Nearly 24,000 IPs behind wave of Palo Alto Global Protect scans
A significant spike in scanning activity targeting Palo Alto Network GlobalProtect login portals has been observed, with researchers concerned it may be a prelude to an upcoming attack or flaw being exploited.
Google rolls out easy end-to-end encryption for Gmail business users
Google has started rolling out a new end-to-end encryption (E2EE) model for Gmail enterprise users, making it easier to send encrypted emails to any recipient.
ReliaQuest secures $500 Million in funding, boosting AI-driven cybersecurity operations | CyberScoop
U.S.-based cybersecurity firm ReliaQuest has secured a significant funding boost with a new investment round totaling over $500 million, elevating the company's valuation to $3.4 billion.
Apple backports zero-day patches to older iPhones and Macs
Apple has released security updates that backport fixes for actively exploited vulnerabilities that were exploited as zero-days to older versions of its operating systems.
Critical auth bypass bug in CrushFTP now exploited in attacks
Attackers are now targeting a critical authentication bypass vulnerability in the CrushFTP file transfer software using exploits based on publicly available proof-of-concept code.
Cell Phone OPSEC for Border Crossings - Schneier on Security
I have heard stories of more aggressive interrogation of electronic devices at US border crossings. I know a lot about securing computers, but very little about securing phones. Are there easy ways to delete data—files, photos, etc.—on phones so it can’t be recovered? Does resetting a phone to factory defaults erase data, or is it still recoverable? That is, does the reset erase the old encryption key, or just sever the password that access that key? When the phone is rebooted, are deleted files still available? We need answers for both iPhones and Android phones. And it’s not just the US; the world is going to become a more dangerous place to oppose state power...
Cybercriminals Expand Use of Lookalike Domains in Email Attacks
BlueVoyant found that the use of lookalike domains in email-based attacks is allowing actors to extend the types of individuals and organizations being targeted
La fintech Qonto a choisi l'offre de cloud commercialisée par S3NS, la co-entreprise entre Thales et Google. En attendant la qualification...-Cloud
[FIC 2025] "C'est faux de penser que la sécurité coûte cher", Guillaume Tissier, directeur général du FIC
Pour sa 17e édition, le Forum InCyber - qui s'ouvre ce mardi 1e avril à Lilles - est placé sous le signe de la confiance. Un thème qui...-Cybersécurité
[FIC 2025] ITrust, filiale d'Iliad spécialisée dans la cybersécurité, lance son XDR collaboratif
Le pure player de la cybersécurité ITrust, acquis par le groupe Iliad en 2023, annonce le lancement de "French XDR". Cette plateforme,...-Cybersécurité