Vue normale

Il y a de nouveaux articles disponibles, cliquez pour rafraîchir la page.
Aujourd’hui — 17 février 2026BleepingComputer

What 5 Million Apps Revealed About Secrets in JavaScript

17 février 2026 à 15:40
Leaked API keys are nothing new, but the scale of the problem in front-end code has been largely a mystery - until now. Intruder's research team built a new secrets detection method and scanned 5 million applications specifically looking for secrets hidden in JavaScript bundles. Here's what we learned. [...]

Passwords to passkeys: Staying ISO 27001 compliant in a passwordless era

16 février 2026 à 16:02
Password-based authentication is increasingly risky as organizations adopt passkeys to strengthen security and meet ISO/IEC 27001 requirements. Passwork explains how to align passwordless adoption with Annex A controls, risk assessments, and secure implementation practices. [...]
Hier — 16 février 2026BleepingComputer

Canada Goose investigating as hackers leak 600K customer records

Par : Ax Sharma
16 février 2026 à 05:45
ShinyHunters, a well-known data extortion group, claims to have stolen more than 600,000 Canada Goose customer records containing personal and payment-related data. Canada Goose told BleepingComputer the dataset appears to relate to past customer transactions and that it has not found evidence of a breach of its own systems. [...]

CTM360: Lumma Stealer and Ninja Browser malware campaign abusing Google Groups

15 février 2026 à 17:30
CTM360 reports 4,000+ malicious Google Groups and 3,500+ Google-hosted URLs used to spread the Lumma Stealer infostealing malware and a trojanized "Ninja Browser." The report details how attackers abuse trusted Google services to steal credentials and maintain persistence across Windows and Linux systems. [...]
À partir d’avant-hierBleepingComputer

Pastebin comments push ClickFix JavaScript attack to hijack crypto swaps

15 février 2026 à 16:17
Threat actors are abusing Pastebin comments to distribute a new ClickFix-style attack that tricks cryptocurrency users into executing malicious JavaScript in their browser, allowing attackers to hijack Bitcoin swap transactions and redirect funds to attacker-controlled wallets. [...]
❌
❌