Flux RSS

— Sources secondaires
145articles RSS
Reinitialiser
The Hidden Cost of Cybersecurity Specialization: Losing Foundational Skills
Outils & RechercheThe Hacker Newsil y a 4 jours

Cybersecurity has changed fast. Roles are more specialized, and tooling is more advanced. On paper, this should make organizations more secure. But in practice, many teams struggle with the same basic problems they faced years ago: unclear risk priorities, misaligned tooling decisions, and difficulty explaining security issues in terms the business understands. These challenges do not

Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials
Threat IntelligenceThe Hacker Newsil y a 4 jours

Cybersecurity researchers have uncovered a new set of malicious npm packages that are designed to steal cryptocurrency wallets and sensitive data. The activity is being tracked by ReversingLabs as the Ghost campaign. The list of identified packages, all published by a user named mikilanjillo, is below - react-performance-suite react-state-optimizer-core react-fast-utilsa ai-fast-auto-trader

TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials
Malware & RansomwareThe Hacker Newsil y a 4 jours

Two more GitHub Actions workflows have become the latest to be compromised by credential-stealing malware by a threat actor known as TeamPCP, the cloud-native cybercriminal operation also behind the Trivy supply chain attack. The workflows, both maintained by the supply chain security company Checkmarx, are listed below - checkmarx/ast-github-action checkmarx/kics-github-action Cloud security

U.S. Sentences Russian Hacker to 6.75 Years for Role in $9M Ransomware Damage
Malware & RansomwareThe Hacker Newsil y a 5 jours

A 26-year-old Russian citizen has been sentenced in the U.S. to 6.75 years (81 months) in prison for his role in assisting major cybercrime groups, including the Yanluowang ransomware crew, in conducting numerous attacks against U.S. companies and other organizations. According to the U.S. Department of Justice (DoJ), Aleksei Olegovich Volkov facilitated dozens of ransomware attacks across the

Citrix Urges Patching Critical NetScaler Flaw Allowing Unauthenticated Data Leaks
Gouvernance & RégulationThe Hacker Newsil y a 5 jours

Citrix has released security updates to address two vulnerabilities in NetScaler ADC and NetScaler Gateway, including a critical flaw that could be exploited to leak sensitive data from the application. The vulnerabilities are listed below - CVE-2026-3055 (CVSS score: 9.3) - Insufficient input validation leading to memory overread CVE-2026-4368 (CVSS score: 7.7) - Race condition leading to user

AI in the SOC: What Could Go Wrong?
GénéralDark Readingil y a 5 jours

Two cybersecurity leaders tested out AI in their respective SOCs for six months — and here's what they learned.

Trivy Supply Chain Attack Targets CI/CD Secrets
Vulnérabilités & PatchesDark Readingil y a 5 jours

A threat actor used the open source security tool to deploy an infostealer into CI/CD workflows and steal cloud credentials, SSH keys, tokens, and other sensitive secrets.

Ransomware's New Era: Moving at AI Speed
Gouvernance & RégulationDark Readingil y a 5 jours

Threat actors bypass security tools and use AI to launch faster ransomware attacks that exploit valid credentials and target data.

CISOs Debate Human Role in AI-Powered Security
Gouvernance & RégulationDark Readingil y a 5 jours

The idea of a "human in the loop" in AI deployment was challenged during a security executive panel at the RSAC 2026 Conference this week.

North Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle Malware
Malware & RansomwareThe Hacker Newsil y a 5 jours

The North Korean threat actors behind the Contagious Interview campaign, also tracked as WaterPlum, have been attributed to a malware family tracked as StoatWaffle that's distributed via malicious Microsoft Visual Studio Code (VS Code) projects. The use of VS Code "tasks.json" to distribute malware is a relatively new tactic adopted by the threat actor since December 2025, with the attacks

⚡ Weekly Recap: CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers & More
Gouvernance & RégulationThe Hacker Newsil y a 5 jours

Another week, another reminder that the internet is still a mess. Systems people thought were secure are being broken in simple ways, showing many still ignore basic advisories. This edition covers a mix of issues: supply chain attacks hitting CI/CD setups, long-abused IoT devices being shut down, and exploits moving quickly from disclosure to real attacks. There are also new malware tricks

We Found Eight Attack Vectors Inside AWS Bedrock. Here's What Attackers Can Do with Them
Vulnérabilités & PatchesThe Hacker Newsil y a 5 jours

AWS Bedrock is Amazon's platform for building AI-powered applications. It gives developers access to foundation models and the tools to connect those models directly to enterprise data and systems. That connectivity is what makes it powerful – but it’s also what makes Bedrock a target. When an AI agent can query your Salesforce instance, trigger a Lambda function, or pull from a SharePoint

Microsoft Warns IRS Phishing Hits 29,000 Users, Deploys RMM Malware
Gouvernance & RégulationThe Hacker Newsil y a 5 jours

Microsoft has warned of fresh campaigns that are capitalizing on the upcoming tax season in the U.S. to harvest credentials and deliver malware. The email campaigns take advantage of the urgency and time-sensitive nature of emails to send phishing messages masquerading as refund notices, payroll forms, filing reminders, and requests from tax professionals to deceive recipients into opening

Trivy Hack Spreads Infostealer via Docker, Triggers Worm and Kubernetes Wiper
Malware & RansomwareThe Hacker Newsil y a 6 jours

Cybersecurity researchers have uncovered malicious artifacts distributed via Docker Hub following the Trivy supply chain attack, highlighting the widening blast radius across developer environments. The last known clean release of Trivy on Docker Hub is 0.69.3. The malicious versions 0.69.4, 0.69.5, and 0.69.6 have since been removed from the container image library. "New image tags 0.69.5 and

Hackers Exploit CVE-2025-32975 (CVSS 10.0) to Hijack Unpatched Quest KACE SMA Systems
Gouvernance & RégulationThe Hacker Newsil y a 6 jours

Threat actors are suspected to be exploiting a maximum-severity security flaw impacting Quest KACE Systems Management Appliance (SMA), according to Arctic Wolf. The cybersecurity company said it observed malicious activity starting the week of March 9, 2026, in customer environments that's consistent with the exploitation of CVE-2025-32975 on unpatched SMA systems exposed to the internet. It's

FBI Warns Russian Hackers Target Signal, WhatsApp in Mass Phishing Attacks
Threat IntelligenceThe Hacker Newsil y a 7 jours

Threat actors affiliated with Russian Intelligence Services are conducting phishing campaigns to compromise commercial messaging applications (CMAs) like WhatsApp and Signal to seize control of accounts belonging to individuals with high intelligence value, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) said Friday. "The campaign