Hébergé par
Rackspace
Tootella
Les news du libre
Linux [fr]
Linux [en]
Sécurité
Projets
BSD
Dev
Applications
Autres
Tout
mini
=|=
Dark Reading
Slippery RansomExx Malware Moves to Rust, Evading VirusTotal
For Gaming Companies, Cybersecurity Has Become a Major Value Proposition
How Development Teams Should Respond to Text4Shell
Why Africa's Telecoms Must Actively Collaborate to Combat Fraud
'Patch Lag' Leaves Millions of Android Devices Vulnerable
Hot Ticket: 'Aurora' Go-Based InfoStealer Finds Favor Among Cyber-Threat Actors
Microsoft: Popular IoT SDKs Leave Critical Infrastructure Wide Open to Cyberattack
Penetration Testing Market Size Is Projected to Reach $5.28B Globally by 2028
Where Are We Heading With Data Privacy Regulations?
Cybersecurity Pros Put Mastodon Flaws Under the Microscope
Brèves HSC
[89] DANE et les attaques par rejeu
[88] Préqualification Nuit du Hack 2012 - Write-up 4005
[86] Analyse du protocole Microsoft SSTP
[85] Oracle 11 et l'authentification
[84] Obtenir les clés SSL en mémoire d'un processus
[83] Etendre les fonctionnalités de nmap et réaliser un scan au niveau applicatif
[82] Brève sur les interfaces RPC Windows
[81] Brève sur WMI (Windows Management Instrumentation)
[80] Malwar(e)
[79] Retour sur la vulnérabilité CVE-2008-1930 dans Wordpress
Bugtraq
Error while fetching the feed
Cisco Security
Holiday shopping, hackers and cybersecurity
VIDEO: Cisco and Ericsson Partner to Accelerate Digital Transformation
Ericsson and Cisco Partner to Create the Networks of the Future
Cisco Announces Intent to Acquire Lancope
nc Simplifies OTT With Cisco Virtualized Video Processing
Cisco and Accenture Extend Global Alliance to Brazil to Help Clients Expand Business Opportunities, Reduce Costs and Improve Productivity
Cisco Midyear Security Report Reveals Sophisticated Cyberattacks Are Defining the Innovation Race between Adversaries and Defenders
Cybersecurity Innovation Race: 3 Things You Need to Know
Why That Home Network Will Really Matter to you Today
How Will Smart Cities Defend Against Hackers?
ImperViews
Financial Regulators Focused on Cyber Security
What Fight Club Doesn't Teach Us About the Yahoo! Breach
The Concerning Case of the Underestimated MegaBreaches
Join us at the Gartner Security and Risk Management Summit
GDPR Compliance: How to get the ball rolling today?
2015–16 Annual DDoS Threat Landscape Report
Fact Checking Cyber Espionage Tactics in the Jason Bourne Movie (Spoilers)
Big banks join forces to fight cyber crime
FBI appointed as cyber Ghostbusters. “Who are you going to call?"
Thoughts and musings from my first blackhat conference
Schneier on Security
Using AI-Generated Images to Get Refunds
Are We Ready to Be Governed by Artificial Intelligence?
Friday Squid Blogging: Squid Camouflage
IoT Hack
Urban VPN Proxy Surreptitiously Intercepts AI Chats
Denmark Accuses Russia of Conducting Two Cyberattacks
Microsoft Is Finally Killing RC4
Friday Squid Blogging: Petting a Squid
AI Advertising Company Hacked
Someone Boarded a Plane at Heathrow Without a Ticket or Passport
Threatpost
‘Magic’ Espionage Malware hits Thousands of UK Computers
Comment Crew Malware is After Drone Technology
ACLU Asks FTC to Investigate Carriers’ Lack of Android Security Updates
Geer, Thieme: Specialization and Institutionalization Have Transformed Security
Oracle Patches 42 Java Flaws, Adds New Code-Signing Restrictions and Warnings
Move Over Conficker, Web Threats are Top Enterprise Risk
DevOps Integration Key to Avoiding Pre-Ordained Security Failures
Bruce Schneier on the Boston Marathon Bombing and the Psychology of Fear
NQ Mobile: Android Malware Doubled in 2012
Linode Hacked Through ColdFusion Zero Day