Toute l'actualité de la Cybersécurité
ShinyHunters Claims 350GB Data Breach at European Commission
2026-03-28 18:18:07
ShinyHunters claims it breached European Commission systems, leaking 350GB of data. Officials are investigating, with no independent verification yet.
ShinyHunters claims the hack of the European Commission
2026-03-28 15:58:21
The European Commission has allegedly been breached by ShinyHunters, with reported data dumps including content from mail servers. The European Commission has allegedly been breached by ShinyHunters,...
Iran-Linked Hackers Breach FBI Director's Personal Email, Hit Stryker With Wiper Attack
2026-03-28 15:40:00
Threat actors with ties to Iran successfully broke into the personal email account of Kash Patel, the director of the U.S. Federal Bureau of Investigation (FBI), and leaked a cache of photos and other...
Rust Retro: Updated Baseline Standards When it Comes to Windows Targets
2026-03-28 15:30:04
Rust's Tier 1 toolchains targeting Windows will increase with the 1.78 release (scheduled for May 02, 2024) Windows 10 will now be the minimum supported version for the `*-pc-windows-*` targets.
Cybersecurity Companies' Stocks Fall as Anthropic Tests Powerful New Model
2026-03-28 15:05:18
Cybersecurity stocks declined sharply on Friday following revelations that Anthropic has begun testing “Mythos,” an extraordinarily powerful new AI model with advanced vulnerability-discovery...
Backward Compatibility in Go: What to Know
2026-03-28 15:00:42
Boring is good. Boring is stable. Boring means being able to focus on your work, not on what's different about Go. This post is about the important work we shipped in Go 1.21 to keep Go boring.
New Infinity Stealer malware grabs macOS data via ClickFix lures
2026-03-28 14:35:10
A new info-stealing malware named Infinity Stealer is targeting macOS systems with a Python payload packaged as an executable using the open-source Nuitka compiler. [...]
CISA Warns of F5 BIG-IP Vulnerability Actively Exploited in Attacks
2026-03-28 14:26:19
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a newly disclosed vulnerability affecting F5 BIG-IP systems to its Known Exploited Vulnerabilities (KEV) catalog, warning that...
The Markup Wins Six News Design Awards From the Society for News Design
2026-03-28 14:00:46
The Markup won multiple awards of excellence in the Society for News Design's Best of News Design Creative Competition. The Markup uses investigative reporting, data analysis, and software engineering...
Data, Surveillance, and the Law: What Is Policing?
2026-03-28 14:00:40
A city is a type of cell culture for the observance in the study of criminality. Good governance ensures that development units is at best evenly distributed. Advances in AI, machine learning, and data...
Lloyds Group to Compensate 450,000 Customers After App Glitch
2026-03-28 13:34:26
Lloyds Banking Group to compensate 450,000 customers after app glitch exposed data. Find out how the glitch affected…
I Built a NumPy-Like Library in Pure JavaScript: This Is Exactly How I Did It
2026-03-28 13:00:34
In NumPy, you can call built-in functions such as `mean` or `dot` from JavaScript. In this essay, I will explain how I built a library inspired by NumPy.
La Commission européenne sous menace de fuite
2026-03-28 12:02:16
Commission européenne, ShinyHunters et série de fuites massives : lecture cyber et renseignement d'une menace structurée.
FAT CAT (Forensics)— KJSSE CTF 3.0
2026-03-28 11:25:56
ChallengeThis challenge was given in Round 2 of KJSSE CTF 3.0 by K.J. Somaiya College of Engineering, Vidyavihar. Challenge Description:A butterfly shouldn't make a cat feels this heavy. There is more...
Proving Grounds — Practice — Access
2026-03-28 11:23:24
Proving Grounds — Practice — AccessAI Image created by https://deepai.org/machine-learning-model/hologram-3d-generatorProving Grounds Practice machine Access is rated intermediate by Offsec,...
How I Spent 30 Days Chasing a ,000 Bug Bounty And What I Learned the Hard Way
2026-03-28 11:21:56
A bug hunter's honest account of discovery, forensic investigation, escalations, and the painful lesson that changed my approach forever.By HackerMD | Bug Bounty Hunter | Security Researcher“The...
From a Silent Math Error to Certificate Bypass: Uncovering an Integer Overflow in a TLS Parser
2026-03-28 11:21:28
Bug hunting isn't always about popping XSS alerts or finding chained SSRFs. Sometimes, the most critical vulnerabilities are hidden deep within the foundational cryptographic parsing logic of an application.Recently,...
Azure Blob Storage Misconfigurations: Attacker's Gateway to Data
2026-03-28 11:21:16
By: Vedant Bhalgama (@ActiveXSploit)Microsoft Azure is a cloud computing platform that provides a wide range of services, including Virtual Machines, databases, container services, and application hosting....
Cyber actualités ZATAZ de la semaine du 23 au 29 mars 2026
2026-03-28 10:32:44
Cette semaine, ZATAZ suit une actualité dense dans le monde de la cybersécurité et des pirates informatiques.
Iran-linked group Handala hacked FBI Director Kash Patel's personal email account
2026-03-28 10:22:33
Iran-linked group Handala claims it hacked FBI Director Kash Patel's personal email, leaking files. The FBI says no government data was exposed. Iran-linked hacking group Handala claims it breached...
Un outil Zataz pour décoder un QR code localement
2026-03-28 10:04:40
Outil Zataz : décoder un QR code localement pour vérifier URL, texte, Wi-Fi ou contact sans exposition inutile.
Le 1er avril, je démontre le social engineering à InCyber
2026-03-28 09:49:32
Le 1er avril, à InCyber, je montre en direct comment le social engineering exploite le facteur humain.
CareCloud face à un incident critique sous surveillance
2026-03-28 09:19:44
CareCloud a signalé un incident cyber matériel via un 8-K, document clé pour les investisseurs, distinct de la logique du RGPD.
Citrix NetScaler Under Active Recon for CVE-2026-3055 (CVSS 9.3) Memory Overread Bug
2026-03-28 09:11:00
A recently disclosed critical security flaw impacting Citrix NetScaler ADC and NetScaler Gateway is witnessing active reconnaissance activity, according to Defused Cyber and watchTowr.
The vulnerability,...
A Mysterious Alibi Shakes the Ackroyd Case
2026-03-28 09:00:39
Poirot, Dr. Sheppard, and Inspector Raglan travel to Liverpool to question Charles Kent, the mysterious stranger seen at Fernly. Kent admits being there but provides a solid alibi, proving he left before...
Faux Lacoste sur TikTok, les signaux d'alerte
2026-03-28 08:59:28
Publicités TikTok pour du faux Lacoste, indices d'escroquerie et signaux cyber relevés par ZATAZ sur une boutique très opaque.
Mageia 9 Nodejs Important Denial of Service Vuln MGASA-2026-0071
2026-03-28 08:27:00
MGASA-2026-0071 - Updated nodejs packages fix security vulnerabilities
Mageia 9 libpng Important Use-After-Free and OOB Read MGASA-2026-0070
2026-03-28 08:26:59
MGASA-2026-0070 - Updated libpng packages fix security vulnerabilities
U.S. CISA adds a flaw in F5 BIG-IP AMP to its Known Exploited Vulnerabilities catalog
2026-03-28 07:33:15
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in F5 BIG-IP AMP to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency...
CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation
2026-03-28 07:07:00
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a critical security flaw impacting F5 BIG-IP Access Policy Manager (APM) to its Known Exploited Vulnerabilities (KEV) catalog,...
TA446 Deploys DarkSword iOS Exploit Kit in Targeted Spear-Phishing Campaign
2026-03-28 07:07:00
Proofpoint has disclosed details of a targeted email campaign in which threat actors with ties to Russia are leveraging the recently disclosed DarkSword exploit kit to target iOS devices.
The activity...
The TechBeat: The Best 9 HR Management Platforms in 2026 (3/28/2026)
2026-03-28 06:11:34
How are you, hacker?
🪐Want to know what's trending right now?:
The Techbeat by HackerNoon has got you covered with fresh content from our trending stories of the day! Set email preference here.
...
European Commission Confirms Cyberattack Following AWS Account Hack
2026-03-28 03:20:54
The European Commission has officially confirmed a cyberattack following a targeted cyberattack that compromised its Amazon Web Services (AWS) account. Discovered on March 24, the intrusion specifically...
The 5 Best Suits From Marvel's Spider-Man 2: Miles Morales Version
2026-03-28 03:06:50
1. Smoke and Mirrors Suit
2. Best There Is Suit
3. Agent of S.H.I.E.L.D. Suit
4. Metro Suit
5. Life Story Suit
Windows 11 and Server 2025 Update to Block Untrusted Cross-Signed Kernel Drivers by Default
2026-03-28 02:48:00
Microsoft is taking a major step to harden the Windows operating system against kernel-level threats by removing trust for drivers signed by the deprecated cross-signed root program. Starting with the...
CISA Adds Aquasecurity Trivy Scanner Vulnerability to KEV Catalog
2026-03-28 02:24:07
CISA has officially added a critical vulnerability affecting Aquasecurity’s Trivy scanner to its Known Exploited Vulnerabilities (KEV) catalog. Tracked as CVE-2026-33634, this alarming security...
Fedora 42 Chromium High Heap Overflows and Risks 2026-cc466cfb57
2026-03-28 01:07:09
Update to 146.0.7680.164 * High CVE-2026-4673: Heap buffer overflow in WebAudio * High CVE-2026-4674: Out of bounds read in CSS * High CVE-2026-4675: Heap buffer overflow in WebGL * High CVE-2026-4676:...
Fedora 42 php-phpseclib Information Disclosure AES 2026-bfeb46516b
2026-03-28 01:07:01
Update to v2.0.52
Fedora 42 Samtools Critical Heap Overflow Denial of Service 2026-1fc0d39acd
2026-03-28 01:07:00
Update to 1.23.1
Fedora 42 htslib Urgent Heap Overflow Vulnerability for Code Execution
2026-03-28 01:07:00
Update to 1.23.1
Iran-Linked Handala Hackers Breach FBI Chief Kash Patel's Gmail
2026-03-28 01:06:05
Iran-linked Handala hackers breached FBI Chief Kash Patel's Gmail, leaking photos and documents. Officials say no classified data was exposed.