Toute l'actualité de la Cybersécurité
Germany warns of Signal account hijacking targeting senior figures
2026-02-06 20:00:33
Germany's domestic intelligence agency is warning of suspected state-sponsored threat actors targeting high-ranking individuals in phishing attacks via messaging apps like Signal. [...]
Transparent Tribe Hacker Group Attacking India's Startup Ecosystem
2026-02-06 19:46:29
The threat landscape for India’s technology sector has taken an unexpected turn. A Pakistan-based hacking group called Transparent Tribe has shifted its focus from traditional government targets...
Bulletproof Hosting Providers Leverage Legitimate ISPsystem to Supply Servers for Cybercriminals
2026-02-06 19:16:09
In the constantly shifting landscape of online threats, cybercriminals have found a new way to strengthen their attacks by hiding behind legitimate technology. Late in 2025, a series of ransomware incidents...
Metasploit Wrap-Up 02/06/2026
2026-02-06 18:52:32
Google Summer of Code 2026Our very own Jack Heysel has added some documentation which outlines the Metasploit Framework project ideas for GSoC 2026. For anyone interested in applying please see GSoC-How-To-Apply documentation,...
New FvncBot Attacking Android Users by Exploiting Accessibility Services
2026-02-06 18:42:00
A dangerous new malicious application has surfaced, targeting mobile banking customers in Poland. Observed on November 25, 2025, this threat masquerades as a legitimate security tool purportedly from...
DKnife Linux toolkit hijacks router traffic to spy, deliver malware
2026-02-06 18:35:11
A newly discovered toolkit called DKnife has been used since 2019 to hijack traffic at the edge-device level and deliver malware in espionage campaigns. [...]
Heroku passe officiellement en mode maintenance
2026-02-06 17:49:14
Heroku abandonne le développement de nouvelles fonctionnalités et ne commercialise plus son offre Enterprise. Les investissements se recentrent sur l'IA.
The post Heroku passe officiellement en mode...
Avant la fin du support, Ingress Nginx corrige plusieurs failles
2026-02-06 17:36:25
Alerte sur la sécurité de l’outil open source Ingress Nginx - géré par la CNCF et à ne pas confondre avec le logiciel (...)
USN-8015-3: Linux kernel (FIPS) vulnerabilities
2026-02-06 17:34:32
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
...
CISA warns of SmarterMail RCE flaw used in ransomware attacks
2026-02-06 17:16:03
The Cybersecurity & Infrastructure Security Agency (CISA) in the U.S. has issued a warning about CVE-2026-24423, an unauthenticated remote code execution (RCE) flaw in SmarterMail that is used in ransomware...
How Parents Are Using Nori AI Families Assistant to Reduce Mental Load — Not Run Their Lives
2026-02-06 17:00:02
Modern family life isn't chaotic because parents are failing—it's complex because they're managing a multi-person system. This article explores how parents use Nori AI Families Assistant to reduce...
Crypto Market is Down T in 5 Months While This Cheap Altcoin is Surging
2026-02-06 16:50:05
Mutuum Finance is a decentralized protocol in development that focuses on crypto lending and borrowing without traditional intermediaries. The goal is to let users earn yield by lending their assets or...
Achats publics numériques : la souveraineté devient un critère de choix
2026-02-06 16:49:21
L'État français s'apprête à transformer sa doctrine d'achat dans le numérique. Une circulaire portée par trois ministres place désormais la souveraineté technologique au cœur des décisions,...
Shaping the Future of Sustainable AI: Key Takeaways from ICAIDISS 2026
2026-02-06 16:45:03
ICAIDISS 2026, hosted by Sharda University Agra, brought global researchers together to advance AI-driven intelligent systems for sustainability. With a highly selective peer-review process, the conference...
'Encrypt It Already' Campaign Pushes Big Tech to Prioritize E2E Encryption
2026-02-06 16:34:41
The Electronic Frontier Foundation is urging major technology companies to follow through on their promises to implement end-to-end encryption (E2E) by default across their services, as privacy concerns...
Shai-hulud: The Hidden Cost of Supply Chain Attacks
2026-02-06 16:25:14
Recent supply chain attacks involving self-propagating worms have spread far, but the damage and long-term impact is hard to quantify.
The HackerNoon Newsletter: The Weather-Report Lie: AI Isn't Fate (2/6/2026)
2026-02-06 16:03:21
How are you, hacker?
🪐 What's happening in tech today, February 6, 2026?
The
HackerNoon Newsletter
brings the HackerNoon
...
Read This If You Want to Be an Inventor, Not an Imitator
2026-02-06 16:00:07
The goal of a conscious mind is to defeat entropy by creating new knowledge. Most people fail because they optimize for "looking the part" (credentials, networking, tutorials) rather than "doing the part."
The...
Moltbook: Cutting Through the AI Hype to the Real Security Risks
2026-02-06 15:47:29
Moltbook has exploded into the security and AI communities with remarkable speed. In a matter of days, it has gone from an experimental curiosity to a viral talking point, with some observers framing...
Comment Alain Afflelou a lâché VMware
2026-02-06 15:45:22
Groupe Alain Afflelou a retenu Nutanix AHV comme alternative à Vmware et basculé 200 VM et 200 To en trois semaines avec l'intégrateur SPIE.
The post Comment Alain Afflelou a lâché VMware appeared...
OpenClaw's Gregarious Insecurities Make Safe Usage Difficult
2026-02-06 15:42:15
Malicious "skills" and persnickety configuration settings are just some of the issues that security researchers have found when installing — and removing — the OpenClaw AI assistant.
Microsoft Teams et Google Meet entrent en connexion directe
2026-02-06 15:21:37
Google et Microsoft ont établi une interopérabilité sans passerelle tierce entre leurs solutions respectives et le hardware associé.
The post Microsoft Teams et Google Meet entrent en connexion directe...
{ Tribune Expert } – Vibe Coding : un défi pour les développeurs
2026-02-06 15:05:55
Derrière la promesse d'un développement plus rapide et plus accessible, le Vibe Coding introduit des enjeux structurants pour les entreprises.
The post { Tribune Expert } – Vibe Coding : un...
Record-breaking 31.4 Tbps DDoS attack hits in November 2025, stopped by Cloudflare
2026-02-06 15:05:29
AISURU/Kimwolf botnet hit a record 31.4 Tbps DDoS attack lasting 35 seconds in Nov 2025, which Cloudflare automatically detected and blocked. The AISURU/Kimwolf botnet was linked to a record-breaking...
EDR, Email, and SASE Miss This Entire Class of Browser Attacks
2026-02-06 15:01:11
Many modern attacks happen entirely inside the browser, leaving little evidence for traditional security tools. Keep Aware shows why EDR, email, and SASE miss browser-only attacks and how visibility changes...
China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
2026-02-06 14:56:00
Cybersecurity researchers have taken the wraps off a gateway-monitoring and adversary-in-the-middle (AitM) framework dubbed DKnife that's operated by China-nexus threat actors since at least 2019.
The...
Flickr Notifies Users of Data Breach After External Partner Security Flaw
2026-02-06 14:55:47
Flickr says a third-party email vendor flaw may have exposed user names, emails, IP data, and activity logs,…
CISA Orders Removal of Unsupported Active Network Edge Devices to Reduce Security Risks
2026-02-06 14:48:47
CISA has issued Binding Operational Directive (BOD) 26-02, ordering Federal Civilian Executive Branch (FCEB) agencies to eliminate “end of support” (EOS) edge devices from their networks....
Apple Pay phish uses fake support calls to steal payment details
2026-02-06 14:43:55
This Apple Pay phishing campaign is designed to funnel victims into fake Apple Support calls, where scammers steal payment details.
L'école IIM ouvre un Master en IA et cybersécurité
2026-02-06 13:55:55
Face à la multiplication des cybermenaces et à la montée en puissance de l’IA, les compétences spécialisées (...)
Higinio Ochoa, Hacktivist Turned White Hat, On The Cybercrime Magazine Podcast
2026-02-06 13:54:57
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Feb. 6, 2026 –Listen to the podcast On Jun. 25, 2012, 31-year-old Higinio O. Ochoa, III of Dallas, Texas,...
EU says TikTok faces large fine over "addictive design"
2026-02-06 13:53:53
The European Commission said today that TikTok is facing a fine because its addictive features, including infinite scroll, autoplay, push notifications, and personalized recommendation systems, are breaching...
CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
2026-02-06 13:43:00
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ordered Federal Civilian Executive Branch (FCEB) agencies to strengthen asset lifecycle management for edge network devices and remove...
China-Nexus Hackers Hijacking Linux-Based Devices to Manipulate Traffic and Deploy Malware
2026-02-06 12:59:06
A sophisticated surveillance and attack framework dubbed “DKnife” has recently emerged, posing a significant threat to network security. Attributed to China-nexus threat actors, this malicious...
17% of 3rd-Party Add-Ons for OpenClaw Used in Crypto Theft and macOS Malware
2026-02-06 12:58:33
Bitdefender Labs reveals that 17% of OpenClaw AI skills analyzed in February 2026 are malicious. With over 160,000…
RenEngine Loader Using Stealthy Multi‑Stage Execution Chain to Bypass Security Controls
2026-02-06 12:46:12
Cracked game installers are again being used as a delivery channel for credential theft, but the latest wave adds an unusual twist: the malicious code hides behind a Ren'Py game launcher. The loader,...
Man pleads guilty to hacking nearly 600 women's Snapchat accounts
2026-02-06 12:34:30
An Illinois man pleaded guilty to hacking nearly 600 women's Snapchat accounts to steal nude photos that he kept, sold, or traded online, including accounts he compromised at the request of a former university...
New Wave of Odyssey Stealer Actively Targeting macOS Users
2026-02-06 12:25:49
A sophisticated and aggressive malware campaign known as Odyssey Stealer has surged recently, specifically aiming at macOS systems. This fresh wave of cyber threats has caught the attention of security...
APT-Q-27 Targeting Corporate Environments in Stealthy Attack Without Triggering Alerts
2026-02-06 12:09:56
In mid-January 2026, a highly sophisticated cyber campaign targeting financial institutions surfaced, characterized by its ability to infiltrate corporate environments without triggering standard security...
Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities
2026-02-06 12:07:00
A previously undocumented cyber espionage group operating from Asia broke into the networks of at least 70 government and critical infrastructure organizations across 37 countries over the past year,...
Flickr Confirms Data Breach – 35 million Users Data at Risk
2026-02-06 11:56:28
Flickr has disclosed a potential data breach stemming from a vulnerability in a third-party email service provider’s system. The incident, reported on February 5, 2026, may have exposed data for...
Phishing and OAuth Token Flaws Lead to Full Microsoft 365 Compromise
2026-02-06 11:30:31
Modern web applications frequently introduce unforeseen attack surfaces through seemingly harmless features designed for user engagement, such as newsletter signups, contact forms, and password resets....
From 120 Hours to 2: The Hybrid Validation Shift Behind Faster, Safer Releases
2026-02-06 11:27:38
A biographical look at how Kostiantyn Shkliar's career moved from setting up automation processes in large organizations to building validation systems that stay stable as Salesforce environments scale....
CodeXero Earns a 348 Proof of Usefulness Score by Building a Vibe Coding Engine for Web3 dApps
2026-02-06 11:22:50
CodeXero is an AI-native Web3 platform that lets creators build, launch, and monetize dApps from a single prompt, validated by a 348 Proof of Usefulness score reflecting strong user traction and real-world...
Netscout étend l'observabilité aux réseaux WiFi 7
2026-02-06 11:20:16
Le déploiement par les entreprises d’infrastructures toujours plus distribuées accroit le déficit de visibilité sur les (...)
The Deadly Arrival of Leithgow
2026-02-06 11:00:15
In this chapter of Astounding Stories of Super-Science (1932), Hawk Carse confronts the cost of betrayal as Master Scientist Eliot Leithgow is delivered into Ku Sui's hands. A tense meditation on intelligence,...
Protection des données : Cohesity et Google s'associent contre les malwares en sauvegarde
2026-02-06 10:53:19
Des intégrations natives avec Google Threat Intelligence et Google Private Scanning offrent de nouvelles façons d’identifier et d’éliminer les risques. Tribune – Cohesity, leader de...
Hoppscotch Earns a 133 Proof of Usefulness Score by Building an Open-Source, Lightweight API Development Ecosystem
2026-02-06 10:47:26
Hoppscotch is an open-source, lightweight API development platform. It helps developers test, document, and share APIs quickly and efficiently. It eliminates the bloat of traditional tools while keeping...
FinSight Earns a 55 Proof of Usefulness Score by Building an AI-Powered Finance System for Small Businesses
2026-02-06 10:38:47
FinSight is an AI-powered financial tracking platform for small businesses and freelancers that earned a 55 Proof of Usefulness score by making real-time accounting accessible through plain-language inputs....
Yubico révèle un ROI de 265 % et une réduction de 99,99 % du risque d'exposition aux coûts liés aux violations de données
2026-02-06 10:37:01
Yubico révèle un retour sur investissement de 265 % et une réduction de 99,99 % du risque d’exposition aux coûts liés aux violations de données, selon une étude sur l’impact économique...
Get-Star Earns a 27 Proof of Usefulness Score by Building Client-Side Parallel Search
2026-02-06 10:33:57
Get-Star is a fully client-side, browser-based meta-search tool that runs parallel queries across 42 sites, prioritizes user privacy, and earned a 27 Proof of Usefulness score for real-world utility.
How Samsung Knox Helps Stop Your Network Security Breach
2026-02-06 10:30:00
As you know, enterprise network security has undergone significant evolution over the past decade. Firewalls have become more intelligent, threat detection methods have advanced, and access controls are...
Safer Internet Day : KnowBe4 recommande la « pleine conscience numérique » et à la prudence face à l'IA
2026-02-06 10:22:23
Alors que le monde se prépare à célébrer la « Journée pour un Internet plus sûr », le 10 février 2026, KnowBe4 encourage les individus de tous âges à adopter un état d'esprit de pleine...
Les bases de données passent au régime « généré par IA »
2026-02-06 10:05:52
Sur l'offre Neon de Databricks, l'IA crée désormais l'essentiel des bases de données. En parallèle, les stratégies multi-LLM se répandent.
The post Les bases de données passent au régime « généré...
MEXC Launches Commodity Zero-Fee Gala with Million in Trading Rewards
2026-02-06 10:00:22
MEXC has launched its Commodity Zero-Fee Gala, offering zero-fee trading on tokenized gold, silver, and select RWA assets, plus million in rewards. Running from Feb 5 to Mar 7, 2026, the event includes...
Next Gen Spotlights: AI Assurance for Autonomous Systems – Q&A with CybPass CEO PingChen Lin
2026-02-06 09:53:55
CybPass is on a mission to ensure that autonomous systems, from drones and robotics to self-driving vehicles, are safe, secure and ready for real-world deployment. In an era of fast, AI-driven automation,...
Nearly 5 Million Web Servers Found Exposing Git Metadata – Study Reveals Widespread Risk of Code and Credential Leaks
2026-02-06 09:53:07
A study found nearly 5 million servers exposing Git metadata, with 250,000 leaking deployment credentials via .git/config files. A new 2026 study by the Mysterium VPN research team reveals that nearly...
Flickr discloses potential data breach exposing users' names, emails
2026-02-06 09:43:10
Photo-sharing platform Flickr is notifying users of a potential data breach after a vulnerability at a third-party email service provider exposed their real names, email addresses, IP addresses, and...
Oracle Linux 8 ELSA-2026-2124 osbuild-composer Important Fix CVE-2025-61729
2026-02-06 09:36:00
The following updated rpms for Oracle Linux 8 have been uploaded to the Unbreakable Linux Network:
Oracle Linux 9 ELSA-2026-50095 Kernel Important Security Update
2026-02-06 09:35:48
The following updated rpms for Oracle Linux 9 have been uploaded to the Unbreakable Linux Network:
Oracle Linux 10 libsoup3 Important Update ELSA-2026-2182 CVE-2026-0719
2026-02-06 09:35:41
The following updated rpms for Oracle Linux 10 have been uploaded to the Unbreakable Linux Network:
Oracle Linux 10 ELSA-2026-1905 Fence-Agents Important Fix CVE-2026-23490
2026-02-06 09:35:39
The following updated rpms for Oracle Linux 10 have been uploaded to the Unbreakable Linux Network:
Oracle Linux 10 ELSA-2026-1838 image-builder Moderate CVE-2025-58183
2026-02-06 09:35:38
The following updated rpms for Oracle Linux 10 have been uploaded to the Unbreakable Linux Network:
From Log Aggregation to Threat Hunting: Maximizing Your SIEM Investment
2026-02-06 09:24:57
Here's the part nobody likes to admit in steering committee meetings: most organizations didn't fail…
From Log Aggregation to Threat Hunting: Maximizing Your SIEM Investment on Latest Hacking...
U.S. CISA adds SmarterTools SmarterMail and React Native Community CLI flaws to its Known Exploited Vulnerabilities catalog
2026-02-06 09:22:15
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds SmarterTools SmarterMail and React Native Community CLI flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and...
Les lauréats des Trophées Go To Channel 2026
2026-02-06 08:55:35
La 5ème édition des Trophées GoToChannel dont IT Facto (maison-mère d'IT News Info, éditeur du Monde Informatique, Distributique (...)
L'Etat accélère la sortie de Microsoft Azure du Health Data Hub
2026-02-06 08:51:56
Sous le feu de vives critiques depuis sa création en 2019 pour son choix du cloud de Microsoft, le Health Data Hub annonce enfin sortir d'Azure (...)
CISA orders federal agencies to replace end-of-life edge devices
2026-02-06 08:41:11
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a new binding operational directive requiring federal agencies to identify and remove network edge devices that no longer receive...
Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware
2026-02-06 08:40:00
Cybersecurity researchers have discovered a new supply chain attack in which legitimate packages on npm and the Python Package Index (PyPI) repository have been compromised to push malicious versions...
Eradicating trivial vulnerabilities, at scale
2026-02-06 08:11:58
A new NCSC research paper aims to reduce the presence of ‘unforgivable' vulnerabilities.
Thanking the vulnerability research community with NCSC Challenge Coins
2026-02-06 08:11:32
Reflecting on the positive impact of the Vulnerability Reporting Service – and introducing something new for selected contributors.
SQLi in administrative interface
2026-02-06 08:00:00
CVSSv3 Score:
9.1
An improper neutralization of special elements used in an SQL Command ('SQL Injection') vulnerability [CWE-89] in FortiClientEMS may allow an unauthenticated attacker to execute...
A2A, ACP, agents.json… Que deviennent ces protocoles agentiques ?
2026-02-06 07:15:12
En 2025, une université chinoise avait proposé une taxonomie d'une quinzaine de projets de protocoles agentiques. Où en sont-ils ?
The post A2A, ACP, agents.json… Que deviennent ces protocoles...
Mageia 9 Python-Django Critical SQL Injection DoS MGASA-2026-0032
2026-02-06 06:12:34
MGASA-2026-0032 - Updated python-django packages fix security vulnerabilities
Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries
2026-02-06 05:49:00
Artificial intelligence (AI) company Anthropic revealed that its latest large language model (LLM), Claude Opus 4.6, has found more than 500 previously unknown high-severity security flaws in open-source...
Vulnérabilité dans les produits Juniper Networks (06 février 2026)
06/02/2026
Une vulnérabilité a été découverte dans les produits Juniper Networks. Elle permet à un attaquant de provoquer un déni de service à distance.
Multiples vulnérabilités dans Tenable Nessus (06 février 2026)
06/02/2026
De multiples vulnérabilités ont été découvertes dans Tenable Nessus. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Multiples vulnérabilités dans Asterisk (06 février 2026)
06/02/2026
De multiples vulnérabilités ont été découvertes dans Asterisk. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges...
Multiples vulnérabilités dans Microsoft Edge (06 février 2026)
06/02/2026
De multiples vulnérabilités ont été découvertes dans Microsoft Edge. Elles permettent à un attaquant de provoquer un contournement de la politique de sécurité et un problème de sécurité non...
Multiples vulnérabilités dans les produits Moxa (06 février 2026)
06/02/2026
De multiples vulnérabilités ont été découvertes dans les produits Moxa. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données et un déni de service. L'éditeur,...
Vulnérabilité dans ESET Management Agent (06 février 2026)
06/02/2026
Une vulnérabilité a été découverte dans ESET Management Agent. Elle permet à un attaquant de provoquer une élévation de privilèges.
Vulnérabilité dans NetApp ONTAP 9 (06 février 2026)
06/02/2026
Une vulnérabilité a été découverte dans NetApp ONTAP 9. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données et un déni de service.
Multiples vulnérabilités dans le noyau Linux de SUSE (06 février 2026)
06/02/2026
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité...
Multiples vulnérabilités dans le noyau Linux d'Ubuntu (06 février 2026)
06/02/2026
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Multiples vulnérabilités dans le noyau Linux de Red Hat (06 février 2026)
06/02/2026
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une...
Multiples vulnérabilités dans les produits IBM (06 février 2026)
06/02/2026
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation...