Vue lecture

Il y a de nouveaux articles disponibles, cliquez pour rafraîchir la page.

China-Linked UAT-7290 Targets Telecoms with Linux Malware and ORB Nodes

A China-nexus threat actor known as UAT-7290 has been attributed to espionage-focused intrusions against entities in South Asia and Southeastern Europe. The activity cluster, which has been active since at least 2022, primarily focuses on extensive technical reconnaissance of target organizations before initiating attacks, ultimately leading to the deployment of malware families such as RushDrop

ThreatsDay Bulletin: RustFS Flaw, Iranian Ops, WebUI RCE, Cloud Leaks, and 12 More Stories

The internet never stays quiet. Every week, new hacks, scams, and security problems show up somewhere. This week’s stories show how fast attackers change their tricks, how small mistakes turn into big risks, and how the same old tools keep finding new ways to break in. Read on to catch up before the next wave hits. Honeypot Traps Hackers Hackers Fall for

The State of Trusted Open Source

Chainguard, the trusted source for open source, has a unique view into how modern organizations actually consume open source software and where they run into risk and operational burdens. Across a growing customer base and an extensive catalog of over 1800 container image projects, 148,000 versions, 290,000 images, and 100,000 language libraries, and almost half a billion builds, they can see

IA et Cybersécurité : la meilleure arme des entreprises… ou celle de leurs hackers ?

L’intelligence artificielle (IA) transforme la cybersécurité à une vitesse sans précédent. Entre opportunités pour les défenseurs et nouvelles menaces pour les entreprises, elle s’impose comme une technologie à double tranchant. Tribune par Alexandre Piaugeard, Responsable Pôle Réseau & Sécurité ITS Integra. De l’IA traditionnelle à l’IA agentique : une évolution fulgurante L’IA a parcouru un long chemin. Après […]

The post IA et Cybersécurité : la meilleure arme des entreprises… ou celle de leurs hackers ? first appeared on UnderNews.

Cisco Patches ISE Security Vulnerability After Public PoC Exploit Release

Cisco has released updates to address a medium-severity security flaw in Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) with a public proof-of-concept (PoC) exploit. The vulnerability, tracked as CVE-2026-20029 (CVSS score: 4.9), resides in the licensing feature and could allow an authenticated, remote attacker with administrative privileges to gain access to

Researchers Uncover NodeCordRAT Hidden in npm Bitcoin-Themed Packages

Cybersecurity researchers have discovered three malicious npm packages that are designed to deliver a previously undocumented malware called NodeCordRAT. The names of the packages, all of which were taken down as of November 2025, are listed below. They were uploaded by a user named "wenmoonx." bitcoin-main-lib (2,300 Downloads) bitcoin-lib-js (193 Downloads) bip40 (970 Downloads) "The

Coolify Discloses 11 Critical Flaws Enabling Full Server Compromise on Self-Hosted Instances

Cybersecurity researchers have disclosed details of multiple critical-severity security flaws affecting Coolify, an open-source, self-hosting platform, that could result in authentication bypass and remote code execution. The list of vulnerabilities is as follows - CVE-2025-66209 (CVSS score: 10.0) - A command injection vulnerability in the database backup functionality allows any authenticated

Tendances et prédictions 2026 des experts de Veeam

En début d’année, il est de coutume de passer en revue les tendances technologiques qui devraient marquer le marché informatique dans les prochains mois. Trpos experts de Veeam présentent, selon leur domaine d’expertise, les tendances attendues en 2026, abordant à la fois la sécurité de l’intelligence artificielle, la résilience des données, et les efforts de […]

The post Tendances et prédictions 2026 des experts de Veeam first appeared on UnderNews.

OpenAI Launches ChatGPT Health with Isolated, Encrypted Health Data Controls

Artificial intelligence (AI) company OpenAI on Wednesday announced the launch of ChatGPT Health, a dedicated space that allows users to have conversations with the chatbot about their health. To that end, the sandboxed experience offers users the optional ability to securely connect medical records and wellness apps, including Apple Health, Function, MyFitnessPal, Weight Watchers, AllTrails,

Prévisions 2026 de Melissa Bischoping et Harman Kaur de Tanium sur l’impact de l’IA sur la cyber

Voici les prédictions de Melissa Bischoping, Senior Director, Security & Product Design Research et de Harman Kaur, SVP, Technology Strategy & AI, tous deux chez Tanium, leader de l’Autonomous IT (l’informatique autonome), à propos des évolutions de l’IT en 2026, en particulier sur l’impact de l’IA sur la cybersécurité des organisations dans le monde entier. […]

The post Prévisions 2026 de Melissa Bischoping et Harman Kaur de Tanium sur l’impact de l’IA sur la cyber first appeared on UnderNews.

CISA Flags Microsoft Office and HPE OneView Bugs as Actively Exploited

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added two security flaws impacting Microsoft Office and Hewlett Packard Enterprise (HPE) OneView to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerabilities are listed below - CVE-2009-0556 (CVSS score: 8.8) - A code injection vulnerability in Microsoft Office

Black Cat Behind SEO Poisoning Malware Campaign Targeting Popular Software Searches

A cybercrime gang known as Black Cat has been attributed to a search engine optimization (SEO) poisoning campaign that employs fraudulent sites advertising popular software to trick users into downloading a backdoor capable of stealing sensitive data. According to a report published by the National Computer Network Emergency Response Technical Team/Coordination Center of China (CNCERT/CC) and

❌