Flux RSS

— Sources secondaires
126articles RSS
Reinitialiser
SideWinder Espionage Campaign Expands Across Southeast Asia
Threat IntelligenceDark Readingil y a 11 jours

The suspected India-linked threat group targets governments, telecom, and critical infrastructure using spear-phishing, old vulnerabilities, and rapidly rotating infrastructure to maintain persistent access.

Circular letter
GénéralCSSF Publicationsil y a 11 jours

Latest update on the AML/CFT standardised data collection

More Attackers Are Logging In, Not Breaking In
Malware & RansomwareDark Readingil y a 12 jours

Credential theft soared in the second half of 2025, thanks in part to the industrialization of infostealer malware and AI-enabled social engineering.

Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker
Gouvernance & RégulationKrebs on Securityil y a 18 jours

A hacktivist group with links to Iran's intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker's largest hub outside of the United States, said the company sent home more than 5,000 workers there today. Meanwhile, a voicemail message at Stryker's main U.S. headquarters says the company is currently experiencing a building emergency.

Microsoft Patch Tuesday, March 2026 Edition
Gouvernance & RégulationKrebs on Securityil y a 19 jours

Microsoft Corp. today pushed security updates to fix at least 77 vulnerabilities in its Windows operating systems and other software. There are no pressing "zero-day" flaws this month (compared to February's five zero-day treat), but as usual some patches may deserve more rapid attention from organizations using Windows. Here are a few highlights from this month's Patch Tuesday.

How AI Assistants are Moving the Security Goalposts
Outils & RechercheKrebs on Securityil y a 21 jours

AI-based assistants or "agents" -- autonomous programs that have access to the user's computer, files, online services and can automate virtually any task -- are growing in popularity with developers and IT workers. But as so many eyebrow-raising headlines over the past few weeks have shown, these powerful and assertive new tools are rapidly shifting the security priorities for organizations, while blurring the lines between data and code, trusted co-worker and insider threat, ninja hacker and novice code jockey.