AI Agents Need Data Integrity - Schneier on Security
Think of the Web as a digital territory with its own social contract. In 2014, Tim Berners-Lee called for a “Magna Carta for the Web” to restore the balance of power between individuals and institutions. This mirrors the original charter’s purpose: ensuring that those who occupy a territory have a meaningful stake in its governance. Web 3.0—the distributed, decentralized Web of tomorrow—is finally poised to change the Internet’s dynamic by returning ownership to data creators. This will change many things about what’s often described as the “CIA triad” of ...
Sentant le licenciement venir à plein nez, il glisse un malware sur le réseau de son employeur
Un ressortissant chinois vivant dans l'Ohio vient d'être condamné à 4 ans de prison par la justice américaine. Ce développeur de logiciels, un brin revanchard, est reconnu coupable d'avoir implémenté un logiciel malveillant avant d'avoir été licencié par son employeur. Nous sommes en 2007 et Davis Lu, développeur
Massive anti-cybercrime operation leads to over 1,200 arrests in Africa
Law enforcement authorities in Africa have arrested over 1,200 suspects as part of 'Operation Serengeti 2.0,' an INTERPOL-led international crackdown targeting cross-border cybercriminal gangs.
DaVita says ransomware gang stole data of nearly 2.7 million people
Kidney dialysis firm DaVita has confirmed that a ransomware gang that breached its network stole the personal and health information of nearly 2.7 million individuals.
Cette nouvelle appli Google va vite devenir indispensable
Le 20 août 2025 a décidément été une grosse journée pour Google. Alors que l'entreprise américaine dévoilait en grande pompe son nouveau smartphone Pixel 10, une nouvelle application est apparue en catimini sur Google Play : un gestionnaire de mots de passe. Un outil qui répond à un besoin essentiel pour les
Le Trump Phone est-il une arnaque ? Une nouvelle image sème le doute
Officiellement promu par la famille du président américain, le Trump T1 est un appareil mystérieux aux caractéristiques contradictoires. Les dernières images publiées en ligne montrent un Samsung Galaxy S25 Ultra avec une coque Spigen, ce qui n'a pas tardé à faire réagir l'accessoiriste. À quoi joue l'entourage de
Dev gets 4 years for creating kill switch on ex-employer's systems
A software developer has been sentenced to four years in prison for sabotaging his ex-employer's Windows network with custom malware and a kill switch that locked out employees when his account was disabled.
Apple discloses actively exploited zero-day affecting iOS, iPadOS and macOS | CyberScoop
The defect, which affects the company’s most popular devices, has been exploited in an “extremely sophisticated attack against specific targeted individuals,” Apple said.
Colt confirms customer data stolen as Warlock ransomware auctions files
UK-based telecommunications company Colt Technology Services confirms that customer documentation was stolen as Warlock ransomware gang auctions files.
Cherry pie, Douglas firs and the last trip of the summer
Amy (ahem, Special Agent Dale Cooper) shares lessons from their trip to the Olympic Peninsula and cybersecurity travel tips for your last-minute adventures.
CrowdStrike warns of uptick in Silk Typhoon attacks this summer | CyberScoop
The China-affiliated espionage group, which CrowdStrike tracks as Murky Panda, has been linked to more than a dozen incident response cases since late spring.
FTC warns tech companies not to weaken encryption, free speech practices for foreign governments | CyberScoop
Chair Ferguson cited the E.U.’s Digital Service Act and the U.K.’s Online Safety Act as statutes that incentivize U.S. tech companies “to censor speech, including speech outside of Europe.”
Think before you Click(Fix): Analyzing the ClickFix social engineering technique
The ClickFix social engineering technique has been growing in popularity, with campaigns targeting thousands of enterprise and end-user devices daily. This technique exploits users’ tendency to resolve technical issues by tricking them into running malicious commands. These commands, in turn, deliver payloads that ultimately lead to information theft and exfiltration.
Vieille de 7 ans, cette faille CISCO fait toujours les choux gras des renseignements russes
Dans un rapport publié le 20 août 2025, les chercheurs de Cisco Talos alertent sur l'exploitation active d'une vulnérabilité par un groupe de cyberespions affilié aux services de renseignements russes. Une campagne qui vise principalement des machines en fin de vie et dont les correctifs ont pourtant été publiés en
Europol confirms that Qilin ransomware reward is fake
Europol has confirmed that a Telegram channel impersonating the agency and offering a $50,000 reward for information on two Qilin ransomware administrators is fake. The impostor later admitted it was created to troll researchers and journalists.