L'actu de la sécu


Les dernières news:

  • China-Linked UAT-7290 Targets Telecoms with Linux Malware and ORB Nodes
    Publié le Jan. 8, 2026

    Source: HackerNews

    A China-nexus threat actor known as UAT-7290 has been attributed to espionage-focused intrusions against entities in South Asia and Southeastern Europe. The activity cluster, which has been active since at least 2022, primarily focuses on extensive technical reconnaissance of target organizations before initiating attacks, ultimately leading to the deployment of malware families such as RushDrop

    Lien
  • ThreatsDay Bulletin: RustFS Flaw, Iranian Ops, WebUI RCE, Cloud Leaks, and 12 More Stories
    Publié le Jan. 8, 2026

    Source: HackerNews

    The internet never stays quiet. Every week, new hacks, scams, and security problems show up somewhere. This week’s stories show how fast attackers change their tricks, how small mistakes turn into big risks, and how the same old tools keep finding new ways to break in. Read on to catch up before the next wave hits. Honeypot Traps Hackers Hackers Fall for

    Lien
  • The State of Trusted Open Source
    Publié le Jan. 8, 2026

    Source: HackerNews

    Chainguard, the trusted source for open source, has a unique view into how modern organizations actually consume open source software and where they run into risk and operational burdens. Across a growing customer base and an extensive catalog of over 1800 container image projects, 148,000 versions, 290,000 images, and 100,000 language libraries, and almost half a billion builds, they can see

    Lien
  • Cisco Patches ISE Security Vulnerability After Public PoC Exploit Release
    Publié le Jan. 8, 2026

    Source: HackerNews

    Cisco has released updates to address a medium-severity security flaw in Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) with a public proof-of-concept (PoC) exploit. The vulnerability, tracked as CVE-2026-20029 (CVSS score: 4.9), resides in the licensing feature and could allow an authenticated, remote attacker with administrative privileges to gain access to

    Lien
  • Researchers Uncover NodeCordRAT Hidden in npm Bitcoin-Themed Packages
    Publié le Jan. 8, 2026

    Source: HackerNews

    Cybersecurity researchers have discovered three malicious npm packages that are designed to deliver a previously undocumented malware called NodeCordRAT. The names of the packages, all of which were taken down as of November 2025, are listed below. They were uploaded by a user named "wenmoonx." bitcoin-main-lib (2,300 Downloads) bitcoin-lib-js (193 Downloads) bip40 (970 Downloads) "The

    Lien
  • Coolify Discloses 11 Critical Flaws Enabling Full Server Compromise on Self-Hosted Instances
    Publié le Jan. 8, 2026

    Source: HackerNews

    Cybersecurity researchers have disclosed details of multiple critical-severity security flaws affecting Coolify, an open-source, self-hosting platform, that could result in authentication bypass and remote code execution. The list of vulnerabilities is as follows - CVE-2025-66209 (CVSS score: 10.0) - A command injection vulnerability in the database backup functionality allows any authenticated

    Lien
  • OpenAI Launches ChatGPT Health with Isolated, Encrypted Health Data Controls
    Publié le Jan. 8, 2026

    Source: HackerNews

    Artificial intelligence (AI) company OpenAI on Wednesday announced the launch of ChatGPT Health, a dedicated space that allows users to have conversations with the chatbot about their health. To that end, the sandboxed experience offers users the optional ability to securely connect medical records and wellness apps, including Apple Health, Function, MyFitnessPal, Weight Watchers, AllTrails,

    Lien
  • CISA Flags Microsoft Office and HPE OneView Bugs as Actively Exploited
    Publié le Jan. 8, 2026

    Source: HackerNews

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added two security flaws impacting Microsoft Office and Hewlett Packard Enterprise (HPE) OneView to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerabilities are listed below - CVE-2009-0556 (CVSS score: 8.8) - A code injection vulnerability in Microsoft Office

    Lien
  • Webinar: Learn How AI-Powered Zero Trust Detects Attacks with No Files or Indicators
    Publié le Jan. 7, 2026

    Source: HackerNews

    Security teams are still catching malware. The problem is what they're not catching. More attacks today don't arrive as files. They don't drop binaries. They don't trigger classic alerts. Instead, they run quietly through tools that already exist inside the environment — scripts, remote access, browsers, and developer workflows. That shift is creating a blind spot. Join us for a deep-dive

    Lien