L'actu de la sécu


Les dernières news:

  • Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bomb
    Publié le Feb. 23, 2026

    Source: HackerNews

    Cybersecurity researchers have disclosed details of a new cryptojacking campaign that uses pirated software bundles as lures to deploy a bespoke XMRig miner program on compromised hosts. "Analysis of the recovered dropper, persistence triggers, and mining payload reveals a sophisticated, multi-stage infection prioritizing maximum cryptocurrency mining hashrate, often destabilizing the victim

    Lien
  • ⚡ Weekly Recap: Double-Tap Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware & More
    Publié le Feb. 23, 2026

    Source: HackerNews

    Security news rarely moves in a straight line. This week, it feels more like a series of sharp turns, some happening quietly in the background, others playing out in public view. The details are different, but the pressure points are familiar. Across devices, cloud services, research labs, and even everyday apps, the line between normal behavior and hidden risk keeps getting thinner. Tools

    Lien
  • How Exposed Endpoints Increase Risk Across LLM Infrastructure
    Publié le Feb. 23, 2026

    Source: HackerNews

    As more organizations run their own Large Language Models (LLMs), they are also deploying more internal services and Application Programming Interfaces (APIs) to support those models. Modern security risks are being introduced less from the models themselves and more from the infrastructure that serves, connects and automates the model. Each new LLM endpoint expands the attack surface, often in

    Lien
  • Malicious npm Packages Harvest Crypto Keys, CI Secrets, and API Tokens
    Publié le Feb. 23, 2026

    Source: HackerNews

    Cybersecurity researchers have disclosed what they say is an active "Shai-Hulud-like" supply chain worm campaign that has leveraged a cluster of at least 19 malicious npm packages to enable credential harvesting and cryptocurrency key theft. The campaign has been codenamed SANDWORM_MODE by supply chain security company Socket. As with prior Shai-Hulud attack waves, the malicious code embedded

    Lien
  • MuddyWater Targets MENA Organizations with GhostFetch, CHAR, and HTTP_VIP
    Publié le Feb. 23, 2026

    Source: HackerNews

    The Iranian hacking group known as MuddyWater (aka Earth Vetala, Mango Sandstorm, and MUDDYCOAST) has targeted several organizations and individuals mainly located across the Middle East and North Africa (MENA) region as part of a new campaign codenamed Operation Olalampo. The activity, first observed on January 26, 2026, has resulted in the deployment of new malware families that share

    Lien
  • CarGurus - 12,461,887 breached accounts
    Publié le Feb. 22, 2026

    Source: HaveIBeenPwnd

    In February 2026,

    Lien
  • AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries
    Publié le Feb. 21, 2026

    Source: HackerNews

    A Russian-speaking, financially motivated threat actor has been observed taking advantage of commercial generative artificial intelligence (AI) services to compromise over 600 FortiGate devices located in 55 countries. That's according to new findings from Amazon Threat Intelligence, which said it observed the activity between January 11 and February 18, 2026. "No exploitation of FortiGate

    Lien
  • Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning
    Publié le Feb. 21, 2026

    Source: HackerNews

    Artificial intelligence (AI) company Anthropic has begun to roll out a new security feature for Claude Code that can scan a user's software codebase for vulnerabilities and suggest patches. The capability, called Claude Code Security, is currently available in a limited research preview to Enterprise and Team customers. "It scans codebases for security vulnerabilities and suggests targeted

    Lien
  • CISA Adds Two Actively Exploited Roundcube Flaws to KEV Catalog
    Publié le Feb. 21, 2026

    Source: HackerNews

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added two security flaws impacting Roundcube webmail software to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerabilities in question are listed below - CVE-2025-49113 (CVSS score: 9.9) - A deserialization of untrusted data vulnerability that allows remote code

    Lien