Flux RSS

— Sources secondaires
90articles RSS
30jReinitialiser
Wartime Usage of Compromised IP Cameras Highlight Their Danger
Gouvernance & RégulationDark Readingil y a 18 heures

The list of countries exploiting internet-connected cameras to give them eye's inside their adversaries' borders continues to expand, with Russia, Iran, Israel, Ukraine, and the United States all using the tactic. What should companies look out for?

Infrastructure Attacks With Physical Consequences Down 25%
Gouvernance & RégulationDark Readingil y a 19 heures

Operational technology (OT) at industrial and critical infrastructure sites seem to have been benefitting from a lull in ransomware, and hackers' relative ignorance of OT systems.

Is the FCC's Router Ban the Wrong Fix?
Gouvernance & RégulationDark Readingavant-hier

The agency put foreign-made consumer routers on its list of prohibited communications devices, but the ban could create more problems down the road.

Critical Flaw in Langflow AI Platform Under Attack
Gouvernance & RégulationDark Readingavant-hier

Threats actors pounced on the code injection vulnerability within hours of its disclosure, demonstrating that organizations have little time to address critical bugs.

World Leaks data extortion: What you need to know
Fuites de donnéesGraham Cluleyavant-hier

World Leaks is a cyber extortion operation that steals sensitive data from organizations and threatens to leak it via the dark web if a ransom is not paid. Read more in my article on the Fortra blog.

Smashing Security podcast #460: Never knock on the door of a nuclear submarine base and ask for a selfie
GénéralGraham Cluleyavant-hier

A disgruntled data analyst decides that the best response to losing his contract is to steal the entire company payroll database and demand $2.5 million in Bitcoin - signing his extortion emails from a company called "Loot." Meanwhile, two people drive up to the entrance of the UK's nuclear submarine base at Faslane and politely ask if they can have a look around. Tourists? Spies? Something in between? All this and more in episode 460 of the "Smashing Security" podcast with cybersecurity veteran Graham Cluley, and special guest Jenny Radcliffe.