Cybersécurité

Retrouvez toutes les actualités de cette catégorie dans une vue dédiée.

Cybersécurité

Retour aux actualités
Can the Security Platform Finally Deliver for the Mid-Market?
CYBERSECURITY 09/03/2026 11:45

Can the Security Platform Finally Deliver for the Mid-Market?

Mid-market organizations are constantly striving to achieve security levels on a par with their enterprise peers. With heightened awareness of supply chain attacks, your customers and business partners are defining the s

Source: The Hacker News

EU court adviser says banks must immediately refund phishing victims
CYBERSECURITY 08/03/2026 15:25

EU court adviser says banks must immediately refund phishing victims

Athanasios Rantos, the Advocate General of the Court of Justice of the EU (CJEU), has issued a formal opinion suggesting that banks must immediately refund account holders affected by unauthorized transactions, even when

Source: BleepingComputer

Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data Theft
CYBERSECURITY 09/03/2026 10:28

Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data Theft

Two Google Chrome extensions have turned malicious after what appears to be a case of ownership transfer, offering attackers a way to push malware to downstream customers, inject arbitrary code, and harvest sensitive dat

Source: The Hacker News

Hackers abuse .arpa DNS and ipv6 to evade phishing defenses
CYBERSECURITY 08/03/2026 14:12

Hackers abuse .arpa DNS and ipv6 to evade phishing defenses

Threat actors are abusing the special-use ".arpa" domain and IPv6 reverse DNS in phishing campaigns that more easily evade domain reputation checks and email security gateways. [...]

Source: BleepingComputer

Web Server Exploits and Mimikatz Used in Attacks Targeting Asian Critical Infrastructure
CYBERSECURITY 09/03/2026 07:21

Web Server Exploits and Mimikatz Used in Attacks Targeting Asian Critical Infrastructure

High-value organizations located in South, Southeast, and East Asia have been targeted by a Chinese threat actor as part of a years-long campaign. The activity, which has targeted aviation, energy, government, law enforc

Source: The Hacker News

Termite ransomware breaches linked to ClickFix CastleRAT attacks
CYBERSECURITY 07/03/2026 16:14

Termite ransomware breaches linked to ClickFix CastleRAT attacks

Ransomware threat actors tracked as Velvet Tempest are using the ClickFix technique and legitimate Windows utilities to deploy the DonutLoader malware and the CastleRAT backdoor. [...]

Source: BleepingComputer

OpenAI Codex Security Scanned 1.2 Million Commits and Found 10,561 High-Severity Issues
CYBERSECURITY 07/03/2026 16:28

OpenAI Codex Security Scanned 1.2 Million Commits and Found 10,561 High-Severity Issues

OpenAI on Friday began rolling out Codex Security, an artificial intelligence (AI)-powered security agent that's designed to find, validate, and propose fixes for vulnerabilities. The feature is available in a research p

Source: The Hacker News

Microsoft: Hackers abusing AI at every stage of cyberattacks
CYBERSECURITY 07/03/2026 15:15

Microsoft: Hackers abusing AI at every stage of cyberattacks

Microsoft says threat actors are increasingly using artificial intelligence in their operations to accelerate attacks, scale malicious activity, and lower technical barriers across all aspects of a cyberattack. [...]

Source: BleepingComputer

Anthropic Finds 22 Firefox Vulnerabilities Using Claude Opus 4.6 AI Model
CYBERSECURITY 07/03/2026 11:21

Anthropic Finds 22 Firefox Vulnerabilities Using Claude Opus 4.6 AI Model

Anthropic on Friday said it discovered 22 new security vulnerabilities in the Firefox web browser as part of a security partnership with Mozilla. Of these, 14 have been classified as high, seven have been classified as m

Source: The Hacker News

Cognizant TriZetto breach exposes health data of 3.4 million patients
CYBERSECURITY 06/03/2026 19:50

Cognizant TriZetto breach exposes health data of 3.4 million patients

TriZetto Provider Solutions, a healthcare IT company that develops software and services used by health insurers and healthcare providers, has suffered a data breach that exposed the sensitive information of over 3.4 mil

Source: BleepingComputer

Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting India
CYBERSECURITY 06/03/2026 15:11

Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting India

The Pakistan-aligned threat actor known as Transparent Tribe has become the latest hacking group to embrace artificial intelligence (AI)-powered coding tools to strike targets with various implants. The activity is desig

Source: The Hacker News

CISA warns feds to patch iOS flaws exploited in crypto-theft attacks
CYBERSECURITY 06/03/2026 15:57

CISA warns feds to patch iOS flaws exploited in crypto-theft attacks

CISA ordered U.S. federal agencies to patch three iOS security flaws targeted in cyberespionage and crypto-theft attacks using the Coruna exploit kit. [...]

Source: BleepingComputer

Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT
CYBERSECURITY 06/03/2026 14:33

Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT

Cybersecurity researchers have disclosed details of a multi-stage malware campaign that uses batch scripts as a pathway to deliver various encrypted remote access trojan (RATs) payloads that correspond to XWorm, AsyncRAT

Source: The Hacker News

EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and Security
CYBERSECURITY 06/03/2026 15:00

EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and Security

EC-Council, creator of the world-renowned Certified Ethical Hacker (CEH) credential and a global leader in applied cybersecurity education, today launched its Enterprise AI Credential Suite, with four new role-based AI c

Source: BleepingComputer

The MSP Guide to Using AI-Powered Risk Management to Scale Cybersecurity
CYBERSECURITY 06/03/2026 10:30

The MSP Guide to Using AI-Powered Risk Management to Scale Cybersecurity

Scaling cybersecurity services as an MSP or MSSP requires technical expertise and a business model that delivers measurable value at scale. Risk-based cybersecurity is the foundation of that model. When done right, it bu

Source: The Hacker News

Fake Claude Code install guides push infostealers in InstallFix attacks
CYBERSECURITY 06/03/2026 15:00

Fake Claude Code install guides push infostealers in InstallFix attacks

Threat actors are employing a new variation of the ClickFix social engineering technique called InstallFix to convince users into running malicious commands under the pretext of installing legitimate command line interfa

Source: BleepingComputer

Iran-Linked MuddyWater Hackers Target U.S. Networks With New Dindoor Backdoor
CYBERSECURITY 06/03/2026 10:23

Iran-Linked MuddyWater Hackers Target U.S. Networks With New Dindoor Backdoor

New research from Broadcom's Symantec and Carbon Black Threat Hunter Team has discovered evidence of an Iranian hacking group embedding itself in several U.S. companies' networks, including banks, airports, non-profit, a

Source: The Hacker News

Microsoft 365 Backup to add file-level restore for faster recovery
CYBERSECURITY 06/03/2026 14:21

Microsoft 365 Backup to add file-level restore for faster recovery

Microsoft will soon begin rolling out a significant upgrade to Microsoft 365 Backup to speed up recovery by allowing administrators to restore individual files and folders. [...]

Source: BleepingComputer

China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom Attacks
CYBERSECURITY 06/03/2026 08:22

China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom Attacks

A China-linked advanced persistent threat (APT) actor has been targeting critical telecommunications infrastructure in South America since 2024, targeting Windows and Linux systems and edge devices with three different i

Source: The Hacker News

Ghanain man pleads guilty to role in $100 million fraud ring
CYBERSECURITY 06/03/2026 10:08

Ghanain man pleads guilty to role in $100 million fraud ring

A Ghanaian national pleaded guilty to his role in a massive fraud ring that stole over $100 million from victims across the United States through business email compromise attacks and romance scams. [...]

Source: BleepingComputer

Microsoft Reveals ClickFix Campaign Using Windows Terminal to Deploy Lumma Stealer
CYBERSECURITY 06/03/2026 06:44

Microsoft Reveals ClickFix Campaign Using Windows Terminal to Deploy Lumma Stealer

Microsoft on Thursday disclosed details of a new widespread ClickFix social engineering campaign that has leveraged the Windows Terminal app as a way to activate a sophisticated attack chain and deploy the Lumma Stealer

Source: The Hacker News

FBI investigates breach of surveillance and wiretap systems
CYBERSECURITY 06/03/2026 08:44

FBI investigates breach of surveillance and wiretap systems

The U.S. Federal Bureau of Investigation (FBI) confirmed on Thursday that it's investigating a breach that affected systems used to manage surveillance and wiretap warrants. [...]

Source: BleepingComputer

Hikvision and Rockwell Automation CVSS 9.8 Flaws Added to CISA KEV Catalog
CYBERSECURITY 06/03/2026 06:30

Hikvision and Rockwell Automation CVSS 9.8 Flaws Added to CISA KEV Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added two security flaws impacting Hikvision and Rockwell Automation products to its Known Exploited Vulnerabilities (KEV) catalog, citing evid

Source: The Hacker News

Chinese state hackers target telcos with new malware toolkit
CYBERSECURITY 05/03/2026 23:19

Chinese state hackers target telcos with new malware toolkit

A China-linked advanced persistent threat actor tracked as UAT-9244 has been targeting telecommunication service providers in South America since 2024, compromising Windows, Linux, and network-edge devices. [...]

Source: BleepingComputer