Vue normale

Il y a de nouveaux articles disponibles, cliquez pour rafraîchir la page.
Aujourd’hui — 20 février 2026Securité

Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems

In yet another software supply chain attack, the open-source, artificial intelligence (AI)-powered coding assistant Cline CLI was updated to stealthily install OpenClaw, a self-hosted autonomous AI agent that has become exceedingly popular in the past few months. "On February 17, 2026, at 3:26 AM PT, an unauthorized party used a compromised npm publish token to publish an update to Cline CLI

Why the shift left dream has become a nightmare for security and developers

20 février 2026 à 15:45
The "shift left" approach has increased pressure on developers, as speed demands override security checks in modern CI pipelines. Qualys explains how analyzing 34,000 public container images revealed 7.3% were malicious and why security must be enforced at the infrastructure layer by default. [...]

Après le piratage de la DGFiP, comment savoir si vous êtes concernés par le vol d’IBAN ?

20 février 2026 à 14:29

Le 18 février 2026, Bercy annonçait qu’un acteur malveillant avait eu accès au fichier national des comptes bancaires (Ficoba). Des informations de plus de 1,2 million de comptes bancaires ont pu être consultées. Comment savoir si un de vos comptes est concerné ?

ClickFix Campaign Abuses Compromised Sites to Deploy MIMICRAT Malware

Cybersecurity researchers have disclosed details of a new ClickFix campaign that abuses compromised legitimate sites to deliver a previously undocumented remote access trojan (RAT) called MIMICRAT (aka AstarionRAT). "The campaign demonstrates a high level of operational sophistication: compromised sites spanning multiple industries and geographies serve as delivery infrastructure, a multi-stage

Identity Cyber Scores: The New Metric Shaping Cyber Insurance in 2026

With one in three cyber-attacks now involving compromised employee accounts, insurers and regulators are placing far greater emphasis on identity posture when assessing cyber risk.  For many organizations, however, these assessments remain largely opaque. Elements such as password hygiene, privileged access management, and the extent of multi-factor authentication (MFA) coverage are

Ukrainian National Sentenced to 5 Years in North Korea IT Worker Fraud Case

A 29-year-old Ukrainian national has been sentenced to five years in prison in the U.S. for his role in facilitating North Korea's fraudulent information technology (IT) worker scheme. In November 2025, Oleksandr "Alexander" Didenko pleaded guilty to wire fraud conspiracy and aggravated identity theft for stealing the identities of U.S. citizens and selling them to IT workers to help them land

Nouvelle étude Proofpoint : « TrustConnect » se fait passer pour un logiciel IT et opère en réalité comme un RAT-as-a-Service

Par : UnderNews
20 février 2026 à 12:06

Les chercheurs de Proofpoint ont révélé aujourd’hui l’existence d’une nouvelle plateforme de malware-as-a-service (MaaS) baptisée TrustConnect. Cette plateforme se fait passer pour un outil légitime de supervision et de gestion à distance (RMM), avec un faux site web d’entreprise et un certificat de signature de code Extended Validation (EV). Bien qu’elle se présente comme un […]

The post Nouvelle étude Proofpoint : « TrustConnect » se fait passer pour un logiciel IT et opère en réalité comme un RAT-as-a-Service first appeared on UnderNews.

FBI Reports 1,900 ATM Jackpotting Incidents Since 2020, $20M Lost in 2025

The U.S. Federal Bureau of Investigation (FBI) has warned of an increase in ATM jackpotting incidents across the country, leading to losses of more than $20 million in 2025. The agency said 1,900 ATM jackpotting incidents have been reported since 2020, out of which 700 took place last year. In December 2025, the U.S. Department of Justice (DoJ) said about $40.73 million has been collectively

Ce malware s’appuie sur Gemini pour espionner les utilisateurs Android

20 février 2026 à 11:18

Dans un article de blog publié le 19 février 2026, les chercheurs en cybersécurité d'ESET mettent en lumière un nouveau malware baptisé PromptSpy. Point d'intérêt majeur ? La façon dont ce logiciel malveillant intègre l'IA dans son fonctionnement.

Keenadu : Zimperium découvre une porte dérobée Android au niveau du firmware et alerte sur l’urgence d’une sécurité mobile embarquée

Par : UnderNews
20 février 2026 à 10:04

zLabs, la division de recherche de Zimperium, leader mondial de la sécurité mobile, annonce la découverte de Keenadu, une backdoor Android opérant au niveau du firmware, et intégré en profondeur dans le logiciel des appareils. Cette menace contourne les contrôles de sécurité mobiles traditionnels et expose les entreprises à des risques persistants et critiques. Tribune […]

The post Keenadu : Zimperium découvre une porte dérobée Android au niveau du firmware et alerte sur l’urgence d’une sécurité mobile embarquée first appeared on UnderNews.

Former Google Engineers Indicted Over Trade Secret Transfers to Iran

Two former Google engineers and one of their husbands have been indicted in the U.S. for allegedly committing trade secret theft from the search giant and other tech firms and transferring the information to unauthorized locations, including Iran. Samaneh Ghandali, 41, and her husband Mohammadjavad Khosravi (aka Mohammad Khosravi), 40, along with her sister Soroor Ghandali, 32, have been accused

PromptSpy Android Malware Abuses Gemini AI to Automate Recent-Apps Persistence

Cybersecurity researchers have discovered what they say is the first Android malware that abuses Gemini, Google's generative artificial intelligence (AI) chatbot, as part of its execution flow and achieves persistence. The malware has been codenamed PromptSpy by ESET. The malware is equipped to capture lockscreen data, block uninstallation efforts, gather device information, take screenshots,

INTERPOL Operation Red Card 2.0 Arrests 651 in African Cybercrime Crackdown

An international cybercrime operation against online scams has led to 651 arrests and recovered more than $4.3 million as part of an effort led by law enforcement agencies from 16 African countries. The initiative, codenamed Operation Red Card 2.0, took place between December 8, 2025 and January 30, 2026, according to INTERPOL. It targeted infrastructure and actors behind high-yield investment

❌
❌