L'actu de la sécu


Les dernières news:

  • Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025
    Publié le April 9, 2026

    Source: HackerNews

    Threat actors have been exploiting a previously unknown zero-day vulnerability in Adobe Reader using maliciously crafted PDF documents since at least December 2025. The finding, detailed by EXPMON's Haifei Li, has been described as a highly-sophisticated PDF exploit. The artifact ("Invoice540.pdf") first appeared on the VirusTotal platform on November 28, 2025. A second 

    Lien
  • Bitter-Linked Hack-for-Hire Campaign Targets Journalists Across MENA Region
    Publié le April 9, 2026

    Source: HackerNews

    An apparent hack-for-hire campaign likely orchestrated by a threat actor with suspected ties to the Indian government targeted journalists, activists, and government officials across the Middle East and North Africa (MENA), according to findings from Access Now, Lookout, and SMEX. Two of the targets included prominent Egyptian journalists and government critics, Mostafa

    Lien
  • [webapps] React Server 19.2.0 - Remote Code Execution
    Publié le April 9, 2026

    Source: ExploitDB

    React Server 19.2.0 - Remote Code Execution

    Lien
  • [webapps] RomM 4.4.0 - XSS_CSRF Chain
    Publié le April 9, 2026

    Source: ExploitDB

    RomM 4.4.0 - XSS_CSRF Chain

    Lien
  • [webapps] Jumbo Website Manager - Remote Code Execution
    Publié le April 9, 2026

    Source: ExploitDB

    Jumbo Website Manager - Remote Code Execution

    Lien
  • [local] ZSH 5.9 - RCE
    Publié le April 9, 2026

    Source: ExploitDB

    ZSH 5.9 - RCE

    Lien
  • New Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS Proxy
    Publié le April 8, 2026

    Source: HackerNews

    Cybersecurity researchers have flagged a new variant ofmalware called Chaosthat'scapable of hitting misconfigured cloud deployments, marking an expansion of the botnet's targeting infrastructure. "Chaos malware is increasingly targeting misconfigured cloud deployments, expanding beyond its traditional focus on routers and edge devices," Darktrace said in a new report.

    Lien
  • Masjesu Botnet Emerges as DDoS-for-Hire Service Targeting Global IoT Devices
    Publié le April 8, 2026

    Source: HackerNews

    Cybersecurity researchers have lifted the curtain on a stealthy botnet that's designed for distributed denial-of-service (DDoS) attacks. Called Masjesu, the botnet has been advertised via Telegram as a DDoS-for-hire service since it first surfaced in 2023. It's capable of targeting a wide range of IoT devices, such as routers and gateways, spanning multiple architectures. "Built for

    Lien
  • APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies
    Publié le April 8, 2026

    Source: HackerNews

    The Russian threat actor known as APT28 (aka Forest Blizzard and Pawn Storm) has been linked to a fresh spear-phishing campaign targeting Ukraine and its allies to deploy a previously undocumented malware suite codenamed PRISMEX. "PRISMEX combines advanced steganography, component object model (COM) hijacking, and legitimate cloud service abuse for command-and-control," Trend Micro

    Lien