Vue lecture

Il y a de nouveaux articles disponibles, cliquez pour rafraîchir la page.

Fuite Ficoba : voici ce qu’un hacker peut faire avec votre IBAN

Le 18 février 2026, Bercy a annoncé qu'un acteur malveillant avait eu accès au fichier national des comptes bancaires (Ficoba). Une compromission qui aurait permis au pirate d'accéder aux informations de plus d'1,2 million de comptes. Parmi les données consultées ? L'IBAN, ce qui fait craindre des vagues d'arnaques bancaires généralisées, voici ce qu'il en est réellement.

Quelle IA dans la cybersécurité ? HarfangLab dessine les grandes tendances cyber en matière d’IA

L’intelligence artificielle est devenue un acteur central de la cybersécurité, utilisée tant pour renforcer la défense des systèmes que par les attaquants pour décupler leurs capacités. Elle a transformé le paysage cyber : la production de contenus « fake » ou d’appâts dans le cadre du phishing de plus en plus crédibles ou encore la manipulation […]

The post Quelle IA dans la cybersécurité ? HarfangLab dessine les grandes tendances cyber en matière d’IA first appeared on UnderNews.

69 % des responsables informatiques déclarent que la sécurité des données les empêche de dormir

Un nouveau rapport Rocket Software met en lumière la pression croissante sur les départements informatiques des grandes entreprises. Tribune – Rocket Software, spécialiste dans le domaine de la modernisation IT, publie une nouvelle étude sur les défis multiples que rencontrent les responsables informatiques à l’heure où les organisations accélèrent leur modernisation et intègrent l’IA dans des […]

The post 69 % des responsables informatiques déclarent que la sécurité des données les empêche de dormir first appeared on UnderNews.

CRESCENTHARVEST Campaign Targets Iran Protest Supporters With RAT Malware

Cybersecurity researchers have disclosed details of a new campaign dubbed CRESCENTHARVEST, likely targeting supporters of Iran's ongoing protests to conduct information theft and long-term espionage. The Acronis Threat Research Unit (TRU) said it observed the activity after January 9, with the attacks designed to deliver a malicious payload that serves as a remote access trojan (RAT) and

Citizen Lab Finds Cellebrite Tool Used on Kenyan Activist’s Phone in Police Custody

New research from the Citizen Lab has found signs that Kenyan authorities used a commercial forensic extraction tool manufactured by Israeli company Cellebrite to break into a prominent dissident's phone, making it the latest case of abuse of the technology targeting civil society. The interdisciplinary research unit at the University of Toronto's Munk School of Global Affairs & Public

Grandstream GXP1600 VoIP Phones Exposed to Unauthenticated Remote Code Execution

Cybersecurity researchers have disclosed a critical security flaw in the Grandstream GXP1600 series of VoIP phones that could allow an attacker to seize control of susceptible devices. The vulnerability, tracked as CVE-2026-2329, carries a CVSS score of 9.3 out of a maximum of 10.0. It has been described as a case of unauthenticated stack-based buffer overflow that could result in remote code

Critical Flaws Found in Four VS Code Extensions with Over 125 Million Installs

Cybersecurity researchers have disclosed multiple security vulnerabilities in four popular Microsoft Visual Studio Code (VS Code) extensions that, if successfully exploited, could allow threat actors to steal local files and execute code remotely. The extensions, which have been collectively installed more than 125 million times, are Live Server, Code Runner, Markdown Preview Enhanced, and

Cybersecurity Tech Predictions for 2026: Operating in a World of Permanent Instability

In 2025, navigating the digital seas still felt like a matter of direction. Organizations charted routes, watched the horizon, and adjusted course to reach safe harbors of resilience, trust, and compliance. In 2026, the seas are no longer calm between storms. Cybersecurity now unfolds in a state of continuous atmospheric instability: AI-driven threats that adapt in real time, expanding

Dell RecoverPoint for VMs Zero-Day CVE-2026-22769 Exploited Since Mid-2024

A maximum severity security vulnerability in Dell RecoverPoint for Virtual Machines has been exploited as a zero-day by a suspected China-nexus threat cluster dubbed UNC6201 since mid-2024, according to a new report from Google Mandiant and Google Threat Intelligence Group (GTIG). The activity involves the exploitation of CVE-2026-22769 (CVSS score: 10.0), a case of hard-coded credentials

3 Ways to Start Your Intelligent Workflow Program

Security, IT, and engineering teams today are under relentless pressure to accelerate outcomes, cut operational drag, and unlock the full potential of AI and automation. But simply investing in tools isn’t enough. 88% of AI proofs-of-concept never make it to production, even though 70% of workers cite freeing time for high-value work as the primary AI automation motivation. Real impact comes

❌