Russia’s AI-Powered Disinformation Operation Targeting Ukraine, US, and Germany
The Russia-linked influence operation called Doppelganger has targeted Ukrainian, U.S., and German audiences through a combination of inauthentic news sites and social media accounts. These campaigns are designed to amplify content designed to undermine Ukraine as well as propagate anti-LGBTQ+ sentiment, U.S. military competence, and Germany’s economic and social issues, according to a new
Warning for iPhone Users: Experts Warn of Sneaky Fake Lockdown Mode Attack
A new « post-exploitation tampering technique » can be abused by malicious actors to visually deceive a target into believing that their Apple iPhone is running in Lockdown Mode when it’s actually not and carry out covert attacks. The novel, detailed by Jamf Threat Labs in a report shared with The Hacker News, « shows that if a hacker has […]
Windows 11 installe HP Smart sans votre accord et renomme vos imprimantes
Votre PC sous Windows 10 ou Windows 11 installe HP Smart sans aucunes raisons ? Votre imprimante est une Epson, une Canon ou autre et pourtant, elle est renommée HP LaserJet M101-M106 ? C’est normal : Microsoft vient officiellement de reconnaître le souci et travaille sur une solution. L’article Windows 11 installe HP Smart sans […]
Etes-vous victime de ces bugs sous iOS 17.1 ?
Comme on pouvait le craindre, les cinq petits jours pris par Apple pour résoudre les bugs de ses systèmes en cours n’ont pas vraiment porté leurs fruits. Outre le bug d’Apple Music, il en est un autre sévissant sous iOS 17, avec le clavier virtuel de l’iPhone.
Generative AI Security: Preventing Microsoft Copilot Data Exposure
Microsoft Copilot has been called one of the most powerful productivity tools on the planet. Copilot is an AI assistant that lives inside each of your Microsoft 365 apps — Word, Excel, PowerPoint, Teams, Outlook, and so on. Microsoft’s dream is to take the drudgery out of daily work and let humans focus on being […]
15,000 Go Module Repositories on GitHub Vulnerable to Repojacking Attack
New research has found that over 15,000 Go module repositories on GitHub are vulnerable to an attack called repojacking. « More than 9,000 repositories are vulnerable to repojacking due to GitHub username changes, » Jacob Baines, chief technology officer at VulnCheck, said in a report shared with The Hacker News. « More than 6,000 repositories were vulnerable to repojacking due […]
Ils lui volent son téléphone. Mais déçus, ils lui rendent !
Depuis des années, l’iPhone est un produit très convoité par les voleurs, à tel point que certains n’hésitent à mettre au point de savantes opérations pour s’en procurer : vols en bande organisées, attaque à la voiture bélier… Mais les smartphones Android ont-il autant la côte chez les malfrats ?
Microsoft Warns of Kremlin-Backed APT28 Exploiting Critical Outlook Vulnerability
Microsoft on Monday said it detected Kremlin-backed nation-state activity exploiting a critical security flaw in its Outlook email service to gain unauthorized access to victims’ accounts within Exchange servers. The tech giant attributed the intrusions to a threat actor it called Forest Blizzard (formerly Strontium), which is also widely tracked under the monikers APT28,
New Threat Actor ‘AeroBlade’ Emerges in Espionage Attack on U.S. Aerospace
A previously undocumented threat actor has been linked to a cyber attack targeting an aerospace organization in the U.S. as part of what’s suspected to be a cyber espionage mission. The BlackBerry Threat Research and Intelligence team is tracking the activity cluster as AeroBlade. Its origin is currently unknown and it’s not clear if the attack […]
A quoi ressemblera Kino, la nouvelle app de retouche vidéo des développeurs d’Halide ?
La qualité de l’app de photographie Halide n’est plus à faire depuis longtemps. Mais s’il semblerait que son éditeur entend s’attaquer à la vidéo !