Flux RSS

— Sources secondaires
91articles RSS
Reinitialiser
Ransomware crims abused Cisco 0-day weeks before disclosure, says Amazon security boss
Gouvernance & RégulationThe Register Securityil y a 10 jours

Interlock's post-exploit toolkit exposed Ransomware criminals exploited CVE-2026-20131, a maximum-severity bug in Cisco Secure Firewall Management Center software, as a zero-day vulnerability more than a month before Cisco patched the hole, according to Amazon security boss CJ Moses.…

North Korea's 100,000-strong fake IT worker army rake in $500M a year for Kim Jong Un
Vulnérabilités & PatchesThe Register Securityil y a 10 jours

Researchers map full org chart of the scam from dodgy recruiters to helpful Western collaborators Researchers at IBM X‑Force and Flare Research have uncovered data that sheds light on how North Korea's fake IT worker schemes operate and infiltrate companies in order to funnel money back to the regime and steal sensitive information.…

Britain's satellite-watching gap to be plugged with £17.5M eyeball in Cyprus
Gouvernance & RégulationThe Register Securityil y a 10 jours

No 1 Space Operations Squadron will get a persistent stare capability The Ministry of Defence (MoD) plans to spend £17.5 million on a remotely-operated satellite monitoring facility in Cyprus, partly to protect the UK's secure communications system Skynet.…

Japan to allow ‘proactive cyber-defense’ from October 1st
Gouvernance & RégulationThe Register Securityil y a 11 jours

In less polite places, this is called ‘hacking back’ or ‘offensive cyber-ops’ Japan’s government yesterday decided to allow its Self-Defense Force to conduct offensive cyber-operations, starting on October 1st.…

Too big to ignore, too small to be served: the midmarket security gap
Outils & RechercheThe Register Securityil y a 11 jours

Midmarket security leaders aren't as secure as they think, says Intruder's report Partner Content The midmarket matters. JP Morgan estimates approximately 300,000 organizations generating $13T in annual revenue. Yet they occupy an awkward position in the security landscape. They're large enough to be attractive targets with complex digital estates, significant revenue, and valuable data, but not large enough to have the headcount, budget maturity, or tooling sophistication of an enterprise security team.…

Bank built its own threat hunting agent because vendors can’t keep pace with new threats
Gouvernance & RégulationThe Register Securityil y a 12 jours

AI helped send weekly threat signal count from 80 million to 400 billion, then helped response time shrink from two days to 30 minutes Australia’s Commonwealth Bank built its own agentic AI threat hunting tools, because vendors are too slow to develop tools that can cope with emerging AI-powered threats, according to General Manager of Cyber Defence Operations Andrew Pade.…

Robotics surgical biz Intuitive discloses phishing attack
Gouvernance & RégulationThe Register Securityil y a 12 jours

Operations and hospital networks not affected, we're told Robotics-assisted surgical tech firm Intuitive said that unauthorized intruders gained access to some of its internal IT business applications after stealing an employee's credentials during a phishing attack.…

Cybercrime has skyrocketed 245% since the start of the Iran war
Gouvernance & RégulationThe Register Securityil y a 12 jours

Hacktivists use proxy services from Russia, China for 'billions of designed-for-abuse connection attempts' Cybercrime has skyrocketed since the start of the Iran war, according to Akamai, which reports a 245 percent increase in everything from credential harvesting attempts to automated reconnaissance traffic aimed at banks and other critical businesses.…

AI finally delivers those elusive productivity gains... for cybercriminals
GénéralThe Register Securityil y a 12 jours

Interpol says fraud schemes using the tech are 4.5x more profitable AI is apparently good for the bottom line if your business is crime. Financial fraud schemes carried out with the help of artificial intelligence are 4.5 times more profitable than those that aren't enhanced, according to Interpol's latest estimates.…

Flaw in UK's corporate registry let directors rummage through rival records
Gouvernance & RégulationThe Register Securityil y a 12 jours

Back button blunder in WebFiling service run by Companies House revealed confidential paperwork Companies House was forced to pull down its record-filing platform for the entire weekend to rectify a "security issue" that exposed the personal details of company directors and other data to any logged in users.…

Fraudsters are using public planning records to target permit applicants
Gouvernance & RégulationGraham Cluleyil y a 16 jours

If you're in the middle of applying for a planning or zoning permit, there is some unwelcome news: cyber-criminals have found a way to exploit the bureaucratic tedium of the process against you. Read more in my article on the Fortra blog.

Your Signal account is safe – unless you fall for this trick
Threat IntelligenceGraham Cluleyil y a 16 jours

Signal, the encrypted messaging app trusted by security-savvy users around the world, has confirmed that hackers have managed to takeover accounts - with government officials and journalists among those being targeted. Read more in my article on the Hot for Security blog.

Smashing Security podcast #458: How not to steal $46 million from the US government
Malware & RansomwareGraham Cluleyil y a 17 jours

A Wikipedia security engineer accidentally wakes a dormant JavaScript worm that hadn't stirred since 2024 - and within minutes, giant woodpecker images are plastered across the internet's favourite encyclopaedia. Meanwhile, a crypto contractor hired to help the US Marshals manage seized digital assets allegedly decides to help himself to $46 million of it - and then brags about it on a recorded Telegram call. Plus: Graham champions Asterix, Trisha discovers the fantasy novels of Robin Hobb, and someone called "Lick" ends up in the nick. All this, and much more, in episode 458 of the "Smashing Security" podcast with cybersecurity veteran Graham Cluley, and special guest Tricia Howard.