Philippe Vynckier
@pvynckier.bsky.social
Senior advisor, Security Expert, Cyber Threat Expert
Threat monitoring, security analysis, risk analysis, business continuity planning, disaster recovery planning, vulnerability management, threat assessment, malware, Ransomware and incident response...
Threat monitoring, security analysis, risk analysis, business continuity planning, disaster recovery planning, vulnerability management, threat assessment, malware, Ransomware and incident response...
Programmes de fidélité, la CNIL les encadrent www.dpo-partage.fr/programmes-d...
Programmes de fidélité : la CNIL encadre la portabilité des données clients
Programmes de fidélité : la CNIL encadre la portabilité des données clients
www.dpo-partage.fr
November 11, 2025 at 7:13 AM
Programmes de fidélité, la CNIL les encadrent www.dpo-partage.fr/programmes-d...
Procédure simplifiée : la CNIL accélère le rythme des sanctions www.dpo-partage.fr/procedure-si...
Procédure simplifiée : la CNIL accélère le rythme des sanctions pour des manquements du quotidien
Procédure simplifiée : la CNIL accélère le rythme des sanctions pour des manquements du quotidien, comment se protéger ?
www.dpo-partage.fr
November 11, 2025 at 7:10 AM
Procédure simplifiée : la CNIL accélère le rythme des sanctions www.dpo-partage.fr/procedure-si...
Cisco detects new attack variant targeting vulnerable firewalls | Cybersecurity Dive www.cybersecuritydive.com/news/cisco-f...
Cisco detects new attack variant targeting vulnerable firewalls
Hackers may be able to overload unpatched devices, the company said.
www.cybersecuritydive.com
November 11, 2025 at 7:03 AM
Cisco detects new attack variant targeting vulnerable firewalls | Cybersecurity Dive www.cybersecuritydive.com/news/cisco-f...
Cybersecurity 2026: 6 Forecasts and a Blueprint for the Year Ahead www.forbes.com/sites/chuckb...
Cybersecurity 2026: 6 Forecasts and a Blueprint for the Year Ahead
As we look toward 2026, the cybersecurity landscape is entering a pivotal phase of newfound technologies, evolving risks & threat actors, and shifting global dynamics.
www.forbes.com
November 11, 2025 at 7:00 AM
Cybersecurity 2026: 6 Forecasts and a Blueprint for the Year Ahead www.forbes.com/sites/chuckb...
Cyberattaques : comment bien gérer sa communication? - Cominmag.ch cominmag.ch/events/cyber...
Cominmag Home - Cominmag.ch
Cominmag.ch
November 11, 2025 at 6:57 AM
Cyberattaques : comment bien gérer sa communication? - Cominmag.ch cominmag.ch/events/cyber...
Cybersécurité : trois questions sur le guichet 17cyber déployé en Nouvelle-Aquitaine www.latribune.fr/article/tech...
Cybersécurité : trois questions sur le guichet 17cyber déployé en Nouvelle-Aquitaine
Le dispositif national 17cyber propose une assistance en ligne pour toutes les victimes de cyberattaques. Pour la première fois, ce guichet unique est régionalisé en Nouvelle-Aquitaine pour améliorer ...
www.latribune.fr
November 11, 2025 at 6:55 AM
Cybersécurité : trois questions sur le guichet 17cyber déployé en Nouvelle-Aquitaine www.latribune.fr/article/tech...
Fracture de la cyber-résilience en France : Cohesity alerte sur le coût des cyberattaques et les risques liés à l’IA générative www.solutions-numeriques.com/fracture-de-...
Fracture de la cyber-résilience en France : Cohesity alerte sur le coût des cyberattaques et les risques liés à l’IA générative - Solutions Numeriques & Cybersécurité
Entre surconfiance des dirigeants et adoption accélérée de l’IA générative, les entreprises françaises peinent encore à atteindre une véritable cyber-résilience. Le baromètre mondial de Cohesity révèl...
www.solutions-numeriques.com
November 11, 2025 at 6:48 AM
Fracture de la cyber-résilience en France : Cohesity alerte sur le coût des cyberattaques et les risques liés à l’IA générative www.solutions-numeriques.com/fracture-de-...
IMY investigates major ransomware attack on Swedish IT supplier | Digital Watch Observatory dig.watch/updates/imy-...
IMY investigates major ransomware attack on Swedish IT supplier | Digital Watch Observatory
Authorities have yet to determine how hackers infiltrated Miljödata’s systems.
dig.watch
November 11, 2025 at 6:44 AM
IMY investigates major ransomware attack on Swedish IT supplier | Digital Watch Observatory dig.watch/updates/imy-...
ENISA report reveals surge in DDoS and data breaches against EU public administration - Industrial Cyber industrialcyber.co/reports/enis...
ENISA report reveals surge in DDoS and data breaches against EU public administration - Industrial Cyber
ENISA warns EU public administration faces a surge in cyberattacks as hacktivists intensify DDoS campaigns and data breaches rise.
industrialcyber.co
November 11, 2025 at 6:40 AM
ENISA report reveals surge in DDoS and data breaches against EU public administration - Industrial Cyber industrialcyber.co/reports/enis...
Modularity advances LockBit 5.0 ransomware | SC Media www.scworld.com/brief/modula...
Modularity advances LockBit 5.0 ransomware
Highly prolific LockBit ransomware-as-a-service gang has bolstered its operations with the new LockBit 5.0 variant, which features increased modularity despite being mostly based on the LockBit 4.0 co...
www.scworld.com
November 11, 2025 at 6:36 AM
Modularity advances LockBit 5.0 ransomware | SC Media www.scworld.com/brief/modula...
Journée d’études sur le droit de la cybersécurité de l'AFDIT - Lexing Avocats www.lexing.law/avocats/jour...
Journée d’études sur le droit de la cybersécurité de l'AFDIT - Lexing Avocats
Le vendredi 14 novembre 2025, la journée d’études sur le droit de la cybersécurité de l'AFDIT se tient à la Maison du Barreau de Paris.
www.lexing.law
November 10, 2025 at 3:29 PM
Journée d’études sur le droit de la cybersécurité de l'AFDIT - Lexing Avocats www.lexing.law/avocats/jour...
NFT et droit d’auteur : la charte de bonnes pratiques du CSPLA - Lexing Avocats www.lexing.law/avocats/nft-...
NFT et droit d’auteur : la charte de bonnes pratiques du CSPLA - Lexing Avocats
Le CSPLA publie une charte pour sécuriser juridiquement les NFT artistiques et clarifier les obligations des acteurs.
www.lexing.law
November 10, 2025 at 3:26 PM
NFT et droit d’auteur : la charte de bonnes pratiques du CSPLA - Lexing Avocats www.lexing.law/avocats/nft-...
Veille Cyber N569 – 10 novembre 2025 | veillecyberland.wordpress.com/2025/11/10/v...
Veille Cyber N569 – 10 novembre 2025
Veille hebdomadaire du 9 novembre 2025 CyberStratégie /CyberDéfense / CyberSécurité – Protection des données / RGPD – Intelligence artificielle … Lettre Cyber 569 L’actualité cybe…
veillecyberland.wordpress.com
November 10, 2025 at 3:06 PM
Veille Cyber N569 – 10 novembre 2025 | veillecyberland.wordpress.com/2025/11/10/v...
How to manage cyber risk in 2026 www.allens.com.au/insights-new...
How to manage cyber risk in 2026
How to manage cyber risk in 2026
www.allens.com.au
November 10, 2025 at 12:04 PM
How to manage cyber risk in 2026 www.allens.com.au/insights-new...
Cyberattack storm hits NMC: Over 2,000 hacking bids on servers in day | Nagpur News - The Times of India timesofindia.indiatimes.com/city/nagpur/...
Cyberattack storm hits NMC: Over 2,000 hacking bids on servers in day | Nagpur News - The Times of India
Nagpur: The Nagpur Municipal Corporation (NMC) found itself at the centre of a massive hacking attempt on October 28. Firewall data accessed by TOI re.
timesofindia.indiatimes.com
November 10, 2025 at 11:59 AM
Cyberattack storm hits NMC: Over 2,000 hacking bids on servers in day | Nagpur News - The Times of India timesofindia.indiatimes.com/city/nagpur/...
The UK’s digital frontier under siege defence24.com/defence-poli...
The UK’s digital frontier under siege
The United Kingdom’s digital sovereignty is facing an unprecedented strain from multiple vectors of attack. This is the worrying conclusion issued by the UK National Cyber Security Centre (NCSC)...
defence24.com
November 10, 2025 at 11:45 AM
The UK’s digital frontier under siege defence24.com/defence-poli...
Dangerous runC flaws could allow hackers to escape Docker containers www.bleepingcomputer.com/news/securit...
Dangerous runC flaws could allow hackers to escape Docker containers
Three newly disclosed vulnerabilities in the runC container runtime used in Docker and Kubernetes could be exploited to bypass isolation restrictions and get access to the host system.
www.bleepingcomputer.com
November 10, 2025 at 11:42 AM
Dangerous runC flaws could allow hackers to escape Docker containers www.bleepingcomputer.com/news/securit...
Ransomware Attacks On Supply Chains Grow www.pymnts.com/news/b2b-pay...
Ransomware Increases Its Attack On Supply Chains | PYMNTS.com
As the threat of cyberattacks increases, businesses are facing a particularly high hurdle in safeguarding their supply chains. New research from the NTT
www.pymnts.com
November 10, 2025 at 11:40 AM
Ransomware Attacks On Supply Chains Grow www.pymnts.com/news/b2b-pay...
Fasoo Highlights Three Essentials for Ransomware Resilience: Training, Encryption, and Backup fox2now.com/business/pre...
fox2now.com
November 10, 2025 at 11:37 AM
Fasoo Highlights Three Essentials for Ransomware Resilience: Training, Encryption, and Backup fox2now.com/business/pre...
ICAC beefed up in fight against corruption | NSW Government www.nsw.gov.au/ministerial-...
ICAC beefed up in fight against corruption
The Minns Labor Government has agreed to a request from the NSW Independent Commission Against Corruption for additional funding, as it deals with a steady rise in corruption inquiries.
www.nsw.gov.au
November 10, 2025 at 11:22 AM
ICAC beefed up in fight against corruption | NSW Government www.nsw.gov.au/ministerial-...
Drilling Down on Uncle Sam’s Proposed TP-Link Ban – Krebs on Security krebsonsecurity.com/2025/11/dril...
Drilling Down on Uncle Sam’s Proposed TP-Link Ban
The U.S. government is reportedly preparing to ban the sale of wireless routers and other networking gear from TP-Link Systems, a tech company that currently enjoys an estimated 50% market share among...
krebsonsecurity.com
November 10, 2025 at 3:47 AM
Drilling Down on Uncle Sam’s Proposed TP-Link Ban – Krebs on Security krebsonsecurity.com/2025/11/dril...
German ISP aurologic GmbH Identified as Key Hub for Malicious Hosting Infrastructure gbhackers.com/german-isp-a...
German ISP aurologic GmbH Identified as Key Hub for Malicious Hosting Infrastructure
German hosting provider aurologic GmbH has emerged as a critical hub within the global malicious infrastructure ecosystem, according to recent intelligence reporting.
gbhackers.com
November 9, 2025 at 3:24 PM
German ISP aurologic GmbH Identified as Key Hub for Malicious Hosting Infrastructure gbhackers.com/german-isp-a...
German ISP aurologic GmbH Identified as Key Hub for Malicious Hosting Infrastructure gbhackers.com/german-isp-a...
German ISP aurologic GmbH Identified as Key Hub for Malicious Hosting Infrastructure
German hosting provider aurologic GmbH has emerged as a critical hub within the global malicious infrastructure ecosystem, according to recent intelligence reporting.
gbhackers.com
November 9, 2025 at 3:23 PM
German ISP aurologic GmbH Identified as Key Hub for Malicious Hosting Infrastructure gbhackers.com/german-isp-a...
Threat Actors Use Stolen RDP Credentials to Deploy Cephalus Ransomware gbhackers.com/threat-actor...
Threat Actors Use Stolen RDP Credentials to Deploy Cephalus Ransomware
Cephalus, has emerged in the cybersecurity threat landscape, targeting organisations through compromised Remote Desktop Protocol (RDP) accounts.
gbhackers.com
November 9, 2025 at 3:21 PM
Threat Actors Use Stolen RDP Credentials to Deploy Cephalus Ransomware gbhackers.com/threat-actor...
How the Tech Industry Got Identity Wrong - Infosecurity Magazine www.infosecurity-magazine.com/opinions/how...
How the Tech Industry Got Identity Wrong
Teleport CEO Ev Kontsevoy explains why identity management is broken and why it takes 11 hours to resolve a single breach
www.infosecurity-magazine.com
November 9, 2025 at 3:15 PM
How the Tech Industry Got Identity Wrong - Infosecurity Magazine www.infosecurity-magazine.com/opinions/how...