Flux RSS

— Sources secondaires
142articles RSS
Reinitialiser
AI in the SOC: What Could Go Wrong?
GénéralDark Readingil y a 7 jours

Two cybersecurity leaders tested out AI in their respective SOCs for six months — and here's what they learned.

Trivy Supply Chain Attack Targets CI/CD Secrets
Vulnérabilités & PatchesDark Readingil y a 7 jours

A threat actor used the open source security tool to deploy an infostealer into CI/CD workflows and steal cloud credentials, SSH keys, tokens, and other sensitive secrets.

Ransomware's New Era: Moving at AI Speed
Gouvernance & RégulationDark Readingil y a 7 jours

Threat actors bypass security tools and use AI to launch faster ransomware attacks that exploit valid credentials and target data.

CISOs Debate Human Role in AI-Powered Security
Gouvernance & RégulationDark Readingil y a 7 jours

The idea of a "human in the loop" in AI deployment was challenged during a security executive panel at the RSAC 2026 Conference this week.

Microsoft Xbox One Hacked
Gouvernance & RégulationSchneier on Securityil y a 7 jours

It’s an impressive feat, over a decade after the box was released: Since reset glitching wasn’t possible, Gaasedelen thought some voltage glitching could do the trick. So, instead of tinkering with the system rest pin(s) the hacker targeted the momentary collapse of the CPU voltage rail. This was quite a feat, as Gaasedelen couldn’t ‘see’ into the Xbox One, so had to develop new hardware introspection tools. Eventually, the Bliss exploit was formulated, where two precise voltage glitches were made to land in succession. One skipped the loop where the ARM Cortex memory protection was setup. Then the Memcpy operation was targeted during the header read, allowing him to jump to the attacker-controlled data. As a hardware attack against the boot ROM in silicon, Gaasedelen says the attack in unpatchable. Thus it is a complete compromise of the console allowing for loading unsigned code at every level, including the Hypervisor and OS. Moreover, Bliss allows access to the security processor so games, firmware, and so on can be decrypted.

Denver’s crosswalks hacked to broadcast anti-Trump messages
GénéralGraham Cluleyil y a 10 jours

Pedestrians crossing a street in Denver, Colorado, got rather more than they bargained for last weekend, when the audio signals at two crosswalks began broadcasting a political message alongside their usual walking instructions. Read more in my article on the Hot for Security blog.

Proton Mail Shared User Information with the Police
GénéralSchneier on Securityil y a 10 jours

404 Media has a story about Proton Mail giving subscriber data to the Swiss government, who passed the information to the FBI. It’s metadata—payment information related to a particular account—but still important knowledge. This sort of thing happens, even to privacy-centric companies like Proton Mail.

LeakNet ransomware: what you need to know
Malware & RansomwareGraham Cluleyil y a 11 jours

A ransomware gang that claims to be a group of "investigative journalists"? Meet LeakNet - the group using fake CAPTCHA pages to trick employees into hacking themselves. Read more in my article on the Fortra blog.

Post-Quantum Web Could be Safer, Faster
Threat IntelligenceDark Readingil y a 11 jours

Major providers are testing a quantum-safe version of HTTPS that shrinks certificates to one-tenth their previous size, decreasing latency and adding transparency.

Hacking a Robot Vacuum
GénéralSchneier on Securityil y a 12 jours

Someone tries to remote control his own DJI Romo vacuum, and ends up controlling 7,000 of them from all around the world. The IoT is horribly insecure, but we already knew that.

The European Union – the media freedom hub
Gouvernance & RégulationEC Digital Strategyil y a 12 jours

The European Union – the media freedom hub marsrgi Thu, 03/19/2026 - 08:58 Opening: 16 April 2026 Closing: 28 May 2026 The overall goal of this preparatory action is to continue the activities of the ongoing Free Media Hub EAST project, i.e. to sustain and improve existing financial and other kinds of support to exiled independent media from Russia, Belarus, as well as media from Ukraine that has relocated in the EU, and to foster the coordination and consolidation of a pan-European platform or network of media hubs to promote the preservation of a pluralistic media environment. GettyImages © Mihajlo Maricic Main link https://ec.europa.eu/info/funding-tenders/opportunities/portal/screen/opportuni… Related topics Media and democracy Media freedom and pluralism International relations Funding for Digital Actions to Support Ukraine Democracy in the digital age {"service":"share","version":"2.0","color":true,"networks":["x","facebook","linkedin","email","more"]}