Toute l'actualité de la Cybersécurité


Microsoft confirms May Windows 10 updates trigger BitLocker recovery

2025-05-16 18:36:04
​Microsoft has confirmed that some Windows 10 and Windows 10 Enterprise LTSC 2021 systems will boot into BitLocker recovery after installing the May 2025 security updates. [...]

Lire la suite »

Hands-on Malware Analysis Training to Boost Up SOC & MSSP Teams

2025-05-16 17:35:36
Security Operations Centers (SOCs) and Managed Security Service Providers (MSSPs) operate at the forefront of cybersecurity, tasked with defending organizations against increasingly sophisticated threats....

Lire la suite »

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

2025-05-16 17:12:31
A serious security flaw affecting the Eventin plugin, a popular event management solution for WordPress, was recently discovered by Denver Jackson, a member of the Patchstack Alliance community. This...

Lire la suite »

USN-7514-1: Linux kernel (NVIDIA) vulnerabilities

2025-05-16 17:05:40
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - RISC-V architecture; ...

Lire la suite »

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

2025-05-16 17:05:38
A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign embedded within the seemingly innocuous package os-info-checker-es6. First published on March 19, 2025,...

Lire la suite »

USN-7517-1: Linux kernel (Xilinx ZynqMP) vulnerabilities

2025-05-16 17:02:35
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; ...

Lire la suite »

macOS Gatekeeper Explained – Strengthening System Defenses

2025-05-16 17:00:00
Apple's macOS Gatekeeper, a cornerstone of the operating system's defense against malicious software, has undergone significant macOS Sequoia (15.0) updates to address emerging security challenges....

Lire la suite »

New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads

2025-05-16 16:59:01
A newly identified ransomware campaign has emerged, seemingly targeting supporters of Elon Musk through a highly sophisticated phishing-based attack. Cybersecurity researchers have uncovered a multi-stage...

Lire la suite »

USN-7516-2: Linux kernel (GCP FIPS) vulnerabilities

2025-05-16 16:58:20
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; ...

Lire la suite »

USN-7516-1: Linux kernel vulnerabilities

2025-05-16 16:52:04
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; ...

Lire la suite »

Printer Company Distributes Malicious Drivers Infected with XRed Malware

2025-05-16 16:47:12
Procolored, a printer manufacturing company, has been found distributing software drivers infected with malicious code, including the notorious XRed backdoor malware. The issue came to light when Cameron...

Lire la suite »

USN-7515-1: Linux kernel (GKE) vulnerabilities

2025-05-16 16:43:48
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - RISC-V architecture; ...

Lire la suite »

Metasploit Wrap-Up 05/16/2025

2025-05-16 16:38:30
This week's release includes 5 new modules including RCEs for Car Rental System, and three Wordpress plugins. The execute-assembly post module was also updated with 32-bit support.

Lire la suite »

Chinese Agent Impersonate as Stanford Student For Intelligence Gathering

2025-05-16 16:34:54
Chinese intelligence operative posing as a Stanford University student has been uncovered following an investigation into suspicious approaches made to students conducting China-related research. The...

Lire la suite »

Ivanti EPMM Hit by Two Actively Exploited 0day Vulnerabilities

2025-05-16 16:32:54
Ivanti EPMM users urgently need to patch against actively exploited 0day vulnerabilities (CVE-2025-4427, CVE-2025-4428) that enable pre-authenticated remote…

Lire la suite »

Arista en passe d'acquérir VeloCloud

2025-05-16 16:32:53
L’actualité de VMware ne tourne pas simplement autour des licences. Son portefeuille de solutions est au centre de négociations d’acquisition. (...)

Lire la suite »

USN-7513-2: Linux kernel (Real-time) vulnerabilities

2025-05-16 16:30:47
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - RISC-V architecture; ...

Lire la suite »

Israel arrests new suspect behind Nomad Bridge 0M crypto hack

2025-05-16 16:25:50
An American-Israeli national named Osei Morrell has been arrested in Israel for his alleged involvement in exploiting the Nomad bridge smart-contract in August 2022 that allowed hackers to siphon 0...

Lire la suite »

USN-7513-1: Linux kernel vulnerabilities

2025-05-16 16:23:28
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - RISC-V architecture; ...

Lire la suite »

USN-7512-1: Linux kernel (GCP) vulnerabilities

2025-05-16 16:11:22
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; ...

Lire la suite »

USN-7511-2: Linux kernel (GCP FIPS) vulnerabilities

2025-05-16 16:04:50
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; ...

Lire la suite »

Piratage d'un géant hôtelier turc : les données de millions de clients en vente ?

2025-05-16 16:02:00
À l'approche des vacances, les cybercriminels redoublent d'activité. ZATAZ révèle qu'une base de données massive issue d'un grand groupe hôtelier turc est proposée à la vente sur le dark...

Lire la suite »

USN-7511-1: Linux kernel (GCP) vulnerabilities

2025-05-16 15:59:08
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; ...

Lire la suite »

ChatGPT rolls out Codex, an AI tool for software programming

2025-05-16 15:49:22
OpenAI is rolling out 'Codex' for ChatGPT, which is an AI agent that automates and delegates programming tasks for software engineers. [...]

Lire la suite »

Pro-Ukraine Group Targets Russian Developers with Python Backdoor

2025-05-16 15:48:01
ReversingLabs discovers dbgpkg, a fake Python debugger that secretly backdoors systems to steal data. Researchers suspect a pro-Ukraine…

Lire la suite »

SSH Auth Keys Reuse Exposes Sophisticated Targeted Phishing Attack

2025-05-16 15:31:06
A coordinated phishing campaign targeting Kuwait’s critical sectors has been exposed through a distinctive operational security lapse: the consistent reuse of SSH authentication keys across multiple...

Lire la suite »

Révolte des machines ? Un robot Unitree attaque un ingénieur en Chine

2025-05-16 15:29:22
"Hasta la vista, baby"... Ou pas. L'incident rappelle les pires scénarios de science-fiction. Et si Terminator n'était plus seulement un film, mais une prophétie en avance sur son temps ?...

Lire la suite »

Hackers exploit VMware ESXi, Microsoft SharePoint zero-days at Pwn2Own

2025-05-16 15:23:22
During the second day of Pwn2Own Berlin 2025, competitors earned 5,000 after exploiting zero-day bugs in multiple products, including Microsoft SharePoint, VMware ESXi, Oracle VirtualBox, Red Hat Enterprise...

Lire la suite »

En rachetant Hornetsecurity, Proofpoint s'empare de son ennemi Vade

2025-05-16 15:18:40
Le rachat de Hornetsecurity par Proofpoint doit avoir un goût un peu amer pour les équipes de l’éditeur français Vade (...)

Lire la suite »

L'amour en ligne transformé en piège : le fléau grandissant du pig butchering

2025-05-16 15:08:31
Une arnaque redoutable mêlant sentiments et fraude financière, appelée "pig butchering", se propage à grande vitesse sur les applications de rencontre, exploitant solitude, IA et crypto pour dépouiller...

Lire la suite »

Linux Kernel Patching and Preventing Exploits in 2025

2025-05-16 15:00:00
As the Linux kernel continues to power everything from cloud infrastructure to embedded devices, its security remains critical. In 2025, patching strategies face unprecedented challenges: a 3,529%...

Lire la suite »

Printer maker Procolored offered malware-laced drivers for months

2025-05-16 14:56:51
For at least half a year, the official software supplied with Procolored printers included malware in the form of a remote access trojan and a cryptocurrency stealer. [...]

Lire la suite »

Trafic numérique : des boîtes SIM au cœur d'une guerre de l'ombre entre la Russie et l'Ukraine

2025-05-16 14:53:41
Un réseau de cybercriminels utilisant des dispositifs de masse pour diffuser des messages frauduleux a été démantelé en Russie, révélant l'ampleur d'un marché parallèle où les cartes SIM...

Lire la suite »

Une base de données d'un géant du sport français mise en vente pour 600 dollars

2025-05-16 14:42:31
Un pirate propose l'accès administrateur au site d'une entreprise française de vêtements de sport. Prix affiché : 600 dollars. Le nom de la marque reste confidentiel....

Lire la suite »

Identités à vendre : plongée dans le marché noir des faux dossiers RH

2025-05-16 14:27:39
Un pirate a récemment mis en vente un pack complet de documents d'identité sur le dark web. Une annonce explicite repérée par le site Zataz qui dévoile une réalité inquiétante : la marchandisation...

Lire la suite »

New Vulnerability Affects All Intel Processors From The Last 6 Years

2025-05-16 14:16:43
A newly discovered class of vulnerabilities in Intel processors, termed Branch Predictor Race Conditions (BPRC), allows attackers to systematically extract sensitive data from the cache and random-access...

Lire la suite »

Impact of AI on cyber threat from now to 2027

2025-05-16 14:09:11
An NCSC assessment highlighting the impacts on cyber threat from AI developments between now and 2027.

Lire la suite »

Chinese Agent Impersonates as Stanford Student For Intelligence Gathering

2025-05-16 14:08:29
A recent investigation has uncovered a concerning case of espionage at one of America’s premier academic institutions, where a Chinese intelligence agent posed as a Stanford University student to...

Lire la suite »

Ransomware gangs increasingly use Skitnet post-exploitation malware

2025-05-16 14:00:00
Ransomware gang members increasingly use a new malware called Skitnet ("Bossnet") to perform stealthy post-exploitation activities on breached networks. [...]

Lire la suite »

How to Develop and Communicate Metrics for CSIRPs

2025-05-16 14:00:00
A well-documented cybersecurity incident response program (CSIRP) provides the transparency needed for informed decision-making, protecting the organization in a constantly changing threat environment....

Lire la suite »

Malware Mastermind Andrei Tarasov Evades US Extradition Returns to Russia

2025-05-16 13:49:59
In a significant setback for US cybercrime enforcement efforts, Russian hacker Andrei Tarasov has evaded extradition to the United States and successfully returned to his homeland, intelligence sources...

Lire la suite »

FBI Warns of US Govt Officials Impersonated in Malicious Message Campaign

2025-05-16 13:38:16
The Federal Bureau of Investigation (FBI) issued an urgent warning Thursday about an ongoing malicious campaign where cybercriminals are impersonating senior US officials through text messages and AI-generated...

Lire la suite »

Windows 10 KB5058379 Update Causes PCs to Enter Recovery Mode and Prompt for BitLocker Key

2025-05-16 13:35:20
Security update KB5058379 for Windows 10, released in May 2025, is causing significant technical issues for numerous systems. Users report their devices are unexpectedly booting into Windows Recovery...

Lire la suite »

Multiple Ivanti Endpoint Mobile Manager Vulnerabilities Allows Remote Code Execution

2025-05-16 13:31:24
Critical security flaws have been uncovered in Ivanti Endpoint Manager Mobile (EPMM), a widely used mobile device management (MDM) solution, exposing organizations to the risk of unauthenticated remote...

Lire la suite »

Cybercriminal Andrei Tarasov Escapes US Extradition, Returns to Russia

2025-05-16 13:01:34
Andrei Vladimirovich Tarasov, a 33-year-old Russian cybercrime figure known online as “Aels,” has returned to Russia after evading US extradition. Released from Berlin’s Moabit Prison...

Lire la suite »

Windows Security Updates – How to Stay Ahead of Vulnerabilities

2025-05-16 13:00:00
In April 2025, cybersecurity teams were starkly reminded of the stakes involved in patch management when Microsoft disclosed CVE-2025-29824, a zero-day privilege escalation flaw in the Windows Common...

Lire la suite »

Oniux: Secure Tor Routing for Linux Applications

2025-05-16 12:59:28
When privacy stakes are high, tools that strengthen security and anonymity become essential. This is precisely where Oniux '' a new command-line utility from the Tor Project '' enters the equation. Built...

Lire la suite »

Red Hat Linux Hacked at Pwn2Own Berlin

2025-05-16 12:53:26
Red Hat Enterprise Linux got hacked during the Pwn2Own Berlin 2025 competition . Let that sink in for a moment. This is one of the go-to systems for businesses that demand stability and security, yet...

Lire la suite »

openSUSE Leap 15.6 Update: SUSE-SU-2025:1565-1 Moderate Security Fix

2025-05-16 12:30:11

Lire la suite »

Investing: Where To Look For The Next Cybersecurity Unicorn

2025-05-16 12:24:19
This week in cybersecurity from the editors at Cybercrime Magazine –Read the full story in Forbes Sausalito, Calif. – May 16, 2025 Google recently invested billion in Wiz, a Cloud Security Platform....

Lire la suite »

Data broker protection rule quietly withdrawn by CFPB

2025-05-16 11:53:04
The CFPB has decided to withdraw a 2024 rule that was aimed at limiting the sale of Americans' personal information by data brokers.

Lire la suite »

Meta sent cease and desist letter over AI training

2025-05-16 11:30:26
A privacy advocacy group has clapped back at Meta over its plans to start training its AI model on European users' data.

Lire la suite »

FBI Alerts Public to Malicious Campaign Impersonating US Government Officials

2025-05-16 11:25:53
Federal Bureau of Investigation has issued a warning about an ongoing malicious messaging campaign targeting current and former senior US government officials and their contacts. Since April 2025, threat...

Lire la suite »

Avec l'IA, Cato Networks optimise les politiques de sécurité du SASE

2025-05-16 11:23:54
Le déploiement des stratégie SASE (secure access service edge) peut être complexe. Cato Networks a dévoilé récemment (...)

Lire la suite »

Frigidstealer Malware Targets macOS Users to Harvest Login Credentials

2025-05-16 11:17:04
An macOS users, a new information-stealing malware dubbed FrigidStealer has emerged as a formidable threat since January 2025. This insidious malware capitalizes on user trust by masquerading as routine...

Lire la suite »

APT Group 123 Targets Windows Systems in Ongoing Malicious Payload Campaign

2025-05-16 11:09:07
Group123, a North Korean state-sponsored Advanced Persistent Threat (APT) group also known by aliases such as APT37, Reaper, and ScarCruft, continues to target Windows-based systems across multiple regions....

Lire la suite »

Ivanti Endpoint Manager Mobile exploit chain exploited in the wild

2025-05-16 11:00:20
On May 13, 2025, Ivanti disclosed an exploited in the wild exploit chain, comprising of two new vulnerabilities affecting Ivanti Endpoint Manager Mobile: CVE-2025-4427 and CVE-2025-4428.

Lire la suite »

Hackers Now Targeting US Retailers After UK Attacks, Google

2025-05-16 10:37:12
Hackers from the Scattered Spider group, known for UK retail attacks, are now targeting US retailers, Google cybersecurity…

Lire la suite »

Salt Security Partners With Wiz, Combines Cloud and API Security

2025-05-16 10:06:58
API security orgnanisation Salt Security has announced its expanded partnership and new integration with Wiz, the leader in cloud security. The integration between Salt Security and Wiz enables organisations...

Lire la suite »

Meta plans to train AI on EU user data from May 27 without consent

2025-05-16 10:06:54
Meta plans to train AI on EU user data from May 27 without consent; privacy group noyb threatens lawsuit over lack of explicit opt-in. Meta plans to use EU user data for AI training starting May 27 without...

Lire la suite »

Android 16 : Google ajoute une nouvelle option pour protéger son smartphone contre le piratage

2025-05-16 09:43:39
Google vient d'annoncer une nouvelle option pour sécuriser son smartphone qui active certaines protections existantes et en ajoute de nouvelles. Conçue pour simplifier la sécurité du mobile, cette...

Lire la suite »

US charges 12 more suspects linked to 0 million crypto theft

2025-05-16 09:06:41
Twelve more suspects were charged in a RICO conspiracy for their alleged involvement in the theft of over 0 million in cryptocurrency and laundering the funds using crypto exchanges and mixing services....

Lire la suite »

7 manières d'optimiser le chiffrement des données

2025-05-16 09:02:30
Le concept de cryptographie existe depuis des millénaires. Mais il est devenu indispensable à la protection des données dans les SI (...)

Lire la suite »

AI in the Cloud: The Rising Tide of Security and Privacy Risks

2025-05-16 08:18:49
Over half of firms adopted AI in 2024, but cloud tools like Azure OpenAI raise growing concerns over data security and privacy risks. As enterprises embrace artificial intelligence (AI) to streamline...

Lire la suite »

Threat Group Assessment: Muddled Libra (Updated May 16, 2025)

2025-05-16 08:16:37
Muddled Libra continues to evolve. From social engineering to adaptation of new technologies, significant time is spent breaking down organizational defenses. The post Threat Group Assessment: Muddled...

Lire la suite »

CISA tags recently patched Chrome bug as actively exploited

2025-05-16 08:13:19
On Thursday, CISA warned U.S. federal agencies to secure their systems against ongoing attacks exploiting a high-severity vulnerability in the Chrome web browser. [...]

Lire la suite »

Google fixed a Chrome vulnerability that could lead to full account takeover

2025-05-16 07:40:34
Google released emergency security updates to fix a Chrome vulnerability that could lead to full account takeover. Google released emergency security updates to address a Chrome browser vulnerability,...

Lire la suite »

Les risques cachés de l'IA : les entreprises sur la corde raide

2025-05-16 07:30:40
L'IA s'impose dans les entreprises, mais son usage échappe parfois aux contrôles les plus élémentaires, laissant les responsables de la sécurité dans une course effrénée contre une technologie...

Lire la suite »

Guet-apens, violence et escroqueries : l'envers glaçant du site Coco.gg

2025-05-16 07:18:33
Une série de guet-apens mortels et d'escroqueries sophistiquées secoue la justice à Grenoble : douze jeunes, au profil étonnamment "normal", risquent aujourd'hui d'être jugés pour des faits...

Lire la suite »

Turkish APT Exploits Chat App Zero-Day to Spy on Iraqi Kurds

2025-05-16 06:30:00
Even after their zero-day turned into an n-day, attackers known as Marbled Dust or Sea Turtle continued to spy on military targets that had failed to patch Output Messenger.

Lire la suite »

The TechBeat: The Startup Playbook Is a Lie. Ask Better Questions. (5/16/2025)

2025-05-16 06:10:57
How are you, hacker? 🪐Want to know what's trending right now?: The Techbeat by HackerNoon has got you covered with fresh content from our trending stories of the day! Set email preference here. ...

Lire la suite »

Part-2️‍♂️Bug Bounty Secrets They Don't Tell You: Tricks From 100+ Reported Bugs

2025-05-16 05:05:52
✨Free Article LinkContinue reading on InfoSec Write-ups »

Lire la suite »

0 Bounty: Race Condition in Hacker101 CTF Group Join

2025-05-16 05:02:36
0 for discovering a timing flaw in Hacker101’s invite system that let users join the same team multiple timesContinue reading on InfoSec Write-ups »

Lire la suite »

Secret to find bugs in five minutes. Juicy reality.

2025-05-16 05:02:02
Finding bugs in 5-minutes.I have seen many articles with the title of something like ‘This is how I found $$$$ bug in 5 minutes' or ‘Found RCE within 5 minutes'.If you read medium articles then...

Lire la suite »

Securing MCP Servers: Key Lessons from a Vulnerable Project

2025-05-16 05:01:16
Securing MCP Servers: Key Lessons from a Vulnerable ProjectThere is so much that goes into the big space of cybersecurity with its big brands Windows servers, Linux, web applications, and APIs. However,...

Lire la suite »

Microsoft Goes Passwordless: What You Need to Know

2025-05-16 05:01:04
Microsoft Goes Passwordless: What You Need to KnowPasswords are ubiquitous — from email and social media to banking and work accounts. But let's face it: passwords are annoying. They're difficult...

Lire la suite »

NoSQL Injection Detection — A hands-on Exploitation Walkthrough

2025-05-16 05:00:16
NoSQL Injection Detection — A hands-on Exploitation Walkthrough with Burp 🔍Unleashing logic flipping payloads in the neon-lit alleys of NoSQL One Injection at a Time.🧠 IntroductionNoSQL...

Lire la suite »

How hackers chat securely on the darkweb

2025-05-16 05:00:01
This is how hackers chat securely on the darknet 2024Continue reading on InfoSec Write-ups »

Lire la suite »

How a Simple Logic Flaw Led to a ,250 Bounty

2025-05-16 04:59:05
Claiming Unclaimed Restaurants on Zomato via OTP ManipulationContinue reading on InfoSec Write-ups »

Lire la suite »

From 0 to $$$: Finding Rate Limit Bypasses Like a Pro

2025-05-16 04:58:05
A beginner-friendly guide to finding rate limit bugs with real techniques, testing steps, and real-world impact.🙋‍♂️ Who Am I?Hi, I'm Anonymous — a part-time bug bounty hunter and full-time...

Lire la suite »

Top Tools That Helped Me Earn 0 in 30 Days

2025-05-16 04:57:24
How I used these tools & commands to find bugs fastContinue reading on InfoSec Write-ups »

Lire la suite »

Explicit Expansion and Bounds of Spectral Projector in ESPRIT Analysis

2025-05-16 02:30:04
This section details the explicit formulas for higher-order terms in the perturbation expansion of the spectral projector, along with their bounds

Lire la suite »

Vulnérabilité dans Python (16 mai 2025)

16/05/2025
Une vulnérabilité a été découverte dans Python. Elle permet à un attaquant de provoquer un déni de service.

Lire la suite »

Vulnérabilité dans Synacor Zimbra Collaboration (16 mai 2025)

16/05/2025
Une vulnérabilité a été découverte dans Synacor Zimbra Collaboration. Elle permet à un attaquant de provoquer un déni de service à distance.

Lire la suite »

Vulnérabilité dans Spring Framework (16 mai 2025)

16/05/2025
Une vulnérabilité a été découverte dans Spring Framework. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.

Lire la suite »

Multiples vulnérabilités dans Microsoft Edge (16 mai 2025)

16/05/2025
De multiples vulnérabilités ont été découvertes dans Microsoft Edge. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur. Microsoft indique que...

Lire la suite »

Vulnérabilité dans Microsoft Defender pour Endpoint (16 mai 2025)

16/05/2025
Une vulnérabilité a été découverte Microsoft Defender pour Endpoint. Elle permet à un attaquant de provoquer une élévation de privilèges.

Lire la suite »

Multiples vulnérabilités dans les produits Nextcloud (16 mai 2025)

16/05/2025
De multiples vulnérabilités ont été découvertes dans les produits Nextcloud. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité...

Lire la suite »

Multiples vulnérabilités dans le noyau Linux de Red Hat (16 mai 2025)

16/05/2025
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation...

Lire la suite »

Multiples vulnérabilités dans IBM QRadar SIEM (16 mai 2025)

16/05/2025
De multiples vulnérabilités ont été découvertes dans IBM QRadar SIEM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service...

Lire la suite »