Flux RSS

— Sources secondaires
71articles RSS
Reinitialiser
Healthcare IT Platform CareCloud Probing Potential Data Breach
Gouvernance & RégulationSecurityWeekil y a 18 heures

The company has disclosed a cybersecurity incident involving one of its electronic health record environments. The post Healthcare IT Platform CareCloud Probing Potential Data Breach appeared first on SecurityWeek.

Silent Drift: How LLMs Are Quietly Breaking Organizational Access Control
Incidents & BreachesSecurityWeekil y a 18 heures

LLMs can write complex Rego and Cedar code in seconds, but a single missing condition or hallucinated attribute can quietly dismantle your organization’s least-privilege security model. The post Silent Drift: How LLMs Are Quietly Breaking Organizational Access Control appeared first on SecurityWeek.

Huskeys Emerges From Stealth With $8 Million in Funding
Incidents & BreachesSecurityWeekil y a 19 heures

The startup has built an edge security management (ESM) platform, an AI engine atop the entire edge security stack. The post Huskeys Emerges From Stealth With $8 Million in Funding appeared first on SecurityWeek.

Russian APT Star Blizzard Adopts DarkSword iOS Exploit Kit
Gouvernance & RégulationSecurityWeekil y a 20 heures

The state-sponsored group’s campaign has targeted government, higher education, financial, and legal entities, as well as think tanks. The post Russian APT Star Blizzard Adopts DarkSword iOS Exploit Kit appeared first on SecurityWeek.

European Commission Reports Cyber Intrusion and Data Theft
Gouvernance & RégulationSecurityWeekil y a 20 heures

The ShinyHunters hacker group claimed to have stolen over 350GB of information from European Commission cloud systems. The post European Commission Reports Cyber Intrusion and Data Theft appeared first on SecurityWeek.

Apple’s Camera Indicator Lights
Gouvernance & RégulationSchneier on Securityil y a 21 heures

A thoughtful review of Apple’s system to alert users that the camera is on. It’s really well-designed, and important in a world where malware could surreptitiously start recording. The reason it’s tempting to think that a dedicated camera indicator light is more secure than an on-display indicator is the fact that hardware is generally more secure than software, because it’s harder to tamper with. With hardware, a dedicated hardware indicator light can be connected to the camera hardware such that if the camera is accessed, the light must turn on, with no way for software running on the device, no matter its privileges, to change that. With an indicator light that is rendered on the display, it’s not foolish to worry that malicious software, with sufficient privileges, could draw over the pixels on the display where the camera indicator is rendered, disguising that the camera is in use. If this were implemented simplistically, that concern would be completely valid. But Apple’s implementation of this is far from simplistic.

Telnyx Targeted in Growing TeamPCP Supply Chain Attack
Gouvernance & RégulationSecurityWeekil y a 21 heures

Two malicious versions of the popular SDK were uploaded to the PyPI registry, targeting Windows, macOS, and Linux. The post Telnyx Targeted in Growing TeamPCP Supply Chain Attack appeared first on SecurityWeek.

Exploitation of Fresh Citrix NetScaler Vulnerability Begins
Gouvernance & RégulationSecurityWeekil y a 22 heures

The critical-severity flaw leaks application memory and can be exploited to obtain authenticated administrative session IDs. The post Exploitation of Fresh Citrix NetScaler Vulnerability Begins appeared first on SecurityWeek.

FBI Confirms Kash Patel Email Hack as US Offers $10M Reward for Hackers
Fuites de donnéesSecurityWeekil y a 24 heures

The agency said Iranian hackers targeted the director’s personal email account and noted that the compromised information is old. The post FBI Confirms Kash Patel Email Hack as US Offers $10M Reward for Hackers appeared first on SecurityWeek.

Cloudflare-Themed ClickFix Attack Drops Infiniti Stealer on Macs
Malware & RansomwareSecurityWeekil y a 3 jours

The infection chain includes a fake CAPTCHA page, a Bash script, a Nuitka loader, and the Python-based infostealer. The post Cloudflare-Themed ClickFix Attack Drops Infiniti Stealer on Macs appeared first on SecurityWeek.

OpenAI Launches Bug Bounty Program for Abuse and Safety Risks
Gouvernance & RégulationSecurityWeekil y a 4 jours

Through the new program, OpenAI will reward reports covering design or implementation issues leading to material harm. The post OpenAI Launches Bug Bounty Program for Abuse and Safety Risks appeared first on SecurityWeek.

TP-Link Patches High-Severity Router Vulnerabilities
Vulnérabilités & PatchesSecurityWeekil y a 4 jours

The security defects could be used to bypass authentication, execute arbitrary commands, and decrypt configuration files. The post TP-Link Patches High-Severity Router Vulnerabilities appeared first on SecurityWeek.

RSAC 2026 Conference Announcements Summary (Days 3-4)
GénéralSecurityWeekil y a 4 jours

A summary of the announcements made by vendors on the third and fourth days of the RSAC 2026 Conference. The post RSAC 2026 Conference Announcements Summary (Days 3-4) appeared first on SecurityWeek.