Vue normale

Il y a de nouveaux articles disponibles, cliquez pour rafraîchir la page.
Aujourd’hui — 24 septembre 2025Securité

Two Critical Flaws Uncovered in Wondershare RepairIt Exposing User Data and AI Models

24 septembre 2025 à 15:55
Cybersecurity researchers have disclosed two security flaws in Wondershare RepairIt that exposed private user data and potentially exposed the system to artificial intelligence (AI) model tampering and supply chain risks. The critical-rated vulnerabilities in question, discovered by Trend Micro, are listed below - CVE-2025-10643 (CVSS score: 9.1) - An authentication bypass vulnerability that

Trois semaines plus tard, l’une des cyberattaques les plus ambitieuses de tous les temps revient, et se rate à nouveau

24 septembre 2025 à 15:57

Le 22 septembre, Cloudflare a annoncé avoir enregistré une nouvelle cyberattaque record. L’entreprise américaine experte dans la sécurité cloud indique avoir bloqué une attaque DDoS ayant atteint un pic de 22,2 térabits par seconde, soit près du double du précédent record établi trois semaines plus tôt.

Client Bouygues ? Vérifiez sur ce site si le piratage a fait fuiter votre IBAN et vos données

24 septembre 2025 à 15:38

Le site de référence Have I Been Pwned, qui sert à voir si ses données personnelles figurent dans une fuite, a été mis à jour pour inclure l'incident qui a touché Bouygues Telecom cet été. Des millions de clients de l'opérateur sont concernés.

How One Bad Password Ended a 158-Year-Old Business

24 septembre 2025 à 13:58
Most businesses don't make it past their fifth birthday - studies show that roughly 50% of small businesses fail within the first five years. So when KNP Logistics Group (formerly Knights of Old) celebrated more than a century and a half of operations, it had mastered the art of survival. For 158 years, KNP adapted and endured, building a transport business that operated 500 trucks

New YiBackdoor Malware Shares Major Code Overlaps with IcedID and Latrodectus

24 septembre 2025 à 13:28
Cybersecurity researchers have disclosed details of a new malware family dubbed YiBackdoor that has been found to share "significant" source code overlaps with IcedID and Latrodectus. "The exact connection to YiBackdoor is not yet clear, but it may be used in conjunction with Latrodectus and IcedID during attacks," Zscaler ThreatLabz said in a Tuesday report. "YiBackdoor is able to execute

iframe Security Exposed: The Blind Spot Fueling Payment Skimmer Attacks

24 septembre 2025 à 13:03
Think payment iframes are secure by design? Think again. Sophisticated attackers have quietly evolved malicious overlay techniques to exploit checkout pages and steal credit card data by bypassing the very security policies designed to stop them. Download the complete iframe security guide here.  TL;DR: iframe Security Exposed Payment iframes are being actively exploited by attackers using

L’Europe déploie son deuxième ordinateur quantique

24 septembre 2025 à 11:44

L’Union européenne a inauguré en République tchèque son deuxième ordinateur quantique. Baptisé VLQ, ce nouveau venu marque une étape clé dans la stratégie européenne, qui vise, à terme, la mise en place d'une constellation de six ordinateurs quantiques sur le continent.

Cryptographie post-quantique : 6 mauvaises excuses qui freinent encore la transition des entreprises (et comment les dépasser)

Par : UnderNews
24 septembre 2025 à 11:21

Longtemps considérée comme une question reléguée à un futur lointain, la cryptographie post-quantique (PQC) est aujourd’hui une réalité. La publication des premiers standards, l’entrée en vigueur du Cyber Resilience Act (CRA) et la progression rapide des cybermenaces obligent les entreprises à se mobiliser. Pourtant, selon l’étude Digital Trust Digest : The Quantum Readiness Edition*, près d’un […]

The post Cryptographie post-quantique : 6 mauvaises excuses qui freinent encore la transition des entreprises (et comment les dépasser) first appeared on UnderNews.

Hackers Exploit Pandoc CVE-2025-51591 to Target AWS IMDS and Steal EC2 IAM Credentials

24 septembre 2025 à 09:15
Cloud security company Wiz has revealed that it uncovered in-the-wild exploitation of a security flaw in a Linux utility called Pandoc as part of attacks designed to infiltrate Amazon Web Services (AWS) Instance Metadata Service (IMDS). The vulnerability in question is CVE-2025-51591 (CVSS score: 6.5), which refers to a case of Server-Side Request Forgery (SSRF) that allows attackers to

State-Sponsored Hackers Exploiting Libraesva Email Security Gateway Vulnerability

24 septembre 2025 à 08:24
Libraesva has released a security update to address a vulnerability in its Email Security Gateway (ESG) solution that it said has been exploited by state-sponsored threat actors. The vulnerability, tracked as CVE-2025-59689, carries a CVSS score of 6.1, indicating medium severity. "Libraesva ESG is affected by a command injection flaw that can be triggered by a malicious email containing a

Two New Supermicro BMC Bugs Allow Malicious Firmware to Evade Root of Trust Security

23 septembre 2025 à 20:00
Cybersecurity researchers have disclosed details of two security vulnerabilities impacting Supermicro Baseboard Management Controller (BMC) firmware that could potentially allow attackers to bypass crucial verification steps and update the system with a specially crafted image. The medium-severity vulnerabilities, both of which stem from improper verification of a cryptographic signature, are

Eurojust Arrests 5 in €100M Cryptocurrency Investment Fraud Spanning 23 Countries

23 septembre 2025 à 19:13
Law enforcement authorities in Europe have arrested five suspects in connection with an "elaborate" online investment fraud scheme that stole more than €100 million ($118 million) from over 100 victims in France, Germany, Italy, and Spain. According to Eurojust, the coordinated action saw searches in five places across Spain and Portugal, as well as in Italy, Romania and Bulgaria. Bank accounts

❌
❌