20 ans de YouTube : ces hacks les plus mémorables qui ont visé le géant du streaming
Si on ne connaît pas de faille majeure en interne à la plateforme, les chaînes de ses vidéastes sont parfois un fruit mûr pour les hackers de tout poil. La plateforme de partage de vidéos YouTube fête ses 20 ans. Si l’on ignore précisément la date du premier piratage qui a visé le célèbre site à la flèche blanche sur
Microsoft: Hackers steal emails in device code phishing attacks
An active campaign from a threat actor potentially linked to Russia is targeting Microsoft 365 accounts of individuals at organizations of interest using device code phishing.
Des hackers du renseignement russe se cachent derrière ces invitations sur WhatsApp
Un groupe de hackers liés au Kremlin a lancé une campagne de phishing ciblant les utilisateurs de services de messagerie populaires comme WhatsApp, Signal et Microsoft Teams. En envoyant de fausses invitations à des réunions en ligne, ils parviennent à tromper leurs victimes et à voler leurs données sensibles. Les
Suspected Russian nation-state threat groups have duped multiple victims into granting potentially persistent access to networks via authentication requests and valid tokens.
Hackers exploit authentication bypass in Palo Alto Networks PAN-OS
Hackers are launching attacks against Palo Alto Networks PAN-OS firewalls by exploiting a recently fixed vulnerability (CVE-2025-0108) that allows bypassing authentication.
Police risk losing society’s trust in fight against cybercrime, warns Europol chief
Catherine De Bolle, the chief of Europol, said at the Munich Cyber Security Conference that societies must understand why law enforcement agencies need new powers to fight increasingly sophisticated cybercrime operations.
Pennsylvania utility says MOVEit breach at vendor exposed some customer data
A Pennsylvania utility company says that basic customer data stolen from one of its vendors in 2023 was recently exposed online, but the incident did not affect its core systems.
SonicWall firewall bug leveraged in attacks after PoC exploit release
Attackers are now targeting an authentication bypass vulnerability affecting SonicWall firewalls shortly after the release of proof-of-concept (PoC) exploit code.
SonicWall firewall bug targeted in attacks after PoC exploit release
Attackers are now targeting an authentication bypass vulnerability affecting SonicWall firewalls shortly after the release of proof-of-concept (PoC) exploit code.
Cisco Talos’ Vulnerability Discovery & Research team recently disclosed two vulnerabilities in ClearML and four vulnerabilities in Nvidia.
The vulnerabilities mentioned in this blog post have been patched by their respective vendors, all in adherence to Cisco’s third-party vulnerability disclosure policy.
For Snort coverage that can detect the exploitation of these vulnerabilities, download the latest rule sets from Snort.org, and our latest Vulnerability Advisories are always posted on Ta
Cybersécurité : Microsoft alerte sur un groupe de hackers russes qui cible des infrastructures critiques
L'équipe de recherche sur les cybermenaces de Microsoft a publié un rapport sur BadPilot, une entité du groupe de pirates russes “Sandworm”....-Cybersécurité
Upcoming Speaking Engagements - Schneier on Security
This is a current list of where and when I am scheduled to speak: I’m speaking at Boskone 62 in Boston, Massachusetts, USA, which runs from February 14-16, 2025. My talk is at 4:00 PM ET on the 15th. I’m speaking at the Rossfest Symposium in Cambridge, UK, on March 25, 2025. The list is maintained on this page.
Implementing CCM: Business Continuity Management Plan | CSA
Learn how to implement the Business Continuity Management and Operational Resilience domain of CCM. Safeguard critical business processes and services.
Le site de l’agence d’Elon Musk se fait déjà pirater par des hackers sarcastiques
Le site du DOGE, vitrine du projet controversé d’Elon Musk pour réformer le gouvernement fédéral, a été piraté. Cette attaque met en lumière des failles de sécurité et alimente les critiques sur la gestion de l’agence DOGE. Le site du DOGE, mis en place pour documenter les actions de l’équipe d’Elon Musk dans son