WhatsApp flaw can let attackers run malicious code on Windows PCs
Meta warned Windows users to update the WhatsApp messaging app to the latest version to patch a vulnerability that can let attackers execute malicious code on their devices.
New Mirai botnet behind surge in TVT DVR exploitation
A significant spike in exploitation attempts targeting TVT NVMS9000 DVRs has been detected, peaking on April 3, 2025, with over 2,500 unique IPs scanning for vulnerable devices.
Google AI taken for a ride by April Fools’ Day joke
Cwmbran in Wales holds the Guinness World Record for the most roundabouts—at least according to Google AI Overviews. Except that's not actually true...
Ce faux site pour le concert de Jul ose dire aux fans de se méfier des arnaques en ligne
Des plateformes de phishing tentent de piéger les fans après l'annonce d'une nouvelle date de concert du rapeur Jul. Ces sites, habilement conçus, imitent à la perfection les vrais portails de billetterie — au point d’alerter les internautes… des arnaques en cours. Les hackers ne ratent jamais un événement. À peine
Les entreprises européennes plébiscitent les solutions souveraines… mais ne les utilisent pas
46% des actifs européens se disent préoccupés par la dépendance aux solutions technologiques des entreprises américaines. Pourtant, ils ne sont...-Souveraineté
AWS rolls out ML-KEM to secure TLS from quantum threats
Amazon Web Services (AWS) has added support for the ML-KEM post-quantum key encapsulation mechanism to AWS Key Management Service (KMS), AWS Certificate Manager (ACM), and AWS Secrets Manager, making TLS connections more secure.
Canada says China-linked information campaign spreading false narratives about prime minister
A China-linked information campaign is using a network of WeChat accounts to attack Canadian Prime Minister Mark Carney ahead of the country’s upcoming federal election, authorities said.
Learn how app cloaking enhances security by hiding private applications from the internet, reducing attack surfaces, and preventing unauthorized access.
Cybersécurité : Qevlar AI lève 14 millions de dollars pour sa solution automatisée d'investigation
La start-up tricolore déploie plusieurs agents capables d'automatiser une partie du travail des analystes dans les centres d'opérations de...-Cybersécurité
Year in Review: Key vulnerabilities, tools, and shifts in attacker email tactics
From Talos' 2024 Year in Review, here are some findings from the top targeted network device vulnerabilities. We also explore how threat actors are moving away from time sensitive lures in their emails. And finally we reveal the tools that adversaries most heavily utilized last year.
Learn what third-party risk management (TPRM) entails, what staff augmentation is, and how to decide whether it’s the right solution for your TPRM needs.
At a Congressional hearing earlier this week, Matt Blaze made the point that CALEA, the 1994 law that forces telecoms to make phone calls wiretappable, is outdated in today’s threat environment and should be rethought: In other words, while the legally-mandated CALEA capability requirements have changed little over the last three decades, the infrastructure that must implement and protect it has changed radically. This has greatly expanded the “attack surface” that must be defended to prevent unauthorized wiretaps, especially at scale. The job of the illegal eavesdropper has gotten significantly easier, with many more options and opportunities for them to exploit. Compromising our telecommunications infrastructure is now little different from performing any other kind of computer intrusion or data breach, a well-known and endemic cybersecurity problem. To put it bluntly, something like Salt Typhoon was inevitable, and will likely happen again unless significant changes are made...
"Nous sommes le Rafale de la cybersécurité", Grégoire Germain, CEO d'HarfangLab
A l'occasion du Forum InCyber, L'Usine Digitale a eu l'occasion d'échanger avec Grégoire Germain, le CEO et co-fondateur d'HarfangLab, une...-Cybersécurité