Flux RSS

— Sources secondaires
186articles RSS
Reinitialiser
North Korea's 100,000-strong fake IT worker army rake in $500M a year for Kim Jong Un
Vulnérabilités & PatchesThe Register Securityil y a 12 jours

Researchers map full org chart of the scam from dodgy recruiters to helpful Western collaborators Researchers at IBM X‑Force and Flare Research have uncovered data that sheds light on how North Korea's fake IT worker schemes operate and infiltrate companies in order to funnel money back to the regime and steal sensitive information.…

SideWinder Espionage Campaign Expands Across Southeast Asia
Threat IntelligenceDark Readingil y a 12 jours

The suspected India-linked threat group targets governments, telecom, and critical infrastructure using spear-phishing, old vulnerabilities, and rapidly rotating infrastructure to maintain persistent access.

Britain's satellite-watching gap to be plugged with £17.5M eyeball in Cyprus
Gouvernance & RégulationThe Register Securityil y a 12 jours

No 1 Space Operations Squadron will get a persistent stare capability The Ministry of Defence (MoD) plans to spend £17.5 million on a remotely-operated satellite monitoring facility in Cyprus, partly to protect the UK's secure communications system Skynet.…

Meta’s AI Glasses and Privacy
GénéralSchneier on Securityil y a 12 jours

Surprising no one, Meta’s new AI glasses are a privacy disaster. I’m not sure what can be done here. This is a technology that will exist, whether we like it or not. Meanwhile, there is a new Android app that detects when there are smart glasses nearby.

Japan to allow ‘proactive cyber-defense’ from October 1st
Gouvernance & RégulationThe Register Securityil y a 13 jours

In less polite places, this is called ‘hacking back’ or ‘offensive cyber-ops’ Japan’s government yesterday decided to allow its Self-Defense Force to conduct offensive cyber-operations, starting on October 1st.…

More Attackers Are Logging In, Not Breaking In
Malware & RansomwareDark Readingil y a 13 jours

Credential theft soared in the second half of 2025, thanks in part to the industrialization of infostealer malware and AI-enabled social engineering.

South Korean Police Accidentally Post Cryptocurrency Wallet Password
Gouvernance & RégulationSchneier on Securityil y a 13 jours

An expensive mistake: Someone jumped at the opportunity to steal $4.4 million in crypto assets after South Korea’s National Tax Service exposed publicly the mnemonic recovery phrase of a seized cryptocurrency wallet. The funds were stored in a Ledger cold wallet seized in law enforcement raids at 124 high-value tax evaders that resulted in confiscating digital assets worth 8.1 billion won (currently approximately $5.6 million). When announcing the success of the operation, the agency released photos of a Ledger device, a popular hardware wallet for crypto storage and management. However, the images also showed a handwritten note of the wallet recovery phrase, which serves as the master key that allows restoring the assets to another device. The authorities failed to redact that info, allowing anyone to transfer into their account the assets in the cold wallet. Reportedly, shortly after the press release was published, 4 million Pre-Retogeum (PRTG) tokens, worth approximately $4.8 million at the time, were transferred out of the confiscated wallet to a new address.

Too big to ignore, too small to be served: the midmarket security gap
Outils & RechercheThe Register Securityil y a 14 jours

Midmarket security leaders aren't as secure as they think, says Intruder's report Partner Content The midmarket matters. JP Morgan estimates approximately 300,000 organizations generating $13T in annual revenue. Yet they occupy an awkward position in the security landscape. They're large enough to be attractive targets with complex digital estates, significant revenue, and valuable data, but not large enough to have the headcount, budget maturity, or tooling sophistication of an enterprise security team.…

Bank built its own threat hunting agent because vendors can’t keep pace with new threats
Gouvernance & RégulationThe Register Securityil y a 14 jours

AI helped send weekly threat signal count from 80 million to 400 billion, then helped response time shrink from two days to 30 minutes Australia’s Commonwealth Bank built its own agentic AI threat hunting tools, because vendors are too slow to develop tools that can cope with emerging AI-powered threats, according to General Manager of Cyber Defence Operations Andrew Pade.…

Page 8 / 10