Philippe Vynckier's Avatar

Philippe Vynckier

@pvynckier.bsky.social

Senior advisor, Security Expert, Cyber ​​Threat Expert Threat monitoring, security analysis, risk analysis, business continuity planning, disaster recovery planning, vulnerability management, threat assessment, malware, Ransomware and incident response...

1,582 Followers  |  2,661 Following  |  10,016 Posts  |  Joined: 18.11.2024
Posts Following

Posts by Philippe Vynckier (@pvynckier.bsky.social)

Preview
Geo News hit by cyberattack KARACHI: Geo TV wants to inform its viewers that over the past 24 hours, certain elements have been attempting to hack Geo News—which broadcasts on Pakistan’s satellite, Paksat—and...

Geo News hit by cyberattack www.thenews.pk/print/140227...

02.03.2026 06:53 — 👍 0    🔁 0    💬 0    📌 0
Preview
MyData Ransomware Attack on PYRAMIS METALLOURGIA S.A. - DeXpose Discover the MyData ransomware attack against Greece's PYRAMIS METALLOURGIA S.A., a leader in household electrical appliances.

MyData Ransomware Attack on PYRAMIS METALLOURGIA S.A. - DeXpose www.dexpose.io/mydata-ranso...

02.03.2026 06:51 — 👍 0    🔁 0    💬 0    📌 0
Preview
Bitcoin contre la menace quantique : Le nouveau plan de défense BIP 360 est publié Le BIP 360 est une avancée pour la sécurité du Bitcoin qui vise à renforcer la résistance aux ordinateurs quantiques.

Bitcoin contre la menace quantique : Le nouveau plan de défense BIP 360 est publié - Journal du Coin journalducoin.com/bitcoin/bitc...

02.03.2026 06:48 — 👍 0    🔁 0    💬 0    📌 0
Preview
Cyberattaque à Bercy : vos données bancaires sont-elles en danger ? Le piratage du Ficoba expose des millions de comptes bancaires. Risques réels, données concernées et mesures à adopter pour protéger votre épargne.

Cyberattaque à Bercy : vos données bancaires sont-elles en danger ? www.bdor.fr/actualites-o...

02.03.2026 06:42 — 👍 1    🔁 2    💬 0    📌 0
Preview
Eiffage ciblée par les hackers de LAPSUS$, 175 000 personnes concernées Repéré par Christophe Boutry, ancien enquêteur judiciaire spécialisé en contre-terrorisme et expert en investigations numériques, le piratage d'Eiffage via la plateforme NextSend touche près de 176 00...

Eiffage ciblée par les hackers de LAPSUS$, 175 000 personnes concernées www.clubic.com/actualite-60...

02.03.2026 06:41 — 👍 0    🔁 0    💬 0    📌 0
Preview
Windows Webdav Flaw Fuels Stealth Malware Spread Arabian Post Windows Webdav Flaw Fuels Stealth Malware Spread Arabian Post. <img decoding=async alt= border=0 width=320 data-original-height=667 data-original-width=1000 src=https://easy-software.com/wp-content/u...

Windows Webdav Flaw Fuels Stealth Malware Spread Arabian Post menafn.com/1110804689/W...

02.03.2026 06:39 — 👍 0    🔁 0    💬 0    📌 0
Preview
The rising shadow of python malware: A national call to digital vigilance - Businessday NG There are moments in the evolution of a nation when a single incident, seemingly isolated, exposes a deeper and more troubling reality...

The rising shadow of python malware: A national call to digital vigilance - Businessday NG businessday.ng/opinion/arti...

02.03.2026 06:37 — 👍 0    🔁 0    💬 0    📌 0
Preview
APT37’s Ruby Jumper Malware Targets Air-Gapped Windows Networks with USB-Based Attacks Executive SummaryIn late 2025, the North Korean advanced persistent threat group APT37 (also known as ScarCruft, Ruby Sleet, and Velvet Chollima) was observed deploying a new, highly sophisticated mal...

APT37’s Ruby Jumper Malware Targets Air-Gapped Windows Networks with USB-Based Attacks www.rescana.com/post/apt37-s...

02.03.2026 06:35 — 👍 0    🔁 0    💬 0    📌 0
Preview
Le TPM 2.0 est-il un réel standard de confiance pour les environnements professionnels ? La sécurité des systèmes d’information est devenue le nerf de la guerre pour les entreprises françaises. En 2024, 59% des entreprises françaises déclaraient avoir été victimes d’au moins une cyberatta...

Le TPM 2.0 est-il un réel standard de confiance pour les environnements professionnels ? www.economiematin.fr/entreprise-s...

02.03.2026 06:33 — 👍 0    🔁 0    💬 0    📌 0
Preview
Fake Zoom and Google Meet Phishing Campaigns Deploy Teramind Surveillance Software Threat actors are executing sophisticated phishing campaigns that impersonate Zoom and Google Meet to silently deploy Teramind onto Windows devices.

Fake Zoom and Google Meet Phishing Campaigns Deploy Teramind Surveillance Software gbhackers.com/fake-zoom-an...

01.03.2026 13:30 — 👍 1    🔁 0    💬 0    📌 0
Preview
Researchers Unveil Aeternum C2 Infrastructure with Advanced Evasion and Persistence Tactics For years, defenders have relied on a simple strategy to dismantle botnets find and seize their command-and-control (C2) servers.

Researchers Unveil Aeternum C2 Infrastructure with Advanced Evasion and Persistence Tactics gbhackers.com/aeternum-c2-...

01.03.2026 13:28 — 👍 1    🔁 0    💬 0    📌 0
Preview
Stored XSS Vulnerability in RustFS Console Puts S3 Admin Credentials at Risk A critical security flaw has been identified in the RustFS Console, exposing administrators to a high risk of account takeover.

Stored XSS Vulnerability in RustFS Console Puts S3 Admin Credentials at Risk gbhackers.com/stored-xss-v...

01.03.2026 13:27 — 👍 2    🔁 0    💬 0    📌 0
Preview
Study Finds 87% of Organizations Exposed to Attacks Due to Known Vulnerabilities 87% of organisations operate deployed services containing known exploitable vulnerabilities, impact 40% of all services.

Study Finds 87% of Organizations Exposed to Attacks Due to Known Vulnerabilities gbhackers.com/study-finds-...

01.03.2026 13:25 — 👍 0    🔁 0    💬 0    📌 0
Preview
Dohdoor Malware Targets U.S. Schools and Healthcare with Multi-Stage Attack A new backdoor dubbed Dohdoor is actively targeting schools and health care organizations in the United States through a stealthy multi-stage attack chain.

Dohdoor Malware Targets U.S. Schools and Healthcare with Multi-Stage Attack gbhackers.com/dohdoor-malw...

01.03.2026 13:24 — 👍 0    🔁 0    💬 0    📌 0
Preview
North Korea’s APT37 Expands Toolkit to Breach Air-Gapped Networks The security researchers from Zscaler ThreatLabz have also discovered five new tools deployed by the North Korean hacking group

North Korea’s APT37 Expands Toolkit to Breach Air-Gapped Networks - Infosecurity Magazine www.infosecurity-magazine.com/news/north-k...

01.03.2026 13:20 — 👍 1    🔁 1    💬 0    📌 0
Preview
Darktrace Flags 32 Million Phishing Emails in 2025 as Identity Attacks 2025 saw 32M phishing emails, with identity threats surpassing vulnerabilities

Darktrace Flags 32 Million Phishing Emails in 2025 as Identity Attacks - Infosecurity Magazine www.infosecurity-magazine.com/news/32m-phi...

01.03.2026 13:15 — 👍 1    🔁 0    💬 0    📌 0
Preview
UK Vulnerability Monitoring Service Cuts Unresolved Security Flaws by The UK government says its new Vulnerability Monitoring Service has cut unresolved security flaws by 75% and reduced cyber-attack fix times from nearly two months to just over a week

UK Vulnerability Monitoring Service Cuts Unresolved Security Flaws - Infosecurity Magazine www.infosecurity-magazine.com/news/uk-vuln...

01.03.2026 13:13 — 👍 1    🔁 0    💬 0    📌 0
Preview
Aeternum Botnet Shifts Command Control to Polygon Blockchain New botnet Aeternum shifted C2 operations to Polygon blockchain, complicating takedown efforts

Aeternum Botnet Shifts Command Control to Polygon Blockchain - Infosecurity Magazine www.infosecurity-magazine.com/news/aeternu...

01.03.2026 13:11 — 👍 1    🔁 0    💬 0    📌 0
Preview
Microsoft Teams has benefited from a slew of February updates There is a lot to dislike about Microsoft Teams, but Microsoft is continuing to make significant changes and additions that may just start to pull the

Microsoft Teams has benefited from a slew of February updates - BetaNews betanews.com/article/micr...

01.03.2026 13:08 — 👍 2    🔁 0    💬 0    📌 0
Preview
87 percent of organizations run software with known exploitable vulnerabilities A new report from Datadog finds that 87 percent of organizations have at least one known exploitable vulnerability in their deployed services.

87 percent of organizations run software with known exploitable vulnerabilities - BetaNews betanews.com/article/87-p...

01.03.2026 13:06 — 👍 1    🔁 0    💬 0    📌 0
Preview
Ransomware activity peaks outside business hours - Help Net Security Identity driven breaches dominate incidents, with fast directory access and off hours ransomware activity.

Ransomware activity peaks outside business hours - Help Net Security www.helpnetsecurity.com/2026/02/27/s...

01.03.2026 13:03 — 👍 1    🔁 0    💬 0    📌 0
Preview
The CISO role keeps getting heavier - Help Net Security CISO liability concerns rise as AI governance expands and risk management pressures grow across security operations and boards.

The CISO role keeps getting heavier - Help Net Security www.helpnetsecurity.com/2026/02/27/s...

01.03.2026 13:01 — 👍 2    🔁 0    💬 0    📌 0
Preview
Industrial networks continue to leak onto the internet - Help Net Security OT internet exposure is rising, with millions of industrial devices reachable online and long precursor windows for detection.

Industrial networks continue to leak onto the internet - Help Net Security www.helpnetsecurity.com/2026/02/27/o...

01.03.2026 12:58 — 👍 1    🔁 0    💬 0    📌 0
Preview
Industrial networks continue to leak onto the internet - Help Net Security OT internet exposure is rising, with millions of industrial devices reachable online and long precursor windows for detection.

Industrial networks continue to leak onto the internet - Help Net Security www.helpnetsecurity.com/2026/02/27/o...

01.03.2026 12:57 — 👍 1    🔁 0    💬 0    📌 0
Preview
Europol goes after The Com's ransomware and extortion networks - Help Net Security Europol's Project Compass made 30 The Com network arrests in year one, with 179 suspects identified across a large law enforcement operation.

Europol goes after The Com's ransomware and extortion networks - Help Net Security www.helpnetsecurity.com/2026/02/27/e...

01.03.2026 12:55 — 👍 1    🔁 0    💬 0    📌 0
Preview
ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket OpenClaw patches ClawJacked flaw, log poisoning bug, and multiple CVEs as 71 malicious ClawHub skills spread malware and crypto scams.

ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket thehackernews.com/2026/02/claw...

01.03.2026 12:51 — 👍 2    🔁 0    💬 0    📌 0
Preview
Pentagon Designates Anthropic Supply Chain Risk Over AI Military Dispute Pentagon labels Anthropic a supply chain risk after dispute over mass surveillance and autonomous weapons use.

Pentagon Designates Anthropic Supply Chain Risk Over AI Military Dispute thehackernews.com/2026/02/pent...

01.03.2026 12:50 — 👍 1    🔁 0    💬 0    📌 0
Preview
OpenClaw: The AI Agent Security Crisis Unfolding Right Now OpenClaw's rapid adoption has exposed critical security vulnerabilities. Learn how Reco detects AI agent integrations in your SaaS environment before it's too late.

OpenClaw Security Crisis: Detect AI Agent Risks www.reco.ai/blog/opencla...

01.03.2026 12:48 — 👍 2    🔁 0    💬 0    📌 0
Preview
ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks North Korea-linked ScarCruft’s Ruby Jumper uses Zoho WorkDrive C2 and USB malware to breach air-gapped systems for surveillance.

ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks thehackernews.com/2026/02/scar...

01.03.2026 12:46 — 👍 2    🔁 0    💬 0    📌 0
Preview
Iran Has One Card Left—It’s Pointed at Your Network U.S.–Israel strikes have stripped Iran of most conventional leverage.What’s left?Cyberspace.APT groups. Proxies. Ransomware crews. And U.S. critical infrastructure that still isn’t ready.A cornered re...

Iran Has One Card Left—It’s Pointed at Your Network - Security Boulevard securityboulevard.com/2026/02/iran...

01.03.2026 12:43 — 👍 1    🔁 0    💬 0    📌 0