Parce que… c’est l’épisode 0x623!
Préambule
Bon… je saute à l’eau et je repars un podcast sur l’actualité en mode seul. Ce que je n’avais pas fait depuis vraiment longtemps. J’ai été excessif sur le volume de nouvelles, ne m’étant pas bien organisé. Je m’améliorerai avec la pratique… car, paraît-il, ça ne se perd pas, comme le “bécicle”. Aussi, et probablement le plus audible, j’ai eu un glitch à l’enregistrement. Comme quoi j’ai vraiment perdu la main. Pour l’aspect technique, j’ai oublié de retirer un filtre lors de l’enregistrement, ce qui fait que la bande originale est “instable”.
Shameless plug
10 et 11 septembre 2025 - GoSec 2025
Code rabais de 15% - GSPOL25
13 septembre 2025 - BSides Montreal 2025
12 au 17 octobre 2025 - Objective by the sea v8
14 et 15 octobre 2025 - ATT&CKcon 6.0
14 et 15 octobre 2025 - Forum inCyber Canada
Code rabais de 30% - CA25KDUX92
10 au 12 novembre 2025 - IAQ - Le Rendez-vous IA Québec
17 au 20 novembre 2025 - European Cyber Week
25 et 26 février 2026 - SéQCure 2026Description
Notes
Breach
Salesforce Releases Forensic Investigation Guide Following Chain of Attacks
Salesloft breached to steal OAuth tokens for Salesforce data-theft attacks
Hackers Lay in Wait, Then Knocked Out Iran Ship Comms
Légalise
Mastodon says it doesn’t ‘have the means’ to comply with age verification laws
France and Germany reject Trump’s threats on EU tech legislation
AI
CVE-2025-58062 - OpenMCP Client OS Command Injection Vulnerability
AI Agents in Browsers Light on Cybersecurity, Bypass Controls
Anthropic AI Used to Automate Data Extortion Campaign
Crims laud Claude to plant ransomware and fake IT expertise
Anthropic Disrupts AI-Powered Cyberattacks Automating Theft and Extortion Across Critical Sectors
Anthropic teases Claude for Chrome: Don’t try this at home
Researchers flag code that uses AI systems to carry out ransomware attacks
Securing the AI Revolution: Introducing Cloudflare MCP Server Portals
Agentic Browser Security: Indirect Prompt Injection in Perplexity Comet
Helping people when they need it most
Exclusive: Meta created flirty chatbots of Taylor Swift, other celebrities without permission
PromptLock - Le premier ransomware à utiliser une IA 100% locale
Anthropic will start training its AI models on chat transcripts
The Default Trap: Why Anthropic’s Data Policy Change Matters
Threat Actors Weaponizes AI Generated Summaries With Malicious Payload to Execute Ransomware
New AI attack hides data-theft prompts in downscaled images
Will Smith’s concert crowds are real, but AI is blurring the lines
Best Practices for Securing Generative AI with SASE
ChatGPT, Claude, & Gemini security scanning with Cloudflare CASB
Hackers Can Exploit Image Scaling in Gemini CLI, Google Assistant to Exfiltrate Sensitive Data
New Prompt Insertion Attack – OpenAI Account Name Used to Trigger ChatGPT Jailbreaks
Vulnérabilités
U.S. CISA adds Citrix Netscaler flaw to its known exploited vulnerabilities catalog
Docker Desktop bug let containers hop the fence with barely a nudge
CISA Adds Three Exploited Vulnerabilities to KEV Catalog Affecting Citrix and Git
The Hidden Risk of Consumer Devices in the Hybrid Workforce
Shadow IT Is Expanding Your Attack Surface. Here’s Proof
Putin on the code: DoD reportedly relies on utility written by Russia-based Yandex dev
Microsoft details Storm-0501’s focus on ransomware in the cloud
Surge in coordinated scans targets Microsoft RDP auth servers
CVE-2025-7776 - Citrix NetScaler Memory Overflow Denial of Service
CVE-2025-55526 - n8n-workflows Directory Traversal Vulnerability
WhatsApp patches vulnerability exploited in zero-day attacks
Cloud
Azure apparatchik shows custom silicon keeping everything locked down
Microsoft Azure Hardware Security to Help Thwart the World’s 3rd Largest GDP
Microsoft to enforce MFA for Azure resource management in October
Pentagon ends Microsoft’s use of China-based support staff for DoD cloud
Risque
Mansplaining your threat model, as a service
Threat Modeling Tools
Privacy
Smart glasses record people in public. The most online generation is pushing back
Your Word documents will be saved to the cloud automatically on Windows going forward
Prepare for the unexpected with emergency access for your Proton Account
FTC Chair Tells Tech Giants to Hold the Line on Encryption
The UK May Be Dropping Its Backdoor Mandate
Defensif
Google to Verify All Android Developers in 4 Countries to Block Malicious Apps
BGP’s security problems are notorious. Attempts to fix that are a work in progress
Who are you again? Infosec experiencing ‘Identity crisis’ amid rising login attacks
CISA Publish Hunting and Mitigation Guide to Defend Networks from Chinese State-Sponsored Actors
Offensif
Threat Actors Abuse Velociraptor Incident Response Tool to Gain Remote Access
Hackers Weaponize PDF Along With a Malicious LNK File to Compromise Windows Systems
Arch Linux Confirms Week-Long DDoS Attack Disrupted its Website, Repository, and Forums
Hackers Abuse Microsoft Teams to Gain Remote Access on Windows With PowerShell-based Malware
WinRAR 0-Day Vulnerabilities Exploited in Wild by Hackers – Detailed Case Study
Breaking the Passkey Promise: SquareX Discloses Major Passkey Vulnerability at DEF CON 33
Beware of Website Mimicking Google Play Store Pages to Deliver Android Malware
Malicious Android apps with 19M installs removed from Google Play
Weaponized PuTTY Via Bing Ads Exploit Kerberos and Attack Active Directory Services
ShadowCaptcha Exploits WordPress Sites to Spread Ransomware, Info Stealers, and Crypto Miners
PoC Exploit Released for Chrome 0-Day Vulnerability Exploited in the Wild
TAG-144 Actors Attacking Government Entities With New Tactics, Techniques, and Procedures
Collaborateurs
Nicolas-Loïc FortinCrédits
Montage par Intrasecure inc
Locaux réels par Intrasecure inc