Flux RSS

— Sources secondaires
271articles RSS
Reinitialiser
3 SOC Process Fixes That Unlock Tier 1 Productivity
Gouvernance & RégulationThe Hacker Newshier

What is really slowing Tier 1 down: the threat itself or the process around it? In many SOCs, the biggest delays do not come from the threat alone. They come from fragmented workflows, manual triage steps, and limited visibility early in the investigation. Fixing those process gaps can help Tier 1 move faster, reduce unnecessary escalations, and improve how the entire SOC responds under pressure

Huskeys Emerges From Stealth With $8 Million in Funding
Incidents & BreachesSecurityWeekhier

The startup has built an edge security management (ESM) platform, an AI engine atop the entire edge security stack. The post Huskeys Emerges From Stealth With $8 Million in Funding appeared first on SecurityWeek.

Russian CTRL Toolkit Delivered via Malicious LNK Files Hijacks RDP via FRP Tunnels
Threat IntelligenceThe Hacker Newshier

Cybersecurity researchers have discovered a remote access toolkit of Russian-origin that's distributed via malicious Windows shortcut (LNK) files that are disguised as private key folders. The CTRL toolkit, according to Censys, is custom-built using .NET and includes various executables" to facilitate credential phishing, keylogging, Remote Desktop Protocol (RDP) hijacking, and reverse tunneling

Russian APT Star Blizzard Adopts DarkSword iOS Exploit Kit
Gouvernance & RégulationSecurityWeekhier

The state-sponsored group’s campaign has targeted government, higher education, financial, and legal entities, as well as think tanks. The post Russian APT Star Blizzard Adopts DarkSword iOS Exploit Kit appeared first on SecurityWeek.

The State of Secrets Sprawl 2026: 9 Takeaways for CISOs
Gouvernance & RégulationThe Hacker Newshier

Secrets sprawl isn't slowing down: in 2025, it accelerated faster than most security teams anticipated. GitGuardian's State of Secrets Sprawl 2026 report analyzed billions of commits across public GitHub and uncovered 29 million new hardcoded secrets in 2025 alone, a 34% increase year over year and the largest single-year jump ever recorded. This year's findings reveal three core trends: AI has

European Commission Reports Cyber Intrusion and Data Theft
Gouvernance & RégulationSecurityWeekhier

The ShinyHunters hacker group claimed to have stolen over 350GB of information from European Commission cloud systems. The post European Commission Reports Cyber Intrusion and Data Theft appeared first on SecurityWeek.

Hackers exploiting critical F5 BIG-IP flaw in attacks, patch now
Gouvernance & RégulationBleepingComputerhier

F5 has reclassified a BIG-IP APM denial-of-service (DoS) vulnerability as a critical-severity remote code execution (RCE) flaw, warning that attackers are exploiting it to deploy webshells on unpatched devices. [...]

Telnyx Targeted in Growing TeamPCP Supply Chain Attack
Gouvernance & RégulationSecurityWeekhier

Two malicious versions of the popular SDK were uploaded to the PyPI registry, targeting Windows, macOS, and Linux. The post Telnyx Targeted in Growing TeamPCP Supply Chain Attack appeared first on SecurityWeek.

Exploitation of Fresh Citrix NetScaler Vulnerability Begins
Gouvernance & RégulationSecurityWeekhier

The critical-severity flaw leaks application memory and can be exploited to obtain authenticated administrative session IDs. The post Exploitation of Fresh Citrix NetScaler Vulnerability Begins appeared first on SecurityWeek.

Security contractor blew the whistle on support crew's viral indifference
Incidents & BreachesThe Register Securityhier

Career-limiting stupidity and rudeness exposed, with terminal consequences Who, Me? The week before Easter may be a short one for many in the Reg-reading world, but that won't stop us from opening it with a fresh installment of Who, Me? It's the reader-contributed column in which you share stories of things you did at work that had interesting consequences.…

Three China-Linked Clusters Target Southeast Asian Government in 2025 Cyber Campaign
Vulnérabilités & PatchesThe Hacker Newshier

Three threat activity clusters aligned with China have targeted a government organization in Southeast Asia as part of what has been described as a "complex and well-resourced operation." The campaigns have led to the deployment of various malware families, including HIUPAN (aka USBFect, MISTCLOAK, or U2DiskWatch), PUBLOAD, EggStremeFuel (aka RawCookie), EggStremeLoader (aka Gorem RAT), MASOL

US foreign router ban criticized for being ‘industrial policy disguised as cybersecurity’
Gouvernance & RégulationThe Register Securityhier

Public policy professor says it will make America less secure but hits Netgear’s lobbying goals The United States’ ban on foreign-made SOHO routers won’t improve security, and only makes sense as “industrial policy disguised as cybersecurity,” according to Milton Mueller, Professor at the University of Georgia’s School of Public Policy and founder of its Internet Governance Project.…

Page 2 / 14