Philippe Tremblay 🇨🇦🇫🇷 🇺🇦 retweetledi
Philippe Tremblay 🇨🇦🇫🇷 🇺🇦
2.5K posts

Philippe Tremblay 🇨🇦🇫🇷 🇺🇦
@philtrem2000
Husband, father, teammate. IT Product Owner and Solution Architect with a passion for cloud, code and empowering teams.
Toronto Katılım Aralık 2008
2.1K Takip Edilen445 Takipçiler
Philippe Tremblay 🇨🇦🇫🇷 🇺🇦 retweetledi

Unit 42 | The npm Threat Landscape: Attack Surface and Mitigations unit42.paloaltonetworks.com/monitoring-npm…
English
Philippe Tremblay 🇨🇦🇫🇷 🇺🇦 retweetledi

Our investigation has revealed that the incident originated from a third-party AI tool with hundreds of users whose Google Workspace OAuth app was compromised.
We recommend that Google Workspace Administrators check for usage of this app immediately. #indicators-of-compromise-iocs" target="_blank" rel="nofollow noopener">vercel.com/kb/bulletin/ve…
English
Philippe Tremblay 🇨🇦🇫🇷 🇺🇦 retweetledi

@SocketSecurity We dug into this more: The blast radius is larger than it looks. Axios only needed to be resolved somewhere in the dependency graph during the window (e.g. via CLI tools, npx installs, CI jobs, etc). In some cases, you can check now and see nothing, even if it ran. 🫥
English
Philippe Tremblay 🇨🇦🇫🇷 🇺🇦 retweetledi
Philippe Tremblay 🇨🇦🇫🇷 🇺🇦 retweetledi

Best practices for securing Microsoft Intune
In view of the March 11, 2026 cyberattack against U.S.-based medical technology firm Stryker Corporation, which affected their Microsoft environment. Microsoft has newly released the following guidance:
techcommunity.microsoft.com/blog/intunecus…
English

@HackingDave @HackingDave Nice cut with a Jamie Diamon intro.
English

Here's my CNBC interview today on Iran.
TrustedSec@TrustedSec
"Things that were typically off the table before are now on the table as far as what Iran will be targeting and that's what we need to be concerned with." Watch @HackingDave talk about the #Stryker cyber attack and why in time of warfare the private sector is in scope. @CNBC
English
Philippe Tremblay 🇨🇦🇫🇷 🇺🇦 retweetledi

🚨 On 2/6/26, #BeyondTrust disclosed a critical RCE vulnerability affecting its Remote Support (RS) and Privileged Remote Access (PRA) products.
The flaw has been assigned CVE-2026-1731 and a near-maximum CVSSv4 score of 9.9.
More in the Rapid7 blog: r-7.co/4arAjln
English

RT @cyb3rops: Here’s how I currently see software development.
Imagine a farmer who grows cabbage.
He has one large field and several sma…
English
Philippe Tremblay 🇨🇦🇫🇷 🇺🇦 retweetledi
Philippe Tremblay 🇨🇦🇫🇷 🇺🇦 retweetledi
Philippe Tremblay 🇨🇦🇫🇷 🇺🇦 retweetledi

the brand new sensation
that’s sweeping your nation
it’s our special military operation
m.youtube.com/shorts/Xq4TpiK…
English
Philippe Tremblay 🇨🇦🇫🇷 🇺🇦 retweetledi

Google now lets you change your @gmail.com address, rolling out - @mayank_jee
bleepingcomputer.com/news/technolog…
bleepingcomputer.com/news/technolog…
English
Philippe Tremblay 🇨🇦🇫🇷 🇺🇦 retweetledi
Philippe Tremblay 🇨🇦🇫🇷 🇺🇦 retweetledi
Philippe Tremblay 🇨🇦🇫🇷 🇺🇦 retweetledi
Philippe Tremblay 🇨🇦🇫🇷 🇺🇦 retweetledi
Philippe Tremblay 🇨🇦🇫🇷 🇺🇦 retweetledi

The timelines in this CISA directive to patch F5 vulnerabilities are not grounded in the risk posed. The required remediation timelines have been artificially extended to ensure there's a possibility for compliance given staff impacted by the shutdowns.
cisa.gov/news-events/di…
English


















