Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 28 / 233
AkiraBot | AI-Powered Bot Bypasses CAPTCHAs, Spams Websites At Scale https://www.sentinelone.com/labs/akirabot-ai-powered-bot-bypasses-captchas-spams-websites-at-scale/
11/04/2025 07:33:23
QRCode
archive.org
thumbnail

AkiraBot uses OpenAI to generate custom outreach messages to spam chat widgets and website contact forms at scale.

SentinelOne EN 2025 AI-Powered Bot Bypasses CAPTCHA AkiraBot Spam SEO
Police detains Smokeloader malware customers, seizes servers https://www.bleepingcomputer.com/news/security/police-detains-smokeloader-malware-customers-seizes-servers/?ref=metacurity.com
10/04/2025 22:06:52
QRCode
archive.org
thumbnail

In follow-up activity for Operation Endgame, law enforcement tracked down Smokeloader botnet's customers and detained at least five individuals.

bleepingcomputer EN 2025Botnet Europol Operation-Endgame Smokeloader
CVE-2025-22457 https://attackerkb.com/topics/0ybGQIkHzR/cve-2025-22457/rapid7-analysis
10/04/2025 21:41:35
QRCode
archive.org
thumbnail

On April 3, 2025, Ivanti published an advisory for CVE-2025-22457, an unauthenticated remote code execution vulnerability due to a stack based buffer overflow.…

attackerkb EN 2025 CVE-2025-22457 RCE Ivanti
Popular French retailers confirm hackers stole customer data https://therecord.media/france-retailers-hacked-confirm-cyberattack
10/04/2025 11:42:45
QRCode
archive.org
thumbnail

Targets of the cyberattacks include electronics and home appliances store Boulanger and the retailer Cultura.

therecord.media EN 2025 Data-Leak Boulanger France
Inside Black Basta: Uncovering the Secrets of a Ransomware Powerhouse https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/inside-black-basta-uncovering-the-secrets-of-a-ransomware-powerhouse/
09/04/2025 20:28:20
QRCode
archive.org
thumbnail

In February 2025, the cybersecurity community witnessed an unprecedented leak that exposed the internal operations of Black Basta.

trustwave EN 2025 BlackBasta leak analysis
A miner and the ClipBanker Trojan being distributed via SourceForge | Securelist https://securelist.com/miner-clipbanker-sourceforge-campaign/116088/?ref=metacurity.com
09/04/2025 20:20:08
QRCode
archive.org
thumbnail

Malicious actors are using SourceForge to distribute a miner and the ClipBanker Trojan while utilizing unconventional persistence techniques.

securelist EN 2025 officepackage ClipBanker Cryptocurrencies Malware Malware-Descriptions Malware-Technologies Microsoft-Office Miner Piracy SourceForge Trojan
NCSC issues warning over Chinese Moonshine and BadBazaar spyware https://www.computerweekly.com/news/366622023/NCSC-issues-warning-over-Chinese-Moonshine-and-BadBazaar-spyware?ref=metacurity.com
09/04/2025 20:17:27
QRCode
archive.org
thumbnail

Two spyware variants – Moonshine and BadBazaar – are being used to target the mobile devices of persons of interest to Chinese intelligence, including individuals in the Taiwanese, Tibetan and Uyghur communities.

computerweekly EN UK 2025 NCSC spyware warning Moonshine BadBazaar Skype WhatsApp
Don't open that file in WhatsApp for Windows just yet https://www.theregister.com/2025/04/08/whatsapp_windows_bug/
09/04/2025 11:12:24
QRCode
archive.org
thumbnail

A bug in WhatsApp for Windows can be exploited to execute malicious code by anyone crafty enough to persuade a user to open a rigged attachment - and, to be fair, it doesn't take much craft to pull that off.

The spoofing flaw, tracked as CVE-2025-30401, affects all versions of WhatsApp Desktop for Windows prior to 2.2450.6, and stems from a bug in how the app handles file attachments.

theregister EN 2025 WhatsApp Windows CVE-2025-30401 client
SMS Pumping: How Criminals Turn Your Messaging Service into Their Cash Machine https://www.group-ib.com/blog/sms-pumping/
09/04/2025 09:32:49
QRCode
archive.org
  • A fraudster develops or uses an automated bot or low-skilled workforce to trigger actions such as fake account creation, OTP requests, or password resets. These bots or human bots mimic real user activity, often bypassing security measures through direct API calls.
  • These actions trigger SMS messages, which are sent to phone numbers controlled by the fraudster, creating inflated traffic.
  • The fraudster collaborates with a “rogue party,” often a corrupt telecom provider or intermediary with access to SMS routing infrastructure.
  • The rogue party intercepts the inflated SMS traffic, typically avoiding message delivery to reduce costs. Instead, they route the traffic to numbers they control.
  • The rogue party earns revenue by collecting funds from the inflated SMS traffic, benefiting from volume-based pricing or other arrangements.
group-ib EN 2025 SMS Pumping Messaging SMS-pumping
Anatomy of an LLM RCE https://www.cyberark.com/resources/all-blog-posts/anatomy-of-an-llm-rce
09/04/2025 06:45:55
QRCode
archive.org
thumbnail

As large language models (LLMs) become more advanced and are granted additional capabilities by developers, security risks increase dramatically. Manipulated LLMs are no longer just a risk of...

cyberark EN 2025 LLM RCE analysis AI
EncryptHub's dual life: Cybercriminal vs Windows bug-bounty researcher https://www.bleepingcomputer.com/news/security/encrypthubs-dual-life-cybercriminal-vs-windows-bug-bounty-researcher/
08/04/2025 08:36:46
QRCode
archive.org
thumbnail

EncryptHub, a notorious threat actor linked to breaches at 618 organizations, is believed to have reported two Windows zero-day vulnerabilities to Microsoft, revealing a conflicted figure straddling the line between cybercrime and security research.

bleepingcomputer EN 2025 Cybercrime EncryptHub Hacker Microsoft Threat-Actor White-Hat-Hacker Zero-Day
La Suisse signe la Convention du Conseil de l’Europe sur l’intelligence artificielle https://swissprivacy.law/344/
08/04/2025 07:33:01
QRCode
archive.org

Le conseiller fédéral Albert Rösti signera aujourd’hui à Strasbourg la Convention-cadre du Conseil de l’Europe sur l’intelligence artificielle. Par cet acte, la Suisse rejoint les États signataires d’un premier instrument juridiquement contraignant au niveau international visant à encadrer le développement et l’utilisation de l’IA dans le respect des droits fondamentaux

swissprivacy.law FR CH 2025 Convention Conseil Europe IA intelligence artificielle Suisse acte
Russia arrests CEO of tech company linked to Doppelgänger disinformation campaign https://therecord.media/doppelganger-ceo-arrests-russia-tech
07/04/2025 21:19:47
QRCode
archive.org
thumbnail

Two other employees at the St. Petersburg-based hosting provider Azea Group were arrested. The company has alleged links to state-sponsored disinformation campaigns and cybercriminal infrastructure.

therecord.media EN 2025 Doppelgänger Azea Russia arrested
Carding tool abusing WooCommerce API downloaded 34K times on PyPI https://www.bleepingcomputer.com/news/security/carding-tool-abusing-woocommerce-api-downloaded-34k-times-on-pypi/?ref=metacurity.com
07/04/2025 21:10:54
QRCode
archive.org
thumbnail

A newly discovered malicious PyPi package named 'disgrasya' that abuses legitimate WooCommerce stores for validating stolen credit cards has been downloaded over 34,000 times from the open-source package platform.

bleepingcomputer EN 2025 Carding Credit-Card Packages PyPI Python WooCommerce
Someone hacked ransomware gang Everest’s leak site https://techcrunch.com/2025/04/07/someone-hacked-everest-ransomware-gang-dark-web-leak-site/
07/04/2025 21:10:06
QRCode
archive.org
thumbnail

"Don't do crime," the ransomware gang's dark web leak site reads.

techcrunch EN 2025 hacked ransomware Everest leak-site
British Army and Royal Navy hit by cyberattacks from pro-Russian and pro-Palestinian hackers | The Standard https://www.standard.co.uk/news/uk/british-army-royal-navy-cyberattacks-pro-russia-palestine-hackers-b1221112.html?ref=metacurity.com
07/04/2025 21:07:56
QRCode
archive.org
thumbnail

The group, known as the Holy League, is said to be made up of around 90 hacktivist collectives united by opposition to Western liberal values

standard EN 2025 Russian Cyberattack Ukraine British GCHQ cyberattacks Holy-League
Conseil fédéral: des données privées exposées en ligne https://www.20min.ch/fr/story/securite-les-numeros-de-conseillers-federaux-accessibles-en-trois-clics-103319370
07/04/2025 13:55:18
QRCode
archive.org
thumbnail

Des informations confidentielles concernant des membres du Conseil fédéral suisse et de hauts responsables de la sécurité sont accessibles au public.

20min FR CH Suisse Conseil fédéral informations confidentielles
IngressNightmare | Critical Unauthenticated RCE Vulnerabilities in Kubernetes Ingress NGINX https://www.sentinelone.com/blog/ingressnightmare-critical-unauthenticated-rce-vulnerabilities-in-kubernetes-ingress-nginx/?mkt_tok=MzI3LU1OTS0wODcAAAGZoSqCgJKW8GZrBlMYPeWfury7MVslnp5B4LAsxkQ_lfeW4FYUibpoiQPkuEZi9F9G7G8U_gruF2jLoiVTDCdKDqL26IdIvfIP74OJCs1lLOF4Hlg
07/04/2025 09:55:41
QRCode
archive.org
thumbnail

We share actionable mitigation and detection strategies against IngressNightmare so you can protect against possible exploitation in runtime.

sentinelone EN 2025 IngressNightmare ritical Unauthenticated RCE Kubernetes Vulnerabilities
Google Online Security Blog: Google announces Sec-Gemini v1, a new experimental cybersecurity model https://security.googleblog.com/2025/04/google-launches-sec-gemini-v1-new.html?m=1
07/04/2025 06:43:07
QRCode
archive.org
thumbnail

Today, we’re announcing Sec-Gemini v1, a new experimental AI model focused on advancing cybersecurity AI frontiers.

As outlined a year ago, defenders face the daunting task of securing against all cyber threats, while attackers need to successfully find and exploit only a single vulnerability. This fundamental asymmetry has made securing systems extremely difficult, time consuming and error prone. AI-powered cybersecurity workflows have the potential to help shift the balance back to the defenders by force multiplying cybersecurity professionals like never before.

security.googleblog EN 2025 Sec-Gemini IA announce experimental cybersecurity model
One Time Pwnage: SEAL Releases Advisory On SLOVENLY COMET https://www.securityalliance.org/news/2025-03-slovenly-comet
07/04/2025 06:41:17
QRCode
archive.org
thumbnail

A new threat actor is exploiting privileged access in the SMS supply chain to intercept OTP codes and other messages.

securityalliance EN 2025 SMS supply-chain Argentina OTP SLOVENLY-COMET
page 28 / 233
4649 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio