Flux RSS

— Sources secondaires
366articles RSS
Reinitialiser
HackerOne slams supplier for delayed breach notice after staff data exposed
Gouvernance & RégulationThe Register Securityil y a 4 jours

Nearly 300 employees caught up in intrusion at benefits provider Navia Almost 300 HackerOne employees are caught up in a data breach, with the bug bounty biz slamming a third-party benefits provider for a weeks-long delay in notification.…

The Hidden Cost of Cybersecurity Specialization: Losing Foundational Skills
Outils & RechercheThe Hacker Newsil y a 4 jours

Cybersecurity has changed fast. Roles are more specialized, and tooling is more advanced. On paper, this should make organizations more secure. But in practice, many teams struggle with the same basic problems they faced years ago: unclear risk priorities, misaligned tooling decisions, and difficulty explaining security issues in terms the business understands. These challenges do not

Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials
Threat IntelligenceThe Hacker Newsil y a 4 jours

Cybersecurity researchers have uncovered a new set of malicious npm packages that are designed to steal cryptocurrency wallets and sensitive data. The activity is being tracked by ReversingLabs as the Ghost campaign. The list of identified packages, all published by a user named mikilanjillo, is below - react-performance-suite react-state-optimizer-core react-fast-utilsa ai-fast-auto-trader

Russian initial access broker who fed ransomware crews gets 81 months in US prison
Malware & RansomwareThe Register Securityil y a 4 jours

Aleksei Volkov sentenced after enabling attacks that cost victims millions A Russian national who sold the keys to corporate networks faces nearly seven years in a US prison after prosecutors tied his handiwork to a string of ransomware attacks costing victims millions of dollars.…

TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials
Malware & RansomwareThe Hacker Newsil y a 4 jours

Two more GitHub Actions workflows have become the latest to be compromised by credential-stealing malware by a threat actor known as TeamPCP, the cloud-native cybercriminal operation also behind the Trivy supply chain attack. The workflows, both maintained by the supply chain security company Checkmarx, are listed below - checkmarx/ast-github-action checkmarx/kics-github-action Cloud security

U.S. Sentences Russian Hacker to 6.75 Years for Role in $9M Ransomware Damage
Malware & RansomwareThe Hacker Newsil y a 4 jours

A 26-year-old Russian citizen has been sentenced in the U.S. to 6.75 years (81 months) in prison for his role in assisting major cybercrime groups, including the Yanluowang ransomware crew, in conducting numerous attacks against U.S. companies and other organizations. According to the U.S. Department of Justice (DoJ), Aleksei Olegovich Volkov facilitated dozens of ransomware attacks across the

Citrix Urges Patching Critical NetScaler Flaw Allowing Unauthenticated Data Leaks
Gouvernance & RégulationThe Hacker Newsil y a 4 jours

Citrix has released security updates to address two vulnerabilities in NetScaler ADC and NetScaler Gateway, including a critical flaw that could be exploited to leak sensitive data from the application. The vulnerabilities are listed below - CVE-2026-3055 (CVSS score: 9.3) - Insufficient input validation leading to memory overread CVE-2026-4368 (CVSS score: 7.7) - Race condition leading to user

Claude attacks were 'Rorschach test' for infosec community, scaring former NSA boss
Outils & RechercheThe Register Securityil y a 5 jours

'It freakin' worked' says Rob Joyce - and shows how relentless AI agents can find holes humans miss RSAC 2026 The now-infamous Anthropic report about Chinese cyberspies abusing Claude AI to automate cyberattacks was a Rorschach test for the infosec community, according to former NSA cyber boss Rob Joyce.…

Lightning-fast exploits make it essential to patch fast, ask questions later
Gouvernance & RégulationThe Register Securityil y a 5 jours

Here's where you ought to spend your security billable hours budget this year Strengthen your MFA policies, double-down on anti-phishing training, and for Jobs' sake, patch all your vulns right away. The past year of intelligence collected by Cisco's Talos threat hunters suggests that attackers are moving faster to exploit vulns, and fooling more staff than ever into giving up their credentials. …

North Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle Malware
Malware & RansomwareThe Hacker Newsil y a 5 jours

The North Korean threat actors behind the Contagious Interview campaign, also tracked as WaterPlum, have been attributed to a malware family tracked as StoatWaffle that's distributed via malicious Microsoft Visual Studio Code (VS Code) projects. The use of VS Code "tasks.json" to distribute malware is a relatively new tactic adopted by the threat actor since December 2025, with the attacks

Google unleashes Gemini AI agents on the dark web
Vulnérabilités & PatchesThe Register Securityil y a 5 jours

Claims it can analyze millions of daily events with 98 percent accuracy RSAC 2026 Google's Gemini AI agents are crawling the dark web, sifting through upward of 10 million posts a day to find a handful of threats relevant to a particular organization.…

Page 4 / 19