Philippe Vynckier's Avatar

Philippe Vynckier

@pvynckier.bsky.social

Senior advisor, Security Expert, Cyber ​​Threat Expert Threat monitoring, security analysis, risk analysis, business continuity planning, disaster recovery planning, vulnerability management, threat assessment, malware, Ransomware and incident response...

1,583 Followers  |  2,662 Following  |  10,026 Posts  |  Joined: 18.11.2024
Posts Following

Posts by Philippe Vynckier (@pvynckier.bsky.social)

Preview
Une vuln�rabilit� du Wi-Fi permet de contourner le chiffrement des r�seaux domestiques et professionnels gr�ce aux attaques AirSnitch, l'isolation des clients Wi-Fi est � fondamentalement d�faillante ... Les chercheurs de l'universit� de Californie � Riverside ont d�couvert que l'isolation des clients Wi-Fi �tait � fondamentalement d�faillante �. Les nouvelles attaques AirSnitch permettent l'injection...

Une vulnérabilité du Wi-Fi permet de contourner le chiffrement des réseaux domestiques et professionnels grâce aux attaques AirSnitch, l'isolation des clients Wi-Fi est « fondamentalement défaillante » securite.developpez.com/actu/380725/...

03.03.2026 07:03 — 👍 0    🔁 0    💬 0    📌 0
Preview
Misinformation, AI images related to Iran conflict spreading online A secondary battlefield is being established online, with the spread of misinformation and fake images and videos related to the active conflict in the Middle East.

Iran-Israel news: How AI images are flooding social media www.cp24.com/news/2026/03...

03.03.2026 06:59 — 👍 0    🔁 0    💬 0    📌 0
Preview
UK warns of Iranian cyberattack risks amid Middle-East conflict The United Kingdom's National Cyber Security Centre (NCSC) alerted British organizations to a heightened risk of Iranian cyberattacks amid the ongoing conflict in the Middle East.

UK warns of Iranian cyberattack risks amid Middle-East conflict www.bleepingcomputer.com/news/securit...

03.03.2026 06:56 — 👍 0    🔁 0    💬 0    📌 0
Preview
Expect Iran to Launch Cyber-Attacks Globally, Warns Google John Hultquist suggests “aggressive” Iranian cyber attackers will target the US and its Gulf allies with plausibly deniable ransomware attacks, hacktivist campaigns and more

Expect Iran to Launch Cyber-Attacks Globally, Warns Google - Infosecurity Magazine www.infosecurity-magazine.com/news/iran-cy...

03.03.2026 06:51 — 👍 1    🔁 0    💬 0    📌 0
Preview
U.S. and Israel's Cyberattacks, Airstrikes Cause Iran's Digital Blackout U.S. and Israels Cyberattacks, Airstrikes Cause Irans Digital Blackout Hacked App Sent Pro-Israel Messages During Strikes; Cyberwarfare Redefines Conflict

U.S. and Israel's Cyberattacks, Airstrikes Cause Iran's Digital Blackout www.chosun.com/english/indu...

03.03.2026 06:50 — 👍 0    🔁 0    💬 0    📌 0
Preview
Iran conflict may trigger wave of cyberattacks: Palo Alto exec As geopolitical conflict escalates, cybersecurity expert says digital warfare will follow.

Iran conflict may trigger wave of geopolitical cyberattacks, Palo Alto executive warns | Euronews www.euronews.com/next/2026/03...

03.03.2026 06:47 — 👍 0    🔁 0    💬 0    📌 0
Preview
Hackers and internet outages hit Iran amid US air strikes | TechCrunch Users of a popular Iranian prayer app were flooded with phone notifications as U.S. air strikes hit Iran's biggest cities, killing the country's leader.

Hackers and internet outages hit Iran amid US air strikes | TechCrunch techcrunch.com/2026/03/02/h...

03.03.2026 06:46 — 👍 0    🔁 0    💬 0    📌 0
ITRnews - Le premier quotidien des marchés numériques

ITRnews - Le premier quotidien des marchés numériques itrnews.com/articles/208...

03.03.2026 06:43 — 👍 0    🔁 0    💬 0    📌 0
Preview
Le site de l’UNSS piraté : des photos et des données de collégiens et lycéens fuitent sur le darknet Un groupe de hackers a revendiqué le vol de centaines de milliers de photos et de données personnelles d’élèves scolarisés en collèges et lycées, conservées par l’Union nationale du sport scolaire (UN...

Le site de l’UNSS piraté : des photos et des données de collégiens et lycéens fuitent sur le darknet www.ouest-france.fr/education/le...

03.03.2026 06:38 — 👍 0    🔁 0    💬 0    📌 0
Preview
Cyberattaque chez Cegedim : la case "commentaires" est un risque que les entreprises sous-estiment Une cyberattaque rappelle que le principal risque ne vient pas toujours des données collectées, mais des annotations internes. Les champs de "commentaires libres " créent un risque juridique majeur.

Cyberattaque chez Cegedim : la case "commentaires" est un risque que les entreprises sous-estiment www.journaldunet.com/cybersecurit...

03.03.2026 06:36 — 👍 0    🔁 0    💬 0    📌 0
Preview
Geo News hit by cyberattack KARACHI: Geo TV wants to inform its viewers that over the past 24 hours, certain elements have been attempting to hack Geo News—which broadcasts on Pakistan’s satellite, Paksat—and...

Geo News hit by cyberattack www.thenews.pk/print/140227...

02.03.2026 06:53 — 👍 0    🔁 0    💬 0    📌 0
Preview
MyData Ransomware Attack on PYRAMIS METALLOURGIA S.A. - DeXpose Discover the MyData ransomware attack against Greece's PYRAMIS METALLOURGIA S.A., a leader in household electrical appliances.

MyData Ransomware Attack on PYRAMIS METALLOURGIA S.A. - DeXpose www.dexpose.io/mydata-ranso...

02.03.2026 06:51 — 👍 0    🔁 0    💬 0    📌 0
Preview
Bitcoin contre la menace quantique : Le nouveau plan de défense BIP 360 est publié Le BIP 360 est une avancée pour la sécurité du Bitcoin qui vise à renforcer la résistance aux ordinateurs quantiques.

Bitcoin contre la menace quantique : Le nouveau plan de défense BIP 360 est publié - Journal du Coin journalducoin.com/bitcoin/bitc...

02.03.2026 06:48 — 👍 0    🔁 0    💬 0    📌 0
Preview
Cyberattaque à Bercy : vos données bancaires sont-elles en danger ? Le piratage du Ficoba expose des millions de comptes bancaires. Risques réels, données concernées et mesures à adopter pour protéger votre épargne.

Cyberattaque à Bercy : vos données bancaires sont-elles en danger ? www.bdor.fr/actualites-o...

02.03.2026 06:42 — 👍 1    🔁 2    💬 0    📌 0
Preview
Eiffage ciblée par les hackers de LAPSUS$, 175 000 personnes concernées Repéré par Christophe Boutry, ancien enquêteur judiciaire spécialisé en contre-terrorisme et expert en investigations numériques, le piratage d'Eiffage via la plateforme NextSend touche près de 176 00...

Eiffage ciblée par les hackers de LAPSUS$, 175 000 personnes concernées www.clubic.com/actualite-60...

02.03.2026 06:41 — 👍 0    🔁 0    💬 0    📌 0
Preview
Windows Webdav Flaw Fuels Stealth Malware Spread Arabian Post Windows Webdav Flaw Fuels Stealth Malware Spread Arabian Post. <img decoding=async alt= border=0 width=320 data-original-height=667 data-original-width=1000 src=https://easy-software.com/wp-content/u...

Windows Webdav Flaw Fuels Stealth Malware Spread Arabian Post menafn.com/1110804689/W...

02.03.2026 06:39 — 👍 0    🔁 0    💬 0    📌 0
Preview
The rising shadow of python malware: A national call to digital vigilance - Businessday NG There are moments in the evolution of a nation when a single incident, seemingly isolated, exposes a deeper and more troubling reality...

The rising shadow of python malware: A national call to digital vigilance - Businessday NG businessday.ng/opinion/arti...

02.03.2026 06:37 — 👍 0    🔁 0    💬 0    📌 0
Preview
APT37’s Ruby Jumper Malware Targets Air-Gapped Windows Networks with USB-Based Attacks Executive SummaryIn late 2025, the North Korean advanced persistent threat group APT37 (also known as ScarCruft, Ruby Sleet, and Velvet Chollima) was observed deploying a new, highly sophisticated mal...

APT37’s Ruby Jumper Malware Targets Air-Gapped Windows Networks with USB-Based Attacks www.rescana.com/post/apt37-s...

02.03.2026 06:35 — 👍 1    🔁 0    💬 0    📌 0
Preview
Le TPM 2.0 est-il un réel standard de confiance pour les environnements professionnels ? La sécurité des systèmes d’information est devenue le nerf de la guerre pour les entreprises françaises. En 2024, 59% des entreprises françaises déclaraient avoir été victimes d’au moins une cyberatta...

Le TPM 2.0 est-il un réel standard de confiance pour les environnements professionnels ? www.economiematin.fr/entreprise-s...

02.03.2026 06:33 — 👍 0    🔁 0    💬 0    📌 0
Preview
Fake Zoom and Google Meet Phishing Campaigns Deploy Teramind Surveillance Software Threat actors are executing sophisticated phishing campaigns that impersonate Zoom and Google Meet to silently deploy Teramind onto Windows devices.

Fake Zoom and Google Meet Phishing Campaigns Deploy Teramind Surveillance Software gbhackers.com/fake-zoom-an...

01.03.2026 13:30 — 👍 1    🔁 0    💬 0    📌 0
Preview
Researchers Unveil Aeternum C2 Infrastructure with Advanced Evasion and Persistence Tactics For years, defenders have relied on a simple strategy to dismantle botnets find and seize their command-and-control (C2) servers.

Researchers Unveil Aeternum C2 Infrastructure with Advanced Evasion and Persistence Tactics gbhackers.com/aeternum-c2-...

01.03.2026 13:28 — 👍 1    🔁 0    💬 0    📌 0
Preview
Stored XSS Vulnerability in RustFS Console Puts S3 Admin Credentials at Risk A critical security flaw has been identified in the RustFS Console, exposing administrators to a high risk of account takeover.

Stored XSS Vulnerability in RustFS Console Puts S3 Admin Credentials at Risk gbhackers.com/stored-xss-v...

01.03.2026 13:27 — 👍 2    🔁 0    💬 0    📌 0
Preview
Study Finds 87% of Organizations Exposed to Attacks Due to Known Vulnerabilities 87% of organisations operate deployed services containing known exploitable vulnerabilities, impact 40% of all services.

Study Finds 87% of Organizations Exposed to Attacks Due to Known Vulnerabilities gbhackers.com/study-finds-...

01.03.2026 13:25 — 👍 0    🔁 0    💬 0    📌 0
Preview
Dohdoor Malware Targets U.S. Schools and Healthcare with Multi-Stage Attack A new backdoor dubbed Dohdoor is actively targeting schools and health care organizations in the United States through a stealthy multi-stage attack chain.

Dohdoor Malware Targets U.S. Schools and Healthcare with Multi-Stage Attack gbhackers.com/dohdoor-malw...

01.03.2026 13:24 — 👍 0    🔁 0    💬 0    📌 0
Preview
North Korea’s APT37 Expands Toolkit to Breach Air-Gapped Networks The security researchers from Zscaler ThreatLabz have also discovered five new tools deployed by the North Korean hacking group

North Korea’s APT37 Expands Toolkit to Breach Air-Gapped Networks - Infosecurity Magazine www.infosecurity-magazine.com/news/north-k...

01.03.2026 13:20 — 👍 1    🔁 1    💬 0    📌 0
Preview
Darktrace Flags 32 Million Phishing Emails in 2025 as Identity Attacks 2025 saw 32M phishing emails, with identity threats surpassing vulnerabilities

Darktrace Flags 32 Million Phishing Emails in 2025 as Identity Attacks - Infosecurity Magazine www.infosecurity-magazine.com/news/32m-phi...

01.03.2026 13:15 — 👍 1    🔁 0    💬 0    📌 0
Preview
UK Vulnerability Monitoring Service Cuts Unresolved Security Flaws by The UK government says its new Vulnerability Monitoring Service has cut unresolved security flaws by 75% and reduced cyber-attack fix times from nearly two months to just over a week

UK Vulnerability Monitoring Service Cuts Unresolved Security Flaws - Infosecurity Magazine www.infosecurity-magazine.com/news/uk-vuln...

01.03.2026 13:13 — 👍 1    🔁 0    💬 0    📌 0
Preview
Aeternum Botnet Shifts Command Control to Polygon Blockchain New botnet Aeternum shifted C2 operations to Polygon blockchain, complicating takedown efforts

Aeternum Botnet Shifts Command Control to Polygon Blockchain - Infosecurity Magazine www.infosecurity-magazine.com/news/aeternu...

01.03.2026 13:11 — 👍 1    🔁 0    💬 0    📌 0
Preview
Microsoft Teams has benefited from a slew of February updates There is a lot to dislike about Microsoft Teams, but Microsoft is continuing to make significant changes and additions that may just start to pull the

Microsoft Teams has benefited from a slew of February updates - BetaNews betanews.com/article/micr...

01.03.2026 13:08 — 👍 2    🔁 0    💬 0    📌 0
Preview
87 percent of organizations run software with known exploitable vulnerabilities A new report from Datadog finds that 87 percent of organizations have at least one known exploitable vulnerability in their deployed services.

87 percent of organizations run software with known exploitable vulnerabilities - BetaNews betanews.com/article/87-p...

01.03.2026 13:06 — 👍 1    🔁 0    💬 0    📌 0