Philippe Vynckier's Avatar

Philippe Vynckier

@pvynckier.bsky.social

Senior advisor, Security Expert, Cyber ​​Threat Expert Threat monitoring, security analysis, risk analysis, business continuity planning, disaster recovery planning, vulnerability management, threat assessment, malware, Ransomware and incident response...

1,583 Followers  |  2,664 Following  |  10,080 Posts  |  Joined: 18.11.2024
Posts Following

Posts by Philippe Vynckier (@pvynckier.bsky.social)

Preview
Élaborer une stratégie résiliente en matière de souveraineté des données : un juste équilibre entre contrôle et agilité La souveraineté des données, portée par le RGPD et de nouvelles règles européennes, devient un enjeu stratégique. Elle doit concilier conformité, portabilité et résilience.

Élaborer une stratégie résiliente en matière de souveraineté des données : un juste équilibre entre contrôle et agilité www.journaldunet.com/cybersecurit...

05.03.2026 07:13 — 👍 0    🔁 0    💬 0    📌 0
Preview
Israel says it knocked out Iran’s cyber warfare headquarters But it’s unclear if the strike has fully taken out Iran’s ability to launch cyberattacks as the Middle East war expands.

Israel says it knocked out Iran’s cyber warfare headquarters - POLITICO www.politico.com/news/2026/03...

05.03.2026 06:55 — 👍 0    🔁 0    💬 0    📌 0
Preview
belfor.io Adaptive Human Risk Management

Cybersécurité : Belfor.io revisite la sensibilisation | LeMagIT www.lemagit.fr/actualites/3...
Par @valerymarchive.bsky.social

05.03.2026 06:48 — 👍 1    🔁 0    💬 0    📌 0
Preview
Pourquoi les managers doivent être formés à la cybersécurité | LeMagIT Beaucoup de patrons de PME et d’ETI restent convaincus que les cyberattaques n’arrivent qu’aux autres. L’Anssi, les Campus Cyber et les organismes de formation ont créé des formations ultracourtes pou...

Pourquoi les managers doivent être formés à la cybersécurité | LeMagIT www.lemagit.fr/actualites/3...

05.03.2026 06:42 — 👍 2    🔁 0    💬 0    📌 0
Preview
La 5G à l'abri de la menace quantique ? Cette innovation française peut tout changer Thales assure que sa solution peut protéger les cartes SIM et eSIM.

La 5G à l'abri de la menace quantique ? Cette innovation française peut tout changer www.iphon.fr/post/5g-prot...

05.03.2026 06:40 — 👍 4    🔁 0    💬 0    📌 0
Preview
Coalition of Western Countries Launches 6G Cybersecurity Guidelines A coalition of seven Western nations has launched guidelines to help integrate security-by-design principles into future 6G standards

Coalition of Western Countries Launches 6G Cybersecurity Guidelines - Infosecurity Magazine www.infosecurity-magazine.com/news/gcot-6g...

05.03.2026 06:37 — 👍 0    🔁 0    💬 0    📌 0
Preview
Cybersecurity & Privacy 2026: Enforcement & Regulatory Trends

Cybersecurity & Privacy 2026: Enforcement & Regulatory Trends – Publications www.morganlewis.com/pubs/2026/03...

05.03.2026 06:34 — 👍 0    🔁 0    💬 0    📌 0
Preview
Home Leaders League offers media and business services for leaders. We provide strategic information, company rankings, and B to B networking events.

EU cybersecurity regulation: navigating NIS2 and DORA impacts - Leaders League www.leadersleague.com/en/news/eu-c...

05.03.2026 06:33 — 👍 0    🔁 0    💬 0    📌 0

Strengthening cybersecurity this National Slam the Scam Day | McKinsey & Company www.mckinsey.com/featured-ins...

05.03.2026 06:31 — 👍 0    🔁 0    💬 0    📌 0
Preview
How a Brute Force Attack Unmasked a Ransomware Infrastructure Network A routine RDP brute-force alert led to unusual credential hunting and a geo-distributed VPN-linked infrastructure. Huntress Labs explains how one compromised login unraveled a suspected ransomware-as-...

How a Brute Force Attack Unmasked a Ransomware Infrastructure Network www.bleepingcomputer.com/news/securit...

05.03.2026 06:28 — 👍 1    🔁 1    💬 0    📌 0
Preview
Akira Ransomware Attack on BK Group: Major Data Compromise - DeXpose Akira ransomware strikes BK Group, threatening to leak 89GB of sensitive data, impacting Germany's construction sector.

Akira Ransomware Attack on BK Group: Major Data Compromise - DeXpose www.dexpose.io/akira-ransom...

05.03.2026 06:26 — 👍 0    🔁 0    💬 0    📌 0
Preview
Cydome report finds 150% surge in maritime OT cyberattacks as ransomware tightens grip in 2025 - Industrial Cyber A new Cydome report finds a 150% surge in maritime OT cyberattacks as ransomware attacks tighten grip in 2025.

Cydome report finds 150% surge in maritime OT cyberattacks as ransomware tightens grip in 2025 - Industrial Cyber industrialcyber.co/transport/cy...

05.03.2026 06:25 — 👍 0    🔁 0    💬 0    📌 0
Preview
AI Is Supercharging Ransomware. Is Cyber Insurance at Risk? Beazley’s Head of U.S. Cyber, Melissa Carmichael, breaks down the mounting pressures in the 2026 cyber insurance market and explains how insurers are balancing profitability, coverage, and emerging ri...

AI Is Supercharging Ransomware. Is Cyber Insurance at Risk? - Insurance Journal TV www.insurancejournal.tv/videos/26434/

05.03.2026 06:23 — 👍 0    🔁 0    💬 0    📌 0
Preview
Sensibilisation des jeunes sur la cybercriminalité | Général de division - Gendarmerie | Patrick Touak - IT SOCIAL Interview de Patrick Touak, Général de division à la Gendarmerie, réalisé lors de l'évènement Cybershow Paris

Sensibilisation des jeunes sur la cybercriminalité | Général de division - Gendarmerie | Patrick Touak - IT SOCIAL itsocial.fr/cybersecurit...

05.03.2026 03:24 — 👍 0    🔁 0    💬 0    📌 0
Preview
Forum INCYBER : des professionnels pour décrypter les enjeux de la cybersécurité Créé en 2007, le Forum international de la cybersécurité (INCYBER) constitue l’événement européen majeur dédié à la sécurité et à la confiance numériques. Cette année, il se tiendra au Grand Palais de...

Forum INCYBER : des professionnels pour décrypter les enjeux de la cybersécurité | Ministère de l'Intérieur www.interieur.gouv.fr/actualites/a...

05.03.2026 03:21 — 👍 0    🔁 0    💬 0    📌 0
Preview
Cyber Resilience as a Corporate Mindset Organizations that succeed are those that intentionally embed cyber resilience into their corporate mindset.

Cyber Resilience as a Corporate Mindset www.halcyon.ai/blog/cyber-r...

05.03.2026 03:19 — 👍 0    🔁 0    💬 0    📌 0
Preview
Surviving Ransomware: Best practices to safeguard your business By Robbie Ross, cyber security lead, Converged Communication Solutions It’s not if but when. This is a phrase that has been echoed across the cyber secu

Surviving Ransomware: Best practices to safeguard your business - IT Security Guru www.itsecurityguru.org/2026/03/03/s...

05.03.2026 03:17 — 👍 1    🔁 0    💬 0    📌 0
Preview
AI-Powered Ransomware threatens even Encrypted Backups Discover how AI‑powered ransomware can bypass defenses and target encrypted backups, escalating cyber risk and forcing stronger protection strategies.

AI‑Powered Ransomware Threatens Even Encrypted Backups www.cybersecurity-insiders.com/ai-powered-r...

05.03.2026 03:15 — 👍 1    🔁 0    💬 0    📌 0
Preview
5 years of shifting cybersecurity behavior - Help Net Security Cybersecurity behavior trends show rising confidence, uneven password habits, and record cybercrime victimization levels.

5 years of shifting cybersecurity behavior - Help Net Security www.helpnetsecurity.com/2026/03/03/n...

05.03.2026 03:13 — 👍 0    🔁 0    💬 0    📌 0
Preview
Why investing in cybersecurity just became a 'must-have' for CFOs | Fortune As geopolitical risks escalate, finance chiefs are increasingly treating security like any other material balance-sheet exposure.

Why investing in cybersecurity just became a 'must-have' for CFOs | Fortune fortune.com/2026/03/03/w...

05.03.2026 03:11 — 👍 0    🔁 0    💬 0    📌 0
Preview
Evolving Cloudflare’s Threat Intelligence Platform: actionable, scalable, and ETL-less Stop managing ETL pipelines and start threat hunting. Introducing new visualization, automation, and enrichment tools in the Cloudflare Threat Intelligence Platform to turn massive telemetry into inst...

Evolving Cloudflare’s Threat Intelligence Platform: actionable, scalable, and ETL-less blog.cloudflare.com/cloudflare-t...

05.03.2026 03:06 — 👍 0    🔁 0    💬 0    📌 0
Preview
Ransomware is now less about malware and more about impersonation Stolen passwords have replaced infectious code as the most common tactic in major breaches, Cloudflare said.

Ransomware is now less about malware and more about impersonation | Cybersecurity Dive www.cybersecuritydive.com/news/ransomw...

05.03.2026 03:03 — 👍 0    🔁 0    💬 0    📌 0
Preview
Fooling AI Agents: Web-Based Indirect Prompt Injection Observed in the Wild Uncover real-world indirect prompt injection attacks and learn how adversaries weaponize hidden web content to exploit LLMs for high-impact fraud.

Fooling AI Agents: Web-Based Indirect Prompt Injection Observed in the Wild unit42.paloaltonetworks.com/ai-agent-pro...

05.03.2026 03:01 — 👍 1    🔁 0    💬 0    📌 0
Preview
The Emerging Workload Security Threat, a Retrospective on VoidLink Explore how VoidLink, a malware framework, targets Kubernetes and AI workloads. Discover why kernel-level runtime security is the new frontline.

A Retrospective on Workload Security blogs.cisco.com/security/voi...

05.03.2026 02:59 — 👍 0    🔁 0    💬 0    📌 0
Preview
CISA report updates findings on RESURGE malware attacks | AHA News The Cybersecurity and Infrastructure Security Agency Feb. 26 released a report that updates findings from last year on RESURGE malware used to gain covert access to Ivanti Connect Secure devices. The ...

CISA report updates findings on RESURGE malware attacks | AHA News www.aha.org/news/headlin...

05.03.2026 02:57 — 👍 0    🔁 0    💬 0    📌 0
Preview
Veille Cyber N585 – 02 mars 2026 Veille hebdomadaire du 1er mars 2026 CyberStratégie /CyberDéfense / CyberSécurité – Protection des données / RGPD – Intelligence artificielle … Lettre Cyber 585 L’actualité…

Veille Cyber N585 – 02 mars 2026 | veillecyberland.wordpress.com/2026/03/04/v...

04.03.2026 13:53 — 👍 0    🔁 0    💬 0    📌 0
PANAME : l'ANSSI, la CNIL, le PERen, IPop et l'INRIA cherchent testeurs PANAME (Privacy Auditing of AI Models) est un outil pour auditer la confidentialité des modèles d’IA et prévoit le développement d’une bibliothèque logicielle disponible en tout ou partie en source ou...

PANAME : l'ANSSI, la CNIL, le PERen, IPop et l'INRIA cherchent testeurs www.programmez.com/actualites/p...

04.03.2026 08:39 — 👍 1    🔁 0    💬 0    📌 0
Preview
Un parcours en ligne expérimental pour les fichiers d'incidents bancaires Un parcours en ligne expérimental pour les fichiers d'incidents bancaires DPO PARTAGE

La CNIL repense l'accompagnement des personnes fichées www.dpo-partage.fr/la-cnil-repe...

04.03.2026 08:37 — 👍 1    🔁 0    💬 0    📌 0
Preview
4 OSINT Tools for Monitoring Iran and the Middle East The report identifies four open-source intelligence (OSINT) tools useful to examining US-Israel war against Iran and the situation in the Middle East.

4 OSINT Tools for Monitoring Iran and the Middle East www.specialeurasia.com/2026/03/03/4...

04.03.2026 08:32 — 👍 1    🔁 0    💬 0    📌 0
Preview
US banks on high alert for cyberattacks as Iran war escalates The U.S. financial services industry is on heightened alert for potential cyberattacks amid the unfolding U.S. war in Iran, with firms stepping up monitoring ‌for threats that often rise during period...

US banks on high alert for cyberattacks as Iran war escalates finance.yahoo.com/news/us-bank...

04.03.2026 08:29 — 👍 2    🔁 0    💬 0    📌 0