Toute l'actualité de la Cybersécurité


ShinyHunters Claims 350GB Data Breach at European Commission

2026-03-28 18:18:07
ShinyHunters claims it breached European Commission systems, leaking 350GB of data. Officials are investigating, with no independent verification yet.

Lire la suite »

ShinyHunters claims the hack of the European Commission

2026-03-28 15:58:21
The European Commission has allegedly been breached by ShinyHunters, with reported data dumps including content from mail servers. The European Commission has allegedly been breached by ShinyHunters,...

Lire la suite »

Iran-Linked Hackers Breach FBI Director's Personal Email, Hit Stryker With Wiper Attack

2026-03-28 15:40:00
Threat actors with ties to Iran successfully broke into the personal email account of Kash Patel, the director of the U.S. Federal Bureau of Investigation (FBI), and leaked a cache of photos and other...

Lire la suite »

Rust Retro: Updated Baseline Standards When it Comes to Windows Targets

2026-03-28 15:30:04
Rust's Tier 1 toolchains targeting Windows will increase with the 1.78 release (scheduled for May 02, 2024) Windows 10 will now be the minimum supported version for the `*-pc-windows-*` targets.

Lire la suite »

Cybersecurity Companies' Stocks Fall as Anthropic Tests Powerful New Model

2026-03-28 15:05:18
Cybersecurity stocks declined sharply on Friday following revelations that Anthropic has begun testing “Mythos,” an extraordinarily powerful new AI model with advanced vulnerability-discovery...

Lire la suite »

Backward Compatibility in Go: What to Know

2026-03-28 15:00:42
Boring is good. Boring is stable. Boring means being able to focus on your work, not on what's different about Go. This post is about the important work we shipped in Go 1.21 to keep Go boring.

Lire la suite »

New Infinity Stealer malware grabs macOS data via ClickFix lures

2026-03-28 14:35:10
A new info-stealing malware named Infinity Stealer is targeting macOS systems with a Python payload packaged as an executable using the open-source Nuitka compiler. [...]

Lire la suite »

CISA Warns of F5 BIG-IP Vulnerability Actively Exploited in Attacks

2026-03-28 14:26:19
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a newly disclosed vulnerability affecting F5 BIG-IP systems to its Known Exploited Vulnerabilities (KEV) catalog, warning that...

Lire la suite »

The Markup Wins Six News Design Awards From the Society for News Design

2026-03-28 14:00:46
The Markup won multiple awards of excellence in the Society for News Design's Best of News Design Creative Competition. The Markup uses investigative reporting, data analysis, and software engineering...

Lire la suite »

Data, Surveillance, and the Law: What Is Policing?

2026-03-28 14:00:40
A city is a type of cell culture for the observance in the study of criminality. Good governance ensures that development units is at best evenly distributed. Advances in AI, machine learning, and data...

Lire la suite »

Lloyds Group to Compensate 450,000 Customers After App Glitch

2026-03-28 13:34:26
Lloyds Banking Group to compensate 450,000 customers after app glitch exposed data. Find out how the glitch affected…

Lire la suite »

I Built a NumPy-Like Library in Pure JavaScript: This Is Exactly How I Did It

2026-03-28 13:00:34
In NumPy, you can call built-in functions such as `mean` or `dot` from JavaScript. In this essay, I will explain how I built a library inspired by NumPy.

Lire la suite »

La Commission européenne sous menace de fuite

2026-03-28 12:02:16
Commission européenne, ShinyHunters et série de fuites massives : lecture cyber et renseignement d'une menace structurée.

Lire la suite »

FAT CAT (Forensics)— KJSSE CTF 3.0

2026-03-28 11:25:56
ChallengeThis challenge was given in Round 2 of KJSSE CTF 3.0 by K.J. Somaiya College of Engineering, Vidyavihar. Challenge Description:A butterfly shouldn't make a cat feels this heavy. There is more...

Lire la suite »

Proving Grounds — Practice — Access

2026-03-28 11:23:24
Proving Grounds — Practice — AccessAI Image created by https://deepai.org/machine-learning-model/hologram-3d-generatorProving Grounds Practice machine Access is rated intermediate by Offsec,...

Lire la suite »

How I Spent 30 Days Chasing a ,000 Bug Bounty And What I Learned the Hard Way

2026-03-28 11:21:56
A bug hunter's honest account of discovery, forensic investigation, escalations, and the painful lesson that changed my approach forever.By HackerMD | Bug Bounty Hunter | Security Researcher“The...

Lire la suite »

From a Silent Math Error to Certificate Bypass: Uncovering an Integer Overflow in a TLS Parser

2026-03-28 11:21:28
Bug hunting isn't always about popping XSS alerts or finding chained SSRFs. Sometimes, the most critical vulnerabilities are hidden deep within the foundational cryptographic parsing logic of an application.Recently,...

Lire la suite »

Azure Blob Storage Misconfigurations: Attacker's Gateway to Data

2026-03-28 11:21:16
By: Vedant Bhalgama (@ActiveXSploit)Microsoft Azure is a cloud computing platform that provides a wide range of services, including Virtual Machines, databases, container services, and application hosting....

Lire la suite »

Cyber actualités ZATAZ de la semaine du 23 au 29 mars 2026

2026-03-28 10:32:44
Cette semaine, ZATAZ suit une actualité dense dans le monde de la cybersécurité et des pirates informatiques.

Lire la suite »

Iran-linked group Handala hacked FBI Director Kash Patel's personal email account

2026-03-28 10:22:33
Iran-linked group Handala claims it hacked FBI Director Kash Patel's personal email, leaking files. The FBI says no government data was exposed. Iran-linked hacking group Handala claims it breached...

Lire la suite »

Un outil Zataz pour décoder un QR code localement

2026-03-28 10:04:40
Outil Zataz : décoder un QR code localement pour vérifier URL, texte, Wi-Fi ou contact sans exposition inutile.

Lire la suite »

Le 1er avril, je démontre le social engineering à InCyber

2026-03-28 09:49:32
Le 1er avril, à InCyber, je montre en direct comment le social engineering exploite le facteur humain.

Lire la suite »

CareCloud face à un incident critique sous surveillance

2026-03-28 09:19:44
CareCloud a signalé un incident cyber matériel via un 8-K, document clé pour les investisseurs, distinct de la logique du RGPD.

Lire la suite »

Citrix NetScaler Under Active Recon for CVE-2026-3055 (CVSS 9.3) Memory Overread Bug

2026-03-28 09:11:00
A recently disclosed critical security flaw impacting Citrix NetScaler ADC and NetScaler Gateway is witnessing active reconnaissance activity, according to Defused Cyber and watchTowr. The vulnerability,...

Lire la suite »

A Mysterious Alibi Shakes the Ackroyd Case

2026-03-28 09:00:39
Poirot, Dr. Sheppard, and Inspector Raglan travel to Liverpool to question Charles Kent, the mysterious stranger seen at Fernly. Kent admits being there but provides a solid alibi, proving he left before...

Lire la suite »

Faux Lacoste sur TikTok, les signaux d'alerte

2026-03-28 08:59:28
Publicités TikTok pour du faux Lacoste, indices d'escroquerie et signaux cyber relevés par ZATAZ sur une boutique très opaque.

Lire la suite »

Mageia 9 Nodejs Important Denial of Service Vuln MGASA-2026-0071

2026-03-28 08:27:00
MGASA-2026-0071 - Updated nodejs packages fix security vulnerabilities

Lire la suite »

Mageia 9 libpng Important Use-After-Free and OOB Read MGASA-2026-0070

2026-03-28 08:26:59
MGASA-2026-0070 - Updated libpng packages fix security vulnerabilities

Lire la suite »

U.S. CISA adds a flaw in F5 BIG-IP AMP to its Known Exploited Vulnerabilities catalog

2026-03-28 07:33:15
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in F5 BIG-IP AMP to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency...

Lire la suite »

CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation

2026-03-28 07:07:00
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a critical security flaw impacting F5 BIG-IP Access Policy Manager (APM) to its Known Exploited Vulnerabilities (KEV) catalog,...

Lire la suite »

TA446 Deploys DarkSword iOS Exploit Kit in Targeted Spear-Phishing Campaign

2026-03-28 07:07:00
Proofpoint has disclosed details of a targeted email campaign in which threat actors with ties to Russia are leveraging the recently disclosed DarkSword exploit kit to target iOS devices. The activity...

Lire la suite »

The TechBeat: The Best 9 HR Management Platforms in 2026 (3/28/2026)

2026-03-28 06:11:34
How are you, hacker? 🪐Want to know what's trending right now?: The Techbeat by HackerNoon has got you covered with fresh content from our trending stories of the day! Set email preference here. ...

Lire la suite »

European Commission Confirms Cyberattack Following AWS Account Hack

2026-03-28 03:20:54
The European Commission has officially confirmed a cyberattack following a targeted cyberattack that compromised its Amazon Web Services (AWS) account. Discovered on March 24, the intrusion specifically...

Lire la suite »

The 5 Best Suits From Marvel's Spider-Man 2: Miles Morales Version

2026-03-28 03:06:50
1. Smoke and Mirrors Suit 2. Best There Is Suit 3. Agent of S.H.I.E.L.D. Suit 4. Metro Suit 5. Life Story Suit

Lire la suite »

Windows 11 and Server 2025 Update to Block Untrusted Cross-Signed Kernel Drivers by Default

2026-03-28 02:48:00
Microsoft is taking a major step to harden the Windows operating system against kernel-level threats by removing trust for drivers signed by the deprecated cross-signed root program. Starting with the...

Lire la suite »

CISA Adds Aquasecurity Trivy Scanner Vulnerability to KEV Catalog

2026-03-28 02:24:07
CISA has officially added a critical vulnerability affecting Aquasecurity’s Trivy scanner to its Known Exploited Vulnerabilities (KEV) catalog. Tracked as CVE-2026-33634, this alarming security...

Lire la suite »

Fedora 42 Chromium High Heap Overflows and Risks 2026-cc466cfb57

2026-03-28 01:07:09
Update to 146.0.7680.164 * High CVE-2026-4673: Heap buffer overflow in WebAudio * High CVE-2026-4674: Out of bounds read in CSS * High CVE-2026-4675: Heap buffer overflow in WebGL * High CVE-2026-4676:...

Lire la suite »

Fedora 42 php-phpseclib Information Disclosure AES 2026-bfeb46516b

2026-03-28 01:07:01
Update to v2.0.52

Lire la suite »

Fedora 42 Samtools Critical Heap Overflow Denial of Service 2026-1fc0d39acd

2026-03-28 01:07:00
Update to 1.23.1

Lire la suite »

Fedora 42 htslib Urgent Heap Overflow Vulnerability for Code Execution

2026-03-28 01:07:00
Update to 1.23.1

Lire la suite »

Iran-Linked Handala Hackers Breach FBI Chief Kash Patel's Gmail

2026-03-28 01:06:05
Iran-linked Handala hackers breached FBI Chief Kash Patel's Gmail, leaking photos and documents. Officials say no classified data was exposed.

Lire la suite »