Flux RSS

— Sources secondaires
Open VSX Bug Let Malicious VS Code Extensions Bypass Pre-Publish Security Checks
Vulnérabilités & PatchesThe Hacker Newsil y a 14 heures

Cybersecurity researchers have disclosed details of a now-patched bug impacting Open VSX's pre-publish scanning pipeline to cause the tool to allow a malicious Microsoft Visual Studio Code (VS Code) extension to pass the vetting process and go live in the registry. "The pipeline had a single boolean return value that meant both 'no scanners are configured' and 'all scanners failed to run,'" Koi

TP-Link Patches High-Severity Router Vulnerabilities
Vulnérabilités & PatchesSecurityWeekil y a 16 heures

The security defects could be used to bypass authentication, execute arbitrary commands, and decrypt configuration files. The post TP-Link Patches High-Severity Router Vulnerabilities appeared first on SecurityWeek.

Iran war drives urgent need  to counter underwater attack drones
Vulnérabilités & PatchesThe Register Securityil y a 17 heures

US and UK forces seeking tech tender with an April 3 deadline The UK and US are looking for technology to counter the threat posed by underwater drones to ships, harbors and other critical maritime infrastructure, and are asking industry for answers.…

RSAC 2026 Conference Announcements Summary (Days 3-4)
GénéralSecurityWeekil y a 17 heures

A summary of the announcements made by vendors on the third and fourth days of the RSAC 2026 Conference. The post RSAC 2026 Conference Announcements Summary (Days 3-4) appeared first on SecurityWeek.

CISA Flags Critical PTC Vulnerability That Had German Police Mobilized
Vulnérabilités & PatchesSecurityWeekil y a 19 heures

Police in Germany physically warned organizations about the critical PTC Windchill vulnerability tracked as CVE-2026-4681. The post CISA Flags Critical PTC Vulnerability That Had German Police Mobilized appeared first on SecurityWeek.

WhatsApp rolls out more AI features, iOS multi-account support
GénéralBleepingComputeravant-hier

WhatsApp is rolling out multiple features designed to make the app easier to use, including AI-powered message replies and photo retouching, support for two accounts on iOS, and chat history transfer between iOS and Android devices. [...]

BIND Updates Patch High-Severity Vulnerabilities
Vulnérabilités & PatchesSecurityWeekavant-hier

Specially crafted domains could be used to cause out-of-memory conditions, leading to memory leaks in the BIND resolvers. The post BIND Updates Patch High-Severity Vulnerabilities appeared first on SecurityWeek.

Masters of Imitation: How Hackers and Art Forgers Perfect the Art of Deception
GénéralThe Hacker Newsavant-hier

Unmasking impostors is something the art world has faced for decades, and there are valuable lessons from the works of Elmyr de Hory that can apply to the world of defensive cybersecurity. During the 1960s, de Hory gained infamy as a premier forger, passing off counterfeit masterworks of Picasso, Matisse, and Renoir to unsuspecting collectors and renowned museums. Over the next several decades,