Parce que… c’est l’épisode 0x647!
Shameless plug
12 au 17 octobre 2025 - Objective by the sea v814 et 15 octobre 2025 - ATT&CKcon 6.014 et 15 octobre 2025 - Forum inCyber CanadaCode rabais de 30% - CA25KDUX924 et 5 novembre 2025 - FAIRCON 20258 et 9 novembre 2025 - DEATHcon17 au 20 novembre 2025 - European Cyber Week25 et 26 février 2026 - SéQCure 2026Notes
IAAI Agent Security: Whose Responsibility Is It?Hackers Can Bypass OpenAI Guardrails Framework Using a Simple Prompt Injection TechniqueAI makes phishing 4.5x more effective, Microsoft saysHow AI-powered ransomware could destroy your businessAgentic AI’s OODA Loop Problem‘Sovereign AI’ Has Become a New Front in the US-China Tech WarMicrosoftMicrosoft warns of a 32% surge in identity hacks, mainly driven by stolen passwordsExtortion and ransomware drive over half of cyberattacksWindows 11 And Server 2025 Will Start Caching Plaintext Credentials By Enabling WDigest AuthenticationMicrosoft: Exchange 2016 and 2019 have reached end of supportMicrosoft frightful Patch Tuesday: 175+ CVEs, 3 under attackTwo New Windows Zero-Days Exploited in the Wild — One Affects Every Version Ever ShippedWindows BitLocker Vulnerabilities Let Attackers Bypass Security FeatureEdge - IEMicrosoft restricts IE mode access in Edge after zero-day attacksHackers Leveraging Microsoft Edge Internet Explorer Mode to Gain Access to Users’ DevicesDéfensifIdentity Security: Your First and Last Line of DefenseBanks need stricter controls to prevent romance fraud, says City regulatorCVE, CVSS scores need overhauling, argues Codific CEOHow to spot dark web threats on your network using NDRUkraine takes steps to launch dedicated cyber force for offensive strikesHow Microsoft is creating a security-first culture that lastsRoot Cause Analysis? You’re Doing It WrongModern iOS Security Features – A Deep Dive into SPTM, TXM, and ExclavesEDR-Freeze Tool Technical Workings Along With Forensic Artifacts RevealedWireshark 4.6.0 Supports macOS pktap Metadata (PID, Process Name, etc.)OffensifF5Why the F5 Hack Created an ‘Imminent Threat’ for Thousands of NetworksF5 says hackers stole undisclosed BIG-IP flaws, source code‘Highly sophisticated’ government goons hacked F5OracleGoogle, Mandiant expose malware and zero-day behind Oracle EBS extortionOracle issued an emergency security update to fix new E-Business Suite flaw CVE-2025-61884FortigateFortiOS CLI Command Bypass Vulnerability Let Attacker Execute System CommandsFortiPAM and FortiSwitch Manager Vulnerability Let Attackers Bypass Authentication ProcessSatelliteUnencrypted satellites expose global communicationsResearchers find a startlingly cheap way to steal your secrets from spaceStudy reveals satellites comms spilling unencrypted dataAxis Communications Vulnerability Exposes Azure Storage Account CredentialsAndroid Pixnapping attack can capture app data like 2FA infoIvanti Patches 13 Vulnerabilities in Endpoint Manager Allowing Remote Code ExecutionHackers Leverage Judicial Notifications to Deploy Info-Stealer MalwareCyberattackers Target LastPass, Top Password ManagersDevs of VS Code extensions are leaking secrets en masseHow Attackers Bypass Synced PasskeysRealBlindingEDR Tool That Permanently Turns Off AV/EDR Using Kernel CallbacksNew PoC Exploit Released for Sudo Chroot Privilege Escalation VulnerabilityLes UropesEurope’s Digital Sovereignty Paradox - “Chat Control” updateBritain issues first online safety fine to US website 4chanCyber-attacks rise by 50% in past year, UK security agency saysNetherlands invokes special powers against Chinese-owned semiconductor company NexperiaDiversGrapheneOS is finally ready to break free from Pixels, and it may never look back[ProtonVPN Lied About Logging
Blog](https://vp.net/l/en-US/blog/ProtonVPN-Lied-About-Logging)
Adam Shostack : “Yay, more age verification law…”California enacts age verification, chatbot lawsThe Guardian view on the online scam industry: authorities must not forget that perpetrators are often victims tooInsoliteTikTok Videos Promoting Malware InstallationKevin Beaumont: “This whole thing with TLP RED …” - CyberplaceCollaborateurs
Nicolas-Loïc FortinCrédits
Montage par Intrasecure incLocaux réels par Intrasecure inc