Flux RSS

— Sources secondaires
139articles RSS
Reinitialiser
OFAC Sanctions DPRK IT Worker Network Funding WMD Programs Through Fake Remote Jobs
Gouvernance & RégulationThe Hacker Newsil y a 11 jours

The U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) has sanctioned six individuals and two entities for their involvement in the Democratic People's Republic of Korea (DPRK) information technology (IT) worker scheme with an aim to defraud U.S. businesses and generate illicit revenue for the regime to fund its weapons of mass destruction (WMD) programs. "The North Korean

Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access
Gouvernance & RégulationThe Hacker Newsil y a 11 jours

Amazon Threat Intelligence is warning of an active Interlock ransomware campaign that's exploiting a recently disclosed critical security flaw in Cisco Secure Firewall Management Center (FMC) Software. The vulnerability in question is CVE-2026-20131 (CVSS score: 10.0), a case of insecure deserialization of user-supplied Java byte stream, which could allow an unauthenticated, remote attacker to

SideWinder Espionage Campaign Expands Across Southeast Asia
Threat IntelligenceDark Readingil y a 11 jours

The suspected India-linked threat group targets governments, telecom, and critical infrastructure using spear-phishing, old vulnerabilities, and rapidly rotating infrastructure to maintain persistent access.

Critical Unpatched Telnetd Flaw (CVE-2026-32746) Enables Unauthenticated Root RCE
Gouvernance & RégulationThe Hacker Newsil y a 11 jours

Cybersecurity researchers have disclosed a critical security flaw impacting the GNU InetUtils telnet daemon (telnetd) that could be exploited by an unauthenticated remote attacker to execute arbitrary code with elevated privileges. The vulnerability, tracked as CVE-2026-32746, carries a CVSS score of 9.8 out of 10.0. It has been described as a case of out-of-bounds write in the LINEMODE Set

Claude Code Security and Magecart: Getting the Threat Model Right
Malware & RansomwareThe Hacker Newsil y a 11 jours

When a Magecart payload hides inside the EXIF data of a dynamically loaded third-party favicon, no repository scanner will catch it – because the malicious code never actually touches your repo. As teams adopt Claude Code Security for static analysis, this is the exact technical boundary where AI code scanning stops and client-side runtime execution begins. A detailed analysis of where Claude

More Attackers Are Logging In, Not Breaking In
Malware & RansomwareDark Readingil y a 12 jours

Credential theft soared in the second half of 2025, thanks in part to the industrialization of infostealer malware and AI-enabled social engineering.