« Payer ou consentir » : Meta bloque l’accès à Instagram et Facebook si vous ne faites pas ce choix
Sur Instagram ou Facebook, Meta force désormais ses utilisateurs à faire un choix clair : payer pour naviguer sans publicité ou bien accepter le traitement de vos données personnelles pour continuer à utiliser les réseaux sociaux gratuitement. Depuis quelques jours, vous avez peut-être eu la surprise de voir une
Poor Passwords Tattle on AI Hiring Bot Maker Paradox.ai
Security researchers recently revealed that the personal information of millions of people who applied for jobs at McDonald's was exposed after they guessed the password ("123456") for the fast food chain's account at Paradox.ai, a company that makes artificial intelligence…
News Alert: SquareX, Fortune 500 CISOs to debut bowser security guide at Black Hat USA 2025
Palo Alto, Calif., July 17, 2025, CyberNewswire — SquareX announced the official launch of The Browser Security Field Manual at Black Hat USA 2025. In addition to a comprehensive practical guide to the latest TTPs attackers are using to target employees in the browser, this comprehensive manual features industry perspectives from leading CISOs from multiple
Citrix Bleed 2 exploited weeks before PoCs as Citrix denied attacks
A critical Citrix NetScaler vulnerability, tracked as CVE-2025-5777 and dubbed "CitrixBleed 2," was actively exploited nearly two weeks before proof-of-concept (PoC) exploits were made public, despite Citrix stating that there was no evidence of attacks.
VMware fixes four ESXi zero-day bugs exploited at Pwn2Own Berlin
VMware fixed four vulnerabilities in VMware ESXi, Workstation, Fusion, and Tools that were exploited as zero-days during the Pwn2Own Berlin 2025 hacking contest in May 2025.
United Natural Foods loses up to $400M in sales after cyberattack | CyberScoop
The food distributor and wholesaler completely shut down its systems upon discovering the attack last month, yet core systems were restored and normal operating capacity returned within three weeks.
State Department cyber diplomacy firings and changes threaten U.S. defenses
Departures and restructuring will make it harder for the agency to pursue global policies that strengthen its own critical infrastructure, experts said.
Google sues to disrupt BadBox 2.0 botnet infecting 10 million devices
Google has filed a lawsuit against the anonymous operators of the Android BadBox 2.0 malware botnet, accusing them of running a global ad fraud scheme against the company's advertising platforms.
Recession, Risk and Retaliation: Mapping Global Economic Fault Lines - interos.ai
Author: Teddy DeWitt, PhD, Lead Computational Social Scientist Recession Fears Linger Amidst Consumer Pessimism and Tariff Uncertainty The U.S. economy ma
Russian vodka producer reports disruptions after ransomware attack
Novabev Group, the Russian maker of Beluga Vodka and other brands, had to stop shipments and temporarily close stores in its WineLab subsidiary after a ransomware attack.
Transparency on Microsoft Defender for Office 365 email security effectiveness
Read how Microsoft is transparently sharing performance data from Microsoft Defender for Office 365 and other ecosystem providers to help customers evaluate email security solutions.
[tl;dr sec] #288 - Prompt Injection in Malware, Preventative Security, Top Bug Bounty War Stories
Checkpoint finds malware containing prompt injection, why preventative security is hard, @Rhynorater talk sharing 11 of his most impactful and technically challenging vulnerabilities
Armenian, Ukrainian nationals among Ryuk ransomware actors facing US hacking charges
Armenian national Karen Serobovich Vardanyan, 33, was extradited from Ukraine last month and now faces up to five years in prison for his role in Ryuk, prosecutors said on Wednesday.
Chinese hackers breached National Guard to steal network configurations
The Chinese state-sponsored hacking group known as Salt Typhoon breached and remained undetected in a U.S. Army National Guard network for nine months in 2024, stealing network configuration files and administrator credentials that could be used to compromise other government networks.
Max severity Cisco ISE bug allows pre-auth command execution, patch now
A critical vulnerability (CVE-2025-20337) in Cisco's Identity Services Engine (ISE) could be exploited to let an unauthenticated attacker store malicious files, execute arbitrary code, or gain root privileges on vulnerable devices.
Airbus prépare l’A400M à devenir le « vaisseau mère » des drones de combat
L’Airbus A400M, connu depuis ses débuts comme une référence mondiale du transport militaire, s’apprête à endosser de nouveaux rôles. Parmi eux ? Celui de « vaisseau mère » pour les drones de combat. Initialement conçu pour l’emport de charges lourdes et le soutien logistique, l’A400M voit ses missions s’élargir au
Elite Russian university launches degree program on sanctions evasion
The Higher School of Economics (HSE), a leading Russian institution, said the two-year course will focus on international corporate compliance and business ethics, and will be taught in both Russian and English.