thumbnail EncryptHub's dual life: Cybercriminal vs Windows bug-bounty researcher
thumbnail Russia arrests CEO of tech company linked to Doppelgänger disinformation campaign
thumbnail Carding tool abusing WooCommerce API downloaded 34K times on PyPI
thumbnail Someone hacked ransomware gang Everest’s leak site
thumbnail British Army and Royal Navy hit by cyberattacks from pro-Russian and pro-Palestinian hackers | The Standard
thumbnail Conseil fédéral: des données privées exposées en ligne
thumbnail IngressNightmare | Critical Unauthenticated RCE Vulnerabilities in Kubernetes Ingress NGINX
thumbnail Google Online Security Blog: Google announces Sec-Gemini v1, a new experimental cybersecurity model
thumbnail One Time Pwnage: SEAL Releases Advisory On SLOVENLY COMET
thumbnail Europcar GitLab breach exposes data of up to 200,000 customers
thumbnail Someone is trying to recruit security researchers in bizarre hacking campaign  | TechCrunch
thumbnail Evolution of Sophisticated Phishing Tactics: The QR Code Phenomenon
thumbnail Surge in Palo Alto Networks Scanner Activity Indicates Possible Upcoming Threats
thumbnail TTP - Apple Offers Apps With Ties to Chinese Military
thumbnail Outlaw Linux Malware: Persistent, Unsophisticated, and Surprisingly Effective — Elastic Security Labs
thumbnail Royal Mail Group Loses 144GB to Infostealers: Same Samsung Hacker, Same 2021 Infostealer Log | InfoStealers
thumbnail Oracle privately confirms Cloud breach to customers
thumbnail Global crackdown on Kidflix, a major child sexual exploitation platform with almost two million users | Europol
thumbnail PhaaS actor uses DoH and DNS MX to dynamically distribute phishing
thumbnail It takes two: The 2025 Sophos Active Adversary Report
thumbnail Hacktivists Target France Over Diplomatic Moves
thumbnail Russian Hacktivists Target Energy And Water Infrastructure
thumbnail Tomcat in the Crosshairs: New Research Reveals Ongoing Attacks
thumbnail Apple belatedly fixes exploited flaws in older OSes
thumbnail Analyzing open-source bootloaders: Finding vulnerabilities faster with AI
thumbnail From Contagious to ClickFake Interview: Lazarus leveraging the ClickFix tactic
thumbnail CrushFTP Authentication Bypass - CVE-2025-2825
thumbnail Fake Zoom Ends in BlackSuit Ransomware
thumbnail Les actions et projets futurs de l'OFCS pour renforcer la cybersécurité en Suisse
thumbnail ClickFix: Another Deceptive Social Engineering Technique
thumbnail Pulling the Threads on the Phish of Troy Hunt
thumbnail TCCing is Believing
thumbnail Hidden Malware Strikes Again: Mu-Plugins Under Attack
thumbnail Ransomware crews add EDR killers to their arsenal
thumbnail Oracle Health breach compromises patient data at US hospitals
thumbnail SAMLStorm: Critical Authentication Bypass in xml-crypto and Node.js libraries
thumbnail Malware found on npm infecting local package with reverse shell
thumbnail CVE-2025-29927: Next.js Middleware Authorization Bypass
thumbnail Micropatches released for SCF File NTLM Hash Disclosure Vulnerability (0day)
thumbnail GorillaBot: Technical Analysis and Code Similarities with Mirai
thumbnail Troy Hunt: A Sneaky Phish Just Grabbed my Mailchimp Mailing List
thumbnail VanHelsing, new RaaS in Town
thumbnail Weaver Ant: Tracking a China-Nexus Cyber Espionage Operation
thumbnail Chinese hackers spent four years inside Asian telco’s networks
thumbnail VanHelsing Ransomware
thumbnail Resurgence of In-The-Wild Activity Targeting Critical ServiceNow Vulnerabilities
thumbnail Oracle denies breach after hacker claims theft of 6 million data records
thumbnail Large enterprises scramble after supply-chain attack spills their secrets
thumbnail How to find Next.js on your network
thumbnail Next.js Middleware Exploit: Deep Dive into CVE-2025-29927 Authorization Bypass - ZeroPath Blog
thumbnail Phishing campaign impersonates Booking .com, delivers a suite of credential-stealing malware
thumbnail SSD Advisory - Linux kernel hfsplus slab-out-of-bounds Write - SSD Secure Disclosure
thumbnail ZDI-CAN-25373 Windows Shortcut Exploit Abused as Zero-Day in Widespread APT Campaigns | Trend Micro (US)
thumbnail Exploit Attempts for Cisco Smart Licensing Utility CVE-2024-20439 and CVE-2024-20440
thumbnail VSCode extensions found downloading early-stage ransomware
thumbnail Critical Veeam Backup & Replication CVE-2025-23120
thumbnail Virtue or Vice? A First Look at Proliferating Spyware Operations
thumbnail Secure Annex - Enterprise Browser Extension Security & Management Platform
thumbnail Over 16.8 Billion Records Exposed as Data Breaches Increase 6%
thumbnail Cobalt Strike 4.11: Shhhhhh, Beacon is Sleeping....
thumbnail Facial Recognition Injection Attacks - An Overview
thumbnail Decrypting Encrypted files from Akira Ransomware (Linux/ESXI variant 2024) using a bunch of GPUs
thumbnail Akira ransomware can be cracked with sixteen RTX 4090 GPUs in around ten hours — new counterattack breaks encryption | Tom's Hardware
thumbnail Inside BRUTED: Black Basta (RaaS) Members Used Automated Brute Forcing Framework to Target Edge Network Devices
thumbnail Les filiales Spar et les magasins TopCC ont été victimes d’une cyberattaque
thumbnail Fake "Security Alert" issues on GitHub use OAuth app to hijack accounts
thumbnail ICANN moves to retire Soviet-era .SU country domain name - Domain Name Wire
thumbnail Exclusive: Hackers claim cyber attack on Trump winery, golf courses
thumbnail NIST Selects HQC as Fifth Algorithm for Post-Quantum Encryption
thumbnail North Korean government hackers snuck spyware on Android app store | TechCrunch
thumbnail Lookout Discovers North Korean APT37 Mobile Spyware | Threat Intel
thumbnail DOGE axes CISA ‘red team’ staffers amid ongoing federal cuts | TechCrunch
thumbnail Medusa Ransomware Activity Continues to Increase
thumbnail GreyNoise Detects Mass Exploitation of Critical PHP-CGI Vulnerability (CVE-2024-4577)
thumbnail Google paid $12 million in bug bounties last year to security researchers
thumbnail Swiss critical sector faces new 24-hour cyberattack reporting rule
thumbnail ENQUETE. "TrackingFiles" : comment la vie privée de militaires, de diplomates et du personnel politique français est exposée par les données de géolocalisation
thumbnail Undocumented "backdoor" found in Bluetooth chip used by a billion devices
thumbnail DPRK IT Fraud Network Uses GitHub to Target Global Companies
thumbnail North Korean Fake IT Workers Leverage GitHub to Build Personas
thumbnail Data breach at Japanese telecom giant NTT hits 18,000 companies
thumbnail Thousands of websites hit by four backdoors in 3rd party JavaScript attack
thumbnail Silk Typhoon targeting IT supply chain
thumbnail District of Columbia | Chinese Nationals with Ties to the PRC Government and “APT27” Charged in a Computer Hacking Campaign for Profit, Targeting Numerous U.S. Companies, Institutions, and Municipalities | United States Department of Justice
thumbnail Blog: Zen and the Art of Microcode Hacking
thumbnail Cisco warns of Webex for BroadWorks flaw exposing credentials
thumbnail New DDoS Botnet Discovered: Over 30,000 Hacked Devices, Majority of Observed Activity Traced to Iran
thumbnail Des cybercriminels s'en prennent à Cistec, fournisseur suisse de système clinique | ICTjournal
thumbnail Astrill VPN: Silent Push Publicly Releases New IPs on VPN Service Heavily Used by North Korean Threat Actors
thumbnail 360XSS: Mass Website Exploitation via Virtual Tour Framework for SEO Poisoning
thumbnail Zapier says someone broke into its code repositories and may have accessed customer data
thumbnail Spyzie stalkerware is spying on thousands of Android and iPhone users
thumbnail Le plus grave incident de sécurité jamais connu par la Sûreté de l'État: "Des pirates informatiques chinois ont pu rentrer dans ce logiciel"
thumbnail La série noire continue pour Ruag et l’armée suisse, à la suite d’une cyberattaque massive - Le Temps
thumbnail Cellebrite zero-day exploit used to target phone of Serbian student activist - Amnesty International Security Lab
thumbnail Fremdzugriff auf ein E-Mail-Konto der kantonalen Verwaltung Appenzell I.Rh. — Appenzell Innerrhoden
thumbnail Researchers uncover unknown Android flaws used to hack into a student's phone
thumbnail Exclusive: Hegseth orders Cyber Command to stand down on Russia planning
thumbnail Trump administration retreats in fight against Russian cyber threats
thumbnail Ransomware : sur la piste trouble de l’un des leaders de Black Basta
thumbnail Cellebrite suspends Serbia as customer after claims police used firm's tech to plant spyware | TechCrunch
thumbnail Confluence Exploit Leads to LockBit Ransomware
thumbnail Orange Group confirms breach after hacker leaks company documents
thumbnail Signals of Trouble: Multiple Russia-Aligned Threat Actors Actively Targeting Signal Messenger
thumbnail Lumma Stealer Chronicles: PDF-themed Campaign Using Compromised Educational Institutions' Infrastructure
thumbnail Researchers accuse North Korea of $1.4 billion Bybit crypto heist
thumbnail An Update on Fake Updates: Two New Actors, and New Mac Malware
thumbnail Xerox Versalink C7025 Multifunction Printer: Pass-Back Attack Vuln (Fixed) | Rapid7 Blog
thumbnail Stalkerware apps Cocospy and Spyic are exposing phone data of millions of people | TechCrunch
thumbnail WordPress ClickFix Malware Causes Google Warnings and Infected Computers
thumbnail Beware: PayPal "New Address" feature abused to send phishing emails
thumbnail Weathering the storm: In the midst of a Typhoon
thumbnail German election targeted by Russian disinformation, security services warn | The Record from Recorded Future News
thumbnail Black Basta is latest ransomware group to be hit by leak of chat logs
thumbnail CISA and FBI: Ghost ransomware breached orgs in 70 countries
thumbnail UK healthcare giant HCRG confirms hack after ransomware gang claims theft of sensitive data
thumbnail Un expert du darknet dénonce une perquisition abusive par Fedpol
thumbnail OpenSSH bugs threaten enterprise security, uptime
thumbnail Threat Spotlight: Inside the World's Fastest Rising Ransomware Operator — BlackLock
thumbnail Ecuador's legislature says hackers attempted to access confidential information
thumbnail Microsoft spots XCSSET macOS malware variant used for crypto theft
thumbnail CVE-2022-31631: High-Risk PHP Vulnerability Demands Immediate Patch
thumbnail Network Security Issues in RedNote
thumbnail Investigating Anonymous VPS services used by Ransomware Gangs
thumbnail Hidden Backdoors Uncovered in WordPress Malware Investigation
thumbnail Sweden’s PM on suspected cable sabotage: ‘We don’t believe random things suddenly happen quite often’
thumbnail Storm-2372 conducts device code phishing campaign
thumbnail PirateFi game on Steam caught installing password-stealing malware
thumbnail Key figures behind Phobos and 8Base ransomware arrested in international cybercrime crackdown
thumbnail Cyberattack disrupts Lee newspapers' operations across the US
thumbnail Spyware maker caught distributing malicious Android apps for years | TechCrunch
thumbnail An Italian journalist speaks about being targeted with Paragon spyware
thumbnail CVE-2024-12356
thumbnail Dutch police say they took down 127 servers used by sanctioned hosting service | The Record from Recorded Future News
thumbnail Multiple Russian Threat Actors Targeting Microsoft Device Code Authentication | Volexity
thumbnail Cybercrime: A Multifaceted National Security Threat
thumbnail New Exploitation Surge: Attackers Target ThinkPHP and ownCloud Flaws at Scale | GreyNoise Blog
thumbnail Fortinet discloses second firewall auth bypass patched in January
thumbnail Sky ECC encrypted service distributors arrested in Spain, Netherlands
thumbnail New UK sanctions target Russian cybercrime network
thumbnail Four alleged hackers arrested in Phuket for hacking 17 Swiss firms
thumbnail 8 Million Requests Later, We Made The SolarWinds Supply Chain Attack Look Amateur
thumbnail Go Module Mirror served backdoor to devs for 3+ years - Ars Technica
thumbnail Spain arrests suspected hacker of US and Spanish military agencies
thumbnail British engineering firm IMI discloses breach, shares no details
thumbnail Ransomware payments dropped 35% in 2024
thumbnail Active Directory Domain Services Elevation of Privilege Vulnerability (CVE-2025-21293)
thumbnail CVE-2025-0411: Ukrainian Organizations Targeted in Zero-Day Campaign and Homoglyph Attacks
thumbnail U.S. Government Disclosed 39 Zero-Day Vulnerabilities in 2023, Per First-Ever Report
thumbnail BSI analysis shows: Nextcloud server stored passwords in plain text | heise online
thumbnail Arma Reforger And DayZ DDOS Attack Continues, Devs "Making Progress"
thumbnail Kimsuky hackers use new custom RDP Wrapper for remote access
thumbnail Deloitte to provide Rhode Island $5M for ransomware recovery
thumbnail Hackers Exploiting A Six-Year-Old IIS Vulnerability To Gain Remote Access
thumbnail Code injection attacks using publicly disclosed ASP.NET machine keys
thumbnail Critical Cisco ISE bug can let attackers run commands as root
thumbnail Swissmem: vol de donnée par des hackers russes
thumbnail Spyware maker Paragon terminates contract with Italian government: media reports | TechCrunch
thumbnail Law enforcement hammered cybercrime in 2024. Is it…
thumbnail Hackers spoof Microsoft ADFS login pages to steal credentials
thumbnail Genève: un fournisseur de logiciels bancaires piraté | Tribune de Genève
thumbnail Unpacking the BADBOX Botnet with Censys
thumbnail Router maker Zyxel tells customers to replace vulnerable hardware exploited by hackers
thumbnail Zyxel Telnet Vulnerabilities
thumbnail SparkCat crypto stealer in Google Play and App Store
thumbnail PoC Exploit Released for macOS Kernel Vulnerability CVE-2025-24118 (CVSS 9.8)
thumbnail macOS FlexibleFerret | Further Variants of DPRK Malware Family Unearthed
thumbnail Une cyberattaque paralyse Radio Top et Tele Top à Winterthour
thumbnail How Switzerland is caught up in Russia’s propaganda machine
thumbnail Recent Jailbreaks Demonstrate Emerging Threat to DeepSeek
thumbnail Live Chat Blog #2: Cisco Webex Connect - Access to millions of chats histories
thumbnail Exposed SMB: The Hidden Risk Behind ‘WantToCry’ Ransomware Attacks
thumbnail Eradicating trivial vulnerabilities, at scale
thumbnail DeepSeek’s Popular AI App Is Explicitly Sending US Data to China | WIRED
thumbnail Tbilisi public transport hacked, playing pro-European messages
thumbnail Tata Technologies says ransomware attack hit IT assets, investigation ongoing
thumbnail X Phishing | Campaign Targeting High Profile Accounts Returns, Promoting Crypto Scams
thumbnail Swiss tax authority forced to buy Bahamas domain name after URL typo
thumbnail Active Exploitation of Zero-day Zyxel CPE Vulnerability (CVE-2024-40891)
thumbnail Norway seizes ship suspected of sabotage, says crew are Russian nationals
thumbnail 10,000 WordPress Websites Found Delivering MacOS and Windows Malware
thumbnail Wiz Research Uncovers Exposed DeepSeek Database Leaking Sensitive Information, Including Chat History | Wiz Blog
thumbnail New TorNet backdoor seen in widespread campaign
thumbnail After security breach at D-Trust: CCC speaks of "cyber window-dressing" | heise online
thumbnail Salt Typhoon: An Analysis of Vulnerabilities Exploited by this State-Sponsored Actor
thumbnail Updated: Frederick Health takes systems offline due to ransomware attack
thumbnail Unmasking FleshStealer: A New Infostealer Threat in 2025
thumbnail OpenAI launches ChatGPT Gov for U.S. government agencies
thumbnail Apple fixes this year’s first actively exploited zero-day bug
thumbnail Cobalt Strike and a Pair of SOCKS Lead to LockBit Ransomware
thumbnail UnitedHealth updates number of data breach victims to 190 million
thumbnail Mysterious backdoor found on select Juniper routers
thumbnail 48,000+ internet-facing Fortinet firewalls still open to attack
thumbnail The J-Magic Show: Magic Packets and Where to find them - Lumen Blog
thumbnail HellCat and Morpheus | Two Brands, One Payload as Ransomware Affiliates Drop Identical Code
thumbnail 2024 macOS Malware Review | Infostealers, Backdoors, and APT Campaigns Targeting the Enterprise
thumbnail How A Large-Scale Russian Botnet Operation Stays Under the Radar
thumbnail Subaru Starlink flaw let hackers hijack cars in US and Canada
thumbnail fasthttp Used in New Bruteforce Campaign
thumbnail Targeted supply chain attack against Chrome browser extensions
thumbnail How GhostGPT Empowers Cybercriminals with Uncensored AI | Abnormal
thumbnail Government and university websites targeted in ScriptAPI[.]dev client-side attack - c/side
thumbnail Hundreds of fake Reddit sites push Lumma Stealer malware
thumbnail Google launches customizable Web Store for Enterprise extensions
thumbnail Malware Redirects WordPress Traffic to Harmful Sites
thumbnail Analyse de la cybersécurité des systèmes d’information hospitaliers (SIH)
thumbnail Swiss cities targeted by Russian hackers during WEF
thumbnail Mass Campaign of Murdoc Botnet Mirai: A New Variant of Corona Mirai | Qualys Security Blog
thumbnail Record-breaking 5.6 Tbps DDoS attack and global DDoS trends for 2024 Q4
thumbnail Malicious extensions circumvent Google’s remote code ban
thumbnail Researchers Accessed Windows BitLocker Encrypted Files Disassembling the Laptop
thumbnail IoT Botnet Linked to Large-scale DDoS Attacks Since the End of 2024
thumbnail Will the Real Volt Typhoon Please Stand Up?
thumbnail Gootloader inside out
thumbnail FBI Warns iPhone, Android, Windows Users—Do Not Install These Apps
thumbnail RansomHub Affiliate leverages Python-based backdoor
thumbnail The great Google Ads heist: criminals ransack advertiser accounts via fake Google ads | Malwarebytes
thumbnail Banshee: The Stealer That "Stole Code" From MacOS XProtect
thumbnail Europe readies ‘action plan’ to secure hospitals from crippling cyberattacks – POLITICO
thumbnail Bolstering the cybersecurity of the healthcare sector
thumbnail Passkeys: they're not perfect but they're getting better
thumbnail Under the cloak of UEFI Secure Boot: Introducing CVE-2024-7344
thumbnail sfewer-r7's assessment of CVE-2025-0282
thumbnail Chinese hackers breached US government office that assesses foreign investments for national security risks
thumbnail New Star Blizzard spear-phishing campaign targets WhatsApp accounts | Microsoft Security Blog
thumbnail EU law enforcement training agency data breach: Data of 97,000 individuals compromised - Help Net Security
thumbnail French submarine crew accidentally leak sensitive information through Strava app | Euronews
thumbnail Ransomware roundup: 2024 end-of-year report - Comparitech
thumbnail Après l’attaque par rançongiciel, la PME bretonne fait condamner ...
thumbnail Gootloader inside out – Sophos News
thumbnail Over 5,000 WordPress sites caught in WP3.XYZ malware attack
thumbnail IntelBroker Unmasked: KELA’s In-Depth Analysis of a Cybercrime Leader
thumbnail Luxembourg government websites knocked offline in latest cyberattack | Luxembourg Times
thumbnail Ministers consider ban on all UK public bodies making ransomware payments | Cybercrime | The Guardian
thumbnail S'assurer contre les cyberattaques devient hors de prix
thumbnail Telefonica Breach Exposes Jira Tickets, Customer Data
thumbnail Victime d'une cyberattaque début décembre, VidyMed a restauré les données ciblées (update)
thumbnail Cracking the Code: How Banshee Stealer Targets macOS Users
thumbnail Ransomware abuses Amazon AWS feature to encrypt S3 buckets
thumbnail Microsoft: macOS bug lets hackers install malicious kernel drivers
thumbnail UK domain giant Nominet confirms cybersecurity incident linked to Ivanti VPN hacks | TechCrunch
thumbnail Scholastic Hack: Furry Finds 8 Million People Exposed
thumbnail Industrial networking manufacturer Moxa reports 'critical' router bugs
thumbnail Backdooring Your Backdoors - Another $20 Domain, More Governments
thumbnail Inside FireScam : An Information Stealer with Spyware Capabilities
thumbnail “Can you try a game I made?” Fake game sites lead to information stealers
thumbnail Recruitment Phishing Scam Imitates Hiring Process
thumbnail Telegram hands over data on thousands of users to US law enforcement
thumbnail Microsoft moves to disrupt hacking-as-a-service scheme that’s bypassing AI safety measures
thumbnail Green Bay Packers' online store hacked to steal credit cards
thumbnail UN aviation agency ‘investigating’ security breach after hacker claims theft of personal data
thumbnail Exploitation Walkthrough and Techniques - Ivanti Connect Secure RCE (CVE-2025-0282)
thumbnail FunkSec – Alleged Top Ransomware Group Powered by AI
thumbnail SonicWall urges admins to patch exploitable SSLVPN bug immediately
thumbnail Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit
thumbnail Hackers Claim Massive Breach of Location Data Giant, Threaten to Leak Data
thumbnail Russian ISP confirms Ukrainian hackers "destroyed" its network
thumbnail Ivanti Connect Secure VPN Targeted in New Zero-Day Exploitation
thumbnail CVE-2025-0282: Ivanti Connect Secure zero-day exploited in the wild | Rapid7 Blog
thumbnail Researcher Turns Insecure License Plate Cameras Into Open Source Surveillance Tool
thumbnail Thousands of credit cards stolen in Green Bay Packers store breach
thumbnail "Ils nous ont contactés via une messagerie cryptée pour obtenir une rançon" : cette cyberattaque rend la vie impossible aux éleveurs
thumbnail Casio says hackers stole personal data of 8,500 people during October ransomware attack
thumbnail Many-shot jailbreaking \ Anthropic
thumbnail Bad Likert Judge: A Novel Multi-Turn Technique to Jailbreak LLMs by Misusing Their Evaluation Capability
thumbnail PowerSchool hack exposes student, teacher data from K-12 districts
thumbnail Telegram Hands U.S. Authorities Data on Thousands of Users
thumbnail Hackers reportedly compromise Argentina’s airport security payroll system | The Record from Recorded Future News
thumbnail Chinese hackers also breached Charter and Windstream networks
thumbnail Rhode Island warns of cybercriminals leaking stolen state files as Deloitte works to restore system
thumbnail LDAPNightmare: SafeBreach Publishes First PoC Exploit (CVE-2024-49113)
thumbnail What We Know About CVE-2024-49112 and CVE-2024-49113
thumbnail US sanctions Chinese cyber firm linked to Flax Typhoon hacks | TechCrunch
thumbnail White House: Salt Typhoon hacks possible because telecoms lacked basic security measures
thumbnail NATO’s Emergency Plan for an Orbital Backup Internet
thumbnail New DoubleClickjacking attack exploits double-clicks to hijack accounts
thumbnail DoubleClickjacking: A New Era of UI Redressing
thumbnail New details reveal how hackers hijacked 35 Google Chrome extensions
thumbnail Finland identifies seven suspects among crew of alleged Russian 'spy' tanker
thumbnail Ces hackers israéliens qui s’installent à Barcelone
thumbnail Infocert, in vendita nel deep web milioni di dati di utenti italiani
thumbnail Palo Alto Firewalls Backdoored by Suspected Chinese Hackers
thumbnail US Treasury says China accessed government documents in 'major' cyberattack
thumbnail Thousands of widely-used public workspaces are leaking data
thumbnail Massive VW Data Leak Exposed 800,000 EV Owners’ Movements, From Homes To Private Spaces | Carscoops
thumbnail Clop ransomware is now extorting 66 Cleo data-theft victims
thumbnail DDosia Project: How NoName057(16) is trying to improve the efficiency of DDoS attacks
thumbnail Cyber firm's Chrome extension hijacked to steal user passwords
thumbnail Checking It Twice: Profiling Benign Internet Scanners — 2024 Edition
thumbnail LockBit Ransomware Group Plots Comeback With 4.0 Release
thumbnail Apple sends spyware victims to this nonprofit security lab
thumbnail European Space Agency's official store hacked to steal payment cards
thumbnail Airline hit by a cyberattack, delaying flights during the year-end holiday season
thumbnail Malware trends: eBPF exploitation, malware configurations stored in unexpected places, and increased use of custom post-exploitation tools
thumbnail Botnets Continue to Target Aging D-Link Vulnerabilities
thumbnail Russia's GRU possibly behind cyberattack on Ukraine's government, SBU says
thumbnail Israel's Mossad spent years orchestrating Hezbollah pager plot
thumbnail EPFL: des failles de sécurité dans les modèles d'IA
thumbnail Astrill VPN and Remote Worker Fraud - Spur
thumbnail Inside Operation Destabilise: How a ransomware investigation linked Russian money laundering and street-level drug dealing
thumbnail Câbles rompus en mer Baltique : Pékin n’a pas autorisé la Suède à mener son enquête à bord du cargo
thumbnail Malicious ads push Lumma infostealer via fake CAPTCHA pages
thumbnail Effective Phishing Campaign Targeting European Companies and Organizations
thumbnail Judge rules NSO Group is liable for spyware hacks targeting 1,400 WhatsApp user devices
thumbnail Medion hack? BlackBasta ransomware has allegedly copied 1.5 TB of data | heise online
thumbnail China 'compromised' Canadian government networks and stole valuable info: spy agency | CBC News
thumbnail Ascension: Health data of 5.6 million stolen in ransomware attack
thumbnail NotLockBit: A Deep Dive Into the New Ransomware Threat | Qualys Security Blog
thumbnail A new playground: Malicious campaigns proliferate from VSCode to npm
thumbnail The Rise of Alliances: NoName057(16)'s Transformation in 2024
thumbnail Google Calendar Notifications Bypassing Email Security Policies
thumbnail Three Months After the Storm: Did Cybercriminals Move to Telegram Alternatives? • KELA Cyber Threat Intelligence
thumbnail Phishing platform Rockstar 2FA trips, and “FlowerStorm” picks up the pieces – Sophos News
thumbnail Supply Chain Attack on Rspack npm Packages Injects Cryptojac...
thumbnail DHS Says China, Russia, Iran, and Israel Are Spying on People in US with SS7
thumbnail China’s Propaganda Expansion: Inside the Rise of International Communication Centers (ICCs)
thumbnail Weibo is losing influencers over legal display name rule - Rest of World
thumbnail Commission opens formal proceedings against TikTok under DSA
thumbnail Le “banquier” de Hive trahi par sa passion de la course à pied - ...
thumbnail The Wiretap: Kamala Harris’ Campaign Staff Suspected iPhones Had Been Hacked. Apple Declined To Give Them The Help They Wanted.
thumbnail Stop Calling Online Scams ‘Pig Butchering,’ Interpol Warns
thumbnail Meta fined $263M over 2018 security breach that affected ~3M EU Facebook users
thumbnail State of SonicWall Exposure: Firmware Decryption Unlocks…
thumbnail Serbian authorities using spyware to hack activists and journalists
thumbnail CVE-2024-55956
thumbnail Serbian police used Cellebrite to unlock, then plant spyware, on a journalist's phone | TechCrunch
thumbnail 300,000+ Prometheus Servers and Exporters Exposed to DoS Attacks
thumbnail PROXY.AM Powered by Socks5Systemz Botnet
thumbnail Getting a taste of your own medicine: Threat actor MUT-1244 targets offensive actors, leaking hundreds of thousands of credentials | Datadog Security Labs
thumbnail Oasis Security Research Team Discovers Microsoft Azure MFA Bypass
thumbnail NodeLoader Used to Deliver Malware
thumbnail Axpo annonce lancer le premier SOC suisse pour les infrastructures OT | ICTjournal
thumbnail Threat Actors Push ClickFix Fake Browser Updates Using Stolen Credentials
thumbnail NATO to launch new cyber center by 2028: Official
thumbnail 'Operation Digital Eye' Attack Targets European IT Orgs
thumbnail Compromising OpenWrt Supply Chain via Truncated SHA-256 Collision and Command Injection - Flatt Security Research
thumbnail Fraudulent shopping sites tied to cybercrime marketplace taken offline
thumbnail BrazenBamboo Weaponizes FortiClient Vulnerability to Steal VPN Credentials via DEEPDATA
thumbnail What a new threat report says about Mac malware in 2024
thumbnail Moonlock's 2024 macOS threat report
thumbnail Zero-Day: How Attackers Use Corrupted Files to Bypass Detection
thumbnail Unidentified Threat Actor Utilizes Android Malware to Target High-Value Assets in South Asia
thumbnail Log In POLITICO Pro Home Latest news Romanian elections War in Ukraine French political crisis Newsletters Podcasts Poll of Polls Policy news Events News Politics Hungarian CIA reportedly spied on EU officials
thumbnail Tuta has suffered multiple DDoS attacks in one week – but it claims privacy has not been compromised
thumbnail Meeten Malware: A Cross-Platform Threat to Crypto Wallets on macOS and Windows
thumbnail Ransomware hackers target NHS hospitals with new cyberattacks
thumbnail 8 US telcos compromised, FBI advises Americans to use encrypted communications - Help Net Security
thumbnail 2023 Anna Jaques Hospital data breach impacted +310K people
thumbnail zizmor would have caught the Ultralytics workflow vulnerability
thumbnail Ultralytics AI model hijacked to infect thousands with cryptominer
thumbnail Roumanie : la Cour constitutionnelle annule le premier tour de l’élection présidentielle du fait de graves manipulations sur TikTok
thumbnail Protecting Undersea Internet Cables: A Tech Challenge
thumbnail Veeam warns of critical RCE bug in Service Provider Console
thumbnail Cisco warns of continued exploitation of 10-year-old ASA bug
thumbnail FBI, CISA urge Americans to use secure messaging apps in wake of massive cyberattack
thumbnail Cloudflare’s developer domains increasingly abused by threat actors
thumbnail Black Basta ransomware gang hit BT Group
thumbnail Where There’s Smoke, There’s Fire - Mitel MiCollab CVE-2024-35286, CVE-2024-41713 And An 0day
thumbnail At least 8 US telcos, dozens of countries impacted by Salt Typhoon breaches, White House says | The Record from Recorded Future News
thumbnail Lateral Movement on macOS: Unique and Popular Techniques and In-the-Wild Examples
thumbnail Malicious Ads in Search Results Are Driving New Generations of Scams | WIRED
thumbnail iVerify Mobile Threat Investigation Uncovers New Pegasus Samples
thumbnail Police seize Matrix encrypted chat service after spying on criminals
thumbnail CVE-2024-1212: Unauthenticated Command Injection In Progress Kemp LoadMaster - Rhino Security Labs
thumbnail Windows Server 2012 Mark of the Web Vulnerability (0day) - and Free Micropatches for it
thumbnail Poland arrests former spy chief in Pegasus spyware probe
thumbnail Energy industry contractor says ransomware attack has limited access to IT systems | The Record from Recorded Future News
thumbnail AWS launches an incident response service to combat cybersecurity threats | TechCrunch
thumbnail Data broker exposes 600,000 sensitive files including background checks
thumbnail UN, international orgs create advisory body for submarine cables after incidents | The Record from Recorded Future News
thumbnail Plusieurs tentatives: L'État luxembourgeois visé par des cyberattaques
thumbnail Gaming Engines: An Undetected Playground for Malware Loaders
thumbnail Starbucks, grocery stores impacted by Blue Yonder ransomware attack - Help Net Security
thumbnail RobotDropper Automates the Delivery of Multiple Infostealers
thumbnail PHP Reinfector and Backdoor Malware Target WordPress Sites
thumbnail Python Crypto Library Updated to Steal Private Keys
thumbnail 11 arrested in Europol shutdown of illegal IPTV streaming networks
thumbnail UK hospital network postpones procedures after cyberattack
thumbnail Attacco ransomware al Bologna FC, rubati migliaia di documenti (anche sui calciatori) | Wired Italia
thumbnail Bootkitty: Analyzing the first UEFI bootkit for Linux
thumbnail Zello asks users to reset passwords after security incident
thumbnail Here’s how simple it is for script kiddies to stand up DDoS services
thumbnail Matrix Unleashes A New Widespread DDoS Campaign
thumbnail Raspberry Robin Analysis
thumbnail Yakuza Victim Data Leaked in Japanese Agency Attack
thumbnail Microsoft Power Pages: Data Exposure Reviewed
thumbnail CyberVolk | A Deep Dive into the Hacktivists, Tools and Ransomware Fueling Pro-Russian Cyber Attacks
thumbnail 7-Zip flaw enables code smuggling with manipulated archives
thumbnail China-Nexus TAG-112 Compromises Tibetan Websites to Distribute Cobalt Strike
thumbnail Apple fixes two zero-days used in attacks on Intel-based Macs
thumbnail Qualys TRU Uncovers Five Local Privilege Escalation Vulnerabilities in needrestart | Qualys Security Blog
thumbnail Plusieurs comptes Telegram de députés ont été piratés
thumbnail Microsoft shares latest intelligence on North Korean and Chinese threat actors at CYBERWARCON | Microsoft Security Blog
thumbnail Seeing Through a GLASSBRIDGE: Understanding the Digital Marketing Ecosystem Spreading Pro-PRC Influence Operations
thumbnail Russian Spies Jumped From One Network to Another Via Wi-Fi in an Unprecedented Hack | WIRED
thumbnail FortiClient VPN Logging Blind Spot Revealed
thumbnail Cinq membres du groupe de pirates Scattered Spider arrêtés
thumbnail INPS Servizi sotto attacco ransomware. Dati a rischio e sito irraggiungibile | DDay.it
thumbnail 750 000 fichiers et dossiers patients sensibles français en fuite sur le dark web, que se passe-t-il ?
thumbnail Threat Actors Hijack Misconfigured Servers for Live Sports Streaming
thumbnail Picard victime d’une fuite de données, des milliers de clients touchés
thumbnail Exploit attempts for unpatched Citrix vulnerability
thumbnail FrostyGoop’s Zoom-In: A Closer Look into the Malware Artifacts, Behaviors and Network Communications
thumbnail Abnormal Security
thumbnail Microsoft 365 Admin portal abused to send sextortion emails
thumbnail Extracting Plaintext Credentials from Palo Alto Global Protect
thumbnail Pots and Pans, AKA an SSLVPN - Palo Alto PAN-OS CVE-2024-0012 and CVE-2024-9474
thumbnail T-Mobile finally managed to thwart a data breach before it occured
thumbnail Anyone Can Buy Data Tracking US Soldiers and Spies to Nuclear Vaults and Brothels in Germany | WIRED
thumbnail Leaked Documents Show What Phones Secretive Tech ‘Graykey’ Can Unlock
thumbnail German Stats Body Says Suffered Possible Data Breach | Barron's
thumbnail Snowflake hackers identified and charged with stealing 50 billion AT&T records | TechCrunch
thumbnail T-Mobile confirms it was hacked in recent wave of telecom breaches
thumbnail My Habit Was Collecting
thumbnail The State of Cloud Ransomware in 2024
thumbnail CVE-2024-47575
thumbnail Okta security bug affects those with really long usernames
thumbnail Windows infected with backdoored Linux VMs in new phishing attacks
thumbnail China's Volt Typhoon breached Singtel, reports say
thumbnail Visionaries Have Democratised Remote Network Access - Citrix Virtual Apps and Desktops (CVE Unknown)
thumbnail Threat Hunting Case Study: Uncovering Turla | Intel 471
thumbnail “Une curiosité malsaine pour le hacking” : au procès du pirate qu ...
thumbnail CopyRh(ight)adamantys Campaign: Rhadamantys Exploits Intellectual Property Infringement Baits
thumbnail Uncovering Apple Vulnerabilities: The diskarbitrationd and storagekitd Audit Story Part 1
thumbnail How Italy became an unexpected spyware hub
thumbnail VEEAM exploit seen used again with a new ransomware: “Frag
thumbnail D-Link won’t fix critical flaw affecting 60,000 older NAS devices
thumbnail Meet Interlock — The new ransomware targeting FreeBSD servers
thumbnail DocuSign's Envelopes API abused to send realistic fake invoices
thumbnail Threat Campaign Spreads Winos4.0 Through Game Application
thumbnail North Korean hackers employ new tactics to compromise crypto-related businesses - Help Net Security
thumbnail Nokia says hackers leaked third-party app source code
thumbnail New Campaign Uses Remcos RAT to Exploit Victims
thumbnail BlueNoroff Hidden Risk | Threat Actor Targets Macs with Fake Crypto News and Novel Persistence
thumbnail Gootloader’s Pivot from SEO Poisoning: PDF Converters Become the New Infection Vector
thumbnail Bengal cat lovers in Australia get psspsspss’d in Google-driven Gootloader campaign
thumbnail Cyberattack disables tracking systems and panic alarms on British prison vans
thumbnail Interpol operation nets 41 arrests, takedown of 22,000 malicious IPs
thumbnail EDR Bypass Testing Reveals Extortion Actor's Toolkit
thumbnail ClickFix tactic: Revenge of detection
thumbnail Cisco notifies ‘limited set’ of customers after hacker accessed non-public files
thumbnail Schneider Electric confirms dev platform breach after hacker steals data
thumbnail CRON#TRAP: Emulated Linux Environments as the Latest Tactic in Malware Staging - Securonix
thumbnail The story behind HISAA
thumbnail SmokeBuster Tool
thumbnail Massive hack-for-hire scandal rocks Italian political elites
thumbnail Cyber attack on pharmaceutical distributor AEP
thumbnail DDoS site Dstat.cc seized and two suspects arrested in Germany
thumbnail Zero-Click Flaw Exposes Potentially Millions of Popular Storage Devices to Attack
thumbnail Inside Sophos' 5-Year War With the Chinese Hackers Hijacking Its Devices
thumbnail Botnet 7777: Are You Betting on a Compromised Router?
thumbnail A glimpse into the Quad7 operators' next moves and associated botnets
thumbnail Chinese threat actor Storm-0940 uses credentials from password spray attacks from a covert network
thumbnail Jumpy Pisces Engages in Play Ransomware
thumbnail Pacific Rim: Inside the Counter-Offensive—The TTPs Used to Neutralize China-Based Threats
thumbnail Every Doggo Has Its Day: Unleashing the Xiū Gǒu Phishing Kit
thumbnail Update your iPhone, Mac, Watch: Apple issues patches for several vulnerabilities | Malwarebytes
thumbnail Amazon identified internet domains abused by APT29
thumbnail Midnight Blizzard conducts large-scale spear-phishing campaign using RDP files
thumbnail ClickFix tactic: The Phantom Meet
thumbnail Attacker Abuses Victim Resources to Reap Rewards from Titan Network
thumbnail Elon Musk-Funded PAC Supercharges ‘Progress 2028’ Democrat Impersonation Ad Campaign
thumbnail ReliaQuest Uncovers New Black Basta Social Engineering Technique - ReliaQuest
thumbnail US names and charges Maxim Rudometov with developing the Redline infostealer
thumbnail LightSpy: Implant for iOS
thumbnail 31 new ransomware groups were discovered in 2024
thumbnail Update on Windows Downdate
thumbnail Cyberattaque: la panne de Onelog persiste (update)
thumbnail Hacker Returns $19.3 Million to Drained US Government Crypto Wallet
thumbnail Self-contained HTML phishing attachment using Telegram to exfiltrate stolen credentials - SANS Internet Storm Center
thumbnail Cisco fixes bug under exploit in brute-force attacks
thumbnail Researchers say AI transcription tool used in hospitals invents things no one ever said | AP News
thumbnail POLITICO Europe
thumbnail Fog ransomware targets SonicWall VPNs to breach corporate networks
thumbnail New Windows Driver Signature bypass allows kernel rootkit installs
thumbnail How Israel’s bulky pager fooled Hezbollah
thumbnail Akira ransomware continues to evolve
thumbnail Rubavano informazioni da banche dati strategiche e nazionali: sei indagati. Spiati anche alcuni politici
thumbnail Fake IT Workers: How HYPR Stopped a Fraudulent Hire
thumbnail Embargo ransomware: Rock’n’Rust
thumbnail Triad Nexus: Silent Push exposes FUNNULL CDN hosting DGA domains for suspect Chinese gambling sites, investment scams, a retail phishing campaign, and a polyfill.io supply chain attack impacting 110,000+ sites
thumbnail Apple Shares Private Cloud Compute Virtual Research Environment, Provides Bounties for Vulnerabilities - MacRumors
thumbnail Encrypted Chat App ‘Session’ Leaves Australia After Visit From Police
thumbnail macOS NotLockBit | Evolving Ransomware Samples Suggest a Threat Actor Sharpening Its Tools
thumbnail Fortinet FortiManager CVE-2024-47575 Exploited in Zero-Day Attacks
thumbnail Ransomware Gangs Use LockBit's Fame to Intimidate Victims in Latest Attacks
thumbnail ShadyShader: Crashing Apple Devices with a Single Click
thumbnail Rogue RDP – Revisiting Initial Access Methods
thumbnail How Low Can You Go? An Analysis of 2023 Time-to-Exploit Trends
thumbnail ESET themed wiper Targets Israel
thumbnail Decrypted: Mallox ransomware
thumbnail Researchers link Polyfill supply chain attack to huge network of copycat gambling sites
thumbnail Fortinet releases patches for undisclosed critical FortiManager vulnerability - Help Net Security
thumbnail Hackers exploit Roundcube webmail flaw to steal email, credentials
thumbnail Invisible text that AI chatbots understand and humans can’t? Yep, it’s a thing. - Ars Technica
thumbnail Lynx Ransomware: A Rebranding of INC Ransomware
thumbnail Burning Zero Days: Suspected Nation-State Adversary Targets Ivanti CSA
thumbnail FASTCash for Linux
thumbnail Spate of ransomware attacks on German-speaking schools hits another in Switzerland
thumbnail The War on Passwords Is One Step Closer to Being Over
thumbnail THREAT ANALYSIS: Beast Ransomware
thumbnail Tricks and Treats: GHOSTPULSE’s new pixel-level deception
thumbnail Internet Archive breached again through stolen access tokens
thumbnail Des espions chinois découverts en Suisse sur un malentendu
thumbnail Microsoft creates fake Azure tenants to pull phishers into honeypots
thumbnail HijackLoader evolution: abusing genuine signing certificates
thumbnail Amazon helps the US Department of Justice thwart international cybercriminal group Anonymous Sudan
thumbnail Swiss identified in Austrian bomb threat investigation
thumbnail USDoD hacker behind National Public Data breach arrested in Brazil
thumbnail Fake recruiter coding tests target devs with malicious Python packages
thumbnail Jetpack fixes critical information disclosure flaw existing since 2016
thumbnail British intelligence services to protect all UK schools from ransomware attacks
thumbnail Fortinet FortiGate CVE-2024-23113 - A Super Complex Vulnerability In A Super Secure Appliance In 2024
thumbnail Gamers Tricked Into Downloading Lua-Based Malware via Fake Cheating Script Engines
thumbnail Neo-Nazis head to encrypted SimpleX Chat app, bail on Telegram
thumbnail CTV industry’s unprecedented “surveillance”
thumbnail Ukrainian pleads guilty to operating Raccoon Stealer malware
thumbnail Dutch police arrest admin of 'Bohemia/Cannabia' dark web market
thumbnail MoneyGram says hackers stole customers' personal information and transaction data | TechCrunch
thumbnail 1 bug, $50,000+ in bounties, how Zendesk intentionally left a backdoor in hundreds of Fortune 500 companies
thumbnail Telekopye transitions to targeting tourists via hotel booking scam
thumbnail Pokemon developer Game Freak hit with hack, internal info leaking
thumbnail UK Ambulance Services targeted by Kremlin-protected Russian hackers
thumbnail Hackers Advertise Stolen Verizon Push-to-Talk ‘Call Logs’
thumbnail A Mysterious Hacking Group Has 2 New Tools to Steal Data From Air-Gapped Machines | WIRED
thumbnail Microsoft deprecates PPTP and L2TP VPN protocols in Windows Server
thumbnail Hacked Robot Vacuums Across the U.S. Started Yelling Slurs
thumbnail U.S., Microsoft seize over 100 websites allegedly used by Russian spies
thumbnail Internet Archive hacked, data breach impacts 31 million users
thumbnail File hosting services misused for identity phishing
thumbnail AI girlfriend site breached, user fantasies stolen
thumbnail Hackers targeted Android users by exploiting zero-day bug in Qualcomm chips
thumbnail From Perfctl to InfoStealer
thumbnail Zero Day Initiative — The October 2024 Security Update Review
thumbnail Ivanti warns of three more CSA zero-days exploited in attacks
thumbnail Ukraine Claims Cyberattack Blocked Russian State TV Online on Putin’s Birthday
thumbnail The 30-year-old internet backdoor law that came back to bite
thumbnail Mamba 2FA: A new contender in the AiTM phishing ecosystem - Sekoia.io Blog
thumbnail New Gorilla Botnet Launches Over 300,000 DDoS Attacks Across 100 Countries
thumbnail Alert: Over 700,000 DrayTek Routers Exposed to Hacking via 14 New Vulnerabilities
thumbnail perfctl: A Stealthy Malware Targeting Millions of Linux Servers
thumbnail Arrests in international operation targeting cybercriminals in West Africa
thumbnail DOJ, Microsoft seize more than 100 domains used by the FSB
thumbnail Further Evil Corp cyber criminals exposed, one unmasked as LockBit affiliate - National Crime Agency
thumbnail How the FBI and Mandiant caught a 'serial hacker' who tried to fake his own death
thumbnail Apple fixes password-blurting VoiceOver bug
thumbnail Cyble Honeypot Sensors Detect WordPress Plugin Attack, New Banking Trojan
thumbnail Rackspace systems hit by zero-day exploit of third-party app • The Register
thumbnail Patch for Critical CUPS vulnerability: Don't Panic - SANS Internet Storm Center
thumbnail Recently patched CUPS flaw can be used to amplify DDoS attacks
thumbnail Dutch Police: ‘State actor’ likely behind recent data breach
thumbnail A Measure of Motive: How Attackers Weaponize Digital Analytics Tools | Google Cloud Blog
thumbnail Over 300,000! GorillaBot: The New King of DDoS Attacks
thumbnail US senator targeted by deepfake caller posing as Ukrainian diplomat | US politics | The Guardian
thumbnail Multiple Vulnerabilities Discovered in PHP, Prompting Urgent Security Updates
thumbnail Event Log Talks a Lot: Identifying Human-operated Ransomware through Windows Event Logs - JPCERT/CC Eyes
thumbnail Agence France-Presse says cyberattack targeted IT systems
thumbnail Crucial Texas hospital system turning ambulances away after ransomware attack
thumbnail LockBit power cut: four new arrests and financial sanctions against affiliates | Europol
thumbnail Critical flaw in NVIDIA Container Toolkit allows full host takeover
thumbnail Storm-0501: Ransomware attacks expanding to hybrid cloud environments
thumbnail CVE-2024-8353 (CVSS 10): Critical GiveWP Flaw, 100k WordPress Sites at Risk
thumbnail Nitrogen Campaign Drops Sliver and Ends With BlackCat Ransomware
thumbnail Banks: Zurich asset manager hit by massive hacker attack
thumbnail Wiz Research Finds Critical NVIDIA AI Vulnerability Affecting Containers Using NVIDIA GPUs, Including Over 35% of Cloud Environments | Wiz Blog
thumbnail Hacker behind Snowflake customer data breaches remains active
thumbnail Hacking Kia: Remotely Controlling Cars With Just a License Plate
thumbnail Meta fined $102 million for storing passwords in plain text
thumbnail 10 security bugs put fuel storage tanks at risk of attacks
thumbnail NIST proposes barring some of the most nonsensical password rules
thumbnail China-linked APT group Salt Typhoon compromised some US ISPs
thumbnail Simple Mail Transfer Pirates: How threat actors are abusing third-party infrastructure to send spam
thumbnail Rhadamanthys Stealer v0.7.0: A Rising Threat in the Cybercrime Ecosystem
thumbnail Attacking UNIX Systems via CUPS, Part I
thumbnail Hacker plants false memories in ChatGPT to steal user data in perpetuity
thumbnail Dozens of Fortune 100 companies have unwittingly hired North Korean IT workers, according to report
thumbnail Behind the CAPTCHA: A Clever Gateway of Malware
thumbnail Informatique: l’Etat de Vaud victime d’attaques «très virulentes»
thumbnail Critical Ivanti vTM auth bypass bug now exploited in attacks
thumbnail Kryptina RaaS | From Unsellable Cast-Off to Enterprise Ransomware
thumbnail US intelligence agencies confirm Russia is pushing fake videos of Kamala Harris
thumbnail Staying a Step Ahead: Mitigating the DPRK IT Worker Threat
thumbnail Telegram Changes Policy, Says It Will Provide User Data to Authorities
thumbnail Rental Car Vendor's Security Flaw Exposed Damage Claims Reports
thumbnail China urges netizens to be vigilant against Taiwanese cyberattacks
thumbnail Microsoft ends development of Windows Server Update Services (WSUS)
thumbnail Insecure software makers are the real cyber villains – CISA
thumbnail Global infostealer malware operation targets crypto users, gamers
thumbnail Criminal phishing network resulting in over 480 000 victims worldwide busted in Spain and Latin America | Europol
thumbnail GitLab Critical Patch Release: 17.3.3, 17.2.7, 17.1.8, 17.0.8, 16.11.10
thumbnail Enterprise ServiceNow Knowledge Bases at Risk
thumbnail Thousands of orgs at risk of ServiceNow KB data leaks
thumbnail New Criminal Complaint Over Pegasus Spyware Hacking of journalists and activists in the UK  
thumbnail Is Tor still safe to use?
thumbnail New macOS malware HZ RAT lets attackers control Macs remotely
thumbnail Clever 'GitHub Scanner' campaign abusing repos to push malware
thumbnail WebDAV-as-a-Service: Uncovering the infrastructure behind Emmenhtal loader distribution
thumbnail Australian police infiltrate encrypted messaging app Ghost and arrest dozens
thumbnail Europol takes down "Ghost" encrypted messaging platform used for crime
thumbnail Police Hack Into ‘Ghost’, An Encrypted Platform for Criminals
thumbnail Mastercard invests in continued defense of global digital economy with acquisition of Recorded Future
thumbnail Port of Seattle refuses to pay Rhysida ransom, warns of data leak
thumbnail How Lazarus Group laundered $200M from 25+ crypto hacks to fiat …
thumbnail An Offer You Can Refuse: UNC2970 Backdoor Deployment Using Trojanized PDF Reader
thumbnail Qilin ransomware attack on Synnovis impacted over 900K patients
thumbnail Microsoft working on OS update to prevent another IT outage
thumbnail Hadooken Malware Targets Weblogic Applications
thumbnail Apple is well on its way to making iPhones theft-proof
thumbnail SolarWinds fixed critical RCE CVE-2024-28991 in Access Rights Manager
thumbnail Multiple attacks forces CISA to order agencies to upgrade or remove end-of-life Ivanti appliance
thumbnail German radio station forced to broadcast 'emergency tape' following cyberattack
thumbnail 23andMe Agrees To $30 Million Settlement For Last Year's Data Breach
thumbnail Scammers advertise fake AppleCare+ service via GitHub repos
thumbnail UK arrests teen linked to Transport for London cyber attack
thumbnail Distributed Denial of Truth (DDoT): The Mechanics of Influence Operations and The Weaponization of Social Media
thumbnail Ils réclament 3 millions à la Banque cantonale de Zurich: 4 jeunes arrêtés
thumbnail Chinese APT Abuses VSCode to Target Government in Asia
thumbnail In Wake of Durov Arrest, Some Cybercriminals Ditch Telegram
thumbnail RansomHub claims Kawasaki cyberattack, threatens to leak stolen data
thumbnail Data centres as vital as NHS and power grid, government says
thumbnail CVE-2024-29847 Deep Dive: Ivanti Endpoint Manager AgentPortal Deserialization of Untrusted Data Remote Code Execution Vulnerability – Horizon3.ai
thumbnail TfL confirms 5,000 customers' bank data exposed
thumbnail Hold – Verify – Execute: Rise of Malicious POCs Targeting Security Researchers
thumbnail Transport for London confirms customer data stolen in cyberattack
thumbnail Fortinet suffers third-party data breach affecting Asia-Pacific customers - Cyber Daily
thumbnail Europe’s privacy watchdog probes Google over data used for AI training
thumbnail Telegram: 'The dark web in your pocket'
thumbnail Enquête ESET : le cybergang CosmicBeetle cible des entreprises françaises et devient affilié de RansomHub | UnderNews
thumbnail We Spent $20 To Achieve RCE And Accidentally Became The Admins Of .MOBI
thumbnail A glimpse into the Quad7 operators' next moves and associated botnets
thumbnail Tracking Ransomware - August 2024 - CYFIRMA
thumbnail Arctic Wolf Observes Akira Ransomware Campaign Targeting SonicWall SSLVPN Accounts
thumbnail Critical SonicWall SSLVPN bug exploited in ransomware attacks
thumbnail Veeam Backup & Response - RCE With Auth, But Mostly Without Auth (CVE-2024-40711)
thumbnail Sextortion scams now use your "cheating" spouse’s name as a lure
thumbnail New Android SpyAgent Campaign Steals Crypto Credentials via Image Recognition
thumbnail Une faille dans le HDMI permet de voler des mots de passe et des informations sensibles
thumbnail Progress LoadMaster vulnerable to 10/10 severity RCE flaw
thumbnail Free Russia Foundation to investigate data breach after internal documents published online — Novaya Gazeta Europe
thumbnail Swiss found to be gullible regarding fake news
thumbnail Predator Spyware Infrastructure Resurfaces Post-Sanctions – What You Need to Know
thumbnail D-Link says it is not fixing four RCE flaws in DIR-846W routers
thumbnail U.S. charges five Russian military members for destructive cyber ops, hack-and-leak campaigns | CyberScoop
thumbnail Fake OnlyFans Checker Tool Infects Hackers with Lummac Stealer Malware
thumbnail Obfuscated PowerShell leads to Lumma C2 Stealer
thumbnail Online AI Mental Health and Addiction Treatment Provider Exposed Patient Data
thumbnail Quarante pourcents de la population se tourne vers l'IA
thumbnail U.S. Seizes 32 Pro-Russian Propaganda Domains in Major Disinformation Crackdown
thumbnail Lowe's employees phished via Google ads | Malwarebytes
thumbnail Unpacking the unpleasant FIN7 gift: PackXOR
thumbnail Veeam warns of critical RCE flaw in Backup & Replication software
thumbnail Researchers Unpacked AvNeutralizer EDR Killer Used By FIN7 Group
thumbnail Critical Account Takeover in LiteSpeed Cache Plugin
thumbnail YubiKeys are vulnerable to cloning attacks thanks to newly discovered side channel
thumbnail Cisco warns of backdoor admin account in Smart Licensing Utility
thumbnail Police Ombudsman sorry for ‘distressing’ data leak as investigation is launched
thumbnail Making progress on routing security: the new White House roadmap
thumbnail RPKI ROV Deployment Reaches Major Milestone
thumbnail Dutch regulator slaps Clearview AI with $33 million fine, threatens executive liability - The Verge
thumbnail Transport for London faces 'ongoing cyber security incident'
thumbnail Government Emails at Risk: Critical Cross-Site Scripting Vulnerability in Roundcube Webmail
thumbnail North Korean threat actor Citrine Sleet exploiting Chromium zero-day
thumbnail Admins of MFA bypass service plead guilty to fraud
thumbnail Cryptojacking via CVE-2023-22527: Dissecting a Full-Scale Cryptomining Ecosystem
thumbnail The Malware That Must Not Be Named: Suspected Espionage Campaign Delivers “Voldemort”
thumbnail Après un ransomware, l'université Paris-Saclay lance un site provisoire
thumbnail Spoofed GlobalProtect Used to Deliver Unique WikiLoader Variant
thumbnail Fake Google Authenticator Website Installs Malware
thumbnail Cicada 3301 - Ransomware-as-a-Service - Technical Analysis
thumbnail Docker-OSX image used for security research hit by Apple DMCA takedown
thumbnail Germany's Sovereign Tech Fund Puts Over $750K Into FreeBSD Infrastructure Projects
thumbnail Fake Palo Alto GlobalProtect used as lure to backdoor enterprises
thumbnail Dutch cabinet bans phones in meetings over espionage fears
thumbnail Scam Sites at Scale: LLMs Fueling a GenAI Criminal Revolution
thumbnail State-backed attackers and commercial surveillance vendors repeatedly use the same exploits
thumbnail HZ Rat backdoor for macOS harvests data from WeChat and DingTalk
thumbnail Telegram CEO’s brother also wanted by French authorities
thumbnail Unprecedented 3.15 Billion Packet Rate DDoS Attack Mitigated by Global Secure Layer
thumbnail Threat Actors Retaliate After Durov’s Arrest
thumbnail Après l’arrestation de Pavel Durov, une vague de cyberattaques cible la France
thumbnail Paris court explains why it's arrested Telegram founder, Pavel Durov
thumbnail Malicious Plugin
thumbnail WordPress Websites Used to Distribute ClearFake Trojan Malware
thumbnail Is Telegram really an encrypted messaging app? – A Few Thoughts on Cryptographic Engineering
thumbnail Telegram says CEO has ‘nothing to hide’ after being arrested in France
thumbnail The gift that keeps on giving: A new opportunistic Log4j campaign
thumbnail BlackSuit Ransomware
thumbnail OpenSSH Backdoors
thumbnail Unveiling sedexp: A Stealthy Linux Malware Exploiting udev Rules
thumbnail Cyberattaque contre Swisscom:  L'attaque DDos repoussée
thumbnail Xeon Sender | SMS Spam Shipping Multi-Tool Targeting SaaS Credentials
thumbnail TodoSwift Disguises Malware Download Behind Bitcoin PDF
thumbnail Cthulhu Stealer malware aimed to take macOS user data
thumbnail From the Depths: Analyzing the Cthulhu Stealer Malware for macOS
thumbnail FIN7: The Truth Doesn't Need to be so STARK
thumbnail Unmasking Styx Stealer: How a Hacker's Slip Led to an Intelligence Treasure Trove - Check Point Research
thumbnail Qilin ransomware caught stealing credentials stored in Google Chrome
thumbnail Touché par un ransomware, Schlatter Industries a relancé ses systèmes (update) | ICTjournal
thumbnail NGate Android malware relays NFC traffic to steal cash
thumbnail No one’s ready for this
thumbnail Windows 0-day was exploited by North Korea to install advanced rootkit
thumbnail Litespeed Cache bug exposes millions of WordPress sites to takeover attacks
thumbnail Iran Reportedly Grapples With Major Cyberattack on Banking Systems
thumbnail Widespread Cloud Exposure: Extortion Campaign Used Exposed AWS ENV Files To Target 110,000 Domains
thumbnail Chipmaker Microchip reveals cyber attack
thumbnail MITRE Marks Major Milestone, Minting 400 CNAs as NVD Backlog Grows - Socket
thumbnail The Abuse of ITarian RMM by Dolphin Loader
thumbnail Toyota confirms breach after stolen data leaks on hacking forum
thumbnail Routers from China-based TP-Link a national security threat, US lawmakers claim
thumbnail How multiple vulnerabilities in Microsoft apps for macOS pave the way to stealing permissions
thumbnail Windows driver zero-day exploited by Lazarus hackers to install rootkit
thumbnail stardom dreams, stalking devices and the secret conglomerate selling both
thumbnail Beyond the wail: deconstructing the BANSHEE infostealer
thumbnail DDoS attack volume rises, peak power reaches 1.7 Tbps
thumbnail Geopolitical Tensions Drive Explosion in DDoS Attacks
thumbnail SolarWinds fixes critical RCE bug affecting all Web Help Desk versions
thumbnail Zabbix Server Vulnerability Lets Attacker Execute Arbitrary Code
thumbnail Ransomware attackers introduce new EDR killer to their arsenal
thumbnail Leaked Environment Variables Allow Large-Scale Extortion Operation of Cloud Environments
thumbnail Doppelgänger operation rushes to secure itself amid ongoing detections, German agency says
thumbnail White House working on cyber insurance policy proposal for ‘catastrophic’ incidents
thumbnail Gafgyt Malware Variant Exploits GPU Power and Cloud Native Environments
thumbnail The Hidden Treasures of Crash Reports
thumbnail Troy Hunt: Inside the "3 Billion People" National Public Data Breach
thumbnail A Single Iranian Hacker Group Targeted Both Presidential Campaigns
thumbnail Want to Win a Bike Race? Hack Your Rival’s Wireless Shifters | WIRED
thumbnail Inside the FBI's Dashboard for Wiretapping the World
thumbnail Le transfert de données Suisse-USA à nouveau facilité
thumbnail Extension Trojan Malware Campaign
thumbnail Russia-linked phishing campaigns ensnare civil society and NGOs
thumbnail Critical SAP flaw allows remote attackers to bypass authentication
thumbnail CVE-2024-39825 and CVE-2024-39818: High-Risk Zoom Flaws Require Urgent Updates
thumbnail CVE-2024-23897 Enabled Ransomware Attack on Indian Banks
thumbnail Exploitable PoC Released for CVE-2024-38077: 0-Click RCE Threatens All Windows Servers
thumbnail Suspected head of prolific cybercrime groups arrested and extradited - National Crime Agency
thumbnail Compromising Microsoft's AI Healthcare Chatbot Service
thumbnail Don’t get Mad, get wise
thumbnail Exploiting pfsense Remote Code Execution – CVE-2022-31814
thumbnail NIST's Post-Quantum Cryptography Standards Are Here - IEEE Spectrum
thumbnail 60 Hurts per Second – How We Got Access to Enough Solar Power to Run the United States
thumbnail Technical Exploits of HID's iClass SE Discovered, To Be Revealed at DEF CON 32
thumbnail Feds seize Radar/Dispossessor ransomware gang servers in US and Europe
thumbnail CrowdStrike Exec Shows Up to Accept 'Most Epic Fail' Award in Person
thumbnail Les cybercriminels ont copié dieci.ch à l'identique
thumbnail Ongoing Social Engineering Campaign Refreshes Payloads
thumbnail Chained for attack: OpenVPN vulnerabilities discovered leading to RCE and LPE | Microsoft Security Blog
thumbnail Security bugs in ransomware leak sites helped save six companies from paying hefty ransoms
thumbnail A Dive into Earth Baku’s Latest Campaign
thumbnail Hackers leak 2.7 billion data records with Social Security numbers
thumbnail Iran Targeting 2024 US Election
thumbnail Threat Actors’ Toolkit: Leveraging Sliver, PoshC2 & Batch Scripts
thumbnail How a cybersecurity researcher befriended, then doxed, the leader of LockBit
thumbnail AMD won't patch all chips affected by severe data theft vulnerability — Ryzen 3000, 2000, and 1000 will not get patched for 'Sinkclose' | Tom's Hardware
thumbnail Hackers Steal Trump’s JD Vance ‘Dirty Laundry’ Dossier As 2016 Strikes Again
thumbnail New AMD SinkClose flaw helps install nearly undetectable malware
thumbnail ‘Sinkclose’ Flaw in Hundreds of Millions of AMD Chips Allows Deep, Virtually Unfixable Infections
thumbnail From Limited file read to full access on Jenkins (CVE-2024-23897)
thumbnail How Hackers Extracted the ‘Keys to the Kingdom’ to Clone HID Keycards
thumbnail ICANN approves use of .internal domain for your network
thumbnail USPS Text Scammers Duped His Wife, So He Hacked Their Operation | WIRED
thumbnail Treasury Sanctions Leader and Primary Member of the Cyber Army of Russia Reborn | U.S. Department of the Treasury
thumbnail Google Drawings and WhatsApp Zero-hour Open Redirection Phish exposed - Blog | Menlo Security
thumbnail WhatsUp Gold Pre-Auth RCE GetFileWithoutZip Primitive
thumbnail Open letter to UK online service providers
thumbnail INTERPOL recovers over $40 million stolen in a BEC attack
thumbnail Major Payment Disruption: Ransomware Strikes Indian Banking Infrastructure
thumbnail Critical Vulnerability in Apache OFBiz Requires Immediate Patching - Infosecurity Magazine
thumbnail CrowdStrike says it isn't to blame for Delta's flight cancellations after July outage
thumbnail Hackers breached MDM firm Mobile Guardian and wiped thousands of devices
thumbnail Cybersécurité : le Grand Palais et plusieurs musées dont le Louvre victimes d’une attaque par rançongiciel
thumbnail Threat Actors Capitalize On ServiceNow Vulnerability
thumbnail Ransomware gang targets IT workers with new SharpRhino malware
thumbnail Google fixes Android kernel zero-day exploited in targeted attacks
thumbnail European Commission forces TikTok rewards program to shut down on the continent
thumbnail China-Linked Hackers Compromise ISP to Deploy Malicious Software Updates
thumbnail Surge in Magniber ransomware attacks impact home users worldwide
thumbnail Russia-linked operations target Paris 2024 Olympics
thumbnail Cybercriminals Abusing Cloudflare Tunnels to Evade Detection and Spread Malware
thumbnail Quartet of Trouble: XWorm, AsyncRAT, VenomRAT, and…
thumbnail Black Basta ransomware switches to more evasive custom malware
thumbnail UNC4393 Goes Gently into the SILENTNIGHT
thumbnail Cyber Espionage Group XDSpy Targets Companies in Russia and Moldova
thumbnail How the theft of 40M UK voter register records was entirely preventable
thumbnail Social Media Malvertising Campaign Promotes Fake AI Editor Website for Credential Theft
thumbnail Mozilla follows Google in distrusting Entrust’s TLS certs • The Register
thumbnail Turkey blocks access to Instagram – POLITICO
thumbnail Who are the two major hackers Russia just received in a prisoner swap?
thumbnail Nouvelles vagues de vandalisme sur les fibres optiques : Internet perturbé en France - Next
thumbnail Swiss stock exchange halts trading due to technolgy issues
thumbnail 'Error' in Microsoft's DDoS defenses amplified Azure outage
thumbnail IBM: Cost of a breach reaches nearly $5 million, with healthcare being hit the hardest
thumbnail Cyberattack hits blood-donation nonprofit OneBlood
thumbnail Microsoft says massive Azure outage was caused by DDoS attack
thumbnail Google ads push fake Google Authenticator site installing malware
thumbnail La Bourse suisse interrompt ses transactions pendant plusieurs heures
thumbnail New Mandrake Android spyware version discovered on Google Play | Securelist
thumbnail French fiber optic cables hit by ‘major sabotage’ in second Olympics attack
thumbnail Hackers Exploited a PC Driving Sim to Pull Off Massive Disney Data Breach
thumbnail Ferrari exec foils deepfake plot by asking a question only the CEO could answer
thumbnail Websites are Blocking the Wrong AI Scrapers (Because AI Companies Keep Making New Ones)
thumbnail CrowdStrike's Impact on Aviation
thumbnail Ransomware operators exploit ESXi hypervisor vulnerability for mass encryption | Microsoft Security Blog
thumbnail TikTok Has a Nazi Problem
thumbnail LummaC2 Malware Abusing the Game Platform 'Steam' - ASEC BLOG
thumbnail Meta nukes massive Instagram sextortion network of 63,000 accounts
thumbnail SwRI evaluates cybersecurity risks associated with EV fast-charging equipment | Southwest Research Institute
thumbnail Mid-year Doppelgänger information operations in Europe and the US
thumbnail Malicious Python Package Targets macOS Developers
thumbnail SeleniumGreed Cryptomining Campaign Exploiting Grid Services | Wiz Blog
thumbnail Windows Security best practices for integrating and managing security tools
thumbnail BreachForums v1 hacking forum data leak exposes members’ info
thumbnail NCA infiltrates world's most prolific DDoS-for-hire service - National Crime Agency
thumbnail NVD Analysis Report
thumbnail Microsoft calls for Windows changes and resilience after CrowdStrike outage
thumbnail BIND updates fix high-severity DoS bugs in the DNS software suite
thumbnail PKfail: Untrusted Platform Keys Undermine Secure Boot on UEFI Ecosystem
thumbnail Secure Boot is completely broken on 200+ models from 5 big device makers | Ars Technica
thumbnail Six-day, 14.7 Million RPS Web DDoS Attack Campaign Attributed to SN_BLACKMETA
thumbnail Stargazers Ghost Network
thumbnail DDoS Attacks in Spain
thumbnail Israel Maneuvered to Prevent Disclosure of State Secrets amid WhatsApp vs NSO Lawsuit - Forbidden Stories
thumbnail Switzerland now requires all government software to be open source
thumbnail Data breach exposes US spyware maker behind Windows, Mac, Android and Chromebook malware
thumbnail TuDoor
thumbnail Intelligence Brief: Impact of FrostyGoop Modbus Malware on Connected OT Systems
thumbnail Lviv neighbourhood left without heating, hot water by hacker attack
thumbnail Ransomware ecosystem fragmenting under law enforcement pressure and distrust
thumbnail CrowdStrike blames a test software bug for Windows wipeout
thumbnail Threat Actor Uses Fake Recovery Manual to Deliver Unidentified Stealer
thumbnail Ils soutirent 346'000 francs grâce à une arnaque WhatsApp
thumbnail Exploiting CVE-2024-21412: A Stealer Campaign Unleashed
thumbnail Solving the 7777 Botnet enigma: A cybersecurity quest
thumbnail Telegram zero-day allowed sending malicious Android APKs as videos
thumbnail Spanish police arrest three suspects linked to pro-Moscow NoName057(16) hackers
thumbnail NCA infiltrates DDoS-for-hire site as suspected controller arrested in Northern Ireland
thumbnail Arctic Wolf Labs has observed Fog ransomware being deployed against US organizations in the education and recreation sectors.
thumbnail Doppelganger – How Russia uses EU companies for propaganda
thumbnail New Play Ransomware Linux Variant Targets ESXi Shows Ties With Prolific Puma | Trend Micro (US)
thumbnail dirDevil: Hiding Code and Content Within Folder…
thumbnail Spanish Police Arrests NoName Hackers
thumbnail Technical Details: Falcon Update for Windows Hosts
thumbnail Trump shooter used Android phone from Samsung; cracked by Cellebrite in 40 minutes - 9to5Mac
thumbnail Our Statement on Today's Outage
thumbnail Teenage suspect in MGM Resorts hack arrested in Britain
thumbnail Leaked Docs Show What Phones Cellebrite Can (and Can’t) Unlock
thumbnail Special Report: Massive Global IT Outages Triggered by Faulty CrowdStrike Update
thumbnail APT41 Has Arisen From the DUST
thumbnail Banks, airlines, brokerage houses report widespread outages across the globe
thumbnail New hacker group uses open-source tools to spy on entities in Asia-Pacific region
thumbnail Critical Cisco bug lets hackers add root users on SEG devices
thumbnail Trello Data Breach: Hacker Dumps Personal Info of Millions of Users
thumbnail INTERPOL operation strikes major blow against West African financial crime
thumbnail NullBulge | Threat Actor Masquerades as Hacktivist Group Rebelling Against AI
thumbnail Fake AWS Packages Ship Command and Control Malware In JPEG Files
thumbnail FIN7 Reboot | Cybercrime Gang Enhances Ops with New EDR Bypasses and Automated Attacks
thumbnail MediSecure reveals about 12.9 million Australians had personal data stolen by hackers in April | Australia news | The Guardian
thumbnail Germany to ban Chinese companies' components from core parts of its 5G networks | AP News
thumbnail Iraq-based cybercriminals deploy malicious Python packages to steal data
thumbnail ClickFix Deception: A Social Engineering Tactic to Deploy Malware
thumbnail FBI Gains Access to Suspected Trump Shooter’s Password Locked Phone
thumbnail Uncoordinated Vulnerability Disclosure: The Continuing Issues with CVD
thumbnail Kaspersky Lab Closing U.S. Division; Laying Off Workers
thumbnail AT&T Paid a Hacker $370,000 to Delete Stolen Phone Record
thumbnail Critical Exim bug bypasses security filters on 1.5 million mail servers
thumbnail Doppelganger operation
thumbnail NATO members commit to creating new cyber center in Belgium
thumbnail Kematian-Stealer : A Deep Dive into a New Information Stealer
thumbnail Persistent npm Campaign Shipping Trojanized jQuery
thumbnail Distribution of AsyncRAT Disguised as Ebook
thumbnail Apple warns iPhone users in 98 countries of spyware attacks
thumbnail CloudSorcerer APT uses cloud services and GitHub as C2 | Securelist
thumbnail Behind the Attack: Live Chat Phishing
thumbnail How do cryptocurrency drainer phishing scams work?
thumbnail Resurrecting Internet Explorer: Threat Actors Using Zero-day Tricks in Internet Shortcut File to Lure Victims (CVE-2024-38112)
thumbnail Chinese APT40 hackers hijack SOHO routers to launch attacks
thumbnail New Blast-RADIUS attack breaks 30-year-old protocol used in networks everywhere
thumbnail CVE-2024-38021: Moniker RCE Vulnerability Uncovered in Microsoft Outlook
thumbnail New OpenSSH Vulnerability Discovered: Potential Remote Code Execution Risk
thumbnail US Disrupts Russian Bots Spreading Propaganda on Twitter
thumbnail Hackers target WordPress calendar plugin used by 150,000 sites
thumbnail EDR as an Offensive Tool
thumbnail ‘Serious hacker attack’ forces Frankfurt university to shut down IT systems
thumbnail Decrypted: DoNex Ransomware and its Predecessors
thumbnail South African pathology labs down after ransomware attack
thumbnail New Intel CPU Vulnerability 'Indirector' Exposes Sensitive Data
thumbnail Russia forces Apple to remove VPN apps from the App Store
thumbnail Supply Chain Compromise Leads to Trojanized Installers | Rapid7 Blog
thumbnail Indian Software Firm's Products Hacked to Spread Data-Stealing Malware
thumbnail Formula 1 governing body discloses data breach after email hacks
thumbnail 'Welcome to Londonistan': the Great Replacement theory gone visual ahead of the U.K. election
thumbnail Il silenzio di Synlab sul furto e la diffusione di migliaia di dati sanitari - Il Post
thumbnail How scam networks use fake celebrity ads to lure online investors
thumbnail The Rise of Packet Rate Attacks: When Core Routers Turn Evil
thumbnail RoguePuppet – A Critical Puppet Forge Supply Chain Vulnerability
thumbnail Europol coordinates global action against criminal abuse of Cobalt Strike
thumbnail blog.ethereum.org mailing list incident
thumbnail Sonar
thumbnail OpenAI’s ChatGPT Mac app was storing conversations in plain text
thumbnail Twilio says hackers identified cell phone numbers of two-factor app Authy users
thumbnail Europol coordinates global action against criminal abuse of Cobalt Strike | Europol
thumbnail Arnaque aux codes QR sur les horodateurs de la Ville de Nyon
thumbnail CVE-2024-29510 - Exploiting Ghostscript using format strings
thumbnail 3 million iOS and macOS apps were exposed to potent supply-chain attacks
thumbnail Figma Disables AI App Design Tool After It Copied Apple’s Weather App
thumbnail Poland to probe Russia-linked cyberattack on state news agency
thumbnail Cisco NX-OS Command Injection Vulnerability CVE-2024-20399: Insights and Defense Strategies
thumbnail Vulnerabilities in CocoaPods Open the Door to Supply Chain Attacks Against Thousands of iOS and MacOS Applications
thumbnail TeamViewer: Hackers copied employee directory data and encrypted passwords
thumbnail Halcyon Identifies New Ransomware Operator Volcano Demon Serving Up LukaLocker
thumbnail Analysis of the Phishing Campaign: Behind the Incident
thumbnail Startups scramble to assess fallout from Evolve Bank data breach
thumbnail Cisco warns of NX-OS zero-day exploited to deploy custom malware
thumbnail Polyfill, Cloudflare trade barbs after reports of supply chain attack threatening 100k websites
thumbnail regreSSHion: Remote Unauthenticated Code Execution Vulnerability in OpenSSH server
thumbnail Meet Brain Cipher — The new ransomware behind Indonesia's data center attack
thumbnail New SnailLoad Attack Exploits Network Latency to Spy on Users' Web Activities
thumbnail New Medusa malware variants target Android users in seven countries
thumbnail Polyfill claims it has been 'defamed', returns after domain shut down
thumbnail ID Verification Service for TikTok, Uber, X Exposed Driver Licenses
thumbnail LockBit lied: Stolen data is from a bank, not US Federal Reserve
thumbnail Hubspot says it's investigating customer account hacks | TechCrunch
thumbnail Critical GitLab bug lets attackers run pipelines as any user
thumbnail South Korean telecom company attacks torrent users with malware — over 600,000 customers report missing files, strange folders, and disabled PCs
thumbnail Critical SQLi Vulnerability Found in Fortra FileCatalyst Workflow Application
thumbnail From Dormant to Dangerous: P2Pinfect Evolves to Deploy New Ransomware and Cryptominer
thumbnail New P2Pinfect version delivers miners and ransomware on Redis servers
thumbnail Progress Software elevates severity of new MOVEit bug to ‘critical’ as exploit attempts jump
thumbnail Auth. Bypass In (Un)Limited Scenarios - Progress MOVEit Transfer (CVE-2024-5806)
thumbnail US accuses Russian of helping Kremlin hack Ukraine’s state computer systems
thumbnail Chinese Cyberspies Employ Ransomware in Attacks for Diversion
thumbnail ChamelGang & Friends | Cyberespionage Groups Attacking Critical Infrastructure with Ransomware
thumbnail UEFIcanhazbufferoverflow: Widespread Impact from Vulnerability in Popular PC and Server Firmware
thumbnail The inside view of spyware’s 'dirty interference,' from two recent Pegasus victims
thumbnail CDK Begins Restoring Systems Amid Ransomware Payment Reports
thumbnail Neiman Marcus says 64,000 affected by breach of Snowflake customer account
thumbnail South Africa’s national health lab hit with ransomware attack amid mpox outbreak
thumbnail GrimResource - Microsoft Management Console for initial access and evasion
thumbnail Stop Using cdn.polyfill.io Now
thumbnail Iconv, set the charset to RCE: Exploiting the glibc to hack the PHP engine (part 1)
thumbnail CISA confirms hackers may have accessed data from chemical facilities during January incident
thumbnail New attack uses MSC files and Windows XSS flaw to breach networks
thumbnail Probllama: Ollama Remote Code Execution Vulnerability (CVE-2024-37032)
thumbnail Malvertising Campaign Leads to Execution of Oyster Backdoor
thumbnail RansomHub Draws in Affiliates with Multi-OS Capability and High Commission Rates
thumbnail XZ backdoor behavior inside OpenSSH
thumbnail More than 12,000 Santander employees in US affected by Snowflake breach
thumbnail Timeline and Details of the Change Healthcare Breach
thumbnail Facebook PrestaShop module exploited to steal credit cards
thumbnail Rafel RAT, Android Malware from Espionage to Ransomware Operations
thumbnail Mailcow Mail Server Flaws Expose Servers to Remote Code Execution
thumbnail UK government weighs action against Russian hackers over NHS records theft
thumbnail Threat Actor Claims AMD and Apple Breaches
thumbnail Project Naptime: Evaluating Offensive Security Capabilities of Large Language Models
thumbnail Russian spies' hacking campaign is 'endangering' French diplomatic interests
thumbnail US bans sale of Kaspersky software citing security risk from Russia
thumbnail Attacco Informatico all'ASST Rhodense: Cicada3301 pubblica 1 TB di Dati Sensibili liberamente scaricabili
thumbnail Aggiornamento attacco hacker 2024 - Croce Rossa Italiana
thumbnail Zero-Click Critical Microsoft Outlook Vulnerability. What You Need to Know.
thumbnail La Croix-Rouge italienne touchée par une fuite massive de données, le CICR enquête
thumbnail UK Hospital Hackers Say They’ve Demanded $50 Million in Ransom - Bloomberg
thumbnail SolarMarker Impersonates Job Employment Website, Indeed,…
thumbnail All households in Scottish region to get alert about hackers publishing stolen medical data
thumbnail UNC3944 Targets SaaS Applications
thumbnail Attacco hacker all'Asst Rhodense, due settimane per il ripristino dei sistemi. Disservizi anche in altri ospedali per problemi al data center di Aria | Corriere.it
thumbnail Comment une nébuleuse, "The Comm", a engendré l’un des gangs les plus craints du moment, Scattered Spider
thumbnail Security bug allows anyone to spoof Microsoft employee emails
thumbnail Suspected 'Scattered Spider' hacker, 22, reportedly arrested in Spain
thumbnail New Wi-Fi Takeover Attack—All Windows Users Warned To Update Now
thumbnail Hackers Detail How They Allegedly Stole Ticketmaster Data From Snowflake
thumbnail Microsoft Refused to Fix Flaw Years Before SolarWinds Hack
thumbnail New ARM 'TIKTAG' attack impacts Google Chrome, Linux systems
thumbnail Arm Warns of Actively Exploited Zero-Day Vulnerability in Mali GPU Drivers
thumbnail Black Basta ransomware gang linked to Windows zero-day attacks
thumbnail The mystery of an alleged data broker’s data breach
thumbnail New York Times warns freelancers of GitHub repo data breach
thumbnail Former head of NSA joins OpenAI board
thumbnail Microsoft fixes hack-me-via-Wi-Fi Windows security hole • The Register
thumbnail Breaking: Meta halts AI rollout in Europe after ‘request’ from Irish data protection authorities
thumbnail Major takedown of critical online infrastructure to disrupt terrorist communications and propaganda | Europol
thumbnail Here’s what to know about Adobe’s Terms of Use updates
thumbnail Ukrainian cyber specialists attack Russian airports, several flights delayed - source
thumbnail Evolution of KILLNET from Hacktivism to Private Hackers Company and the Role of Sub-groups
thumbnail Multiple flaws in Fortinet FortiOS fixed
thumbnail Hacker Accesses Internal ‘Tile’ Tool That Provides Location Data to Cops
thumbnail You’ve Got Mail: Critical Microsoft Outlook Vulnerability Executes as Email is Opened
thumbnail CVE-2024-29824 Deep Dive: Ivanti EPM SQL Injection Remote Code Execution Vulnerability – Horizon3.ai
thumbnail IcedID Brings ScreenConnect and CSharp Streamer to ALPHV Ransomware Deployment – The DFIR Report
thumbnail The New York Times source code leaked by a 4chan user
thumbnail Microsoft June 2024 Patch Tuesday fixes 51 flaws, 18 RCEs
thumbnail CVE-2024-4577 RCE in PHP CGI: Everything you need to know | Wiz Blog
thumbnail Bypassing Veeam Authentication CVE-2024-29849
thumbnail Switzerland notes increase in cyberattacks ahead of Ukraine peace summit
thumbnail UNC5537 Targets Snowflake Customer Instances for Data Theft and Extortion
thumbnail Urgent call for O-type blood donations following London hospitals ransomware attack
thumbnail Mandiant says hackers stole a 'significant volume of data' from Snowflake customers
thumbnail Apple’s AI promise: “Your data is never stored or made accessible to Apple”
thumbnail Festung Bürgenstock: Diese Gefahren drohen rund um die Friedenskonferenz
thumbnail La SSR sur ses gardes face à l'éventualité de cyberattaques pendant le sommet du Bürgenstock
thumbnail Malicious VSCode extensions with millions of installs discovered
thumbnail Russia-linked 'Lumma' crypto stealer now targets Python devs
thumbnail Menace Unleashed: Excel File Deploys Cobalt Strike at Ukraine | Fortinet Blog
thumbnail Microsoft hit with EU privacy complaints over schools' use of 365 Education suite
thumbnail Major London hospitals disrupted by Synnovis ransomware attack
thumbnail Keeping GenAI technologies secure is a shared responsibility
thumbnail Howling at the Inbox: Sticky Werewolf's Latest Malicious Aviation Attacks
thumbnail Revealed: Russian legal foundation linked to Kremlin activities in Europe | Russia | The Guardian
thumbnail The Snowflake Attack May Be Turning Into One of the Largest Data Breaches Ever
thumbnail Security Alert: CVE-2024-4577 - PHP CGI Argument Injection Vulnerability
thumbnail No Way, PHP Strikes Again! (CVE-2024-4577)
thumbnail FBI obtained 7,000 LockBit decryption keys, victims should contact feds to get support
thumbnail Operation Crimson Palace: A Technical Deep Dive – Sophos News
thumbnail Europe's cybersecurity chief says disruptive attacks have doubled in 2024, sees Russia behind many
thumbnail Vulnerability in Cisco Webex cloud service exposed government authorities, companies
thumbnail Cyberattack on telecom giant Frontier claimed by RansomHub
thumbnail Ransomware attack hits major London hospitals
thumbnail Analysts join the call for Microsoft to recall Recall
thumbnail Un prestataire externe de la Ville d'Yverdon-les-Bains victime d'une cyberattaque
thumbnail PikaBot: a Guide to its Deep Secrets and Operations - Sekoia.io Blog
thumbnail TikTok fails 'disinformation test' before EU vote, study shows
thumbnail Live Nation confirms Ticketmaster breach after hackers hawk stolen info of 560 million
thumbnail Crooks threaten to leak 2.9B records of personal info
thumbnail Hacking Millions of Modems (and Investigating Who Hacked My Modem)
thumbnail Telegram Combolists and 361M Email Addresses
thumbnail Google Leak Reveals Thousands of Privacy Incidents
thumbnail Molding lies into reality || Exploiting CVE-2024-4358
thumbnail Cyber house of cards – Politicians’ personal details exposed online
thumbnail Ticketmaster confirms massive breach after stolen data for sale online
thumbnail Shalev Hulio Made Pegasus Spyware, Now He’s King of Israeli AI
thumbnail Hackers phish finance orgs using trojanized Minesweeper clone
thumbnail Space secrets security update
thumbnail Ticketmaster confirms data breach with a SEC filing
thumbnail Hacker Releases Jailbroken "Godmode" Version of ChatGPT
thumbnail Zero Day Initiative — CVE-2024-30043: Abusing URL Parsing Confusion to Exploit XXE on SharePoint Server and Cloud
thumbnail Spyware maker pcTattletale says it's 'out of business' and shuts down after data breach | TechCrunch
thumbnail Exiled, then spied on: Civil society in Latvia, Lithuania, and Poland targeted with Pegasus spyware
thumbnail Active exploitation of unauthenticated stored XSS vulnerabilities in WordPress Plugins
thumbnail OpenAI finds Russian, Chinese propaganda campaigns used its tech
thumbnail The Pumpkin Eclipse
thumbnail LilacSquid: The stealthy trilogy of PurpleInk, InkBox and InkLoader
thumbnail Data breach exposes details of 25,000 current and former BBC employees
thumbnail Check Point - Wrong Check Point (CVE-2024-24919)
thumbnail An Anonymous Source Shared Thousands of Leaked Google Search API Documents with Me; Everyone in SEO Should See Them
thumbnail macOS version of elusive 'LightSpy' spyware tool discovered
thumbnail Operators of 911 S5 residential proxy service subjected to US sanctions
thumbnail PoC Exploit Released For macOS Privilege Escalation Vulnerability
thumbnail Troy Hunt: Operation Endgame
thumbnail Largest ever operation against botnets hits dropper malware ecosystem | Europol
thumbnail Cybercriminals pose as "helpful" Stack Overflow users to push malware
thumbnail How Researchers Cracked an 11-Year-Old Password to a $3 Million Crypto Wallet | WIRED
thumbnail TeamCity Major Bug-Fix Release for All Versions: Update Your Server Now | The TeamCity Blog
thumbnail Cache Me If You Can: Local Privilege Escalation in Zscaler Client Connector (CVE-2023-41973)
thumbnail From Origins to Operations: Understanding Black Basta Ransomware
thumbnail CVE-2024-23108: Fortinet FortiSIEM 2nd Order Command Injection Deep-Dive
thumbnail Pegasus in Rwanda: Sister of presidential candidate, high-ranking Rwandan politicians added to spyware list
thumbnail Phishing with Cloudflare Workers: Transparent Phishing and HTML Smuggling
thumbnail Cyber Signals: Inside the growing risk of gift card fraud
thumbnail Pwn2Own Toronto 2022 : A 9-year-old bug in MikroTik RouterOS
thumbnail Exploiting the Cloud: How SMS Scammers are using Amazon, Google and IBM Cloud Services to Steal Customer Data
thumbnail New ShrinkLocker ransomware uses BitLocker to encrypt your files
thumbnail Foxit PDF “Flawed Design” Exploitation
thumbnail Invisible miners: unveiling GHOSTENGINE’s crypto mining operations — Elastic Security Labs
thumbnail Putin hijacked Austria’s spy service. Now he's going after its government
thumbnail How ransomware abuses BitLocker | Securelist
thumbnail Hacker defaces spyware app’s site, dumps database and source code
thumbnail Malicious PyPI packages targeting highly specific MacOS machines
thumbnail How Apple Wi-Fi Positioning System can be abused to track people around the globe
thumbnail A root-server at the Internet’s core lost touch with its peers. We still don’t know why.
thumbnail CVE-2024-4978: Backdoored Justice AV Solutions Viewer Software Used in Apparent Supply Chain Attack | Rapid7 Blog
thumbnail Criminal record database of millions of Americans dumped online
thumbnail CVE-2023-34992: Fortinet FortiSIEM Command Injection Deep-Dive
thumbnail Così le autorità sono arrivate Dmitry Yuryevich Khoroshev, il leader di LockBit
thumbnail 'Got that boomer!': How cybercriminals steal one-time passcodes for SIM swap attacks and raiding bank accounts | TechCrunch
thumbnail QNAPping At The Wheel (CVE-2024-27130 and friends)
thumbnail Exclusive: Flutterwave loses ₦11 billion in security breach
thumbnail Arup revealed as victim of $25 million deepfake scam involving Hong Kong employee | CNN Business
thumbnail Microsoft will require MFA for all Azure users
thumbnail Cybercriminals Exploit Docusign With Customizable Phishing Templates
thumbnail Russian hackers use new Lunar malware to breach a European govt's agencies
thumbnail To the Moon and back(doors): Lunar landing in diplomatic missions
thumbnail Log4j Exploited by XMRig Cryptominer Malware: Analysis & Mitigation
thumbnail Threat actors misusing Quick Assist in social engineering attacks leading to ransomware
thumbnail Employee Personal GitHub Repos Expose Internal Azure and Red Hat Secrets
thumbnail Cyber Official Speaks Out, Reveals Mobile Network Attacks in U.S.
thumbnail Popular Cyber Crime Forum Breach Forums Seized by Police
thumbnail An Infostealer's Brewin': Cuckoo & AtomicStealer Get Creative
thumbnail Investigation into Helsinki Education Division data breach proceeds | City of Helsinki
thumbnail N. Korean hacking group stole massive amount of personal info from S. Korean court computer network
thumbnail PoC exploit released for RCE zero-day in D-Link EXO AX4800 routers
thumbnail VMware fixes three zero-day bugs exploited at Pwn2Own 2024
thumbnail Leveraging DNS Tunneling for Tracking and Scanning
thumbnail 2023 Kaspersky Incident Response report
thumbnail Malicious Go Binary Delivered via Steganography in PyPI
thumbnail Ongoing Malvertising Campaign leads to Ransomware
thumbnail Distribution of DanaBot Malware via Word Files Detected by AhnLab EDR
thumbnail My life as a Chinese spy: Secret police agent tells all - ABC News
thumbnail Stolen children’s health records posted online in extortion bid
thumbnail Europol confirms web portal breach, says no operational data stolen
thumbnail Over 50,000 Tinyproxy servers vulnerable to critical RCE flaw
thumbnail Chi sono gli operatori telefonici sfruttati dall’azienda italiana di sorveglianza Carro
thumbnail Dell API abused to steal 49 million customer records in data breach
thumbnail Un logiciel russe utilisé par Fedpol et Armasuisse suscite des inquiétudes sécuritaires
thumbnail Big Vulnerabilities in Next-Gen BIG-IP
thumbnail Zscaler takes "test environment" offline after rumors of a breach
thumbnail Chinese network behind one of world’s ‘largest online scams’
thumbnail Des infos privées sur la vie du chef des pirates de Lockbit déjà révélées par un hacker éthique
thumbnail UK confirms Ministry of Defence payroll data exposed in data breach
thumbnail What we learned from the indictment of LockBit’s mastermind
thumbnail Une faille informatique grave a fragilisé l’armée allemande
thumbnail Proton Mail Discloses User Data Leading to Arrest in Spain
thumbnail POLITICO Europe
thumbnail CVE-2024-3661: TunnelVision - How Attackers Can Decloak Routing-Based VPNs For a Total VPN Leak — Leviathan Security Group - Penetration Testing, Security Assessment, Risk Advisory
thumbnail Neuf parlementaires suisses visés par une cyberattaque attribuée à la Chine - rts.ch - Suisse
thumbnail These Dangerous Scammers Don’t Even Bother to Hide Their Crimes
thumbnail Statement of the MFA on the Cyberattacks Carried by Russian Actor APT28 on Czechia |
thumbnail Watch out for tech support scams lurking in sponsored search results
thumbnail Gird your loins, there’s a new pre-auth RCE in Ivanti boxes landing
thumbnail “Dirty stream” attack: Discovering and mitigating a common vulnerability pattern in Android apps
thumbnail Google shares update on passkeys and new ways to protect accounts
thumbnail Marriott admits it falsely claimed for five years it was using encryption during 2018 breach | CSO Online
thumbnail A Web of Surveillance - Amnesty International Security Lab
thumbnail Analysis of TargetCompany's Attacks Against MS-SQL Servers (Mallox, BlueSky Ransomware)
thumbnail New “Goldoon” Botnet Targeting D-Link Devices
thumbnail Operation PANDORA shuts down 12 phone fraud call centres
thumbnail Op Pandora puts suspected phone fraudsters back in the box
thumbnail Eight Arms to Hold You: The Cuttlefish Malware
thumbnail Hacker free-for-all fights for control of home and office routers everywhere
thumbnail macOS Adload | Prolific Adware Pivots Just Days After Apple’s XProtect Clampdown 
thumbnail French hospital CHC-SV refuses to pay LockBit extortion demand
thumbnail Microsoft needs to win back trust
thumbnail Nearly 20% of Docker Hub Repositories Spread Malware & Phishing Scams
thumbnail Baltic countries blame Russia for GPS jamming of commercial flights
thumbnail Vastaamo hack: Therapy notes hacker jailed for blackmail
thumbnail Malware: Cuckoo Behaves Like Cross Between Infostealer and Spyware
thumbnail Pourquoi les CFF sont la cible favorite des hackers russes
thumbnail Global attacker median dwell time continues to fall
thumbnail The walls of Apple’s garden are tumbling down
thumbnail WP Automatic WordPress plugin hit by millions of SQL injection attacks
thumbnail Okta warns of "unprecedented" credential stuffing attacks on customers
thumbnail PS4/PS5: TheFloW discloses Kernel vulnerability relying on old bug from 2006, impacts PS4 up to 11.00 & PS5 up to 8.20, more details in May
thumbnail Chinese Keyboard App Vulnerabilities Explained
thumbnail ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices
thumbnail Unplugging PlugX: Sinkholing the PlugX USB worm botnet
thumbnail France seeks new EU sanctions to target Russian disinformation
thumbnail 'ArcaneDoor' Cyberspies Hacked Cisco Firewalls to Access Government Networks
thumbnail LOCKBIT Black's Legacy: Unraveling The DragonForce Ransomware Connection - Cyble
thumbnail Kapeka: A novel backdoor spotted in Eastern Europe
thumbnail GreyNoise Labs - Decrypting FortiOS 7.0.x
thumbnail GuptiMiner: Hijacking Antivirus Updates for Distributing Backdoors and Casual Mining - Avast Threat Labs
thumbnail How a Massive Hack of Psychotherapy Records Revealed a Nation’s Secrets
thumbnail CVE-2024-20356: a Cisco appliance to run DOOM
thumbnail DDoS platform shut down by international law enforcement agencies
thumbnail Le système informatique de Volkswagen gravement piraté en 2015, probablement par des cyber-espions chinois
thumbnail Microsoft: APT28 hackers exploit Windows flaw reported by NSA
thumbnail Le groupe Swisspro victime d'une attaque par ransomware
thumbnail Unauthenticated function injection vulnerability in WordPress Shortcode Addons plugin (unpatched). – NinTechNet
thumbnail L'hôpital de Cannes victime d'une cyberattaque, les opérations non urgentes reportées
thumbnail ‘Large volume’ of data stolen from UN agency after ransomware attack
thumbnail MITRE says state hackers breached its network via Ivanti zero-days
thumbnail LastPass Users Lose Master Passwords to Ultra-Convincing Scam
thumbnail Ransomware payments drop to record low of 28% in Q1 2024
thumbnail ‘The machine did it coldly’: Israel used AI to identify 37,000 Hamas targets
thumbnail Hackers are threatening to leak World-Check, a huge sanctions and financial crimes watchlist | TechCrunch
thumbnail 'Crude' ransomware tools proliferating on the dark web for cheap, researchers find
thumbnail Ransomware attack has cost UnitedHealth $872 million; total expected to surpass $1 billion
thumbnail Cisco: Hacker breached multifactor authentication message provider on April 1
thumbnail The Fall of LabHost: Law Enforcement Shuts Down Phishing Service Provider | Trend Micro (US)
thumbnail New Backdoor, MadMxShell
thumbnail Idle GPUs Are the Devil's Workshop
thumbnail 840-bed hospital in France postpones procedures after cyberattack
thumbnail Students turning to cyberfraud as huge phishing
thumbnail Attackers exploiting new critical OpenMetadata vulnerabilities on Kubernetes clusters
thumbnail Unearthing APT44: Russia’s Notorious Cyber Sabotage Unit Sandworm
thumbnail Hackers Linked to Russia’s Military Claim Credit for Sabotaging US Water Utilities | WIRED
thumbnail Over 500 people targeted by Pegasus spyware in Poland, officials say
thumbnail Ivanti warns of critical flaws in its Avalanche MDM solution
thumbnail Security Brief: TA547 Targets German Organizations with Rhadamanthys Stealer
thumbnail Palo Alto - Putting The Protecc In GlobalProtect (CVE-2024-3400)
thumbnail DDoS threat report for 2024 Q1
thumbnail The US Government Has a Microsoft Problem
thumbnail Change Healthcare stolen patient data leaked by ransomware gang
thumbnail Open Source Security (OpenSSF) and OpenJS Foundations Issue Alert for Social Engineering Takeovers of Open Source Projects
thumbnail Leaked LockBit builder in a real-life incident response case | Securelist
thumbnail From Social Engineering to DMARC Abuse: TA427’s Art of Information Gathering  | Proofpoint US
thumbnail CISA: Email from federal agencies possibly accessed in Russian breach of Microsoft
thumbnail Automating Pikabot’s String Deobfuscation
thumbnail World-first “Cybercrime Index” ranks countries by cybercrime threat
thumbnail Top Israeli spy chief exposes his true identity in online security lapse | Israel | The Guardian
thumbnail Ransomware gang’s new extortion trick? Calling the front desk
thumbnail Targus discloses cyberattack after hackers detected on file servers
thumbnail Attempted Audio Deepfake Call Targets LastPass Employee
thumbnail Roku says 576,000 user accounts hacked after second security incident
thumbnail Researchers discover new ransomware gang ‘Muliaka’ attacking Russian businesses
thumbnail Zero-Day Exploitation of Unauthenticated Remote Code Execution Vulnerability in GlobalProtect (CVE-2024-3400)
thumbnail Kaspersky analysis of the backdoor in XZ
thumbnail Romania-linked ‘Rubycarp’ hackers look for cryptomining, phishing DDoS opportunities
thumbnail Hacker doxxes nearly every adult in El Salvador
thumbnail Round 2: Change Healthcare Targeted in Second Ransomware Attack
thumbnail Vulnerabilities Identified in LG WebOS
thumbnail Security Advisory YSA-2024-01
thumbnail PSG : le système de billetterie du club attaqué
thumbnail Microsoft employees exposed internal passwords in security lapse
thumbnail Muddled Libra’s Evolution to the Cloud
thumbnail SurveyLama, plateforme de sondages en ligne française, a subi une attaque exposant les données de plus de 4 millions d'utilisateurs
thumbnail +92,000 Internet-facing D-Link NAS devices can be easily hacked
thumbnail Price of zero-day exploits rises as companies harden products against hackers
thumbnail Over 92,000 exposed D-Link NAS devices have a backdoor account
thumbnail Bringing process injection into view(s): exploiting all macOS apps using nib files · Sector 7
thumbnail Researchers Observed Visual Studio Code Extensions Steals
thumbnail Qakbot Strikes Back: Understanding the Threat
thumbnail Distinctive Campaign Evolution of Pikabot Malware
thumbnail Unveiling the Fallout: Operation Cronos' Impact on LockBit Following Landmark Disruption
thumbnail Ukraine gives award to foreign vigilantes for hacks on Russia
thumbnail New HTTP/2 DoS attack can crash web servers with a single connection
thumbnail Kobold letters
thumbnail Ivanti fixes VPN gateway vulnerability allowing RCE, DoS attacks
thumbnail IntelBroker Leaks Alleged National Security Data Tied to US Contractor Acuity Inc.
thumbnail A Vigilante Hacker Took Down North Korea’s Internet. Now He’s Taking Off His Mask
thumbnail Ukrainian cybersecurity official reveals structure of Russian hacker groups
thumbnail Sicurezza informatica e digitalizzazione dei servizi, 5 comuni si alleano
thumbnail Exclusive: Hackers stole Russian prisoner database to avenge death of Navalny
thumbnail DJI Mavic 3 Drone Research: Vulnerability Analysis
thumbnail Threat Actors Deliver Malware via YouTube Video Game Cracks
thumbnail Microsoft could have prevented Chinese cloud email hack, US cyber report says
thumbnail Enregistré à son insu, son entretien RH finit sur le darknet
thumbnail The Mystery of ‘Jia Tan,’ the XZ Backdoor Mastermind
thumbnail Google fixes two Pixel zero-day flaws exploited by forensics firms
thumbnail Introducing Sunlight, a CT implementation built for scalability, ease of operation, and reduced cost - Let's Encrypt
thumbnail The Open Source Community is Building Cybersecurity Processes for CRA Compliance
thumbnail OWASP Data Breach Notification
thumbnail GitHub - amlweems/xzbot: notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)
thumbnail Facebook snooped on users’ Snapchat traffic in secret project, documents reveal | TechCrunch
thumbnail La FFF, victime d'une attaque informatique, annonce le vol de données de certains de ses adhérents
thumbnail What we know about the xz Utils backdoor that almost infected the world
thumbnail Infostealers continue to pose threat to macOS users
thumbnail Vulnerabilities Year-in-Review: 2023
thumbnail State of WordPress Security In 2024
thumbnail Claro Company Hit by Trigona Ransomware
thumbnail Check if you're vulnerable to CVE-2024-3094
thumbnail xz-utils backdoor situation
thumbnail xz/liblzma: Bash-stage Obfuscation Explained - gynvael.coldwind//vx.log
thumbnail From OneNote to RansomNote: An Ice Cold Intrusion - The DFIR Report
thumbnail Serious security breach hits EU police agency
thumbnail Les clients Apple victimes de push bombing pour réinitialiser leur identifiant
thumbnail AT&T confirms data for 73 million customers leaked on hacker forum
thumbnail The Darkside of TheMoon
thumbnail EU bans anonymous crypto payments to hosted wallets
thumbnail Les attaques informatiques contre les ENT continuent dans le Nord ...
thumbnail PHP Obfuscator with Backdoor
thumbnail Easy privilege escalation exploit lands for Linux kernels
thumbnail Urgent security alert for Fedora 41 and Fedora Rawhide users
thumbnail Ransomware gang leaks stolen Scottish healthcare patient data in extortion bid
thumbnail AI bots hallucinate software packages and devs download them
thumbnail Decade-old Linux ‘wall’ bug helps make fake SUDO prompts, steal passwords
thumbnail PyPI halted new users and projects while it fended off supply-chain attack
thumbnail Jeffrey Epstein's Island Visitors Exposed by Data Broker
thumbnail Diving Deeper into AI Package Hallucinations
thumbnail Lighter Ransomware Locks Users Out of System
thumbnail Out of the shadows - ’darcula’ iMessage and RCS smishing attacks target USPS and global postal services
thumbnail Thousands of servers hacked in ongoing attack targeting Ray AI framework
thumbnail Flipping Pages: An analysis of a new Linux vulnerability in nf_tables and hardened exploitation techniques
thumbnail Finland confirms APT31 hackers behind 2021 parliament breach
thumbnail Google: Spyware vendors behind 50% of zero-days exploited in 2023
thumbnail BlueSpy - Spying on Bluetooth conversations
thumbnail Des citoyens traquent les pédocriminels sur les réseaux sociaux avec des faux profils d'enfants
thumbnail New ZenHammer memory attack impacts AMD Zen CPUs
thumbnail Why X86 Needs To Die
thumbnail Tycoon 2FA: an in-depth analysis of the latest version of the AiTM phishing kit
thumbnail US sanctions APT31 hackers behind critical infrastructure attacks
thumbnail Over 170K users hit by poisoned Python package ruse
thumbnail New Go loader pushes Rhadamanthys stealer
thumbnail APT29 Uses WINELOADER to Target German Political Parties | Mandiant
thumbnail L’Active Directory et l’exposition Internet au programme du plan de sécurisation des hôpitaux
thumbnail One Man’s Army of Streaming Bots Reveals a Whole Industry’s Problem | WIRED
thumbnail IMF Investigates Cyber-Security Incident
thumbnail Change Healthcare ransomware attack disrupting industry nationwide
thumbnail Darknet marketplace Nemesis Market seized by German police
thumbnail Large-Scale StrelaStealer Campaign in Early 2024
thumbnail Google Online Security Blog: Vulnerability Reward Program: 2023 Year in Review
thumbnail Des lycées bretons et franciliens visés par des menaces terroristes après un piratage informatique
thumbnail The iSOON Disclosure: Exploring the Integrated Operations Platform
thumbnail Ransomware Recruitment Efforts Following Law Enforcement Disruption
thumbnail Apple Sued for Prioritizing Market Dominance Over Security
thumbnail OpenAI's chatbot store is filling up with spam
thumbnail Exploit released for Fortinet RCE bug used in attacks, patch now
thumbnail Unpatchable vulnerability in Apple chip leaks secret encryption keys
thumbnail Hackers Found a Way to Open Any of 3 Million Hotel Keycard Locks in Seconds | WIRED
thumbnail Microsoft Threat Intelligence unveils targets and innovative tactics amidst tax season
thumbnail Managing Attack Surface | Huntress Blog
thumbnail The Updated APT Playbook: Tales from the Kimsuky threat actor group | Rapid7 Blog
thumbnail Windows 11, Tesla, and Ubuntu Linux hacked at Pwn2Own Vancouver
thumbnail Ivanti fixes critical Standalone Sentry bug reported by NATO
thumbnail AceCryptor malware has surged in Europe, researchers say
thumbnail Microsoft Copilot for Security: General Availability details
thumbnail Loop DoS: New Denial-of-Service attack targets application-layer protocols
thumbnail Cyberattaque contre France Travail : trois personnes mises en examen et incarcérées après le vol massif de données
thumbnail Top 5 Russian-Speaking Dark Web Forums
thumbnail Two Bytes is Plenty: FortiGate RCE with CVE-2024-21762
thumbnail Misconfigured Firebase instances leaked 19 million plaintext passwords
thumbnail New Attack Techniques Bypassing ML Security
thumbnail Finland, Germany, Ireland, Japan, Poland, South Korea added to US-led spyware agreement
thumbnail Interesting Multi-Stage StopCrypt Ransomware Variant Propagating in the Wild
thumbnail Earth Krahang Exploits Intergovernmental Trust to Launch Cross-Government Attacks | Trend Micro (US)
thumbnail Researchers spot updated version of malware that hit Viasat
thumbnail Cyberattaque contre Franz Carl Weber: données d'employés publiées sur le darknet (update)
thumbnail IT helpdeskers increasingly targeted by cybercriminals
thumbnail Elon Musk's SpaceX builds spy satellite network for U.S. intelligence
thumbnail 'GhostRace' Speculative Execution Attack Impacts All CPU, OS Vendors
thumbnail Ongoing ITG05 operations leverage evolving malware arsenal in global campaigns
thumbnail National Vulnerability Database: Opaque changes and unanswered questions
thumbnail Why hackers are targeting young public school students
thumbnail Linux Foundation Launches Tazama: A Revolutionary Open Source Solution for Real-Time Fraud Management
thumbnail Microsoft publie son outil interne de test de sécu d'IA générative
thumbnail Exclusive: After LockBit’s takedown, its purported leader vows to hack on
thumbnail Google Chrome gets real-time phishing protection later this month
thumbnail The Architects of Evasion: a Crypters Threat Landscape
thumbnail DarkGate Opens Organizations for Attack via Skype, Teams
thumbnail Salt Labs research finds security flaws within ChatGPT Ecosystem (Remediated)
thumbnail Researchers found multiple flaws in ChatGPT plugins
thumbnail Secret Backdoor Codes in Safe Locks
thumbnail GhostSec’s joint ransomware operation and evolution of their arsenal
thumbnail World’s first major act to regulate AI passed by European lawmakers
thumbnail LockBit ransomware affiliate gets four years in jail, to pay $860k
thumbnail Threat actors leverage document publishing sites for ongoing credential and session token theft
thumbnail JetBrains vulnerability exploitation highlights debate over 'silent patching'
thumbnail Plusieurs ministères visés par des attaques informatiques depuis dimanche, annonce Matignon
thumbnail La Commission se félicite de l'accord politique obtenu sur le règlement relatif à la cybersolidarité
thumbnail Cyber Solidarity Act : qui va constituer le « bouclier cyber » européen ?
thumbnail Magnet Goblin Targets Publicly Facing Servers Using 1-Day Vulnerabilities
thumbnail EU Commission breached data protection rules using Microsoft 365, EU watchdog found – Euractiv
thumbnail CISA forced to take two systems offline last month after Ivanti compromise
thumbnail Russian spies keep hacking into Microsoft in 'ongoing attack,' company says
thumbnail Switzerland: Play ransomware leaked 65,000 government documents
thumbnail Flipper Zero WiFi phishing attack can unlock and steal Tesla cars
thumbnail The Anatomy of an ALPHA SPIDER Ransomware Attack
thumbnail Microsoft AI engineer says Copilot Designer creates disturbing images
thumbnail US sanctions founder of spyware maker Intellexa for targeting Americans | TechCrunch
thumbnail Duvel says it has "more than enough" beer after ransomware attack
thumbnail Multistage RA World Ransomware Uses Anti-AV Tactics, Exploits GPO
thumbnail It’ll be back: Attackers still abusing Terminator tool and variants
thumbnail ACEMAGIC Addresses Virus Incident: Proactive Measures and Solutions
thumbnail RATs Distributed Through Skype, Zoom, & Google Meet Lures
thumbnail Rapid7 flames JetBrains over vulnerability disclosure
thumbnail BlackCat ransomware shuts down in exit scam, blames the "feds"
thumbnail Ukraine Claims it Hacked Russian MoD - Infosecurity Magazine
thumbnail CVE-2024-21762 Vulnerability Scanner for FortiGate…
thumbnail How AMOS macOS Stealer Avoids Detection
thumbnail CVE-2024-27198 and CVE-2024-27199: JetBrains TeamCity Multiple Authentication Bypass Vulnerabilities (FIXED)
thumbnail Police seized Crimemarket, the largest German-speaking cybercrime marketplace
thumbnail BlackCat ransomware turns off servers amid claim they stole $22 million ransom
thumbnail Hackers Behind the Change Healthcare Ransomware Attack Just Received a $22 Million Payment
thumbnail Russia’s chief propagandist leaks intercepted German military Webex conversation
thumbnail Ubiquiti owners warned Moscow may build another botnet • The Register
thumbnail ALPHV/BlackCat hits healthcare after retaliation threat, FBI says
thumbnail Popular video doorbells can be easily hijacked, researchers find
thumbnail Russian hackers hijack Ubiquiti routers to launch stealthy attacks
thumbnail US prescription market hamstrung for 9 days (so far) by ransomware attack | Ars Technica
thumbnail Russia publishes German army meeting on Ukraine
thumbnail NoName057(16) DDoSia project: 2024 updates and behavioural shifts
thumbnail Here Come the AI Worms
thumbnail GitHub besieged by millions of malicious repositories in ongoing attack | Ars Technica
thumbnail CISA cautions against using hacked Ivanti VPN gateways even after factory resets
thumbnail Failles d’Ivanti : une centaine d’organisations victimes en France
thumbnail The Predator spyware ecosystem is not dead
thumbnail DNS Used to Hide Fake Investment Platform Schemes | Infoblox
thumbnail BlackCat Ransomware Affiliate TTPs
thumbnail Lazarus and the FudModule Rootkit: Beyond BYOVD with an Admin-to-Kernel Zero-Day - Avast Threat Labs
thumbnail Google CEO Sundar Pichai calls AI tool’s responses ‘completely unacceptable’
thumbnail How the Pentagon Learned to Use Targeted Ads to Find Its Targets—and Vladimir Putin | WIRED
thumbnail Paris 2024 : vol d'un ordinateur et de clés USB contenant des plans de sécurisation des JO
thumbnail Civil society complaint raises concern that LinkedIn is violating DSA ad targeting restrictions
thumbnail Joomla: PHP Bug Introduces Multiple XSS Vulnerabilities
thumbnail Chatbots qui «hallucinent» et trompent les clients: quelle responsabilité légale? | ICTjournal
thumbnail PIKABOT, I choose you!
thumbnail SEO Poisoning to Domain Control: The Gootloader Saga Continues
thumbnail LockBit ransomware returns, restores servers after police disruption
thumbnail U.S. and U.K. Disrupt LockBit Ransomware Variant | United States Department of Justice
thumbnail How your sensitive data can be sold after a data broker goes bankrupt
thumbnail Ransomware Operation LockBit Reestablishes Dark Web Leak Site
thumbnail Hackers Leak 2.5M Private Plane Owners' Data Linked to LA Intl. Airport Breach
thumbnail Avast fined $16.5 million for ‘privacy’ software that actually sold users’ browsing data
thumbnail Jamf says 9% of smartphone have fallen for phishing attacks
thumbnail ChatGPT «devient fou», OpenAI s’explique
thumbnail Multiple XSS flaws in Joomla can lead to remote code execution
thumbnail Scattered Spider laying new eggs
thumbnail Suisse: Le Team a été hackée, ce qu'on sait sur le ransomware
thumbnail Internet Society veut empêcher Microsoft d'héberger les données de santé des Français
thumbnail ConnectWise ScreenConnect: Authentication Bypass Deep Dive
thumbnail A first analysis of the i-Soon data leak
thumbnail Apple iOS 17.4: iMessage Gets Post-Quantum Encryption in New Update
thumbnail European Parliament finds spyware on defense committee members’ phones
thumbnail Anatsa Banking Trojan Resurfaces, Targets European Banks
thumbnail Plus de 2000 serveurs Exchange suisses vulnérables à une faille
thumbnail Police arrests LockBit ransomware members, release decryptor in global crackdown
thumbnail Law enforcement disrupt world’s biggest ransomware operation
thumbnail Cactus ransomware claim to steal 1.5TB of Schneider Electric data
thumbnail Ransomware Experts See Problems With Banning Ransom Payments
thumbnail LockBit ransomware gang disrupted by international law enforcement operation
thumbnail Several Ukrainian media outlets attacked by Russian hackers
thumbnail LockBit ransomware disrupted by global police operation
thumbnail ESET fixed high-severity local privilege escalation bug in Windows products
thumbnail Poland's PM says authorities in the previous government widely and illegally used Pegasus spyware | AP News
thumbnail Cyberattaque : le Centre Hospitalier d’Armentières communique
thumbnail Air Canada must honor refund policy invented by airline’s chatbot
thumbnail Code injection or backdoor: A new look at Ivanti’s CVE-2021-44529
thumbnail Russia-Aligned TAG-70 Targets European Government and Military Mail Servers in New Espionage Campaign
thumbnail Magika: AI powered fast and efficient file type identification
thumbnail Google launches AI Cyber Defense Initiative to improve security infrastructure
thumbnail New ‘Magic’ Gmail Security Uses AI And Is Here Now, Google Says
thumbnail BMW security lapse exposed sensitive company information, researcher finds
thumbnail Vulnerable Fortinet Devices: Low-hanging Fruit for Threat Actors
thumbnail Spyware startup Variston is losing staff — some say it’s closing
thumbnail Ukrainian national pleads guilty for roles in Zeus, IcedID malware operations
thumbnail Threat Intel Accelerates Detection & Response
thumbnail Disrupting malicious uses of AI by state-affiliated threat actors
thumbnail Patch Tuesday - February 2024
thumbnail Imposer aux messageries de donner leurs clés pour déchiffrer les messages est illégal, estime la CEDH
thumbnail Denmark orders schools to stop sending student data to Google
thumbnail The Risks of the #MonikerLink Bug in Microsoft Outlook and the Big Picture
thumbnail Zoom fixed critical flaw CVE-2024-24691 in Windows software
thumbnail Clinique privée à Genève victime d'une cyberattaque
thumbnail CVE-2024-21412: Water Hydra Targets Traders with Microsoft Defender SmartScreen Zero-Day
thumbnail Portal Kombat : un réseau structuré et coordonné de propagande prorusse
thumbnail Hackers exploit Ivanti SSRF flaw to deploy new DSLog backdoor
thumbnail Community Alert: Ongoing Malicious Campaign Impacting Azure Cloud Environments
thumbnail International Cybercrime Malware Service Dismantled by Federal Authorities: Key Malware Sales and Support Actors in Malta and Nigeria Charged in Federal Indictments
thumbnail New MacOS Backdoor Written in Rust Shows Possible Link with Windows Ransomware Group
thumbnail EU capitals fear Russian retaliation and cyberattacks after asset freezes
thumbnail Fake LastPass App Sneaks Past Apple's Review Team
thumbnail KV-Botnet: Don’t call it a Comeback - Lumen
thumbnail Vaud: le canton rompt un contrat à 6 millions avec Xplain
thumbnail New RustDoor macOS malware impersonates Visual Studio update
thumbnail World Govs, Tech Giants Sign Spyware Responsibility Pledge
thumbnail Hyundai Motor Europe hit by Black Basta ransomware attack
thumbnail Reward Offers for Information to Bring Hive Ransomware Variant Co-Conspirators To Justice - United States Department of State
thumbnail Ivanti: Patch new Connect Secure auth bypass bug immediately
thumbnail Fortinet warns of new FortiSIEM RCE bugs in confusing disclosure
thumbnail Raspberry Pi Pico cracks BitLocker in under a minute
thumbnail Ransomware Hit $1 Billion in 2023
thumbnail Security Researcher Allegedly Hacked Apple’s Backend, Scammed $2.5 Million
thumbnail Thanksgiving 2023 security incident
thumbnail Chinese hackers infect Dutch armed forces network with malware
thumbnail Fingerprint photo led investigators to therapy centre hacking suspect
thumbnail Zero Day Initiative — CVE-2023-46263: Ivanti Avalanche Arbitrary File Upload Vulnerability
thumbnail Government hackers targeted iPhones owners with zero-days, Google says
thumbnail Ransomware Retrospective 2024: Unit 42 Leak Site Analysis
thumbnail Datasport subi un vol de données: 900’000 Suisses concernés
thumbnail 45,000 Jenkins servers remain vulnerable to RCE attacks
thumbnail Finance worker pays out $25 million after video call with deepfake ‘chief financial officer’
thumbnail Leaky Vessels flaws allow hackers to escape Docker, runc containers
thumbnail Zyxel VPN Series Pre-auth Remote Command Execution
thumbnail AnyDesk Incident: Customer Credentials Leaked and Published for Sale on the Dark Web
thumbnail Investigation: Apparent Russian disinformation group posing as ex-president Poroshenko targets foreign fighters in Ukraine
thumbnail AnyDesk says hackers breached its production servers, resets passwords
thumbnail There Are Too Many Damn Honeypots
thumbnail Here is Apple's official 'jailbroken' iPhone for security researchers | TechCrunch
thumbnail How Memory Forensics Revealed Exploitation of Ivanti Connect Secure VPN Zero-Day Vulnerabilities
thumbnail Apple fixes zero-day bug in Apple Vision Pro that 'may have been exploited'
thumbnail DarkGate malware delivered via Microsoft Teams - detection and response
thumbnail The "EventLogCrasher" 0day For Remotely Disabling Windows Event Log, And a Free Micropatch For It
thumbnail Evolution of UNC4990: Uncovering USB Malware's Hidden Depths
thumbnail Binance Code and Internal Passwords Exposed on GitHub for Months
thumbnail Kasseika Ransomware Deploys BYOVD Attacks Abuses PsExec and Exploits Martini Driver 
thumbnail Qualys TRU Discovers Important Vulnerabilities in GNU C Library’s syslog()
thumbnail Hundreds of network operators’ credentials found circulating in Dark Web
thumbnail Energy giant Schneider Electric hit by Cactus ransomware attack
thumbnail New Go-based Malware Loader Discovered I Arctic Wolf
thumbnail Malicious PyPI Packages Slip WhiteSnake InfoStealer Malware onto Windows Machines
thumbnail How a mistakenly published password exposed Mercedes-Benz source code
thumbnail Buzzing on Christmas Eve: Trigona Ransomware in 3 Hours
thumbnail Malicious NPM Packages Exfiltrate Hundreds of Developer SSH Keys via GitHub
thumbnail Trello API abused to link email addresses to 15 million accounts
thumbnail NSA is buying Americans’ internet browsing records without a warrant
thumbnail Researchers Say the Deepfake Biden Robocall Was Likely Made With Tools From AI Startup ElevenLabs
thumbnail Russian developer of Trickbot malware sentenced to five years in prison
thumbnail Midnight Blizzard: Guidance for responders on nation-state attack
thumbnail 23andMe data breach: Hackers stole raw genotype data, health reports
thumbnail Inside a Global Phone Spy Tool Monitoring Billions
thumbnail X is being flooded with graphic Taylor Swift AI images
thumbnail HPE reveals Russian attackers accessed internal emails
thumbnail Over 5,300 GitLab servers exposed to zero-click account takeover attacks
thumbnail AI will make scam emails look genuine, UK cybersecurity agency warns
thumbnail SEC says X account hack was due to SIM swapping
thumbnail CVE-2024-0204: Critical Authentication Bypass in Fortra GoAnywhere MFT | Rapid7 Blog
thumbnail Info Stealing Packages Hidden in PyPI
thumbnail Atlassian Confluence Server RCE attacks underway
thumbnail 178,000 SonicWall firewalls are vulnerable to old DoS bugs
thumbnail Technology News Government News Get more insights with the Recorded Future Intelligence Cloud. Learn more. In alerting about two Citrix bugs, CISA recommends immediate attention for one
thumbnail A backdoor with a cryptowallet stealer inside cracked macOS software
thumbnail Balada Injector Infects Over 7,100 WordPress Sites Using Plugin Vulnerability
thumbnail Microsoft network breached through password-spraying by Russian-state hackers
thumbnail Microsoft's Top Execs' Emails Breached in Sophisticated Russia-Linked APT Attack
thumbnail La Russie est suspectée d’avoir largement brouillé les GPS en Pologne
thumbnail Jamf Threat Labs Discovers Pirated macOS Apps Similar to ZuRu Malware
thumbnail Ivanti Connect Secure VPN Exploitation: New Observations
thumbnail Researcher uncovers one of the biggest password dumps in recent history
thumbnail Why Join The Navy If You Can Be A Pirate?
thumbnail A Victim of Mallox Ransomware: How Truesec CSIRT Fought Back
thumbnail The Many Faces of Undetected macOS InfoStealers | KeySteal, Atomic & CherryPie Continue to Adapt
thumbnail MacOS info-stealers quickly evolve to evade XProtect detection
thumbnail iShutdown scripts can help detect iOS spyware on your iPhone
thumbnail LeftoverLocals: Listening to LLM responses through leaked GPU local memory
thumbnail Bigpanzi Exposed: The Hidden Cyber Threat Behind Your Set-Top Box
thumbnail NoName057(16) |
thumbnail CVE-2023-46805
thumbnail Le CHU de Nantes victime d’une cyberattaque
thumbnail Apple fixed a bug in Magic Keyboard that allows to monitor Bluetooth traffic
thumbnail Ivanti Connect Secure VPN Exploitation Goes Global
thumbnail Opera MyFlaw Bug Could Let Hackers Run ANY File on Your Mac or Windows
thumbnail Chrome Users Now Worth 30% Less Money Thanks to Google's Cookie Killing, Ad Firm Says
thumbnail Framework Data Breach - General Topics - Framework Community
thumbnail Volt Typhoon Compromises 30% of Cisco RV320/325 Devices in 37 Days
thumbnail Welcome To 2024, The SSLVPN Chaos Continues - Ivanti CVE-2023-46805 & CVE-2024-21887
thumbnail Further analysis of Denmark attacks leads to warning about unpatched network gear
thumbnail Beware! YouTube Videos Promoting Cracked Software Distribute Lumma Stealer
thumbnail Turkish Hackers Exploiting Poorly Secured MS SQL Servers Across the Globe
thumbnail ShinyHunters member gets 3 years in prison for breaching 60 firms
thumbnail Turkish hackers targeting database servers with Mimic ransomware
thumbnail Anthropic researchers find that AI models can be trained to deceive
thumbnail CVE-2024-21591 - Juniper J-Web OOB Write vulnerability
thumbnail Hackers can infect network-connected wrenches to install ransomware
thumbnail Cryptojacker arrested in Ukraine over EUR 1.8 million mining scheme
thumbnail CVE-2023-36025 Exploited for Defense Evasion in Phemedrone Stealer Campaign
thumbnail Attack of the week: Airdrop tracing – A Few Thoughts on Cryptographic Engineering
thumbnail Act Now: CISA Flags Active Exploitation of Microsoft SharePoint Vulnerability
thumbnail SharePoint Pre-Auth RCE chain (CVE-2023–29357 & CVE-2023–24955) | STAR Labs
thumbnail Follow-On Extortion Campaign Targeting Victims of Akira and Royal Ransomware
thumbnail Linux devices are under attack by a never-before-seen worm | Ars Technica
thumbnail AirDrop 'Cracked' By Chinese Authorities to Identify Senders
thumbnail Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN
thumbnail Le service de renseignement suisse surveille aussi le trafic de données national
thumbnail NSA official: hackers use AI bots like ChatGPT to perfect English
thumbnail SEC Has Not Approved Bitcoin ETFs, but Its Hacked X Account Briefly Said Otherwise
thumbnail AI aides nation-state hackers but also helps US spies to find them, says NSA cyber director | TechCrunch
thumbnail Avast Updates Babuk Ransomware Decryptor in Cooperation with Cisco Talos and Dutch Police
thumbnail Netgear, Hyundai latest X accounts hacked to push crypto drainers
thumbnail Ransomware gang takes credit for Christmas attack on global Lutheran organization
thumbnail WCC hit by ransomware attack
thumbnail Revealed: How a secret Dutch mole aided the U.S.-Israeli Stuxnet cyberattack on Iran
thumbnail Compromising Google Accounts: Malwares Exploiting Undocumented OAuth2 Functionality for session hijacking
thumbnail Dutch man sabotaged Iranian nuclear program without Dutch government's knowledge: report
thumbnail Multiple vulnerabilities in Lantronix EDS-MD IoT gateway for medical devices
thumbnail LastPass to enforce a 12-character requirement for master passwords
thumbnail CVE-2023-27532
thumbnail ALPHV Ransomware Claims Cyberattack on US Firm Ultra Intelligence and Communications
thumbnail L’UDC Andreas Glarner contraint de payer les frais de justice occasionnés par son «deepfake» de Sibel Arslan
thumbnail Three New Malicious PyPI Packages Deploy CoinMiner on Linux Devices | FortiGuard Labs
thumbnail Bitwarden Heist - How to Break Into Password Vaults Without Using Passwords
thumbnail Analyzing DPRK's SpectralBlur
thumbnail Ivanti warns critical EPM bug lets hackers hijack enrolled devices
thumbnail Weak password and infostealer blamed for Orange Spain outage
thumbnail Hackers hijack govt and business accounts on X for crypto scams
thumbnail Hacker hijacks Orange Spain RIPE account to cause BGP havoc
thumbnail The State of Ransomware in the U.S.: Report and Statistics 2023
thumbnail Qualcomm chip vulnerability enables remote attack by voice call
thumbnail Cactus RANSOMWARE gang hit the Swedish retail and grocery provider Coop
thumbnail The biggest cybersecurity and cyberattack stories of 2023
thumbnail La ville de Nyon se cherche un SOC
thumbnail Porsche To Kill ICE-Powered Macan In Europe Over Cybersecurity Laws | Carscoops
thumbnail Downfall - A Slay the Spire Fan Expansion :: Downfall (Steam Standalone) was Breached. Please read.
thumbnail Cyber attacks hit the Assembly of the Republic of Albania and telecom company One Albania
thumbnail CVE-2023-46747 : Unauthenticated Remote Code Execution in F5 BIG-IP - Malware Analysis - Malware Analysis, News and Indicators
thumbnail After ransomware claims, Xerox says subsidiary hit with cyberattack
thumbnail Hackers Attack UK's Nuclear Waste Services Through LinkedIn
thumbnail Victoria Courts Confront Unprecedented Ransomware Assault on AV Technology Network
thumbnail Objective-See's Blog
thumbnail Les autorités suisses disposeront de moyens renforcés | blue News
thumbnail A New Kind of AI Copy Can Fully Replicate Famous People. The Law Is Powerless.
thumbnail 2023, une année riche en vulnérabilités critiques
thumbnail Cyberattaques : 2023, année noire pour les ESN
thumbnail ChatGPT-aided ransomware in China results in four arrests as AI raises cybersecurity concerns | South China Morning Post
thumbnail New Black Basta decryptor exploits ransomware flaw to recover files
thumbnail L'hôpital cantonal de Saint-Gall a trouvé son SOC
thumbnail Cloud Atlas' Spear-Phishing Attacks Target Russian Agro and Research Companies
thumbnail Russian military hackers target Ukraine with new MASEPIE malware
thumbnail Ukraine war: What's the impact of cyber guerrillas?
thumbnail Chinese Hackers Exploited New Zero-Day in Barracuda's ESG Appliances
thumbnail ‘Wall of Flippers’ detects Flipper Zero Bluetooth spam attacks
thumbnail Hackers stole $2 billion in crypto in 2023, data shows
thumbnail Amnesty confirms Apple warning: Indian journalists’ iPhones infected with Pegasus spyware
thumbnail Lockbit ransomware disrupts emergency care at German hospitals
thumbnail Steam game mod breached to push password-stealing malware
thumbnail New malware found in analysis of Russian hacks on Ukraine, Poland
thumbnail Iranian Hackers Claim They Disrupted Albanian Institutions
thumbnail Nighthawk 0.2.6 - Three Wise Monkeys - MDSec
thumbnail Lockbit ransomware attack interrupted medical emergencies gang at a German hospital network
thumbnail Microsoft disables MSIX protocol handler abused in malware attacks
thumbnail Les données médicales toujours plus vulnérables face aux cyberattaques
thumbnail Les arnaques aux QR codes se multiplient depuis quelques mois
thumbnail This Clever New Idea Could Fix AirTag Stalking While Maximizing Privacy
thumbnail Operation Triangulation: The last (hardware) mystery
thumbnail The Disturbing Impact of the Cyberattack at the British Library
thumbnail GTA 5 source code reportedly leaked online a year after RockStar hack
thumbnail Ubisoft says it's investigating reports of a new security breach
thumbnail Personal Information Exploit on OpenAI’s ChatGPT Raise Privacy Concerns
thumbnail Cyberattaque contre l’Iran : qui sont ces mystérieux hackers qui perturbent le pays ?
thumbnail Google Search Overwhelmed By Massive Spam Attack
thumbnail Crypto drainer steals $59 million from 63k people in Twitter ad push
thumbnail Android Banking Trojan Chameleon can now bypass any Biometric Authentication
thumbnail BattleRoyal, DarkGate Cluster Spreads via Email and Fake Browser Updates
thumbnail German Authorities Dismantle Dark Web Hub 'Kingdom Market' in Global Operation
thumbnail Hackers Exploiting MS Excel Vulnerability to Spread Agent Tesla Malware
thumbnail Seedworm: Iranian Hackers Target Telecoms Orgs in North and East Africa
thumbnail Russian Water Utility Cyberattack Impacts 6000 Systems
thumbnail Lapsus$: GTA 6 hacker handed indefinite hospital order
thumbnail Healthcare software provider data breach impacts 2.7 million
thumbnail SSH protects the world’s most sensitive networks. It just got a lot weaker
thumbnail Snikt! Rhysida dumps more than a terabyte of Insomniac Games’ internal data
thumbnail Qakbot's Back, But Don't Y'all Panic: A Southern Tech Talk
thumbnail Unveiling VISS: a revolutionary approach to vulnerability impact scoring
thumbnail Web injections are back on the rise: 40+ banks affected by new malware campaign
thumbnail Terrapin attacks can downgrade security of OpenSSH connections
thumbnail Xfinity waited to patch critical Citrix Bleed 0-day. Now it’s paying the price
thumbnail Justice Department Disrupts Prolific ALPHV/Blackcat Ransomware Variant | United States Department of Justice
thumbnail Authorities claim seizure of notorious ALPHV ransomware gang's dark web leak site | TechCrunch
thumbnail Vans, Supreme owner VF Corp. says personal data stolen and orders impacted in suspected ransomware attack | TechCrunch
thumbnail Toward Ending the Domain Wars: Early Detection of Malicious Stockpiled Domains
thumbnail The Curious Case of Predatory Sparrow
thumbnail FBI: Play ransomware gang has attacked 300 orgs since 2022
thumbnail SMTP Smuggling - Spoofing E-Mails Worldwide
thumbnail Ukrainian cellular and Internet still out, 1 day after suspected Russian cyberattack | Ars Technica
thumbnail Rhadamanthys v0.5.0 - a deep dive into the stealer’s components
thumbnail MongoDB says customer data was exposed in a cyberattack
thumbnail QNAP VioStor NVR vulnerability actively exploited by malware botnet
thumbnail Microsoft’s AI Chatbot Replies to Election Questions With Conspiracies, Fake Scandals, and Lies
thumbnail Marketing Company Claims That It Actually Is Listening to Your Phone and Smart Speakers to Target Ads
thumbnail Exploiting GOG Galaxy XPC service for privilege escalation in macOS
thumbnail Imperva Uncovers CVE-2023-22524, A RCE Vulnerability
thumbnail 3CX warns customers to disable SQL database integrations
thumbnail Cyberextorsion : 2023, année de l’industrialisation
thumbnail A pernicious potpourri of Python packages in PyPI
thumbnail Paternity and fertility tests among data stolen in Asper Biogene cyberattack | News | ERR
thumbnail Supply chain attack targeting Ledger crypto wallet leaves users hacked
thumbnail CVE-2023-50164
thumbnail Ledger's Web3 Connector library was compromised and replaced with a drainer
thumbnail Apple will no longer give police users' push notification data without a warrant
thumbnail Hackers are exploiting critical Apache Struts flaw using public PoC
thumbnail Ukraine’s intelligence claims cyberattack on Russia’s state tax service
thumbnail CALISTO doxxing : Sekoia.io findings concurs to Reuters’ investigation on FSB-related Andrey Korinets
thumbnail Threat actors misuse OAuth applications to automate financially driven attacks
thumbnail Spider-Man And Wolverine Devs Hit By Alleged Ransomware Attack
thumbnail Apple’s new iPhone security setting keeps thieves out of your digital accounts
thumbnail Ransomware Hive : arrestation d’un suspect à Paris | LeMagIT
thumbnail AlphV’s bid to report its victim to the SEC could backfire
thumbnail pfSense Security: Sensing Code Vulnerabilities with SonarCloud
thumbnail One in four apps remain exposed to Log4Shell
thumbnail Kelvin Security hacking group leader arrested in Spain
thumbnail Sophos backports RCE fix after attacks on unsupported firewalls
thumbnail 50K WordPress sites exposed to RCE attacks by critical bug in backup plugin
thumbnail AI Act, come funziona lo stop al riconoscimento biometrico della prima legge europea sull'intelligenza artificiale | Wired Italia
thumbnail Apple Releases Security Updates to Patch Critical iOS and macOS Security Flaws
thumbnail US healthcare giant Norton says hackers stole millions of patients' data during ransomware attack | TechCrunch
thumbnail L’AI Act européen adopté après des négociations marathon | ICTjournal
thumbnail The EU Just Passed Sweeping New Rules to Regulate AI
thumbnail Amazon sues group that fakes returns so people can get free MacBooks - The Verge
thumbnail Early Warning Notification - the use of Bluetooth trackers for geolocation in organised crime | Europol
thumbnail Russian Hacker Vladimir Dunaev Pleads Guilty for Creating TrickBot Malware
thumbnail Inside Job: How a Hacker Helped Cocaine Traffickers Infiltrate Europe’s Biggest Ports
thumbnail Ransomware : un mois de novembre hors-norme
thumbnail Using AI to Automatically Jailbreak GPT-4 and Other LLMs in Under a Minute
thumbnail Scanning Danger: Unmasking the Threats of Quishing
thumbnail Qualcomm Releases Details on Chip Vulnerabilities Exploited in Targeted Attacks
thumbnail Fighting Ursa Aka APT28: Illuminating a Covert Campaign
thumbnail Star Blizzard increases sophistication and evasion in ongoing attacks
thumbnail UK names FSB unit behind hack-and-leak campaigns, summons Russian ambassador
thumbnail Rhysida ransomware gang claimed China Energy hack
thumbnail PLC Hacking - More Commonplace Than You Might Think
thumbnail Researchers discover dozens of new bugs affecting Sierra Wireless routers
thumbnail Jamf Threat Labs: Fake Lockdown Mode proof of concept
thumbnail Analysis of a new macOS Trojan-Proxy
thumbnail Apple Confirms Governments Using Push Notifications to Surveil Users - MacRumors
thumbnail Windows 10 gets three more years of security updates, if you can afford them | Ars Technica
thumbnail Atlassian Releases Critical Software Fixes to Prevent Remote Code Execution
thumbnail Russian Hackers’ Lawsuit Reveals Weaknesses In Apple’s iOS 16
thumbnail 23andMe confirms hackers stole ancestry data on 6.9 million users
thumbnail P2Pinfect - New Variant Targets MIPS Devices
thumbnail L’attaque contre Xplain bloque aussi la modernisation de l’IT du canton d'Argovie (update)
thumbnail Phineas Fisher, Hacktivism, and Magic Tricks
thumbnail N. Korean Hackers 'Mixing' macOS Malware Tactics to Evade Detection
thumbnail The Far-Reaching Consequences of LogoFAIL
thumbnail Vidar Infostealer Steals Booking.com Credentials in Fraud Scam
thumbnail Cyber Threats affecting "International Geneva"
thumbnail Qlik Sense Remote Code Execution Technical Exploitation -
thumbnail Spyware are still having a ‘ball’ despite a decade of warnings - Binding hook
thumbnail Les ministres français invités à désinstaller WhatsApp, Signal et Telegram
thumbnail New BLUFFS attack lets attackers hijack Bluetooth connections
thumbnail Okta reveals additional attackers' activities in October 2023 Breach
thumbnail Play Ransomware Goes Commercial - Now Offered as a Service to Cybercriminals
thumbnail Diamond Sleet supply chain compromise distributes a modified CyberLink installer
thumbnail Welltok data breach exposes data of 8.5 million US patients
thumbnail Japan space agency hit with cyberattack, rocket and satellite info not accessed | Reuters
thumbnail InfectedSlurs Botnet Spreads Mirai via Zero-Days
thumbnail Spyware Targeting Against Serbian Civil Society - The Citizen Lab
thumbnail Spyware in Serbia: civil society under attack - Access Now
thumbnail DP World confirms data stolen in cyberattack, no ransomware used
thumbnail DPRK Crypto Theft | macOS RustBucket Droppers Pivot to Deliver KandyKorn Payloads
thumbnail Report claims to reveal identity of Russian hacktivist leader
thumbnail 440,000 Sets of Personal Info Affected by Hack of Line Operator | Nippon.com
thumbnail Telekopye: Chamber of Neanderthals’ secrets
thumbnail Into the Trash: Analyzing LitterDrifter
thumbnail Concevis: des données du fisc auraient fuité (update 3)
thumbnail iPhone: Why Apple is working hard to break into its own phones
thumbnail USB worm unleashed by Russian state hackers spreads worldwide
thumbnail Thousands of routers and cameras vulnerable to new 0-day attacks by hostile botnet | Ars Technica
thumbnail The Ticking Supply Chain Attack Bomb of Exposed Kubernetes Secrets
thumbnail How to bypass Windows Hello, log into vulnerable laptops
thumbnail Le Conseil fédéral clarifie les tâches de l’Office fédéral de la cybersécurité
thumbnail CVE-2023-46604 (Apache ActiveMQ) Vulnerability Exploited to Infect Systems With Cryptominers and Rootkits
thumbnail Hacking Employers and Seeking Employment: Two Job-Related Campaigns Bear Hallmarks of North Korean Threat Actors
thumbnail Meet the Unique New "Hacking" Group: AlphaLock
thumbnail Artificial Intelligence in Education – Legal Best Practices
thumbnail Building an Exploit for FortiGate Vulnerability…
thumbnail InfectedSlurs Botnet Spreads Mirai via Zero-Days
thumbnail Understanding the Phobos affiliate structure and activity
thumbnail Atomic Stealer distributed to Mac users via fake browser updates
thumbnail Les Suisses préoccupés par leur cybersécurité même s'ils sont rarement touchés
thumbnail Rhysida ransomware gang claims attack on British Library • The Register
thumbnail Nearly 9 million patients' records compromised in data breach
thumbnail Lumma Stealer malware now uses trigonometry to evade detection
thumbnail Combien de PME mettent la clé sous la porte après une cyberattaque ? | LeMagIT
thumbnail Pourquoi les hackers russes sont plus dangereux que jamais
thumbnail GitHub - yunuscadirci/DIALStranger: details about DIAL protocol vulnerabilities
thumbnail Thornaby: Woman targeted in £13k train station QR code scam
thumbnail 2023’s ransomware rookies are a remix of Conti and other classics
thumbnail Hackers swipe Booking.com, damage from attack is global
thumbnail Arnaque: les clients de booking.com ciblés par des pirates
thumbnail Gang says ICBC paid ransom over hack that disrupted US Treasury market | Reuters
thumbnail Toyota confirms breach after Medusa ransomware threatens to leak data
thumbnail Les 10 principales vulnérabilités des modèles GPT
thumbnail Zimbra 0-day used to target international government organizations
thumbnail European Telecom Body to Open-Source Radio Encryption System
thumbnail Uncovering thousands of unique secrets in PyPI packages
thumbnail In a first, cryptographic keys protecting SSH connections stolen in new attack | Ars Technica
thumbnail Google’s new Titan Security Keys let you store passkeys
thumbnail Intel fixes high-severity CPU bug that causes “very strange behavior”
thumbnail A Closer Look at ChatGPT's Role in Automated Malware Creation
thumbnail The Mirai Confessions: Three Young Hackers Who Built a Web-Killing Monster Finally Tell Their Story | WIRED
thumbnail C3RB3R Ransomware | Ongoing Exploitation of CVE-2023-22518 Targets Unpatched Confluence Servers  - SentinelOne
thumbnail Google researchers discover 'Reptar,’ a new CPU vulnerability
thumbnail District of Puerto Rico | Russian and Moldovan National Pleads Guilty to Operating Illegal Botnet Proxy Service that Infected Tens of Thousands of Internet-Connected Devices Around the World | United States Department of Justice
thumbnail Microsoft Patch Tuesday November 2023
thumbnail La nLPD est directement applicable à l’intelligence artificielle
thumbnail The $2,000 Phones that Let Anyone Make Robocalls
thumbnail Child sexual abuse online: effective measures, no mass surveillance
thumbnail Nothing new, still broken, insecure by default since then: Python's e-mail libraries and certificate verification
thumbnail GameOver(lay) - Local Privilege Escalation in Ubuntu Kernel
thumbnail Rançongiciel Phobos : arrestation de deux Russes, soupçonnés d’une dizaine d’attaques en France
thumbnail Malaysian Police Dismantle “BulletProftLink” Phishing Operation
thumbnail Bitter Pill: Third-Party Pharmaceutical Vendor Linked to Pharmacy and Health Clinic Cyberattack
thumbnail Cybersécurité: plus de trois mois pour colmater une faille
thumbnail Ivanti EPMM CVE-2023-39335/39337
thumbnail Détournement de Microsoft et Cloudflare au cours d’une nouvelle attaque de QRishing
thumbnail Here’s How Violent Extremists Are Exploiting Generative AI Tools
thumbnail DP World: Australian ports to remain closed as AFP investigates cybersecurity breach
thumbnail Apple neglects to patch multiple critical vulnerabilities in macOS
thumbnail CVE-2023-38548
thumbnail Detecting “Effluence”, an Unauthenticated Confluence Web Shell
thumbnail ICBC hit by ransomware impacting global trades
thumbnail Dozens of npm Packages Caught Attempting to Deploy Reverse Shell
thumbnail Nude “before and after” photos stolen from plastic surgeon, posted online, and sent to victims' family and friends
thumbnail Ransomware attack on ICBC disrupts trades in US Treasury market
thumbnail Cloudflare website downed by DDoS attack claimed by Anonymous Sudan
thumbnail Microsoft Temporarily Blocked Internal Access to ChatGPT, Citing Data Concerns
thumbnail Atlassian confirms ransomware is exploiting latest Confluence bug
thumbnail Sandworm Disrupts Power in Ukraine Using a Novel Attack Against Operational Technology
thumbnail Malvertiser copies PC news site to deliver infostealer
thumbnail Android Kitchen Sink: Send BLE spam to iOS, Android and Windows at once using Android app - Mobile Hacker
thumbnail SysAid Zero-Day Vulnerability Exploited by Ransomware Group
thumbnail SysAid On-Prem Software CVE-2023-47246 Vulnerability
thumbnail Microsoft offers politicians protection against deepfakes
thumbnail Predator AI | ChatGPT-Powered Infostealer Takes Aim at Cloud Platforms
thumbnail Infomaniak intègre une IA souveraine à son service d'e-mails
thumbnail Python obfuscation traps
thumbnail Common Vulnerability Scoring System
thumbnail ATT&CK v14 Unleashes Detection Enhancements, ICS Assets, and Mobile Structured Detections | by Amy L. Robertson
thumbnail Jamf Threat Labs Discovers Malware from BlueNoroff
thumbnail Critical Atlassian Confluence bug exploited in Cerber ransomware attacks
thumbnail Not so lucky: BlackCat is back!
thumbnail Discord will switch to temporary file links to block malware delivery
thumbnail Elastic catches DPRK passing out KANDYKORN — Elastic Security Labs
thumbnail AI companies have all kinds of arguments against paying for copyrighted content
thumbnail GhostSec offers Ransomware-as-a-Service Possibly Used to Target Israel
thumbnail Suspected Exploitation of Apache ActiveMQ CVE-2023-46604
thumbnail Four dozen countries declare they won't pay ransomware ransoms | CyberScoop
thumbnail Apple 'Find My' network can be abused to steal keylogged passwords
thumbnail Send My: Arbitrary data transmission via Apple's Find My network | Positive Security
thumbnail New Microsoft Exchange zero-days allow RCE, data theft attacks
thumbnail Microsoft is overhauling its software security after major Azure cloud attacks
thumbnail How Kopeechka, an Automated Social Media Accounts Creation Service, Can Facilitate Cybercrime
thumbnail Mozi botnet goes dark under mysterious circumstances
thumbnail How a tiny Pacific Island became the global capital of cybercrime
thumbnail FIRST Announces CVSS 4.0 - New Vulnerability Scoring System
thumbnail Microsoft profiles new threat group with unusual but effective practices
thumbnail Octo Tempest crosses boundaries to facilitate extortion, encryption, and destruction
thumbnail Boeing says 'cyber incident' hit parts business after ransom threat | Reuters
thumbnail CVE-2023-46604
thumbnail Massive ransomware attack hinders services in 70 German municipalities
thumbnail 2022 RTF Global Ransomware Incident Map: Attacks continue worldwide, groups splinter, education sector hit hard
thumbnail Massive cybercrime URL shortening service uncovered via DNS data
thumbnail CVE-2023-46747
thumbnail Atlassian warns of critical Confluence flaw leading to data loss
thumbnail SEC accuses SolarWinds CISO of misleading investors before Russian cyberattack | TechCrunch
thumbnail Surge in QR Code Quishing: Check Point Records 587% Attack Spike
thumbnail Two Developers of the Ragnar Locker Ransomware Arrested in Spain
thumbnail GHOSTPULSE haunts victims using defense evasion bag o' tricks
thumbnail FakeUpdateRU Chrome Update Infection Spreads Trojan Malware
thumbnail 3 new NGINX ingress controller Kubernetes related vulnerabilities
thumbnail Introducing HAR Sanitizer: secure HAR sharing
thumbnail HackerOne paid ethical hackers over $300 million in bug bounties
thumbnail SIM Swappers Are Working Directly with Ransomware Gangs Now
thumbnail CVE-2023-45498: RCE in VinChin Backup
thumbnail Compromising F5 BIGIP with Request Smuggling | CVE-2023-46747
thumbnail Chatbot Hallucinations Are Poisoning Web Search
thumbnail European govt email servers hacked using Roundcube zero-day
thumbnail A cascade of compromise: unveiling Lazarus' new campaign
thumbnail Hyundai to hold software-upgrade clinics across the US for vehicles targeted by thieves | AP News
thumbnail StripedFly: Perennially flying under the radar
thumbnail Triangulation: validators, post-compromise activity and modules | Securelist
thumbnail VMSA-2023-0023
thumbnail Hackers can force iOS and macOS browsers to divulge passwords and much more
thumbnail Partout, les passkeys remplacent les mots de passe. Au tour des entreprises?
thumbnail Now Android and Windows devices aren't safe from Flipper Zero either | ZDNET
thumbnail Citrix warns admins to patch NetScaler CVE-2023-4966 bug immediately
thumbnail CVE-2023-4966: NetScaler Critical Security Update Now Available
thumbnail Battling a new DarkGate malware campaign with Malwarebytes MDR
thumbnail Citrix Bleed: Leaking Session Tokens with CVE-2023-4966
thumbnail Okta incident and 1Password | 1Password
thumbnail 1Password Detects Suspicious Activity Following Okta Support Breach
thumbnail Spain police dismantled a cybercriminal group who stole data of 4 million individuals
thumbnail Okta stock falls after company says client files accessed by hackers via support system
thumbnail How Cloudflare mitigated yet another Okta compromise
thumbnail CVE-2023-38831 Exploited by Pro-Russia Hacking Groups in RU-UA Conflict Zone for Credential Harvesting Operations
thumbnail Measures taken following the unprecedented cyber-attack on the ICC
thumbnail Switzerland’s e-voting system has predictable implementation blunder
thumbnail Un cybercriminel russe membre du gang Ragnar Locker arrêté en France
thumbnail Cisco discloses new IOS XE zero-day exploited to deploy malware implant
thumbnail D-Link confirms data breach after employee phishing attack
thumbnail Ragnar Locker ransomware gang taken down by international police swoop
thumbnail Casio keyed up after data loss hits customers in 149 countries • The Register
thumbnail Ukrainian activists hack Trigona ransomware gang, wipe servers
thumbnail Ragnar Locker ransomware’s dark web extortion sites seized by police
thumbnail CIA exposed to intelligence interception due to X's URL bug
thumbnail The forgotten malvertising campaign
thumbnail Hackers exploit critical flaw in WordPress Royal Elementor plugin
thumbnail Active exploitation of Cisco IOS XE Software Web Management User Interface vulnerability
thumbnail Lausanne veut 2,24 millions pour sa sécurité IT
thumbnail L’attaque contre Xplain bloque la modernisation de l’IT de la police vaudoise
thumbnail Les polices vaudoises hésitent à numériser l’ensemble de leurs activités avec Xplain - rts.ch - Vaud
thumbnail Disclosing the BLOODALCHEMY backdoor
thumbnail Coordinated Disclosure: 1-Click RCE on GNOME (CVE-2023-43641)
thumbnail LinkedIn Smart Links Fuel Credential Phishing Campaign
thumbnail Users of Telegram, AWS, and Alibaba Cloud targeted in latest supply chain attack
thumbnail The evolution of Windows authentication
thumbnail Balada Injector Targets Unpatched tagDiv Plugin, Newspaper Theme & WordPress Admins
thumbnail Steam Adds Security Layer for Devs After Some Had Their Accounts Compromised and Malware Was Injected in Games
thumbnail The Predator Files: European Spyware Consortium Supplied Despots and Dictators
thumbnail IZ1H9 Campaign Enhances Its Arsenal with Scores of Exploits | FortiGuard Labs
thumbnail HTTP/2 Rapid Reset: deconstructing the record-breaking attack
thumbnail The Art of Concealment: A New Magecart Campaign That’s Abusing 404 Pages | Akamai
thumbnail Plus de la moitié des aînés ciblés par des cyber-escrocs
thumbnail Les hôpitaux de Vittel et Neufchâteau victimes d'une cyberattaque
thumbnail 23andMe User Data Stolen in Targeted Attack on Ashkenazi Jews
thumbnail 90s Vulns In 90s Software (Exim) - Is the Sky Falling?
thumbnail Rules of engagement issued to hacktivists after chaos
thumbnail Android TV Boxes Infected with Backdoors, Compromising Home Networks
thumbnail X-Force uncovers global NetScaler Gateway credential harvesting campaign
thumbnail n their push for AI-generated content, tech companies are dancing on the edge between fucking around and finding out.
thumbnail Genetics firm 23andMe says user data stolen in credential stuffing attack
thumbnail Mirai Botnet's New Wave: hailBot,kiraiBot, catDDoS, and Their Fierce Onslaught - NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks.
thumbnail New Supermicro BMC Vulnerabilities Could Expose Many Servers to Remote Attacks
thumbnail Binarly REsearch Uncovers Major Vulnerabilities in Supermicro BMCs
thumbnail The evolutionary tale of a persistent Python threat 
thumbnail CVE: Zero-Day Privilege Escalation in Confluence Server & Data Center
thumbnail Coop et Migros vendent des données clients à des entreprises tierces
thumbnail Sony confirms data breach impacting thousands in the U.S.
thumbnail CVE-2023-4911: Looney Tunables - Local Privilege Escalation in the glibc’s ld.so
thumbnail Vulnerable Arm GPU drivers under active exploitation. Patches may not be available | Ars Technica
thumbnail Qualcomm says hackers exploit 3 zero-days in its GPU, DSP drivers
thumbnail Microsoft Defender Flags Tor Browser as a Trojan and Removes it from the System
thumbnail Critical vulnerabilities in Exim threaten over 250k email servers worldwide | Ars Technica
thumbnail Cisco urges admins to fix IOS software zero-day exploited in attacks
thumbnail Routers have been rooted by Chinese spies US and Japan warn
thumbnail NSA chief announces new AI Security Center, 'focal point' for AI use by government, defense industry
thumbnail Vulnerability in popular ‘libwebp’ code more widespread than expected
thumbnail CVE-2023-42793
thumbnail New GPU Side-Channel Attack Allows Malicious Websites to Steal Data
thumbnail Sony Investigating After Hackers Offer to Sell Stolen Data
thumbnail Decade of newborn child registry data stolen in MOVEit mass-hack
thumbnail Deux jeunes hackers jugés pour une campagne de mails « cryptoporno » en 2019
thumbnail From ScreenConnect to Hive Ransomware in 61 hours
thumbnail PREDATOR IN THE WIRES: Ahmed Eltantawy Targeted with Predator Spyware After Announcing Presidential Ambitions
thumbnail 0-days exploited by commercial surveillance vendor in Egypt
thumbnail All thanks to ‘Big Yellow Taxi’: How State discovered Chinese hackers reading its emails
thumbnail New Apple Zero-Days Exploited to Target Egyptian ex-MP with Predator Spyware
thumbnail Apple emergency updates fix 3 new zero-days exploited in attacks
thumbnail International Criminal Court hit with a cyber attack
thumbnail US-Canada water commission confirms 'cybersecurity incident"
thumbnail GitLab addressed critical vulnerability CVE-2023-5009
thumbnail Trend Micro addresses actively exploited zero-day in Apex One
thumbnail [CVE-2023-42752] integer overflow in Linux kernel leading to exploitable memory access
thumbnail Fake CVE-2023-40477 Proof of Concept Leads to VenomRAT
thumbnail 38TB of data accidentally exposed by Microsoft AI researchers | Wiz Blog
thumbnail Leaked Microsoft documents hint at new Doom and Dishonored games
thumbnail Microsoft AI Employee Accidentally Leaks 38TB of Data
thumbnail New Python NodeStealer Goes Beyond Facebook Credentials, Now Stealing All Browser Cookies and Login Credentials
thumbnail BlackCat ransomware hits Azure Storage with Sphynx encryptor
thumbnail Ransomware flingers hit Manchester cops in the supply chain • The Register
thumbnail TikTok fined €345M by Irish DPC for violating children’s privacy
thumbnail When MFA isn't actually MFA
thumbnail How Google Authenticator made one company’s network breach much, much worse
thumbnail Can't Be Contained: Finding a Command Injection Vulnerability in Kubernetes
thumbnail Update Adobe Acrobat and Reader to Patch Actively Exploited Vulnerability
thumbnail Argent russe: la place financière suisse rattrapée par une fuite de données
thumbnail macOS MetaStealer | New Family of Obfuscated Go Infostealers Spread in Targeted Attacks
thumbnail Trojanized Free Download Manager found to contain a Linux backdoor
thumbnail Threat actor leaks sensitive data belonging to Airbus
thumbnail Mozilla patches Firefox, Thunderbird against zero-day exploited in attacks
thumbnail Critical WebP bug: many apps, not just browsers, under threat
thumbnail With 0-days hitting Chrome, iOS, and dozens more this month, is no software safe? | Ars Technica
thumbnail PSA: Ongoing Webex malvertising campaign drops BatLoader
thumbnail Attacker combines phone, email lures into believable, complex attack chain
thumbnail Ransomware crew hits Save The Children, steals 7TB of data
thumbnail Microsoft to defend customers on AI copyright challenges
thumbnail ChatGPT fails in languages like Tamil and Bengali
thumbnail KNVB paid ransom to prevent cyber criminals from publishing footballers' passports
thumbnail Cybersecurity issue prompts computer shutdowns at MGM Resorts properties across US
thumbnail Active North Korean campaign targeting security researchers
thumbnail North Korea-backed hackers target security researchers with 0-day
thumbnail Mozilla Report Finds That New Cars Give Out Lots of Your Info
thumbnail The International Criminal Court Will Now Prosecute Cyberwar Crimes
thumbnail Last Week on My Mac: How quickly can Apple release a security update?
thumbnail China’s iPhone ban expected to expand to more government agencies soon
thumbnail Code Vulnerabilities Put Proton Mails at Risk
thumbnail Mac users targeted in new malvertising campaign delivering Atomic Stealer
thumbnail Apple discloses 2 new zero-days exploited to attack iPhones, Macs
thumbnail How China Demands Tech Firms Reveal Hackable Flaws in Their Products
thumbnail Rockstar Games reportedly sold games with Razor 1911 cracks on Steam
thumbnail Compromised Microsoft Key: More Impactful Than We Thought
thumbnail Thinking about the security of AI systems
thumbnail Developers Warned of Malicious PyPI, NPM, Ruby Packages Targeting Macs - SecurityWeek
thumbnail Nascent Malware Campaign Targets npm, PyPI, and RubyGems Developers
thumbnail What's in a NoName? Researchers see a lone-wolf DDoS group
thumbnail Okta customers targeted in social engineering scam
thumbnail Attackers access military data through fencing supplier
thumbnail China Bans iPhone Use for Government Officials at Work
thumbnail Zaun Data Breach
thumbnail Is macOS’s new XProtect behavioural security preparing to go live?
thumbnail Apple’s Decision to Kill Its CSAM Photo-Scanning Tool Sparks Fresh Controversy
thumbnail The Emergence of Ransomed: An Uncertain Cyber Threat in the Making
thumbnail Pay our ransom instead of a GDPR fine, cybercrime gang tells its targets
thumbnail Healthcare Organizations Hit by Cyberattacks Last Year Reported Big Impact, Costs
thumbnail VMConnect supply chain attack continues, evidence points to North Korea - Security Boulevard
thumbnail An Ongoing Open Source Attack Reveals Roots Dating Back To 2021
thumbnail New Twitter scam in China: sextortion scammers
thumbnail Hackers modify open-source ‘SapphireStealer’ malware, leading to multiple variants
thumbnail LogicMonitor customers hit by hackers, because of default passwords | TechCrunch
thumbnail Unmasking Trickbot, One of the World’s Top Cybercrime Gangs
thumbnail Qakbot Malware Takedown and Defending Forward
thumbnail Raising Online Defenses Through Transparency and Collaboration | Meta
thumbnail How NightOwl for Mac Added a Botnet
thumbnail It Costs Just $400 to Build an AI Disinformation Machine
thumbnail Xplain: les données de procédures pénales en cours sont sur le darknet
thumbnail Exposing DuckTail
thumbnail Qakbot botnet infrastructure shattered after international operation
thumbnail The Cheap Radio Hack That Disrupted Poland’s Railway System
thumbnail Qakbot botnet dismantled after infecting over 700,000 computers
thumbnail Diving Deep into UNC4841 Operations Following Barracuda ESG Zero-Day Remediation (CVE-2023-2868)
thumbnail Attacks on Citrix NetScaler systems linked to ransomware actor
thumbnail Adversary On The Defense: ANTIBOT.PW
thumbnail #FuckStalkerware pt. 3 - ownspy got, well, owned
thumbnail GTA 6 Hacker Found To Be Teen With Amazon Fire Stick In Small Town Hotel Room
thumbnail Lapsus$: Court finds teenagers carried out hacking spree
thumbnail Security advisory: malicious crate rustdecimal
thumbnail Poland investigates cyber-attack on rail network - BBC News
thumbnail Met Police admits details of officers at risk of exposure after warrant card supplier was hacked
thumbnail CVE-2023-36844 And Friends: RCE In Juniper Devices
thumbnail MOVEit, the biggest hack of the year, by the numbers
thumbnail Technical Advisory – SonicWall Global Management System (GMS) & Analytics – Multiple Critical Vulnerabilities
thumbnail Lazarus Group exploits ManageEngine vulnerability to deploy QuiteRAT
thumbnail Time keeps on slippin’ slippin’ slippin’: The 2023 Active Adversary Report for Tech Leaders – Sophos News
thumbnail Ransomware infection wipes all CloudNordic servers
thumbnail Fake Roblox packages target npm with Luna Grabber information-stealing malware
thumbnail Genève: Un élu a farfouillé sans droit dans les fichiers de la justice
thumbnail WinRAR 0-day that uses poisoned JPG and TXT files under exploit since April | Ars Technica
thumbnail Using WinRAR? Be sure to patch against these code execution bugs… – Naked Security
thumbnail #NoFilter - Abusing Windows Filtering Platform for Privilege Escalation
thumbnail British court convicts two teen Lapsus$ members of hacking tech firms
thumbnail XLoader's Latest Trick | New macOS Variant Disguised as Signed OfficeNote App
thumbnail Ecuador’s national election agency says cyberattacks caused absentee voting issues
thumbnail CVE-2023-34127
thumbnail Sneaky Amazon Google ad leads to Microsoft support scam
thumbnail Ivanti warns of new actively exploited MobileIron zero-day bug
thumbnail Brazilian hacker claims Bolsonaro asked him to hack into the voting system ahead of 2022 vote | AP News
thumbnail Data Theft Via MOVEit: 4.5 Million More Individuals Affected
thumbnail Chinese Microsoft hackers also hit GOP Rep. Don Bacon of Nebraska
thumbnail Threat actors use beta apps to bypass mobile app store security
thumbnail New Apple iOS 16 Exploit Enables Stealthy Cellular Access Under Fake Airplane Mode
thumbnail Approximately 2000 Citrix NetScalers backdoored in mass-exploitation campaign
thumbnail Discord.io confirms breach after hacker steals data of 760K users
thumbnail Piratage des numéros de téléphone des policiers bernois
thumbnail Des pirates informatiques s'emparent des données de 2800 policiers bernois
thumbnail The New Frontline of Geopolitics | Understanding the Rise of State-Sponsored Cyber Attacks
thumbnail Phishing pages placed on hacked websites
thumbnail Users of cybercrime forums often fall victim to info-stealers, researchers find
thumbnail Prominent Threat Actor Accidentally Infects Own Computer with Info-Stealer
thumbnail Notorious phishing platform shut down, arrests in international police operation
thumbnail LinkedIn under attack, malicious hackers seize accounts
thumbnail PowerHell: Active Flaws in PowerShell Gallery Expose Users to Attacks
thumbnail Dark Web Profile: 8Base Ransomware
thumbnail Raccoon Stealer Announce Return After Hiatus
thumbnail 'DoubleDrive' attack turns Microsoft OneDrive into ransomware
thumbnail This $70 device can spoof an Apple device and trick you into sharing your password
thumbnail Livraison de chars à l’Ukraine: des cyberpirates russes publient un document du Seco
thumbnail Ransomware tracker: The latest figures [August 2023]
thumbnail Faire de la cybersécurité une tâche régalienne
thumbnail Meet NoEscape: Avaddon ransomware gang's likely successor
thumbnail Stealth Mode: Chinese Cyber Espionage Actors Continue to Evolve Tactics to Avoid Detection | Mandiant
thumbnail Mac systems turned into proxy exit nodes by AdLoad
thumbnail An Apple Malware-Flagging Tool Is ‘Trivially’ Easy to Bypass
thumbnail Want to pwn a satellite? Turns out it's surprisingly easy
thumbnail New ‘Downfall’ Flaw Exposes Valuable Data in Generations of Intel Chips
thumbnail Analysis: MOVEit hack spawned over 600 breaches but is not done yet -cyber analysts | Reuters
thumbnail Biden-Harris Administration Launches Artificial Intelligence Cyber Challenge to Protect America’s Critical Software | The White House
thumbnail Cyber-attack on UK's electoral registers revealed
thumbnail 5 arrested in Poland for running bulletproof hosting service for cybercrime gangs | Europol
thumbnail Des hackers ont accédé aux données client d’une banque en ligne
thumbnail Des pirates informatiques russes ont publié un document sensible de la Confédération
thumbnail Microsoft’s Role in Email Breach by Suspected Chinese Hackers Part of US Inquiry
thumbnail “Please do not make it public”: Vulnerabilities in Sogou Keyboard encryption expose keypresses to network eavesdropping
thumbnail Researchers watched 100 hours of hackers hacking honeypot computers
thumbnail Interpol takes down 16shop phishing-as-a-service platform
thumbnail Nearly every AMD CPU since 2017 vulnerable to Inception bug
thumbnail Electoral Commission apologises for security breach involving UK voters’ data | Electoral Commission | The Guardian
thumbnail Spyware maker LetMeSpy shuts down after hacker deletes server data
thumbnail Don’t you (forget NLP): Prompt injection with control characters in ChatGPT
thumbnail Midnight Blizzard conducts targeted social engineering over Microsoft Teams
thumbnail Tenable CEO accuses Microsoft of negligence in addressing security flaw
thumbnail CVE-2023-35082 - MobileIron Core Unauthenticated API Access Vulnerability | Rapid7 Blog
thumbnail Guarding the Bridge: New Attack Vectors in Azure AD Connect
thumbnail Reptile Malware Targeting Linux Systems
thumbnail Microsoft…The Truth Is Even Worse Than You Think
thumbnail Russia-backed hackers used Microsoft Teams to breach government agencies | TechCrunch
thumbnail Unpacking the Threats Within: The Hidden Dangers of .zip Domains
thumbnail Into the tank with Nitrogen
thumbnail Tomcat Under Attack: Exploring Mirai Malware and Beyond
thumbnail Malicious Batch File (*.bat) Disguised as a Document Viewer Being Distributed (Kimsuky)
thumbnail Apple Crimeware | Massive Rust Infostealer Campaign Aiming for macOS Sonoma Ahead of Public Release
thumbnail GameOverlay Vulnerability Impacts 40% of Ubuntu Workloads
thumbnail TETRA Radio Code Encryption Has a Flaw: A Backdoor
thumbnail Critical Infrastructure Companies Warned to Watch for Ongoing Cyberattack
thumbnail Ivanti warns of second vulnerability used in attacks on Norway gov’t
thumbnail U.S. Hunts Chinese Malware That Could Disrupt American Military Operations
thumbnail Two privilege escalation flaws affect 40% of Ubuntu workloads in OverlayFS
thumbnail Almost 40% of Ubuntu users vulnerable to new privilege elevation flaws
thumbnail Cryptojacking: Understanding and defending against cloud compute resource abuse
thumbnail Apple issues third mobile OS update after zero-click spyware campaign
thumbnail DDoS threat report for 2023 Q2
thumbnail Apple slams UK surveillance-bill proposals
thumbnail Threat Actors Add .zip Domains to Their Phishing Arsenals
thumbnail JumpCloud says 'nation state' gang hit some customers
thumbnail CVE-2023-38408: Remote Code Execution in OpenSSH’s forwarded ssh-agent
thumbnail [Security Update] Incident Details
thumbnail WormGPT - The Generative AI Tool Cybercriminals Are Using to Launch BEC Attacks
thumbnail Microsoft takes pains to obscure role in 0-days that caused email breach
thumbnail Inside the subsea cable firm secretly helping American take on China
thumbnail WormGPT: New AI Tool Allows Cybercriminals to Launch Sophisticated Cyber Attacks
thumbnail WordPress plugin installed on 1 million+ sites logged plaintext passwords
thumbnail AVrecon malware infects 70,000 Linux routers to build botnet
thumbnail BlackLotus UEFI Bootkit Source Code Leaked on GitHub
thumbnail Cybercriminalité : sept suspects identifiés pour du « phishing / hameçonnage »
thumbnail Piratage de Xplain: La Confédération menacée par une vague de plaintes
thumbnail Microsoft changes signing key system breached by Chinese hackers to steal US gov’t data
thumbnail ShadowVault is the latest Mac data-stealer malware, reportedly
thumbnail Uncovering weaknesses in Apple macOS and VMWare vCenter: 12 vulnerabilities in RPC implementation
thumbnail Chinese hackers breached US government email accounts, Microsoft and White House say | CNN Politics
thumbnail Chinese hackers breached U.S. and European government email through Microsoft bug
thumbnail Les données de hooligans ayant sévi en Suisse publiées sur le darknet (update) | ICTjournal
thumbnail The Spies Who Loved You: Infected USB Drives to Steal Secrets
thumbnail Hackers exploit gaping Windows loophole to give their malware kernel access
thumbnail Microsoft Revokes Malicious Drivers in Patch Tuesday Culling
thumbnail Apple confirms WebKit security updates break browsing on some sites
thumbnail Apple releases emergency update to fix zero-day exploited in attacks
thumbnail Inside the secret cyberwar against Putin’s regime
thumbnail Storm-0978 attacks reveal financial and espionage motives
thumbnail HCA Healthcare patient data stolen and for sale by hackers
thumbnail Six Malicious Python Packages in the PyPI Targeting Windows Users
thumbnail It’s Raining Phish and Scams – How Cloudflare Pages.dev and Workers.dev Domains Get Abused | Trustwave
thumbnail The five-day job: A BlackByte ransomware intrusion case study
thumbnail Une entreprise genevoise au cœur d’une vaste opération d’influence des Emirats arabes unis
thumbnail Unmasking the Meduza Stealer: Comprehensive Analysis & Countermeasures
thumbnail Two spyware tied with China found hiding on the Google Play Store
thumbnail Operation Brainleeches: Malicious npm packages fuel supply chain and phishing attacks
thumbnail Hacks targeting British exam boards raise fears of students cheating
thumbnail FBI digital sting against Hive cybercrime group shows the promise — and limits — of hacking hackers
thumbnail Port of Nagoya cyberattack: Japanese port paralysed by LockBit
thumbnail BlueNoroff | How DPRK’s macOS RustBucket Seeks to Evade Analysis and Detection -
thumbnail Suspected key figure of notorious cybercrime group arrested in joint operation
thumbnail Clop Ransomware: History, Timeline, And Adversary Simulation
thumbnail BlackCat Operators Distributing Ransomware Disguised as WinSCP via Malvertising
thumbnail Campagne MOVEit : Cl0p divulgue une grande quantité de données volées à Cegedim
thumbnail Au mois de juin, la menace des infostealers n’a pas faibli
thumbnail Following NoName057(16) DDoSia Project’s Targets
thumbnail Chinese Threat Actors Targeting Europe in SmugX Campaign
thumbnail Detecting Popular Cobalt Strike Malleable C2 Profile Techniques
thumbnail Malvertising Used as Entry Vector for BlackCat Actors Also Leverage SpyBoy Terminator
thumbnail Decrypted: Akira Ransomware
thumbnail NCSC marks 20th anniversary of first response to state-sponsored cyber attack
thumbnail TSMC Says Supplier Hacked After Ransomware Group Claims Attack on Chip Giant
thumbnail A cause de la cyberattaque contre Xplain, des secrets d'Etat sont en ligne
thumbnail Des données confidentielles sur des conseillers fédéraux volées lors de la cyberattaque
thumbnail High school changes every student’s password to ‘Ch@ngeme!’
thumbnail CVE-2023-27997 is Exploitable, and 69% of FortiGate…
thumbnail TSMC confirms data breach after LockBit cyberattack on third-party supplier
thumbnail Malware Execution Method Using DNS TXT Record
thumbnail SEC notifies SolarWinds CISO and CFO of possible action in cyber investigation
thumbnail Tracing Ransomware Threat Actors Through Stylometric Analysis and Chat Log Examination
thumbnail Une équipe d’intervention cantonale épaulera les communes vaudoises en cas de cyberattaque
thumbnail Akira Ransomware Extends Reach to Linux Platform
thumbnail Swiss intelligence warns of fallout in cyberspace as West clamps down on spies
thumbnail CHU de Rennes : un compte de prestataire détourné pour la cyberattaque
thumbnail Microsoft Teams vulnerability allows attackers to deliver malware to employees
thumbnail Dismantling encrypted criminal EncroChat communications leads to over 6 500 arrests and close to EUR 900 million seized
thumbnail Pour la loi suisse, le piratage éthique peut être licite
thumbnail VMware ESXi Zero-Day Used by Chinese Espionage Actor to Perform Privileged Guest Operations on Compromised Hypervisors
thumbnail Siemens Energy confirms data breach after MOVEit data-theft attack
thumbnail LetMeSpy, a phone tracking app spying on thousands, says it was hacked
thumbnail Process Mockingjay: Echoing RWX In Userland To Achieve Code Execution
thumbnail PindOS: New JavaScript Dropper Delivering Bumblebee and IcedID
thumbnail PyPI Attackers Still At It: Malicious Packages Drop Trojans and Info-stealers
thumbnail Emerging Threat! Exposing JOKERSPY
thumbnail IoT Under Siege: The Anatomy of the Latest Mirai Campaign Leveraging Multiple IoT Exploits
thumbnail Dissecting TriangleDB, a Triangulation spyware implant
thumbnail Condi DDoS Botnet Spreads via TP-Link's CVE-2023-1389
thumbnail BlueDelta Exploits Ukrainian Government Roundcube Mail Servers to Support Espionage Activities | Recorded Future
thumbnail ASUS urges customers to patch critical router vulnerabilities
thumbnail KeePassXC Vulnerability CVE-2023-35866 allows attackers to change the master password and second-factor authentication settings
thumbnail Anonymous Sudan: Who are the hackers behind Microsoft’s cloud outages?
thumbnail Le piratage de la société Xplain, une véritable bombe à retardement pour la Suisse
thumbnail XSS Vulnerabilities in Azure Led to Unauthorized Access to User Sessions - SecurityWeek
thumbnail Des données personnelles aussi touchées lors de la cyberattaque contre la Confédération - rts.ch - Suisse
thumbnail Piratage: la Suisse est très mauvaise élève de la cybersécurité
thumbnail Hijacking S3 Buckets: New Attack Technique
thumbnail Microsoft says early June disruptions to Outlook, cloud platform, were cyberattacks
thumbnail A simple bug exposed access to thousands of smart security alarm systems
thumbnail Cyberattaques massives contre la Suisse, huit questions pour analyser une semaine folle
thumbnail A Shady Chinese Firm’s Encryption Chips Got Inside NATO and NASA
thumbnail Barracuda ESG Zero-Day Vulnerability (CVE-2023-2868) Exploited Globally by Aggressive and Skilled Actor, Suspected Links to China
thumbnail Suspected LockBit ransomware affiliate arrested, charged in US
thumbnail Fake Security Researcher GitHub Repositories Deliver Malicious Implant
thumbnail Déferlante d’attaques DDoS en Suisse revendiquées par des hacktivistes pro-russes
thumbnail Ransomware gang lists first victims of MOVEit mass-hacks, including US banks and universities | TechCrunch
thumbnail Microsoft Encrypted Restricted Permission Messages Deliver Phishing | Trustwave
thumbnail Ce qui se cache derrière les cyberattaques pro-russes contre la Suisse
thumbnail Cadet Blizzard emerges as a novel and distinct Russian threat actor | Microsoft Security Blog
thumbnail The Phantom Menace: Brute Ratel remains rare and targeted
thumbnail TAG Aviation: Black Basta pirate une compagnie romande
thumbnail Switzerland under cyberattack
thumbnail Microsoft June 2023 Patch Tuesday fixes 78 flaws, 38 RCE bugs
thumbnail Analysis of CVE-2023-27997 and Clarifications on Volt Typhoon Campaign
thumbnail Xortigate, or CVE-2023-27997 - The Rumoured RCE That Was
thumbnail CVE-2023-34362
thumbnail Sites officiels paralysés: L’administration fédérale suisse fait l’objet d’une attaque informatique | 24 heures
thumbnail Microsoft 365 sous le feu nourri d'attaques DDoS Dominique Filippone , publié le 09 Juin 2023
thumbnail How North Korea’s Hacker Army Stole $3 Billion in Crypto, Funding Nuclear Program
thumbnail Shell Recharge security lapse exposed EV drivers’ data
thumbnail Les CFF et le canton d'Argovie aussi concernés par la cyberattaque qui a touché la société Xplain
thumbnail MOVEit Transfer and MOVEit Cloud Vulnerability
thumbnail Turkish Citizens' Personal Data Offered Online After Govt Site Hacked
thumbnail Pro-Ukraine hackers bring Russian banking system to its knees
thumbnail La commune vaudoise de Bex touchée par une cyberattaque
thumbnail Another huge US medical data breach confirmed after Fortra mass-hack
thumbnail Clop Ransomware Likely Sitting on MOVEit Transfer Vulnerability (CVE-2023-34362) Since 2021
thumbnail Analysis of CVE-2023-29336 Win32k Privilege Escalation
thumbnail Unmasking the Darkrace Ransomware Gang
thumbnail Le site web du parlement suisse attaqué par des hackers
thumbnail CVE-2023-34362: MOVEit Transfer SQL Injection Vulnerability Threat Brief
thumbnail ChatGPT creates mutating malware that evades detection by EDR
thumbnail Mass exploitation of critical MOVEit flaw is ransacking orgs big and small | Ars Technica
thumbnail Trustwave Action Response: Zero Day Exploitation of MOVEit (CVE-2023-34362)
thumbnail GobRAT malware written in Go language targeting Linux routers
thumbnail How malicious extensions hide running arbitrary code
thumbnail Hackers steal Swiss police and customs data
thumbnail Russian Radio Stations Hacked, Fake Putin Message Announcing Invasion of Russia Broadcast
thumbnail L’armée suisse et Fedpol touchés par une cyberattaque
thumbnail MOVEit hack: BBC, BA and Boots among cyber attack victims
thumbnail New Magecart-Style Campaign Abusing Legitimate Websites to Attack Others | Akamai
thumbnail Rapid7 Observed Exploitation of Critical MOVEit Transfer Vulnerability
thumbnail Enzo Biochem Ransomware Attack Exposes Information of 2.5M Individuals - SecurityWeek
thumbnail New macOS vulnerability, Migraine, could bypass System Integrity Protection | Microsoft Security Blog
thumbnail ‘Gravity Forms’ WordPress Plugin Found Vulnerable to PHP Object Injection
thumbnail Zero-Day Vulnerability in MOVEit Transfer Exploited for Data Theft
thumbnail “Clickless” iOS exploits infect Kaspersky iPhones with never-before-seen malware | Ars Technica
thumbnail A Matter of Triangulation.
thumbnail Zero Day Initiative — CVE-2023-24941: Microsoft Network File System Remote Code Execution
thumbnail Terminator antivirus killer is a vulnerable Windows driver in disguise
thumbnail Millions of Gigabyte Motherboards Were Sold With a Firmware Backdoor | WIRED
thumbnail EDR bypassing via memory manipulation techniques | WithSecure™ Labs
thumbnail Iranian dissidents take over high-security servers of regime presidency |
thumbnail New hacking forum leaks data of 478,000 RaidForums members
thumbnail Hauts-de-Seine : les petits pirates informatiques avaient rançonné le pôle Leonard de Vinci
thumbnail The professionalization of cyber crime
thumbnail ABB provides details about IT security incident
thumbnail Tesla Files: Un vol de données met Tesla dans l'embarras
thumbnail Vulnerability in GCP CloudSQL Leads to Data Exposure
thumbnail Here’s how long it takes new BrutePrint attack to unlock 10 different smartphones
thumbnail Mercenary mayhem: A technical analysis of Intellexa's PREDATOR spyware
thumbnail Inner workings revealed for “Predator,” the Android malware that exploited 5 0-days
thumbnail Old Wine in the New Bottle: Mirai Variant Targets Multiple IoT Devices
thumbnail NHS data breach: trusts shared patient details with Facebook without consent | Health | The Guardian
thumbnail Armenia spyware victims: Pegasus hacking in war
thumbnail COSMICENERGY: New OT Malware Possibly Related To Russian Emergency Response Exercises | Mandiant
thumbnail Barracuda email security appliances hacked via zero-day vulnerability (CVE-2023-2868) - Help Net Security
thumbnail Chinese Cyberespionage Group BRONZE SILHOUETTE Targets U.S. Government and Defense Organizations
thumbnail Free VPN Service SuperVPN Exposes 360 Million User Records
thumbnail Wordfence Firewall Blocks Bizarre Large-Scale XSS Campaign
thumbnail Barracuda identified a vulnerability (CVE-2023-2868) in our Email Security Gateway appliance (ESG) on May 19, 2023.
thumbnail Volt Typhoon targets US critical infrastructure with living-off-the-land techniques
thumbnail Malvertising via brand impersonation is back again
thumbnail German arms company Rheinmetall confirms Black Basta ransomware group behind cyberattack
thumbnail IT employee impersonates ransomware gang to extort employer
thumbnail Apple fixes three new zero-days exploited to hack iPhones, Macs
thumbnail Don't @ Me: URL Obfuscation Through Schema Abuse
thumbnail BlackCat Ransomware Deploys New Signed Kernel Driver
thumbnail Up to 100 cases taken over HSE cyberattack, judge told
thumbnail Beijing Bans Micron as Supplier to Big Chinese Firms, Citing National Security
thumbnail Popular Android TV boxes sold on Amazon are laced with malware
thumbnail MalasLocker ransomware targets Zimbra servers, demands charity donation
thumbnail Lemon Group’s Cybercriminal Businesses Built on Preinfected Devices
thumbnail Visualizing QakBot Infrastructure
thumbnail “FleeceGPT” mobile apps target AI-curious to rake in cash
thumbnail KeePass flaw allows retrieval of master password, PoC is public (CVE-2023-32784)
thumbnail GitHub - vdohney/keepass-password-dumper
thumbnail Discord discloses data breach after support agent got hacked
thumbnail SIM Swapping and Abuse of the Microsoft Azure Serial Console: Serial Is Part of a Well Balanced Attack
thumbnail Piratage et médias suisses, la justice entre en action
thumbnail Malicious VSCode extensions with more than 45K downloads steal PII and enable backdoors - Check Point Blog
thumbnail Review and analysis of fake Trezor cryptowallet
thumbnail FBI confirms access to Breached cybercrime forum database
thumbnail Securonix Threat Labs Security Advisory: Latest Update: Ongoing MEME#4CHAN Attack/Phishing Campaign uses Meme-Filled Code to Drop XWorm Payloads
thumbnail WordPress Plugin Vulnerability Exposed Ferrari Website to Hackers
thumbnail Hackers offer personal information of 500,000 Israeli students for sale
thumbnail Ex-ByteDance Executive Accuses TikTok Parent Company of ‘Lawlessness’
thumbnail How an Indiana hospital fought to recover from a cyberattack
thumbnail The Race to Patch: Attackers Leverage Sample Exploit Code in Wordpress Plugin | Akamai
thumbnail Toyota: Car location data of 2 million customers exposed for ten years
thumbnail «Cloud souverain»: les cantons latins avancent groupés et font un appel du pied à la Confédération
thumbnail Multinational tech firm ABB hit by Black Basta ransomware attack
thumbnail White Phoenix: Beating Intermittent Encryption
thumbnail Critical Privilege Escalation in Essential Addons for Elementor Plugin Affecting 1+ Million Sites
thumbnail Uncovering RedStinger - Undetected APT cyber operations in Eastern Europe since 2020
thumbnail Akira Ransomware is “bringin’ 1988 back”
thumbnail infosec company owned completely by 4chan user
thumbnail Google will provide dark web monitoring to all US Gmail users
thumbnail Ghost in the network
thumbnail Cybersecurity Firm Breach Exposes Tobacco Giant Philip Morris
thumbnail Tennessee, Georgia colleges respond to cyberattacks as school year wraps up
thumbnail New phishing-as-a-service tool “Greatness” already seen in the wild
thumbnail Leak of Intel Boot Guard Keys Could Have Security Repercussions for Years
thumbnail Deconstructing a Cybersecurity Event
thumbnail Global Surveillance: The Secretive Swiss Dealer Enabling Israeli Spy Firms - National Security & Cyber
thumbnail Justice Department Announces Court-Authorized Disruption of the Snake Malware Network Controlled by Russia's Federal Security Service
thumbnail How macOS now tracks the provenance of apps
thumbnail Snake: Coming soon in Mac OS X flavour – Fox-IT International blog
thumbnail Microsoft May 2023 Patch Tuesday
thumbnail Apple Fails to Fully Reboot iOS Simulator Copyright Case
thumbnail oss-sec: [CVE-2023-32233] Linux kernel use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary reads and writes in kernel memory
thumbnail ‘PlugwalkJoe’ pleads guilty for the massive 2020 Twitter hack - The Verge
thumbnail The Team of Sleuths Quietly Hunting Cyberattack-for-Hire Services
thumbnail On the trail of the Dark Avenger: the most dangerous virus writer in the world
thumbnail WordPress Advanced Custom Fields Pro plugin <= 6.1.5 - Reflected Cross Site Scripting (XSS) vulnerability
thumbnail Dump these Cisco phone adapters because it's not fixing them
thumbnail Meet Akira — A new ransomware operation targeting the enterprise
thumbnail MSI Breach Leaks Intel BootGuard & OEM Image Signing Keys, Compromises Security of Over 200 Devices & Major Vendors
thumbnail OpenAI’s regulatory troubles are just beginning
thumbnail Who Gets the Algorithm? The Bigger TikTok Danger
thumbnail Can Better Training Reduce the Success Rate of Phishing Attacks?
thumbnail From Campus Rape Cases to Child Abuse Reports, ‘Worst-Case’ Data Breach Rocks MN Schools
thumbnail The malware threat landscape: NodeStealer, DuckTail, and more
thumbnail Atomic Stealer | Threat Actor Spawns Second Variant of macOS Malware Sold on Telegram
thumbnail Passkeys: What they are and how to use them
thumbnail Apple et Google s’accordent sur un cahier des charges industriel pour lutter contre le pistage
thumbnail Bad Actors Are Joining the AI Revolution: Here’s What We’ve Found in the Wild
thumbnail AI-Powered 'BlackMamba' Keylogging Attack Evades Modern EDR Security
thumbnail SolarWinds: The Untold Story of the Boldest Supply-Chain Hack
thumbnail What is a Rapid Security Response (RSR)
thumbnail BouldSpy: Android Spyware Tied to Iranian Police Targets Minorities
thumbnail Apple uses iOS and macOS Rapid Security Response feature for the first time
thumbnail FIN7 tradecraft seen in attacks against Veeam backup servers
thumbnail Investigating ChatGPT phishing detection capabilities
thumbnail AI Chatbots Have Been Used to Create Dozens of News Content Farms
thumbnail LockBit and Cl0p ransomware gangs actively exploiting Papercut vulnerabilities
thumbnail DOJ Detected SolarWinds Breach Months Before Public Disclosure
thumbnail Le Département de la défense et des banques testent le partage confidentiel de données de cybermenace
thumbnail Magecart threat actor rolls out convincing modal forms
thumbnail Hackers Leaked Minneapolis Students' Psychological Reports, Allegations of Abuse
thumbnail RTM Locker Ransomware as a Service (RaaS) Now on Linux - Uptycs
thumbnail Never Connect to RDP Servers Over Untrusted Networks
thumbnail Mirai Botnet Attackers Exploit TP-Link Router Bug
thumbnail Attackers Use Containers for Profit via TrafficStealer
thumbnail Cyble — Threat Actor Selling New Atomic macOS (AMOS) Stealer on Telegram
thumbnail VMware Patches Critical Vulnerability Disclosed at Pwn2Own Hacking Contest
thumbnail Smartphones With Popular Qualcomm Chip Secretly Share Private Information With US Chip-Maker
thumbnail Meet the hacker armies on Ukraine's cyber front line
thumbnail Analysis of Pre-Auth RCE in Sophos Web Appliance (CVE-2023-1671)
thumbnail Software Maker 3CX Was Compromised in First-of-its-Kind Threaded Supply-Chain Hack
thumbnail X_Trader Supply Chain Attack Affects Critical Infrastructure Organizations in U.S. and Europe
thumbnail Retour d'experience du Centre Hospitalier de Cahors
thumbnail 'RustBucket' malware targets macOS
thumbnail Linux malware strengthens links between Lazarus and the 3CX supply‑chain attack
thumbnail 3CX Software Supply Chain Compromise Initiated by a Prior Software Supply Chain Compromise; Suspected North Korean Actor Responsible
thumbnail Threat Actors Rapidly Adopt Web3 IPFS Technology
thumbnail ‘AuKill’ EDR killer malware abuses Process Explorer driver
thumbnail TikTok reste autorisé sur les téléphones des fonctionnaires suisses
thumbnail Cybersécurité et désinformation: Berne crée un nouveau Secrétariat d’État pour la sécurité civile
thumbnail Black Basta claims it's selling off stolen Capita data
thumbnail in2al5d p3in4er is Almost Completely Undetectable
thumbnail LockBit for Mac | How Real is the Risk of macOS Ransomware?
thumbnail Apple’s high security mode blocked NSO spyware, researchers say | TechCrunch
thumbnail Summary of the Investigation Related to CVE-2023-0669
thumbnail Triple Threat: NSO Group’s Pegasus Spyware Returns in 2022 with a Trio of iOS 15 and iOS 16 Zero-Click Exploit Chains
thumbnail QBot banker delivered through business correspondence
thumbnail CVE-2023-21554: MSMQ
thumbnail Analyzing an arm64 mach-O version of LockBit
thumbnail Linux kernel logic allowed Spectre attack on major cloud
thumbnail Google Chrome emergency update fixes first zero-day of 2023
thumbnail The (Not so) Secret War on Discord
thumbnail A Computer Generated Swatting Service Is Causing Havoc Across America
thumbnail Espionage campaign linked to Russian intelligence services
thumbnail New hacker advocacy group seeks to protect work of security researchers
thumbnail Vice Society: A Tale of Victim Data Exfiltration via PowerShell, aka Stealing off the Land
thumbnail Hackers claim vast access to Western Digital systems
thumbnail En Suisse comme en France, la vidéosurveillance progresse à une vitesse fulgurante
thumbnail Discord member details how documents leaked from closed chat group
thumbnail Nokoyawa ransomware attacks with Windows zero-day
thumbnail Microsoft’s April 2023 Patch Tuesday Addresses 97 CVEs (CVE-2023-28252)
thumbnail DEV-0196: QuaDream’s “KingsPawn” malware used to target civil society in Europe, North America, the Middle East, and Southeast Asia
thumbnail Sweet QuaDreams: A First Look at Spyware Vendor QuaDream’s Exploits, Victims, and Customers - The Citizen Lab
thumbnail Mercenary spyware hacked iPhone victims with rogue calendar invites, researchers say | TechCrunch
thumbnail Balada Injector: Synopsis of a Massive Ongoing WordPress Malware Campaign
thumbnail Data-leak flaw in Qualcomm, HiSilicon-based Wi-Fi AP chips
thumbnail MERCURY and DEV-1084: Destructive attack on hybrid environment - Microsoft Security Blog
thumbnail Cyble — Demystifying Money Message Ransomware 
thumbnail Leaked Pentagon Document Claims Russian Hacktivists Breached Canadian Gas Pipeline Company
thumbnail From Discord to 4chan: The Improbable Journey of a US Intelligence Leak - bellingcat
thumbnail MSI Confirms Breach as Ransomware Gang Claims Responsibility
thumbnail L'Anssi pourra bloquer les noms de domaine liés à des cyberattaques
thumbnail Exploit available for critical bug in VM2 JavaScript sandbox library
thumbnail Samsung Fab Workers Leak Confidential Data While Using ChatGPT
thumbnail Cyble — New Cylance Ransomware with Power-Packed CommandLine Options
thumbnail ALPHV Ransomware Affiliate Targets Vulnerable Backup Installations to Gain Initial Access
thumbnail Special Report: Tesla workers shared sensitive images recorded by customer cars | Reuters
thumbnail Apple fixes two zero-days exploited to hack iPhones and Macs
thumbnail Stopping cybercriminals from abusing security tools
thumbnail Resecurity uncovers STYX, new cybercriminal platform focused on financial fraud - Help Net Security
thumbnail Mac Malware MacStealer Spreads as Fake P2E Apps
thumbnail Troy Hunt: Seized Genesis Market Data is Now Searchable in Have I Been Pwned, Courtesy of the FBI and "Operation Cookie Monster"
thumbnail Rilide: A New Malicious Browser Extension for Stealing Cryptocurrencies
thumbnail Chinese fraudsters: evading detection and monetizing stolen credit card information
thumbnail Who Broke NPM?: Malicious Packages Flood Leading to Denial of Service
thumbnail National Cyber Force reveals how daily cyber operations protect the UK
thumbnail Winter Vivern | Uncovering a Wave of Global Espionage
thumbnail Not just an infostealer: Gopuram backdoor deployed through 3CX supply chain attack | Securelist
thumbnail Rorschach – A New Sophisticated and Fast Ransomware
thumbnail 3CX Desktop App Compromised (CVE-2023-29059)
thumbnail Android app from China executed 0-day exploit on millions of devices | Ars Technica
thumbnail Cyble — Cl0p Ransomware: Active Threat Plaguing Businesses Worldwide
thumbnail Western Digital discloses network breach, My Cloud service down
thumbnail New Money Message ransomware demands million dollar ransoms
thumbnail Pinduoduo: One of China's most popular apps has the ability to spy on its users, say experts
thumbnail Meet the FSB contractor: 0Day Technologies
thumbnail Qakbot mechanizes distribution of malicious OneNote notebooks
thumbnail Information on Attacks Involving 3CX Desktop App
thumbnail Creal: New Stealer Targeting Cryptocurrency Users Via Phishing Sites
thumbnail Privacy, a chi tocca proteggere gli studenti?
thumbnail Exploitation is a Dish Best Served Cold: Winter Vivern Uses Known Zimbra Vulnerability to Target Webmail Portals of NATO-Aligned Governments in Europe
thumbnail Spyware vendors use 0-days and n-days against popular platforms
thumbnail ‘Vulkan files’ leak reveals Putin’s global and domestic cyberwarfare tactics
thumbnail 3CX VoIP Software Compromise & Supply Chain Threats
thumbnail 3CX Security Alert for Electron Windows App
thumbnail Ironing out (the macOS details) of a Smooth Operator
thumbnail 3CX: Supply Chain Attack Affects Thousands of Users Worldwide
thumbnail Hackers compromise 3CX desktop app in a supply chain attack
thumbnail 3CX users under DLL-sideloading attack: What you need to know
thumbnail New OpcJacker Malware Distributed via Fake VPN Malvertising
thumbnail The criminal use of ChatGPT – a cautionary tale about large language models
thumbnail Guidance for investigating attacks using CVE-2023-23397
thumbnail France bans all recreational apps from government devices
thumbnail MacStealer: New macOS-based Stealer Malware Identified
thumbnail NCA infiltrates cyber crime market with disguised DDoS sites
thumbnail Throttling and Blocking Email from Persistently Vulnerable Exchange Servers to Exchange Online - Microsoft Community Hub
thumbnail La NZZ victime d'un ransomware
thumbnail Shining Light on Dark Power: Yet Another Ransomware Gang
thumbnail Raiffeisen, Cler, BCGE... Des données bancaires exposées sur le web, à l'insu des clients
thumbnail OK, it’s time to freak out about AI
thumbnail New victims come forward after mass-ransomware attack
thumbnail Emotet resumes spam operations, switches to OneNote
thumbnail Patch Tuesday -> Exploit Wednesday: Pwning Windows Ancillary Function Driver for WinSock (afd.sys) in 24 Hours
thumbnail Journalist opens USB letter bomb in newsroom
thumbnail Session Cookies, Keychains, SSH Keys and More | 7 Kinds of Data Malware Steals from macOS Users
thumbnail Reversing Emotet Dropping Javascript
thumbnail Ferrari Hacked - Attackers Compromised The Ferrari IT Systems
thumbnail Move, Patch, Get Out the Way: 2022 Zero-Day Exploitation Continues at an Elevated Pace
thumbnail BlackMamba ChatGPT Polymorphic Malware | A Case of Scareware or a Wake-up Call for Cyber Security?
thumbnail A Fake Project Related to the Sandbox Malspam
thumbnail Wave of Arrests Hits Cybercriminals
thumbnail Pixel Markup vulnerability allows screenshots to be un-redacted
thumbnail Les trackers GPS et Bluetooth, des petites balises dont il faut se méfier
thumbnail Google says hackers could silently own your phone until Samsung fixes its modems
thumbnail Everything We Know About CVE-2023-23397
thumbnail Fortinet Zero-Day and Custom Malware Used by Suspected Chinese Actor in Espionage Operation
thumbnail BatLoader Continues to Abuse Google Search Ads to Deliver…
thumbnail Microsoft patches zero-days used by state-sponsored and ransomware threat actors (CVE-2023-23397, CVE-2023-24880)
thumbnail Ransomware Attacks Have Entered a ‘Heinous’ New Phase
thumbnail Microsoft’s March 2023 Patch Tuesday Addresses 76 CVEs (CVE-2023-23397)
thumbnail Ransomware Group Claims Hack of Amazon's Ring
thumbnail Prometei botnet improves modules and exhibits new capabilities in recent updates
thumbnail Rogue CyberSecurity Company Employee Tried To Sell Powerful, Stolen iPhone Malware For $50-Million
thumbnail GoBruteforcer: Golang-Based Botnet Actively Harvests Web Servers
thumbnail Czech cybersecurity office labels TikTok a security threat
thumbnail Ransomware gang posts video of data stolen from Minneapolis schools
thumbnail Medusa ransomware gang picks up steam as it targets companies worldwide
thumbnail Telehealth startup Cerebral shared millions of patients' data with advertisers
thumbnail Netcat Attack Cases Targeting MS-SQL Servers (LOLBins)
thumbnail SCARLETEEL: Operation leveraging Terraform, Kubernetes, and AWS for data theft
thumbnail Alerte sur des tentatives de piratage de comptes bancaires en Suisse
thumbnail Gang leaks Lehigh Valley Health Network cancer patient photos as part of data hack
thumbnail New HiatusRAT router malware covertly spies on victims - Lumen
thumbnail A Noteworthy Threat: How Cybercriminals are Abusing OneNote
thumbnail CVE-2023-27532
thumbnail Acer Breached, Hacker Selling Access to 160GB of Stolen Data
thumbnail Meta’s LLaMA Leaked to the Public, Thanks To 4chan
thumbnail PoC exploit for recently patched Microsoft Word RCE is public (CVE-2023-21716)
thumbnail Germany and Ukraine hit two high-value ransomware targets
thumbnail We Found 28,000 Apps Sending Data to TikTok. A Ban Won't Help.
thumbnail PyPi Packages Deliver Python Remote Access Tools
thumbnail Credit Suisse breach spills info of high-net-worth clients
thumbnail Biden National Cyber Strategy Seeks to Hold Software Firms Liable for Insecurity
thumbnail FACT SHEET: Biden-Harris Administration Announces National Cybersecurity Strategy
thumbnail How cybercriminals attack young gamers
thumbnail BlackLotus UEFI bootkit: Myth confirmed
thumbnail West ill-prepared to deal with evolving cyber threats, report concludes
thumbnail Iron Tiger’s SysUpdate Reappears, Adds Linux Targeting
thumbnail Hunting for Honkbox | Multistage macOS Cryptominer May Still Be Hiding
thumbnail Lumma Stealer targets YouTubers via Spear-phishing Email | by S2W | S2W BLOG | Feb, 2023 | Medium
thumbnail Intrusion dans les systèmes d'information de la Ville de Lille : le point sur la situation
thumbnail U.S. Marshals Service hack compromises sensitive info
thumbnail Danish parliament urges to remove TikTok over cybersecurity
thumbnail LastPass breach update: The few additional bits of information
thumbnail Canada bans TikTok on government devices
thumbnail Hard-to-spot Mac crypto-mining threat, XMRig, hits Pirate Bay
thumbnail PureCrypter targets government entities through Discord - Blog | Menlo Security
thumbnail Stanford University discloses data breach affecting PhD applicants
thumbnail Technical Advisory: Various Threat Actors Targeting ManageEngine Exploit CVE-2022-47966
thumbnail TA569: SocGholish and Beyond
thumbnail EXFILTRATOR-22 - An Emerging Post-Exploitation Framework
thumbnail Cryptomonnaie: arrestation de deux Français suspectés d’avoir piraté la plateforme Platypus
thumbnail OneNote Embedded file abuse
thumbnail Suspect in major data theft case linked to Dutch-subsidized cybersecurity org
thumbnail A year after Russia's invasion, the scope of cyberwar in Ukraine comes into focus
thumbnail Beware of macOS cryptojacking malware.
thumbnail Valve bans 40,000 Dota 2 cheaters through ‘honeypot’ patch
thumbnail "Fobo" Trojan distributed as ChatGPT client for Windows
thumbnail The Growing Threat of ChatGPT-Based Phishing Attacks
thumbnail Google Delivers Record-Breaking $12M in Bug Bounties
thumbnail Activision's Data Breach Contains Employee Information, Call of Duty and More, Report
thumbnail Fortinet FortiNAC CVE-2022-39952 Deep-Dive and IOCs
thumbnail Sensitive US military emails spill online
thumbnail Hackers Start Selling Data Center Logins for Some of World’s Largest Corporations
thumbnail The Gravediggers: How Eliminalia, a Spanish reputation management firm, buries the truth
thumbnail Fog of war: how the Ukraine conflict transformed the cyber threat landscape
thumbnail Magecart Attack Disguised as Google Tag Manager | Akamai
thumbnail Ransomware pushes City of Oakland into state of emergency
thumbnail German airport websites downed by DDoS attacks
thumbnail FBI says it has 'contained' cyber incident on bureau's computer network
thumbnail Clop ransomware claims it breached 130 orgs using GoAnywhere zero-day
thumbnail Escroquerie aux SMS de l'Assurance maladie : les suspects volaient les numéros de téléphone depuis leur voiture
thumbnail GoDaddy: Hackers stole source code, installed malware in multi-year breach
thumbnail Hacker Uncovers How to Turn Traffic Lights Green With Flipper Zero
thumbnail Microsoft February 2023 Patch Tuesday
thumbnail Cisco warns of critical flaw in ClamAV antivirus
thumbnail Hyundai and Kia issue software upgrades to thwart theft hack
thumbnail Ethical hackers can now legally hack Belgian companies
thumbnail The Israelis Destabilizing Democracy and Disrupting Elections Worldwide - National Security & Cyber - Haaretz
thumbnail Ces hackers israéliens qui ont piraté les élections en Afrique
thumbnail How undercover reporters caught ‘Team Jorge’ disinformation operatives on camera
thumbnail Havoc Across the Cyberspace
thumbnail IoC detection experiments with ChatGPT
thumbnail Bogus URL Shorteners Redirect Thousands of Hacked Sites in AdSense Fraud Campaign
thumbnail New MortalKombat ransomware and Laplas Clipper malware threats deployed in financially motivated campaign
thumbnail Cloudflare mitigates record-breaking 71 million request-per-second DDoS attack
thumbnail Apple sued for promising privacy, failing at it
thumbnail Iran marks revolution anniversary, hackers interrupt state TV coverage
thumbnail Uncle Sow: Dark Caracal in Latin America
thumbnail Killnet Threat to Health and Public Sectors
thumbnail Meet the Creator of North Korea’s Favorite Crypto Privacy Service
thumbnail Investigating Intrusions From Intriguing Exploits
thumbnail Une campagne de phishing fictive pour sensibiliser 25 PME romandes à la cybersécurité
thumbnail Incendie OVH : une première décision de condamnation
thumbnail Xiaomi, OnePlus, Top Android Phones in China Spy on You: Study
thumbnail UK cracks down on ransomware actors
thumbnail HTML Smuggling: The Hidden Threat in Your Inbox
thumbnail Enigma Stealer Targets Cryptocurrency Industry with Fake Jobs
thumbnail 2023 Crypto Crime Trends: Illicit Cryptocurrency Volumes Reach All-Time Highs Amid Surge in Sanctions Designations and Hacking
thumbnail Bitwarden password vaults targeted in Google ads phishing attack
thumbnail OpenSSL fixes High Severity data-stealing bug – patch now!
thumbnail Russia-linked Lockbit ransomware hacking gang threatens to publish Royal Mail data stolen in cyber attack
thumbnail Sliver Malware With BYOVD Distributed Through Sunlogin Vulnerability Exploitations - ASEC BLOG
thumbnail Iran responsible for Charlie Hebdo attacks
thumbnail Cyberattaque contre l’Université de Zurich: des accès aux serveurs vendus sur le darkweb (update)
thumbnail Onenote Malware: Classification and Personal Notes
thumbnail Detecting OneNote Abuse
thumbnail No Macro? No Worries. VSTO Being Weaponized by Threat Actors
thumbnail Cybercrime: Les hackers avaient aussi sévi en Suisse
thumbnail Massive ESXiArgs ransomware attack targets VMware ESXi servers worldwide
thumbnail Ransomware : des centaines de serveurs VMware ESXi pris dans une vaste campagne
thumbnail Un ransomware attaque les clients ESXi des hébergeurs français (MAJ)
thumbnail Exploitation of GoAnywhere MFT zero-day vulnerability
thumbnail https://infosec.exchange/@briankrebs/109795710941843934?s=09
thumbnail Ransomware Roundup – Trigona Ransomware
thumbnail .NET Virtualization Thrives in Malvertising Attacks
thumbnail No Pineapple! –DPRK Targeting of Medical Research and Technology Sector
thumbnail Following the Scent of TrickGate: 6-Year-Old Packer Used to Deploy the Most Wanted Malware
thumbnail OneNote Documents Increasingly Used to Deliver Malware
thumbnail Qakbot's Evolution Continues with New Strategies
thumbnail HeadCrab: A Novel State-of-the-Art Redis Malware in a Global Campaign
thumbnail Hospitals urged to tighten DDoS defenses after health data found on Killnet list
thumbnail Pro-Russian DDoS attacks raise alarm in Denmark, U.S.
thumbnail Google sponsored ads malvertising targets password manager
thumbnail Action needed for GitHub Desktop and Atom users
thumbnail ‘InTheBox’ Web Injects Targeting Android Banking Applications Worldwide
thumbnail Analyzing and remediating a malware infested T95 TV box from Amazon
thumbnail Welcome to Goot Camp: Tracking the Evolution of GOOTLOADER Operations
thumbnail IT specialists search and recruitment on the dark web
thumbnail Exploring Killnet's Social Circles
thumbnail A Major App Flaw Exposed the Data of Millions of Indian Students
thumbnail Chinese PlugX Malware Hidden in Your USB Devices?
thumbnail An unfaithful employee leaked Yandex source code repositoriesSecurity Affairs
thumbnail Cybercriminals stung as HIVE infrastructure shut down
thumbnail The Titan Stealer: Notorious Telegram Malware Campaign
thumbnail Realtek SDK Vulnerability Attacks Highlight IoT Supply Chain Threats
thumbnail La vidéosurveillance de l’armée présente des failles de sécurité
thumbnail Suisse: Caméras de surveillance de l’armée jugées trop vulnérables
thumbnail Apple patches are out – old iPhones get an old zero-day fix at last!
thumbnail Following the LNK metadata trail
thumbnail Threat groups are using Windows LNK files to gain access
thumbnail Bitzlato: senior management arrested
thumbnail how to completely own an airline in 3 easy steps
thumbnail U.S. ‘No Fly List’ Leaks After Being Left in an Unsecured Airline Server
thumbnail Hostile Takeover: Kraken Hacks Rival Darknet Market Solaris
thumbnail Darth Vidar: The Dark Side of Evolving Threat Infrastructure
thumbnail Risky Biz News: Crypto-crime volumes went down in 2022, ransomware payments too
thumbnail New GTA Online exploit now allows cheaters to ban your account
thumbnail Breaking Down the SEO Poisoning Attack | How Attackers Are Hijacking Search Results
thumbnail Technical Advisory – Multiple Vulnerabilities in the Galaxy App Store (CVE-2023-21433, CVE-2023-21434)
thumbnail Des hackers détournent des sites de l&rsquo;UE pour voler des infos bancaires
thumbnail PayPal Notifies 35,000 Users of Data Breach
thumbnail ManageEngine CVE-2022-47966 Technical Deep Dive
thumbnail T-Mobile hacked to steal data of 37 million accounts in API data breach
thumbnail Hackers push malware via Google search ads for VLC, 7-Zip, CCleaner
thumbnail DNS changer in malicious mobile app used by Roaming Mantis
thumbnail Batloader Malware Abuses Legitimate Tools Uses Obfuscated JavaScript Files in Q4 2022 Attacks
thumbnail Apple launches major security updates around the world
thumbnail Mailchimp says it was hacked — again
thumbnail Russian founder of a cryptocurrency exchange known for funneling ransomware profits arrested
thumbnail Assessing Potential Exploitation of Sophos Firewall and CVE-2022-3236
thumbnail Can you rely on macOS Ventura for malware protection?
thumbnail 7 Ways Threat Actors Deliver macOS Malware in the Enterprise
thumbnail InfoSec Handlers Diary Blog - SANS Internet Storm Center
thumbnail Google Ads Exploited to Spread Malware
thumbnail Google Ads Malware Wipes NFT Influencer's Crypto Wallet
thumbnail Supply Chain Attack Using Identical PyPI Packages, “colorslib”, “httpslib”, and “libhttps”
thumbnail Vice Society ransomware leaks University of Duisburg-Essen’s data
thumbnail NortonLifeLock warns that hackers breached Password Manager accounts
thumbnail Défense : les interrogations de l’état-major français face aux opérations cyber américaines en Europe
thumbnail Sustaining Digital Certificate Security - TrustCor Certificate Distrust
thumbnail Compromise of employee device, credentials led to CircleCI breach
thumbnail A Police App Exposed Secret Details About Raids and Suspects | WIRED
thumbnail Watch: Ukraine Army Video Tells Russians How to Surrender to a Drone
thumbnail Accidentally Crashing a Botnet
thumbnail Pro-Russia hackers use Telegram, GitHub to attack Czech presidential election
thumbnail Royal Mail ransomware attackers threaten to publish stolen data
thumbnail NoName057(16) - The Pro-Russian Hacktivist Group Targeting NATO
thumbnail StrongPity espionage campaign targeting Android users
thumbnail Misconfigured PostgreSQL Used to Target Kubernetes Clusters
thumbnail Raspberry Robin's botnet second life
thumbnail The OWASSRF + TabShell exploit chain
thumbnail Nouvelles règles: Boom des enregistrements de pilotes de drone en Suisse
thumbnail New Paper on Old Threema Protocol
thumbnail Air France and KLM notify customers of account hacks
thumbnail Armed With ChatGPT, Cybercriminals Build Malware And Plot Fake Girl Bots
thumbnail Schools hit by cyber attack and documents leaked
thumbnail Twitter leak: 200m+ account database now free to download
thumbnail Slack Security Update
thumbnail Cyberattack shutters the Guardian's office for a month
thumbnail CircleCI warns of security breach — rotate your secrets!
thumbnail Jenkins discloses dozens of zero-day bugs in multiple plugins
thumbnail Web Hackers vs. The Auto Industry: Critical Vulnerabilities in Ferrari, BMW, Rolls Royce, Porsche, and More
thumbnail How do you know when macOS detects and remediates malware?
thumbnail Data of over 200 million Deezer users stolen, leaks on hacking forum
thumbnail New CatB Ransomware Employs 2-Year Old DLL Hijacking Technique To Evade Detection
thumbnail Piratage Adecco : des données personnelles et bancaires (IBAN) dans la nature
thumbnail Shc Linux Malware Installing CoinMiner
thumbnail Ukraine Has Digitized Its Fighting Forces on a Shoestring
thumbnail The Mac Malware of 2022 👾
thumbnail Compromised PyTorch-nightly dependency chain between December 25th and December 30th, 2022.
thumbnail U.S. targeted adversary cyber infrastructure to safeguard midterm vote
thumbnail Ransomware gang gives decryptor to Toronto’s SickKids Hospital
thumbnail Russian cyberattacks - Special Services - Gov.pl website
thumbnail New YouTube Bot Malware Spotted Stealing User’s Sensitive Information
thumbnail Pure coder offers multiple malware for sale in Darkweb forums
thumbnail zhuowei/WDBFontOverwrite: Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.
thumbnail Twitter in data-protection probe after '400 million' user details up for sale
thumbnail ZINC weaponizing open-source software - Microsoft Security Blog
thumbnail ZetaNile: Open source software trojans from North Korea
thumbnail New RisePro Stealer distributed by the prominent PrivateLoader
thumbnail Cost of data breaches to surpass US$5mn per incident in 2023
thumbnail What’s in a PR statement: LastPass breach explained
thumbnail Shlayer Malware: Continued Use of Flash Updates
thumbnail Shlayer malware abusing Gatekeeper bypass on macOS
thumbnail L’art de l’évasion How Shlayer hides its configuration inside Apple proprietary DMG files
thumbnail Hacker claims to be selling Twitter data of 400 million users
thumbnail Threat Spotlight: XLLing in Excel - threat actors using malicious add-ins
thumbnail Raspberry Robin Malware Targets Telecom, Governments
thumbnail Custom-Branded Ransomware: The Vice Society Group and the Threat of Outsourced Development - SentinelOne
thumbnail An infostealer comes to town: Dissecting a highly evasive malware targeting Italy
thumbnail Notice of Recent Security Incident
thumbnail New Ransomware Strains Emerging from Leaked Conti’s Source Code  
thumbnail EXCLUSIVE: TikTok Spied On Forbes Journalists
thumbnail Meddler-in-the-Middle Phishing Attacks Explained MitM
thumbnail Stolen certificates in two waves of ransomware and wiper attacks
thumbnail New Kiss-a-dog Cryptojacking Campaign Targets Docker and Kubernetes
thumbnail A Roomba recorded a woman on the toilet. How did screenshots end up on Facebook?
thumbnail Guardian hit by serious IT incident believed to be ransomware attack
thumbnail Okta's source code stolen after GitHub repositories hacked
thumbnail 2022: A Look Back On A Year Of Mass Exploitation
thumbnail SentinelSneak: Malicious PyPI module poses as security software development kit
thumbnail CVE-2022-41040 and CVE-2022-41082 – zero-days in MS Exchange
thumbnail GoTrim: Go-based Botnet Actively Brute Forces WordPress Websites
thumbnail Support King, banned by FTC, linked to new phone spying operation
thumbnail Google ads lead to fake software pages pushing IcedID (Bokbot)
thumbnail How ChatGPT can turn anyone into a ransomware and malware threat actor  
thumbnail Global crackdown against DDoS services shuts down most popular platforms
thumbnail Très courtisées, les sociétés suisses de cybersécurité s’arrachent
thumbnail Microsoft-signed malicious Windows drivers used in ransomware attacks
thumbnail A Custom Python Backdoor for VMWare ESXi Servers
thumbnail Apple fixes 'actively exploited' zero-day security vulnerability affecting most iPhones
thumbnail Mallox Ransomware showing signs of Increased Activity
thumbnail State-sponsored attackers actively exploiting RCE in Citrix devices, patch ASAP! (CVE-2022-27518)
thumbnail Released: Citrix ADC and Citrix Gateway (security bulletin CTX474995) security update
thumbnail Check Point Research analyzes files on the Dark Web and finds millions of records available
thumbnail Pulling the Curtains on Azov Ransomware: Not a Skidsware but Polymorphic Wiper - Check Point Research
thumbnail Scammers Are Scamming Other Scammers Out of Millions of Dollars
thumbnail Phylum Detects Ongoing Typosquat/Ransomware Campaign in PyPI and NPM
thumbnail Apple announces 3 new security features
thumbnail Cisco discloses high-severity IP phone zero-day with exploit code
thumbnail Pilfered Keys Free App Infected by Malware Steals Keychain Data
thumbnail Cryptocurrency Scam - Pig Butchering
thumbnail Pulse Connect Secure: A View from the Internet
thumbnail Gaming firm Razer wins lawsuit against IT vendor over data leak, awarded $8.7m in damages
thumbnail Hitching a ride with Mustang Panda
thumbnail New MuddyWater Threat: Old Kitten; New Tricks
thumbnail Apple rolls out end-to-end encryption for iCloud backups
thumbnail Mustang Panda Uses the Russian-Ukrainian War to Attack Europe and Asia Pacific Targets
thumbnail Leaked: The Altrnativ world of cybersurveillance
thumbnail Top 10 macOS Malware Discoveries in 2022
thumbnail Zerobot – New Go-Based Botnet Campaign Targets Multiple Vulnerabilities
thumbnail Vice Society: Profiling a Persistent Threat to the Education Sector
thumbnail Le renseignement espagnol muet sur le scandale du logiciel espion Pegasus
thumbnail Critical Ping Vulnerability Allows Remote Attackers to Take Over FreeBSD Systems
thumbnail Winbiz change d’hébergeur: des milliers de clients toujours sans accès à leur comptabilité | ICTjournal
thumbnail Blowing Cobalt Strike Out of the Water With Memory Analysis
thumbnail Suspected Iran-Nexus TAG-56 Uses UAE Forum Lure for Credential Theft Against US Think Tank
thumbnail W4SP continues to nest in PyPI: Same supply chain attack, different distribution method
thumbnail Post-quantum cryptography: What is Emmanuel Macron talking about?
thumbnail Purpose Built Proxy Services and the Malicious Activity They Enable
thumbnail CVE-2022-21661: Exposing Database Info via WordPress SQL Injection
thumbnail Connected medical devices are the Achilles' heel of healthcare orgs - Help Net Security
thumbnail Schoolyard Bully Trojan Facebook Credential Stealer - Zimperium
thumbnail En matière de transparence, communes et cantons sont à la traîne
thumbnail Yvelines : cyberattaque contre l'hôpital André Mignot du centre hospitalier de Versailles
thumbnail Preparing for a Russian cyber offensive against Ukraine this winter
thumbnail Darknet markets generate millions in revenue selling stolen personal data
thumbnail Fuite de données sensibles au Département de la justice à Zurich
thumbnail La cybersécurité disposera de son propre office fédéral en Suisse
thumbnail The Mystery of Metador | Unpicking Mafalda’s Anti-Analysis Techniques
thumbnail Samsung, LG, Mediatek certificates compromised to sign Android malware
thumbnail Google Online Security Blog: Memory Safe Languages in Android 13
thumbnail Multiple Organisations compromised by Critical Authentication Bypass Vulnerability in Fortinet Products (CVE-2022-40684)
thumbnail Lastpass says hackers accessed customer data in new breach
thumbnail LockBit 3.0 ‘Black’ attacks and leaks reveal wormable capabilities and tooling
thumbnail Play, ce nouveau ransomware utilisé contre les Alpes-Maritimes et ITS Group
thumbnail Libye: la mise en examen de la société française Amesys et l'inculpation de deux cadres, confirmées en appel
thumbnail U.S. bans sale and import of some tech from Chinese companies Huawei and ZTE
thumbnail Detecting and Fingerprinting Infostealer Malware-as-a-Service platforms
thumbnail Google pushes emergency Chrome update to fix 8th zero-day in 2022
thumbnail Ransomware Roundup: Cryptonite Ransomware
thumbnail Suisse: Une cyberattaque bloque la comptabilité de milliers de sociétés
thumbnail Des dizaines de milliers d'entreprises victimes indirectes d'une cyberattaque
thumbnail Nighthawk: An Up-and-Coming Pentest Tool Likely to Gain Threat Actor Notice | Proofpoint US
thumbnail Nokia warns 5G security ‘breaches are the rule, not the exception’
thumbnail Android SharkBot Droppers on Google Play Underline Platform's Security Needs
thumbnail Why would you want to hack Electric Vehicle Charging Stations?
thumbnail Researchers Explore Hacking VirusTotal to Find Stolen Credentials
thumbnail Over 2 million users Affected with Browser Hijackers
thumbnail Aurora: a rising stealer flying under the radar
thumbnail A Leak Details Apple's Secret Dirt on Corellium, a Trusted Security Startup
thumbnail Le ministre de l'Éducation nationale ne veut pas de Microsoft Office 365 ni de Google Workspace
thumbnail Endurance Ransomware Claims Breach of US Federal Government
thumbnail Vanuatu: Hackers strand Pacific island government for over a week
thumbnail Control Your Types or Get Pwned: Remote Code Execution in Exchange PowerShell Backend
thumbnail Exploit released for actively abused ProxyNotShell Exchange bug
thumbnail Making Cobalt Strike harder for threat actors to abuse
thumbnail Wi-Spy
thumbnail Technical Analysis of the RedLine Stealer
thumbnail AXLocker, Octocrypt, and Alice: Leading a new wave of Ransomware Campaigns
thumbnail Michigan school districts reopen after three-day closure due to ransomware attack
thumbnail A Comprehensive Look at Emotet’s Fall 2022 Return
thumbnail CVE-2022-41622 and CVE-2022-41800 (FIXED): F5 BIG-IP and iControl REST Vulnerabilities and Exposures
thumbnail Firefox fixes fullscreen fakery flaw – get the update now! – Naked Security
thumbnail Cryptex: how a custom iPhone is changing macOS updates – The Eclectic Light Company
thumbnail New RapperBot Campaign – We Know What You Bruting for this Time
thumbnail Google Reaches $391.5 Million Settlement With States Over Location Tracking Practices
thumbnail CVE-2022-45047: Apache MINA SSHD unsafe deserialization vulnerability
thumbnail BumbleBee Zeros in on Meterpreter
thumbnail Apple Hit With Class Action Alleging It Tracks Users Despite Privacy Assurances
thumbnail LockBit ransomware suspect nabbed in Canada, faces charges in the US
thumbnail Compromising Plesk via its REST API
thumbnail Exploring ZIP Mark-of-the-Web Bypass Vulnerability (CVE-2022-41049)
thumbnail PNG Steganography Hides Backdoor
thumbnail Massive ois[.]is Black Hat Redirect Malware Campaign
thumbnail Threat Spotlight: Cyber Criminal Adoption of IPFS for Phishing, Malware Campaigns
thumbnail Attacking Apple's Neural Engine
thumbnail Prigozhin interests and Russian information operations
thumbnail Mysterious company with government ties plays key internet role
thumbnail Microsoft fixes many zero-days under attack
thumbnail The Case of Cloud9 Chrome Botnet
thumbnail A cyberattack blocked the trains in Denmark
thumbnail Nation-state cyberattacks become more brazen as authoritarian leaders ramp up aggression
thumbnail Insurance giant settles NotPetya lawsuit, signaling cyber insurance shakeup
thumbnail Inside the global hack-for-hire industry
thumbnail Crime group hijacks hundreds of US news websites to push malware
thumbnail Last Week on My Mac: Home truths about macOS
thumbnail Department for Education warned after gambling companies benefit from learning records database
thumbnail How Qatar hacked the World Cup
thumbnail Apple's Poor Patching Policies Potentially Make Users' Security and Privacy Precarious
thumbnail Microsoft ties Vice Society hackers to additional ransomware strains
thumbnail Crimson Kingsnake: BEC Group Impersonates…
thumbnail Exploiting Static Site Generators: When Static Is Not Actually Static
thumbnail Black Basta Ransomware | Attacks Deploy Custom EDR Evasion Tools Tied to FIN7 Threat Actor
thumbnail Malware on the Google Play store leads to harmful phishing sites
thumbnail Malicious App Developer Remains on Google Play
thumbnail U.S. banks processed about $1.2 billion in ransomware payments in 2021
thumbnail Nothing PUNY About OpenSSL (CVE-2022-3602)
thumbnail Phylum Discovers Dozens More PyPI Packages Attempting to Deliver W4SP Stealer in Ongoing Supply-Chain Attack
thumbnail New Azov data wiper tries to frame researchers and BleepingComputer
thumbnail Unmasking WindTape - Speaker Deck
thumbnail How we handled a recent phishing incident that targeted Dropbox
thumbnail Dormant Colors browser hijackers could be used for more nefarious tasks, report says
thumbnail The Hunt for the Kingpin Behind AlphaBay, Part 1: The Shadow | WIRED
thumbnail Inside TheTruthSpy, the stalkerware network spying on thousands • TechCrunch
thumbnail What is ransomware-as-a-service and how is it evolving?
thumbnail Incident Report: Employee and Customer Account Compromise
thumbnail SiriSpy - iOS bug allowed apps to eavesdrop on your conversations with Siri
thumbnail LV Ransomware Exploits ProxyShell in Attack on a Jordan-based Company
thumbnail Pro-PRC DRAGONBRIDGE Influence Campaign Leverages New TTPs to Aggressively Target U.S. Interests, Including Midterm Elections
thumbnail Stranger Strings: An exploitable flaw in SQLite
thumbnail Advisory: Atlassian Jira Align Application, Version… | Bishop Fox
thumbnail Unattributed RomCom Threat Actor Spoofing Popular Apps Now Hits Ukrainian Militaries
thumbnail TommyLeaks and SchoolBoys: Two sides of the same ransomware gang
thumbnail “Dormant Colors”: Live Campaign With Over 1M Data Stealing Extensions Installed
thumbnail Intelligence Insights: October 2022
thumbnail Mirai, RAR1Ransom, and GuardMiner – Multiple Malware Campaigns Target VMware Vulnerability
thumbnail Operation Jackal: Interpol arrests Black Axe fraud suspects
thumbnail Mairies : les pirates du groupe CUBA vident deux mairies françaises de leurs contenus
thumbnail Exploited Windows zero-day lets JavaScript files bypass security warnings
thumbnail Analysis of a Remote Code Execution (RCE) Vulnerability in Cobalt Strike 4.7.1
thumbnail Reverse Engineering the Apple MultiPeer Connectivity Framework
thumbnail How Vice Society got away with a global ransomware spree | Ars Technica
thumbnail Starlink signals can be reverse-engineered to work like GPS—whether SpaceX likes it or not
thumbnail Archive Sidestepping: Emotet Botnet Pushing Self-Unlocking Password-Protected RAR
thumbnail From RM3 to LDR4: URSNIF Leaves Banking Fraud Behind
thumbnail Domestic Kitten campaign spying on Iranian citizens with new FurBall malware
thumbnail Grâce à une fausse enceinte Bluetooth JBL, ils réussissaient à voler des voitures
thumbnail Melting the DNS Iceberg: Taking over your infrastructure Kaminsky style
thumbnail TeamTNT Returns – or Does It?
thumbnail Nouvelle cyberattaque contre le Réseau pédagogique neuchâtelois
thumbnail Cyberattaque : comment Caen a évité le pire grâce à l’EDR d’HarfangLab
thumbnail SafeBreach Uncovers Fully Undetectable Powershell Backdoor
thumbnail A New Attack Surface on MS Exchange Part 4 - ProxyRelay!
thumbnail CVE-2022-42889: Keep Calm and Stop Saying "4Shell"
thumbnail Cyble Phishing ERMAC Android Malware Increasingly Active
thumbnail Ransom Cartel Ransomware: A Possible Connection With REvil
thumbnail BianLian Ransomware Encrypts Files in the Blink of an Eye
thumbnail New “Prestige” ransomware impacts organizations in Ukraine and Poland
thumbnail Microsoft Office 365 Message Encryption Insecure Mode of Operation | WithSecure™ Labs
thumbnail New PHP Variant of Ducktail Infostealer Targeting Facebook Business Accounts
thumbnail Software Delivery Shield protects the software supply chain
thumbnail Threat Alert: Private npm Packages Disclosed via Timing Attacks
thumbnail Alchimist: A new attack framework in Chinese for Mac, Linux and Windows
thumbnail Black Basta Ransomware Gang Infiltrates networks via QAKBOT, Brute Ratel, and Cobalt Strike
thumbnail POLONIUM targets Israel with Creepy malware
thumbnail Malicious WhatsApp mod distributed through legitimate apps
thumbnail Ransomware : qui paie et pourquoi ?
thumbnail The Fresh Phish Market: Behind the Scenes of the Caffeine Phishing-as-a-Service Platform
thumbnail New US Executive Order unlikely to satisfy EU law
thumbnail Fake Ransomware Infection Under widespread
thumbnail Intel Confirms Alder Lake BIOS Source Code Leak
thumbnail Software Supply Chain Attackers; Organized, Persistent, and Operating for over a Year
thumbnail On Agent Compromise in the Field
thumbnail Hackers release data after LAUSD refuses to pay ransom
thumbnail Jamf Threat Labs identifies macOS Archive Utility vulnerability allowing for Gatekeeper bypass (CVE-2022-32910)
thumbnail White House announces new surveillance guardrails to meet EU Privacy Shield expectations
thumbnail CVE-2022-40684: Critical Authentication Bypass in FortiOS and FortiProxy
thumbnail CVE-2022-41352
thumbnail Man arrested for alleged data breach SMS scam
thumbnail MSSQL, meet Maggie. A novel backdoor for Microsoft SQL…
thumbnail How 3 hours of inaction from Amazon cost cryptocurrency holders $235,000
thumbnail Remove All The Callbacks – BlackByte Ransomware Disables EDR Via RTCore64.sys Abuse
thumbnail PHP Supply Chain Attack on Composer
thumbnail Bumblebee: increasing its capacity and evolving its TTPs
thumbnail Malicious Tor Browser spreads through YouTube
thumbnail A glimpse into the shadowy realm of a Chinese APT: detailed analysis of a ShadowPad intrusion – NCC Group Research
thumbnail DeftTorero TTPs in 2019–2021
thumbnail Bad VIB(E)s Part One: Investigating Novel Malware Persistence Within ESXi Hypervisors | Mandiant
thumbnail Lazarus hackers abuse Dell driver bug using new FudModule rootkit
thumbnail Amazon‑themed campaigns of Lazarus in the Netherlands and Belgium
thumbnail Ukraine warns of 'massive cyberattacks' coming from Russia on critical infrastructure sites
thumbnail Mystery Hackers Are ‘Hyperjacking’ Targets for Insidious Spying
thumbnail Chaos is a Go-based Swiss army knife of malware
thumbnail Warning: New attack campaign utilized a new 0-day RCE vulnerability on Microsoft Exchange Server
thumbnail Witchetty: Group Uses Updated Toolset in Attacks on Governments in Middle East
thumbnail ZINC weaponizing open-source software
thumbnail Lindy Cameron at Chatham House security and defence conference 2022
thumbnail BumbleBee: Round Two
thumbnail NullMixer drops Redline Stealer, SmokeLoader and other malware | Securelist
thumbnail Lazarus ‘Operation In(ter)ception’ Targets macOS Users Dreaming of Jobs in Crypto
thumbnail Slack’s and Teams’ Lax App Security Raises Alarms
thumbnail Poseidon’s Offspring: Charybdis and Scylla
thumbnail In the footsteps of the Fancy Bear: PowerPoint mouse-over event abused to deliver Graphite implants
thumbnail GRU: Rise of the (Telegram) MinIOns
thumbnail BitBucket Server and Data Center at risk via Command Injection Vulnerability
thumbnail Resolved RCE in Sophos Firewall (CVE-2022-3236)
thumbnail New Malware Campaign Targets Zoom Users
thumbnail 2K Games' Support System Hacked
thumbnail Unpatched 15-year old Python bug allows code execution in 350k projects
thumbnail Tarfile: Exploiting the World With a 15-Year-Old Vulnerability
thumbnail Noberus Ransomware: Darkside and BlackMatter Successor Continues to Evolve its Tactics
thumbnail Malicious OAuth applications abuse cloud email services to spread spam
thumbnail Void Balaur | The Sprawling Infrastructure of a Careless Mercenary
thumbnail The Apple security landscape: Moving into the world of enterprise risk
thumbnail Apple Kills Passwords in iOS 16 and macOS Ventura | WIRED
thumbnail Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime
thumbnail Revealed: US Military Bought Mass Monitoring Tool That Includes Internet Browsing, Email Data
thumbnail Los Angeles School District Hit by Ransomware Attack
thumbnail Online Attack Disrupts Michigan School District for 2nd Day
thumbnail LockBit ransomware builder leaked online by “angry developer”
thumbnail Azure Cloud Shell Command Injection Stealing User’s Access Tokens
thumbnail Threat Alert: New Malware in the Cloud By TeamTNT
thumbnail Chromium Blog: Announcing the Launch of the Chrome Root Program
thumbnail Affaire Pegasus: l'Union européenne se penche sur le dossier suisse - rts.ch - Monde
thumbnail Six months into Breached: The legacy of RaidForums?
thumbnail Incoscienti e sfacciati: le tecniche dei teenager che violano aziende
thumbnail Revolut hack exposes data of 50,000 users, fuels new phishing wave
thumbnail Credential Gathering From Third-Party Software
thumbnail Malvertising on Microsoft Edge's News Feed pushes tech support scams
thumbnail Ermittlungserfolg gegen Ransomware-Gruppierung
thumbnail GTA 6 gameplay leaks online in 90 videos
thumbnail Security update
thumbnail Iran’s cyberwar goes global
thumbnail Webworm: Espionage Attackers Testing and Using Older Modified RATs
thumbnail RedLine spreads through ads for cheats and cracks on YouTube
thumbnail Undermining Microsoft Teams Security by Mining Tokens
thumbnail How Human Traffickers Force Victims Into Cyberscamming
thumbnail Charming Kitten: “Can We Have A Meeting?”
thumbnail Breach of software maker used to backdoor as many as 200,000 servers
thumbnail New Wave of Espionage Activity Targets Asian Governments
thumbnail Bumblebee Returns with New Infection Technique
thumbnail Lampion Trojan Utilizes New Delivery through Cloud-Based Sharing
thumbnail Dead or Alive? An Emotet Story
thumbnail The Curious Case of “Monti” Ransomware: A Real-World Doppelganger
thumbnail Inside Fog Data Science, the Secretive Company Selling Mass Surveillance to Local Police
thumbnail Likely Iranian Threat Actor Conducts Politically Motivated Disruptive Activity Against Albanian Government Organizations
thumbnail Corte dei conti e l'hacker che ha violato account WhatsApp
thumbnail Campagne de phishing Instagram : la certification sur les réseaux sociaux, ou le nouveau piège des hackers
thumbnail Documentos portugueses da NATO apanhados à venda na darkweb
thumbnail Microsoft investigates Iranian attacks against the Albanian government
thumbnail Crimeware Trends | Ransomware Developers Turn to Intermittent Encryption to Evade Detection
thumbnail L'Albanie accuse l'Iran d'une cyberattaque qui a paralysé ses services publics
thumbnail Conti vs. Monti: A Reinvention or Just a Simple Rebranding?
thumbnail Centre hospitalier Sud-Francilien : ce que dit l’autopsie de la cyberattaque
thumbnail PSA: Nearly 5 Million Attacks Blocked Targeting 0-Day in BackupBuddy Plugin
thumbnail MagicRAT: Lazarus’ latest gateway into victim networks
thumbnail Shikitega - New stealthy malware targeting Linux
thumbnail Mirai Variant MooBot Targeting D-Link Devices
thumbnail QNAP warns of zero-day vulnerability in latest DeadBolt ransomware campaign
thumbnail SafeBreach Uncovers New Remote Access Trojan (RAT)
thumbnail Malicious Cookie Stuffing Chrome Extensions with 1.4 Million Users
thumbnail Sharkbot is back in Google Play
thumbnail Stealing Clouds
thumbnail Hackers Create Traffic Jam in Moscow by Ordering Dozens of Taxis at Once Through App
thumbnail PyPI Phishing Campaign | JuiceLedger Threat Actor Pivots From Fake Apps to Supply Chain Attacks
thumbnail Tech tool offers police ‘mass surveillance on a budget’
thumbnail Researchers found one-click exploits in Discord and Teams
thumbnail Traffers: a deep dive into the information stealer ecosystem
thumbnail Cette entreprise vend des données aussi sensibles que des visites dans des centres IVG - Numerama
thumbnail FTC says data broker sold consumers’ precise geolocation, including presence at sensitive healthcare facilities
thumbnail EU and Greece veer toward standoff over wiretapping scandal – POLITICO
thumbnail 5G Networks Are Worryingly Hackable
thumbnail Kimsuky’s GoldDragon cluster and its C2 operations | Securelist
thumbnail Revealing Europe's NSO
thumbnail An interview with initial access broker Wazawaka: 'There is no such money anywhere as there is in ransomware
thumbnail Linux Kernel Exploit (CVE-2022-32250) with mqueue
thumbnail Roasting 0ktapus: The phishing campaign going after Okta identity credentials
thumbnail Looking for the ‘Sliver’ lining: Hunting for emerging command-and-control frameworks - Microsoft Security Blog
thumbnail MagicWeb: NOBELIUM’s post-compromise trick to authenticate as anyone
thumbnail Legitimate SaaS Platforms Being Used to Host Phishing Attacks
thumbnail XCSSET Malware Update | macOS Threat Actors Prepare for Life Without Python
thumbnail Vulnerability in Linux containers – investigation and mitigation
thumbnail THREAT ANALYSIS REPORT: Bumblebee Loader – The High Road to Enterprise Domain Control
thumbnail Fake DDoS Pages On WordPress Sites Lead to Drive-By-Downloads
thumbnail Lloyd’s to Exclude Catastrophic Nation-Backed Cyberattacks From Insurance Coverage
thumbnail CVE-2022-27925
thumbnail Google And Cloudflare Are Changing The Trust Infrastructure of the Internet: A Long Goodbye to RSA and a Hello to ECC and ECDSA
thumbnail New macOS malware 'CloudMensis' detected and prevented
thumbnail Overview of the Cyber Weapons Used in the Ukraine
thumbnail Reservations Requested: TA558 Targets Hospitality and Travel
thumbnail Making Sense of the Killnet, Russia’s Favorite Hacktivists
thumbnail Disrupting SEABORGIUM’s ongoing phishing operations
thumbnail Operation In(ter)ception: Aerospace and military companies in the crosshairs of cyberspies | WeLiveSecurity
thumbnail North Korean hackers use signed macOS malware to target IT job seekers
thumbnail An inside view of domain anonymization as-a-service
thumbnail The Return of LOIC, HOIC, HULK, and Slowloris to the Threat Landscape
thumbnail DigitalOcean says customer email addresses were exposed after latest Mailchimp breach – TechCrunch
thumbnail Impact to DigitalOcean customers resulting from Mailchimp security incident
thumbnail Ransomware Now Threatens the Global South
thumbnail Zoom’s latest update on Mac includes a fix for a dangerous security flaw
thumbnail NHS IT supplier held to ransom by hackers
thumbnail Cisco confirms May attack by Yanluowang ransomware group
thumbnail Phishers who breached Twilio and targeted Cloudflare could easily get you, too
thumbnail Hands-on with Lockdown Mode in iOS 16
thumbnail You're M̶u̶t̶e̶d̶ Rooted
thumbnail Palo Alto bug used for DDoS attacks and there's no fix yet
thumbnail The Hacking of Starlink Terminals Has Begun
thumbnail CISA warns of Windows and UnRAR flaws exploited in the wild
thumbnail Comprehensive Threat Intelligence: Cisco Talos shares insights related to recent cyber attack on Cisco
thumbnail So RapperBot, What Ya Bruting For?
thumbnail Greek intelligence service admits spying on journalist
thumbnail Last Week on My Mac: Is your Mac still secure from malware?
thumbnail Attackers leveraging Dark Utilities "C2aaS" platform in malware campaigns
thumbnail Woody RAT: A new feature-rich malware spotted in the wild
thumbnail A Detailed Analysis of the RedLine Stealer
thumbnail Manjusaka: A Chinese sibling of Sliver and Cobalt Strike
thumbnail Large-Scale AiTM Attack targeting enterprise users of Microsoft email services
thumbnail Raccoon Stealer v2: The Latest Generation of the Raccoon Family
thumbnail Investigation report about the abuse of the Mac Appstore | by Privacy1St
thumbnail A Cyberattack Illuminates the Shaky State of Student Privacy
thumbnail Discovery of new UEFI rootkit exposes an ugly truth: The attacks are invisible to us
thumbnail Microsoft links Raspberry Robin malware to Evil Corp attacks
thumbnail IPFS: The New Hotbed of Phishing
thumbnail SEKOIA.IO Mid-2022 Ransomware Threat Landscape
thumbnail LockBit Implements New Technique by Leaking Victim Negotiations
thumbnail LockBit Ransomware Group Augments Its Latest Variant, LockBit 3.0, With BlackMatter Capabilities
thumbnail Untangling KNOTWEED: European private-sector offensive actor using 0-day exploits
thumbnail Justice Department seizes $500K from North Korean hackers who targeted US medical organizations
thumbnail 8220 Gang Massively Expands Cloud Botnet to 30,000 Infected Hosts
thumbnail Kaspersky report on Luna and Black Basta ransomware
thumbnail Exclusive: U.S. probes China's Huawei over equipment near missile silos
thumbnail [CVE-2022-34918] A crack in the Linux firewall
thumbnail Google ads lead to major malvertising campaign
thumbnail Russia Released a Ukrainian App for Hacking Russia That Was Actually Malware
thumbnail China: Declaration by the Minister for Foreign Affairs on behalf of the Belgian Government urging Chinese authorities to take action against malicious cyber activities undertaken by Chinese actors
thumbnail I see what you did there: A look at the CloudMensis macOS spyware
thumbnail Pegasus used to spy on protesters, a popular actress, and dozens more in Thailand, report shows
thumbnail Busting browser fails: What attackers see when they hack your employees’ browser
thumbnail Joker, Facestealer and Coper banking malwares on Google Play store
thumbnail How I Hacked my Car Guides: Creating Custom Firmware
thumbnail CVE-2022-30333
thumbnail North Korean threat actor targets small and midsize businesses with H0lyGh0st ransomware
thumbnail Did You Know Your Browser’s Autofill Credentials Could Be Stolen via Cross-Site Scripting (XSS)
thumbnail Google Play hides app permissions in favor of developer-written descriptions
thumbnail From cookie theft to BEC: Attackers use AiTM phishing sites as entry point to further financial fraud
thumbnail Ongoing phishing campaign can hack you even when you’re protected with MFA
thumbnail European Central Bank head targeted in hacking attempt
thumbnail Vice Society: a discreet but steady double extortion ransomware group
thumbnail Why organizations should (and should not) worry about…
thumbnail The US military wants to understand the most important software on Earth
thumbnail A New Attack Can Unmask Anonymous Users on Any Major Browser
thumbnail En Suisse, les Tesla filmant en permanence posent de gros problèmes
thumbnail Uncovering a macOS App Sandbox escape vulnerability: A deep dive into CVE-2022-26706 - Microsoft Security Blog
thumbnail Europe’s PegasusGate: Countering spyware abuse
thumbnail Russia, Killnet ha dichiarato guerra ai paesi che sostengono l'Ucraina
thumbnail Verified Twitter accounts phished via hate speech warnings
thumbnail Predatory Sparrow: Who are the hackers who say they started a fire in Iran?
thumbnail THREAT ALERT: Raspberry Robin Worm Abuses Windows Installer and QNAP Devices
thumbnail Identifier les détenteurs de véhicules peut être dangereux, en Suisse comme aux Etats-Unis
thumbnail The Danger of License Plate Readers in Post-Roe America | WIRED
thumbnail 'I can fight with a keyboard': How one Ukrainian IT specialist exposed a notorious Russian ransomware gang
thumbnail Hacktivists claiming attack on Iranian steel facilities dump tranche of 'top secret documents
thumbnail Google Let Sberbank-Owned RuTarget Harvest User Data for Months
thumbnail Il malware EnvyScout (APT29) è stato veicolato anche in Italia
thumbnail This Is the Code the FBI Used to Wiretap the World
thumbnail Cybersecurity experts question Microsoft's Ukraine report
thumbnail After invasion of Ukraine, a reckoning on Russian influence in Austria
thumbnail China Police Database Was Left Open Online for Over a Year, Enabling Leak
thumbnail How a fake job offer took down the world’s most popular crypto game
thumbnail Why the Equation Group (EQGRP) is NOT the NSA | xorl %eax, %eax
thumbnail Unprecedented Shift: The Trickbot Group is Systematically Attacking Ukraine
thumbnail Mykhailo Fedorov, de l’ombre à la cyberguerre
thumbnail Dutch university wins big after Bitcoin ransom returned
thumbnail Microsoft finds Raspberry Robin worm in hundreds of Windows networks
thumbnail Ransomware review: June 2022
thumbnail Mandiant Finds Possible Link Between Kremlin, Pro-Russian ‘Hacktivists’
thumbnail Flubot: the evolution of a notorious Android Banking Malware
thumbnail The SessionManager IIS backdoor: a possibly overlooked GELSEMIUM artefact
thumbnail ZuoRAT Hijacks SOHO Routers to Silently Stalk Networks
thumbnail Facing reality? Law enforcement and the challenge of deepfakes
thumbnail FBI warns hackers are using deepfakes to apply for jobs
thumbnail Unrar Path Traversal Vulnerability affects Zimbra Mail
thumbnail Conti vs. LockBit: A Comparative Analysis of Ransomware Groups
thumbnail LockBit 3.0 introduces the first ransomware bug bounty program
thumbnail The Untold Story of NotPetya, the Most Devastating Cyberattack in History
thumbnail Python packages upload your AWS keys, env vars, secrets to the web
thumbnail The hateful eight: Kaspersky’s guide to modern ransomware groups’ TTPs
thumbnail There Is More Than One Way to Sleep: Dive Deep Into the Implementations of API Hammering by Various Malware Families
thumbnail From NtObjectManager to PetitPotam
thumbnail Conti ransomware finally shuts down data leak, negotiation sites
thumbnail NSA, Partners Recommend Properly Configuring, Monitoring PowerShell in New Report
thumbnail 7-zip now supports Windows ‘Mark-of-the-Web’ security feature
thumbnail Raspberry Robin gets the worm early
thumbnail The forgotten SUAVEEYEFUL FreeBSD software implant of the EQUATION GROUP
thumbnail The curious tale of a fake Carrier.app
thumbnail Spyware vendor targets users in Italy and Kazakhstan
thumbnail APT ToddyCat
thumbnail Defending Ukraine: Early Lessons from the Cyber War
thumbnail Microsoft Plans to Eliminate Face Analysis Tools in Push for ‘Responsible A.I.’
thumbnail How Russia’s vaunted cyber capabilities were frustrated in Ukraine
thumbnail Council conclusions on a Framework for a coordinated EU response to hybrid campaigns
thumbnail Nothing Has Changed: Website Retailers Selling Domains Meant for Illicit Goods and Services, Digital Citizens Alliance Investigation Finds
thumbnail The Cybersecurity 202: Internet domain names are ripe for scam during coronavirus crisis
thumbnail FBI says fraud on LinkedIn a 'significant threat' to platform and consumers
thumbnail Russia's APT28 uses fear of nuclear war to spread Follina docs in Ukraine
thumbnail Zero Day Initiative — CVE-2022-23088: Exploiting a Heap Overflow in the FreeBSD Wi-Fi Stack
thumbnail BRATA is evolving into an Advanced Persistent Threat
thumbnail Lookout Découverte d'un logiciel espion Android déployé au Kazakhstan
thumbnail What It Means that the U.S. Is Conducting Offensive Cyber Operations Against Russia
thumbnail Last Week on My Mac: Introducing XProtect Remediator, successor to MRT – The Eclectic Light Company
thumbnail Analysis of dark web posts selling access to corporate networks
thumbnail Telerik UI exploitation leads to cryptominer, Cobalt Strike infections
thumbnail Police Linked to Hacking Campaign to Frame Indian Activists
thumbnail Zimbra Email - Stealing Clear-Text Credentials via Memcache injection
thumbnail Alphv-BlackCat non è più solo darkweb, pubblica anche su Internet "in chiaro"
thumbnail A new vulnerability in Intel and AMD CPUs lets hackers steal encryption keys
thumbnail Linux Threat Hunting: 'Syslogk' a kernel rootkit found under development in the wild
thumbnail Vulnerability discovered in Apple M1 chip
thumbnail SeaFlower 藏海花 A backdoor targeting iOS web3 wallets
thumbnail Lyceum .NET DNS Backdoor
thumbnail ASyncRat surpasses Dridex, TrickBot and Emotet to become dominant email threat
thumbnail Ucraina, oltre 100 attacchi cyber della guerra hanno avuto impatti in Europa
thumbnail Symbiote: A New, Nearly-Impossible-to-Detect Linux Threat
thumbnail EXCLUSIVE: U.S. Government Ordered Travel Companies To Spy On Russian Hacker For Years And Report His Whereabouts Every Week
thumbnail Microsoft Diagnostic Tool "DogWalk" Package Path Traversal Gets Free Micropatches (0day/WontFix)
thumbnail DOJ, FBI shut down marketplace for stolen Social Security numbers - The Record by Recorded Future
thumbnail Russian Cyberattack Hits Wales-Ukraine Football Broadcast
thumbnail SVCReady: A New Loader Gets Ready
thumbnail Liveness tests used by banks to verify ID are ‘extremely vulnerable’ to deepfake attacks
thumbnail Smartphones Blur the Line Between Civilian and Combatant
thumbnail TrustPid is another worrying, imperfect attempt to replace tracking cookies
thumbnail Horde Webmail - Remote Code Execution via Email
thumbnail Analysis and Attribution of the Eternity Ransomware: Timeline and Emergence of the Eternity Group
thumbnail Anonymous Hacktivists Leak 1TB of Top Russian Law Firm Data
thumbnail Deadly secret: Electronic warfare shapes Russia-Ukraine war
thumbnail Zero-Day Exploitation of Atlassian Confluence
thumbnail Apple has pushed a silent Mac update to remove hidden Zoom web server
thumbnail Cyberattaques: «Il s'agit davantage de terrorisme que de crime organisé»
thumbnail US military hackers conducting offensive operations in support of Ukraine, says head of Cyber Command
thumbnail Android FluBot enters Switzerland – SWITCH Security-Blog
thumbnail Takedown of SMS-based FluBot spyware infecting Android phones
thumbnail XLoader Botnet: Find Me If You Can
thumbnail Pegasus, il Parlamento europeo vuole chiarezza. Gli Stati Ue no
thumbnail ICO fines facial recognition database company Clearview AI Inc more than £7.5m and orders UK data to be deleted
thumbnail Fronton: A Botnet for Creation, Command, and Control of Coordinated Inauthentic Behavior
thumbnail Des chercheurs reprogramment un AirTag et pointent quelques trous dans la raquette d'Apple
thumbnail Gimmick MacOS Malware Spreads Through Customized Files, Enables MacOS CodeSign Bypass - CloudSEK
thumbnail New Linux-Based Ransomware Cheerscrypt Targets ESXi Devices
thumbnail Large-scale Analysis of DNS-based Tracking Evasion - broad data leaks included?
thumbnail Exclusive: Russian hackers are linked to new Brexit leak website, Google says
thumbnail Guerre en Ukraine : Anonymous déclare la cyberguerre à Killnet, un collectif de hackers pro-russes
thumbnail Anonymous Declares Cyber War Against Pro-Russia Hacker Group Killnet
thumbnail PyPI package 'ctx' and PHP library 'phpass' compromised to steal environment variables
thumbnail Remote Code Execution on Western Digital PR4100 NAS (CVE-2022-23121)
thumbnail Rise in XorDdos: A deeper look at the stealthy DDoS malware targeting Linux devices - Microsoft Security Blog
thumbnail Pegasus vs. Predator: Dissident's Doubly-Infected iPhone Reveals Cytrox Mercenary Spyware
thumbnail CrateDepression | Rust Supply-Chain Attack Infects Cloud CI Pipelines with Go Malware
thumbnail Protecting Android users from 0-Day attacks
thumbnail The IO Offensive: Information Operations Surrounding the Russian Invasion of Ukraine
thumbnail Canada bans Huawei and ZTE from 5G networks over security concerns
thumbnail Malicious PyPI package opens backdoors on Windows, Linux, and Macs
thumbnail Fears grow for smaller nations after ransomware attack on Costa Rica escalates
thumbnail President Rodrigo Chaves says Costa Rica is at war with Conti hackers
thumbnail Exploiting an Unbounded memcpy in Parallels Desktop
thumbnail KillNet: Pro-Russian Hacktivists.
thumbnail Killnet Cyber Attacks Against Italy and NATO Countries
thumbnail New 'Smart' Cheese Rinds Help Fight Parmesan Fraud
thumbnail Data Marketplace Selling Info About Who Uses Period Tracking Apps
thumbnail Critical Privilege Escalation Vulnerability in Jupiter and JupiterX Premium Themes
thumbnail Researchers devise iPhone malware that runs even when device is turned off
thumbnail La vulnérabilité PetitPotam persiste malgré le patch tuesday
thumbnail Eternity, poche centinaia di dollari per un ransomware o un malware per furto dati
thumbnail Multi-factor Authentication to Generate $27 Billion Globally for Mobile Operators in 2022, Juniper Research Study Finds
thumbnail Web ad firms scrape email addresses before you know it
thumbnail US links Thanos and Jigsaw ransomware to 55-year-old doctor
thumbnail A closer look at Eternity Malware
thumbnail macOS Vulnerabilities Hiding in Plain Sight (Black Hat Asia 2022 presentation)
thumbnail EU lands new law to fight off hackers in critical sectors
thumbnail The Linux Foundation and Open Source Software Security Foundation (OpenSSF) Gather Industry and Government Leaders for Open Source Software Security Summit II
thumbnail Zyxel silently patches command-injection vulnerability with 9.8 severity rating
thumbnail Known macOS Vulnerabilities Led Researcher to Root Out New Flaws
thumbnail Patch tuesday mai 2022 : 74 failles corrigées dont 1 exploitée
thumbnail CVE-2022-26925 : Patchez vos machines Windows sans attendre
thumbnail Russia hacked an American satellite company one hour before the Ukraine invasion
thumbnail npm Supply Chain Attack Targeting Germany-Based Companies
thumbnail Ransomware-as-a-service: Understanding the cybercrime gig economy and how to protect yourself
thumbnail Costa Rica declares national emergency after Conti ransomware attacks
thumbnail L’Europe de la cyberdéfense
thumbnail Dissecting Saintstealer
thumbnail Russian TVs, search engines hacked on Victory Day with antiwar message
thumbnail Apple, Google, and Microsoft commit to expanded support for FIDO standard
thumbnail Vulnerability Analysis - CVE-2022-1388
thumbnail From the Front Lines | Unsigned macOS oRAT Malware Gambles For The Win
thumbnail MacOS Two-machine Kernel Debugging
thumbnail Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation
thumbnail Apple, Google and Microsoft Commit to Expanded Support for FIDO Standard to Accelerate Availability of Passwordless Sign-Ins
thumbnail How Data Brokers Sell Access to the Backbone of the Internet
thumbnail Update on cyber activity in Eastern Europe
thumbnail Nozomi Networks Discovers Unpatched DNS Bug in Popular C Standard Library Putting IoT at Risk
thumbnail UNC3524: Eye Spy on Your Email
thumbnail Google Online Security Blog: The Package Analysis Project: Scalable detection of malicious open source packages
thumbnail Spanish prime minister’s phone ‘targeted with Pegasus spyware’
thumbnail Russia’s cyber warfare against Ukraine more nuanced than expected
thumbnail Russian troops in Melitopol plunder $5M farm vehicles from Ukraine -- to find they've been remotely disabled
thumbnail How the French fiber optic cable attacks accentuate critical infrastructure vulnerabilities
thumbnail OverWatch Insights: Reviewing a New Intrusion Targeting Mac Systems
thumbnail What does APT Activity Look Like on MacOS?
thumbnail Jamf Threat Labs identifies Safari vulnerability (CVE-2022-22616) allowing for Gatekeeper bypass
thumbnail Dec0ne/KrbRelayUp: KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default settings).
thumbnail Microsoft finds new elevation of privilege Linux vulnerability, Nimbuspwn
thumbnail Kaspersky DDoS report, Q1 2022
thumbnail Zero Tolerance: More Zero-Days Exploited in 2021 Than Ever Before
thumbnail LemonDuck botnet plunders Docker cloud instances in cryptocurrency crime wave
thumbnail When coin miners evolve, Part 1: Exposing LemonDuck and LemonCat, modern mining malware infrastructure
thumbnail CVE-2022-21449: Psychic Signatures in Java
thumbnail The More You Know, The More You Know You Don’t Know
thumbnail Pegasus spyware found on 5 French cabinet members' phones
thumbnail CatalanGate: Extensive Mercenary Spyware Operation against Catalans Using Pegasus and Candiru
thumbnail GitHub: Attacker breached dozens of orgs using stolen OAuth tokens
thumbnail Increased Enterprise Use of iOS, Mac Means More Malware
thumbnail Researcher uses 379-year-old algorithm to crack crypto keys found in the wild
thumbnail Microsoft Zero-Days, Wormable Bugs Spark Concern
thumbnail Russia’s Sandworm hackers attempted a third blackout in Ukraine
thumbnail RaidForums hacking forum seized by police, owner arrested
thumbnail Git security vulnerability announced
thumbnail The U.S. is using declassified intel to fight an info war with Russia, even when the intel isn't rock solid
thumbnail Industroyer2: Industroyer reloaded
thumbnail CVE-2022-22965 Analyzing the Exploitation of Spring4Shell Vulnerability in Weaponizing and Executing the Mirai Botnet Malware
thumbnail Spionaggio cyber alla Commissione europea
thumbnail Police Records Show Women Are Being Stalked With Apple AirTags Across the Country
thumbnail FBI Disrupts Cyclops Blink Botnet Used by Russian Intelligence Directorate
thumbnail DoS attacks hit Finnish websites during Zelenskyy address • The Register
thumbnail Svizzera, covo di spie russe
thumbnail AcidRain | A Modem Wiper Rains Down on Europe
thumbnail U.S. Says It Secretly Removed Malware Worldwide, Pre-empting Russian Cyberattacks - The New York Times
thumbnail Chinese hackers abuse VLC Media Player to launch malware loader
thumbnail MacOS SUHelper Root Privilege Escalation Vulnerability A Deep Dive Into CVE-2022-22639
thumbnail Hackers breach MailChimp's internal tools to target crypto customers
thumbnail Explaining Spring4Shell: The Internet security disaster that wasn’t
thumbnail Faille Spring4shell, encore un cauchemar pour les entreprises
thumbnail En Russie, des informations sur la police secrète fuitent à cause d'une appli de livraison
thumbnail Lapsus$: Two UK teenagers charged with hacking for gang
thumbnail Apple releases macOS 12.3.1, iOS 15.4.1, watchOS 8.5.1 and more - The Mac Security Blog
thumbnail Chinese Hackers Target VMware Horizon Servers with Log4Shell to Deploy Rootkit
thumbnail QNAP warns severe OpenSSL bug affects most of its NAS devices
thumbnail Putin's hackers gained full access to Hungary's foreign ministry networks, the Orbán government has been unable to stop them
thumbnail Apple and Meta Gave User Data to Hackers Who Used Forged Legal Requests
thumbnail Lapsus$ and SolarWinds hackers both use the same old trick to bypass MFA
thumbnail New Lapsus$ Hack Documents Make Okta’s Response Look More Bizarre
thumbnail Sophos patches critical remote code execution vulnerability in Firewall
thumbnail When Nokia Pulled Out of Russia, a Vast Surveillance System Remained
thumbnail Fake sites stealing Steam credentials
thumbnail Chrome Releases: Stable Channel Update for Desktop
thumbnail Behold, a password phishing site that can trick even savvy users
thumbnail Lapsus$: Oxford teen accused of being multi-millionaire cyber-criminal
thumbnail Storm Cloud on the Horizon: GIMMICK Malware Strikes at macOS
thumbnail Lapsus$: when kiddies play in the big league
thumbnail Piratage Okta : 375 des clients concernés par l'attaque de Lapsus$
thumbnail Updated Okta Statement on LAPSUS$
thumbnail DEV-0537 criminal actor targeting organizations for data exfiltration and destruction
thumbnail Anonymous Takes Anti-Putin Battle To Russian People With Printer Attack To Disrupt Kremlin's Propaganda
thumbnail Lapsus$ hackers leak 37GB of Microsoft's alleged source code
thumbnail Piratage d'Okta : l'entreprise admet enquêter, LAPSUS$ revendique
thumbnail Protestware : l’open source n’échappe pas au conflit russo-ukrainien
thumbnail Activists are targeting Russians with open-source "protestware"
thumbnail Ukraine warns of InvisiMole attacks tied to state-sponsored Russian hackers
thumbnail Exposing initial access broker with ties to Conti
thumbnail Gas Is Too Expensive; Let’s Make It Cheap!
thumbnail Sabotage: Code added to popular NPM package wiped files in Russia and Belarus | Ars Technica
thumbnail OpenSSL plombé par une importante faille de sécurité
thumbnail L’Ukraine reconnaît « une énorme perte de communication » après la cyberattaque contre le satellite KA-SAT
thumbnail PROPHET SPIDER Exploits Citrix ShareFile
thumbnail Cyber-attaques en Suisse sur des particuliers? «On ne peut rien exclure»
thumbnail Raccoon Stealer: “Trash panda” abuses Telegram
thumbnail Cyber Security Incident Pushes Ubisoft to Issue Internal Password Reset
thumbnail Exclusive: U.S. spy agency probes sabotage of satellite internet during Russian invasion, sources say | Reuters
thumbnail Armis Finds Three Critical Zero-Day Vulnerabilities in APC Smart-UPS Devices, Dubbed "TLStorm," Exposing More than 20 Million Enterprise Devices
thumbnail EU and UK launch antitrust investigation into Google and Meta’s adtech dealings - The Verge
thumbnail Iranian linked conglomerate MuddyWater comprised of regionally focused subgroups
thumbnail Guerre en Ukraine : les utilisateurs du réseau satellitaire Viasat victimes d’une cyberattaque
thumbnail New method that amplifies DDoSes by 4 billion-fold. What could go wrong?
thumbnail Belarus conducted widespread phishing campaigns against Ukraine, Poland, Google says
thumbnail China-backed APT41 compromised ‘at least’ six US state governments
thumbnail An update on the threat landscape
thumbnail Samsung confirms hackers stole Galaxy devices source code
thumbnail Hackers leak 190GB of alleged Samsung data, source code
thumbnail Cybercriminals who breached Nvidia issue one of the most unusual demands ever
thumbnail Malware now using stolen NVIDIA code signing certificates
thumbnail Crypto Bug in Samsung Galaxy Devices: Breaking Trusted Execution Environments (TEEs)
thumbnail New Linux Vulnerability CVE-2022-0492 Affecting Cgroups: Can Containers Escape?
thumbnail Scam E-Mail Impersonating Red CrossScam E-Mail Impersonating Red Cross
thumbnail Asylum Ambuscade: State Actor Uses Compromised Private Ukrainian Military Emails to Target European Governments and Refugee Movement
thumbnail L'Anssi sème le doute sur l'usage des solutions Kaspersky
thumbnail Cyber Realism in a Time of War
thumbnail Phishing attacks target countries aiding Ukrainian refugees
thumbnail Toyota suspends domestic factory operations after suspected cyber attack
thumbnail Ukrainian cyber resistance group targets Russian power grid, railways
thumbnail Face à un incident de cybersécurité, Nvidia soupçonné d'avoir répliqué - ZDNet
thumbnail Nvidia Confirms Company Data Was Stolen in Hack
thumbnail IsaacWiper and HermeticWizard: New wiper and worm targeting Ukraine
thumbnail Cybersécurité : l’Union européenne va aider l’Ukraine face à la Russie
thumbnail Ukrainian Researcher Leaks Conti Ransomware Gang Data
thumbnail Cyberattaque contre l’Université de Neuchâtel: des données volées publiées sur le darkweb (update)
thumbnail The Next Web
thumbnail Crypto Donations to Ukraine Jumps to $20M
thumbnail Chinese Cybersecurity Company Doxes Apparent NSA Hacking Operation
thumbnail Google follows YouTube in cutting off ad revenue to Russian state media
thumbnail 2022 Russia-Ukraine war — Cyber group tracker
thumbnail STORMOUS ransomware si schiera senza dirlo, contro l'Ucraina - (in)sicurezza digitale
thumbnail Twitter and Facebook restricted in Russia amid conflict with Ukraine
thumbnail Facebook, Twitter remove disinformation accounts targeting Ukrainians
thumbnail Ukraine border control hit with wiper cyberattack, slowing refugee crossing
thumbnail Anonymous: the hacker collective that has declared cyberwar on Russia | Ukraine
thumbnail Nvidia allegedly hacked its hackers, stole its data back
thumbnail Ukraine takes the resistance to cyberspace, assembling an “IT army” to hack sites from Russia and its allies, calls on tech leaders to get involved
thumbnail New Malware Capable of Controlling Social Media Accounts Infects 5,000+ Machines and is actively being Distributed via Gaming Applications on Microsoft's Official Store
thumbnail Anonymous hacktivists, ransomware groups get involved in Ukraine-Russia conflict
thumbnail US microchip powerhouse Nvidia hit by cyber attack
thumbnail Conti ransomware group announces support of Russia, threatens retaliatory attacks
thumbnail Attacchi informatici, c'è un nuovo malware di uno dei più importanti gruppi di cybercriminali russi
thumbnail TrickBot malware operation shuts down, devs move to BazarBackdoor
thumbnail Ukraine links phishing targeting military to Belarusian hackers
thumbnail Aquarium Leaks. Inside the GRU’s Psychological Warfare Program
thumbnail Ukraine: Disk-wiping Attacks Precede Russian Invasion
thumbnail EXCLUSIVE Ukraine calls on hacker underground to defend against Russia
thumbnail HermeticWiper | New Destructive Malware Used In Cyber Attacks on Ukraine
thumbnail New data-wiping malware used in destructive attacks on Ukraine
thumbnail The Bvp47 - a Top-tier Backdoor of US NSA Equation Group
thumbnail Find You: Building a stealth AirTag clone | Positive Security
thumbnail Un ex-officier de la CIA sur l’Ukraine: «Jamais les Etats-Unis n’ont divulgué autant d’informations sensibles et aussi vite»
thumbnail Chinese cyber-attackers 'targeted Taiwanese financial firms'
thumbnail Horde Webmail 5.2.22 - Account Takeover via Email
thumbnail Behind the stalkerware network spilling the private phone data of hundreds of thousands
thumbnail The US is unmasking Russian hackers faster than ever
thumbnail Comment le leader mondial des data centers a contré l’attaque par rançongiciel de NetWalker
thumbnail Risque de cybersécurité – RUAG doit être plus vigilante sur ses données sensibles
thumbnail Une faille vulnérabilise le gestionnaire de paquets Snap pour Linux
thumbnail Cosa sappiamo di sLoad e perchè è così elusivo? –
thumbnail Pegasus spyware scandal uncovered by fake image file on an iPhone
thumbnail Who Is Behind QAnon? Linguistic Detectives Find Fingerprints
thumbnail Cyberattack targets Vodafone Portugal, disrupts services
thumbnail ‘Zero-Click’ Hacks Are Growing in Popularity. There’s Practically No Way to Stop Them
thumbnail Une cyberattaque met à genou l’Université de Neuchâtel
thumbnail Kazakhstan's Internet Shutdowns Could Be a Warning for Ukraine
thumbnail VMware Horizon servers are under active exploit by Iranian state hackers
thumbnail The Elite Hackers of the FSB
thumbnail Passware parvient à trouver le mot de passe des Mac T2 par force brute
thumbnail Twitter cans 2FA service provider over surveillance claims
thumbnail Red Cross traces hack back to unpatched Zoho vulnerability
thumbnail Assurances cyber : vers une « jurisprudence NotPetya » ?
thumbnail Merck’s $1.4 Billion Insurance Win Splits Cyber From ‘Act of War’
thumbnail Chrome Zero-Day Under Active Attack: Patch ASAP | Threatpost
thumbnail New Emotet Infection Method
thumbnail Russian hackers have obtained sensitive defense information technology by targeting US contractors, according to CISA
thumbnail Meta to Pay $90 Million to Settle Facebook Data Privacy Lawsuit
thumbnail Flood of malicious junk traffic makes Ukrainian websites unreachable | Ars Technica
thumbnail Cyber-attack on ICRC: What we know
thumbnail Vaud – Etudiant débouté en raison de son inactivité en ligne
thumbnail Cyberattack takes Ukraine military, bank websites offline
thumbnail Apple's AirTag uncovers a secret German intelligence agency
thumbnail New DeadBolt ransomware targets QNAP devices, asks 50 BTC for master key
thumbnail Linux-Targeted Malware Increases by 35% in 2021
thumbnail EDPS Preliminary Remarks on Modern Spyware
thumbnail KlaySwap crypto users lose funds after BGP hijack
thumbnail Twitter Tells U.S. Senator It’s Cutting Ties to Swiss Tech Firm
thumbnail Twitter, Google, WhatsApp, Telegram... pourquoi la double authentification n'est finalement pas si sécurisée
thumbnail De nombreuses sociétés suisses touchées par le piratage affectant le monde des télécoms
thumbnail Charting TA2541's Flight
thumbnail Minaccia Malware prende di mira il settore dell'aviazione e dell'industria aerospaziale
thumbnail Dropping Files on a Domain Controller Using CVE-2021-43893
thumbnail PrivateLoader to Anubis Loader. By: Jason Reaves and Joshua Platt
thumbnail PrivateLoader: The first step in many malware schemes
thumbnail Safari Flaws Exposed Webcams, Online Accounts, and More
thumbnail Webcam Hacking (again) - Safari UXSS
thumbnail Objective-See's Blog
thumbnail Analyzing a watering hole campaign using macOS exploits
thumbnail Watering hole deploys new macOS malware, DazzleSpy, in Asia
thumbnail SysJoker : un malware pour macOS, Windows et Linux qui opère discrètement depuis des mois
thumbnail Backdoor RAT for Windows, macOS, and Linux went undetected until now | Ars Technica
thumbnail New SysJoker Backdoor Targets Windows, Linux, and macOS
thumbnail SysJoker analyzing the first (macOS) malware of 2022!
thumbnail Google Docs Comment Exploit Allows for Distribution of Phishing and Malware
thumbnail Can You Trust a File’s Digital Signature? New Zloader Campaign exploits Microsoft’s Signature Verification putting users at risk
thumbnail iPhone flaw exploited by second Israeli spy firm-sources
thumbnail Israelis didn’t care about NSO and Pegasus – until this scandal
thumbnail Le piratage d'une société américaine a des conséquences en Suisse
thumbnail Critical Vulnerabilities in PHP Everywhere Allow Remote Code Execution
thumbnail Google Online Security Blog: Vulnerability Reward Program: 2021 Year in Review
thumbnail ModifiedElephant APT and a Decade of Fabricating Evidence
thumbnail Swisscom, Sunrise et Salt touchés par un piratage aux Etats-Unis
thumbnail North Korea Hacked Him. So He Took Down Its Internet
thumbnail I Used Apple AirTags, Tiles and a GPS Tracker to Watch My Husband’s Every Move - The New York Times
thumbnail Emsisoft Decryptor for Maze / Sekhmet / Egregor - Emsisoft: Free Ransomware Decryption Tools
thumbnail [LEAK] Maze + Egregor + Sekhmet keys along with m0yv (expiro) source code
thumbnail Decryptor released for Maze, Egregor, and Sekhmet ransomware strains | ZDNet
thumbnail Exposed documents reveal how the powerful clean up their digital past using a reputation laundering firm
thumbnail Les 200 mots de passe les plus populaires en 2021
thumbnail Why is the Zoom app listening on my microphone...
thumbnail Who Needs to Exploit Vulnerabilities When You Have Macros?
thumbnail Operation EmailThief: Active Exploitation of Zero-day XSS Vulnerability in Zimbra
thumbnail PwnKit: Local Privilege Escalation Vulnerability Discovered in polkit’s pkexec (CVE-2021-4034)
thumbnail Helping users stay safe: Blocking internet macros by default in Office
thumbnail A walk through Project Zero metrics
thumbnail Mettez à jour iOS ! WebKit contient une vulnérabilité dangereuse
thumbnail Nouvelle version de Safari 15.3 sur Big Sur et Catalina pour combler une faille importante | MacGeneration