Vue lecture

Il y a de nouveaux articles disponibles, cliquez pour rafraîchir la page.

New TrickMo Variant Uses TON C2 and SOCKS5 to Create Android Network Pivots

Cybersecurity researchers have flagged a new version of the TrickMo Android banking trojan that uses The Open Network (TON) for command-and-control (C2). The new variant, observed by ThreatFabric between January and February 2026, has been observed actively targeting banking and cryptocurrency wallet users in France, Italy, and Austria. "TrickMo relies on a runtime-loaded APK  (dex.module),

Webinar: What the Riskiest SOC Alerts Go Unanswered - and How Radiant Security Can Help

Why do the Riskiest SOC Alerts Go Unanswered? Security operations teams are drowning in alerts. But the real problem isn't always alert volume; it's the blind spots. The most dangerous alerts are the ones no one is investigating. A recent report from The Hacker News examined why certain high-risk alert categories - WAF, DLP, OT/IoT, dark web intelligence, and supply chain signals- consistently

Why Agentic AI Is Security's Next Blind Spot

Agentic AI is already running in production environments across many organizations today. It is executing tasks, consuming data, and taking actions — most likely without meaningful involvement from the security team. The industry conversation has largely framed this as a question of policy: allow it, restrict it, or monitor it? However, that framing misses the point.  The more urgent

Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages

TeamPCP, the threat actor behind the recent supply chain attack spree, has been linked to the compromise of the npm and PyPI packages from TanStack, UiPath, Mistral AI, OpenSearch, and Guardrails AI as part of a fresh Mini Shai-Hulud campaign. The affected npm packages have been modified to include an obfuscated JavaScript file ("router_init.js") that's designed to profile the execution

Lutter contre les menaces de ransomware assistées par l’IA

À l’occasion de la Journée Anti-Ransomware, il est important de reconnaître l’évolution constante du paysage des cybermenaces et la manière dont les organisations peuvent renforcer leurs défenses. L’évolution du ransomware traditionnel vers la cyber-extorsion au cours des dernières années reflète un écosystème professionnalisé et décentralisé. Pour protéger votre organisation contre ce danger, il est essentiel […]

The post Lutter contre les menaces de ransomware assistées par l’IA first appeared on UnderNews.

Rapport GTIG AI Threat Tracker 2026 – Nouvelles méthodes d’exploitation de l’IA par les acteurs malveillants

Le  Google Threat Intelligence Group (GTIG) publie son dernier rapport « AI Threat Tracker », détaillant les dernières tactiques des acteurs ciblant les plateformes d’IA et les mesures mises en œuvre par Google pour y faire face. Dans la continuité de l’analyse publiée par le GTIG en février 2026, le nouveau rapport met en lumière plusieurs conclusions […]

The post Rapport GTIG AI Threat Tracker 2026 – Nouvelles méthodes d’exploitation de l’IA par les acteurs malveillants first appeared on UnderNews.

Pourquoi le contrôle d’accès physique est devenu un angle mort stratégique pour les entreprises

Il existe une catégorie de vulnérabilités particulièrement dangereuses pour les organisations : celles qui ne déclenchent aucune alerte. Pas de panne, pas d’incident visible, pas de signal d’alarme. Le système fonctionne. Les portes s’ouvrent. Et pendant ce temps, le risque s’accumule silencieusement dans l’infrastructure.  Tribune pare Clara Bardou, Directrice de Marché, France, HID – Le contrôle […]

The post Pourquoi le contrôle d’accès physique est devenu un angle mort stratégique pour les entreprises first appeared on UnderNews.

Instructure Reaches Ransom Agreement with ShinyHunters to Stop 3.65TB Canvas Leak

American educational technology company Instructure, the parent company of Canvas, said it reached an "agreement" with a decentralized cybercrime extortion group after it breached its network and threatened to leak stolen information from thousands of schools and universities. In an update shared on Monday, the Utah-based firm said it "reached an agreement with the unauthorized actor involved in

OpenAI Launches Daybreak for AI-Powered Vulnerability Detection and Patch Validation

OpenAI has launched Daybreak, a new cybersecurity initiative that brings together frontier artificial intelligence (AI) model capabilities and Codex Security to help organizations identify and patch vulnerabilities before attackers find a way in using the same issues. "Daybreak combines the intelligence of OpenAI models, the extensibility of Codex as an agentic harness, and our partners across

iOS 26.5 Brings Default End-to-End Encrypted RCS Messaging Between iPhone and Android

Apple on Monday officially released iOS 26.5 with support for end-to-end encryption (E2EE) to Rich Communication Services (RCS) in beta as part of a "cross-industry effort" to replace traditional SMS with a more secure alternative. To that end, E2EE RCS messaging is rolling out to iPhone users running iOS 26.5 with supported carriers and Android users on the latest version of Google Messages.

❌