Flux RSS

— Sources secondaires
342articles RSS
Reinitialiser
We Are At War
Gouvernance & RégulationThe Hacker Newsil y a 3 jours

Rising geopolitical tensions are reflected (or in some cases preceded) by cyber operations, while technology itself has become politicized. Let’s admit it: we are in the middle of it. Introduction: One tech power to rule them all is a thing of the past The relative safety, peace and prosperity that much of the world has enjoyed since 1945 was not accidental. It emerged from the ashes

Bearlyfy Hits 70+ Russian Firms with Custom GenieLocker Ransomware
Gouvernance & RégulationThe Hacker Newsil y a 3 jours

A pro-Ukrainian group called Bearlyfy has been attributed to more than 70 cyber attacks targeting Russian companies since it first surfaced in the threat landscape in January 2025, with recent attacks leveraging a custom Windows ransomware strain codenamed GenieLocker. "Bearlyfy (also known as Labubu) operates as a dual-purpose group aimed at inflicting maximum damage upon Russian businesses;

Brèche de sécurité chez la Police néerlandaise via phishing
MoyenMenaces & RansomwareBleepingComputeril y a 3 jours

La Police nationale néerlandaise révèle une brèche suite à une attaque phishing réussie, avec impact limité et sans exposition de données citoyennes. L'incident, détecté rapidement, mène à une enquête criminelle et à des mesures renforcées comme la 2FA. Pertinent pour les prestataires IT et la vigilance phishing dans le secteur financier EU.

LangChain, LangGraph Flaws Expose Files, Secrets, Databases in Widely Used AI Frameworks
Gouvernance & RégulationThe Hacker Newsil y a 3 jours

Cybersecurity researchers have disclosed three security vulnerabilities impacting LangChain and LangGraph that, if successfully exploited, could expose filesystem data, environment secrets, and conversation history. Both LangChain and LangGraph are open-source frameworks that are used to build applications powered by Large Language Models (LLMs). LangGraph is built on the foundations of

CISA: New Langflow flaw actively exploited to hijack AI workflows
Gouvernance & RégulationBleepingComputeril y a 4 jours

The Cybersecurity and Infrastructure Security Agency (CISA) is warning that hackers are actively exploiting a critical vulnerability identified as CVE-2026-33017, which affects the Langflow framework for building AI agents. [...]

China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks
Gouvernance & RégulationThe Hacker Newsil y a 4 jours

A long-term and ongoing campaign attributed to a China-nexus threat actor has embedded itself in telecom networks to conduct espionage against government networks. The strategic positioning activity, which involves implanting and maintaining stealthy access mechanisms within critical environments, has been attributed to Red Menshen, a threat cluster that's also tracked as Earth Bluecrow,

UK sanctions Xinbi marketplace linked to Asian scam centers
Fuites de donnéesBleepingComputeril y a 4 jours

The United Kingdom's Foreign, Commonwealth and Development Office (FCDO) has sanctioned Xinbi, a Chinese-language cryptocurrency-based online marketplace that sells stolen data and satellite internet equipment to scam networks in Southeast Asia. [...]

WhatsApp rolls out more AI features, iOS multi-account support
GénéralBleepingComputeril y a 4 jours

WhatsApp is rolling out multiple features designed to make the app easier to use, including AI-powered message replies and photo retouching, support for two accounts on iOS, and chat history transfer between iOS and Android devices. [...]

[Webinar] Stop Guessing. Learn to Validate Your Defenses Against Real Attacks
Gouvernance & RégulationThe Hacker Newsil y a 4 jours

Most teams have security tools in place. Alerts are firing, dashboards look clean, threat intel is flowing in. On the surface, everything feels under control. But one question usually stays unanswered: Would your defenses actually stop a real attack? That’s where things get shaky. A control exists, so it’s assumed to work. A detection rule is active, so it’s expected to catch something. But very

Claude Extension Flaw Enabled Zero-Click XSS Prompt Injection via Any Website
Gouvernance & RégulationThe Hacker Newsil y a 4 jours

Cybersecurity researchers have disclosed a vulnerability in Anthropic's Claude Google Chrome Extension that could have been exploited to trigger malicious prompts simply by visiting a web page. The flaw "allowed any website to silently inject prompts into that assistant as if the user wrote them," Koi Security researcher Oren Yomtov said in a report shared with The Hacker News. "No clicks, no

Page 2 / 18