Toute l'actualité de la Cybersécurité
Hims & Hers warns of data breach after Zendesk support ticket breach
2026-04-03 17:41:11
Telehealth giant Hims & Hers Health is warning that it suffered a data breach after support tickets were stolen from a third-party customer service platform. [...]
China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing
2026-04-03 17:34:00
A China-aligned threat actor has set its sights on European government and diplomatic organizations since mid-2025, following a two-year period of minimal targeting in the region.
The campaign...
Apple Breaks Precedent, Patches DarkSword for iOS 18
2026-04-03 17:08:57
Even organizations with users unwilling or unable to adopt iOS 26 can now protect themselves from a severe mobile OS-cracking tool.
North Korean Hackers Abuse GitHub to Spy on South Korean Firms
2026-04-03 17:05:23
Researchers from FortiGuard Labs have uncovered a high-severity spying campaign targeting South Korean companies. Discover how North Korean…
14,000+ F5 BIG-IP APM Devices Exposed Online Amid Active RCE Vulnerability Exploits
2026-04-03 17:02:42
A critical security flaw in F5’s BIG-IP Access Policy Manager (APM) is currently under active exploitation, leaving thousands of enterprise networks at risk. The vulnerability, officially tracked...
Die Linke German political party confirms data stolen by Qilin ransomware
2026-04-03 16:36:44
The Qilin ransomware group has claimed responsibility for an attack against Die Linke ('The Left'), forcing an IT systems outage at the political party, and threatening sensitive data leak. [...]
Two Tools, 56 APIs: How I Built a Universal MCP Server
2026-04-03 15:59:59
I had 56 APIs I needed my agent to talk to. The idea of maintaining 56 separate MCP servers made me want to close my laptop and never open it again.
Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers
2026-04-03 15:32:00
Threat actors are increasingly using HTTP cookies as a control channel for PHP-based web shells on Linux servers and to achieve remote code execution, according to findings from the Microsoft Defender...
AI Firm Mercor Confirms Breach as Hackers Claim 4TB of Stolen Data
2026-04-03 15:21:14
AI firm Mercor confirms a breach linked to a LiteLLM supply chain attack, as hackers claim to have stolen 4TB of sensitive data and internal systems.
Europa.eu piraté : le mode opératoire se précise
2026-04-03 15:21:05
La compromission de la plate-forme d'hébergement des sites web de l'UE semble découler d'une attaque en amont sur le dépôt GitHub d'un scanner de vulnérabilités.
The post Europa.eu piraté : le...
FAL.CON 2026: Secure The AI Revolution
2026-04-03 15:15:05
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 3, 2026 – Listen to the podcast Daniel Bernard, aka “DB”, Chief Business Officer at CrowdStrike,...
Blast Radius of TeamPCP Attacks Expands Amid Hacker Infighting
2026-04-03 15:11:16
As organizations disclose breaches tied to TeamPCP's supply chain attacks, ShinyHunters and Lapsus$ are getting involved, taking credit, and creating a murky situation for enterprises.
30 BI Engineering Interview Questions That Actually Matter in the AI Era
2026-04-03 15:00:04
The BI interview hasn't caught up with the job. Here are 30 questions that reflect what it actually means to be a BI engineer in 2026.
Kimsuky Deploys Malicious LNK Files to Deliver Python-Based Backdoor in Multi-Stage Attack
2026-04-03 14:43:09
A North Korean threat group known as Kimsuky has been caught running a cyberattack campaign that uses malicious Windows shortcut files, known as LNK files, to quietly install a Python-based backdoor on...
Blocking children from social media is a badly executed good idea
2026-04-03 14:37:52
Governments are each inventing their own flavor of an age based ban for social media. Is the cure worse than the disease?
Axios Maintainer Confirms The npm Compromise Was via a Targeted Social Engineering Attack
2026-04-03 14:22:41
Two malicious versions of the popular JavaScript HTTP library Axios were briefly published to the npm registry on March 31, 2026. Each version carried a hidden dependency that installed a remote access...
Hackers Abuse Trusted Platforms to Steal Bank Credentials From Philippine Users
2026-04-03 14:09:26
A coordinated phishing campaign has been quietly targeting banking customers across the Philippines since early 2024, and it remains active today. The attackers are not relying on crude tricks — they...
Evolution of Ransomware: Multi-Extortion Ransomware Attacks
2026-04-03 14:05:15
Multi-extortion ransomware relies on stolen data to pressure victims with public leaks. Penta Security explains how its D.AMO platform keeps exfiltrated files encrypted and useless to attackers. [...]
HackerNoon Projects of the Week: Movement Network Foundation, Packworks & Kyram
2026-04-03 14:00:23
This week's HackerNoon spotlight features three standout projects from the Proof of Usefulness Hackathon. Movement Network Foundation is bridging Move and Ethereum, Packworks is digitizing Southeast...
North Korea–linked hackers drain 5M from Drift in sophisticated attack
2026-04-03 13:57:51
Drift lost 5M in a sophisticated attack, likely by North Korea, who used nonce-based tricks to gain control and quickly drain funds Drift suffered a 5 million cryptocurrency heist in a highly sophisticated...
You Don't Have a Security Problem, You Have a Visibility Problem
2026-04-03 13:46:13
What you'll learn in this articleThis article explains why many breaches are driven by gaps in visibility rather than advanced exploits, how attackers move through modern environments, and what changes...
AI Future: The Leading International AI and Web3 Forum to Take Place in April
2026-04-03 13:33:35
Moscow, Russia, 3rd April 2026, CyberNewswire
Picking Up 'Skull Vibrations'? Could Be XR Headset Authentication
2026-04-03 13:30:00
"Skull vibration harmonics generated by vital signs" can be used to sign in to VR, AR, and MR headsets, according to emerging research.
CrystalX RAT: new MaaS malware combines spyware, stealer, and remote access
2026-04-03 13:23:57
CrystalX RAT, a new sophisticated MaaS malware, combines spyware, data theft, and remote access, allowing attackers to monitor victims. In March 2026, Kaspersky researchers uncovered a Telegram-based...
Debian bookworm DSA-6194-1 pyasn1 Medium DoS CVE-2026-30922
2026-04-03 13:15:44
It was discovered that pyasn1, a generic ASN.1 library for Python, is prone to a denial of service vulnerability when decoding ASN.1 data with deeply nested structures. For the oldstable distribution...
Une faille de sécurité sur iPhone pourrait transformer votre appareil en outil d'espionnage
2026-04-03 13:13:35
Un outil de piratage dangereux pour iPhone, connu sous le nom de DarkSword , a fuité sur GitHub, ce qui engendre de nouveaux risques pour les utilisateurs d’anciens appareils Apple. Tribune –...
Kaspersky et AFRIPOL organisent une formation conjointe en cybersécurité à destination des forces de l'ordre africaines
2026-04-03 13:10:05
Dans le cadre d'une initiative conjointe avec AFRIPOL, Kaspersky a dispensé des formations en cybersécurité à des représentants des forces de l'ordre issus de 23 pays africains, portant sur les...
Claude Source Code Leak Highlights Big Supply Chain Missteps
2026-04-03 13:00:00
Or, why the software supply chain should be treated as critical infrastructure with guardrails built in at every layer.
Chainguard Unveils Factory 2.0 to Automate Hardening the Software Supply Chain
2026-04-03 12:57:28
The rebuilt Chainguard platform adds deeper security designed to continuously reconcile open-source artifacts across containers, libraries, Actions and skills.
Ubuntu systemd Privilege Elevation Vulnerabilities DSA-8194-7
2026-04-03 12:49:39
Several vulnerabilities were discovered in the inetutils implementation of telnetd and telnet, which may result in privilege escalation or information disclosure. For the oldstable distribution (bookworm),...
Fuite de code chez Claude Code : les commentaires de Melissa Bischoping de Tanium
2026-04-03 12:28:01
Suite à la fuite du code de Claude Code d'Anthropic, voici les commentaires et l'analyse de Melissa Bischoping, Senior Director, Security and Product Design Research chez Tanium, en matière de cybersécurité....
CrowdStrike Next-Gen SIEM Can Now Ingest Microsoft Defender Telemetry
2026-04-03 11:53:15
Once CrowdStrike's nemesis, Microsoft is now a collaborator. A shared interest in Formula 1 helped thaw the years-long fierce rivalry.
Microsoft still working to fix Exchange Online mailbox access issues
2026-04-03 11:25:20
Microsoft is investigating and working to resolve Exchange Online mailbox access issues that have intermittently affected Outlook mobile and macOS users for weeks. [...]
Malicious Chrome Extension “ChatGPT Ad Blocker” Steals ChatGPT Conversations
2026-04-03 11:23:11
As OpenAI introduces advertisements to its free tier, cybercriminals are seizing the opportunity to trick users with fake utility tools. Security researchers have discovered a malicious Google Chrome...
The Data Bottleneck: Architecting High-Throughput Ingestion for Real-Time Analytics
2026-04-03 11:21:24
Data ingestion isn't a background task—it's a major performance and cost driver at scale. Poorly designed pipelines create bottlenecks, small files, and memory pressure that slow everything downstream....
Why Your Retry Logic Is Taking Down Your System (And How to Fix It)
2026-04-03 11:11:24
Retries aren't a safety net—they're a load multiplier. In distributed systems, naive retries across layers can trigger retry storms, amplify latency, and cause cascading failures. The fix isn't...
UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack
2026-04-03 11:04:00
The maintainer of the Axios npm package has confirmed that the supply chain compromise was the result of a highly-targeted social engineering campaign orchestrated by North Korean threat actors tracked as...
Why Modern Data Platforms Prefer ELT Over ETL
2026-04-03 11:02:47
ELT is a widely used concept in the data engineering world and stands for - Extract, Load, and Transform. Traditional data warehousing relies on the ETL approach, where raw data is first extracted from...
Why Third-Party Risk Is the Biggest Gap in Your Clients' Security Posture
2026-04-03 11:00:00
The next major breach hitting your clients probably won't come from inside their walls. It'll come through a vendor they trust, a SaaS tool their finance team signed up for, or a subcontractor...
Spec-Driven Development - My First Impressions and Opinions
2026-04-03 10:53:23
Spec-Driven Development brings structure to AI coding, but it also introduces heavy documentation, review overhead, and token costs. In practice, the real bottleneck is still the AI model itself. A lighter...
The Cost of Compute: Architecting High-Performance SQL in Distributed Lakehouses
2026-04-03 10:47:55
In modern lakehouses like Snowflake and Databricks, inefficient SQL directly increases compute costs. This article breaks down advanced optimization techniques—from partition pruning and broadcast joins...
Monitoring Essential Metrics for Cloud Native Systems - Part 1
2026-04-03 10:40:17
Dashboards don't make systems observable. True monitoring requires the right signals: latency, traffic, errors, and saturation. This article explains why traditional metrics fail, how observability...
Hackers Use Phorpiex Botnet to Spread Ransomware, Sextortion, and Crypto-Clipping Malware
2026-04-03 10:28:10
A botnet that has been running since 2011 is back in the spotlight — not because it is new, but because it keeps reinventing itself. Phorpiex, also known as Trik, has grown from a basic spam tool into...
Free VPNs vs Paid VPNs: What Are You Actually Paying For?
2026-04-03 10:25:44
Free VPNs aren't free. Someone pays for every server, every IP address, every gigabyte of traffic. When you don't pay with money, you pay with your data, your bandwidth, or sometimes your identity. To...
Hackers Use Venom Stealer to Turn ClickFix Lures Into Full Data Exfiltration Pipelines
2026-04-03 10:19:34
A new malware has been quietly spreading across cybercrime networks, and security researchers say it is far more capable than most tools of its kind. Called Venom Stealer, this malware-as-a-service platform...
Apologia: The Truth Behind the Crime
2026-04-03 10:00:35
In the “Apologia” chapter, Dr. Sheppard reflects on his meticulous planning of Roger Ackroyd's murder, using a dictaphone and strategic timing to mislead others. He confesses in a manuscript meant...
IBM veut capter les workloads Arm sur ses mainframes
2026-04-03 09:57:29
IBM vient d'introduire, dans le noyau Linux, un patch emblématique des « couches technologiques » qu'il projette entre les deux écosystèmes.
The post IBM veut capter les workloads Arm sur ses mainframes...
Comment Canal+ industrialise le déploiement d'agents IA avec AWS
2026-04-03 09:54:20
Transformer les usages des entreprises avec l’IA. Tel a été l’un des points clés du discours porté par AWS lors (...)
Microsoft Forcing Upgrades to Unmanaged Windows 11, Version 24H2
2026-04-03 09:19:57
Microsoft has officially begun force-upgrading unmanaged Windows 11 version 24H2 devices to version 25H2, marking the final phase of a staged rollout that relies on machine learning to determine device...
New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images
2026-04-03 09:10:00
Cybersecurity researchers have discovered a new version of the SparkCat malware on the Apple App Store and Google Play Store, more than a year after the trojan was discovered targeting...
Man admits to locking thousands of Windows devices in extortion plot
2026-04-03 09:04:54
A former core infrastructure engineer has pleaded guilty to locking Windows admins out of 254 servers as part of a failed extortion plot targeting his employer, an industrial company headquartered in...
Multiple TP-Link Vulnerabilities Let Attackers Trigger DoS and Crash Routers
2026-04-03 08:50:19
Multiple high-severity vulnerabilities exist in TP-Link's Tapo C520WS smart security cameras. If exploited, these vulnerabilities may allow adjacent attackers to trigger Denial-of-Service (DoS) conditions,...
Drift Loses 5 Million in Durable Nonce Social Engineering Attack Linked to DPRK
2026-04-03 08:35:00
Solana-based decentralized exchange Drift has confirmed that attackers drained about 5 million from the platform during a security incident that took place on April 1, 2026.
"Earlier today, a...
Oracle et l'IA : à investissements massifs, licenciements massifs
2026-04-03 08:14:08
Engagé dans des investissements massifs sur les infrastructures pour l'IA, Oracle supprimerait jusqu'à 30 000 postes.
The post Oracle et l’IA : à investissements massifs, licenciements massifs...
Microsoft now force upgrades unmanaged Windows 11 24H2 PCs
2026-04-03 07:55:40
Starting this week, Microsoft has begun force-upgrading unmanaged devices running Windows 11 24H2 Home and Pro editions to Windows 11 25H2. [...]
Pro-Iran Handala group breached Israeli defence contractor PSK Wind Technologies
2026-04-03 07:52:52
Iran-linked hackers claim to have breached Israeli air defence contractor PSK Wind, which develops command and control systems. Pro-Iran Handala group announced on April 2 that it breached PSK Wind Technologies,...
The Specialist's Dilemma Is Breaking Scientific AI
2026-04-03 07:44:59
Intern-S1-Pro challenges the idea that AI must choose between general reasoning and scientific specialization across multiple domains.
Hackers Compromised 700+ Next.js Hosts by Exploiting React2Shell Vulnerability
2026-04-03 07:38:26
A massive automated credential theft campaign is actively targeting web applications worldwide. Cybersecurity researchers at Cisco Talos have uncovered an operation by a hacker group tracked as UAT-10608,...
CERT-EU: European Commission hack exposes data of 30 EU entities
2026-04-03 06:33:34
The European Union's Cybersecurity Service (CERT-EU) has attributed the European Commission cloud hack to the TeamPCP threat group, saying the resulting breach exposed the data of at least 29 other...
VirtualHost And Subdomains
2026-04-03 06:03:22
Breaking down how VirtualHosts and Subdomains work behind the scenesHave you ever been confused between VirtualHosts and Subdomains?Let's dive deep into both and understand how these two helps handling...
Path Traversal — A tour to the web server's assets
2026-04-03 06:02:44
Path Traversal — A tour to the web server's assetsPath traversal, also known as Directory traversal, is a vulnerability that can reveal sensitive information stored on the web server.Path traversal...
Reverse Engineering a WhatsApp 0-Click Vulnerability: A Deep Dive into CVE-2025–43300
2026-04-03 06:01:23
Based on “Reverse Engineering a WhatsApp 0-Click Vulnerability” by Billy EllisContinue reading on InfoSec Write-ups »
A Practical Approach To Graphing The Planet
2026-04-03 06:00:55
BloodHound OpenGraph Processing with DataHoundBackgroundContextBloodHound was originally created by SpecterOps to assist with the analysis of Active Directory environments. The platform was later expanded...
Gaara — SSH Brute Force + SUID gdb Shell Escape | OffSec PG Play
2026-04-03 06:00:21
Gaara is a box that starts simply and ends the same way. There is only SSH and HTTP exposed, and the web server has nothing useful on it — just a single image. The way in is a brute force on SSH...
Prompt Engineering for AI Security: The Skill Every Cybersecurity Fresher Must Learn in 2026
2026-04-03 05:56:26
How crafting the right prompts can make you a sharper threat analyst, a faster learner, and a more dangerous defender — before you even…Continue reading on InfoSec Write-ups »
Container Image Security (Signing and Scanning with tools like Cosign, Trivy)
2026-04-03 05:55:41
I hope you are enjoying the Kubernetes security posts that I am currently sharing. They have honestly been interesting so far. In my last post, I talked about Pod Security Standards (PSS) and policy enforcement...
Axios npm Supply Chain Compromise
2026-04-03 02:50:07
What is the Attack?
A software supply chain attack targeted the widely used JavaScript library Axios after an attacker reportedly compromised a maintainer's...
Fedora 43 Openbao Critical XSS Weaknesses Fix 2026-a9c2a486a6
2026-04-03 00:52:03
Update to upstream 2.5.2, including fixes for CVE-2026-33757 and CVE-2026-33758
Fedora 43 bind9-next Critical DNS Fix CVE-2026-1519 DoS 2026-a6efefa854
2026-04-03 00:51:59
Update to 9.21.20 (rhbz#2440560) Security Fixes: Fix unbounded NSEC3 iterations when validating referrals to unsigned delegations. (CVE-2026-1519) Fix memory leaks in code preparing DNSSEC proofs of non-existence....
Debian Bookworm Chromium Critical Exec DoS Risk DSA-6192-1 CVE-2026-5272
2026-04-03 00:39:00
Security issues were discovered in Chromium which could result in the execution of arbitrary code, denial of service, or information disclosure. For the oldstable distribution (bookworm), these problems...
Multiples vulnérabilités dans Microsoft Edge (03 avril 2026)
03/04/2026
De multiples vulnérabilités ont été découvertes dans Microsoft Edge. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur. Microsoft indique que...
Vulnérabilité dans Synology Mail Station (03 avril 2026)
03/04/2026
Une vulnérabilité a été découverte dans Synology Mail Station. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données et une atteinte à l'intégrité des données....
Multiples vulnérabilités dans VMware Tanzu (03 avril 2026)
03/04/2026
De multiples vulnérabilités ont été découvertes dans VMware Tanzu. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Multiples vulnérabilités dans les produits IBM (03 avril 2026)
03/04/2026
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation...
Multiples vulnérabilités dans le noyau Linux de Red Hat (03 avril 2026)
03/04/2026
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service...
Multiples vulnérabilités dans le noyau Linux d'Ubuntu (03 avril 2026)
03/04/2026
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de...
Multiples vulnérabilités dans le noyau Linux de SUSE (03 avril 2026)
03/04/2026
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une...