L'actu de la sécu


Les dernières news:

  • Browser Extensions Are the New AI Consumption Channel That No One Is Talking About
    Publié le April 10, 2026

    Source: HackerNews

    While much of the discussion on AI security centers around protecting ‘shadow’ AI and GenAI consumption, there's a wide-open window nobody's guarding: AI browser extensions.  A new report from LayerX exposes just how deep this blind spot goes, and why AI extensions may be the most dangerous AI threat surface in your network that isn't on anyone's 

    Lien
  • Google Rolls Out DBSC in Chrome 146 to Block Session Theft on Windows
    Publié le April 10, 2026

    Source: HackerNews

    Google has made Device Bound Session Credentials (DBSC) generally available to all Windows users of its Chrome web browser, months after it began testing the security feature in open beta. The public availability is currently limited to Windows users on Chrome 146, with macOS expansion planned in an upcoming Chrome release. "This project represents a significant

    Lien
  • Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure
    Publié le April 10, 2026

    Source: HackerNews

    A critical security vulnerability in Marimo, an open-source Python notebook for data science and analysis, has been exploited within 10 hours of public disclosure, according to findings from Sysdig. The vulnerability in question is CVE-2026-39987 (CVSS score: 9.3), a pre-authenticated remote code execution vulnerability impacting all versions of Marimo prior to and including

    Lien
  • Backdoored Smart Slider 3 Pro Update Distributed via Compromised Nextend Servers
    Publié le April 10, 2026

    Source: HackerNews

    Unknown threat actors have hijacked the update system for the Smart Slider 3 Pro plugin for WordPress and Joomla to push a poisoned version containing a backdoor. The incident impacts Smart Slider 3 Pro version 3.5.1.35 for WordPress, per WordPress security company Patchstack. Smart Slider 3 is a popular WordPress slider plugin with more than 800,000 active installations across its free and Pro

    Lien
  • [local] NetBT e-Fatura - Privilege Escalation
    Publié le April 10, 2026

    Source: ExploitDB

    NetBT e-Fatura - Privilege Escalation

    Lien
  • [webapps] D-Link DIR-650IN - Authenticated Command Injection
    Publié le April 10, 2026

    Source: ExploitDB

    D-Link DIR-650IN - Authenticated Command Injection

    Lien
  • EngageLab SDK Flaw Exposed 50M Android Users, Including 30M Crypto Wallet Installs
    Publié le April 9, 2026

    Source: HackerNews

    Details have emerged about a now-patched security vulnerability in a widely used third-party Android software development kit (SDK) called EngageLab SDK that could have put millions of cryptocurrency wallet users at risk. "This flaw allows apps on the same device to bypass Android security sandbox and gain unauthorized access to private data," the Microsoft Defender

    Lien
  • UAT-10362 Targets Taiwanese NGOs with LucidRook Malware in Spear-Phishing Campaigns
    Publié le April 9, 2026

    Source: HackerNews

    A previously undocumented threat cluster dubbed UAT-10362 has been attributed to spear-phishing campaigns targeting Taiwanese non-governmental organizations (NGOs) and suspected universities to deploy a new Lua-based malware called LucidRook. "LucidRook is a sophisticated stager that embeds a Lua interpreter and Rust-compiled libraries within a dynamic-link library (DLL) to download and

    Lien
  • ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories
    Publié le April 9, 2026

    Source: HackerNews

    Thursday. Another week, another batch of things that probably should've been caught sooner but weren't. This one's got some range — old vulnerabilities getting new life, a few "why was that even possible" moments, attackers leaning on platforms and tools you'd normally trust without thinking twice. Quiet escalations more than loud zero-days, but the kind that matter more in

    Lien