Cyberveille
curated by Decio
Nuage de tags
Mur d'images
Quotidien
Rechercher
Flux RSS
Flux RSS
Daily Feed
Weekly Feed
Monthly Feed
tags
search
Record DDoS pummels site with once-unimaginable 7.3Tbps of junk traffic
DOGE software engineer’s computer infected by info-stealing malware - Ars Technica
Signal clone used by Trump official stops operations after report it was hacked
Windows RDP lets you log in using revoked passwords. Microsoft is OK with that.
Researcher uncovers dozens of sketchy Chrome extensions with 4 million installs - Ars Technica
OpenAI helps spammers plaster 80,000 sites with messages that bypassed filters
Large enterprises scramble after supply-chain attack spills their secrets
Go Module Mirror served backdoor to devs for 3+ years - Ars Technica
Invisible text that AI chatbots understand and humans can’t? Yep, it’s a thing. - Ars Technica
Neo-Nazis head to encrypted SimpleX Chat app, bail on Telegram
CTV industry’s unprecedented “surveillance”
NIST proposes barring some of the most nonsensical password rules
Hacker plants false memories in ChatGPT to steal user data in perpetuity
Europe’s privacy watchdog probes Google over data used for AI training
YubiKeys are vulnerable to cloning attacks thanks to newly discovered side channel
Windows 0-day was exploited by North Korea to install advanced rootkit
Who are the two major hackers Russia just received in a prisoner swap?
Secure Boot is completely broken on 200+ models from 5 big device makers | Ars Technica
New Blast-RADIUS attack breaks 30-year-old protocol used in networks everywhere
3 million iOS and macOS apps were exposed to potent supply-chain attacks
Apple’s AI promise: “Your data is never stored or made accessible to Apple”
A root-server at the Internet’s core lost touch with its peers. We still don’t know why.
Hacker free-for-all fights for control of home and office routers everywhere
What we know about the xz Utils backdoor that almost infected the world
PyPI halted new users and projects while it fended off supply-chain attack
Thousands of servers hacked in ongoing attack targeting Ray AI framework
Unpatchable vulnerability in Apple chip leaks secret encryption keys
US prescription market hamstrung for 9 days (so far) by ransomware attack | Ars Technica
GitHub besieged by millions of malicious repositories in ongoing attack | Ars Technica
How your sensitive data can be sold after a data broker goes bankrupt
Air Canada must honor refund policy invented by airline’s chatbot
Microsoft network breached through password-spraying by Russian-state hackers
Researcher uncovers one of the biggest password dumps in recent history
Hackers can infect network-connected wrenches to install ransomware
Linux devices are under attack by a never-before-seen worm | Ars Technica
SSH protects the world’s most sensitive networks. It just got a lot weaker
Xfinity waited to patch critical Citrix Bleed 0-day. Now it’s paying the price
Ukrainian cellular and Internet still out, 1 day after suspected Russian cyberattack | Ars Technica
Windows 10 gets three more years of security updates, if you can afford them | Ars Technica
USB worm unleashed by Russian state hackers spreads worldwide
Thousands of routers and cameras vulnerable to new 0-day attacks by hostile botnet | Ars Technica
In a first, cryptographic keys protecting SSH connections stolen in new attack | Ars Technica
Intel fixes high-severity CPU bug that causes “very strange behavior”
Microsoft profiles new threat group with unusual but effective practices
Hackers can force iOS and macOS browsers to divulge passwords and much more
Vulnerable Arm GPU drivers under active exploitation. Patches may not be available | Ars Technica
Critical vulnerabilities in Exim threaten over 250k email servers worldwide | Ars Technica
How Google Authenticator made one company’s network breach much, much worse
With 0-days hitting Chrome, iOS, and dozens more this month, is no software safe? | Ars Technica
North Korea-backed hackers target security researchers with 0-day
WinRAR 0-day that uses poisoned JPG and TXT files under exploit since April | Ars Technica
Microsoft takes pains to obscure role in 0-days that caused email breach
WordPress plugin installed on 1 million+ sites logged plaintext passwords
Hackers exploit gaping Windows loophole to give their malware kernel access
Mass exploitation of critical MOVEit flaw is ransacking orgs big and small | Ars Technica
“Clickless” iOS exploits infect Kaspersky iPhones with never-before-seen malware | Ars Technica
Here’s how long it takes new BrutePrint attack to unlock 10 different smartphones
Inner workings revealed for “Predator,” the Android malware that exploited 5 0-days
Apple uses iOS and macOS Rapid Security Response feature for the first time
Android app from China executed 0-day exploit on millions of devices | Ars Technica
Darknet markets generate millions in revenue selling stolen personal data
LockBit ransomware suspect nabbed in Canada, faces charges in the US
How Vice Society got away with a global ransomware spree | Ars Technica
How 3 hours of inaction from Amazon cost cryptocurrency holders $235,000
Breach of software maker used to backdoor as many as 200,000 servers
Phishers who breached Twilio and targeted Cloudflare could easily get you, too
Discovery of new UEFI rootkit exposes an ugly truth: The attacks are invisible to us
Google Play hides app permissions in favor of developer-written descriptions
Ongoing phishing campaign can hack you even when you’re protected with MFA
A new vulnerability in Intel and AMD CPUs lets hackers steal encryption keys
Researchers devise iPhone malware that runs even when device is turned off
Zyxel silently patches command-injection vulnerability with 9.8 severity rating
Researcher uses 379-year-old algorithm to crack crypto keys found in the wild
Russia’s Sandworm hackers attempted a third blackout in Ukraine
Explaining Spring4Shell: The Internet security disaster that wasn’t
Lapsus$ and SolarWinds hackers both use the same old trick to bypass MFA
Behold, a password phishing site that can trick even savvy users
Sabotage: Code added to popular NPM package wiped files in Russia and Belarus | Ars Technica
New method that amplifies DDoSes by 4 billion-fold. What could go wrong?
Cybercriminals who breached Nvidia issue one of the most unusual demands ever
VMware Horizon servers are under active exploit by Iranian state hackers
Flood of malicious junk traffic makes Ukrainian websites unreachable | Ars Technica
Backdoor RAT for Windows, macOS, and Linux went undetected until now | Ars Technica