Vue lecture

Il y a de nouveaux articles disponibles, cliquez pour rafraîchir la page.

Kaspersky détecte une augmentation des escroqueries liées à la Coupe du Monde 2026, allant des faux billets aux e-mails de « subvention » de 500 000 $

Alors que des millions de passionnés de football dans le monde entier se préparent pour la Coupe du monde de cet été, les cybercriminels profitent de l’attention suscitée par l’événement. Les experts de Kaspersky ont découvert diverses arnaques imitant les plateformes officielles de la compétition ou instrumentalisant le tournoi, exposant les données et les finances […]

The post Kaspersky détecte une augmentation des escroqueries liées à la Coupe du Monde 2026, allant des faux billets aux e-mails de « subvention » de 500 000 $ first appeared on UnderNews.

Microsoft's MDASH AI System Finds 16 Windows Flaws Fixed in Patch Tuesday

Microsoft has unveiled a new multi-model artificial intelligence (AI)-driven system called MDASH to facilitate vulnerability discovery and remediation at scale, adding that it's being tested by some customers as part of a limited private preview. MDASH, short for multi-model agentic scanning harness, is designed as a model-agnostic system that uses bespoke AI agents for different vulnerability

Azerbaijani Energy Firm Hit by Repeated Microsoft Exchange Exploitation

A threat actor with affiliations to China has been linked to a "multi-wave intrusion" targeting an unnamed Azerbaijani oil and gas company between late December 2025 and late February 2026, marking an expansion of its targeting. The activity has been attributed by Bitdefender with moderate-to-high confidence to a hacking group known as FamousSparrow (aka UAT-9244), which shares some level of

OpenAI Daybreak face à Claude Mythos : vers des logiciels safer by design

Benoit Grunemwald – Expert en Cybersécurité chez ESET France réagit au lancement de DayBreak par OpenAI en réponse à l’offensive Mythos d’Anthropic. Tribune – Avec Daybreak, OpenAI se positionne à son tour pour proposer aux équipes de développement un outil de sécurité. Toutefois, là où Mythos a marqué les esprits par sa puissance brute, capable […]

The post OpenAI Daybreak face à Claude Mythos : vers des logiciels safer by design first appeared on UnderNews.

[Webinar] How Modern Attack Paths Cross Code, Pipelines, and Cloud

TL;DR: Stop chasing thousands of "toast" alerts. Join experts from Wiz to learn how hackers connect tiny flaws to build a "Lethal Chain" to your data—and how to break it. Register for the Strategic Briefing Here. Most security tools work like a smoke alarm that goes off every time you burn a piece of toast. You get so many alerts that you eventually start to ignore them. The real danger? While

Most Remediation Programs Never Confirm the Fix Actually Worked

Security teams have never had better visibility into their environments and never been worse at confirming what they fix stays fixed. Mandiant's M-Trends 2026 report puts the mean time to exploit at an estimated negative seven days. The Verizon 2025 DBIR puts median time to remediate edge device vulnerabilities at 32 days. These numbers have understandably driven the industry toward a clear

Microsoft Patches 138 Vulnerabilities, Including DNS and Netlogon RCE Flaws

Microsoft on Tuesday released patches for 138 security vulnerabilities spanning its product portfolio, although none of them have been listed as publicly known or under active attack. Of the 138 flaws, 30 are rated Critical, 104 are rated Important, three are rated Moderate, and one is rated Low in severity. As many as 61 vulnerabilities are classified as privilege escalation bugs, followed by

GemStuffer Abuses 150+ RubyGems to Exfiltrate Scraped U.K. Council Portal Data

Cybersecurity researchers are calling attention to a new campaign dubbed GemStuffer that has targeted the RubyGems repository with more than 150 gems that use the registry as a data exfiltration channel rather than for malware distribution. "The packages do not appear designed for mass developer compromise," Socket said. "Many have little or no download activity, and the payloads are repetitive,

Android Adds Intrusion Logging for Sophisticated Spyware Forensics

Google on Tuesday unveiled a new opt-in Android feature called Intrusion Logging for storing forensic logs to better analyze sophisticated spyware attacks. Intrusion Logging, available as part of Advanced Protection Mode, enables "persistent and privacy-preserving forensics logging to allow for investigation of devices in the event of a suspected compromise," the company said. The feature, it

❌