Cette semaine, dans Coupe-circuit: open.substack.com/pub/coupecir...
Cette semaine, dans Coupe-circuit: open.substack.com/pub/coupecir...
Après des mois à tenter de protéger Vultr, @greatfire.org a révélé le rôle central de l’entreprise américaine dans la censure que le géant chinois Tencent essaie de lui imposer en demandant la suppression de son site FreeWeChat.
open.substack.com/pub/coupecir...
Après des mois à tenter de protéger Vultr, @greatfire.org a révélé le rôle central de l’entreprise américaine dans la censure que le géant chinois Tencent essaie de lui imposer en demandant la suppression de son site FreeWeChat.
open.substack.com/pub/coupecir...
We sat down with Rebecca Taylor from Sophos and @bushidotoken.net from @teamcymrus2.bsky.social to discuss 2025’s highs and lows in cyber and make educated guesses on what to look for in 2026.
feeds.soundcloud.com/users/soundc...
We sat down with Rebecca Taylor from Sophos and @bushidotoken.net from @teamcymrus2.bsky.social to discuss 2025’s highs and lows in cyber and make educated guesses on what to look for in 2026.
feeds.soundcloud.com/users/soundc...
Platforms affected include TikTok, YouTube, Facebook, Instagram and X.
La nouvelle édition de Courts-circuits: coupecircuit.substack.com/p/un-scrutin...
Platforms affected include TikTok, YouTube, Facebook, Instagram and X.
Almost one billion early-stage cyber-attacks have been prevented in the past year in the UK thanks to Share and Defend, a service run by @ncsc.gov.uk.
www.infosecurity-magazine.com/news/uk-cybe...
Almost one billion early-stage cyber-attacks have been prevented in the past year in the UK thanks to Share and Defend, a service run by @ncsc.gov.uk.
www.infosecurity-magazine.com/news/uk-cybe...
Speaking at the @financialtimes.com's Cyber Resilience Summit: Europe today, British Security Minister Dan Jarvis said the ban on ransomware payments will include "national security exemptions."
www.infosecurity-magazine.com/news/uk-rans...
Speaking at the @financialtimes.com's Cyber Resilience Summit: Europe today, British Security Minister Dan Jarvis said the ban on ransomware payments will include "national security exemptions."
www.infosecurity-magazine.com/news/uk-rans...
A critical vulnerability was found by the Austin Hackers Association in HexStrike AI MCP server.
takeonme.org/cves/cve-202...
A critical vulnerability was found by the Austin Hackers Association in HexStrike AI MCP server.
takeonme.org/cves/cve-202...
A critical vulnerability was discovered in Faction, a pentesting report generation framework developed by Faction Security.
🔧 This issue has been patched in version 1.7.1.
🔎 nvd.nist.gov/vuln/detail/...
A critical vulnerability was discovered in Faction, a pentesting report generation framework developed by Faction Security.
🔧 This issue has been patched in version 1.7.1.
🔎 nvd.nist.gov/vuln/detail/...
🇫🇷 The FFF detected unauthorized access to the software platform used by all licensed football clubs in France to manage administrative tasks, incl. registering their players with the federation.
📰 www.infosecurity-magazine.com/news/french-...
🇫🇷 The FFF detected unauthorized access to the software platform used by all licensed football clubs in France to manage administrative tasks, incl. registering their players with the federation.
📰 www.infosecurity-magazine.com/news/french-...
Shona Lester, Head of CSR Bill Team, just shared the bill's key provisions.
Here’s what’s coming:
☑️ Expanded Regulatory Scope
☑️ Enhanced Incident Reporting
☑️ Strengthened Regulatory Powers
📰 www.infosecurity-magazine.com/news/key-pro...
Shona Lester, Head of CSR Bill Team, just shared the bill's key provisions.
Here’s what’s coming:
☑️ Expanded Regulatory Scope
☑️ Enhanced Incident Reporting
☑️ Strengthened Regulatory Powers
📰 www.infosecurity-magazine.com/news/key-pro...
Des chercheurs de l’IIIT Delhi, en Inde, se sont demandé dans quelle mesure un gouvernement pourrait détecter du trafic VPN et ainsi (potentiellement) le bloquer.
On vous explique ce qu'ils ont trouvé ⬇️
coupecircuit.substack.com/p/vpn-voici-...
Des chercheurs de l’IIIT Delhi, en Inde, se sont demandé dans quelle mesure un gouvernement pourrait détecter du trafic VPN et ainsi (potentiellement) le bloquer.
On vous explique ce qu'ils ont trouvé ⬇️
coupecircuit.substack.com/p/vpn-voici-...
The third "season" of Operation Endgame resulted in:
🗄️ Over 1025 servers taken down or disrupted
🌐 20 domains seized
🚪 11 locations searched
👮 One arrest
📰 www.infosecurity-magazine.com/news/operati...
The third "season" of Operation Endgame resulted in:
🗄️ Over 1025 servers taken down or disrupted
🌐 20 domains seized
🚪 11 locations searched
👮 One arrest
📰 www.infosecurity-magazine.com/news/operati...
I sat down with Matthew Maynard, a cybersecurity pro by day and a cyber ghost-buster by night, who doesn’t just hunt vulnerabilities, but haunts the hackers themselves.
🎧 Listen here: feeds.soundcloud.com/users/soundc...
I sat down with Matthew Maynard, a cybersecurity pro by day and a cyber ghost-buster by night, who doesn’t just hunt vulnerabilities, but haunts the hackers themselves.
🎧 Listen here: feeds.soundcloud.com/users/soundc...
The latest cyberattack on airports is a serious incident that warrants thorough investigation. (1/5)
www.infosecurity-magazine.com/news/airport...
The latest cyberattack on airports is a serious incident that warrants thorough investigation. (1/5)
www.infosecurity-magazine.com/news/airport...
Microsoft, SentinelOne and Palo Alto Networks have decided not to take part in the 2025 edition of MITRE’s EDR test.
I spoke with MITRE CTO to understand what motivated these moves.
www.infosecurity-magazine.com/news/cyber-v...
Microsoft, SentinelOne and Palo Alto Networks have decided not to take part in the 2025 edition of MITRE’s EDR test.
I spoke with MITRE CTO to understand what motivated these moves.
www.infosecurity-magazine.com/news/cyber-v...
www.thetimes.com/world/irelan...
www.thetimes.com/world/irelan...
www.reuters.com/business/cyb...
www.reuters.com/business/cyb...
www.trendmicro.com/vinfo/us/sec...
www.trendmicro.com/vinfo/us/sec...
⌛As the expiration date for the Cybersecurity Information Sharing Act of 2015 looms in the US, I spoke to experts about the provisions the Act offers and the debates surrounding the renewal and the consequences of non-renewal.
⌛As the expiration date for the Cybersecurity Information Sharing Act of 2015 looms in the US, I spoke to experts about the provisions the Act offers and the debates surrounding the renewal and the consequences of non-renewal.
D’après 3 études, des dizaines d’applis VPN (Google Play Store/Apple App Store) sont liées entre elles… et certaines appartiennent à Qihoo 360, proche de l’armée chinoise.
🔗 Nouvelle édition de Coupe-Circuit : open.substack.com/pub/coupecir...
D’après 3 études, des dizaines d’applis VPN (Google Play Store/Apple App Store) sont liées entre elles… et certaines appartiennent à Qihoo 360, proche de l’armée chinoise.
🔗 Nouvelle édition de Coupe-Circuit : open.substack.com/pub/coupecir...
The Sangoma FreePBX Security Team has warned of a vulnerability being exploited in the wild.
FreePBX is an open-source graphical user interface (GUI) for managing Asterisk, the popular open-source Private Branch Exchange (PBX) and telephony platform.
The Sangoma FreePBX Security Team has warned of a vulnerability being exploited in the wild.
FreePBX is an open-source graphical user interface (GUI) for managing Asterisk, the popular open-source Private Branch Exchange (PBX) and telephony platform.
Citrix has released patches for three critical zero days in NetScaler ADC and Gateway, one of which was already being exploited by attackers.
According to Kevin Beaumont, exploit campaigns 🎯CVE-2025-7775 began before the patches were made available.
Citrix has released patches for three critical zero days in NetScaler ADC and Gateway, one of which was already being exploited by attackers.
According to Kevin Beaumont, exploit campaigns 🎯CVE-2025-7775 began before the patches were made available.
A critical vulnerability in SAP NetWeaver is now being widely exploited following the release of public exploit tooling.
🆕 The public availability of the full source code makes the exploit easy to use even for attackers with little technical expertise.
A critical vulnerability in SAP NetWeaver is now being widely exploited following the release of public exploit tooling.
🆕 The public availability of the full source code makes the exploit easy to use even for attackers with little technical expertise.
FreeVPN.One, a popular Google-featured browser VPN extension, recently turned malicious and is now spying on users’ every move online.
A good read from Koi Security on 𝑰𝒏𝒕𝒆𝒓𝒏𝒂𝒕𝒊𝒐𝒏𝒂𝒍 𝑽𝑷𝑵 𝑫𝒂𝒚
www.infosecurity-magazine.com/news/chrome-...
FreeVPN.One, a popular Google-featured browser VPN extension, recently turned malicious and is now spying on users’ every move online.
A good read from Koi Security on 𝑰𝒏𝒕𝒆𝒓𝒏𝒂𝒕𝒊𝒐𝒏𝒂𝒍 𝑽𝑷𝑵 𝑫𝒂𝒚
www.infosecurity-magazine.com/news/chrome-...