Flux RSS

— Sources secondaires
160articles RSS
Reinitialiser
Wartime Usage of Compromised IP Cameras Highlight Their Danger
Gouvernance & RégulationDark Readingil y a 18 heures

The list of countries exploiting internet-connected cameras to give them eye's inside their adversaries' borders continues to expand, with Russia, Iran, Israel, Ukraine, and the United States all using the tactic. What should companies look out for?

Infrastructure Attacks With Physical Consequences Down 25%
Gouvernance & RégulationDark Readingil y a 19 heures

Operational technology (OT) at industrial and critical infrastructure sites seem to have been benefitting from a lull in ransomware, and hackers' relative ignorance of OT systems.

AFC Ajax drops ball as flaws let hackers play admin with tickets and bans
Gouvernance & RégulationThe Register Securityil y a 20 heures

Vulns in Dutch football club's systems didn't just expose data – they let outsiders play with accounts, and even lift stadium bans Dutch football giant AFC Ajax has admitted to a data breach after an attacker gained access to its internal systems, in an incident that looks less like a stray pass and more like the gates left wide open.…

Iran war drives urgent need  to counter underwater attack drones
Vulnérabilités & PatchesThe Register Securityil y a 21 heures

US and UK forces seeking tech tender with an April 3 deadline The UK and US are looking for technology to counter the threat posed by underwater drones to ships, harbors and other critical maritime infrastructure, and are asking industry for answers.…

Security boffins scoured the web and found hundreds of valid API keys
Gouvernance & RégulationThe Register Securityhier

Global bank's devs have some cleaning up to do after cloud creds found in website code Computer security boffins have conducted an analysis of 10 million websites and found almost 2,000 API credentials strewn across 10,000 webpages.…

Is the FCC's Router Ban the Wrong Fix?
Gouvernance & RégulationDark Readingavant-hier

The agency put foreign-made consumer routers on its list of prohibited communications devices, but the ban could create more problems down the road.

Critical Flaw in Langflow AI Platform Under Attack
Gouvernance & RégulationDark Readingavant-hier

Threats actors pounced on the code injection vulnerability within hours of its disclosure, demonstrating that organizations have little time to address critical bugs.

World Leaks data extortion: What you need to know
Fuites de donnéesGraham Cluleyavant-hier

World Leaks is a cyber extortion operation that steals sensitive data from organizations and threatens to leak it via the dark web if a ransom is not paid. Read more in my article on the Fortra blog.

Brit lawmaker targeted by AI deepfake fails to get answers from US Big Tech
Gouvernance & RégulationThe Register Securityavant-hier

Appearing before Parliament, Meta, Google and X struggle to explain how fake political video circulated for so long A member of the UK Parliament's lower house who was the victim of a deepfake AI campaign this week had a rare chance to confront the Big Tech executives who helped spread it. Their answers disappointed.…

Smashing Security podcast #460: Never knock on the door of a nuclear submarine base and ask for a selfie
GénéralGraham Cluleyavant-hier

A disgruntled data analyst decides that the best response to losing his contract is to steal the entire company payroll database and demand $2.5 million in Bitcoin - signing his extortion emails from a company called "Loot." Meanwhile, two people drive up to the entrance of the UK's nuclear submarine base at Faslane and politely ask if they can have a look around. Tourists? Spies? Something in between? All this and more in episode 460 of the "Smashing Security" podcast with cybersecurity veteran Graham Cluley, and special guest Jenny Radcliffe.