Flux RSS

— Sources secondaires
53articles RSS
Reinitialiser
AFC Ajax drops ball as flaws let hackers play admin with tickets and bans
Gouvernance & RégulationThe Register Securityil y a 11 heures

Vulns in Dutch football club's systems didn't just expose data – they let outsiders play with accounts, and even lift stadium bans Dutch football giant AFC Ajax has admitted to a data breach after an attacker gained access to its internal systems, in an incident that looks less like a stray pass and more like the gates left wide open.…

Iran war drives urgent need  to counter underwater attack drones
Vulnérabilités & PatchesThe Register Securityil y a 12 heures

US and UK forces seeking tech tender with an April 3 deadline The UK and US are looking for technology to counter the threat posed by underwater drones to ships, harbors and other critical maritime infrastructure, and are asking industry for answers.…

Security boffins scoured the web and found hundreds of valid API keys
Gouvernance & RégulationThe Register Securityil y a 16 heures

Global bank's devs have some cleaning up to do after cloud creds found in website code Computer security boffins have conducted an analysis of 10 million websites and found almost 2,000 API credentials strewn across 10,000 webpages.…

Brit lawmaker targeted by AI deepfake fails to get answers from US Big Tech
Gouvernance & RégulationThe Register Securityhier

Appearing before Parliament, Meta, Google and X struggle to explain how fake political video circulated for so long A member of the UK Parliament's lower house who was the victim of a deepfake AI campaign this week had a rare chance to confront the Big Tech executives who helped spread it. Their answers disappointed.…

UK wants to know if banning under-16s from social media does anything useful
Gouvernance & RégulationThe Register Securityavant-hier

300 families undergo 6-week trial to test impact on sleep, school, and home life The UK government will trial different levels of restrictions on social media for under-16s with the help of 300 families, alongside a public consultation that has already gathered nearly 30,000 responses.…

Scammers have virtual smartphones on speed dial for fraud
Gouvernance & RégulationThe Register Securityavant-hier

They cleverly mimic most traits of a real phone Smartphones have fast become the basis of our digital identities, securing payment systems and bank accounts. Now virtual devices that pretend to be real handsets have become a key tool for financial scammers, according to one company. …

Only Trump can decide when cyberwar turns into real war
GénéralThe Register Securityavant-hier

Four former NSA bosses walk onto the stage at RSAC… rsac 2026 There's a theoretical red line with cyber warfare. Cross it, and the US will respond with a physical attack like missile strikes. And that line "is whatever the President says it is," according to former NSA boss retired General Paul Nakasone.…

Enterprise PCs are unreliable, unpatched, and unloved compared to Macs
Vulnérabilités & PatchesThe Register Securityil y a 3 jours

Omnissa telemetry suggests business buyers are loving Apple and Google End-user compute vendor Omnissa, the company formed by the spin-out of VMware’s virtual desktops, applications, and device management biz, has dug into the telemetry it collects from customers and painted a picture of the world’s enterprise hardware fleet – and the news is better for Google and Apple than it is for Microsoft.…

EFF has a new boss to lead the fight against privacy-sucking forces of doom
Gouvernance & RégulationThe Register Securityil y a 3 jours

Cyber rights org retools for the days of AI and unrestrained government interview The Electronic Frontier Foundation (EFF) on Tuesday appointed Nicole Ozer to succeed Cindy Cohn as the cyber rights group's executive director when Cohn departs this summer.…

1K+ cloud environments infected following Trivy supply chain attack
Vulnérabilités & PatchesThe Register Securityil y a 3 jours

Crims 'creating a snowball effect' across open source projects RSAC 2026 Thousands of organizations' cloud environments have been infected with secret-stealing malware as a result of the Trivy supply-chain attack last week, and now the crims that compromised the open source scanners are working with notorious extortion crews like Lapsus$.…

LiteLLM loses game of Trivy pursuit, gets compromised
Vulnérabilités & PatchesThe Register Securityil y a 3 jours

Python interface for LLMs infected with malware via polluted CI/CD pipeline Two versions of LiteLLM, an open source interface for accessing multiple large language models, have been removed from the Python Package Index (PyPI) following a supply chain attack that injected them with malicious credential-stealing code.…

HackerOne slams supplier for delayed breach notice after staff data exposed
Gouvernance & RégulationThe Register Securityil y a 3 jours

Nearly 300 employees caught up in intrusion at benefits provider Navia Almost 300 HackerOne employees are caught up in a data breach, with the bug bounty biz slamming a third-party benefits provider for a weeks-long delay in notification.…

Russian initial access broker who fed ransomware crews gets 81 months in US prison
Malware & RansomwareThe Register Securityil y a 3 jours

Aleksei Volkov sentenced after enabling attacks that cost victims millions A Russian national who sold the keys to corporate networks faces nearly seven years in a US prison after prosecutors tied his handiwork to a string of ransomware attacks costing victims millions of dollars.…

Claude attacks were 'Rorschach test' for infosec community, scaring former NSA boss
Outils & RechercheThe Register Securityil y a 4 jours

'It freakin' worked' says Rob Joyce - and shows how relentless AI agents can find holes humans miss RSAC 2026 The now-infamous Anthropic report about Chinese cyberspies abusing Claude AI to automate cyberattacks was a Rorschach test for the infosec community, according to former NSA cyber boss Rob Joyce.…

Lightning-fast exploits make it essential to patch fast, ask questions later
Gouvernance & RégulationThe Register Securityil y a 4 jours

Here's where you ought to spend your security billable hours budget this year Strengthen your MFA policies, double-down on anti-phishing training, and for Jobs' sake, patch all your vulns right away. The past year of intelligence collected by Cisco's Talos threat hunters suggests that attackers are moving faster to exploit vulns, and fooling more staff than ever into giving up their credentials. …

Google unleashes Gemini AI agents on the dark web
Vulnérabilités & PatchesThe Register Securityil y a 4 jours

Claims it can analyze millions of daily events with 98 percent accuracy RSAC 2026 Google's Gemini AI agents are crawling the dark web, sifting through upward of 10 million posts a day to find a handful of threats relevant to a particular organization.…