Le pouvoir russe tente de piéger ses opposants en imitant la CIA sur le web
De faux sites imitent les groupes d'opposition russes, des plateformes ukrainiennes et même la CIA pour tromper les citoyens hostiles au Kremlin. D'après un rapport de l'entreprise Silent Push, publié le 27 mars 2025, un réseau de sites frauduleux imite les plateformes officielles de groupes d'opposition, de services
How Each Pillar of the 1st Amendment is Under Attack
In an address to Congress this month, President Trump claimed he had "brought free speech back to America." But barely two months into his second term, the president has waged an unprecedented attack on the First Amendment rights of journalists,…
Key Takeaways The threat actor gained initial access by a fake Zoom installer that used d3f@ckloader and IDAT loader to drop SectopRAT. After nine days of dwell time, the SectopRAT malware dropped …
Microsoft tests new Windows 11 tool to remotely fix boot crashes
Microsoft has begun testing a new Windows 11 tool called Quick Machine Recovery, which is designed to remotely deploy fixes for buggy drivers and configurations that prevent the operating system from starting.
Microsoft's killing script used to avoid Microsoft Account in Windows 11
Microsoft has removed the 'BypassNRO.cmd' script from Windows 11 preview builds, which allowed users to bypass the requirement to use a Microsoft Account when installing the operating system.
New Crocodilus malware steals Android users’ crypto wallet keys
A newly discovered Android malware dubbed Crocodilus tricks users into providing the seed phrase for the cryptocurrency wallet using a warning to back up the key to avoid losing access.
Fuite de données chez Intersport, agents IA dans Microsoft Security Copilot… Les 5 actus cyber de la semaine
L’Usine Digitale vous propose un récapitulatif des grandes actualités de la semaine en matière de cybersécurité. Au programme, une fuite...-Cybersécurité
Palo Alto, Calif., Mar 28, 2025, CyberNewswire -- From WannaCry to the MGM Resorts Hack, ransomware remains one of the most damaging cyberthreats to plague enterprises. Chainalysis estimates that corporations spend nearly $1 billion dollars on ransom each year, but the greater cost often comes from the reputational damage and operational disruption caused by the
Friday Squid Blogging: Squid Werewolf Hacking Group - Schneier on Security
In another rare squid/cybersecurity intersection, APT37 is also known as “Squid Werewolf.” As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
Autosur victime d'une fuite de données, 4 millions de clients concernés
Le spécialiste français du contrôle technique a subi un “incident de sécurité” entraînant un accès non autorisé à de nombreuses données...-Cybersécurité
OpenAI now pays researchers $100,000 for critical vulnerabilities
Artificial intelligence company OpenAI has announced a fivefold increase in the maximum bug bounty rewards for "exceptional and differentiated" critical security vulnerabilities from $20,000 to $100,000.
Phishing-as-a-service operation uses DNS-over-HTTPS for evasion
A newly discovered phishing-as-a-service (PhaaS) operation that researchers call Morphing Meerkat, has been using the DNS over HTTPS (DoH) protocol to evade detection.
« Il n'a jamais été question de donner la liberté d'expression aux bots », insiste la ministre de l'IA - Numerama
Le Premier ministre François Bayrou et la ministre responsable de l'IA et du numérique Clara Chappaz sont intervenus lors d'un forum organisé par Viginum, un service gouvernemental focalisé sur les manipulations de l'information sur Internet. Ce 28 mars était l'occasion pour le gouvernement de mettre en lumière