Toute l'actualité de la Cybersécurité
BeatBanker: A dual‑mode Android Trojan
2026-03-10 10:00:44
Kaspersky researchers identified a new Android Trojan dubbed BeatBanker targeting Brazil, posing as government apps and Google Play Store, and capable of both crypto mining and stealing banking data.
Auditing the Gatekeepers: Fuzzing "AI Judges" to Bypass Security Controls
2026-03-10 10:00:29
Unit 42 research reveals AI judges are vulnerable to stealthy prompt injection. Benign formatting symbols can bypass security controls.
The post Auditing the Gatekeepers: Fuzzing "AI Judges"...
Eighteen Years Unchanged
2026-03-10 10:00:04
Dorian rides through rain-soaked London to an opium den, desperate to escape guilt. There he is recognized as “Prince Charming.” Outside, James Vane, Sibyl's brother, ambushes him and vows revenge....
APT28 hackers deploy customized variant of Covenant open-source tool
2026-03-10 10:00:00
The Russian state-sponsored APT28 threat group is using a custom variant of the open-source Covenant post-exploitation framework for long-term espionage operations. [...]
OpenClaw Advisory Surge Exposes Gap Between GitHub and CVE Vulnerability Tracking
2026-03-10 09:47:07
OpenClaw, a self-hosted AI agent, rose to become GitHub’s most-starred repository weeks after its launch, drawing a large developer community and immediate researcher attention. Nobody anticipated...
After the Acid, the Opium
2026-03-10 09:30:04
Dorian attends a society dinner and flawlessly performs charm while suppressing panic over his crime. Lord Henry's probing questions unsettle him, reviving his fear. Back home, he destroys Basil's...
Leading Myanmar Fleet Management Company Yoma Fleet Selects AccuKnox SIEM to Replace Legacy Tools
2026-03-10 09:12:52
Menlo Park, USA, 10th March 2026, CyberNewswire
Armis facilite l'automatisation et la prise de décision
2026-03-10 09:05:59
L’éditeur américain Armis, spécialisé dans la gestion de l'exposition aux cybermenaces, vient de dévoiler son (...)
Aakriti Kharel: Bridging Cultures, Empowering Women in STEM
2026-03-10 09:00:07
Aakriti Kharel's journey from Nepal to Texas spans biology, hospital labs, and artificial intelligence, reflecting the evolving role of women in STEM. Drawing on cross-cultural experience, grassroots...
NexPoint Services, une SSII spécialisée dans la sécurité des terminaux
2026-03-10 08:59:55
Ancien directeur général de Cegedim Outsourcing, Fabien Fudalej vient de créer l'ESN NexPoint Services, qui se focalise (...)
Ericsson US confirms breach after third-party provider attack
2026-03-10 08:44:55
Ericsson US reports a data breach after attackers hacked a service provider, exposing employee and customer information. Ericsson Inc., the U.S. branch of the Swedish telecom giant, disclosed a data breach...
Law enforcement disrupted Tycoon 2FA phishing-as-a-service platform
2026-03-10 08:30:52
Authorities disrupted the Tycoon 2FA phishing-as-a-service platform used to send millions of phishing emails to over 500,000 orgs worldwide. The joint effort, led by Microsoft, Europol, and industry partners,...
Anthropic Sued the U.S. Government for Labelling Claude as ‘Supply Chain Risk'
2026-03-10 08:22:28
Artificial intelligence leader Anthropic has filed an unprecedented lawsuit against the United States government after being designated a “supply chain risk”. The legal action, filed in a...
Apache ZooKeeper Vulnerability Allow Attackers to Access Sensitive Data
2026-03-10 08:09:08
Two “Important” severity vulnerabilities have been disclosed in Apache ZooKeeper, a widely used service for configuration management and naming in distributed applications, making timely security...
iPhone Exploit Toolkit Used by Russian Spies Likely Originated from U.S. Contractor
2026-03-10 08:02:53
A powerful iPhone exploit kit named “Coruna,” initially created for Western intelligence by U.S. contractor L3Harris, has fallen into the hands of Russian spies and Chinese cybercriminals....
Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector Tool
2026-03-10 07:17:00
Salesforce has warned of an increase in threat actor activity that's aimed at exploiting misconfigurations in publicly accessible Experience Cloud sites by making use of a customized version of an open-source...
AdsorbML: How AI Is Transforming Catalyst Discovery for Clean Energy and Chemicals
2026-03-10 07:00:07
Researchers developed AdsorbML, a hybrid AI + physics method that finds the best way molecules bind to catalyst surfaces—critical for designing fuels and chemicals. Using machine-learning potentials...
Signed Malware Masquerading as Teams, Zoom Apps Drops RMM Backdoors
2026-03-10 06:47:26
A newly uncovered phishing campaign is actively targeting enterprise users by disguising malware as widely used workplace applications, including Microsoft Teams, Zoom, and Adobe Acrobat Reader. What...
Facebook Echo Chambers Are Real But They May Not Be Driving Polarization
2026-03-10 06:30:07
A massive field experiment led by researchers including Brendan Nyhan and Matthew Gentzkow analyzed how echo chambers affect political views on Facebook. In a study of 23,377 users during the 2020 United...
CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited
2026-03-10 06:17:00
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added three security flaws to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.
The...
The TechBeat: Inside Tencent Games' Real-Time Event-Driven Analytics System (3/10/2026)
2026-03-10 06:11:01
How are you, hacker?
🪐Want to know what's trending right now?:
The Techbeat by HackerNoon has got you covered with fresh content from our trending stories of the day! Set email preference here.
...
Chinese APT Campaign Targets Qatar With PlugX Lures Tied to Middle East Conflict
2026-03-10 06:02:41
A Chinese-linked advanced persistent threat group known as Camaro Dragon launched a targeted cyberespionage campaign against entities in Qatar just one day after the outbreak of new hostilities in the...
GhostClaw Mimic as OpenClaw to Steal Everything from Developers
2026-03-10 04:37:58
A dangerous malware campaign targeting software developers has surfaced, with a rogue npm package posing as a trusted developer tool to silently drain credentials, crypto wallets, SSH keys, browser sessions,...
ScamAgent- AI Agent Built by Researchers that Run Fully Autonomous Scam Calls
2026-03-10 03:27:15
ScamAgent is an autonomous, multi-turn AI framework developed by researcher Sanket Badhe at Rutgers University that demonstrates how large language models (LLMs) can be weaponized to conduct fully automated...
Hackers Attack Employees Over Microsoft Teams to Trick Them Into Granting Remote Access
2026-03-10 02:59:33
A social-engineering campaign abusing Microsoft Teams and Windows Quick Assist is evolving again, with BlueVoyant warning that the attackers are now deploying a newly identified malware family called...
Port Scanning Explained: Tools, Techniques, and Best Open-Source Port Scanners for Linux
2026-03-10 02:12:17
Most Linux admins assume they know which TCP/IP ports their servers expose, until a scan reveals something unexpected. A database port listening on all interfaces, a forgotten development service, or...
Walbi Launches No-Code AI Trading Agents For Retail Crypto Traders
2026-03-10 01:49:36
Walbi has introduced no-code AI trading agents for retail crypto users. Traders can now build, test, and launch their own AI-driven agents without writing a single line of code.
Comedian Insights: AI Bias, Censorship, and the "Bland" Humor Gap
2026-03-10 01:42:05
This article presents the results of focus group discussions on the use of AI in comedy writing. We also discuss the major themes that emerged from the discussions. We conclude with a list of the main...
Policy-Driven AI: Designing Configuration-Driven Model Selection for Enterprise Systems
2026-03-10 01:31:46
Hardcoding AI model calls is the new technical debt. This article walks through how to architect a configuration-driven model selection layer that lets enterprise teams route prompts to the right model...
Fedora 42 Chromium Update FEDORA-2026-06657d1811 Integer Overflow
2026-03-10 01:10:45
Update to 145.0.7632.159 CVE-2026-3536: Integer overflow in ANGLE CVE-2026-3537: Object lifecycle issue in PowerVR CVE-2026-3538: Integer overflow in Skia CVE-2026-3539: Object lifecycle issue in DevTools...
OpenSUSE Leap 16.3 gcc-compiler Major Memory Leak Patch 2027-fb92dc34b0
2026-03-10 01:10:37
Update to 1.3.2.
Fedora 42 perl-Net-CIDR Critical Leading Zeros Issue 2026-baf8782c7a
2026-03-10 01:10:37
Net::CIDR versions before 0.24 for Perl mishandle leading zeros in IP CIDR addresses, which may have unspecified impact. The functions addr2cidr and cidrlookup may return leading zeros in a CIDR string,...
Idempotency: The Secret to Production-Grade Data Pipelines
2026-03-10 01:09:19
Idempotency is the ability to perform the same operation multiple times without changing the result beyond the initial application. In a clinical data environment, duplicates in pharmacy claims or patient...
The Internet Is Now Built for AI, Not Humans
2026-03-10 00:59:30
AI already consumes 51% of internet traffic. Soon humans won't be in the buying loop at all. When that happens, only four marketing channels survive: government-mandated vendors, AI picking the objectively...
Fedora 43 Chromium Integer Overflow Issues DevTools 2026-f62db6b372
2026-03-10 00:54:29
Update to 145.0.7632.159 CVE-2026-3536: Integer overflow in ANGLE CVE-2026-3537: Object lifecycle issue in PowerVR CVE-2026-3538: Integer overflow in Skia CVE-2026-3539: Object lifecycle issue in DevTools...
Fedora 43 polkit Security Advisory FEDORA-2026-0e9ef494fc
2026-03-10 00:54:28
backport of upstream commits 9dca831, 4e67dde
Fedora 43 rust-pythonize Critical Update DoS Threat FEDORA-2026-151bfcc2af
2026-03-10 00:54:23
Update matrix-synapse to v1.147.1
MacBook Neo Review: Apple's Budget Laptop Comes With Big Tradeoffs
2026-03-10 00:54:16
Apple announced the MacBook Neo two days ago. 9. iPhone chip. I have mixed feelings.