Toute l'actualité de la Cybersécurité
Germany's national rail operator Deutsche Bahn hit by a DDoS attack
2026-02-19 18:45:56
Germany's national rail operator, Deutsche Bahn, suffered a major DDoS attack that disrupted booking and information systems for several hours. Germany's rail operator Deutsche Bahn was hit by a large-scale...
Why LLMs Make Terrible Databases and Why That Matters for Trusted AI
2026-02-19 18:00:53
Large language models (LLMs) are now embedded across the SDLC. They summarize documentation, generate code, explain vulnerabilities, and assist with architectural decisions.
PromptSpy Android Malware Abuses Gemini AI to Automate Recent-Apps Persistence
2026-02-19 17:52:00
Cybersecurity researchers have discovered what they say is the first Android malware that abuses Gemini, Google's generative artificial intelligence (AI) chatbot, as part of its execution flow and achieves...
INTERPOL Operation Red Card 2.0 Arrests 651 in African Cybercrime Crackdown
2026-02-19 17:50:00
An international cybercrime operation against online scams has led to 651 arrests and recovered more than .3 million as part of an effort led by law enforcement agencies from 16 African countries.
The...
Microsoft Patches CVE-2026-26119 Privilege Escalation in Windows Admin Center
2026-02-19 17:40:00
Microsoft has disclosed a now-patched security flaw in Windows Admin Center that could allow an attacker to escalate their privileges.
Windows Admin Center is a locally deployed, browser-based management...
CCM v4.1 Transition Timeline
2026-02-19 17:36:44
This blog was published on February 19, 2026 with the latest information regarding the release of CCM v4.1.
On January 28, CSA released version 4.1 of the Cloud Controls Matrix (CCM), succeeding CCM...
Adidas Investigates Alleged Data Breach – 815,000 Records of Customer Data Stolen
2026-02-19 17:30:08
Adidas has confirmed it is actively investigating a potential data breach involving one of its independent third-party partners after a threat actor operating under the alias “LAPSUS-GROUP”...
GitHub prépare un agent IA pour la maintenance des référentiels
2026-02-19 17:20:47
Déboguer des pipelines d’intégration continue, trier et hiérarchiser les erreurs, mettre à jour une documentation obsolète (...)
Flaw in Grandstream VoIP phones allows stealthy eavesdropping
2026-02-19 17:16:32
A critical vulnerability in Grandstream GXP1600 series VoIP phones allows a remote, unauthenticated attacker to gain root privileges and silently eavesdrop on communications. [...]
Google blocked over 1.75 million Play Store app submissions in 2025
2026-02-19 17:00:00
Google says that through 2025, it blocked more than 255,000 Android apps from obtaining excessive access to sensitive user data and rejected over 1.75 million apps from being published on Google Play...
Keeping Google Play & Android app ecosystems safe in 2025
2026-02-19 17:00:00
Posted by Vijaya Kaza, VP and GM, App & Ecosystem Trust
The Android ecosystem is a thriving global community built on trust, giving billions of users the confidence to download the latest apps. In...
New e-book: Establishing a proactive defense with Microsoft Security Exposure Management
2026-02-19 17:00:00
Read the new maturity-based guide that helps organizations move from fragmented, reactive security practices to a unified exposure management approach that enables proactive defense.
The post New e-book: Establishing a...
OpenClaw's Top Skill is a Malware that Stole SSH Keys and Opened Reverse Shells in 1,184 Packages
2026-02-19 16:55:05
The most downloaded AI agent skill on OpenClaw’s ClawHub marketplace was functional malware, not a productivity tool. OpenClaw, an open-source AI agent platform, operates a public skill marketplace...
Running OpenClaw safely: identity, isolation, and runtime risk
2026-02-19 16:27:00
Self-hosted agents execute code with durable credentials and process untrusted input. This creates dual supply chain risk, where skills and external instructions converge in the same runtime. As OpenClaw-like...
Beyond CVE China's Dual Vulnerability Databases Reveal a Different Disclosure Timeline
2026-02-19 16:09:26
The emergence of a distinct vulnerability disclosure ecosystem within China has introduced a complex layer to the global threat landscape. Unlike the centralized CVE system used internationally, China...
The HackerNoon Newsletter: A Guide on How to Rewire Self-Doubt (2/19/2026)
2026-02-19 16:03:43
How are you, hacker?
🪐 What's happening in tech today, February 19, 2026?
The
HackerNoon Newsletter
brings the HackerNoon
...
AI Under Control: Link11 Launches AI Management Dashboard for Clean Traffic
2026-02-19 14:00:47
Frankfurt am Main, Germany, 19th February 2026, CyberNewswire
Après son piratage, Notepad++ bétonne sa sécurité
2026-02-19 15:46:07
Piraté par des cybercriminels début février, l'éditeur de texte open source Notepad++ monte d'un cran sa sécurité. (...)
1,2 million de comptes bancaires consultés : ce que vous devez comprendre
2026-02-19 15:33:00
Un accès non autorisé au fichier national des comptes bancaires (Ficoba) a exposé les données de 1,2 million de titulaires fin janvier. Si aucune opération n'a pu être réalisée, les informations...
CISA orders feds to patch actively exploited Dell flaw within 3 days
2026-02-19 15:30:37
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) ordered government agencies to patch their systems within three days against a maximum-severity Dell vulnerability that has been under...
Connected and Compromised: When IoT Devices Turn Into Threats
2026-02-19 15:18:23
Reused passwords, a lack of network segmentation, and poor sanitization processes make the Internet of Things' attack surfaces more dangerous.
U.S. CISA adds Dell RecoverPoint and GitLab flaws to its Known Exploited Vulnerabilities catalog
2026-02-19 15:16:39
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Dell RecoverPoint and GitLab flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security...
Selective Thread Emulation and Fuzzing Expose DoS Flaws in Socomec DIRIS M-70 IIoT Device
2026-02-19 15:06:27
Security researchers have uncovered six critical denial-of-service vulnerabilities in the Socomec DIRIS M-70 industrial gateway used for power monitoring and energy management in critical infrastructure....
How infostealers turn stolen credentials into real identities
2026-02-19 15:05:15
Infostealer dumps increasingly tie stolen credentials to real identities, linking usernames, cookies, and behavior across personal and enterprise accounts. Specops explains how analyzing 90,000 dumps...
Why Layered MAPF Algorithms Win on Speed but Lose on Optimality
2026-02-19 15:00:16
Decomposing Multi-Agent Pathfinding (MAPF) instances into layered subproblems consistently reduces runtime and memory consumption while increasing solver success rates across major algorithms, including...
I Spent Two Weeks Testing 8 Databases With the Same Question - Here's What Actually Happened
2026-02-19 15:00:09
An analytics dashboard at a company was taking 4 minutes to load. The company was spending ,000 a month on a database that was basically doing math on spreadsheets. The database we were currently using—the...
China-Linked Hackers Use Dell RecoverPoint Flaw to Drop GrimBolt Malware
2026-02-19 14:52:22
Dell warns of a critical security hole in its RecoverPoint software exploited by hackers. Learn how to protect your data from the CVE-2026-22769 vulnerability and the new GrimBolt malware.
Raspberry Pi rattrapé par la fièvre de l'IA
2026-02-19 14:49:11
Raspberry Pi s'est retrouvé propulsé en Bourse par un engouement inattendu pour OpenClaw, nouvel outil d'IA dont la popularité explose.
The post Raspberry Pi rattrapé par la fièvre de l'IA appeared...
AI-generated passwords are a security risk
2026-02-19 14:46:58
AI-generated passwords are "highly predictable" and aren't truly random, making them easier for cybercriminals to crack.
PromptSpy – First Known Android AI Malware Uses Google's Gemini for Decision-making
2026-02-19 14:39:42
The first known Android malware family to weaponize a generative AI model, specifically Google’s Gemini, as part of its active execution flow. Discovered in February 2026, the malware represents...
Au Parlement européen, la DSI met l'IA en pause
2026-02-19 14:39:41
Craignant pour la sécurité des données, la DSI a bloqué des fonctionnalités IA intégrées à des appareils mobiles professionnels.
The post Au Parlement européen, la DSI met l’IA en pause...
Forescout research points to record number of ICS vulnerabilities in 2025
2026-02-19 14:38:55
Forescout has released new research warning that industrial control systems (ICS) are facing unprecedented levels of cyber risk, with 2025 marking the highest number of recorded vulnerabilities to date....
ThreatsDay Bulletin: OpenSSL RCE, Foxit 0-Days, Copilot Leak, AI Password Flaws & 20+ Stories
2026-02-19 14:35:00
The cyber threat space doesn't pause, and this week makes that clear. New risks, new tactics, and new security gaps are showing up across platforms, tools, and industries — often all at the same time.
Some...
Threat Actors Using Fake Google Forms Site to Harvest Google Logins
2026-02-19 14:30:35
A new phishing campaign is targeting job seekers through fake Google Forms websites designed to steal login credentials. The campaign uses sophisticated domain impersonation techniques to trick victims...
USN-8033-8: Linux kernel (Intel IoTG) vulnerabilities
2026-02-19 14:23:05
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Nios II architecture;
...
CISA Warns of Honeywell CCTV Products Vulnerability Leads to Account Takeovers
2026-02-19 14:00:56
A critical advisory warning regarding a severe vulnerability affecting Honeywell CCTV products, published on February 17, 2026, under advisory ICSA-26-048-04. The alert details a high-severity security...
Nigerian man gets eight years in prison for hacking tax firms
2026-02-19 13:51:49
A Nigerian national was sentenced to eight years in prison for hacking multiple tax preparation firms in Massachusetts and filing fraudulent tax returns seeking over .1 million in refunds. [...]
Hackers Leveraging nslookup.exe to Stage Payloads via DNS Using Clickfix Attack
2026-02-19 13:44:42
A sophisticated evolution of the ClickFix social engineering campaign, in which threat actors are now abusing the legitimate Windows utility nslookup.exe to deploy malicious payloads via DNS queries....
Arthur Mensch relance le débat : le replatforming par l'IA va-t-il engloutir le logiciel d'entreprise ?
2026-02-19 13:43:26
Arthur Mensch, le patron de Mistral AI, affirme que plus de la moitié des logiciels d'entreprise pourraient être supplantés par des solutions construites autour de l'IA générative.
The post Arthur...
Why Small Businesses Can't Afford To Ignore Cyberinsurance
2026-02-19 13:31:35
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Feb. 19, 2026 –Read the full story in Charter Capital Three out of five small-to-midsized businesses (SMBs) permanently...
Eni forme des techniciens à la cybersécurité à Rennes
2026-02-19 13:19:00
Aux côtés des parcours classiques d’apprentissage du numérique, les formations professionnalisantes courtes se développent (...)
USN-8053-1: libvpx vulnerability
2026-02-19 13:16:46
It was discovered that libvpx did not properly handle certain malformed
media files. If an application using libvpx opened a specially crafted
file, a remote attacker could cause a denial of service,...
The Missing Layer in AI Security: Why "Data-in-Use" Is the Next Battleground
2026-02-19 13:04:52
The average global breach cost will rise to .88M in 2024, up 10% from the previous year. In H1 2025 alone, 1,732 breaches exposed over 165 million records. Qatar's Bet: Confidential AI Gets Physical....
Après la RAM et les CPU, le spectre d'une pénurie de disques durs
2026-02-19 12:41:45
Les dernières annonces de Seagate et Western Digital confirment les tensions à l'approvisionnement en disques durs.
The post Après la RAM et les CPU, le spectre d’une pénurie de disques durs...
Texas sues TP-Link over Chinese hacking risks, user deception
2026-02-19 12:36:51
Texas sued networking giant TP-Link Systems, accusing the company of deceptively marketing its routers as secure while allowing Chinese state-backed hackers to exploit firmware vulnerabilities and access...
Hackers target Microsoft Entra accounts in device code vishing attacks
2026-02-19 12:30:37
Threat actors are targeting technology, manufacturing, and financial organizations in campaigns that combine device code phishing and voice phishing (vishing) to abuse the OAuth 2.0 Device Authorization...
USN-8028-7: Linux kernel (Low Latency NVIDIA) vulnerabilities
2026-02-19 12:29:23
It was discovered that improper initialization of CPU cache memory could
allow a local attacker with hypervisor access to overwrite SEV-SNP guest
memory resulting in loss of data integrity. (CVE-2024-36331)
Oleksii...
The Ghost in the Statistical Machine: A Search for the Source of Will
2026-02-19 12:22:53
Large Language Models (LLMs) have been making headlines for expressing their "desires" The phenomenon raises disturbing set of questions that go far beyond technology. To understand where we stand in...
Study Finds MAPF Decomposition Efficient Under Low Agent Density
2026-02-19 12:00:20
This study evaluates the computational impact of decomposing Multi-Agent Path Finding (MAPF) instances into subproblems. Across 22,300 benchmark instances, decomposition generally adds minimal overhead—under...
Kindness Transforms a Lonely Childhood
2026-02-19 12:00:14
In Chapter VIII, Miss Caldera, a learned but poor governess, tutors young Mina Frazer at home. The story explores their growing bond, contrasts between past happiness and present struggles, and Mina's...
Family Feuds and Life's Tough Choices in the Moors
2026-02-19 12:00:07
Chapter VII follows Mina Frazer, a determined child navigating life away from Scotland. Her uncle John Merapie struggles to manage her strong will while balancing family duties and societal expectations....
XWorm Malware Delivered via Fake Financial Receipts Targeting Windows Systems to Steal Logins and Sessions
2026-02-19 11:55:44
A sophisticated multi-stage malware campaign is actively targeting Brazilian and Latin American (LATAM) businesses using fake bank receipts to deliver XWorm v5.6, a commodity remote access trojan (RAT)...
From Exposure to Exploitation: How AI Collapses Your Response Window
2026-02-19 11:55:00
We've all seen this before: a developer deploys a new cloud workload and grants overly broad permissions just to keep the sprint moving. An engineer generates a "temporary" API key for testing and forgets...
CISA alerts to critical auth bypass CVE-2026-1670 in Honeywell CCTVs
2026-02-19 11:54:01
CISA warns Honeywell CCTVs are affected by a critical auth bypass flaw (CVE-2026-1670) allowing unauthorized access or account hijacking. The U.S. Cybersecurity and Infrastructure Security Agency (CISA)...
How Crypto Expo Europe Is Bridging Web3 Founders and EU Regulators in the MiCA Era
2026-02-19 11:48:56
In this exclusive HackerNoon interview, Crypto Expo Europe CEO Ruxandra Natalia Tataru breaks down the MiCA regulatory shift, Romania's rise as a fintech hub, and how the 2026 Expo bridges institutional...
Intimate products maker Tenga spilled customer data
2026-02-19 11:48:35
A phishing attack on a Tenga employee may have exposed US customer data. Customers should watch for sextortion-themed phishing attempts.
5 Free Tools to Monitor Your VPS (Terminal)
2026-02-19 11:32:58
A mysterious VPS slowdown turned out to be a silent cryptojacking attack. After days of troubleshooting, I discovered five powerful (and free) Linux terminal tools—btop, htop, glances, bpytop, and bmon—that...
Police arrests 651 suspects in African cybercrime crackdown
2026-02-19 11:24:17
African authorities arrested 651 suspects and recovered over .3 million in a joint operation targeting investment fraud, mobile money scams, and fake loan applications. [...]
Le NIST planche sur la sécurité et l'interopérabilité des agents IA
2026-02-19 11:20:43
Un peu en retrait sur la question des agents IA, le NIST passe à l'action en annonçant que son centre de l'innovation et des standards (Caisi) (...)
Meta patents AI that could keep you posting from beyond the grave
2026-02-19 11:16:32
Hopefully Meta really will file this in the "just because we can do it doesn't mean we should" drawer.
Ubuntu 22.04 LTS Kernel Critical Security Flaws USN-8033-7
2026-02-19 11:15:18
Several security issues were fixed in the Linux kernel.
A New Method for Decomposing MAPF Problems Into Solvable Subproblems
2026-02-19 11:15:06
This article introduces a structured methodology for decomposing Multi-Agent Pathfinding (MAPF) instances into smaller, solvable subproblems. The process begins by identifying agent dependencies and forming...
Love, Long Distance, and Linux: Building a VPN Blind to Bridge the Gap
2026-02-19 11:09:17
Five thousand miles apart, a legally blind Adaptive Systems Architect refused to let geo-locking win. After battling inaccessible cloud dashboards and spinning up a free Oracle Cloud VPS, he built a WireGuard...
Ubuntu 24.04 Low Latency Kernel Low Risk Issues USN-8052-1
2026-02-19 11:03:02
Several security issues were fixed in the Linux kernel.
Arkanix Stealer: a C++ & Python infostealer
2026-02-19 11:00:49
Kaspersky researchers analyze a C++ and Python stealer dubbed "Arkanix Stealer", which was active for several months, targeted wide range of data, was distributed as MaaS and offered referral program...
Ubuntu 24.04 LTS Linux Kernel Critical Data Exploit Advisory USN-8031-3
2026-02-19 10:39:56
Several security issues were fixed in the Linux kernel.
Fake IPTV Apps Spread Massiv Android Malware Targeting Mobile Banking Users
2026-02-19 10:24:00
Cybersecurity researchers have disclosed details of a new Android trojan called Massiv that's designed to facilitate device takeover (DTO) attacks for financial theft.
The malware, according to ThreatFabric,...
Ubuntu 22.04 LTS Linux HWE Critical Security Flaws USN-8028-6
2026-02-19 10:11:20
Several security issues were fixed in the Linux kernel.
USN-8033-7: Linux kernel vulnerabilities
2026-02-19 10:10:15
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Nios II architecture;
...
Infostealer Found Stealing OpenClaw AI Identity and Memory Files
2026-02-19 10:06:10
Researchers at Hudson Rock have identified a live infection where an infostealer exfiltrated a victim's OpenClaw configuration. The discovery highlights a shift in malware behaviour toward harvesting...
New 'Massiv' Android banking malware poses as an IPTV app
2026-02-19 10:00:00
A newly identified Android banking trojan named Massiv has been under active distribution across south Europe, disguised as an IPTV app. [...]
L'IA accélère la vitesse des cyberattaques
2026-02-19 09:58:50
Les cyberattaques se multiplient, laissant toujours moins de temps entre la compromission initiale et les conséquences néfastes. De plus, (...)
Irish regulator probes X after Grok allegedly generated sexual images of children
2026-02-19 09:53:32
Ireland's Data Protection Commission opened a probe into X over Grok AI tool allegedly generating sexual images, including of children. Ireland's Data Protection Commission has launched another investigation...
USN-8052-1: Linux kernel (Low Latency) vulnerabilities
2026-02-19 09:51:06
It was discovered that improper initialization of CPU cache memory could
allow a local attacker with hypervisor access to overwrite SEV-SNP guest
memory resulting in loss of data integrity. (CVE-2024-36331)
Oleksii...
USN-8031-3: Linux kernel vulnerabilities
2026-02-19 09:26:23
It was discovered that improper initialization of CPU cache memory could
allow a local attacker with hypervisor access to overwrite SEV-SNP guest
memory resulting in loss of data integrity. (CVE-2024-36331)
Oleksii...
USN-8028-6: Linux kernel (HWE) vulnerabilities
2026-02-19 09:01:52
It was discovered that improper initialization of CPU cache memory could
allow a local attacker with hypervisor access to overwrite SEV-SNP guest
memory resulting in loss of data integrity. (CVE-2024-36331)
Oleksii...
Intellexa's Predator spyware infected Angolan journalist's device, Amnesty reports
2026-02-19 08:17:16
Amnesty reports Angolan journalist's iPhone was infected by Intellexa's Predator spyware via a WhatsApp link in May 2024. Amnesty International reports that in May 2024, Intellexa's Predator spyware...
CRESCENTHARVEST Campaign Targets Iran Protest Supporters With RAT Malware
2026-02-19 08:13:00
Cybersecurity researchers have disclosed details of a new campaign dubbed CRESCENTHARVEST, likely targeting supporters of Iran's ongoing protests to conduct information theft and long-term espionage.
The...
More Than 40% of South Africans Were Scammed in 2025
2026-02-19 07:00:00
Survey underscores the reality that scammers follow "scalable opportunities and low friction," rather than rich targets that tend to be better protected.
Unpatchable? How Chinese Hackers Hid in Dell VMs for 2 Years Using "Magic Packets"
2026-02-19 04:48:46
Imagine locking your front door with the most expensive, heavy-duty biometric lock money can buy. You feel safe. But you don't realize that the builder of the house glued a spare key under the doormat — and...
Extracting IPA from a Non-Jailbroken iOS Device with Apple Configurator
2026-02-19 04:45:06
Hello everyone. During mobile application assessments, we often need the IPA file for static analysis. However, on iOS 18+ devices, many apps cannot be installed on jailbroken devices, which prevents...
Breaking the Trust Boundary: SSRF via a Misconfigured Sentry Tunnel
2026-02-19 04:44:41
Free Article Link: Click for free!Continue reading on InfoSec Write-ups »
Dell RecoverPoint for Virtual Machines Zero Day Attack
2026-02-19 04:23:02
What is the Attack?
The attack involves the threat cluster UNC6201 (a suspected China-nexus Advanced Persistent Threat (APT)) actively exploiting a...
OSSEC for Linux: What It Means for Your Monitoring and Risk Posture
2026-02-19 03:46:12
You probably already have firewall rules in place, regular patching cycles, and logs flowing into a SIEM. That covers a lot. What it does not tell you is whether /usr/bin/ssh was replaced last night,...
Fedora 42 fvwm3 Crucial Service Disruption Patch 2026-439af2cc95
2026-02-19 01:33:10
Fix CVE-2025-65637.
Fedora 43 Fvwm3 Important Denial-of-Service Security Patch CVE-2025-65637
2026-02-19 01:14:16
Fix CVE-2025-65637.
List of 34 new domains
2026-02-19 00:00:00
.fr alumni-u-paris[.fr] (registrar: Edomains LLC)
assu-servicesmaladie[.fr] (registrar: Hostinger operations UAB)
betify-enfrance[.fr] (registrar: TLD Registrar Solutions Ltd)
betonreds1[.fr] (registrar:...
Multiples vulnérabilités dans Google Chrome (19 février 2026)
19/02/2026
De multiples vulnérabilités ont été découvertes dans Google Chrome. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Multiples vulnérabilités dans Tenable Security Center (19 février 2026)
19/02/2026
De multiples vulnérabilités ont été découvertes dans Tenable Security Center. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à...
Multiples vulnérabilités dans les produits Splunk (19 février 2026)
19/02/2026
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance...
Vulnérabilité dans F5 BIG-IP (19 février 2026)
19/02/2026
Une vulnérabilité a été découverte dans F5 BIG-IP. Elle permet à un attaquant de provoquer un déni de service à distance.
Multiples vulnérabilités dans Microsoft Edge (19 février 2026)
19/02/2026
De multiples vulnérabilités ont été découvertes dans Microsoft Edge. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.