Flux RSS

— Sources secondaires
142articles RSS
Reinitialiser
Okta made a nightmare micromanager for your AI agents
Gouvernance & RégulationThe Register Securityil y a 12 jours

Where are you? What are you working on? Why are you doing that? Identity access and management platform Okta announced the general availability of its Okta for AI Agents, which will give customers the ability to do three things: locate agents, see what they’re doing, and shut them down if need be.…

Ransomware crims abused Cisco 0-day weeks before disclosure, says Amazon security boss
Gouvernance & RégulationThe Register Securityil y a 12 jours

Interlock's post-exploit toolkit exposed Ransomware criminals exploited CVE-2026-20131, a maximum-severity bug in Cisco Secure Firewall Management Center software, as a zero-day vulnerability more than a month before Cisco patched the hole, according to Amazon security boss CJ Moses.…

OFAC Sanctions DPRK IT Worker Network Funding WMD Programs Through Fake Remote Jobs
Gouvernance & RégulationThe Hacker Newsil y a 12 jours

The U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) has sanctioned six individuals and two entities for their involvement in the Democratic People's Republic of Korea (DPRK) information technology (IT) worker scheme with an aim to defraud U.S. businesses and generate illicit revenue for the regime to fund its weapons of mass destruction (WMD) programs. "The North Korean

Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access
Gouvernance & RégulationThe Hacker Newsil y a 12 jours

Amazon Threat Intelligence is warning of an active Interlock ransomware campaign that's exploiting a recently disclosed critical security flaw in Cisco Secure Firewall Management Center (FMC) Software. The vulnerability in question is CVE-2026-20131 (CVSS score: 10.0), a case of insecure deserialization of user-supplied Java byte stream, which could allow an unauthenticated, remote attacker to

North Korea's 100,000-strong fake IT worker army rake in $500M a year for Kim Jong Un
Vulnérabilités & PatchesThe Register Securityil y a 12 jours

Researchers map full org chart of the scam from dodgy recruiters to helpful Western collaborators Researchers at IBM X‑Force and Flare Research have uncovered data that sheds light on how North Korea's fake IT worker schemes operate and infiltrate companies in order to funnel money back to the regime and steal sensitive information.…

Britain's satellite-watching gap to be plugged with £17.5M eyeball in Cyprus
Gouvernance & RégulationThe Register Securityil y a 12 jours

No 1 Space Operations Squadron will get a persistent stare capability The Ministry of Defence (MoD) plans to spend £17.5 million on a remotely-operated satellite monitoring facility in Cyprus, partly to protect the UK's secure communications system Skynet.…

Critical Unpatched Telnetd Flaw (CVE-2026-32746) Enables Unauthenticated Root RCE
Gouvernance & RégulationThe Hacker Newsil y a 12 jours

Cybersecurity researchers have disclosed a critical security flaw impacting the GNU InetUtils telnet daemon (telnetd) that could be exploited by an unauthenticated remote attacker to execute arbitrary code with elevated privileges. The vulnerability, tracked as CVE-2026-32746, carries a CVSS score of 9.8 out of 10.0. It has been described as a case of out-of-bounds write in the LINEMODE Set

Claude Code Security and Magecart: Getting the Threat Model Right
Malware & RansomwareThe Hacker Newsil y a 12 jours

When a Magecart payload hides inside the EXIF data of a dynamically loaded third-party favicon, no repository scanner will catch it – because the malicious code never actually touches your repo. As teams adopt Claude Code Security for static analysis, this is the exact technical boundary where AI code scanning stops and client-side runtime execution begins. A detailed analysis of where Claude

Japan to allow ‘proactive cyber-defense’ from October 1st
Gouvernance & RégulationThe Register Securityil y a 12 jours

In less polite places, this is called ‘hacking back’ or ‘offensive cyber-ops’ Japan’s government yesterday decided to allow its Self-Defense Force to conduct offensive cyber-operations, starting on October 1st.…

Too big to ignore, too small to be served: the midmarket security gap
Outils & RechercheThe Register Securityil y a 13 jours

Midmarket security leaders aren't as secure as they think, says Intruder's report Partner Content The midmarket matters. JP Morgan estimates approximately 300,000 organizations generating $13T in annual revenue. Yet they occupy an awkward position in the security landscape. They're large enough to be attractive targets with complex digital estates, significant revenue, and valuable data, but not large enough to have the headcount, budget maturity, or tooling sophistication of an enterprise security team.…

Bank built its own threat hunting agent because vendors can’t keep pace with new threats
Gouvernance & RégulationThe Register Securityil y a 13 jours

AI helped send weekly threat signal count from 80 million to 400 billion, then helped response time shrink from two days to 30 minutes Australia’s Commonwealth Bank built its own agentic AI threat hunting tools, because vendors are too slow to develop tools that can cope with emerging AI-powered threats, according to General Manager of Cyber Defence Operations Andrew Pade.…

Robotics surgical biz Intuitive discloses phishing attack
Gouvernance & RégulationThe Register Securityil y a 14 jours

Operations and hospital networks not affected, we're told Robotics-assisted surgical tech firm Intuitive said that unauthorized intruders gained access to some of its internal IT business applications after stealing an employee's credentials during a phishing attack.…

Cybercrime has skyrocketed 245% since the start of the Iran war
Gouvernance & RégulationThe Register Securityil y a 14 jours

Hacktivists use proxy services from Russia, China for 'billions of designed-for-abuse connection attempts' Cybercrime has skyrocketed since the start of the Iran war, according to Akamai, which reports a 245 percent increase in everything from credential harvesting attempts to automated reconnaissance traffic aimed at banks and other critical businesses.…