Vue normale

Il y a de nouveaux articles disponibles, cliquez pour rafraîchir la page.
Hier — 13 janvier 2026Securité

Convincing LinkedIn comment-reply tactic used in new phishing

Par : Ax Sharma
13 janvier 2026 à 16:45
Scammers are flooding LinkedIn posts with fake "reply" comments that appear to come from the platform, warning of bogus policy violations and urging users to click external links. Some even abuse LinkedIn's official lnkd.in shortener, making the phishing attempts harder to spot. [...]

Target employees confirm leaked source code is authentic

Par : Ax Sharma
13 janvier 2026 à 14:08
Multiple current and former Target employees confirmed that leaked source code samples posted by a threat actor match real internal systems. The company also rolled out an "accelerated" lockdown of its Git server, requiring VPN access, a day after being contacted by BleepingComputer. [...]

Long-Running Web Skimming Campaign Steals Credit Cards From Online Checkout Pages

Cybersecurity researchers have discovered a major web skimming campaign that has been active since January 2022, targeting several major payment networks like American Express, Diners Club, Discover, JCB Co., Ltd., Mastercard, and UnionPay. "Enterprise organizations that are clients of these payment providers are the most likely to be impacted," Silent Push said in a report published today.

Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool

Cybersecurity researchers have disclosed details of a malicious Google Chrome extension that's capable of stealing API keys associated with MEXC, a centralized cryptocurrency exchange (CEX) available in over 170 countries, while masquerading as a tool to automate trading on the platform. The extension, named MEXC API Automator (ID: pppdfgkfdemgfknfnhpkibbkabhghhfh), has 29 downloads and is still

Il y a un nouvel acteur dans le monde des IA, il s’appelle Confer, mise sur la confidentialité et pourrait tout changer

13 janvier 2026 à 16:56

Annoncé dans un article du média américain Ars Technica le 13 janvier 2026, Confer ambitionne de révolutionner le secteur des LLM en plaçant la confidentialité au cœur de son fonctionnement. Son concepteur n’en est pas à son coup d’essai, il a déjà imposé l’une de ses technologies dans le domaine des messageries chiffrées : le protocole Signal.

Le réseau interne, angle mort du Zero Trust

Par : UnderNews
13 janvier 2026 à 14:52

Le principe du Zero Trust semble limpide : ne jamais faire confiance, toujours vérifier. Ce modèle s’est imposé comme un standard de sécurité pour les organisations modernes. Mais dans la réalité du terrain, il s’arrête trop tôt : encore trop souvent réduit à sa seule dimension d’accès distant, il s’efface dès qu’on franchit le périmètre […]

The post Le réseau interne, angle mort du Zero Trust first appeared on UnderNews.

[Webinar] Securing Agentic AI: From MCPs and Tool Access to Shadow API Key Sprawl

AI agents are no longer just writing code. They are executing it. Tools like Copilot, Claude Code, and Codex can now build, test, and deploy software end-to-end in minutes. That speed is reshaping engineering—but it’s also creating a security gap most teams don’t see until something breaks. Behind every agentic workflow sits a layer few organizations are actively securing: Machine Control

Target employees confirm leaked code after 'accelerated' Git lockdown

Par : Ax Sharma
13 janvier 2026 à 14:08
Multiple current and former Target employees confirmed that leaked source code samples posted by a threat actor match real internal systems. The company also rolled out an "accelerated" lockdown of its Git server, requiring VPN access, a day after being contacted by BleepingComputer. [...]

L’IA du Pentagone « ne sera pas woke », Grok intègre officiellement le réseau de l’armée américaine

13 janvier 2026 à 14:40

Le 12 janvier 2026, le secrétaire à la Défense Pete Hegseth a annoncé l’intégration imminente de Grok à la plateforme interne d’intelligence artificielle générative du Pentagone, GenAI.mil. Cette décision concrétise un accord de 200 millions de dollars conclu entre le Département de la Défense et xAI, la société fondée par Elon Musk et à l’origine du chatbot.

New Advanced Linux VoidLink Malware Targets Cloud and container Environments

Cybersecurity researchers have disclosed details of a previously undocumented and feature-rich malware framework codenamed VoidLink that's specifically designed for long-term, stealthy access to Linux-based cloud environments According to a new report from Check Point Research, the cloud-native Linux malware framework comprises an array of custom loaders, implants, rootkits, and modular

What Should We Learn From How Attackers Leveraged AI in 2025?

Old Playbook, New Scale: While defenders are chasing trends, attackers are optimizing the basics The security industry loves talking about "new" threats. AI-powered attacks. Quantum-resistant encryption. Zero-trust architectures. But looking around, it seems like the most effective attacks in 2025 are pretty much the same as they were in 2015. Attackers are exploiting the same entry points that

❌
❌