Flux RSS

— Sources secondaires
Wartime Usage of Compromised IP Cameras Highlight Their Danger
Gouvernance & RégulationDark Readingil y a 13 heures

The list of countries exploiting internet-connected cameras to give them eye's inside their adversaries' borders continues to expand, with Russia, Iran, Israel, Ukraine, and the United States all using the tactic. What should companies look out for?

Infrastructure Attacks With Physical Consequences Down 25%
Gouvernance & RégulationDark Readingil y a 14 heures

Operational technology (OT) at industrial and critical infrastructure sites seem to have been benefitting from a lull in ransomware, and hackers' relative ignorance of OT systems.

Is the FCC's Router Ban the Wrong Fix?
Gouvernance & RégulationDark Readinghier

The agency put foreign-made consumer routers on its list of prohibited communications devices, but the ban could create more problems down the road.

Critical Flaw in Langflow AI Platform Under Attack
Gouvernance & RégulationDark Readinghier

Threats actors pounced on the code injection vulnerability within hours of its disclosure, demonstrating that organizations have little time to address critical bugs.

Trivy Supply Chain Attack Targets CI/CD Secrets
Vulnérabilités & PatchesDark Readingil y a 4 jours

A threat actor used the open source security tool to deploy an infostealer into CI/CD workflows and steal cloud credentials, SSH keys, tokens, and other sensitive secrets.

Ransomware's New Era: Moving at AI Speed
Gouvernance & RégulationDark Readingil y a 4 jours

Threat actors bypass security tools and use AI to launch faster ransomware attacks that exploit valid credentials and target data.

CISOs Debate Human Role in AI-Powered Security
Gouvernance & RégulationDark Readingil y a 4 jours

The idea of a "human in the loop" in AI deployment was challenged during a security executive panel at the RSAC 2026 Conference this week.