Flux RSS

— Sources secondaires
170articles RSS
Reinitialiser
Smashing Security podcast #459: This clever scam nearly hijacked a tech CEO’s Apple ID
Gouvernance & RégulationGraham Cluleyil y a 11 jours

In episode 459 of Smashing Security, we dive into a chillingly clever account takeover attempt targeting WordPress co-founder Matt Mullenweg - involving MFA fatigue, real Apple alerts, a convincing support call, and a phishing page that oh-so-nearly worked. If a famous techie could have this happen to you, can you be sure you're immune? Plus: would you donate your lifetime medical history to science if you were promised anonymity? We unpack serious concerns around UK Biobank, where “de-identified” data may not be as anonymous as you think — and how surprisingly little information it takes to reveal everything. And! Human-powered “AI”, and a punishment worse than prison: eight hours on the RSA expo floor... All this, and much more, in episode 459 of the "Smashing Security" podcast with cybersecurity veteran Graham Cluley, and special guest Paul Ducklin.

Okta made a nightmare micromanager for your AI agents
Gouvernance & RégulationThe Register Securityil y a 11 jours

Where are you? What are you working on? Why are you doing that? Identity access and management platform Okta announced the general availability of its Okta for AI Agents, which will give customers the ability to do three things: locate agents, see what they’re doing, and shut them down if need be.…

Ransomware crims abused Cisco 0-day weeks before disclosure, says Amazon security boss
Gouvernance & RégulationThe Register Securityil y a 11 jours

Interlock's post-exploit toolkit exposed Ransomware criminals exploited CVE-2026-20131, a maximum-severity bug in Cisco Secure Firewall Management Center software, as a zero-day vulnerability more than a month before Cisco patched the hole, according to Amazon security boss CJ Moses.…

North Korea's 100,000-strong fake IT worker army rake in $500M a year for Kim Jong Un
Vulnérabilités & PatchesThe Register Securityil y a 11 jours

Researchers map full org chart of the scam from dodgy recruiters to helpful Western collaborators Researchers at IBM X‑Force and Flare Research have uncovered data that sheds light on how North Korea's fake IT worker schemes operate and infiltrate companies in order to funnel money back to the regime and steal sensitive information.…

SideWinder Espionage Campaign Expands Across Southeast Asia
Threat IntelligenceDark Readingil y a 11 jours

The suspected India-linked threat group targets governments, telecom, and critical infrastructure using spear-phishing, old vulnerabilities, and rapidly rotating infrastructure to maintain persistent access.

Britain's satellite-watching gap to be plugged with £17.5M eyeball in Cyprus
Gouvernance & RégulationThe Register Securityil y a 11 jours

No 1 Space Operations Squadron will get a persistent stare capability The Ministry of Defence (MoD) plans to spend £17.5 million on a remotely-operated satellite monitoring facility in Cyprus, partly to protect the UK's secure communications system Skynet.…

Japan to allow ‘proactive cyber-defense’ from October 1st
Gouvernance & RégulationThe Register Securityil y a 12 jours

In less polite places, this is called ‘hacking back’ or ‘offensive cyber-ops’ Japan’s government yesterday decided to allow its Self-Defense Force to conduct offensive cyber-operations, starting on October 1st.…

More Attackers Are Logging In, Not Breaking In
Malware & RansomwareDark Readingil y a 12 jours

Credential theft soared in the second half of 2025, thanks in part to the industrialization of infostealer malware and AI-enabled social engineering.