Flux RSS

— Sources secondaires
58articles RSS
Reinitialiser
Fake VS Code alerts on GitHub spread malware to developers
Gouvernance & RégulationBleepingComputeril y a 21 heures

A large-scale campaign is targeting developers on GitHub with fake Visual Studio Code (VS Code) security alerts posted in the Discussions section of various projects, to trick users into downloading malware. [...]

Breach de l'environnement cloud AWS de la Commission Européenne
CritiqueIncidents & BreachesBleepingComputerhier

Un acteur de menace a accédé à au moins un compte AWS de la Commission Européenne, volant plus de 350 GB de données incluant des bases de données et un serveur email d'employés. L'incident a été rapidement détecté ; la Commission enquête sans détails publics pour l'instant. AWS confirme que ses services ont fonctionné comme prévu, indiquant une compromission du compte client.

CISA: New Langflow flaw actively exploited to hijack AI workflows
Gouvernance & RégulationBleepingComputeravant-hier

The Cybersecurity and Infrastructure Security Agency (CISA) is warning that hackers are actively exploiting a critical vulnerability identified as CVE-2026-33017, which affects the Langflow framework for building AI agents. [...]

World Leaks data extortion: What you need to know
Fuites de donnéesGraham Cluleyavant-hier

World Leaks is a cyber extortion operation that steals sensitive data from organizations and threatens to leak it via the dark web if a ransom is not paid. Read more in my article on the Fortra blog.

UK sanctions Xinbi marketplace linked to Asian scam centers
Fuites de donnéesBleepingComputeravant-hier

The United Kingdom's Foreign, Commonwealth and Development Office (FCDO) has sanctioned Xinbi, a Chinese-language cryptocurrency-based online marketplace that sells stolen data and satellite internet equipment to scam networks in Southeast Asia. [...]

WhatsApp rolls out more AI features, iOS multi-account support
GénéralBleepingComputeravant-hier

WhatsApp is rolling out multiple features designed to make the app easier to use, including AI-powered message replies and photo retouching, support for two accounts on iOS, and chat history transfer between iOS and Android devices. [...]

Suspected RedLine infostealer malware admin extradited to US
Malware & RansomwareBleepingComputeravant-hier

An Armenian suspect was extradited to the United States to face criminal charges for allegedly helping manage RedLine, one of the most prolific infostealer malware operations in recent years. [...]

Smashing Security podcast #460: Never knock on the door of a nuclear submarine base and ask for a selfie
GénéralGraham Cluleyavant-hier

A disgruntled data analyst decides that the best response to losing his contract is to steal the entire company payroll database and demand $2.5 million in Bitcoin - signing his extortion emails from a company called "Loot." Meanwhile, two people drive up to the entrance of the UK's nuclear submarine base at Faslane and politely ask if they can have a look around. Tourists? Spies? Something in between? All this and more in episode 460 of the "Smashing Security" podcast with cybersecurity veteran Graham Cluley, and special guest Jenny Radcliffe.

PolyShell attacks target 56% of all vulnerable Magento stores
Vulnérabilités & PatchesBleepingComputeril y a 3 jours

Attacks leveraging the 'PolyShell' vulnerability in version 2 of Magento Open Source and Adobe Commerce installations are underway, targeting more than half of all vulnerable stores. [...]