Flux RSS

— Sources secondaires
162articles RSS
Reinitialiser
Critical Langflow Flaw CVE-2026-33017 Triggers Attacks within 20 Hours of Disclosure
Gouvernance & RégulationThe Hacker Newsil y a 10 jours

A critical security flaw impacting Langflow has come under active exploitation within 20 hours of public disclosure, highlighting the speed at which threat actors weaponize newly published vulnerabilities. The security defect, tracked as CVE-2026-33017 (CVSS score: 9.3), is a case of missing authentication combined with code injection that could result in remote code execution. "The POST /api/v1

Feds disrupt monster IoT botnets behind record-breaking DDoS attacks
Gouvernance & RégulationThe Register Securityil y a 10 jours

Millions of hijacked devices powered traffic floods targeting defense systems and beyond The US government has moved to disrupt a cluster of IoT botnets behind some of the largest DDoS attacks ever recorded, including traffic bursts topping 30 terabits per second.…

Jaguar Land Rover's cyber bailout sets worrying precedent, watchdog warns
GénéralThe Register Securityil y a 10 jours

Lack of clear criteria risks encouraging firms to lean on state support instead of worrying about insurance The UK's cyber watchdog has warned that the government's £1.5 billion bailout of Jaguar Land Rover (JLR) risks setting a troubling precedent for how Britain handles major cyber crises.…

Google Adds 24-Hour Wait for Unverified App Sideloading to Reduce Malware and Scams
Malware & RansomwareThe Hacker Newsil y a 10 jours

Google on Thursday announced a new "advanced flow" for Android sideloading that requires a mandatory 24-hour wait period to install apps from unverified developers in an attempt to balance openness with safety. The new changes come against the backdrop of a developer verification mandate the tech giant announced last year that requires all Android apps to be registered by verified developers to

Starmer's digital ID reboot raises same old questions as its Blair-era ancestor
Gouvernance & RégulationThe Register Securityil y a 10 jours

Audit trails aplenty, but no price tag – and no clue how long your data sticks around Opinion Last week's UK government consultation on its plans for digital identity had quite a few things missing. It did not include a price estimate - something it said was due to decisions yet to be taken on the scheme's scope - or how long the government would keep "audit trail" records of ID checks.…

The Importance of Behavioral Analytics in AI-Enabled Cyber Attacks
Malware & RansomwareThe Hacker Newsil y a 10 jours

Artificial Intelligence (AI) is changing how individuals and organizations conduct many activities, including how cybercriminals carry out phishing attacks and iterate on malware. Now, cybercriminals are using AI to generate personalized phishing emails, deepfakes and malware that evade traditional detection by impersonating normal user activity and bypassing legacy security models. As a result,

Magento PolyShell Flaw Enables Unauthenticated Uploads, RCE and Account Takeover
Gouvernance & RégulationThe Hacker Newsil y a 10 jours

Sansec is warning of a critical security flaw in Magento's REST API that could allow unauthenticated attackers to upload arbitrary executables and achieve code execution and account takeover. The vulnerability has been codenamed PolyShell by Sansec owing to the fact that the attack hinges on disguising malicious code as an image. There is no evidence that the shortcoming has been exploited in

While you're here, could you go out of your way to do an impossible job?
GénéralThe Register Securityil y a 10 jours

He would have gotten away with it too, if it weren't for a meddling security team's fear of USB On Call Each Friday The Register offers a fresh installment of On Call, the reader-contributed column that celebrates the fine art of tech support.…

DoJ Disrupts 3 Million-Device IoT Botnets Behind Record 31.4 Tbps Global DDoS Attacks
Gouvernance & RégulationThe Hacker Newsil y a 10 jours

The U.S. Department of Justice (DoJ) on Thursday announced the disruption of command-and-control (C2) infrastructure used by several Internet of Things (IoT) botnets like AISURU, Kimwolf, JackSkid, and Mossad as part of a court-authorized law enforcement operation. The effort also saw authorities from Canada and Germany targeting the operators behind these botnets, with a number of private

Apple Warns Older iPhones Vulnerable to Coruna, DarkSword Exploit Kit Attacks
Gouvernance & RégulationThe Hacker Newsil y a 10 jours

Apple is urging users who are still running an outdated version of iOS to update their iPhones to secure against web-based attacks carried out via powerful exploit kits like Coruna and DarkSword. These attacks employ malicious web content to target out-of-date versions of iOS, triggering an infection chain that leads to the theft of sensitive data. "For example, if you're using an older

Speagle Malware Hijacks Cobra DocGuard to Steal Data via Compromised Servers
Malware & RansomwareThe Hacker Newsil y a 10 jours

Cybersecurity researchers have flagged a new malware dubbed Speagle that hijacks the functionality and infrastructure of a legitimate program called Cobra DocGuard. "Speagle is designed to surreptitiously harvest sensitive information from infected computers and transmit it to a Cobra DocGuard server that has been compromised by the attackers, masking the data exfiltration process as legitimate

Unknown attackers exploit yet another critical SharePoint bug
Gouvernance & RégulationThe Register Securityil y a 10 jours

Last time: Beijing-backed snoops and ransomware crims. Who's next? Unknown baddies are abusing yet another critical Microsoft SharePoint bug to compromise victims' SharePoint servers, the US government warned.…

54 EDR Killers Use BYOVD to Exploit 35 Signed Vulnerable Drivers and Disable Security
Gouvernance & RégulationThe Hacker Newsil y a 10 jours

A new analysis of endpoint detection and response (EDR) killers has revealed that 54 of them leverage a technique known as bring your own vulnerable driver (BYOVD) by abusing a total of 35 vulnerable drivers. EDR killer programs have been a common presence in ransomware intrusions as they offer a way for affiliates to neutralize security software before deploying file-encrypting malware. This