Rene Robichaud's Avatar

Rene Robichaud

@neroqc.bsky.social

FR-EN #CyberSecurity #Security #InfoSec #CeptBiro #ISO #Risk #VulnerabilityManagement #Audit Working @CeptBiro http://ht.ly/upc7307EQhA - Posts are my own

301 Followers  |  43 Following  |  7,834 Posts  |  Joined: 07.02.2024
Posts Following

Posts by Rene Robichaud (@neroqc.bsky.social)

Dossier : Cybersécurité : Anticiper les menaces en 2026 Selon les diff�rents rapports des organismes d�di�s � la cybers�curit� et les interlocuteurs interrog�s dans cette enqu�te, les menaces se...

Cybersécurité : Anticiper les menaces en 2026
www.lemondeinformatique.fr/les-dossiers...

27.02.2026 22:03 — 👍 0    🔁 0    💬 0    📌 0
Preview
Microsoft testing Windows 11 batch file security improvements Microsoft is rolling out new Windows 11 Insider Preview builds that improve security and performance during batch file or CMD script execution.

Microsoft testing Windows 11 batch file security improvements
www.bleepingcomputer.com/news/microso...

27.02.2026 22:02 — 👍 0    🔁 0    💬 0    📌 0
Preview
Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor A fake Go module posing as golang.org/x/crypto captures terminal passwords, installs SSH persistence, and delivers the Rekoobe Linux backdoor.

Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor
thehackernews.com/2026/02/mali...

27.02.2026 22:02 — 👍 0    🔁 0    💬 0    📌 0
Preview
APT37 hackers use new malware to breach air-gapped networks North Korean hackers are deploying newly uncovered tools to move data between internet-connected and air-gapped systems, spread via removable drives, and conduct covert surveillance.

APT37 hackers use new malware to breach air-gapped networks
www.bleepingcomputer.com/news/securit...

27.02.2026 22:01 — 👍 0    🔁 0    💬 0    📌 0
Preview
ZATAZ » Le pirate Batista raconte ses méthodes d’attaque

Le pirate Batista raconte ses méthodes d’attaque
www.zataz.com/le-pirate-ba...

27.02.2026 22:00 — 👍 0    🔁 0    💬 0    📌 0
Preview
New Dohdoor Malware Attacking Schools and Health Care Sectors in U.S. via Multi-Stage Attack Chain UAT-10027 targets US schools and hospitals with Dohdoor backdoor, using DNS-over-HTTPS for stealthy C2 access.

New Dohdoor Malware Attacking Schools and Health Care Sectors in U.S. via Multi-Stage Attack Chain
cybersecuritynews.com/new-dohdoor-...

27.02.2026 22:00 — 👍 0    🔁 0    💬 0    📌 0
Preview
Le piratage du logiciel médical de Cegedim refait surface - Le Monde Informatique Un reportage sur France 2 a relancé l'affaire du piratage d'un logiciel médical de Cegedim à la fin 2025. L'éditeur a communiqué pour minimiser...

Le piratage du logiciel médical de Cegedim refait surface
www.lemondeinformatique.fr/actualites/l...

27.02.2026 21:59 — 👍 0    🔁 0    💬 0    📌 0
Preview
Nom, adresse, téléphone… et les notes privées de votre médecin : 15 millions de Français concernés par ce vol de données ! Une nouvelle fuite de données frappe le secteur de la santé en France. Des millions de patients seraient concernés par l’exposition d’informations issues d’un logiciel médical utilisés par les méde...

Nom, adresse, téléphone… et les notes privées de votre médecin : 15 millions de Français concernés par ce vol de données !
www.futura-sciences.com/tech/actuali...

27.02.2026 21:58 — 👍 0    🔁 0    💬 0    📌 0
Preview
L’IA est conçue pour terminer le travail, pas pour le commencer L’IA ne remplace pas la collaboration humaine. C’est un outil qui repose sur le bon timing. Utilisée trop tôt, elle court-circuite la réflexion. Utilisée au bon moment, elle fait gagner du temps. Alor...

L’IA est conçue pour terminer le travail, pas pour le commencer
www.rfi.fr/fr/connaissa...

27.02.2026 14:38 — 👍 0    🔁 0    💬 0    📌 0
Preview
Claude Code Security Shows Promise, Not Perfection Claude Code's introduction rippled across the stock market, but researchers and analysts say its impact was overstated, as they peel back the layers.

Claude Code Security Shows Promise, Not Perfection
www.darkreading.com/application-...

27.02.2026 14:35 — 👍 1    🔁 0    💬 0    📌 0
Preview
Outlook lancera automatiquement Copilot pour ouvrir les liens HTML - Le Monde Informatique Dans une fonctionnalité en cours de développement, Microsoft prévoit d'ouvrir automatiquement son assistant IA Copilot dans le navigateur Edge depuis...

Outlook lancera automatiquement Copilot pour ouvrir les liens HTML
www.lemondeinformatique.fr/actualites/l...

27.02.2026 14:34 — 👍 0    🔁 0    💬 0    📌 0
Preview
Panique sur l’action PayPal : les investisseurs se retirent en masse après une annonce Le scénario d’un rachat de PayPal par Stripe semble déjà s’éloigner. Selon de nouvelles informations, aucune discussion concrète ne serait en cours : refroidissant brutalement les marchés.

Panique sur l’action PayPal : les investisseurs se retirent en masse après une annonce
www.presse-citron.net/panique-acti...

27.02.2026 14:33 — 👍 0    🔁 0    💬 0    📌 0
Preview
Incident Cegedim : une fuite de données médicales dramatique Une nouvelle fuite de données importante affecte entre 11 et 15 millions de Français, suite à une intrusion sur la solution MonLogicielMedical.com de Cegedim.

Incident Cegedim : cette fuite de données médicales menace l’intimité de millions de Français
www.it-connect.fr/incident-ceg...

27.02.2026 14:33 — 👍 0    🔁 0    💬 0    📌 0
Preview
Aeternum Botnet Loader Employs Polygon Blockchain C&C to Boost Resilience Aeternum C2, a native C++ botnet loader, operates on smart contracts on the Polygon blockchain, increasing its resilience.

Aeternum Botnet Loader Employs Polygon Blockchain C&C to Boost Resilience
www.securityweek.com/aeternum-bot...

27.02.2026 14:30 — 👍 0    🔁 0    💬 0    📌 0
Preview
Dohdoor Malware Targets U.S. Schools and Healthcare with Multi-Stage Attack A new backdoor dubbed Dohdoor is actively targeting schools and health care organizations in the United States through a stealthy multi-stage attack chain.

Dohdoor Malware Targets U.S. Schools and Healthcare with Multi-Stage Attack
gbhackers.com/dohdoor-malw...

27.02.2026 14:30 — 👍 0    🔁 0    💬 0    📌 0
Preview
Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms Trojanized gaming tools and new Windows RATs like Steaelite enable data theft, ransomware, and persistent remote control.

Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms
thehackernews.com/2026/02/troj...

27.02.2026 14:29 — 👍 1    🔁 0    💬 0    📌 0
Preview
Burger King will use AI to check if employees say ‘please’ and ‘thank you’ Have it your way?

Burger King will use AI to check if employees say ‘please’ and ‘thank you’
www.theverge.com/ai-artificia...

27.02.2026 14:28 — 👍 0    🔁 0    💬 0    📌 0
Preview
Android 17 second beta expands privacy controls for contacts, SMS and local networks - Help Net Security Android 17 beta updates add stronger privacy controls, including local network permissions, OTP protection, and safer contact access.

Android 17 second beta expands privacy controls for contacts, SMS and local networks
www.helpnetsecurity.com/2026/02/27/a...

27.02.2026 14:27 — 👍 0    🔁 0    💬 0    📌 0
Preview
Quand acteur malveillant persistant se met au ransomware | LeMagIT Selon Broadcom, l’acteur malveillant persistant associé à la Corée du Nord Lazarus procède désormais à des cyberattaques impliquant le rançongiciel Medusa, notamment contre les établissements de santé...

Quand acteur malveillant persistant se met au ransomware
www.lemagit.fr/actualites/3...

26.02.2026 21:07 — 👍 0    🔁 0    💬 0    📌 0
Preview
Zoom Update Scam Infected 1,437 Users to Deploy Surveillance Tools in 12 Days Fake Zoom site infected 1,437 users in 12 days, pushing rogue Teramind spyware via a cloned Zoom waiting room page.

Zoom Update Scam Infected 1,437 Users to Deploy Surveillance Tools in 12 Days
cybersecuritynews.com/zoom-update-...

26.02.2026 17:48 — 👍 0    🔁 0    💬 0    📌 0
Preview
Critical Juniper Networks PTX flaw allows full router takeover A critical vulnerability in the Junos OS Evolved network operating system running on PTX Series routers from Juniper Networks could allow an unauthenticated attacker to execute code remotely with root...

Critical Juniper Networks PTX flaw allows full router takeover
www.bleepingcomputer.com/news/securit...

26.02.2026 17:23 — 👍 0    🔁 0    💬 0    📌 0
Preview
Olympique Marseille confirms 'attempted' cyberattack after data leak French professional football club Olympique de Marseille has confirmed a cyberattack after a threat actor claimed on Monday that it breached the club's systems earlier this month.

Olympique Marseille confirms 'attempted' cyberattack after data leak
www.bleepingcomputer.com/news/securit...

26.02.2026 16:14 — 👍 0    🔁 0    💬 0    📌 0
Preview
ThreatsDay Bulletin: Kali Linux + Claude, Chrome Crash Traps, WinRAR Flaws, LockBit & 15+ Stories This week’s ThreatsDay Bulletin highlights emerging cyber threats, evolving attack tactics, and key security developments.

ThreatsDay Bulletin: Kali Linux + Claude, Chrome Crash Traps, WinRAR Flaws, LockBit & 15+ Stories
thehackernews.com/2026/02/thre...

26.02.2026 16:09 — 👍 0    🔁 0    💬 0    📌 0
Preview
New $300 Android RAT With Automated Permission Bypass and Hidden Remote Control A newly discovered Android Remote Access Trojan (RAT) named Oblivion is raising serious concerns across the mobile security community. Sold on a public hacking forum for as little as $300 a month, thi...

New $300 Android RAT With Automated Permission Bypass and Hidden Remote Control
cybersecuritynews.com/new-300-andr...

26.02.2026 16:08 — 👍 0    🔁 0    💬 0    📌 0
Preview
Steaelite RAT Fuels New Wave of Double Extortion Threats Targeting Enterprises Steaelite RAT combines data theft and ransomware in one panel, sold as an easy-to-use Windows malware on cybercrime forums.

Steaelite RAT Fuels New Wave of Double Extortion Threats Targeting Enterprises
cybersecuritynews.com/steaelite-ra...

26.02.2026 16:06 — 👍 0    🔁 0    💬 0    📌 0
Preview
Wireshark 4.6.4 Released to Patch Multiple Security Vulnerabilities Wireshark has released version 4.6.4, delivering security and stability fixes that address several denial‑of‑service risks and multiple crashes in protocol dissectors and tools.

Wireshark 4.6.4 Released to Patch Multiple Security Vulnerabilities
gbhackers.com/wireshark-4-...

26.02.2026 16:04 — 👍 0    🔁 0    💬 0    📌 0
Preview
Notorious ransomware gang allegedly blackmailed by fake FSB officer There is a certain poetic justice in a cybersecurity-related story that has emerged from Moscow this week: A man has been accused of trying to extort money.

Notorious ransomware gang allegedly blackmailed by fake FSB officer
www.bitdefender.com/en-us/blog/h...

26.02.2026 16:04 — 👍 0    🔁 0    💬 0    📌 0
Preview
Critical ServiceNow AI Platform Vulnerability Enables Remote Code Execution ServiceNow addressed a vulnerability in its AI Platform that could allow unauthenticated attackers to execute arbitrary remote code.

Critical ServiceNow AI Platform Vulnerability Enables Remote Code Execution
cybersecuritynews.com/servicenow-a...

26.02.2026 16:02 — 👍 0    🔁 0    💬 0    📌 0
Preview
OAuth Gone Wrong A reused expired refresh token caused widespread login failures in our Node.js app. This article shows how it happened, how we fixed it, and how to avoid it.

OAuth Gone Wrong: The Hidden Token Issue That Brought Down Our Login System
dzone.com/articles/oau...

26.02.2026 16:01 — 👍 0    🔁 0    💬 0    📌 0
Preview
Malicious Ads Bypass Google Ads Screening via New Campaign Platform Exploit A sophisticated cloaking platform called 1Campaign, designed to help attackers run malicious Google Ads campaigns while evading detection.

Malicious Ads Bypass Google Ads Screening via New Campaign Platform Exploit
gbhackers.com/google-ads-s...

26.02.2026 16:00 — 👍 0    🔁 0    💬 0    📌 0