Cybersécurité

Retrouvez toutes les actualités de cette catégorie dans une vue dédiée.

Cybersécurité

Retour aux actualités
Over 10,000 Zimbra servers vulnerable to ongoing XSS attacks
CYBERSECURITY 24/04/2026 13:35

Over 10,000 Zimbra servers vulnerable to ongoing XSS attacks

Over 10,000 Zimbra Collaboration Suite (ZCS) instances exposed online are vulnerable to ongoing attacks exploiting a cross-site scripting (XSS) security flaw. [...]

Source: BleepingComputer

Bridging the AI Agent Authority Gap: Continuous Observability as the Decision Engine
CYBERSECURITY 24/04/2026 11:49

Bridging the AI Agent Authority Gap: Continuous Observability as the Decision Engine

The AI Agent Authority Gap - From Ungoverned to Delegation As discussed in our previous article, AI agents are exposing a structural gap in enterprise security, but the problem is often framed too narrowly. The issue is

Source: The Hacker News

Microsoft now lets admins uninstall Copilot on enterprise devices
CYBERSECURITY 24/04/2026 11:38

Microsoft now lets admins uninstall Copilot on enterprise devices

Microsoft says IT administrators can now uninstall the AI-powered Copilot digital assistant from enterprise devices using a new policy setting, which has become broadly available after the April 2026 Patch Tuesday. [...]

Source: BleepingComputer

26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases
CYBERSECURITY 24/04/2026 11:48

26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases

Cybersecurity researchers have discovered a set of malicious apps on the Apple App Store that impersonate popular cryptocurrency wallets in an attempt to steal recovery phrases and private keys since at least fall 2025.

Source: The Hacker News

Hackers exploit file upload bug in Breeze Cache WordPress plugin
CYBERSECURITY 23/04/2026 21:33

Hackers exploit file upload bug in Breeze Cache WordPress plugin

Hackers are actively exploiting a critical vulnerability in the Breeze Cache plugin for WordPress that allows uploading arbitrary files on the server without authentication. [...]

Source: BleepingComputer

Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2
CYBERSECURITY 24/04/2026 09:29

Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2

Chinese-speaking individuals are the target of a new campaign that uses a trojanized version of SumatraPDF reader to deploy the AdaptixC2 Beacon post-exploitation agent and ultimately facilitate the abuse of Microsoft Vi

Source: The Hacker News

Bitwarden CLI npm package compromised to steal developer credentials
CYBERSECURITY 23/04/2026 19:21

Bitwarden CLI npm package compromised to steal developer credentials

The Bitwarden CLI was briefly compromised after attackers uploaded a malicious @bitwarden/cli package to npm containing a credential-stealing payload capable of spreading to other projects. [...]

Source: BleepingComputer

LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure
CYBERSECURITY 24/04/2026 07:24

LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure

A high-severity security flaw in LMDeploy, an open-source toolkit for compressing, deploying, and serving LLMs, has come under active exploitation in the wild less than 13 hours after its public disclosure. The vulnerabi

Source: The Hacker News

Trigona ransomware attacks use custom exfiltration tool to steal data
CYBERSECURITY 23/04/2026 18:59

Trigona ransomware attacks use custom exfiltration tool to steal data

Recently observed Trigona ransomware attacks are using a custom, command-line tool to steal data from compromised environments faster and more efficiently. [...]

Source: BleepingComputer

UNC6692 Impersonates IT Help Desk via Microsoft Teams to Deploy SNOW Malware
CYBERSECURITY 23/04/2026 18:16

UNC6692 Impersonates IT Help Desk via Microsoft Teams to Deploy SNOW Malware

A previously undocumented threat activity cluster known as UNC6692 has been observed leveraging social engineering tactics via Microsoft Teams to deploy a custom malware suite on compromised hosts. "As with many other in

Source: The Hacker News

New Checkmarx supply-chain breach affects KICS analysis tool
CYBERSECURITY 23/04/2026 16:05

New Checkmarx supply-chain breach affects KICS analysis tool

Hackers have compromised Docker images, VSCode and Open VSX extensions for the Checkmarx KICS analysis tool to harvest sensitive data from developer environments. [...]

Source: BleepingComputer

Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign
CYBERSECURITY 23/04/2026 13:42

Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign

Bitwarden CLI, the command-line interface for the password manager Bitwarden, has reportedly been compromised as part of a newly discovered and ongoing Checkmarx supply chain campaign, according to findings from JFrog an

Source: The Hacker News

Cosmetics giant Rituals discloses data breach affecting customers
CYBERSECURITY 23/04/2026 14:16

Cosmetics giant Rituals discloses data breach affecting customers

Dutch cosmetics giant Rituals disclosed a data breach after attackers stole the personal information of an undisclosed number of customers from its "My Rituals" membership database. [...]

Source: BleepingComputer

ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms +25 New Stories
CYBERSECURITY 23/04/2026 13:17

ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms +25 New Stories

You scroll past one incident and see another that feels familiar, like it should have been fixed years ago, but it still works with small changes. Same bugs. Same mistakes. The supply chain is messy. Packages you did not

Source: The Hacker News

Regular Password Resets Aren’t as Safe as You Think
CYBERSECURITY 23/04/2026 14:10

Regular Password Resets Aren’t as Safe as You Think

Password resets are one of the easiest ways for attackers to bypass security controls. Specops Software shows how helpdesk social engineering turns a seemingly legitimate reset request into full account compromise. [...]

Source: BleepingComputer

[Webinar] Mythos Reality Check: Beating Automated Exploitation at AI Speed
CYBERSECURITY 23/04/2026 12:03

[Webinar] Mythos Reality Check: Beating Automated Exploitation at AI Speed

Imagine a world where hackers don't sleep, don't take breaks, and find weak spots in your systems instantly. Well, that world is already here. Thanks to AI, attackers are now launching automated, large-scale exploits fas

Source: The Hacker News

Microsoft: Some Teams users can’t join meetings after Edge update
CYBERSECURITY 23/04/2026 13:18

Microsoft: Some Teams users can’t join meetings after Edge update

Microsoft confirmed that a recent Microsoft Edge browser update introduced a bug that prevents Windows users from joining Teams meetings. [...]

Source: BleepingComputer

Project Glasswing Proved AI Can Find the Bugs. Who's Going to Fix Them?
CYBERSECURITY 23/04/2026 11:30

Project Glasswing Proved AI Can Find the Bugs. Who's Going to Fix Them?

Last week, Anthropic announced Project Glasswing, an AI model so effective at discovering software vulnerabilities that they took the extraordinary step of postponing its public release. Instead, the company has given ac

Source: The Hacker News

UK warns of Chinese hackers using proxy networks to evade detection
CYBERSECURITY 23/04/2026 12:28

UK warns of Chinese hackers using proxy networks to evade detection

The United Kingdom's National Cyber Security Centre (NCSC-UK) and international partners warned that China-nexus hackers are increasingly using large-scale proxy networks of hijacked consumer devices to evade detection a

Source: BleepingComputer

China-Linked GopherWhisper Infects 12 Mongolian Government Systems with Go Backdoors
CYBERSECURITY 23/04/2026 09:04

China-Linked GopherWhisper Infects 12 Mongolian Government Systems with Go Backdoors

Mongolian governmental institutions have emerged as the target of a previously undocumented China-aligned advanced persistent threat (APT) group tracked as GopherWhisper. "The group wields a wide array of tools mostly wr

Source: The Hacker News

New GopherWhisper APT group abuses Outlook, Slack, Discord for comms
CYBERSECURITY 23/04/2026 12:06

New GopherWhisper APT group abuses Outlook, Slack, Discord for comms

A previously undocumented state-backed threat actor named GopherWhisper is using a Go-based custom toolkit and legitimate services like Microsoft 365 Outlook, Slack, and Discord in attacks against government entities. [.

Source: BleepingComputer

Vercel Finds More Compromised Accounts in Context.ai-Linked Breach
CYBERSECURITY 23/04/2026 08:40

Vercel Finds More Compromised Accounts in Context.ai-Linked Breach

Vercel on Wednesday revealed that it has identified an additional set of customer accounts that were compromised as part of a security incident that enabled unauthorized access to its internal systems. The company said i

Source: The Hacker News

CISA orders feds to patch BlueHammer flaw exploited as zero-day
CYBERSECURITY 23/04/2026 11:05

CISA orders feds to patch BlueHammer flaw exploited as zero-day

CISA has ordered U.S. federal agencies to patch a Microsoft Defender privilege escalation flaw (dubbed BlueHammer) that has been exploited in zero-day attacks. [...]

Source: BleepingComputer

Apple Fixes iOS Flaw That Let FBI Recover Deleted Signal Messages
CYBERSECURITY 23/04/2026 08:06

Apple Fixes iOS Flaw That Let FBI Recover Deleted Signal Messages

Apple has rolled out a software fix for iOS and iPadOS to address a Notification Services flaw that stored notifications marked for deletion on the device. The vulnerability, tracked as CVE-2026-28950 (CVSS score: N/A),

Source: The Hacker News