NIS 2 : les entités assujetties peuvent se pré-enregistrer (ANSSI – Actualités)

Actualités
NIS 2 : les entités assujetties peuvent se pré-enregistrer anssiadm lun 24/11/2025 - 14:07 Le service de pré-enregistrement des entités assujetties à la directive NIS 2 est désormais disponible. Le service de pré-enregistrement des entités assujetties à la directive NIS 2 est désormais disponible.   Dans le cadre de la mise en œuvre de la directive NIS 2, et dans l'attente de l'entrée en vigueur de l'obligation d'enregistrement qui interviendra avec la publication des textes réglementaires, l’ANSSI met à disposition des entités un service de pré-enregistrement pour leur permettre d'anticiper cette étape.   Le pré-enregistrement constitue la première brique de l’entrée en vigueur de NIS 2 et un premier pas pour les entités dans le respect de leurs obligations.   En effet, cette étape permettra aux entités de bénéficier d’un…
Read More

ToddyCat’s New Hacking Tools Steal Outlook Emails and Microsoft 365 Access Tokens

Actualités
The threat actor known as ToddyCat has been observed adopting new methods to obtain access to corporate email data belonging to target companies, including using a custom tool dubbed TCSectorCopy. "This attack allows them to obtain tokens for the OAuth 2.0 authorization protocol using the user's browser, which can be used outside the perimeter of the compromised infrastructure to access
Read More

3 SOC Challenges You Need to Solve Before 2026

Actualités
2026 will mark a pivotal shift in cybersecurity. Threat actors are moving from experimenting with AI to making it their primary weapon, using it to scale attacks, automate reconnaissance, and craft hyper-realistic social engineering campaigns. The Storm on the Horizon Global world instability, coupled with rapid technological advancement, will force security teams to adapt not just their
Read More

Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware

Actualités
Cybersecurity researchers have disclosed details of a new campaign that has leveraged Blender Foundation files to deliver an information stealer known as StealC V2. "This ongoing operation, active for at least six months, involves implanting malicious .blend files on platforms like CGTrader," Morphisec researcher Shmuel Uzan said in a report shared with The Hacker News. "Users unknowingly
Read More

CISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp Users

Actualités
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday issued an alert warning of bad actors actively leveraging commercial spyware and remote access trojans (RATs) to target users of mobile messaging applications. "These cyber actors use sophisticated targeting and social engineering techniques to deliver spyware and gain unauthorized access to a victim's messaging app,
Read More

Is Your Android TV Streaming Box Part of a Botnet? (Krebs on Security)

Actualités
On the surface, the Superbox media streaming devices for sale at retailers like BestBuy and Walmart may seem like a steal: They offer unlimited access to more than 2,200 pay-per-view and streaming services like Netflix, ESPN and Hulu, all for a one-time fee of around $400. But security experts warn these TV boxes require intrusive software that forces the user’s network to relay Internet traffic for others, traffic that is often tied to cybercrime activity such as advertising fraud and account takeovers. Superbox media streaming boxes for sale on Walmart.com. Superbox bills itself as an affordable way for households to stream all of the television and movie content they could possibly want, without the hassle of monthly subscription fees — for a one-time payment of nearly $400. “Tired of confusing…
Read More

Is Your Android TV Streaming Box Part of a Botnet?

Actualités
On the surface, the Superbox media streaming devices for sale at retailers like BestBuy and Walmart may seem like a steal: They offer unlimited access to more than 2,200 pay-per-view and streaming services like Netflix, ESPN and Hulu, all for a one-time fee of around $400. But security experts warn these TV boxes require intrusive software that forces the user’s network to relay Internet traffic for others, traffic that is often tied to cybercrime activity such as advertising fraud and account takeovers. Superbox media streaming boxes for sale on Walmart.com. Superbox bills itself as an affordable way for households to stream all of the television and movie content they could possibly want, without the hassle of monthly subscription fees — for a one-time payment of nearly $400. “Tired of confusing…
Read More

New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions

Actualités
Cybersecurity researchers have discovered five vulnerabilities in Fluent Bit, an open-source and lightweight telemetry agent, that could be chained to compromise and take over cloud infrastructures. The security defects "allow attackers to bypass authentication, perform path traversal, achieve remote code execution, cause denial-of-service conditions, and manipulate tags," Oligo Security said in
Read More

Second Sha1-Hulud Wave Affects 25,000+ Repositories via npm Preinstall Credential Theft

Actualités
Multiple security vendors are sounding the alarm about a second wave of attacks targeting the npm registry in a manner that's reminiscent of the Shai-Hulud attack. The new supply chain campaign, dubbed Sha1-Hulud, has compromised hundreds of npm packages, according to reports from Aikido, HelixGuard, Koi Security, Socket, and Wiz. "The campaign introduces a new variant that executes malicious
Read More

⚡ Weekly Recap: Fortinet Exploit, Chrome 0-Day, BadIIS Malware, Record DDoS, SaaS Breach & More

Actualités
This week saw a lot of new cyber trouble. Hackers hit Fortinet and Chrome with new 0-day bugs. They also broke into supply chains and SaaS tools. Many hid inside trusted apps, browser alerts, and software updates. Big firms like Microsoft, Salesforce, and Google had to react fast — stopping DDoS attacks, blocking bad links, and fixing live flaws. Reports also showed how fast fake news, AI
Read More