Toute l'actualité de la Cybersécurité
Un lycée d'Anvers piraté, les parents pris pour cibles
2026-02-14 19:07:38
Après le piratage d'un lycée d'Anvers, des hackers ciblent les parents : 50 euros par enfant, sous menace de fuite de données, dans une opération qui imite LockBit....
Un Taïwanais prend 30 ans pour Incognito Market
2026-02-14 18:50:35
Rui-Siang Lin, alias « Pharaon », écope de 30 ans pour Incognito Market, marché darknet, après une enquête du FBI et une erreur de traçabilité crypto....
Fintech firm Figure disclosed data breach after employee phishing attack
2026-02-14 17:10:33
Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an employee and steal a limited number of files. Blockchain-based lending firm Figure confirmed a data breach...
Growth Hacking Is Dead - Systems Are Eating Marketing
2026-02-14 17:00:02
Growth hacking was once a simple way to find a high-leverage tactic and grow. But the environment has fundamentally changed and tactics are no longer repeatable. Marketing teams are now chasing new tools...
One threat actor responsible for 83% of recent Ivanti RCE attacks
2026-02-14 16:02:34
Threat intelligence observations show that a single threat actor is responsible for most of the active exploitation of two critical vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), tracked...
The HackerNoon Newsletter: Courts Are Drowning in Cases. Can AI Save the Day Without Becoming a Liability? (2/14/2026)
2026-02-14 16:02:34
How are you, hacker?
🪐 What's happening in tech today, February 14, 2026?
The
HackerNoon Newsletter
brings the HackerNoon
...
U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog
2026-02-14 15:54:34
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security...
Snail mail letters target Trezor and Ledger users in crypto-theft attacks
2026-02-14 15:15:25
Threat actors are sending physical letters pretending to be from Trezor and Ledger, makers of cryptocurrency hardware wallets, to trick users into submitting recovery phrases in crypto theft attacks....
Looking Back at the Changes That Rust 1.77.1 Brought In
2026-02-14 15:00:01
Rust 1.77.1 therefore disables the new Cargo behavior on Windows for targets that use MSVC. There are no changes for other targets. We plan to eventually re-enable debuginfo stripping in release mode...
Courts Are Drowning in Cases. Can AI Save the Day Without Becoming a Liability?
2026-02-14 13:00:02
Artificial intelligence (AI) is being used in courts around the world to speed up proceedings and reduce administrative burdens. But the growing presence of AI in justice systems raises urgent questions....
A Face Scan Could Be Required if You're Touring a Rental
2026-02-14 12:00:03
Landlords are asking renters to submit to 3D facial recognition scans to verify their identity. Some landlords also use facial recognition incorporated into smart lockboxes.
New Clickfix Exploit Tricks Users into Changing DNS Settings for Malware Installation
2026-02-14 11:11:39
A new evolution in the ClickFix social engineering campaign, which now employs a custom DNS hijacking technique to deliver malware. This attack method tricks users into executing malicious commands that...
Suspected Russian hackers deploy CANFAIL malware against Ukraine
2026-02-14 11:05:33
A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL malware. Google Threat Intelligence Group identified a previously undocumented threat actor...
Designing for AI Agents
2026-02-14 09:55:35
An agent does not wait for instruction. It monitors context, forms intentions, takes actions, and adapts its strategy over time.
Judging the Future of Mobile AI: An Interview with Ivan Mishchenko
2026-02-14 09:54:08
As artificial intelligence becomes deeply embedded in mobile applications, the role of engineering judgment is changing.
Threat Actors Exploit Claude Artifacts and Google Ads to Target macOS Users
2026-02-14 09:25:12
A sophisticated malware campaign targeting macOS users through Google-sponsored search results and legitimate platforms, including Anthropic’s Claude AI and Medium. The campaign has already reached...
Threat Actor Allegedly Selling Critical Severity OpenSea 0-day Exploit Chain on Hacking Forums
2026-02-14 07:53:47
A threat actor is reportedly selling a purported critical severity zero-day exploit chain targeting OpenSea for 0,000 USD in Bitcoin or Monero. The listing claims the vulnerability remains unpatched...
CISA Warns of Microsoft Configuration Manager SQL Injection Vulnerability Exploited in Attacks
2026-02-14 03:27:55
CISA has issued an urgent alert about a critical SQL injection vulnerability in Microsoft Configuration Manager (SCCM). Tracked as CVE-2024-43468, this flaw lets unauthenticated attackers run malicious...
Lorentzian Logic: Solving Unknown Cluster Numbers via Differentiable Graph Entropy
2026-02-14 02:37:43
Optimize network analysis with LSEnet, a deep learning model that eliminates the need to predefined cluster numbers. By leveraging the Lorentz model of hyperbolic space and differentiable structural information,...
LSEnet: Mastering Automated Data Grouping in Curved Hyperbolic Space
2026-02-14 02:29:28
Meet LSEnet, the neural net that organizes complex networks into optimal partitioning trees using the Lorentz model. By ditching flat Euclidean space for curved hyperbolic geometry, it recursively learns...
Smart Data Grouping: LSEnet & Automated Graph Clustering in Curved Space
2026-02-14 02:25:26
Stop guessing your cluster numbers. Discover LSEnet, a deep graph clustering model that uses Differentiable Structural Information (DSI) and the Lorentz model of hyperbolic space to organize complex networks...
Smart Graph Clustering: Organizing Networks Automatically
2026-02-14 02:19:12
Explore the frontier of geometric deep learning and non-Euclidean optimization. Master Kuramoto model training, hyperbolic reinforcement learning, and deep graph clustering without predefined cluster...
I'm Building a Tower Defense Game Where VCs Are the Enemy
2026-02-14 02:00:48
StartupTD is a browser-based tower defense game with a simple premise: survive as long as possible while your startup gets attacked by increasingly difficult waves of enemies. Each enemy type represents...
Fedora 43 linux-sgx Critical Nodejs Update CVE-2026-23745
2026-02-14 01:09:25
Update nodejs modules used by pccs daemon for CVE-2026-23745, CVE-2026-23950, CVE-2026-24842, CVE-2025-13465, CVE-2025-15284. Remove Fedora override of default pccs daemon port. Remove redundant dep on...
Fedora 43 python-aiohttp Important Security Advisory FEDORA-2026-66cb8ecfc2
2026-02-14 01:09:18
https://github.com/aio-libs/aiohttp/blob/v3.13.3/CHANGES.rst
openSUSE htmldoc Important Buffer Overflow Fix Advisory 2026-0046-1
2026-02-14 00:05:03
An update that fixes one vulnerability is now available.
openSUSE htmldoc Important Buffer Overflow Fix CVE-2024-46478 2026-0047-1
2026-02-14 00:04:47
An update that fixes one vulnerability is now available.