L'actu de la sécu


Les dernières news:

  • Meta Disables 150K Accounts Linked to Southeast Asia Scam Centers in Global Crackdown
    Publié le March 11, 2026

    Source: HackerNews

    Meta on Wednesday said it disabled over 150,000 accounts associated with scam centers in Southeast Asia as part of a coordinated effort in partnership with authorities from Thailand, the U.S., the U.K., Canada, Korea, Japan, Singapore, the Philippines, Australia, New Zealand, and Indonesia. The effort also led to 21 arrests made by the Royal Thai Police, the company said. The action builds upon

    Lien
  • Dozens of Vendors Patch Security Flaws Across Enterprise Software and Network Devices
    Publié le March 11, 2026

    Source: HackerNews

    SAP has released security updates to address two critical security flaws that could be exploited to achieve arbitrary code execution on affected systems. The vulnerabilities in question listed below - CVE-2019-17571 (CVSS score: 9.8) - A code injection vulnerability in SAP Quotation Management Insurance application (FS-QUO) CVE-2026-27685 (CVSS score: 9.1) - An insecure deserialization

    Lien
  • What Boards Must Demand in the Age of AI-Automated Exploitation
    Publié le March 11, 2026

    Source: HackerNews

    “You knew, and you could have acted. Why didn’t you?”  This is the question you do not want to be asked. And increasingly, it’s the question leaders are forced to answer after an incident. For years, many executive teams and boards have treated a large vulnerability backlog as an uncomfortable but tolerable fact of life: “we’ve accepted the risk.” If you’ve ever seen a report showing

    Lien
  • Microsoft Patches 84 Flaws in March Patch Tuesday, Including Two Public Zero-Days
    Publié le March 11, 2026

    Source: HackerNews

    Microsoft on Tuesday released patches for a set of 84 new security vulnerabilities affecting various software components, including two that have been listed as publicly known. Of these, eight are rated Critical, and 76 are rated Important in severity. Forty-six of the patched vulnerabilities relate to privilege escalation, followed by 18 remote code execution, 10 information disclosure, four

    Lien
  • UNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours
    Publié le March 11, 2026

    Source: HackerNews

    A threat actor known as UNC6426 leveraged keys stolen following the supply chain compromise of the nx npm package last year to completely breach a victim's cloud environment within a span of 72 hours. The attack started with the theft of a developer's GitHub token, which the threat actor then used to gain unauthorized access to the cloud and steal data. "The threat actor, UNC6426, then used this

    Lien
  • Five Malicious Rust Crates and AI Bot Exploit CI/CD Pipelines to Steal Developer Secrets
    Publié le March 11, 2026

    Source: HackerNews

    Cybersecurity researchers have discovered five malicious Rust crates that masquerade as time-related utilities to transmit .env file data to the threat actors. The Rust packages, published to crates.io, are listed below - chrono_anchor dnp3times time_calibrator time_calibrators time-sync The crates, per Socket, impersonate timeapi.io and were published between late February and early March

    Lien
  • FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials
    Publié le March 10, 2026

    Source: HackerNews

    Cybersecurity researchers are calling attention to a new campaign where threat actors are abusing FortiGate Next-Generation Firewall (NGFW) appliances as entry points to breach victim networks.  The activity involves the exploitation of recently disclosed security vulnerabilities or weak credentials to extract configuration files containing service account credentials and network topology

    Lien
  • How to Stop AI Data Leaks: A Webinar Guide to Auditing Modern Agentic Workflows
    Publié le March 10, 2026

    Source: HackerNews

    Artificial Intelligence (AI) is no longer just a tool we talk to; it is a tool that does things for us. These are called AI Agents. They can send emails, move data, and even manage software on their own. But there is a problem. While these agents make work faster, they also open a new "back door" for hackers. The Problem: "The Invisible Employee" Think of an AI Agent like a new employee who has

    Lien
  • KadNap Malware Infects 14,000+ Edge Devices to Power Stealth Proxy Botnet
    Publié le March 10, 2026

    Source: HackerNews

    Cybersecurity researchers have discovered a new malware called KadNap that's primarily targeting Asus routers to enlist them into a botnet for proxying malicious traffic. The malware, first detected in the wild in August 2025, has expanded to over 14,000 infected devices, with more than 60% of victims located in the U.S., according to the Black Lotus Labs team at Lumen. A lesser number of

    Lien