Vue lecture

Il y a de nouveaux articles disponibles, cliquez pour rafraîchir la page.

Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware

Cybersecurity researchers have flagged a new malicious Microsoft Visual Studio Code (VS Code) extension for Moltbot (formerly Clawdbot) on the official Extension Marketplace that claims to be a free artificial intelligence (AI) coding assistant, but stealthily drops a malicious payload on compromised hosts. The extension, named "ClawdBot Agent - AI Coding Assistant" ("clawdbot.clawdbot-agent")

Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid

The "coordinated" cyber attack targeting multiple sites across the Polish power grid has been attributed with medium confidence to a Russian state-sponsored hacking crew known as ELECTRUM. Operational technology (OT) cybersecurity company Dragos, in a new intelligence brief published Tuesday, described the late December 2025 activity as the first major cyber attack targeting distributed energy

« Discombobulator » : Trump vante une arme secrète utilisée par les États-Unis lors de la capture de Maduro

Donald Trump affirme avoir utilisé une arme secrète lors du raid du 3 janvier à Caracas contre Nicolas Maduro, évoquant une neutralisation d’équipements vénézuéliens et l’échec de tirs de missiles. Des récits d’effets physiques et le parallèle avec le « syndrome de La Havane » relancent les spéculations sur une technologie à énergie dirigée.

Critical vm2 Node.js Flaw Allows Sandbox Escape and Arbitrary Code Execution

A critical sandbox escape vulnerability has been disclosed in the popular vm2 Node.js library that, if successfully exploited, could allow attackers to run arbitrary code on the underlying operating system. The vulnerability, tracked as CVE-2026-22709, carries a CVSS score of 9.8 out of 10.0 on the CVSS scoring system. "In vm2 for version 3.10.0, Promise.prototype.then Promise.prototype.catch

Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution

Cybersecurity researchers have disclosed two new security flaws in the n8n workflow automation platform, including a crucial vulnerability that could result in remote code execution. The weaknesses, discovered by the JFrog Security Research team, are listed below - CVE-2026-1470 (CVSS score: 9.9) - An eval injection vulnerability that could allow an authenticated user to bypass the Expression

From Triage to Threat Hunts: How AI Accelerates SecOps

If you work in security operations, the concept of the AI SOC agent is likely familiar. Early narratives promised total autonomy. Vendors seized on the idea of the "Autonomous SOC" and suggested a future where algorithms replaced analysts. That future has not arrived. We have not seen mass layoffs or empty security operations centers. We have instead seen the emergence of a practical reality.

Mustang Panda Deploys Updated COOLCLIENT Backdoor in Government Cyber Attacks

Threat actors with ties to China have been observed using an updated version of a backdoor called COOLCLIENT in cyber espionage attacks in 2025 to facilitate comprehensive data theft from infected endpoints. The activity has been attributed to Mustang Panda (aka Earth Preta, Fireant, HoneyMyte, Polaris, and Twill Typhoon) with the intrusions primarily directed against government entities located

JFrog alerte sur deux failles dans n8n (CVSS 9,9 et CVSS 8,5)

Alors que les entreprises accélèrent le déploiement d’agents IA, elles exposent, souvent sans le savoir, de nouvelles surfaces d’attaque. Les chercheurs en sécurité de JFrog ont récemment identifié deux vulnérabilités de type « sandbox escape », l’une critique et l’autre de criticité élevée, au sein de n8n, un outil majeur d’orchestration de workflows d’IA. Tribune – Ces […]

The post JFrog alerte sur deux failles dans n8n (CVSS 9,9 et CVSS 8,5) first appeared on UnderNews.
❌