Toute l'actualité de la Cybersécurité


Hims & Hers warns of data breach after Zendesk support ticket breach

2026-04-03 17:41:11
Telehealth giant Hims & Hers Health is warning that it suffered a data breach after support tickets were stolen from a third-party customer service platform. [...]

Lire la suite »

China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

2026-04-03 17:34:00
A China-aligned threat actor has set its sights on European government and diplomatic organizations since mid-2025, following a two-year period of minimal targeting in the region. The campaign...

Lire la suite »

Apple Breaks Precedent, Patches DarkSword for iOS 18

2026-04-03 17:08:57
Even organizations with users unwilling or unable to adopt iOS 26 can now protect themselves from a severe mobile OS-cracking tool.

Lire la suite »

North Korean Hackers Abuse GitHub to Spy on South Korean Firms

2026-04-03 17:05:23
Researchers from FortiGuard Labs have uncovered a high-severity spying campaign targeting South Korean companies. Discover how North Korean…

Lire la suite »

14,000+ F5 BIG-IP APM Devices Exposed Online Amid Active RCE Vulnerability Exploits

2026-04-03 17:02:42
A critical security flaw in F5’s BIG-IP Access Policy Manager (APM) is currently under active exploitation, leaving thousands of enterprise networks at risk. The vulnerability, officially tracked...

Lire la suite »

Die Linke German political party confirms data stolen by Qilin ransomware

2026-04-03 16:36:44
The Qilin ransomware group has claimed responsibility for an attack against Die Linke ('The Left'), forcing an IT systems outage at the political party, and threatening sensitive data leak. [...]

Lire la suite »

Two Tools, 56 APIs: How I Built a Universal MCP Server

2026-04-03 15:59:59
I had 56 APIs I needed my agent to talk to. The idea of maintaining 56 separate MCP servers made me want to close my laptop and never open it again.

Lire la suite »

Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers

2026-04-03 15:32:00
Threat actors are increasingly using HTTP cookies as a control channel for PHP-based web shells on Linux servers and to achieve remote code execution, according to findings from the Microsoft Defender...

Lire la suite »

AI Firm Mercor Confirms Breach as Hackers Claim 4TB of Stolen Data

2026-04-03 15:21:14
AI firm Mercor confirms a breach linked to a LiteLLM supply chain attack, as hackers claim to have stolen 4TB of sensitive data and internal systems.

Lire la suite »

Europa.eu piraté : le mode opératoire se précise

2026-04-03 15:21:05
La compromission de la plate-forme d'hébergement des sites web de l'UE semble découler d'une attaque en amont sur le dépôt GitHub d'un scanner de vulnérabilités. The post Europa.eu piraté : le...

Lire la suite »

FAL.CON 2026: Secure The AI Revolution

2026-04-03 15:15:05
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 3, 2026 – Listen to the podcast Daniel Bernard, aka “DB”, Chief Business Officer at CrowdStrike,...

Lire la suite »

Blast Radius of TeamPCP Attacks Expands Amid Hacker Infighting

2026-04-03 15:11:16
As organizations disclose breaches tied to TeamPCP's supply chain attacks, ShinyHunters and Lapsus$ are getting involved, taking credit, and creating a murky situation for enterprises.

Lire la suite »

30 BI Engineering Interview Questions That Actually Matter in the AI Era

2026-04-03 15:00:04
The BI interview hasn't caught up with the job. Here are 30 questions that reflect what it actually means to be a BI engineer in 2026.

Lire la suite »

Kimsuky Deploys Malicious LNK Files to Deliver Python-Based Backdoor in Multi-Stage Attack

2026-04-03 14:43:09
A North Korean threat group known as Kimsuky has been caught running a cyberattack campaign that uses malicious Windows shortcut files, known as LNK files, to quietly install a Python-based backdoor on...

Lire la suite »

Blocking children from social media is a badly executed good idea

2026-04-03 14:37:52
Governments are each inventing their own flavor of an age based ban for social media. Is the cure worse than the disease?

Lire la suite »

Axios Maintainer Confirms The npm Compromise Was via a Targeted Social Engineering Attack

2026-04-03 14:22:41
Two malicious versions of the popular JavaScript HTTP library Axios were briefly published to the npm registry on March 31, 2026. Each version carried a hidden dependency that installed a remote access...

Lire la suite »

Hackers Abuse Trusted Platforms to Steal Bank Credentials From Philippine Users

2026-04-03 14:09:26
A coordinated phishing campaign has been quietly targeting banking customers across the Philippines since early 2024, and it remains active today. The attackers are not relying on crude tricks — they...

Lire la suite »

Evolution of Ransomware: Multi-Extortion Ransomware Attacks

2026-04-03 14:05:15
Multi-extortion ransomware relies on stolen data to pressure victims with public leaks. Penta Security explains how its D.AMO platform keeps exfiltrated files encrypted and useless to attackers. [...]

Lire la suite »

HackerNoon Projects of the Week: Movement Network Foundation, Packworks & Kyram

2026-04-03 14:00:23
This week's HackerNoon spotlight features three standout projects from the Proof of Usefulness Hackathon. Movement Network Foundation is bridging Move and Ethereum, Packworks is digitizing Southeast...

Lire la suite »

North Korea–linked hackers drain 5M from Drift in sophisticated attack

2026-04-03 13:57:51
Drift lost 5M in a sophisticated attack, likely by North Korea, who used nonce-based tricks to gain control and quickly drain funds Drift suffered a 5 million cryptocurrency heist in a highly sophisticated...

Lire la suite »

You Don't Have a Security Problem, You Have a Visibility Problem

2026-04-03 13:46:13
What you'll learn in this articleThis article explains why many breaches are driven by gaps in visibility rather than advanced exploits, how attackers move through modern environments, and what changes...

Lire la suite »

AI Future: The Leading International AI and Web3 Forum to Take Place in April

2026-04-03 13:33:35
Moscow, Russia, 3rd April 2026, CyberNewswire

Lire la suite »

Picking Up 'Skull Vibrations'? Could Be XR Headset Authentication

2026-04-03 13:30:00
"Skull vibration harmonics generated by vital signs" can be used to sign in to VR, AR, and MR headsets, according to emerging research.

Lire la suite »

CrystalX RAT: new MaaS malware combines spyware, stealer, and remote access

2026-04-03 13:23:57
CrystalX RAT, a new sophisticated MaaS malware, combines spyware, data theft, and remote access, allowing attackers to monitor victims. In March 2026, Kaspersky researchers uncovered a Telegram-based...

Lire la suite »

Debian bookworm DSA-6194-1 pyasn1 Medium DoS CVE-2026-30922

2026-04-03 13:15:44
It was discovered that pyasn1, a generic ASN.1 library for Python, is prone to a denial of service vulnerability when decoding ASN.1 data with deeply nested structures. For the oldstable distribution...

Lire la suite »

Une faille de sécurité sur iPhone pourrait transformer votre appareil en outil d'espionnage

2026-04-03 13:13:35
Un outil de piratage dangereux pour iPhone, connu sous le nom de DarkSword , a fuité sur GitHub, ce qui engendre de nouveaux risques pour les utilisateurs d’anciens appareils Apple. Tribune –...

Lire la suite »

Kaspersky et AFRIPOL organisent une formation conjointe en cybersécurité à destination des forces de l'ordre africaines

2026-04-03 13:10:05
Dans le cadre d'une initiative conjointe avec AFRIPOL, Kaspersky a dispensé des formations en cybersécurité à des représentants des forces de l'ordre issus de 23 pays africains, portant sur les...

Lire la suite »

Claude Source Code Leak Highlights Big Supply Chain Missteps

2026-04-03 13:00:00
Or, why the software supply chain should be treated as critical infrastructure with guardrails built in at every layer.

Lire la suite »

Chainguard Unveils Factory 2.0 to Automate Hardening the Software Supply Chain

2026-04-03 12:57:28
The rebuilt Chainguard platform adds deeper security designed to continuously reconcile open-source artifacts across containers, libraries, Actions and skills.

Lire la suite »

Ubuntu systemd Privilege Elevation Vulnerabilities DSA-8194-7

2026-04-03 12:49:39
Several vulnerabilities were discovered in the inetutils implementation of telnetd and telnet, which may result in privilege escalation or information disclosure. For the oldstable distribution (bookworm),...

Lire la suite »

Fuite de code chez Claude Code : les commentaires de Melissa Bischoping de Tanium

2026-04-03 12:28:01
Suite à la fuite du code de Claude Code d'Anthropic, voici les commentaires et l'analyse de Melissa Bischoping, Senior Director, Security and Product Design Research chez Tanium, en matière de cybersécurité....

Lire la suite »

CrowdStrike Next-Gen SIEM Can Now Ingest Microsoft Defender Telemetry

2026-04-03 11:53:15
Once CrowdStrike's nemesis, Microsoft is now a collaborator. A shared interest in Formula 1 helped thaw the years-long fierce rivalry.

Lire la suite »

Microsoft still working to fix Exchange Online mailbox access issues

2026-04-03 11:25:20
Microsoft is investigating and working to resolve Exchange Online mailbox access issues that have intermittently affected Outlook mobile and macOS users for weeks. [...]

Lire la suite »

Malicious Chrome Extension “ChatGPT Ad Blocker” Steals ChatGPT Conversations

2026-04-03 11:23:11
As OpenAI introduces advertisements to its free tier, cybercriminals are seizing the opportunity to trick users with fake utility tools. Security researchers have discovered a malicious Google Chrome...

Lire la suite »

The Data Bottleneck: Architecting High-Throughput Ingestion for Real-Time Analytics

2026-04-03 11:21:24
Data ingestion isn't a background task—it's a major performance and cost driver at scale. Poorly designed pipelines create bottlenecks, small files, and memory pressure that slow everything downstream....

Lire la suite »

Why Your Retry Logic Is Taking Down Your System (And How to Fix It)

2026-04-03 11:11:24
Retries aren't a safety net—they're a load multiplier. In distributed systems, naive retries across layers can trigger retry storms, amplify latency, and cause cascading failures. The fix isn't...

Lire la suite »

UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack

2026-04-03 11:04:00
The maintainer of the Axios npm package has confirmed that the supply chain compromise was the result of a highly-targeted social engineering campaign orchestrated by North Korean threat actors tracked as...

Lire la suite »

Why Modern Data Platforms Prefer ELT Over ETL

2026-04-03 11:02:47
ELT is a widely used concept in the data engineering world and stands for - Extract, Load, and Transform. Traditional data warehousing relies on the ETL approach, where raw data is first extracted from...

Lire la suite »

Why Third-Party Risk Is the Biggest Gap in Your Clients' Security Posture

2026-04-03 11:00:00
The next major breach hitting your clients probably won't come from inside their walls. It'll come through a vendor they trust, a SaaS tool their finance team signed up for, or a subcontractor...

Lire la suite »

Spec-Driven Development - My First Impressions and Opinions

2026-04-03 10:53:23
Spec-Driven Development brings structure to AI coding, but it also introduces heavy documentation, review overhead, and token costs. In practice, the real bottleneck is still the AI model itself. A lighter...

Lire la suite »

The Cost of Compute: Architecting High-Performance SQL in Distributed Lakehouses

2026-04-03 10:47:55
In modern lakehouses like Snowflake and Databricks, inefficient SQL directly increases compute costs. This article breaks down advanced optimization techniques—from partition pruning and broadcast joins...

Lire la suite »

Monitoring Essential Metrics for Cloud Native Systems - Part 1

2026-04-03 10:40:17
Dashboards don't make systems observable. True monitoring requires the right signals: latency, traffic, errors, and saturation. This article explains why traditional metrics fail, how observability...

Lire la suite »

Hackers Use Phorpiex Botnet to Spread Ransomware, Sextortion, and Crypto-Clipping Malware

2026-04-03 10:28:10
A botnet that has been running since 2011 is back in the spotlight — not because it is new, but because it keeps reinventing itself. Phorpiex, also known as Trik, has grown from a basic spam tool into...

Lire la suite »

Free VPNs vs Paid VPNs: What Are You Actually Paying For?

2026-04-03 10:25:44
Free VPNs aren't free. Someone pays for every server, every IP address, every gigabyte of traffic. When you don't pay with money, you pay with your data, your bandwidth, or sometimes your identity. To...

Lire la suite »

Hackers Use Venom Stealer to Turn ClickFix Lures Into Full Data Exfiltration Pipelines

2026-04-03 10:19:34
A new malware has been quietly spreading across cybercrime networks, and security researchers say it is far more capable than most tools of its kind. Called Venom Stealer, this malware-as-a-service platform...

Lire la suite »

Apologia: The Truth Behind the Crime

2026-04-03 10:00:35
In the “Apologia” chapter, Dr. Sheppard reflects on his meticulous planning of Roger Ackroyd's murder, using a dictaphone and strategic timing to mislead others. He confesses in a manuscript meant...

Lire la suite »

IBM veut capter les workloads Arm sur ses mainframes

2026-04-03 09:57:29
IBM vient d'introduire, dans le noyau Linux, un patch emblématique des « couches technologiques » qu'il projette entre les deux écosystèmes. The post IBM veut capter les workloads Arm sur ses mainframes...

Lire la suite »

Comment Canal+ industrialise le déploiement d'agents IA avec AWS

2026-04-03 09:54:20
Transformer les usages des entreprises avec l’IA. Tel a été l’un des points clés du discours porté par AWS lors (...)

Lire la suite »

Microsoft Forcing Upgrades to Unmanaged Windows 11, Version 24H2

2026-04-03 09:19:57
Microsoft has officially begun force-upgrading unmanaged Windows 11 version 24H2 devices to version 25H2, marking the final phase of a staged rollout that relies on machine learning to determine device...

Lire la suite »

New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images

2026-04-03 09:10:00
Cybersecurity researchers have discovered a new version of the SparkCat malware on the Apple App Store and Google Play Store, more than a year after the trojan was discovered targeting...

Lire la suite »

Man admits to locking thousands of Windows devices in extortion plot

2026-04-03 09:04:54
A former core infrastructure engineer has pleaded guilty to locking Windows admins out of 254 servers as part of a failed extortion plot targeting his employer, an industrial company headquartered in...

Lire la suite »

Multiple TP-Link Vulnerabilities Let Attackers Trigger DoS and Crash Routers

2026-04-03 08:50:19
Multiple high-severity vulnerabilities exist in TP-Link's Tapo C520WS smart security cameras. If exploited, these vulnerabilities may allow adjacent attackers to trigger Denial-of-Service (DoS) conditions,...

Lire la suite »

Drift Loses 5 Million in Durable Nonce Social Engineering Attack Linked to DPRK

2026-04-03 08:35:00
Solana-based decentralized exchange Drift has confirmed that attackers drained about 5 million from the platform during a security incident that took place on April 1, 2026. "Earlier today, a...

Lire la suite »

Oracle et l'IA : à investissements massifs, licenciements massifs

2026-04-03 08:14:08
Engagé dans des investissements massifs sur les infrastructures pour l'IA, Oracle supprimerait jusqu'à 30 000 postes. The post Oracle et l’IA : à investissements massifs, licenciements massifs...

Lire la suite »

Microsoft now force upgrades unmanaged Windows 11 24H2 PCs

2026-04-03 07:55:40
Starting this week, Microsoft has begun force-upgrading unmanaged devices running Windows 11 24H2 Home and Pro editions to Windows 11 25H2. [...]

Lire la suite »

Pro-Iran Handala group breached Israeli defence contractor PSK Wind Technologies

2026-04-03 07:52:52
Iran-linked hackers claim to have breached Israeli air defence contractor PSK Wind, which develops command and control systems. Pro-Iran Handala group announced on April 2 that it breached PSK Wind Technologies,...

Lire la suite »

The Specialist's Dilemma Is Breaking Scientific AI

2026-04-03 07:44:59
Intern-S1-Pro challenges the idea that AI must choose between general reasoning and scientific specialization across multiple domains.

Lire la suite »

Hackers Compromised 700+ Next.js Hosts by Exploiting React2Shell Vulnerability

2026-04-03 07:38:26
A massive automated credential theft campaign is actively targeting web applications worldwide. Cybersecurity researchers at Cisco Talos have uncovered an operation by a hacker group tracked as UAT-10608,...

Lire la suite »

CERT-EU: European Commission hack exposes data of 30 EU entities

2026-04-03 06:33:34
The European Union's Cybersecurity Service (CERT-EU) has attributed the European Commission cloud hack to the TeamPCP threat group, saying the resulting breach exposed the data of at least 29 other...

Lire la suite »

VirtualHost And Subdomains

2026-04-03 06:03:22
Breaking down how VirtualHosts and Subdomains work behind the scenesHave you ever been confused between VirtualHosts and Subdomains?Let's dive deep into both and understand how these two helps handling...

Lire la suite »

Path Traversal — A tour to the web server's assets

2026-04-03 06:02:44
Path Traversal — A tour to the web server's assetsPath traversal, also known as Directory traversal, is a vulnerability that can reveal sensitive information stored on the web server.Path traversal...

Lire la suite »

Reverse Engineering a WhatsApp 0-Click Vulnerability: A Deep Dive into CVE-2025–43300

2026-04-03 06:01:23
Based on “Reverse Engineering a WhatsApp 0-Click Vulnerability” by Billy EllisContinue reading on InfoSec Write-ups »

Lire la suite »

A Practical Approach To Graphing The Planet

2026-04-03 06:00:55
BloodHound OpenGraph Processing with DataHoundBackgroundContextBloodHound was originally created by SpecterOps to assist with the analysis of Active Directory environments. The platform was later expanded...

Lire la suite »

Gaara — SSH Brute Force + SUID gdb Shell Escape | OffSec PG Play

2026-04-03 06:00:21
Gaara is a box that starts simply and ends the same way. There is only SSH and HTTP exposed, and the web server has nothing useful on it — just a single image. The way in is a brute force on SSH...

Lire la suite »

Prompt Engineering for AI Security: The Skill Every Cybersecurity Fresher Must Learn in 2026

2026-04-03 05:56:26
How crafting the right prompts can make you a sharper threat analyst, a faster learner, and a more dangerous defender — before you even…Continue reading on InfoSec Write-ups »

Lire la suite »

Container Image Security (Signing and Scanning with tools like Cosign, Trivy)

2026-04-03 05:55:41
I hope you are enjoying the Kubernetes security posts that I am currently sharing. They have honestly been interesting so far. In my last post, I talked about Pod Security Standards (PSS) and policy enforcement...

Lire la suite »

Axios npm Supply Chain Compromise

2026-04-03 02:50:07
What is the Attack? A software supply chain attack targeted the widely used JavaScript library Axios after an attacker reportedly compromised a maintainer's...

Lire la suite »

Fedora 43 Openbao Critical XSS Weaknesses Fix 2026-a9c2a486a6

2026-04-03 00:52:03
Update to upstream 2.5.2, including fixes for CVE-2026-33757 and CVE-2026-33758

Lire la suite »

Fedora 43 bind9-next Critical DNS Fix CVE-2026-1519 DoS 2026-a6efefa854

2026-04-03 00:51:59
Update to 9.21.20 (rhbz#2440560) Security Fixes: Fix unbounded NSEC3 iterations when validating referrals to unsigned delegations. (CVE-2026-1519) Fix memory leaks in code preparing DNSSEC proofs of non-existence....

Lire la suite »

Debian Bookworm Chromium Critical Exec DoS Risk DSA-6192-1 CVE-2026-5272

2026-04-03 00:39:00
Security issues were discovered in Chromium which could result in the execution of arbitrary code, denial of service, or information disclosure. For the oldstable distribution (bookworm), these problems...

Lire la suite »

Multiples vulnérabilités dans Microsoft Edge (03 avril 2026)

03/04/2026
De multiples vulnérabilités ont été découvertes dans Microsoft Edge. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur. Microsoft indique que...

Lire la suite »

Vulnérabilité dans Synology Mail Station (03 avril 2026)

03/04/2026
Une vulnérabilité a été découverte dans Synology Mail Station. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données et une atteinte à l'intégrité des données....

Lire la suite »

Multiples vulnérabilités dans VMware Tanzu (03 avril 2026)

03/04/2026
De multiples vulnérabilités ont été découvertes dans VMware Tanzu. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.

Lire la suite »

Multiples vulnérabilités dans les produits IBM (03 avril 2026)

03/04/2026
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation...

Lire la suite »

Multiples vulnérabilités dans le noyau Linux de Red Hat (03 avril 2026)

03/04/2026
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service...

Lire la suite »

Multiples vulnérabilités dans le noyau Linux d'Ubuntu (03 avril 2026)

03/04/2026
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de...

Lire la suite »

Multiples vulnérabilités dans le noyau Linux de SUSE (03 avril 2026)

03/04/2026
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une...

Lire la suite »