Flux RSS

— Sources secondaires
109articles RSS
Reinitialiser
AI in the SOC: What Could Go Wrong?
GénéralDark Readingil y a 5 jours

Two cybersecurity leaders tested out AI in their respective SOCs for six months — and here's what they learned.

Trivy Supply Chain Attack Targets CI/CD Secrets
Vulnérabilités & PatchesDark Readingil y a 5 jours

A threat actor used the open source security tool to deploy an infostealer into CI/CD workflows and steal cloud credentials, SSH keys, tokens, and other sensitive secrets.

Ransomware's New Era: Moving at AI Speed
Gouvernance & RégulationDark Readingil y a 5 jours

Threat actors bypass security tools and use AI to launch faster ransomware attacks that exploit valid credentials and target data.

CISOs Debate Human Role in AI-Powered Security
Gouvernance & RégulationDark Readingil y a 5 jours

The idea of a "human in the loop" in AI deployment was challenged during a security executive panel at the RSAC 2026 Conference this week.

Microsoft Xbox One Hacked
Gouvernance & RégulationSchneier on Securityil y a 5 jours

It’s an impressive feat, over a decade after the box was released: Since reset glitching wasn’t possible, Gaasedelen thought some voltage glitching could do the trick. So, instead of tinkering with the system rest pin(s) the hacker targeted the momentary collapse of the CPU voltage rail. This was quite a feat, as Gaasedelen couldn’t ‘see’ into the Xbox One, so had to develop new hardware introspection tools. Eventually, the Bliss exploit was formulated, where two precise voltage glitches were made to land in succession. One skipped the loop where the ARM Cortex memory protection was setup. Then the Memcpy operation was targeted during the header read, allowing him to jump to the attacker-controlled data. As a hardware attack against the boot ROM in silicon, Gaasedelen says the attack in unpatchable. Thus it is a complete compromise of the console allowing for loading unsigned code at every level, including the Hypervisor and OS. Moreover, Bliss allows access to the security processor so games, firmware, and so on can be decrypted.

Proton Mail Shared User Information with the Police
GénéralSchneier on Securityil y a 8 jours

404 Media has a story about Proton Mail giving subscriber data to the Swiss government, who passed the information to the FBI. It’s metadata—payment information related to a particular account—but still important knowledge. This sort of thing happens, even to privacy-centric companies like Proton Mail.