Flux RSS

— Sources secondaires
204articles RSS
Reinitialiser
The State of Secrets Sprawl 2026: 9 Takeaways for CISOs
Gouvernance & RégulationThe Hacker Newsil y a 20 heures

Secrets sprawl isn't slowing down: in 2025, it accelerated faster than most security teams anticipated. GitGuardian's State of Secrets Sprawl 2026 report analyzed billions of commits across public GitHub and uncovered 29 million new hardcoded secrets in 2025 alone, a 34% increase year over year and the largest single-year jump ever recorded. This year's findings reveal three core trends: AI has

European Commission Reports Cyber Intrusion and Data Theft
Gouvernance & RégulationSecurityWeekil y a 20 heures

The ShinyHunters hacker group claimed to have stolen over 350GB of information from European Commission cloud systems. The post European Commission Reports Cyber Intrusion and Data Theft appeared first on SecurityWeek.

Apple’s Camera Indicator Lights
Gouvernance & RégulationSchneier on Securityil y a 21 heures

A thoughtful review of Apple’s system to alert users that the camera is on. It’s really well-designed, and important in a world where malware could surreptitiously start recording. The reason it’s tempting to think that a dedicated camera indicator light is more secure than an on-display indicator is the fact that hardware is generally more secure than software, because it’s harder to tamper with. With hardware, a dedicated hardware indicator light can be connected to the camera hardware such that if the camera is accessed, the light must turn on, with no way for software running on the device, no matter its privileges, to change that. With an indicator light that is rendered on the display, it’s not foolish to worry that malicious software, with sufficient privileges, could draw over the pixels on the display where the camera indicator is rendered, disguising that the camera is in use. If this were implemented simplistically, that concern would be completely valid. But Apple’s implementation of this is far from simplistic.

Hackers exploiting critical F5 BIG-IP flaw in attacks, patch now
Gouvernance & RégulationBleepingComputeril y a 21 heures

F5 has reclassified a BIG-IP APM denial-of-service (DoS) vulnerability as a critical-severity remote code execution (RCE) flaw, warning that attackers are exploiting it to deploy webshells on unpatched devices. [...]

Telnyx Targeted in Growing TeamPCP Supply Chain Attack
Gouvernance & RégulationSecurityWeekil y a 21 heures

Two malicious versions of the popular SDK were uploaded to the PyPI registry, targeting Windows, macOS, and Linux. The post Telnyx Targeted in Growing TeamPCP Supply Chain Attack appeared first on SecurityWeek.

Exploitation of Fresh Citrix NetScaler Vulnerability Begins
Gouvernance & RégulationSecurityWeekil y a 22 heures

The critical-severity flaw leaks application memory and can be exploited to obtain authenticated administrative session IDs. The post Exploitation of Fresh Citrix NetScaler Vulnerability Begins appeared first on SecurityWeek.

FBI Confirms Kash Patel Email Hack as US Offers $10M Reward for Hackers
Fuites de donnéesSecurityWeekil y a 24 heures

The agency said Iranian hackers targeted the director’s personal email account and noted that the compromised information is old. The post FBI Confirms Kash Patel Email Hack as US Offers $10M Reward for Hackers appeared first on SecurityWeek.

Security contractor blew the whistle on support crew's viral indifference
Incidents & BreachesThe Register Securityhier

Career-limiting stupidity and rudeness exposed, with terminal consequences Who, Me? The week before Easter may be a short one for many in the Reg-reading world, but that won't stop us from opening it with a fresh installment of Who, Me? It's the reader-contributed column in which you share stories of things you did at work that had interesting consequences.…

Three China-Linked Clusters Target Southeast Asian Government in 2025 Cyber Campaign
Vulnérabilités & PatchesThe Hacker Newshier

Three threat activity clusters aligned with China have targeted a government organization in Southeast Asia as part of what has been described as a "complex and well-resourced operation." The campaigns have led to the deployment of various malware families, including HIUPAN (aka USBFect, MISTCLOAK, or U2DiskWatch), PUBLOAD, EggStremeFuel (aka RawCookie), EggStremeLoader (aka Gorem RAT), MASOL

US foreign router ban criticized for being ‘industrial policy disguised as cybersecurity’
Gouvernance & RégulationThe Register Securityhier

Public policy professor says it will make America less secure but hits Netgear’s lobbying goals The United States’ ban on foreign-made SOHO routers won’t improve security, and only makes sense as “industrial policy disguised as cybersecurity,” according to Milton Mueller, Professor at the University of Georgia’s School of Public Policy and founder of its Internet Governance Project.…

Iran-Linked Hackers Breach FBI Director’s Personal Email, Hit Stryker With Wiper Attack
Gouvernance & RégulationThe Hacker Newsil y a 3 jours

Threat actors with ties to Iran successfully broke into the personal email account of Kash Patel, the director of the U.S. Federal Bureau of Investigation (FBI), and leaked a cache of photos and other documents to the internet. Handala Hack Team, which carried out the breach, said on its website that Patel "will now find his name among the list of successfully hacked victims." In a statement

Page 2 / 11