Toute l'actualité de la Cybersécurité
Impact of AI on cyber threat from now to 2027
2025-05-16 20:03:59
An NCSC assessment highlighting the impacts on cyber threat from AI developments between now and 2027.
Australian Human Rights Commission Leaks Docs in Data Breach
2025-05-16 19:50:48
An internal error led to public disclosure of reams of sensitive data that could be co-opted for follow-on cyberattacks.
Dynamic DNS Emerges as Go-to Cyberattack Facilitator
2025-05-16 19:37:56
Scattered Spider and other phishers and hacking groups are using rentable subdomains from dynamic DNS providers to obfuscate their activity and impersonate well-known brands.
Pwn2Own Berlin 2025: Windows 11, VMware, Firefox and Others Hacked
2025-05-16 19:21:38
The beginning of Pwn2Own Berlin 2025, hosted at the OffensiveCon conference, has concluded its first two days with…
Attacker Specialization Puts Threat Modeling on Defensive
2025-05-16 19:01:38
Specialization among threat groups poses challenges for defenders, who now must distinguish between different actors responsible for different facets of an attack.
New botnet HTTPBot targets gaming and tech industries with surgical attacks
2025-05-16 18:54:26
New botnet HTTPBot is targeting China’s gaming, tech, and education sectors, cybersecurity researchers warn. NSFOCUS cybersecurity discovered a new botnet called HTTPBot that has been used to...
Microsoft confirms May Windows 10 updates trigger BitLocker recovery
2025-05-16 18:36:04
Microsoft has confirmed that some Windows 10 and Windows 10 Enterprise LTSC 2021 systems will boot into BitLocker recovery after installing the May 2025 security updates. [...]
Hands-on Malware Analysis Training to Boost Up SOC & MSSP Teams
2025-05-16 17:35:36
Security Operations Centers (SOCs) and Managed Security Service Providers (MSSPs) operate at the forefront of cybersecurity, tasked with defending organizations against increasingly sophisticated threats....
Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack
2025-05-16 17:12:31
A serious security flaw affecting the Eventin plugin, a popular event management solution for WordPress, was recently discovered by Denver Jackson, a member of the Patchstack Alliance community. This...
USN-7514-1: Linux kernel (NVIDIA) vulnerabilities
2025-05-16 17:05:40
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- RISC-V architecture;
...
Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication
2025-05-16 17:05:38
A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign embedded within the seemingly innocuous package os-info-checker-es6. First published on March 19, 2025,...
USN-7517-1: Linux kernel (Xilinx ZynqMP) vulnerabilities
2025-05-16 17:02:35
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
...
macOS Gatekeeper Explained – Strengthening System Defenses
2025-05-16 17:00:00
Apple's macOS Gatekeeper, a cornerstone of the operating system's defense against malicious software, has undergone significant macOS Sequoia (15.0) updates to address emerging security challenges....
New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads
2025-05-16 16:59:01
A newly identified ransomware campaign has emerged, seemingly targeting supporters of Elon Musk through a highly sophisticated phishing-based attack. Cybersecurity researchers have uncovered a multi-stage...
USN-7516-2: Linux kernel (GCP FIPS) vulnerabilities
2025-05-16 16:58:20
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
...
USN-7516-1: Linux kernel vulnerabilities
2025-05-16 16:52:04
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
...
Printer Company Distributes Malicious Drivers Infected with XRed Malware
2025-05-16 16:47:12
Procolored, a printer manufacturing company, has been found distributing software drivers infected with malicious code, including the notorious XRed backdoor malware. The issue came to light when Cameron...
USN-7515-1: Linux kernel (GKE) vulnerabilities
2025-05-16 16:43:48
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- RISC-V architecture;
...
Metasploit Wrap-Up 05/16/2025
2025-05-16 16:38:30
This week's release includes 5 new modules including RCEs for Car Rental System, & three Wordpress plugins. The execute-assembly post module was also updated with 32-bit support.
Chinese Agent Impersonate as Stanford Student For Intelligence Gathering
2025-05-16 16:34:54
Chinese intelligence operative posing as a Stanford University student has been uncovered following an investigation into suspicious approaches made to students conducting China-related research. The...
Ivanti EPMM Hit by Two Actively Exploited 0day Vulnerabilities
2025-05-16 16:32:54
Ivanti EPMM users urgently need to patch against actively exploited 0day vulnerabilities (CVE-2025-4427, CVE-2025-4428) that enable pre-authenticated remote…
Arista en passe d'acquérir VeloCloud
2025-05-16 16:32:53
L’actualité de VMware ne tourne pas simplement autour des licences. Son portefeuille de solutions est au centre de négociations d’acquisition. (...)
USN-7513-2: Linux kernel (Real-time) vulnerabilities
2025-05-16 16:30:47
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- RISC-V architecture;
...
Israel arrests new suspect behind Nomad Bridge 0M crypto hack
2025-05-16 16:25:50
An American-Israeli national named Osei Morrell has been arrested in Israel for his alleged involvement in exploiting the Nomad bridge smart-contract in August 2022 that allowed hackers to siphon 0...
USN-7513-1: Linux kernel vulnerabilities
2025-05-16 16:23:28
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- RISC-V architecture;
...
USN-7512-1: Linux kernel (GCP) vulnerabilities
2025-05-16 16:11:22
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
...
USN-7511-2: Linux kernel (GCP FIPS) vulnerabilities
2025-05-16 16:04:50
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
...
Piratage d'un géant hôtelier turc : les données de millions de clients en vente ?
2025-05-16 16:02:00
À l'approche des vacances, les cybercriminels redoublent d'activité. ZATAZ révèle qu'une base de données massive issue d'un grand groupe hôtelier turc est proposée à la vente sur le dark...
USN-7511-1: Linux kernel (GCP) vulnerabilities
2025-05-16 15:59:08
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
...
ChatGPT rolls out Codex, an AI tool for software programming
2025-05-16 15:49:22
OpenAI is rolling out 'Codex' for ChatGPT, which is an AI agent that automates and delegates programming tasks for software engineers. [...]
Pro-Ukraine Group Targets Russian Developers with Python Backdoor
2025-05-16 15:48:01
ReversingLabs discovers dbgpkg, a fake Python debugger that secretly backdoors systems to steal data. Researchers suspect a pro-Ukraine…
SSH Auth Keys Reuse Exposes Sophisticated Targeted Phishing Attack
2025-05-16 15:31:06
A coordinated phishing campaign targeting Kuwait’s critical sectors has been exposed through a distinctive operational security lapse: the consistent reuse of SSH authentication keys across multiple...
Révolte des machines ? Un robot Unitree attaque un ingénieur en Chine
2025-05-16 15:29:22
"Hasta la vista, baby"... Ou pas. L'incident rappelle les pires scénarios de science-fiction. Et si Terminator n'était plus seulement un film, mais une prophétie en avance sur son temps ?...
Hackers exploit VMware ESXi, Microsoft SharePoint zero-days at Pwn2Own
2025-05-16 15:23:22
During the second day of Pwn2Own Berlin 2025, competitors earned 5,000 after exploiting zero-day bugs in multiple products, including Microsoft SharePoint, VMware ESXi, Oracle VirtualBox, Red Hat Enterprise...
En rachetant Hornetsecurity, Proofpoint s'empare de son ennemi Vade
2025-05-16 15:18:40
Le rachat de Hornetsecurity par Proofpoint doit avoir un goût un peu amer pour les équipes de l’éditeur français Vade (...)
L'amour en ligne transformé en piège : le fléau grandissant du pig butchering
2025-05-16 15:08:31
Une arnaque redoutable mêlant sentiments et fraude financière, appelée "pig butchering", se propage à grande vitesse sur les applications de rencontre, exploitant solitude, IA et crypto pour dépouiller...
Linux Kernel Patching and Preventing Exploits in 2025
2025-05-16 15:00:00
As the Linux kernel continues to power everything from cloud infrastructure to embedded devices, its security remains critical. In 2025, patching strategies face unprecedented challenges: a 3,529%...
Printer maker Procolored offered malware-laced drivers for months
2025-05-16 14:56:51
For at least half a year, the official software supplied with Procolored printers included malware in the form of a remote access trojan and a cryptocurrency stealer. [...]
Trafic numérique : des boîtes SIM au cœur d'une guerre de l'ombre entre la Russie et l'Ukraine
2025-05-16 14:53:41
Un réseau de cybercriminels utilisant des dispositifs de masse pour diffuser des messages frauduleux a été démantelé en Russie, révélant l'ampleur d'un marché parallèle où les cartes SIM...
Une base de données d'un géant du sport français mise en vente pour 600 dollars
2025-05-16 14:42:31
Un pirate propose l'accès administrateur au site d'une entreprise française de vêtements de sport. Prix affiché : 600 dollars. Le nom de la marque reste confidentiel....
Identités à vendre : plongée dans le marché noir des faux dossiers RH
2025-05-16 14:27:39
Un pirate a récemment mis en vente un pack complet de documents d'identité sur le dark web. Une annonce explicite repérée par le site Zataz qui dévoile une réalité inquiétante : la marchandisation...
New Vulnerability Affects All Intel Processors From The Last 6 Years
2025-05-16 14:16:43
A newly discovered class of vulnerabilities in Intel processors, termed Branch Predictor Race Conditions (BPRC), allows attackers to systematically extract sensitive data from the cache and random-access...
Chinese Agent Impersonates as Stanford Student For Intelligence Gathering
2025-05-16 14:08:29
A recent investigation has uncovered a concerning case of espionage at one of America’s premier academic institutions, where a Chinese intelligence agent posed as a Stanford University student to...
Ransomware gangs increasingly use Skitnet post-exploitation malware
2025-05-16 14:00:00
Ransomware gang members increasingly use a new malware called Skitnet ("Bossnet") to perform stealthy post-exploitation activities on breached networks. [...]
How to Develop and Communicate Metrics for CSIRPs
2025-05-16 14:00:00
A well-documented cybersecurity incident response program (CSIRP) provides the transparency needed for informed decision-making, protecting the organization in a constantly changing threat environment....
Malware Mastermind Andrei Tarasov Evades US Extradition Returns to Russia
2025-05-16 13:49:59
In a significant setback for US cybercrime enforcement efforts, Russian hacker Andrei Tarasov has evaded extradition to the United States and successfully returned to his homeland, intelligence sources...
FBI Warns of US Govt Officials Impersonated in Malicious Message Campaign
2025-05-16 13:38:16
The Federal Bureau of Investigation (FBI) issued an urgent warning Thursday about an ongoing malicious campaign where cybercriminals are impersonating senior US officials through text messages and AI-generated...
Windows 10 KB5058379 Update Causes PCs to Enter Recovery Mode and Prompt for BitLocker Key
2025-05-16 13:35:20
Security update KB5058379 for Windows 10, released in May 2025, is causing significant technical issues for numerous systems. Users report their devices are unexpectedly booting into Windows Recovery...
Multiple Ivanti Endpoint Mobile Manager Vulnerabilities Allows Remote Code Execution
2025-05-16 13:31:24
Critical security flaws have been uncovered in Ivanti Endpoint Manager Mobile (EPMM), a widely used mobile device management (MDM) solution, exposing organizations to the risk of unauthenticated remote...
Cybercriminal Andrei Tarasov Escapes US Extradition, Returns to Russia
2025-05-16 13:01:34
Andrei Vladimirovich Tarasov, a 33-year-old Russian cybercrime figure known online as “Aels,” has returned to Russia after evading US extradition. Released from Berlin’s Moabit Prison...
Windows Security Updates – How to Stay Ahead of Vulnerabilities
2025-05-16 13:00:00
In April 2025, cybersecurity teams were starkly reminded of the stakes involved in patch management when Microsoft disclosed CVE-2025-29824, a zero-day privilege escalation flaw in the Windows Common...
Oniux: Secure Tor Routing for Linux Applications
2025-05-16 12:59:28
When privacy stakes are high, tools that strengthen security and anonymity become essential. This is precisely where Oniux '' a new command-line utility from the Tor Project '' enters the equation. Built...
Red Hat Linux Hacked at Pwn2Own Berlin
2025-05-16 12:53:26
Red Hat Enterprise Linux got hacked during the Pwn2Own Berlin 2025 competition . Let that sink in for a moment. This is one of the go-to systems for businesses that demand stability and security, yet...
openSUSE Leap 15.6 Update: SUSE-SU-2025:1565-1 Moderate Security Fix
2025-05-16 12:30:11
Investing: Where To Look For The Next Cybersecurity Unicorn
2025-05-16 12:24:19
This week in cybersecurity from the editors at Cybercrime Magazine –Read the full story in Forbes Sausalito, Calif. – May 16, 2025 Google recently invested billion in Wiz, a Cloud Security Platform....
Data broker protection rule quietly withdrawn by CFPB
2025-05-16 11:53:04
The CFPB has decided to withdraw a 2024 rule that was aimed at limiting the sale of Americans' personal information by data brokers.
Meta sent cease and desist letter over AI training
2025-05-16 11:30:26
A privacy advocacy group has clapped back at Meta over its plans to start training its AI model on European users' data.
FBI Alerts Public to Malicious Campaign Impersonating US Government Officials
2025-05-16 11:25:53
Federal Bureau of Investigation has issued a warning about an ongoing malicious messaging campaign targeting current and former senior US government officials and their contacts. Since April 2025, threat...
Avec l'IA, Cato Networks optimise les politiques de sécurité du SASE
2025-05-16 11:23:54
Le déploiement des stratégie SASE (secure access service edge) peut être complexe. Cato Networks a dévoilé récemment (...)
Frigidstealer Malware Targets macOS Users to Harvest Login Credentials
2025-05-16 11:17:04
An macOS users, a new information-stealing malware dubbed FrigidStealer has emerged as a formidable threat since January 2025. This insidious malware capitalizes on user trust by masquerading as routine...
APT Group 123 Targets Windows Systems in Ongoing Malicious Payload Campaign
2025-05-16 11:09:07
Group123, a North Korean state-sponsored Advanced Persistent Threat (APT) group also known by aliases such as APT37, Reaper, and ScarCruft, continues to target Windows-based systems across multiple regions....
Ivanti Endpoint Manager Mobile exploit chain exploited in the wild
2025-05-16 11:00:20
On May 13, 2025, Ivanti disclosed an exploited in the wild exploit chain, comprising of two new vulnerabilities affecting Ivanti Endpoint Manager Mobile: CVE-2025-4427 and CVE-2025-4428.
Hackers Now Targeting US Retailers After UK Attacks, Google
2025-05-16 10:37:12
Hackers from the Scattered Spider group, known for UK retail attacks, are now targeting US retailers, Google cybersecurity…
Salt Security Partners With Wiz, Combines Cloud and API Security
2025-05-16 10:06:58
API security orgnanisation Salt Security has announced its expanded partnership and new integration with Wiz, the leader in cloud security. The integration between Salt Security and Wiz enables organisations...
Meta plans to train AI on EU user data from May 27 without consent
2025-05-16 10:06:54
Meta plans to train AI on EU user data from May 27 without consent; privacy group noyb threatens lawsuit over lack of explicit opt-in. Meta plans to use EU user data for AI training starting May 27 without...
Android 16 : Google ajoute une nouvelle option pour protéger son smartphone contre le piratage
2025-05-16 09:43:39
Google vient d'annoncer une nouvelle option pour sécuriser son smartphone qui active certaines protections existantes et en ajoute de nouvelles. Conçue pour simplifier la sécurité du mobile, cette...
US charges 12 more suspects linked to 0 million crypto theft
2025-05-16 09:06:41
Twelve more suspects were charged in a RICO conspiracy for their alleged involvement in the theft of over 0 million in cryptocurrency and laundering the funds using crypto exchanges and mixing services....
7 manières d'optimiser le chiffrement des données
2025-05-16 09:02:30
Le concept de cryptographie existe depuis des millénaires. Mais il est devenu indispensable à la protection des données dans les SI (...)
AI in the Cloud: The Rising Tide of Security and Privacy Risks
2025-05-16 08:18:49
Over half of firms adopted AI in 2024, but cloud tools like Azure OpenAI raise growing concerns over data security and privacy risks. As enterprises embrace artificial intelligence (AI) to streamline...
Threat Group Assessment: Muddled Libra (Updated May 16, 2025)
2025-05-16 08:16:37
Muddled Libra continues to evolve. From social engineering to adaptation of new technologies, significant time is spent breaking down organizational defenses.
The post Threat Group Assessment: Muddled...
CISA tags recently patched Chrome bug as actively exploited
2025-05-16 08:13:19
On Thursday, CISA warned U.S. federal agencies to secure their systems against ongoing attacks exploiting a high-severity vulnerability in the Chrome web browser. [...]
Google fixed a Chrome vulnerability that could lead to full account takeover
2025-05-16 07:40:34
Google released emergency security updates to fix a Chrome vulnerability that could lead to full account takeover. Google released emergency security updates to address a Chrome browser vulnerability,...
Les risques cachés de l'IA : les entreprises sur la corde raide
2025-05-16 07:30:40
L'IA s'impose dans les entreprises, mais son usage échappe parfois aux contrôles les plus élémentaires, laissant les responsables de la sécurité dans une course effrénée contre une technologie...
Guet-apens, violence et escroqueries : l'envers glaçant du site Coco.gg
2025-05-16 07:18:33
Une série de guet-apens mortels et d'escroqueries sophistiquées secoue la justice à Grenoble : douze jeunes, au profil étonnamment "normal", risquent aujourd'hui d'être jugés pour des faits...
Turkish APT Exploits Chat App Zero-Day to Spy on Iraqi Kurds
2025-05-16 06:30:00
Even after their zero-day turned into an n-day, attackers known as Marbled Dust or Sea Turtle continued to spy on military targets that had failed to patch Output Messenger.
The TechBeat: The Startup Playbook Is a Lie. Ask Better Questions. (5/16/2025)
2025-05-16 06:10:57
How are you, hacker?
🪐Want to know what's trending right now?:
The Techbeat by HackerNoon has got you covered with fresh content from our trending stories of the day! Set email preference here.
...
Part-2️♂️Bug Bounty Secrets They Don't Tell You: Tricks From 100+ Reported Bugs
2025-05-16 05:05:52
✨Free Article LinkContinue reading on InfoSec Write-ups »
0 Bounty: Race Condition in Hacker101 CTF Group Join
2025-05-16 05:02:36
0 for discovering a timing flaw in Hacker101’s invite system that let users join the same team multiple timesContinue reading on InfoSec Write-ups »
Secret to find bugs in five minutes. Juicy reality.
2025-05-16 05:02:02
Finding bugs in 5-minutes.I have seen many articles with the title of something like ‘This is how I found $$$$ bug in 5 minutes' or ‘Found RCE within 5 minutes'.If you read medium articles then...
Securing MCP Servers: Key Lessons from a Vulnerable Project
2025-05-16 05:01:16
Securing MCP Servers: Key Lessons from a Vulnerable ProjectThere is so much that goes into the big space of cybersecurity with its big brands Windows servers, Linux, web applications, and APIs. However,...
Microsoft Goes Passwordless: What You Need to Know
2025-05-16 05:01:04
Microsoft Goes Passwordless: What You Need to KnowPasswords are ubiquitous — from email and social media to banking and work accounts. But let's face it: passwords are annoying. They're difficult...
NoSQL Injection Detection — A hands-on Exploitation Walkthrough
2025-05-16 05:00:16
NoSQL Injection Detection — A hands-on Exploitation Walkthrough with Burp 🔍Unleashing logic flipping payloads in the neon-lit alleys of NoSQL One Injection at a Time.🧠 IntroductionNoSQL...
How hackers chat securely on the darkweb
2025-05-16 05:00:01
This is how hackers chat securely on the darknet 2024Continue reading on InfoSec Write-ups »
How a Simple Logic Flaw Led to a ,250 Bounty
2025-05-16 04:59:05
Claiming Unclaimed Restaurants on Zomato via OTP ManipulationContinue reading on InfoSec Write-ups »
From 0 to $$$: Finding Rate Limit Bypasses Like a Pro
2025-05-16 04:58:05
A beginner-friendly guide to finding rate limit bugs with real techniques, testing steps, and real-world impact.🙋♂️ Who Am I?Hi, I'm Anonymous — a part-time bug bounty hunter and full-time...
Top Tools That Helped Me Earn 0 in 30 Days
2025-05-16 04:57:24
How I used these tools & commands to find bugs fastContinue reading on InfoSec Write-ups »
Explicit Expansion and Bounds of Spectral Projector in ESPRIT Analysis
2025-05-16 02:30:04
This section details the explicit formulas for higher-order terms in the perturbation expansion of the spectral projector, along with their bounds
Vulnérabilité dans Python (16 mai 2025)
16/05/2025
Une vulnérabilité a été découverte dans Python. Elle permet à un attaquant de provoquer un déni de service.
Vulnérabilité dans Synacor Zimbra Collaboration (16 mai 2025)
16/05/2025
Une vulnérabilité a été découverte dans Synacor Zimbra Collaboration. Elle permet à un attaquant de provoquer un déni de service à distance.
Vulnérabilité dans Spring Framework (16 mai 2025)
16/05/2025
Une vulnérabilité a été découverte dans Spring Framework. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.
Multiples vulnérabilités dans Microsoft Edge (16 mai 2025)
16/05/2025
De multiples vulnérabilités ont été découvertes dans Microsoft Edge. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur. Microsoft indique que...
Vulnérabilité dans Microsoft Defender pour Endpoint (16 mai 2025)
16/05/2025
Une vulnérabilité a été découverte Microsoft Defender pour Endpoint. Elle permet à un attaquant de provoquer une élévation de privilèges.
Multiples vulnérabilités dans les produits Nextcloud (16 mai 2025)
16/05/2025
De multiples vulnérabilités ont été découvertes dans les produits Nextcloud. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité...
Multiples vulnérabilités dans le noyau Linux de Red Hat (16 mai 2025)
16/05/2025
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation...
Multiples vulnérabilités dans IBM QRadar SIEM (16 mai 2025)
16/05/2025
De multiples vulnérabilités ont été découvertes dans IBM QRadar SIEM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service...