Safepay ransomware threatens to leak 3.5TB of Ingram Micro data
The SafePay ransomware gang is threatening to leak 3.5TB of data belonging to IT giant Ingram Micro, allegedly stolen from the company's compromised systems earlier this month.
Hackers actively exploit critical RCE in WordPress Alone theme
Threat actors are actively exploiting a critical unauthenticated arbitrary file upload vulnerability in the WordPress theme 'Alone,' to achieve remote code execution and perform a full site takeover.
Le gestionnaire de mots de passe de Dropbox : ce qu’il va se passer
Dropbox a pris la décision d'arrêter son aventure du gestionnaire de mots de passe, démarrée en 2020. L'outil sera progressivement coupé dans les mois à venir. Les internautes concernés doivent migrer sans tarder. C'était en 2020. En pleine période de pandémie de coronavirus, et de forte croissance dans le secteur du
Hackers plant 4G Raspberry Pi on bank network in failed ATM heist
The UNC2891 hacking group, also known as LightBasin, used a 4G-equipped Raspberry Pi hidden in a bank's network to bypass security defenses in a newly discovered attack.
Elle aide Pyongyang à générer 17 millions de dollars depuis son salon et écope de 8 ans de prison
Accusée d’avoir sciemment aidé des agents nord-coréens à se faire recruter par de grandes entreprises américaines, Christina Chapman a été condamnée à plus de 8 ans de prison le 24 juillet par un tribunal fédéral. Blanchiment d'argent et usurpation d'identité : retour sur l'épilogue d'un fait divers cyber et
Apple patches security flaw exploited in Chrome zero-day attacks
Apple has released security updates to address a high-severity vulnerability that has been exploited in zero-day attacks targeting Google Chrome users.
Cyberattack shuts down hundreds of Russian pharmacies, disrupts healthcare services
The Stolichki pharmacy chain, which operates about 1,000 stores across Russia confirmed that a technical failure that halted its operations on Tuesday was caused by a hack.
New Lenovo UEFI firmware updates fix Secure Boot bypass flaws
Lenovo is warning about high-severity BIOS flaws that could allow attackers to potentially bypass Secure Boot in all-in-one desktop PC models that use customized Insyde UEFI (Unified Extensible Firmware Interface).
Palo Alto Networks to acquire CyberArk for $25 billion | CyberScoop
Palo Alto Networks has agreed to acquire identity security firm CyberArk for approximately $25 billion, marking the cybersecurity giant's largest acquisition and its formal entry into the identity security market.
CISA’s Joint Cyber Defense Collaborative takes major personnel hit
JCDC’s troubles add to the woes of the already-depleted CISA, which could lose even more personnel as additional contracts with private companies expire.
NIST Consortium and Draft Guidelines Aim to Improve Security in Software Development
NIST is soliciting comments from the public on the draft until Sept. 12, and the agency is planning a virtual event to showcase the project and gather feedback on Aug. 27.
A Business Guide to Protecting PII on Social Media | CSA
Steer clear of the dangers of oversharing on social media. This blog offers examples of what can go wrong and easy-to-follow steps on how to do things right.
Decryptor released for FunkSec ransomware; Avast works with law enforcement to help victims
Cybersecurity company Avast released a decryptor for the short-lived FunkSec ransomware, and said it is assisting dozens of the gang's targets with the process.
AI Cuts vCISO Workload by 68% as Demand Skyrockets, New Report Finds
AI is reshaping vCISO services—and SMBs are fueling the surge. Cynomi's 2025 report shows 3x adoption growth and major workload drops as MSPs and MSSPs scale cybersecurity like never before. Learn more in the 2025 State of the vCISO Report.
Dropbox tue son gestionnaire de mots de passe, les internautes doivent migrer leurs codes
Dropbox a pris la décision d'arrêter son aventure du gestionnaire de mots de passe, démarrée en 2020. L'outil sera progressivement coupé dans les mois à venir. Les internautes concernés doivent migrer sans tarder. C'était en 2020. En pleine période de pandémie de coronavirus, et de forte croissance dans le secteur du
Cisco Talos at Black Hat 2025: Briefings, booth talks and what to expect
Cisco Talos is back at Black Hat with new research, threat detection overviews and opportunities to connect with our team. Whether you're interested in what we’re seeing in the threat landscape, detection engineering or real-world incident response, here's where and how to find us.
Third of Exploited Vulnerabilities Weaponized Within a Day of Disclosure
32.1% of vulnerabilities listed in VulnCheck’s Known Exploited Vulnerabilities catalog were weaponized before being detected or within the following day