Cryptomonnaies : la plateforme Bybit est victime du plus gros vol de l’histoire
La plateforme de cryptomonnaies Bybit a été victime d'un hack historique, conduisant à un vol de 1,46 milliard de dollars en Ethereum, attribué au Group Lazarus. Son PDG s'est voulu rassurant sur la solvabilité future. C'est un vendredi noir pour la plateforme de cryptomonnaies Bybit. Dans un communiqué publié sur X
Top House E&C Republicans query public for ideas on data privacy law | CyberScoop
A request for information from GOP leaders on the House Energy and Commerce Committee is Congress’ latest attempt to push comprehensive data privacy standards.
Google Chrome disables uBlock Origin for some in Manifest v3 rollout
Google continues its rollout of gradually disabling uBlock Origin and other Manifest V2-based extensions in the Chrome web browser as part of its efforts to push users to Manifest V3-based extensions.
Hackers drained $1.4 billion of cryptocurrency from Bybit exchange, CEO confirms
The cryptocurrency exchange Bybit was hacked for more than $1.4 billion worth of Ethereum on Friday in what cybersecurity experts are calling the largest-ever theft targeting a cryptocurrency platform.
Cisco Confirms Salt Typhoon Exploitation in Telecom Hits
In addition to using CVE-2018-0171 and other Cisco bugs to break into telecom networks, the China-sponsored APT is also using using stolen login credentials for initial access.
SpyLend Android malware downloaded 100,000 times from Google Play
An Android malware app called SpyLend has been downloaded over 100,000 times from Google Play, where it masqueraded as a financial tool but became a predatory loan app for those in India.
Cybersécurité : Le logiciel espion Pegasus de plus en plus utilisé contre les chefs d'entreprise
Le logiciel espion Pegasus était jusqu'à présent surtout utilisé pour cibler des personnalités politiques, militants et journalistes. La...-Cybersécurité
Zero Day sur Netflix : et si cette cyberattaque arrivait vraiment ? Un expert décrypte la série
Une cyberattaque spectaculaire plonge les États-Unis dans le chaos : c’est le point de départ de Zero Day, la nouvelle mini-série de Netflix avec Robert De Niro. Mais un tel scénario pourrait-il vraiment se produire ? Un expert en cybersécurité de la société Nomios nous répond. La cyberattaque du siècle débarque sur
Feds fine Warby Parker $1.5 million for failing to protect customer health data
The eyewear retailer Warby Parker was hit with a $1.5 million fine by the Department of Health and Human Services on Thursday following a credential stuffing attack in 2018 that compromised the personal information of nearly 200,000 people.
Hacker steals record $1.46 billion from Bybit ETH cold wallet
Cryptocurrency exchange Bybit revealed today that an unknown attacker stole over $1.46 billion worth of cryptocurrency from one of its ETH cold wallets.
Nations Open 'Data Embassies' to Protect Critical Info
Estonia and Monaco back up their citizens' information to a data center in Luxembourg, while Singapore looks to India as its safe haven for data. But geopolitical challenges remain.
Hacker steals over $1.46 billion of crypto from Bybit ETH cold wallet
Cryptocurrency exchange Bybit revealed today that an unknown attacker stole over $1.46 billion worth of cryptocurrency from one of its ETH cold wallets.
Implementing Cryptography in AI Systems - Schneier on Security
Interesting research: “How to Securely Implement Cryptography in Deep Neural Networks.” Abstract: The wide adoption of deep neural networks (DNNs) raises the question of how can we equip them with a desired cryptographic functionality (e.g, to decrypt an encrypted input, to verify that this input is authorized, or to hide a secure watermark in the output). The problem is that cryptographic primitives are typically designed to run on digital computers that use Boolean gates to map sequences of bits to sequences of bits, whereas DNNs are a special type of analog computer that uses linear mappings and ReLUs to map vectors of real numbers to vectors of real numbers. This discrepancy between the discrete and continuous computational models raises the question of what is the best way to implement standard cryptographic primitives as DNNs, and whether DNN implementations of secure cryptosystems remain secure in the new setting, in which an attacker can ask the DNN to process a message whose “bits” are arbitrary real numbers...
Choisir les offres SecNumCloud, un impératif pour protéger les données sensibles selon l'Anssi
Avis de tempête dans le secteur du cloud : ces environnements sont de plus en plus la cible d'attaquants cherchant à compromettre...-Club Data Protection