originally launched in beta in September 2025, the updated security controls...

Lire la suite »

[Spécial Forum InCyber] « Maîtriser nos dépendances numériques »

2026-03-31 12:40:40
La souveraineté est au cœur de l'édition 2026 du Forum International de la Cybersécurité à Lille, auquel Splunk participe. L'occasion pour Les Résilients d'aborder les enjeux de data, de...

Lire la suite »

Hackers Deploy Telegram-Based ResokerRAT With Screenshot and Persistence Features

2026-03-31 12:39:05
A new remote access trojan known as ResokerRAT has come to light, using Telegram’s bot API as its core communication channel to silently monitor and control infected Windows machines. What makes...

Lire la suite »

The CISO Gap: Why Every Business Needs Cybersecurity Leadership

2026-03-31 12:19:42
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Mar. 31, 2026 – Read the full story in Forbes One message has persisted over the past few years: cybersecurity...

Lire la suite »

Microsoft fixes Outlook Classic crashes caused by Teams Meeting add-in

2026-03-31 12:04:15
​Microsoft has resolved a known issue that rendered the classic Outlook email client unusable for users who enabled the Microsoft Teams Meeting Add-in. [...]

Lire la suite »

NCSC warns of messaging app targeting

2026-03-31 12:00:00
The NCSC has issued actions for individuals at risk of targeted attacks against messaging apps.

Lire la suite »

Avec Mythos, Anthropic risque de bouleverser le marché de la cybersécurité

2026-03-31 11:57:20
Anthropic n’avait pas l’intention d’introduire Mythos de cette manière. C’est une fuite de données dans son système (...)

Lire la suite »

The AI Arms Race – Why Unified Exposure Management Is Becoming a Boardroom Priority

2026-03-31 11:50:00
The cybersecurity landscape is accelerating at an unprecedented rate. What is emerging is not simply a rise in the number of vulnerabilities or tools, but a dramatic increase in speed. Speed of attack,...

Lire la suite »

Silver Fox Expands Asia Cyber Campaign with AtlasCross RAT and Fake Domains

2026-03-31 11:46:00
Chinese-speaking users are the target of an active campaign that uses typosquatted domains impersonating trusted software brands to deliver a previously undocumented remote access trojan named AtlasCross...

Lire la suite »

LangChain touché par une troisième faille de sécurité

2026-03-31 11:40:20
Les utilisateurs de LangChain doivent redoubler de vigilance. En décembre dernier, ce framework modulaire pour Python et TypeScript/JavaScript servant (...)

Lire la suite »

Critical F5 BIG-IP Flaw Upgraded to 9.8 RCE, Exploited in the Wild

2026-03-31 11:36:21
F5 BIG-IP APM flaw CVE-2025-53521 escalates to critical 9.8 RCE, actively exploited. Patch now, check IoCs, and secure vulnerable systems immediately.

Lire la suite »

Dutch Ministry of Finance takes treasury systems offline amid cyber incident investigation

2026-03-31 11:34:19
The Dutch Ministry of Finance took treasury banking portal offline after a cyberattack; core tax systems were not affected. The Dutch Ministry of Finance took parts of its infrastructure offline, including...

Lire la suite »

Unmasking the Truth

2026-03-31 11:30:29
Ralph Paton explains his actions, revealing his secret marriage to Ursula and the challenges he faced while in hiding. Dr. Sheppard discreetly assisted him, keeping him out of police reach. Poirot carefully...

Lire la suite »

Anthropic's Claude Code Source Code Reportedly Leaked Via Their npm Registry

2026-03-31 11:29:13
Anthropic’s proprietary Claude Code CLI tool has had its full TypeScript source code inadvertently exposed through a misconfigured npm package, after a security researcher discovered a leaked .map...

Lire la suite »

La SNCF, utilisatrice désormais primée de l'écosystème Kubernetes

2026-03-31 11:03:40
La CNCF a décerné au groupe français un community award (« meilleur utilisateur final ») pour son usage des projets de l'écosystème Kubernetes. The post La SNCF, utilisatrice désormais primée...

Lire la suite »

The High Cost of Hesitation: Why the Senate Must Provide CLARITY

2026-03-31 11:01:05
The debate over digital asset regulation in the U.S. was framed as a battle between "pro-innovation" pioneers and 'pro-consumer' watchdogs. By failing to establish a comprehensive federal market structure...

Lire la suite »

WordPress Plugin Vulnerability Exposes Sensitive Data From 800,000+ Sites

2026-03-31 10:59:06
A high-severity security flaw has been disclosed in Smart Slider 3, one of the most widely used WordPress slider builder plugins. With over 800,000 active installations, this vulnerability leaves a massive...

Lire la suite »

EvilTokens Emerges as New Phishing-as-a-Service Platform for Microsoft Account Takeover

2026-03-31 10:58:41
A new and dangerous phishing toolkit has entered the cybercrime scene. In early 2026, a Phishing-as-a-Service platform called EvilTokens began circulating in underground cybercrime communities, offering...

Lire la suite »

ChatGPT Vulnerability Let Attackers Silently Exfiltrate User Prompts and Other Sensitive Data

2026-03-31 10:48:43
Users routinely trust AI assistants with highly sensitive information, including medical records, financial documents, and proprietary business code. Check Point Research recently disclosed a critical...

Lire la suite »

Ubuntu 18.04 LTS Pillow Critical DoS Buffer Overflow Bug USN-8135-1

2026-03-31 10:46:11
Several security issues were fixed in Pillow.

Lire la suite »

MIWIC26: Gizem Acar Tekin, CEO and Co-founder of Photarix

2026-03-31 10:45:53
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature...

Lire la suite »

ZepoteQ Earns an 87.4 Proof of Usefulness Score by Building Scalable SaaS Platforms and Business Automation Tools

2026-03-31 10:41:42
ZepoteQ is a software development company focused on building SaaS platforms, CRM systems, and automation tools for startups and growing businesses. Using modern technologies like React, Next.js, and...

Lire la suite »

CareCloud Data Breach – Hackers Accessed IT Infrastructure and Stole Patient Data

2026-03-31 10:40:56
A prominent healthcare technology provider has formally disclosed a significant cybersecurity incident involving unauthorized access to its IT infrastructure. An unauthorized actor compromised one of...

Lire la suite »

Video Wizard Earns a 43 Proof of Usefulness Score by Building an AI-Powered Video Content Analysis Platform

2026-03-31 10:29:36
Video Wizard is an open-source tool that automates video editing, subtitle generation, and viral clip identification using AI. Built with technologies like Next.js, Remotion, and OpenCV, it streamlines...

Lire la suite »

Equinix simplifie la gestion des ressources IA distribuées

2026-03-31 10:26:56
La prolifération des données a toujours été un problème récurrent pour les responsables IT. Cependant, à (...)

Lire la suite »

Nostr WoT Earns a 57 Proof of Usefulness Score by Building a Portable Web of Trust Layer for the Browser

2026-03-31 10:20:31
Nostr WoT is a browser extension that embeds a Web of Trust layer directly into the user's browsing environment, enabling decentralized reputation and spam filtering across all Nostr clients. By running...

Lire la suite »

Typhoon Earns a 46 Proof of Usefulness Score by Building Robust Retry Policies for Asynchronous Swift Operations

2026-03-31 10:04:45
Typhoon is a lightweight Swift framework designed to handle transient failures in asynchronous operations using modern async/await patterns. By offering configurable retry strategies and type-safe integrations,...

Lire la suite »

Double Agents: Exposing Security Blind Spots in GCP Vertex AI

2026-03-31 10:00:56
Unit 42 uncovers a "double agent" flaw in Google Cloud's Vertex AI, demonstrating how overprivileged AI agents can compromise cloud environments. The post Double Agents: Exposing Security Blind Spots...

Lire la suite »

USN-8136-1: Dovecot vulnerabilities

2026-03-31 09:48:59
It was discovered that Dovecot incorrectly handled invalid base64 SASL data. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 25.10. (CVE-2025-59028) It...

Lire la suite »

U.S. CISA adds a flaw in Citrix NetScaler to its Known Exploited Vulnerabilities catalog

2026-03-31 09:31:41
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in Citrix NetScaler to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency...

Lire la suite »

Hacker charged with stealing million from Uranium crypto exchange

2026-03-31 09:15:45
U.S. prosecutors have charged a Maryland man with stealing more than million after hacking the Uranium Finance crypto exchange twice and laundering the proceeds through a cryptocurrency mixer. [...]...

Lire la suite »

Apple New macOS Tahoe Feature Warns Users on ClickFix Attacks

2026-03-31 09:03:54
Apple has introduced a new security mechanism in the macOS Tahoe 26.4 release candidate to protect users against social engineering campaigns known as ClickFix attacks. Discovered by users testing the...

Lire la suite »

Forum INCYBER : les 4 lauréats du Prix de la Start-Up

2026-03-31 09:03:04
Pour la première fois, le prix de la Start-Up du Forum INCYBER consacre un double lauréat. Elles sont donc 4 sociétés pour 5 récompenses. The post Forum INCYBER : les 4 lauréats du Prix de la Start-Up...

Lire la suite »

The Man Who Thinks AI Can Beat the Market

2026-03-31 09:00:48
FINQ is betting AI can fully replace human portfolio managers. Its AI-managed ETFs analyze financials, sentiment, and market data across the S&P 500 to rank stocks daily. Unlike humans, AI removes...

Lire la suite »

CISA Warns of Citrix NetScaler Vulnerability Actively Exploited in Attacks

2026-03-31 08:58:33
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning regarding a critical vulnerability affecting Citrix NetScaler products. Identified as CVE-2026-3055, this security...

Lire la suite »

Kaspersky identifie le kit d'exploitation Coruna comme une évolution majeure d'Opération Triangulation

2026-03-31 08:56:44
L’équipe du GReAT (Global Research and Analysis Team) de Kaspersky a mené une analyse approfondie du code source des exploits Coruna et a déterminé avec certitude que ce kit constitue une itération...

Lire la suite »

Cybersécurité : arrêtons de nous raconter des histoires

2026-03-31 08:52:54
Il y a quelque chose d’étrange dans notre secteur : plus on investit, plus on se fait attaquer !  On le sait, on en parle, et on continue à peu près comme avant. Ce n’est pas un manque...

Lire la suite »

Quiet Cost Earns a 34 Proof of Usefulness Score by Building an Executive Diagnostic Tool for Hidden Revenue Leakage

2026-03-31 08:45:46
Quiet Cost is a diagnostic tool designed to help businesses identify hidden sources of revenue leakage caused by inefficiencies, outdated processes, and misaligned decisions. Through a short, structured...

Lire la suite »

SUSE 2026 WebKitGTK3 Important Denial Of Service Advisory 1150-1

2026-03-31 08:30:46
An update that solves 25 vulnerabilities can now be installed.

Lire la suite »

openSUSE Leap 15.4 webkit2gtk3 Important Memory Issues Vuln 2026-1150-1

2026-03-31 08:30:46
An update that solves 25 vulnerabilities can now be installed.

Lire la suite »

Exposé

2026-03-31 08:30:06
Poirot hosts a strategic reunion of all Fernly Park suspects, presenting Ursula Paton's secret marriage and analyzing critical clues, including the dictaphone and summer-house timeline. He confirms...

Lire la suite »

From SQL Analytics to Predictive Decision Systems: Operationalizing ML Models in Business Operation

2026-03-31 08:10:11
SQL analytics shows what happened, but modern businesses need to act on what will happen next. The real challenge isn't building ML models, it's operationalizing them. That means feature stores to...

Lire la suite »

Why Your Kubernetes Platform Team Is Still Answering Tickets in 2026

2026-03-31 08:08:10
Kubernetes doesn't fail at scale because of infrastructure, it fails because of inconsistent human processes. Namespace-as-a-Service (NaaS) fixes this by enforcing policy before automation. Build constraints...

Lire la suite »

Ubuntu 20.04 LTS Pyasn1 High Risk DoS Vulnerabilities USN-8134-1

2026-03-31 07:58:35
Several security issues were fixed in pyasn1.

Lire la suite »

Ubuntu 24.04 ImageMagick Critical DoS Risk USN-8127-1 CVE-2026-23952

2026-03-31 07:55:55
Several security issues were fixed in ImageMagick.

Lire la suite »

Dutch Finance Ministry takes treasury banking portal offline after breach

2026-03-31 07:52:15
The Dutch Ministry of Finance took some of its systems offline, including the digital portal for treasury banking, while investigating a cyberattack detected two weeks ago. [...]

Lire la suite »

Common Entra ID Security Assessment Findings – Part 2: Privileged Unprotected Groups

2026-03-31 07:41:32
In part 2 of our 4-part series on common Entra ID security findings, we show how seemingly harmless group configurations can be abused to bypass security controls and gain high privileges. The post shows...

Lire la suite »

Mageia 9 ZynAddSubFX Bugfix Advisory MGAA-2026-0024 Released Soon

2026-03-31 07:31:58
MGAA-2026-0024 - Updated zynaddsubfx packages fix bug

Lire la suite »

Qilin Ransomware allegedly breached chemical manufacturer giant Dow Inc

2026-03-31 07:21:16
Qilin ransomware claims a breach of Dow Inc., listing it on its Tor leak site, but no proof of the hack has been released yet. Qilin Ransomware group allegedly breached the chemical manufacturing giant...

Lire la suite »

CISA orders feds to patch actively exploited Citrix flaw by Thursday

2026-03-31 07:05:25
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) ordered government agencies to patch their Citrix NetScaler appliances against an actively exploited vulnerability by Thursday. [...]

Lire la suite »

️ SQL Injection for Beginners: The Complete Guide

2026-03-31 06:59:59
Welcome to one of the most important topics in cybersecurity! SQL Injection is a vulnerability that has been around since the late 1990s…Continue reading on InfoSec Write-ups »

Lire la suite »

Why Most Cybersecurity Beginners Never Become Hackers

2026-03-31 06:55:25
I watched hundreds start the journey. Only a few made it to the other side.Continue reading on InfoSec Write-ups »

Lire la suite »

Before You Touch Nmap: Networking Fundamentals Every Beginner Must Understand

2026-03-31 06:53:18
Before you run a single Nmap command, you need to understand how networks actually work.Nmap is not magic — it is a tool that speaks the same language every device on the internet understands....

Lire la suite »

SAR — CVE-2019–12454 in sar2html and a Writable Cron Script That Got Me Root | OffSec PG

2026-03-31 06:52:58
SAR is an easy-rated Linux machine on OffSec Proving Grounds Play. Two services are exposed: SSH on 22 and Apache on 80. The web server hosts sar2html v3.2.1, a system activity reporting tool that passes...

Lire la suite »

Cuties AI - 144,250 breached accounts

2026-03-31 06:52:52
In March 2026, the NSFW AI companion platform Cuties AI suffered a data breach that was subsequently published to a public hacking forum. The incident exposed 144k unique email addresses along with display...

Lire la suite »

Understanding OT Cybersecurity: A Practical Guide to Asset Inventory for Industrial Control…

2026-03-31 06:49:55
Industrial control systems run the backbone of our modern world — from power grids and water treatment plants to manufacturing floors and…Continue reading on InfoSec Write-ups »

Lire la suite »

Thinking Tokens Are the New Denial-of-Wallet Attack Surface

2026-03-31 06:49:19
Last month I burned through 0 in API credits in a single day. Not because I was doing anything fancy. I was running a batch of security classification prompts through Gemini 3 Flash, and I picked it...

Lire la suite »

The Axios npm Compromise: How the Internet's Most Popular HTTP Client Became a Trojan Horse

2026-03-31 06:45:58
A hijacked maintainer account. A phantom dependency. A self-erasing Remote Access Trojan. If you ran npm install on March 31, 2026, your infrastructure might already be compromised.The axios npm compromise...

Lire la suite »

Your Secure Messenger is Spying on You (And You Can't Turn It Off)

2026-03-31 06:44:51
No malware. No clicking on sketchy links. All a hacker needs is your phone number to track your sleep schedule, app usage, and physical location.When the ‘Careless Whisper' research was first published...

Lire la suite »

How I Attacked Active Directory During OSCP Labs (And What Tools Actually Worked)

2026-03-31 06:43:37
Welcome to this new blog where we’ll be diving into Active Directory attacks for OSCP.Continue reading on InfoSec Write-ups »

Lire la suite »

Anglerphish — A Feature-Rich Gophish Fork

2026-03-31 06:37:20
Anglerphish — A Feature-Rich Gophish ForkFrom Side Project to an Upgraded Gophish PlatformIf you work in cyber security, chances are you've come across Gophish at some point — whether...

Lire la suite »

Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account

2026-03-31 06:08:00
The popular HTTP client known as Axios has suffered a supply chain attack after two newly published versions of the npm package introduced a malicious dependency that delivers a trojan capable of targeting...

Lire la suite »

AI Agents Are Democratizing Finance but Also Redefining Risk

2026-03-31 00:41:17
AI agents are transforming finance, enabling automated trading and payments, but introduce new risks around keys, data inputs and secure execution control.

Lire la suite »

USN-8135-1: Pillow vulnerabilities

2026-03-31 00:19:20
It was discovered that Pillow did not correctly handle reading J2K files, which could lead to an out-of-bounds read vulnerability. If a user or automated system were tricked into opening a specially crafted...

Lire la suite »

Multiples vulnérabilités dans Papercut (31 mars 2026)

31/03/2026
De multiples vulnérabilités ont été découvertes dans Papercut. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données et une injection de code indirecte à...

Lire la suite »

Vulnérabilité dans Symantec Data Loss Prevention (DLP) (31 mars 2026)

31/03/2026
Une vulnérabilité a été découverte dans Symantec Data Loss Prevention (DLP). Elle permet à un attaquant de provoquer une élévation de privilèges.

Lire la suite »

Vulnérabilité dans Elastic OpenTelemetry Java (31 mars 2026)

31/03/2026
Une vulnérabilité a été découverte dans Elastic OpenTelemetry Java. Elle permet à un attaquant de provoquer une exécution de code arbitraire à distance.

Lire la suite »

Multiples vulnérabilités dans Microsoft Edge (31 mars 2026)

31/03/2026
De multiples vulnérabilités ont été découvertes dans Microsoft Edge. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.

Lire la suite »

Multiples vulnérabilités dans les produits Microsoft (31 mars 2026)

31/03/2026
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.

Lire la suite »

Multiples vulnérabilités dans les produits FoxIT (31 mars 2026)

31/03/2026
De multiples vulnérabilités ont été découvertes dans les produits FoxIT. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges...

Lire la suite »