New Mirai botnet infect TBK DVR devices via command injection flaw
A new variant of the Mirai malware botnet is exploiting a command injection vulnerability in TBK DVR-4104 and DVR-4216 digital video recording devices to hijack them.
Comment les pirates brouillent les traces des cryptomonnaies qu’ils volent
Au programme, des techniques comme le « Peel Chain », des mixeurs ou encore des services d'échange opaques. Ce 4 mars, Ben Zhou, le P-DG de la plateforme d'échange Bybit, a une mauvaise nouvelle à annoncer sur le réseau social X. Un peu plus de dix jours après le spectaculaire piratage de l'échangeur, un hack
Voici les trois meilleurs VPN du moment en promotion
Avoir un VPN pour se rendre sur Internet s'est largement démocratisé, grâce notamment à des campagnes marketing intensives de la part des fournisseurs. Mais quels sont les meilleurs VPN du moment au meilleur rapport qualité-prix ? Les VPN sont de plus en plus utilisés pour surfer l'esprit tranquille sur vos appareils
Malicious npm packages posing as utilities delete project directories
Two malicious packages have been discovered in the npm JavaScript package index, which masquerades as useful utilities but, in reality, are destructive data wipers that delete entire application directories.
A significant supply chain attack hit NPM after 15 popular Gluestack packages with over 950,000 weekly downloads were compromised to include malicious code that acts as a remote access trojan (RAT).
MY TAKE: Are we ‘Super f**cked’ by agentic AI? — debate gets 10 million + views on YouTube
The day after my column dissecting Chris Sacca's viral outburst went live—his now-notorious claim that we are "super f**ked" by artificial intelligence—I stumbled onto another AI conversation that had already amassed over 10 million views: a roundtable debate hosted by Steven Bartlett on his widely watched YouTube show, Diary of a CEO. Related: Ordinary folks
Trump cyber executive order takes aim at prior orders, secure software, more | CyberScoop
President Donald Trump signed an executive order Friday that the White House says promotes developing secure software, adopting the latest encryption protocols, securing internet routing and rolling back parts of two executive orders.
Friday Squid Blogging: Squid Run in Southern New England - Schneier on Security
Southern New England is having the best squid run in years. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
Hearing on the Federal Government and AI - Schneier on Security
On Thursday I testified before the House Committee on Oversight and Government Reform at a hearing titled “The Federal Government in the Age of Artificial Intelligence.” The other speakers mostly talked about how cool AI was—and sometimes about how cool their own company was—but I was asked by the Democrats to specifically talk about DOGE and the risks of exfiltrating our data from government agencies and feeding it into AIs. My written testimony is here. Video of the hearing is here.
Arnaque mondiale au recrutement : les USA traquent de faux développeurs Nord-Coréens
Le Département de la Justice américain (DOJ) a déposé une plainte pour geler plus de 7,7 millions de dollars sous la forme de cryptomonnaies, NFT et autres actifs numériques. Une somme relativement modeste, mais qui cache un plus vaste réseau international de blanchiment d’argent orchestré par la Corée du Nord. Le
Microsoft shares script to restore inetpub folder you shouldn’t delete
Microsoft has released a PowerShell script to help restore an empty 'inetpub' folder created by the April 2025 Windows security updates if deleted. As Microsoft previously warned, this folder helps mitigate a high-severity Windows Process Activation privilege escalation vulnerability.
Avec son nouveau "Cyber Blueprint", l’UE muscle sa gestion des crises cyber
Face à l'accroissement des menaces cyber, l'Union européenne révise son "Cyber Blueprint". Adopté par le Conseil de l'UE, ce cadre stratégique...-Cybersécurité
Kettering Health confirms Interlock ransomware behind cyberattack
Healthcare giant Kettering Health, which manages 14 medical centers in Ohio, confirmed that the Interlock ransomware group breached its network and stole data in a May cyberattack.
Report on the Malicious Uses of AI - Schneier on Security
OpenAI just published its annual report on malicious uses of AI. By using AI as a force multiplier for our expert investigative teams, in the three months since our last report we’ve been able to detect, disrupt and expose abusive activity including social engineering, cyber espionage, deceptive employment schemes, covert influence operations and scams. These operations originated in many parts of the world, acted in many different ways, and focused on many different targets. A significant number appeared to originate in China: Four of the 10 cases in this report, spanning social engineering, covert influence operations and cyber threats, likely had a Chinese origin. But we’ve disrupted abuses from many other countries too: this report includes case studies of a likely task scam from Cambodia, comment spamming apparently from the Philippines, covert influence attempts potentially linked with Russia and Iran, and deceptive employment schemes...
La vérité derrière l’autopen de Joe Biden qui affole les pro-Trump
La récente enquête réclamée par Donald Trump sur l’utilisation de l’autopen par Joe Biden a relancé les débats autour de cette technologie ancienne, pourtant méconnue. Alors que les partisans de Trump y voient une preuve de « décadence cognitive », un rapide retour en arrière sur le fonctionnement et l'histoire de
Nigeria jails 9 Chinese nationals for being part of international cyberfraud syndicate
The group was arrested in December as part of a raid that included 599 Nigerians and 193 other foreign nationals, many of them Chinese, on suspicion of being involved in a range of online crimes.