Cyberveille
curated by Decio
Nuage de tags
Mur d'images
Quotidien
Rechercher
Flux RSS
Flux RSS
Daily Feed
Weekly Feed
Monthly Feed
tags
search
EncryptHub's dual life: Cybercriminal vs Windows bug-bounty researcher
Russia arrests CEO of tech company linked to Doppelgänger disinformation campaign
Carding tool abusing WooCommerce API downloaded 34K times on PyPI
Someone hacked ransomware gang Everest’s leak site
British Army and Royal Navy hit by cyberattacks from pro-Russian and pro-Palestinian hackers | The Standard
Conseil fédéral: des données privées exposées en ligne
IngressNightmare | Critical Unauthenticated RCE Vulnerabilities in Kubernetes Ingress NGINX
Google Online Security Blog: Google announces Sec-Gemini v1, a new experimental cybersecurity model
One Time Pwnage: SEAL Releases Advisory On SLOVENLY COMET
Europcar GitLab breach exposes data of up to 200,000 customers
Someone is trying to recruit security researchers in bizarre hacking campaign | TechCrunch
Evolution of Sophisticated Phishing Tactics: The QR Code Phenomenon
Surge in Palo Alto Networks Scanner Activity Indicates Possible Upcoming Threats
TTP - Apple Offers Apps With Ties to Chinese Military
Outlaw Linux Malware: Persistent, Unsophisticated, and Surprisingly Effective — Elastic Security Labs
Royal Mail Group Loses 144GB to Infostealers: Same Samsung Hacker, Same 2021 Infostealer Log | InfoStealers
Oracle privately confirms Cloud breach to customers
Global crackdown on Kidflix, a major child sexual exploitation platform with almost two million users | Europol
PhaaS actor uses DoH and DNS MX to dynamically distribute phishing
It takes two: The 2025 Sophos Active Adversary Report
Hacktivists Target France Over Diplomatic Moves
Russian Hacktivists Target Energy And Water Infrastructure
Tomcat in the Crosshairs: New Research Reveals Ongoing Attacks
Apple belatedly fixes exploited flaws in older OSes
Analyzing open-source bootloaders: Finding vulnerabilities faster with AI
From Contagious to ClickFake Interview: Lazarus leveraging the ClickFix tactic
CrushFTP Authentication Bypass - CVE-2025-2825
Fake Zoom Ends in BlackSuit Ransomware
Les actions et projets futurs de l'OFCS pour renforcer la cybersécurité en Suisse
ClickFix: Another Deceptive Social Engineering Technique
Pulling the Threads on the Phish of Troy Hunt
TCCing is Believing
Hidden Malware Strikes Again: Mu-Plugins Under Attack
Ransomware crews add EDR killers to their arsenal
Oracle Health breach compromises patient data at US hospitals
SAMLStorm: Critical Authentication Bypass in xml-crypto and Node.js libraries
Malware found on npm infecting local package with reverse shell
CVE-2025-29927: Next.js Middleware Authorization Bypass
Micropatches released for SCF File NTLM Hash Disclosure Vulnerability (0day)
GorillaBot: Technical Analysis and Code Similarities with Mirai
Troy Hunt: A Sneaky Phish Just Grabbed my Mailchimp Mailing List
VanHelsing, new RaaS in Town
Weaver Ant: Tracking a China-Nexus Cyber Espionage Operation
Chinese hackers spent four years inside Asian telco’s networks
VanHelsing Ransomware
Resurgence of In-The-Wild Activity Targeting Critical ServiceNow Vulnerabilities
Oracle denies breach after hacker claims theft of 6 million data records
Large enterprises scramble after supply-chain attack spills their secrets
How to find Next.js on your network
Next.js Middleware Exploit: Deep Dive into CVE-2025-29927 Authorization Bypass - ZeroPath Blog
Phishing campaign impersonates Booking .com, delivers a suite of credential-stealing malware
SSD Advisory - Linux kernel hfsplus slab-out-of-bounds Write - SSD Secure Disclosure
ZDI-CAN-25373 Windows Shortcut Exploit Abused as Zero-Day in Widespread APT Campaigns | Trend Micro (US)
Exploit Attempts for Cisco Smart Licensing Utility CVE-2024-20439 and CVE-2024-20440
VSCode extensions found downloading early-stage ransomware
Critical Veeam Backup & Replication CVE-2025-23120
Virtue or Vice? A First Look at Proliferating Spyware Operations
Secure Annex - Enterprise Browser Extension Security & Management Platform
Over 16.8 Billion Records Exposed as Data Breaches Increase 6%
Cobalt Strike 4.11: Shhhhhh, Beacon is Sleeping....
Facial Recognition Injection Attacks - An Overview
Decrypting Encrypted files from Akira Ransomware (Linux/ESXI variant 2024) using a bunch of GPUs
Akira ransomware can be cracked with sixteen RTX 4090 GPUs in around ten hours — new counterattack breaks encryption | Tom's Hardware
Inside BRUTED: Black Basta (RaaS) Members Used Automated Brute Forcing Framework to Target Edge Network Devices
Les filiales Spar et les magasins TopCC ont été victimes d’une cyberattaque
Fake "Security Alert" issues on GitHub use OAuth app to hijack accounts
ICANN moves to retire Soviet-era .SU country domain name - Domain Name Wire
Exclusive: Hackers claim cyber attack on Trump winery, golf courses
NIST Selects HQC as Fifth Algorithm for Post-Quantum Encryption
North Korean government hackers snuck spyware on Android app store | TechCrunch
Lookout Discovers North Korean APT37 Mobile Spyware | Threat Intel
DOGE axes CISA ‘red team’ staffers amid ongoing federal cuts | TechCrunch
Medusa Ransomware Activity Continues to Increase
GreyNoise Detects Mass Exploitation of Critical PHP-CGI Vulnerability (CVE-2024-4577)
Google paid $12 million in bug bounties last year to security researchers
Swiss critical sector faces new 24-hour cyberattack reporting rule
ENQUETE. "TrackingFiles" : comment la vie privée de militaires, de diplomates et du personnel politique français est exposée par les données de géolocalisation
Undocumented "backdoor" found in Bluetooth chip used by a billion devices
DPRK IT Fraud Network Uses GitHub to Target Global Companies
North Korean Fake IT Workers Leverage GitHub to Build Personas
Data breach at Japanese telecom giant NTT hits 18,000 companies
Thousands of websites hit by four backdoors in 3rd party JavaScript attack
Silk Typhoon targeting IT supply chain
District of Columbia | Chinese Nationals with Ties to the PRC Government and “APT27” Charged in a Computer Hacking Campaign for Profit, Targeting Numerous U.S. Companies, Institutions, and Municipalities | United States Department of Justice
Blog: Zen and the Art of Microcode Hacking
Cisco warns of Webex for BroadWorks flaw exposing credentials
New DDoS Botnet Discovered: Over 30,000 Hacked Devices, Majority of Observed Activity Traced to Iran
Des cybercriminels s'en prennent à Cistec, fournisseur suisse de système clinique | ICTjournal
Astrill VPN: Silent Push Publicly Releases New IPs on VPN Service Heavily Used by North Korean Threat Actors
360XSS: Mass Website Exploitation via Virtual Tour Framework for SEO Poisoning
Zapier says someone broke into its code repositories and may have accessed customer data
Spyzie stalkerware is spying on thousands of Android and iPhone users
Le plus grave incident de sécurité jamais connu par la Sûreté de l'État: "Des pirates informatiques chinois ont pu rentrer dans ce logiciel"
La série noire continue pour Ruag et l’armée suisse, à la suite d’une cyberattaque massive - Le Temps
Cellebrite zero-day exploit used to target phone of Serbian student activist - Amnesty International Security Lab
Fremdzugriff auf ein E-Mail-Konto der kantonalen Verwaltung Appenzell I.Rh. — Appenzell Innerrhoden
Researchers uncover unknown Android flaws used to hack into a student's phone
Exclusive: Hegseth orders Cyber Command to stand down on Russia planning
Trump administration retreats in fight against Russian cyber threats
Ransomware : sur la piste trouble de l’un des leaders de Black Basta
Cellebrite suspends Serbia as customer after claims police used firm's tech to plant spyware | TechCrunch
Confluence Exploit Leads to LockBit Ransomware
Orange Group confirms breach after hacker leaks company documents
Signals of Trouble: Multiple Russia-Aligned Threat Actors Actively Targeting Signal Messenger
Lumma Stealer Chronicles: PDF-themed Campaign Using Compromised Educational Institutions' Infrastructure
Researchers accuse North Korea of $1.4 billion Bybit crypto heist
An Update on Fake Updates: Two New Actors, and New Mac Malware
Xerox Versalink C7025 Multifunction Printer: Pass-Back Attack Vuln (Fixed) | Rapid7 Blog
Stalkerware apps Cocospy and Spyic are exposing phone data of millions of people | TechCrunch
WordPress ClickFix Malware Causes Google Warnings and Infected Computers
Beware: PayPal "New Address" feature abused to send phishing emails
Weathering the storm: In the midst of a Typhoon
German election targeted by Russian disinformation, security services warn | The Record from Recorded Future News
Black Basta is latest ransomware group to be hit by leak of chat logs
CISA and FBI: Ghost ransomware breached orgs in 70 countries
UK healthcare giant HCRG confirms hack after ransomware gang claims theft of sensitive data
Un expert du darknet dénonce une perquisition abusive par Fedpol
OpenSSH bugs threaten enterprise security, uptime
Threat Spotlight: Inside the World's Fastest Rising Ransomware Operator — BlackLock
Ecuador's legislature says hackers attempted to access confidential information
Microsoft spots XCSSET macOS malware variant used for crypto theft
CVE-2022-31631: High-Risk PHP Vulnerability Demands Immediate Patch
Network Security Issues in RedNote
Investigating Anonymous VPS services used by Ransomware Gangs
Hidden Backdoors Uncovered in WordPress Malware Investigation
Sweden’s PM on suspected cable sabotage: ‘We don’t believe random things suddenly happen quite often’
Storm-2372 conducts device code phishing campaign
PirateFi game on Steam caught installing password-stealing malware
Key figures behind Phobos and 8Base ransomware arrested in international cybercrime crackdown
Cyberattack disrupts Lee newspapers' operations across the US
Spyware maker caught distributing malicious Android apps for years | TechCrunch
An Italian journalist speaks about being targeted with Paragon spyware
CVE-2024-12356
Dutch police say they took down 127 servers used by sanctioned hosting service | The Record from Recorded Future News
Multiple Russian Threat Actors Targeting Microsoft Device Code Authentication | Volexity
Cybercrime: A Multifaceted National Security Threat
New Exploitation Surge: Attackers Target ThinkPHP and ownCloud Flaws at Scale | GreyNoise Blog
Fortinet discloses second firewall auth bypass patched in January
Sky ECC encrypted service distributors arrested in Spain, Netherlands
New UK sanctions target Russian cybercrime network
Four alleged hackers arrested in Phuket for hacking 17 Swiss firms
8 Million Requests Later, We Made The SolarWinds Supply Chain Attack Look Amateur
Go Module Mirror served backdoor to devs for 3+ years - Ars Technica
Spain arrests suspected hacker of US and Spanish military agencies
British engineering firm IMI discloses breach, shares no details
Ransomware payments dropped 35% in 2024
Active Directory Domain Services Elevation of Privilege Vulnerability (CVE-2025-21293)
CVE-2025-0411: Ukrainian Organizations Targeted in Zero-Day Campaign and Homoglyph Attacks
U.S. Government Disclosed 39 Zero-Day Vulnerabilities in 2023, Per First-Ever Report
BSI analysis shows: Nextcloud server stored passwords in plain text | heise online
Arma Reforger And DayZ DDOS Attack Continues, Devs "Making Progress"
Kimsuky hackers use new custom RDP Wrapper for remote access
Deloitte to provide Rhode Island $5M for ransomware recovery
Hackers Exploiting A Six-Year-Old IIS Vulnerability To Gain Remote Access
Code injection attacks using publicly disclosed ASP.NET machine keys
Critical Cisco ISE bug can let attackers run commands as root
Swissmem: vol de donnée par des hackers russes
Spyware maker Paragon terminates contract with Italian government: media reports | TechCrunch
Law enforcement hammered cybercrime in 2024. Is it…
Hackers spoof Microsoft ADFS login pages to steal credentials
Genève: un fournisseur de logiciels bancaires piraté | Tribune de Genève
Unpacking the BADBOX Botnet with Censys
Router maker Zyxel tells customers to replace vulnerable hardware exploited by hackers
Zyxel Telnet Vulnerabilities
SparkCat crypto stealer in Google Play and App Store
PoC Exploit Released for macOS Kernel Vulnerability CVE-2025-24118 (CVSS 9.8)
macOS FlexibleFerret | Further Variants of DPRK Malware Family Unearthed
Une cyberattaque paralyse Radio Top et Tele Top à Winterthour
How Switzerland is caught up in Russia’s propaganda machine
Recent Jailbreaks Demonstrate Emerging Threat to DeepSeek
Live Chat Blog #2: Cisco Webex Connect - Access to millions of chats histories
Exposed SMB: The Hidden Risk Behind ‘WantToCry’ Ransomware Attacks
Eradicating trivial vulnerabilities, at scale
DeepSeek’s Popular AI App Is Explicitly Sending US Data to China | WIRED
Tbilisi public transport hacked, playing pro-European messages
Tata Technologies says ransomware attack hit IT assets, investigation ongoing
X Phishing | Campaign Targeting High Profile Accounts Returns, Promoting Crypto Scams
Swiss tax authority forced to buy Bahamas domain name after URL typo
Active Exploitation of Zero-day Zyxel CPE Vulnerability (CVE-2024-40891)
Norway seizes ship suspected of sabotage, says crew are Russian nationals
10,000 WordPress Websites Found Delivering MacOS and Windows Malware
Wiz Research Uncovers Exposed DeepSeek Database Leaking Sensitive Information, Including Chat History | Wiz Blog
New TorNet backdoor seen in widespread campaign
After security breach at D-Trust: CCC speaks of "cyber window-dressing" | heise online
Salt Typhoon: An Analysis of Vulnerabilities Exploited by this State-Sponsored Actor
Updated: Frederick Health takes systems offline due to ransomware attack
Unmasking FleshStealer: A New Infostealer Threat in 2025
OpenAI launches ChatGPT Gov for U.S. government agencies
Apple fixes this year’s first actively exploited zero-day bug
Cobalt Strike and a Pair of SOCKS Lead to LockBit Ransomware
UnitedHealth updates number of data breach victims to 190 million
Mysterious backdoor found on select Juniper routers
48,000+ internet-facing Fortinet firewalls still open to attack
The J-Magic Show: Magic Packets and Where to find them - Lumen Blog
HellCat and Morpheus | Two Brands, One Payload as Ransomware Affiliates Drop Identical Code
2024 macOS Malware Review | Infostealers, Backdoors, and APT Campaigns Targeting the Enterprise
How A Large-Scale Russian Botnet Operation Stays Under the Radar
Subaru Starlink flaw let hackers hijack cars in US and Canada
fasthttp Used in New Bruteforce Campaign
Targeted supply chain attack against Chrome browser extensions
How GhostGPT Empowers Cybercriminals with Uncensored AI | Abnormal
Government and university websites targeted in ScriptAPI[.]dev client-side attack - c/side
Hundreds of fake Reddit sites push Lumma Stealer malware
Google launches customizable Web Store for Enterprise extensions
Malware Redirects WordPress Traffic to Harmful Sites
Analyse de la cybersécurité des systèmes d’information hospitaliers (SIH)
Swiss cities targeted by Russian hackers during WEF
Mass Campaign of Murdoc Botnet Mirai: A New Variant of Corona Mirai | Qualys Security Blog
Record-breaking 5.6 Tbps DDoS attack and global DDoS trends for 2024 Q4
Malicious extensions circumvent Google’s remote code ban
Researchers Accessed Windows BitLocker Encrypted Files Disassembling the Laptop
IoT Botnet Linked to Large-scale DDoS Attacks Since the End of 2024
Will the Real Volt Typhoon Please Stand Up?
Gootloader inside out
FBI Warns iPhone, Android, Windows Users—Do Not Install These Apps
RansomHub Affiliate leverages Python-based backdoor
The great Google Ads heist: criminals ransack advertiser accounts via fake Google ads | Malwarebytes
Banshee: The Stealer That "Stole Code" From MacOS XProtect
Europe readies ‘action plan’ to secure hospitals from crippling cyberattacks – POLITICO
Bolstering the cybersecurity of the healthcare sector
Passkeys: they're not perfect but they're getting better
Under the cloak of UEFI Secure Boot: Introducing CVE-2024-7344
sfewer-r7's assessment of CVE-2025-0282
Chinese hackers breached US government office that assesses foreign investments for national security risks
New Star Blizzard spear-phishing campaign targets WhatsApp accounts | Microsoft Security Blog
EU law enforcement training agency data breach: Data of 97,000 individuals compromised - Help Net Security
French submarine crew accidentally leak sensitive information through Strava app | Euronews
Ransomware roundup: 2024 end-of-year report - Comparitech
Après l’attaque par rançongiciel, la PME bretonne fait condamner ...
Gootloader inside out – Sophos News
Over 5,000 WordPress sites caught in WP3.XYZ malware attack
IntelBroker Unmasked: KELA’s In-Depth Analysis of a Cybercrime Leader
Luxembourg government websites knocked offline in latest cyberattack | Luxembourg Times
Ministers consider ban on all UK public bodies making ransomware payments | Cybercrime | The Guardian
S'assurer contre les cyberattaques devient hors de prix
Telefonica Breach Exposes Jira Tickets, Customer Data
Victime d'une cyberattaque début décembre, VidyMed a restauré les données ciblées (update)
Cracking the Code: How Banshee Stealer Targets macOS Users
Ransomware abuses Amazon AWS feature to encrypt S3 buckets
Microsoft: macOS bug lets hackers install malicious kernel drivers
UK domain giant Nominet confirms cybersecurity incident linked to Ivanti VPN hacks | TechCrunch
Scholastic Hack: Furry Finds 8 Million People Exposed
Industrial networking manufacturer Moxa reports 'critical' router bugs
Backdooring Your Backdoors - Another $20 Domain, More Governments
Inside FireScam : An Information Stealer with Spyware Capabilities
“Can you try a game I made?” Fake game sites lead to information stealers
Recruitment Phishing Scam Imitates Hiring Process
Telegram hands over data on thousands of users to US law enforcement
Microsoft moves to disrupt hacking-as-a-service scheme that’s bypassing AI safety measures
Green Bay Packers' online store hacked to steal credit cards
UN aviation agency ‘investigating’ security breach after hacker claims theft of personal data
Exploitation Walkthrough and Techniques - Ivanti Connect Secure RCE (CVE-2025-0282)
FunkSec – Alleged Top Ransomware Group Powered by AI
SonicWall urges admins to patch exploitable SSLVPN bug immediately
Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit
Hackers Claim Massive Breach of Location Data Giant, Threaten to Leak Data
Russian ISP confirms Ukrainian hackers "destroyed" its network
Ivanti Connect Secure VPN Targeted in New Zero-Day Exploitation
CVE-2025-0282: Ivanti Connect Secure zero-day exploited in the wild | Rapid7 Blog
Researcher Turns Insecure License Plate Cameras Into Open Source Surveillance Tool
Thousands of credit cards stolen in Green Bay Packers store breach
"Ils nous ont contactés via une messagerie cryptée pour obtenir une rançon" : cette cyberattaque rend la vie impossible aux éleveurs
Casio says hackers stole personal data of 8,500 people during October ransomware attack
Many-shot jailbreaking \ Anthropic
Bad Likert Judge: A Novel Multi-Turn Technique to Jailbreak LLMs by Misusing Their Evaluation Capability
PowerSchool hack exposes student, teacher data from K-12 districts
Telegram Hands U.S. Authorities Data on Thousands of Users
Hackers reportedly compromise Argentina’s airport security payroll system | The Record from Recorded Future News
Chinese hackers also breached Charter and Windstream networks
Rhode Island warns of cybercriminals leaking stolen state files as Deloitte works to restore system
LDAPNightmare: SafeBreach Publishes First PoC Exploit (CVE-2024-49113)
What We Know About CVE-2024-49112 and CVE-2024-49113
US sanctions Chinese cyber firm linked to Flax Typhoon hacks | TechCrunch
White House: Salt Typhoon hacks possible because telecoms lacked basic security measures
NATO’s Emergency Plan for an Orbital Backup Internet
New DoubleClickjacking attack exploits double-clicks to hijack accounts
DoubleClickjacking: A New Era of UI Redressing
New details reveal how hackers hijacked 35 Google Chrome extensions
Finland identifies seven suspects among crew of alleged Russian 'spy' tanker
Ces hackers israéliens qui s’installent à Barcelone
Infocert, in vendita nel deep web milioni di dati di utenti italiani
Palo Alto Firewalls Backdoored by Suspected Chinese Hackers
US Treasury says China accessed government documents in 'major' cyberattack
Thousands of widely-used public workspaces are leaking data
Massive VW Data Leak Exposed 800,000 EV Owners’ Movements, From Homes To Private Spaces | Carscoops
Clop ransomware is now extorting 66 Cleo data-theft victims
DDosia Project: How NoName057(16) is trying to improve the efficiency of DDoS attacks
Cyber firm's Chrome extension hijacked to steal user passwords
Checking It Twice: Profiling Benign Internet Scanners — 2024 Edition
LockBit Ransomware Group Plots Comeback With 4.0 Release
Apple sends spyware victims to this nonprofit security lab
European Space Agency's official store hacked to steal payment cards
Airline hit by a cyberattack, delaying flights during the year-end holiday season
Malware trends: eBPF exploitation, malware configurations stored in unexpected places, and increased use of custom post-exploitation tools
Botnets Continue to Target Aging D-Link Vulnerabilities
Russia's GRU possibly behind cyberattack on Ukraine's government, SBU says
Israel's Mossad spent years orchestrating Hezbollah pager plot
EPFL: des failles de sécurité dans les modèles d'IA
Astrill VPN and Remote Worker Fraud - Spur
Inside Operation Destabilise: How a ransomware investigation linked Russian money laundering and street-level drug dealing
Câbles rompus en mer Baltique : Pékin n’a pas autorisé la Suède à mener son enquête à bord du cargo
Malicious ads push Lumma infostealer via fake CAPTCHA pages
Effective Phishing Campaign Targeting European Companies and Organizations
Judge rules NSO Group is liable for spyware hacks targeting 1,400 WhatsApp user devices
Medion hack? BlackBasta ransomware has allegedly copied 1.5 TB of data | heise online
China 'compromised' Canadian government networks and stole valuable info: spy agency | CBC News
Ascension: Health data of 5.6 million stolen in ransomware attack
NotLockBit: A Deep Dive Into the New Ransomware Threat | Qualys Security Blog
A new playground: Malicious campaigns proliferate from VSCode to npm
The Rise of Alliances: NoName057(16)'s Transformation in 2024
Google Calendar Notifications Bypassing Email Security Policies
Three Months After the Storm: Did Cybercriminals Move to Telegram Alternatives? • KELA Cyber Threat Intelligence
Phishing platform Rockstar 2FA trips, and “FlowerStorm” picks up the pieces – Sophos News
Supply Chain Attack on Rspack npm Packages Injects Cryptojac...
DHS Says China, Russia, Iran, and Israel Are Spying on People in US with SS7
China’s Propaganda Expansion: Inside the Rise of International Communication Centers (ICCs)
Weibo is losing influencers over legal display name rule - Rest of World
Commission opens formal proceedings against TikTok under DSA
Le “banquier” de Hive trahi par sa passion de la course à pied - ...
The Wiretap: Kamala Harris’ Campaign Staff Suspected iPhones Had Been Hacked. Apple Declined To Give Them The Help They Wanted.
Stop Calling Online Scams ‘Pig Butchering,’ Interpol Warns
Meta fined $263M over 2018 security breach that affected ~3M EU Facebook users
State of SonicWall Exposure: Firmware Decryption Unlocks…
Serbian authorities using spyware to hack activists and journalists
CVE-2024-55956
Serbian police used Cellebrite to unlock, then plant spyware, on a journalist's phone | TechCrunch
300,000+ Prometheus Servers and Exporters Exposed to DoS Attacks
PROXY.AM Powered by Socks5Systemz Botnet
Getting a taste of your own medicine: Threat actor MUT-1244 targets offensive actors, leaking hundreds of thousands of credentials | Datadog Security Labs
Oasis Security Research Team Discovers Microsoft Azure MFA Bypass
NodeLoader Used to Deliver Malware
Axpo annonce lancer le premier SOC suisse pour les infrastructures OT | ICTjournal
Threat Actors Push ClickFix Fake Browser Updates Using Stolen Credentials
NATO to launch new cyber center by 2028: Official
'Operation Digital Eye' Attack Targets European IT Orgs
Compromising OpenWrt Supply Chain via Truncated SHA-256 Collision and Command Injection - Flatt Security Research
Fraudulent shopping sites tied to cybercrime marketplace taken offline
BrazenBamboo Weaponizes FortiClient Vulnerability to Steal VPN Credentials via DEEPDATA
What a new threat report says about Mac malware in 2024
Moonlock's 2024 macOS threat report
Zero-Day: How Attackers Use Corrupted Files to Bypass Detection
Unidentified Threat Actor Utilizes Android Malware to Target High-Value Assets in South Asia
Log In POLITICO Pro Home Latest news Romanian elections War in Ukraine French political crisis Newsletters Podcasts Poll of Polls Policy news Events News Politics Hungarian CIA reportedly spied on EU officials
Tuta has suffered multiple DDoS attacks in one week – but it claims privacy has not been compromised
Meeten Malware: A Cross-Platform Threat to Crypto Wallets on macOS and Windows
Ransomware hackers target NHS hospitals with new cyberattacks
8 US telcos compromised, FBI advises Americans to use encrypted communications - Help Net Security
2023 Anna Jaques Hospital data breach impacted +310K people
zizmor would have caught the Ultralytics workflow vulnerability
Ultralytics AI model hijacked to infect thousands with cryptominer
Roumanie : la Cour constitutionnelle annule le premier tour de l’élection présidentielle du fait de graves manipulations sur TikTok
Protecting Undersea Internet Cables: A Tech Challenge
Veeam warns of critical RCE bug in Service Provider Console
Cisco warns of continued exploitation of 10-year-old ASA bug
FBI, CISA urge Americans to use secure messaging apps in wake of massive cyberattack
Cloudflare’s developer domains increasingly abused by threat actors
Black Basta ransomware gang hit BT Group
Where There’s Smoke, There’s Fire - Mitel MiCollab CVE-2024-35286, CVE-2024-41713 And An 0day
At least 8 US telcos, dozens of countries impacted by Salt Typhoon breaches, White House says | The Record from Recorded Future News
Lateral Movement on macOS: Unique and Popular Techniques and In-the-Wild Examples
Malicious Ads in Search Results Are Driving New Generations of Scams | WIRED
iVerify Mobile Threat Investigation Uncovers New Pegasus Samples
Police seize Matrix encrypted chat service after spying on criminals
CVE-2024-1212: Unauthenticated Command Injection In Progress Kemp LoadMaster - Rhino Security Labs
Windows Server 2012 Mark of the Web Vulnerability (0day) - and Free Micropatches for it
Poland arrests former spy chief in Pegasus spyware probe
Energy industry contractor says ransomware attack has limited access to IT systems | The Record from Recorded Future News
AWS launches an incident response service to combat cybersecurity threats | TechCrunch
Data broker exposes 600,000 sensitive files including background checks
UN, international orgs create advisory body for submarine cables after incidents | The Record from Recorded Future News
Plusieurs tentatives: L'État luxembourgeois visé par des cyberattaques
Gaming Engines: An Undetected Playground for Malware Loaders
Starbucks, grocery stores impacted by Blue Yonder ransomware attack - Help Net Security
RobotDropper Automates the Delivery of Multiple Infostealers
PHP Reinfector and Backdoor Malware Target WordPress Sites
Python Crypto Library Updated to Steal Private Keys
11 arrested in Europol shutdown of illegal IPTV streaming networks
UK hospital network postpones procedures after cyberattack
Attacco ransomware al Bologna FC, rubati migliaia di documenti (anche sui calciatori) | Wired Italia
Bootkitty: Analyzing the first UEFI bootkit for Linux
Zello asks users to reset passwords after security incident
Here’s how simple it is for script kiddies to stand up DDoS services
Matrix Unleashes A New Widespread DDoS Campaign
Raspberry Robin Analysis
Yakuza Victim Data Leaked in Japanese Agency Attack
Microsoft Power Pages: Data Exposure Reviewed
CyberVolk | A Deep Dive into the Hacktivists, Tools and Ransomware Fueling Pro-Russian Cyber Attacks
7-Zip flaw enables code smuggling with manipulated archives
China-Nexus TAG-112 Compromises Tibetan Websites to Distribute Cobalt Strike
Apple fixes two zero-days used in attacks on Intel-based Macs
Qualys TRU Uncovers Five Local Privilege Escalation Vulnerabilities in needrestart | Qualys Security Blog
Plusieurs comptes Telegram de députés ont été piratés
Microsoft shares latest intelligence on North Korean and Chinese threat actors at CYBERWARCON | Microsoft Security Blog
Seeing Through a GLASSBRIDGE: Understanding the Digital Marketing Ecosystem Spreading Pro-PRC Influence Operations
Russian Spies Jumped From One Network to Another Via Wi-Fi in an Unprecedented Hack | WIRED
FortiClient VPN Logging Blind Spot Revealed
Cinq membres du groupe de pirates Scattered Spider arrêtés
INPS Servizi sotto attacco ransomware. Dati a rischio e sito irraggiungibile | DDay.it
750 000 fichiers et dossiers patients sensibles français en fuite sur le dark web, que se passe-t-il ?
Threat Actors Hijack Misconfigured Servers for Live Sports Streaming
Picard victime d’une fuite de données, des milliers de clients touchés
Exploit attempts for unpatched Citrix vulnerability
FrostyGoop’s Zoom-In: A Closer Look into the Malware Artifacts, Behaviors and Network Communications
Abnormal Security
Microsoft 365 Admin portal abused to send sextortion emails
Extracting Plaintext Credentials from Palo Alto Global Protect
Pots and Pans, AKA an SSLVPN - Palo Alto PAN-OS CVE-2024-0012 and CVE-2024-9474
T-Mobile finally managed to thwart a data breach before it occured
Anyone Can Buy Data Tracking US Soldiers and Spies to Nuclear Vaults and Brothels in Germany | WIRED
Leaked Documents Show What Phones Secretive Tech ‘Graykey’ Can Unlock
German Stats Body Says Suffered Possible Data Breach | Barron's
Snowflake hackers identified and charged with stealing 50 billion AT&T records | TechCrunch
T-Mobile confirms it was hacked in recent wave of telecom breaches
My Habit Was Collecting
The State of Cloud Ransomware in 2024
CVE-2024-47575
Okta security bug affects those with really long usernames
Windows infected with backdoored Linux VMs in new phishing attacks
China's Volt Typhoon breached Singtel, reports say
Visionaries Have Democratised Remote Network Access - Citrix Virtual Apps and Desktops (CVE Unknown)
Threat Hunting Case Study: Uncovering Turla | Intel 471
“Une curiosité malsaine pour le hacking” : au procès du pirate qu ...
CopyRh(ight)adamantys Campaign: Rhadamantys Exploits Intellectual Property Infringement Baits
Uncovering Apple Vulnerabilities: The diskarbitrationd and storagekitd Audit Story Part 1
How Italy became an unexpected spyware hub
VEEAM exploit seen used again with a new ransomware: “Frag
D-Link won’t fix critical flaw affecting 60,000 older NAS devices
Meet Interlock — The new ransomware targeting FreeBSD servers
DocuSign's Envelopes API abused to send realistic fake invoices
Threat Campaign Spreads Winos4.0 Through Game Application
North Korean hackers employ new tactics to compromise crypto-related businesses - Help Net Security
Nokia says hackers leaked third-party app source code
New Campaign Uses Remcos RAT to Exploit Victims
BlueNoroff Hidden Risk | Threat Actor Targets Macs with Fake Crypto News and Novel Persistence
Gootloader’s Pivot from SEO Poisoning: PDF Converters Become the New Infection Vector
Bengal cat lovers in Australia get psspsspss’d in Google-driven Gootloader campaign
Cyberattack disables tracking systems and panic alarms on British prison vans
Interpol operation nets 41 arrests, takedown of 22,000 malicious IPs
EDR Bypass Testing Reveals Extortion Actor's Toolkit
ClickFix tactic: Revenge of detection
Cisco notifies ‘limited set’ of customers after hacker accessed non-public files
Schneider Electric confirms dev platform breach after hacker steals data
CRON#TRAP: Emulated Linux Environments as the Latest Tactic in Malware Staging - Securonix
The story behind HISAA
SmokeBuster Tool
Massive hack-for-hire scandal rocks Italian political elites
Cyber attack on pharmaceutical distributor AEP
DDoS site Dstat.cc seized and two suspects arrested in Germany
Zero-Click Flaw Exposes Potentially Millions of Popular Storage Devices to Attack
Inside Sophos' 5-Year War With the Chinese Hackers Hijacking Its Devices
Botnet 7777: Are You Betting on a Compromised Router?
A glimpse into the Quad7 operators' next moves and associated botnets
Chinese threat actor Storm-0940 uses credentials from password spray attacks from a covert network
Jumpy Pisces Engages in Play Ransomware
Pacific Rim: Inside the Counter-Offensive—The TTPs Used to Neutralize China-Based Threats
Every Doggo Has Its Day: Unleashing the Xiū Gǒu Phishing Kit
Update your iPhone, Mac, Watch: Apple issues patches for several vulnerabilities | Malwarebytes
Amazon identified internet domains abused by APT29
Midnight Blizzard conducts large-scale spear-phishing campaign using RDP files
ClickFix tactic: The Phantom Meet
Attacker Abuses Victim Resources to Reap Rewards from Titan Network
Elon Musk-Funded PAC Supercharges ‘Progress 2028’ Democrat Impersonation Ad Campaign
ReliaQuest Uncovers New Black Basta Social Engineering Technique - ReliaQuest
US names and charges Maxim Rudometov with developing the Redline infostealer
LightSpy: Implant for iOS
31 new ransomware groups were discovered in 2024
Update on Windows Downdate
Cyberattaque: la panne de Onelog persiste (update)
Hacker Returns $19.3 Million to Drained US Government Crypto Wallet
Self-contained HTML phishing attachment using Telegram to exfiltrate stolen credentials - SANS Internet Storm Center
Cisco fixes bug under exploit in brute-force attacks
Researchers say AI transcription tool used in hospitals invents things no one ever said | AP News
POLITICO Europe
Fog ransomware targets SonicWall VPNs to breach corporate networks
New Windows Driver Signature bypass allows kernel rootkit installs
How Israel’s bulky pager fooled Hezbollah
Akira ransomware continues to evolve
Rubavano informazioni da banche dati strategiche e nazionali: sei indagati. Spiati anche alcuni politici
Fake IT Workers: How HYPR Stopped a Fraudulent Hire
Embargo ransomware: Rock’n’Rust
Triad Nexus: Silent Push exposes FUNNULL CDN hosting DGA domains for suspect Chinese gambling sites, investment scams, a retail phishing campaign, and a polyfill.io supply chain attack impacting 110,000+ sites
Apple Shares Private Cloud Compute Virtual Research Environment, Provides Bounties for Vulnerabilities - MacRumors
Encrypted Chat App ‘Session’ Leaves Australia After Visit From Police
macOS NotLockBit | Evolving Ransomware Samples Suggest a Threat Actor Sharpening Its Tools
Fortinet FortiManager CVE-2024-47575 Exploited in Zero-Day Attacks
Ransomware Gangs Use LockBit's Fame to Intimidate Victims in Latest Attacks
ShadyShader: Crashing Apple Devices with a Single Click
Rogue RDP – Revisiting Initial Access Methods
How Low Can You Go? An Analysis of 2023 Time-to-Exploit Trends
ESET themed wiper Targets Israel
Decrypted: Mallox ransomware
Researchers link Polyfill supply chain attack to huge network of copycat gambling sites
Fortinet releases patches for undisclosed critical FortiManager vulnerability - Help Net Security
Hackers exploit Roundcube webmail flaw to steal email, credentials
Invisible text that AI chatbots understand and humans can’t? Yep, it’s a thing. - Ars Technica
Lynx Ransomware: A Rebranding of INC Ransomware
Burning Zero Days: Suspected Nation-State Adversary Targets Ivanti CSA
FASTCash for Linux
Spate of ransomware attacks on German-speaking schools hits another in Switzerland
The War on Passwords Is One Step Closer to Being Over
THREAT ANALYSIS: Beast Ransomware
Tricks and Treats: GHOSTPULSE’s new pixel-level deception
Internet Archive breached again through stolen access tokens
Des espions chinois découverts en Suisse sur un malentendu
Microsoft creates fake Azure tenants to pull phishers into honeypots
HijackLoader evolution: abusing genuine signing certificates
Amazon helps the US Department of Justice thwart international cybercriminal group Anonymous Sudan
Swiss identified in Austrian bomb threat investigation
USDoD hacker behind National Public Data breach arrested in Brazil
Fake recruiter coding tests target devs with malicious Python packages
Jetpack fixes critical information disclosure flaw existing since 2016
British intelligence services to protect all UK schools from ransomware attacks
Fortinet FortiGate CVE-2024-23113 - A Super Complex Vulnerability In A Super Secure Appliance In 2024
Gamers Tricked Into Downloading Lua-Based Malware via Fake Cheating Script Engines
Neo-Nazis head to encrypted SimpleX Chat app, bail on Telegram
CTV industry’s unprecedented “surveillance”
Ukrainian pleads guilty to operating Raccoon Stealer malware
Dutch police arrest admin of 'Bohemia/Cannabia' dark web market
MoneyGram says hackers stole customers' personal information and transaction data | TechCrunch
1 bug, $50,000+ in bounties, how Zendesk intentionally left a backdoor in hundreds of Fortune 500 companies
Telekopye transitions to targeting tourists via hotel booking scam
Pokemon developer Game Freak hit with hack, internal info leaking
UK Ambulance Services targeted by Kremlin-protected Russian hackers
Hackers Advertise Stolen Verizon Push-to-Talk ‘Call Logs’
A Mysterious Hacking Group Has 2 New Tools to Steal Data From Air-Gapped Machines | WIRED
Microsoft deprecates PPTP and L2TP VPN protocols in Windows Server
Hacked Robot Vacuums Across the U.S. Started Yelling Slurs
U.S., Microsoft seize over 100 websites allegedly used by Russian spies
Internet Archive hacked, data breach impacts 31 million users
File hosting services misused for identity phishing
AI girlfriend site breached, user fantasies stolen
Hackers targeted Android users by exploiting zero-day bug in Qualcomm chips
From Perfctl to InfoStealer
Zero Day Initiative — The October 2024 Security Update Review
Ivanti warns of three more CSA zero-days exploited in attacks
Ukraine Claims Cyberattack Blocked Russian State TV Online on Putin’s Birthday
The 30-year-old internet backdoor law that came back to bite
Mamba 2FA: A new contender in the AiTM phishing ecosystem - Sekoia.io Blog
New Gorilla Botnet Launches Over 300,000 DDoS Attacks Across 100 Countries
Alert: Over 700,000 DrayTek Routers Exposed to Hacking via 14 New Vulnerabilities
perfctl: A Stealthy Malware Targeting Millions of Linux Servers
Arrests in international operation targeting cybercriminals in West Africa
DOJ, Microsoft seize more than 100 domains used by the FSB
Further Evil Corp cyber criminals exposed, one unmasked as LockBit affiliate - National Crime Agency
How the FBI and Mandiant caught a 'serial hacker' who tried to fake his own death
Apple fixes password-blurting VoiceOver bug
Cyble Honeypot Sensors Detect WordPress Plugin Attack, New Banking Trojan
Rackspace systems hit by zero-day exploit of third-party app • The Register
Patch for Critical CUPS vulnerability: Don't Panic - SANS Internet Storm Center
Recently patched CUPS flaw can be used to amplify DDoS attacks
Dutch Police: ‘State actor’ likely behind recent data breach
A Measure of Motive: How Attackers Weaponize Digital Analytics Tools | Google Cloud Blog
Over 300,000! GorillaBot: The New King of DDoS Attacks
US senator targeted by deepfake caller posing as Ukrainian diplomat | US politics | The Guardian
Multiple Vulnerabilities Discovered in PHP, Prompting Urgent Security Updates
Event Log Talks a Lot: Identifying Human-operated Ransomware through Windows Event Logs - JPCERT/CC Eyes
Agence France-Presse says cyberattack targeted IT systems
Crucial Texas hospital system turning ambulances away after ransomware attack
LockBit power cut: four new arrests and financial sanctions against affiliates | Europol
Critical flaw in NVIDIA Container Toolkit allows full host takeover
Storm-0501: Ransomware attacks expanding to hybrid cloud environments
CVE-2024-8353 (CVSS 10): Critical GiveWP Flaw, 100k WordPress Sites at Risk
Nitrogen Campaign Drops Sliver and Ends With BlackCat Ransomware
Banks: Zurich asset manager hit by massive hacker attack
Wiz Research Finds Critical NVIDIA AI Vulnerability Affecting Containers Using NVIDIA GPUs, Including Over 35% of Cloud Environments | Wiz Blog
Hacker behind Snowflake customer data breaches remains active
Hacking Kia: Remotely Controlling Cars With Just a License Plate
Meta fined $102 million for storing passwords in plain text
10 security bugs put fuel storage tanks at risk of attacks
NIST proposes barring some of the most nonsensical password rules
China-linked APT group Salt Typhoon compromised some US ISPs
Simple Mail Transfer Pirates: How threat actors are abusing third-party infrastructure to send spam
Rhadamanthys Stealer v0.7.0: A Rising Threat in the Cybercrime Ecosystem
Attacking UNIX Systems via CUPS, Part I
Hacker plants false memories in ChatGPT to steal user data in perpetuity
Dozens of Fortune 100 companies have unwittingly hired North Korean IT workers, according to report
Behind the CAPTCHA: A Clever Gateway of Malware
Informatique: l’Etat de Vaud victime d’attaques «très virulentes»
Critical Ivanti vTM auth bypass bug now exploited in attacks
Kryptina RaaS | From Unsellable Cast-Off to Enterprise Ransomware
US intelligence agencies confirm Russia is pushing fake videos of Kamala Harris
Staying a Step Ahead: Mitigating the DPRK IT Worker Threat
Telegram Changes Policy, Says It Will Provide User Data to Authorities
Rental Car Vendor's Security Flaw Exposed Damage Claims Reports
China urges netizens to be vigilant against Taiwanese cyberattacks
Microsoft ends development of Windows Server Update Services (WSUS)
Insecure software makers are the real cyber villains – CISA
Global infostealer malware operation targets crypto users, gamers
Criminal phishing network resulting in over 480 000 victims worldwide busted in Spain and Latin America | Europol
GitLab Critical Patch Release: 17.3.3, 17.2.7, 17.1.8, 17.0.8, 16.11.10
Enterprise ServiceNow Knowledge Bases at Risk
Thousands of orgs at risk of ServiceNow KB data leaks
New Criminal Complaint Over Pegasus Spyware Hacking of journalists and activists in the UK
Is Tor still safe to use?
New macOS malware HZ RAT lets attackers control Macs remotely
Clever 'GitHub Scanner' campaign abusing repos to push malware
WebDAV-as-a-Service: Uncovering the infrastructure behind Emmenhtal loader distribution
Australian police infiltrate encrypted messaging app Ghost and arrest dozens
Europol takes down "Ghost" encrypted messaging platform used for crime
Police Hack Into ‘Ghost’, An Encrypted Platform for Criminals
Mastercard invests in continued defense of global digital economy with acquisition of Recorded Future
Port of Seattle refuses to pay Rhysida ransom, warns of data leak
How Lazarus Group laundered $200M from 25+ crypto hacks to fiat …
An Offer You Can Refuse: UNC2970 Backdoor Deployment Using Trojanized PDF Reader
Qilin ransomware attack on Synnovis impacted over 900K patients
Microsoft working on OS update to prevent another IT outage
Hadooken Malware Targets Weblogic Applications
Apple is well on its way to making iPhones theft-proof
SolarWinds fixed critical RCE CVE-2024-28991 in Access Rights Manager
Multiple attacks forces CISA to order agencies to upgrade or remove end-of-life Ivanti appliance
German radio station forced to broadcast 'emergency tape' following cyberattack
23andMe Agrees To $30 Million Settlement For Last Year's Data Breach
Scammers advertise fake AppleCare+ service via GitHub repos
UK arrests teen linked to Transport for London cyber attack
Distributed Denial of Truth (DDoT): The Mechanics of Influence Operations and The Weaponization of Social Media
Ils réclament 3 millions à la Banque cantonale de Zurich: 4 jeunes arrêtés
Chinese APT Abuses VSCode to Target Government in Asia
In Wake of Durov Arrest, Some Cybercriminals Ditch Telegram
RansomHub claims Kawasaki cyberattack, threatens to leak stolen data
Data centres as vital as NHS and power grid, government says
CVE-2024-29847 Deep Dive: Ivanti Endpoint Manager AgentPortal Deserialization of Untrusted Data Remote Code Execution Vulnerability – Horizon3.ai
TfL confirms 5,000 customers' bank data exposed
Hold – Verify – Execute: Rise of Malicious POCs Targeting Security Researchers
Transport for London confirms customer data stolen in cyberattack
Fortinet suffers third-party data breach affecting Asia-Pacific customers - Cyber Daily
Europe’s privacy watchdog probes Google over data used for AI training
Telegram: 'The dark web in your pocket'
Enquête ESET : le cybergang CosmicBeetle cible des entreprises françaises et devient affilié de RansomHub | UnderNews
We Spent $20 To Achieve RCE And Accidentally Became The Admins Of .MOBI
A glimpse into the Quad7 operators' next moves and associated botnets
Tracking Ransomware - August 2024 - CYFIRMA
Arctic Wolf Observes Akira Ransomware Campaign Targeting SonicWall SSLVPN Accounts
Critical SonicWall SSLVPN bug exploited in ransomware attacks
Veeam Backup & Response - RCE With Auth, But Mostly Without Auth (CVE-2024-40711)
Sextortion scams now use your "cheating" spouse’s name as a lure
New Android SpyAgent Campaign Steals Crypto Credentials via Image Recognition
Une faille dans le HDMI permet de voler des mots de passe et des informations sensibles
Progress LoadMaster vulnerable to 10/10 severity RCE flaw
Free Russia Foundation to investigate data breach after internal documents published online — Novaya Gazeta Europe
Swiss found to be gullible regarding fake news
Predator Spyware Infrastructure Resurfaces Post-Sanctions – What You Need to Know
D-Link says it is not fixing four RCE flaws in DIR-846W routers
U.S. charges five Russian military members for destructive cyber ops, hack-and-leak campaigns | CyberScoop
Fake OnlyFans Checker Tool Infects Hackers with Lummac Stealer Malware
Obfuscated PowerShell leads to Lumma C2 Stealer
Online AI Mental Health and Addiction Treatment Provider Exposed Patient Data
Quarante pourcents de la population se tourne vers l'IA
U.S. Seizes 32 Pro-Russian Propaganda Domains in Major Disinformation Crackdown
Lowe's employees phished via Google ads | Malwarebytes
Unpacking the unpleasant FIN7 gift: PackXOR
Veeam warns of critical RCE flaw in Backup & Replication software
Researchers Unpacked AvNeutralizer EDR Killer Used By FIN7 Group
Critical Account Takeover in LiteSpeed Cache Plugin
YubiKeys are vulnerable to cloning attacks thanks to newly discovered side channel
Cisco warns of backdoor admin account in Smart Licensing Utility
Police Ombudsman sorry for ‘distressing’ data leak as investigation is launched
Making progress on routing security: the new White House roadmap
RPKI ROV Deployment Reaches Major Milestone
Dutch regulator slaps Clearview AI with $33 million fine, threatens executive liability - The Verge
Transport for London faces 'ongoing cyber security incident'
Government Emails at Risk: Critical Cross-Site Scripting Vulnerability in Roundcube Webmail
North Korean threat actor Citrine Sleet exploiting Chromium zero-day
Admins of MFA bypass service plead guilty to fraud
Cryptojacking via CVE-2023-22527: Dissecting a Full-Scale Cryptomining Ecosystem
The Malware That Must Not Be Named: Suspected Espionage Campaign Delivers “Voldemort”
Après un ransomware, l'université Paris-Saclay lance un site provisoire
Spoofed GlobalProtect Used to Deliver Unique WikiLoader Variant
Fake Google Authenticator Website Installs Malware
Cicada 3301 - Ransomware-as-a-Service - Technical Analysis
Docker-OSX image used for security research hit by Apple DMCA takedown
Germany's Sovereign Tech Fund Puts Over $750K Into FreeBSD Infrastructure Projects
Fake Palo Alto GlobalProtect used as lure to backdoor enterprises
Dutch cabinet bans phones in meetings over espionage fears
Scam Sites at Scale: LLMs Fueling a GenAI Criminal Revolution
State-backed attackers and commercial surveillance vendors repeatedly use the same exploits
HZ Rat backdoor for macOS harvests data from WeChat and DingTalk
Telegram CEO’s brother also wanted by French authorities
Unprecedented 3.15 Billion Packet Rate DDoS Attack Mitigated by Global Secure Layer
Threat Actors Retaliate After Durov’s Arrest
Après l’arrestation de Pavel Durov, une vague de cyberattaques cible la France
Paris court explains why it's arrested Telegram founder, Pavel Durov
Malicious Plugin
WordPress Websites Used to Distribute ClearFake Trojan Malware
Is Telegram really an encrypted messaging app? – A Few Thoughts on Cryptographic Engineering
Telegram says CEO has ‘nothing to hide’ after being arrested in France
The gift that keeps on giving: A new opportunistic Log4j campaign
BlackSuit Ransomware
OpenSSH Backdoors
Unveiling sedexp: A Stealthy Linux Malware Exploiting udev Rules
Cyberattaque contre Swisscom: L'attaque DDos repoussée
Xeon Sender | SMS Spam Shipping Multi-Tool Targeting SaaS Credentials
TodoSwift Disguises Malware Download Behind Bitcoin PDF
Cthulhu Stealer malware aimed to take macOS user data
From the Depths: Analyzing the Cthulhu Stealer Malware for macOS
FIN7: The Truth Doesn't Need to be so STARK
Unmasking Styx Stealer: How a Hacker's Slip Led to an Intelligence Treasure Trove - Check Point Research
Qilin ransomware caught stealing credentials stored in Google Chrome
Touché par un ransomware, Schlatter Industries a relancé ses systèmes (update) | ICTjournal
NGate Android malware relays NFC traffic to steal cash
No one’s ready for this
Windows 0-day was exploited by North Korea to install advanced rootkit
Litespeed Cache bug exposes millions of WordPress sites to takeover attacks
Iran Reportedly Grapples With Major Cyberattack on Banking Systems
Widespread Cloud Exposure: Extortion Campaign Used Exposed AWS ENV Files To Target 110,000 Domains
Chipmaker Microchip reveals cyber attack
MITRE Marks Major Milestone, Minting 400 CNAs as NVD Backlog Grows - Socket
The Abuse of ITarian RMM by Dolphin Loader
Toyota confirms breach after stolen data leaks on hacking forum
Routers from China-based TP-Link a national security threat, US lawmakers claim
How multiple vulnerabilities in Microsoft apps for macOS pave the way to stealing permissions
Windows driver zero-day exploited by Lazarus hackers to install rootkit
stardom dreams, stalking devices and the secret conglomerate selling both
Beyond the wail: deconstructing the BANSHEE infostealer
DDoS attack volume rises, peak power reaches 1.7 Tbps
Geopolitical Tensions Drive Explosion in DDoS Attacks
SolarWinds fixes critical RCE bug affecting all Web Help Desk versions
Zabbix Server Vulnerability Lets Attacker Execute Arbitrary Code
Ransomware attackers introduce new EDR killer to their arsenal
Leaked Environment Variables Allow Large-Scale Extortion Operation of Cloud Environments
Doppelgänger operation rushes to secure itself amid ongoing detections, German agency says
White House working on cyber insurance policy proposal for ‘catastrophic’ incidents
Gafgyt Malware Variant Exploits GPU Power and Cloud Native Environments
The Hidden Treasures of Crash Reports
Troy Hunt: Inside the "3 Billion People" National Public Data Breach
A Single Iranian Hacker Group Targeted Both Presidential Campaigns
Want to Win a Bike Race? Hack Your Rival’s Wireless Shifters | WIRED
Inside the FBI's Dashboard for Wiretapping the World
Le transfert de données Suisse-USA à nouveau facilité
Extension Trojan Malware Campaign
Russia-linked phishing campaigns ensnare civil society and NGOs
Critical SAP flaw allows remote attackers to bypass authentication
CVE-2024-39825 and CVE-2024-39818: High-Risk Zoom Flaws Require Urgent Updates
CVE-2024-23897 Enabled Ransomware Attack on Indian Banks
Exploitable PoC Released for CVE-2024-38077: 0-Click RCE Threatens All Windows Servers
Suspected head of prolific cybercrime groups arrested and extradited - National Crime Agency
Compromising Microsoft's AI Healthcare Chatbot Service
Don’t get Mad, get wise
Exploiting pfsense Remote Code Execution – CVE-2022-31814
NIST's Post-Quantum Cryptography Standards Are Here - IEEE Spectrum
60 Hurts per Second – How We Got Access to Enough Solar Power to Run the United States
Technical Exploits of HID's iClass SE Discovered, To Be Revealed at DEF CON 32
Feds seize Radar/Dispossessor ransomware gang servers in US and Europe
CrowdStrike Exec Shows Up to Accept 'Most Epic Fail' Award in Person
Les cybercriminels ont copié dieci.ch à l'identique
Ongoing Social Engineering Campaign Refreshes Payloads
Chained for attack: OpenVPN vulnerabilities discovered leading to RCE and LPE | Microsoft Security Blog
Security bugs in ransomware leak sites helped save six companies from paying hefty ransoms
A Dive into Earth Baku’s Latest Campaign
Hackers leak 2.7 billion data records with Social Security numbers
Iran Targeting 2024 US Election
Threat Actors’ Toolkit: Leveraging Sliver, PoshC2 & Batch Scripts
How a cybersecurity researcher befriended, then doxed, the leader of LockBit
AMD won't patch all chips affected by severe data theft vulnerability — Ryzen 3000, 2000, and 1000 will not get patched for 'Sinkclose' | Tom's Hardware
Hackers Steal Trump’s JD Vance ‘Dirty Laundry’ Dossier As 2016 Strikes Again
New AMD SinkClose flaw helps install nearly undetectable malware
‘Sinkclose’ Flaw in Hundreds of Millions of AMD Chips Allows Deep, Virtually Unfixable Infections
From Limited file read to full access on Jenkins (CVE-2024-23897)
How Hackers Extracted the ‘Keys to the Kingdom’ to Clone HID Keycards
ICANN approves use of .internal domain for your network
USPS Text Scammers Duped His Wife, So He Hacked Their Operation | WIRED
Treasury Sanctions Leader and Primary Member of the Cyber Army of Russia Reborn | U.S. Department of the Treasury
Google Drawings and WhatsApp Zero-hour Open Redirection Phish exposed - Blog | Menlo Security
WhatsUp Gold Pre-Auth RCE GetFileWithoutZip Primitive
Open letter to UK online service providers
INTERPOL recovers over $40 million stolen in a BEC attack
Major Payment Disruption: Ransomware Strikes Indian Banking Infrastructure
Critical Vulnerability in Apache OFBiz Requires Immediate Patching - Infosecurity Magazine
CrowdStrike says it isn't to blame for Delta's flight cancellations after July outage
Hackers breached MDM firm Mobile Guardian and wiped thousands of devices
Cybersécurité : le Grand Palais et plusieurs musées dont le Louvre victimes d’une attaque par rançongiciel
Threat Actors Capitalize On ServiceNow Vulnerability
Ransomware gang targets IT workers with new SharpRhino malware
Google fixes Android kernel zero-day exploited in targeted attacks
European Commission forces TikTok rewards program to shut down on the continent
China-Linked Hackers Compromise ISP to Deploy Malicious Software Updates
Surge in Magniber ransomware attacks impact home users worldwide
Russia-linked operations target Paris 2024 Olympics
Cybercriminals Abusing Cloudflare Tunnels to Evade Detection and Spread Malware
Quartet of Trouble: XWorm, AsyncRAT, VenomRAT, and…
Black Basta ransomware switches to more evasive custom malware
UNC4393 Goes Gently into the SILENTNIGHT
Cyber Espionage Group XDSpy Targets Companies in Russia and Moldova
How the theft of 40M UK voter register records was entirely preventable
Social Media Malvertising Campaign Promotes Fake AI Editor Website for Credential Theft
Mozilla follows Google in distrusting Entrust’s TLS certs • The Register
Turkey blocks access to Instagram – POLITICO
Who are the two major hackers Russia just received in a prisoner swap?
Nouvelles vagues de vandalisme sur les fibres optiques : Internet perturbé en France - Next
Swiss stock exchange halts trading due to technolgy issues
'Error' in Microsoft's DDoS defenses amplified Azure outage
IBM: Cost of a breach reaches nearly $5 million, with healthcare being hit the hardest
Cyberattack hits blood-donation nonprofit OneBlood
Microsoft says massive Azure outage was caused by DDoS attack
Google ads push fake Google Authenticator site installing malware
La Bourse suisse interrompt ses transactions pendant plusieurs heures
New Mandrake Android spyware version discovered on Google Play | Securelist
French fiber optic cables hit by ‘major sabotage’ in second Olympics attack
Hackers Exploited a PC Driving Sim to Pull Off Massive Disney Data Breach
Ferrari exec foils deepfake plot by asking a question only the CEO could answer
Websites are Blocking the Wrong AI Scrapers (Because AI Companies Keep Making New Ones)
CrowdStrike's Impact on Aviation
Ransomware operators exploit ESXi hypervisor vulnerability for mass encryption | Microsoft Security Blog
TikTok Has a Nazi Problem
LummaC2 Malware Abusing the Game Platform 'Steam' - ASEC BLOG
Meta nukes massive Instagram sextortion network of 63,000 accounts
SwRI evaluates cybersecurity risks associated with EV fast-charging equipment | Southwest Research Institute
Mid-year Doppelgänger information operations in Europe and the US
Malicious Python Package Targets macOS Developers
SeleniumGreed Cryptomining Campaign Exploiting Grid Services | Wiz Blog
Windows Security best practices for integrating and managing security tools
BreachForums v1 hacking forum data leak exposes members’ info
NCA infiltrates world's most prolific DDoS-for-hire service - National Crime Agency
NVD Analysis Report
Microsoft calls for Windows changes and resilience after CrowdStrike outage
BIND updates fix high-severity DoS bugs in the DNS software suite
PKfail: Untrusted Platform Keys Undermine Secure Boot on UEFI Ecosystem
Secure Boot is completely broken on 200+ models from 5 big device makers | Ars Technica
Six-day, 14.7 Million RPS Web DDoS Attack Campaign Attributed to SN_BLACKMETA
Stargazers Ghost Network
DDoS Attacks in Spain
Israel Maneuvered to Prevent Disclosure of State Secrets amid WhatsApp vs NSO Lawsuit - Forbidden Stories
Switzerland now requires all government software to be open source
Data breach exposes US spyware maker behind Windows, Mac, Android and Chromebook malware
TuDoor
Intelligence Brief: Impact of FrostyGoop Modbus Malware on Connected OT Systems
Lviv neighbourhood left without heating, hot water by hacker attack
Ransomware ecosystem fragmenting under law enforcement pressure and distrust
CrowdStrike blames a test software bug for Windows wipeout
Threat Actor Uses Fake Recovery Manual to Deliver Unidentified Stealer
Ils soutirent 346'000 francs grâce à une arnaque WhatsApp
Exploiting CVE-2024-21412: A Stealer Campaign Unleashed
Solving the 7777 Botnet enigma: A cybersecurity quest
Telegram zero-day allowed sending malicious Android APKs as videos
Spanish police arrest three suspects linked to pro-Moscow NoName057(16) hackers
NCA infiltrates DDoS-for-hire site as suspected controller arrested in Northern Ireland
Arctic Wolf Labs has observed Fog ransomware being deployed against US organizations in the education and recreation sectors.
Doppelganger – How Russia uses EU companies for propaganda
New Play Ransomware Linux Variant Targets ESXi Shows Ties With Prolific Puma | Trend Micro (US)
dirDevil: Hiding Code and Content Within Folder…
Spanish Police Arrests NoName Hackers
Technical Details: Falcon Update for Windows Hosts
Trump shooter used Android phone from Samsung; cracked by Cellebrite in 40 minutes - 9to5Mac
Our Statement on Today's Outage
Teenage suspect in MGM Resorts hack arrested in Britain
Leaked Docs Show What Phones Cellebrite Can (and Can’t) Unlock
Special Report: Massive Global IT Outages Triggered by Faulty CrowdStrike Update
APT41 Has Arisen From the DUST
Banks, airlines, brokerage houses report widespread outages across the globe
New hacker group uses open-source tools to spy on entities in Asia-Pacific region
Critical Cisco bug lets hackers add root users on SEG devices
Trello Data Breach: Hacker Dumps Personal Info of Millions of Users
INTERPOL operation strikes major blow against West African financial crime
NullBulge | Threat Actor Masquerades as Hacktivist Group Rebelling Against AI
Fake AWS Packages Ship Command and Control Malware In JPEG Files
FIN7 Reboot | Cybercrime Gang Enhances Ops with New EDR Bypasses and Automated Attacks
MediSecure reveals about 12.9 million Australians had personal data stolen by hackers in April | Australia news | The Guardian
Germany to ban Chinese companies' components from core parts of its 5G networks | AP News
Iraq-based cybercriminals deploy malicious Python packages to steal data
ClickFix Deception: A Social Engineering Tactic to Deploy Malware
FBI Gains Access to Suspected Trump Shooter’s Password Locked Phone
Uncoordinated Vulnerability Disclosure: The Continuing Issues with CVD
Kaspersky Lab Closing U.S. Division; Laying Off Workers
AT&T Paid a Hacker $370,000 to Delete Stolen Phone Record
Critical Exim bug bypasses security filters on 1.5 million mail servers
Doppelganger operation
NATO members commit to creating new cyber center in Belgium
Kematian-Stealer : A Deep Dive into a New Information Stealer
Persistent npm Campaign Shipping Trojanized jQuery
Distribution of AsyncRAT Disguised as Ebook
Apple warns iPhone users in 98 countries of spyware attacks
CloudSorcerer APT uses cloud services and GitHub as C2 | Securelist
Behind the Attack: Live Chat Phishing
How do cryptocurrency drainer phishing scams work?
Resurrecting Internet Explorer: Threat Actors Using Zero-day Tricks in Internet Shortcut File to Lure Victims (CVE-2024-38112)
Chinese APT40 hackers hijack SOHO routers to launch attacks
New Blast-RADIUS attack breaks 30-year-old protocol used in networks everywhere
CVE-2024-38021: Moniker RCE Vulnerability Uncovered in Microsoft Outlook
New OpenSSH Vulnerability Discovered: Potential Remote Code Execution Risk
US Disrupts Russian Bots Spreading Propaganda on Twitter
Hackers target WordPress calendar plugin used by 150,000 sites
EDR as an Offensive Tool
‘Serious hacker attack’ forces Frankfurt university to shut down IT systems
Decrypted: DoNex Ransomware and its Predecessors
South African pathology labs down after ransomware attack
New Intel CPU Vulnerability 'Indirector' Exposes Sensitive Data
Russia forces Apple to remove VPN apps from the App Store
Supply Chain Compromise Leads to Trojanized Installers | Rapid7 Blog
Indian Software Firm's Products Hacked to Spread Data-Stealing Malware
Formula 1 governing body discloses data breach after email hacks
'Welcome to Londonistan': the Great Replacement theory gone visual ahead of the U.K. election
Il silenzio di Synlab sul furto e la diffusione di migliaia di dati sanitari - Il Post
How scam networks use fake celebrity ads to lure online investors
The Rise of Packet Rate Attacks: When Core Routers Turn Evil
RoguePuppet – A Critical Puppet Forge Supply Chain Vulnerability
Europol coordinates global action against criminal abuse of Cobalt Strike
blog.ethereum.org mailing list incident
Sonar
OpenAI’s ChatGPT Mac app was storing conversations in plain text
Twilio says hackers identified cell phone numbers of two-factor app Authy users
Europol coordinates global action against criminal abuse of Cobalt Strike | Europol
Arnaque aux codes QR sur les horodateurs de la Ville de Nyon
CVE-2024-29510 - Exploiting Ghostscript using format strings
3 million iOS and macOS apps were exposed to potent supply-chain attacks
Figma Disables AI App Design Tool After It Copied Apple’s Weather App
Poland to probe Russia-linked cyberattack on state news agency
Cisco NX-OS Command Injection Vulnerability CVE-2024-20399: Insights and Defense Strategies
Vulnerabilities in CocoaPods Open the Door to Supply Chain Attacks Against Thousands of iOS and MacOS Applications
TeamViewer: Hackers copied employee directory data and encrypted passwords
Halcyon Identifies New Ransomware Operator Volcano Demon Serving Up LukaLocker
Analysis of the Phishing Campaign: Behind the Incident
Startups scramble to assess fallout from Evolve Bank data breach
Cisco warns of NX-OS zero-day exploited to deploy custom malware
Polyfill, Cloudflare trade barbs after reports of supply chain attack threatening 100k websites
regreSSHion: Remote Unauthenticated Code Execution Vulnerability in OpenSSH server
Meet Brain Cipher — The new ransomware behind Indonesia's data center attack
New SnailLoad Attack Exploits Network Latency to Spy on Users' Web Activities
New Medusa malware variants target Android users in seven countries
Polyfill claims it has been 'defamed', returns after domain shut down
ID Verification Service for TikTok, Uber, X Exposed Driver Licenses
LockBit lied: Stolen data is from a bank, not US Federal Reserve
Hubspot says it's investigating customer account hacks | TechCrunch
Critical GitLab bug lets attackers run pipelines as any user
South Korean telecom company attacks torrent users with malware — over 600,000 customers report missing files, strange folders, and disabled PCs
Critical SQLi Vulnerability Found in Fortra FileCatalyst Workflow Application
From Dormant to Dangerous: P2Pinfect Evolves to Deploy New Ransomware and Cryptominer
New P2Pinfect version delivers miners and ransomware on Redis servers
Progress Software elevates severity of new MOVEit bug to ‘critical’ as exploit attempts jump
Auth. Bypass In (Un)Limited Scenarios - Progress MOVEit Transfer (CVE-2024-5806)
US accuses Russian of helping Kremlin hack Ukraine’s state computer systems
Chinese Cyberspies Employ Ransomware in Attacks for Diversion
ChamelGang & Friends | Cyberespionage Groups Attacking Critical Infrastructure with Ransomware
UEFIcanhazbufferoverflow: Widespread Impact from Vulnerability in Popular PC and Server Firmware
The inside view of spyware’s 'dirty interference,' from two recent Pegasus victims
CDK Begins Restoring Systems Amid Ransomware Payment Reports
Neiman Marcus says 64,000 affected by breach of Snowflake customer account
South Africa’s national health lab hit with ransomware attack amid mpox outbreak
GrimResource - Microsoft Management Console for initial access and evasion
Stop Using cdn.polyfill.io Now
Iconv, set the charset to RCE: Exploiting the glibc to hack the PHP engine (part 1)
CISA confirms hackers may have accessed data from chemical facilities during January incident
New attack uses MSC files and Windows XSS flaw to breach networks
Probllama: Ollama Remote Code Execution Vulnerability (CVE-2024-37032)
Malvertising Campaign Leads to Execution of Oyster Backdoor
RansomHub Draws in Affiliates with Multi-OS Capability and High Commission Rates
XZ backdoor behavior inside OpenSSH
More than 12,000 Santander employees in US affected by Snowflake breach
Timeline and Details of the Change Healthcare Breach
Facebook PrestaShop module exploited to steal credit cards
Rafel RAT, Android Malware from Espionage to Ransomware Operations
Mailcow Mail Server Flaws Expose Servers to Remote Code Execution
UK government weighs action against Russian hackers over NHS records theft
Threat Actor Claims AMD and Apple Breaches
Project Naptime: Evaluating Offensive Security Capabilities of Large Language Models
Russian spies' hacking campaign is 'endangering' French diplomatic interests
US bans sale of Kaspersky software citing security risk from Russia
Attacco Informatico all'ASST Rhodense: Cicada3301 pubblica 1 TB di Dati Sensibili liberamente scaricabili
Aggiornamento attacco hacker 2024 - Croce Rossa Italiana
Zero-Click Critical Microsoft Outlook Vulnerability. What You Need to Know.
La Croix-Rouge italienne touchée par une fuite massive de données, le CICR enquête
UK Hospital Hackers Say They’ve Demanded $50 Million in Ransom - Bloomberg
SolarMarker Impersonates Job Employment Website, Indeed,…
All households in Scottish region to get alert about hackers publishing stolen medical data
UNC3944 Targets SaaS Applications
Attacco hacker all'Asst Rhodense, due settimane per il ripristino dei sistemi. Disservizi anche in altri ospedali per problemi al data center di Aria | Corriere.it
Comment une nébuleuse, "The Comm", a engendré l’un des gangs les plus craints du moment, Scattered Spider
Security bug allows anyone to spoof Microsoft employee emails
Suspected 'Scattered Spider' hacker, 22, reportedly arrested in Spain
New Wi-Fi Takeover Attack—All Windows Users Warned To Update Now
Hackers Detail How They Allegedly Stole Ticketmaster Data From Snowflake
Microsoft Refused to Fix Flaw Years Before SolarWinds Hack
New ARM 'TIKTAG' attack impacts Google Chrome, Linux systems
Arm Warns of Actively Exploited Zero-Day Vulnerability in Mali GPU Drivers
Black Basta ransomware gang linked to Windows zero-day attacks
The mystery of an alleged data broker’s data breach
New York Times warns freelancers of GitHub repo data breach
Former head of NSA joins OpenAI board
Microsoft fixes hack-me-via-Wi-Fi Windows security hole • The Register
Breaking: Meta halts AI rollout in Europe after ‘request’ from Irish data protection authorities
Major takedown of critical online infrastructure to disrupt terrorist communications and propaganda | Europol
Here’s what to know about Adobe’s Terms of Use updates
Ukrainian cyber specialists attack Russian airports, several flights delayed - source
Evolution of KILLNET from Hacktivism to Private Hackers Company and the Role of Sub-groups
Multiple flaws in Fortinet FortiOS fixed
Hacker Accesses Internal ‘Tile’ Tool That Provides Location Data to Cops
You’ve Got Mail: Critical Microsoft Outlook Vulnerability Executes as Email is Opened
CVE-2024-29824 Deep Dive: Ivanti EPM SQL Injection Remote Code Execution Vulnerability – Horizon3.ai
IcedID Brings ScreenConnect and CSharp Streamer to ALPHV Ransomware Deployment – The DFIR Report
The New York Times source code leaked by a 4chan user
Microsoft June 2024 Patch Tuesday fixes 51 flaws, 18 RCEs
CVE-2024-4577 RCE in PHP CGI: Everything you need to know | Wiz Blog
Bypassing Veeam Authentication CVE-2024-29849
Switzerland notes increase in cyberattacks ahead of Ukraine peace summit
UNC5537 Targets Snowflake Customer Instances for Data Theft and Extortion
Urgent call for O-type blood donations following London hospitals ransomware attack
Mandiant says hackers stole a 'significant volume of data' from Snowflake customers
Apple’s AI promise: “Your data is never stored or made accessible to Apple”
Festung Bürgenstock: Diese Gefahren drohen rund um die Friedenskonferenz
La SSR sur ses gardes face à l'éventualité de cyberattaques pendant le sommet du Bürgenstock
Malicious VSCode extensions with millions of installs discovered
Russia-linked 'Lumma' crypto stealer now targets Python devs
Menace Unleashed: Excel File Deploys Cobalt Strike at Ukraine | Fortinet Blog
Microsoft hit with EU privacy complaints over schools' use of 365 Education suite
Major London hospitals disrupted by Synnovis ransomware attack
Keeping GenAI technologies secure is a shared responsibility
Howling at the Inbox: Sticky Werewolf's Latest Malicious Aviation Attacks
Revealed: Russian legal foundation linked to Kremlin activities in Europe | Russia | The Guardian
The Snowflake Attack May Be Turning Into One of the Largest Data Breaches Ever
Security Alert: CVE-2024-4577 - PHP CGI Argument Injection Vulnerability
No Way, PHP Strikes Again! (CVE-2024-4577)
FBI obtained 7,000 LockBit decryption keys, victims should contact feds to get support
Operation Crimson Palace: A Technical Deep Dive – Sophos News
Europe's cybersecurity chief says disruptive attacks have doubled in 2024, sees Russia behind many
Vulnerability in Cisco Webex cloud service exposed government authorities, companies
Cyberattack on telecom giant Frontier claimed by RansomHub
Ransomware attack hits major London hospitals
Analysts join the call for Microsoft to recall Recall
Un prestataire externe de la Ville d'Yverdon-les-Bains victime d'une cyberattaque
PikaBot: a Guide to its Deep Secrets and Operations - Sekoia.io Blog
TikTok fails 'disinformation test' before EU vote, study shows
Live Nation confirms Ticketmaster breach after hackers hawk stolen info of 560 million
Crooks threaten to leak 2.9B records of personal info
Hacking Millions of Modems (and Investigating Who Hacked My Modem)
Telegram Combolists and 361M Email Addresses
Google Leak Reveals Thousands of Privacy Incidents
Molding lies into reality || Exploiting CVE-2024-4358
Cyber house of cards – Politicians’ personal details exposed online
Ticketmaster confirms massive breach after stolen data for sale online
Shalev Hulio Made Pegasus Spyware, Now He’s King of Israeli AI
Hackers phish finance orgs using trojanized Minesweeper clone
Space secrets security update
Ticketmaster confirms data breach with a SEC filing
Hacker Releases Jailbroken "Godmode" Version of ChatGPT
Zero Day Initiative — CVE-2024-30043: Abusing URL Parsing Confusion to Exploit XXE on SharePoint Server and Cloud
Spyware maker pcTattletale says it's 'out of business' and shuts down after data breach | TechCrunch
Exiled, then spied on: Civil society in Latvia, Lithuania, and Poland targeted with Pegasus spyware
Active exploitation of unauthenticated stored XSS vulnerabilities in WordPress Plugins
OpenAI finds Russian, Chinese propaganda campaigns used its tech
The Pumpkin Eclipse
LilacSquid: The stealthy trilogy of PurpleInk, InkBox and InkLoader
Data breach exposes details of 25,000 current and former BBC employees
Check Point - Wrong Check Point (CVE-2024-24919)
An Anonymous Source Shared Thousands of Leaked Google Search API Documents with Me; Everyone in SEO Should See Them
macOS version of elusive 'LightSpy' spyware tool discovered
Operators of 911 S5 residential proxy service subjected to US sanctions
PoC Exploit Released For macOS Privilege Escalation Vulnerability
Troy Hunt: Operation Endgame
Largest ever operation against botnets hits dropper malware ecosystem | Europol
Cybercriminals pose as "helpful" Stack Overflow users to push malware
How Researchers Cracked an 11-Year-Old Password to a $3 Million Crypto Wallet | WIRED
TeamCity Major Bug-Fix Release for All Versions: Update Your Server Now | The TeamCity Blog
Cache Me If You Can: Local Privilege Escalation in Zscaler Client Connector (CVE-2023-41973)
From Origins to Operations: Understanding Black Basta Ransomware
CVE-2024-23108: Fortinet FortiSIEM 2nd Order Command Injection Deep-Dive
Pegasus in Rwanda: Sister of presidential candidate, high-ranking Rwandan politicians added to spyware list
Phishing with Cloudflare Workers: Transparent Phishing and HTML Smuggling
Cyber Signals: Inside the growing risk of gift card fraud
Pwn2Own Toronto 2022 : A 9-year-old bug in MikroTik RouterOS
Exploiting the Cloud: How SMS Scammers are using Amazon, Google and IBM Cloud Services to Steal Customer Data
New ShrinkLocker ransomware uses BitLocker to encrypt your files
Foxit PDF “Flawed Design” Exploitation
Invisible miners: unveiling GHOSTENGINE’s crypto mining operations — Elastic Security Labs
Putin hijacked Austria’s spy service. Now he's going after its government
How ransomware abuses BitLocker | Securelist
Hacker defaces spyware app’s site, dumps database and source code
Malicious PyPI packages targeting highly specific MacOS machines
How Apple Wi-Fi Positioning System can be abused to track people around the globe
A root-server at the Internet’s core lost touch with its peers. We still don’t know why.
CVE-2024-4978: Backdoored Justice AV Solutions Viewer Software Used in Apparent Supply Chain Attack | Rapid7 Blog
Criminal record database of millions of Americans dumped online
CVE-2023-34992: Fortinet FortiSIEM Command Injection Deep-Dive
Così le autorità sono arrivate Dmitry Yuryevich Khoroshev, il leader di LockBit
'Got that boomer!': How cybercriminals steal one-time passcodes for SIM swap attacks and raiding bank accounts | TechCrunch
QNAPping At The Wheel (CVE-2024-27130 and friends)
Exclusive: Flutterwave loses ₦11 billion in security breach
Arup revealed as victim of $25 million deepfake scam involving Hong Kong employee | CNN Business
Microsoft will require MFA for all Azure users
Cybercriminals Exploit Docusign With Customizable Phishing Templates
Russian hackers use new Lunar malware to breach a European govt's agencies
To the Moon and back(doors): Lunar landing in diplomatic missions
Log4j Exploited by XMRig Cryptominer Malware: Analysis & Mitigation
Threat actors misusing Quick Assist in social engineering attacks leading to ransomware
Employee Personal GitHub Repos Expose Internal Azure and Red Hat Secrets
Cyber Official Speaks Out, Reveals Mobile Network Attacks in U.S.
Popular Cyber Crime Forum Breach Forums Seized by Police
An Infostealer's Brewin': Cuckoo & AtomicStealer Get Creative
Investigation into Helsinki Education Division data breach proceeds | City of Helsinki
N. Korean hacking group stole massive amount of personal info from S. Korean court computer network
PoC exploit released for RCE zero-day in D-Link EXO AX4800 routers
VMware fixes three zero-day bugs exploited at Pwn2Own 2024
Leveraging DNS Tunneling for Tracking and Scanning
2023 Kaspersky Incident Response report
Malicious Go Binary Delivered via Steganography in PyPI
Ongoing Malvertising Campaign leads to Ransomware
Distribution of DanaBot Malware via Word Files Detected by AhnLab EDR
My life as a Chinese spy: Secret police agent tells all - ABC News
Stolen children’s health records posted online in extortion bid
Europol confirms web portal breach, says no operational data stolen
Over 50,000 Tinyproxy servers vulnerable to critical RCE flaw
Chi sono gli operatori telefonici sfruttati dall’azienda italiana di sorveglianza Carro
Dell API abused to steal 49 million customer records in data breach
Un logiciel russe utilisé par Fedpol et Armasuisse suscite des inquiétudes sécuritaires
Big Vulnerabilities in Next-Gen BIG-IP
Zscaler takes "test environment" offline after rumors of a breach
Chinese network behind one of world’s ‘largest online scams’
Des infos privées sur la vie du chef des pirates de Lockbit déjà révélées par un hacker éthique
UK confirms Ministry of Defence payroll data exposed in data breach
What we learned from the indictment of LockBit’s mastermind
Une faille informatique grave a fragilisé l’armée allemande
Proton Mail Discloses User Data Leading to Arrest in Spain
POLITICO Europe
CVE-2024-3661: TunnelVision - How Attackers Can Decloak Routing-Based VPNs For a Total VPN Leak — Leviathan Security Group - Penetration Testing, Security Assessment, Risk Advisory
Neuf parlementaires suisses visés par une cyberattaque attribuée à la Chine - rts.ch - Suisse
These Dangerous Scammers Don’t Even Bother to Hide Their Crimes
Statement of the MFA on the Cyberattacks Carried by Russian Actor APT28 on Czechia |
Watch out for tech support scams lurking in sponsored search results
Gird your loins, there’s a new pre-auth RCE in Ivanti boxes landing
“Dirty stream” attack: Discovering and mitigating a common vulnerability pattern in Android apps
Google shares update on passkeys and new ways to protect accounts
Marriott admits it falsely claimed for five years it was using encryption during 2018 breach | CSO Online
A Web of Surveillance - Amnesty International Security Lab
Analysis of TargetCompany's Attacks Against MS-SQL Servers (Mallox, BlueSky Ransomware)
New “Goldoon” Botnet Targeting D-Link Devices
Operation PANDORA shuts down 12 phone fraud call centres
Op Pandora puts suspected phone fraudsters back in the box
Eight Arms to Hold You: The Cuttlefish Malware
Hacker free-for-all fights for control of home and office routers everywhere
macOS Adload | Prolific Adware Pivots Just Days After Apple’s XProtect Clampdown
French hospital CHC-SV refuses to pay LockBit extortion demand
Microsoft needs to win back trust
Nearly 20% of Docker Hub Repositories Spread Malware & Phishing Scams
Baltic countries blame Russia for GPS jamming of commercial flights
Vastaamo hack: Therapy notes hacker jailed for blackmail
Malware: Cuckoo Behaves Like Cross Between Infostealer and Spyware
Pourquoi les CFF sont la cible favorite des hackers russes
Global attacker median dwell time continues to fall
The walls of Apple’s garden are tumbling down
WP Automatic WordPress plugin hit by millions of SQL injection attacks
Okta warns of "unprecedented" credential stuffing attacks on customers
PS4/PS5: TheFloW discloses Kernel vulnerability relying on old bug from 2006, impacts PS4 up to 11.00 & PS5 up to 8.20, more details in May
Chinese Keyboard App Vulnerabilities Explained
ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices
Unplugging PlugX: Sinkholing the PlugX USB worm botnet
France seeks new EU sanctions to target Russian disinformation
'ArcaneDoor' Cyberspies Hacked Cisco Firewalls to Access Government Networks
LOCKBIT Black's Legacy: Unraveling The DragonForce Ransomware Connection - Cyble
Kapeka: A novel backdoor spotted in Eastern Europe
GreyNoise Labs - Decrypting FortiOS 7.0.x
GuptiMiner: Hijacking Antivirus Updates for Distributing Backdoors and Casual Mining - Avast Threat Labs
How a Massive Hack of Psychotherapy Records Revealed a Nation’s Secrets
CVE-2024-20356: a Cisco appliance to run DOOM
DDoS platform shut down by international law enforcement agencies
Le système informatique de Volkswagen gravement piraté en 2015, probablement par des cyber-espions chinois
Microsoft: APT28 hackers exploit Windows flaw reported by NSA
Le groupe Swisspro victime d'une attaque par ransomware
Unauthenticated function injection vulnerability in WordPress Shortcode Addons plugin (unpatched). – NinTechNet
L'hôpital de Cannes victime d'une cyberattaque, les opérations non urgentes reportées
‘Large volume’ of data stolen from UN agency after ransomware attack
MITRE says state hackers breached its network via Ivanti zero-days
LastPass Users Lose Master Passwords to Ultra-Convincing Scam
Ransomware payments drop to record low of 28% in Q1 2024
‘The machine did it coldly’: Israel used AI to identify 37,000 Hamas targets
Hackers are threatening to leak World-Check, a huge sanctions and financial crimes watchlist | TechCrunch
'Crude' ransomware tools proliferating on the dark web for cheap, researchers find
Ransomware attack has cost UnitedHealth $872 million; total expected to surpass $1 billion
Cisco: Hacker breached multifactor authentication message provider on April 1
The Fall of LabHost: Law Enforcement Shuts Down Phishing Service Provider | Trend Micro (US)
New Backdoor, MadMxShell
Idle GPUs Are the Devil's Workshop
840-bed hospital in France postpones procedures after cyberattack
Students turning to cyberfraud as huge phishing
Attackers exploiting new critical OpenMetadata vulnerabilities on Kubernetes clusters
Unearthing APT44: Russia’s Notorious Cyber Sabotage Unit Sandworm
Hackers Linked to Russia’s Military Claim Credit for Sabotaging US Water Utilities | WIRED
Over 500 people targeted by Pegasus spyware in Poland, officials say
Ivanti warns of critical flaws in its Avalanche MDM solution
Security Brief: TA547 Targets German Organizations with Rhadamanthys Stealer
Palo Alto - Putting The Protecc In GlobalProtect (CVE-2024-3400)
DDoS threat report for 2024 Q1
The US Government Has a Microsoft Problem
Change Healthcare stolen patient data leaked by ransomware gang
Open Source Security (OpenSSF) and OpenJS Foundations Issue Alert for Social Engineering Takeovers of Open Source Projects
Leaked LockBit builder in a real-life incident response case | Securelist
From Social Engineering to DMARC Abuse: TA427’s Art of Information Gathering | Proofpoint US
CISA: Email from federal agencies possibly accessed in Russian breach of Microsoft
Automating Pikabot’s String Deobfuscation
World-first “Cybercrime Index” ranks countries by cybercrime threat
Top Israeli spy chief exposes his true identity in online security lapse | Israel | The Guardian
Ransomware gang’s new extortion trick? Calling the front desk
Targus discloses cyberattack after hackers detected on file servers
Attempted Audio Deepfake Call Targets LastPass Employee
Roku says 576,000 user accounts hacked after second security incident
Researchers discover new ransomware gang ‘Muliaka’ attacking Russian businesses
Zero-Day Exploitation of Unauthenticated Remote Code Execution Vulnerability in GlobalProtect (CVE-2024-3400)
Kaspersky analysis of the backdoor in XZ
Romania-linked ‘Rubycarp’ hackers look for cryptomining, phishing DDoS opportunities
Hacker doxxes nearly every adult in El Salvador
Round 2: Change Healthcare Targeted in Second Ransomware Attack
Vulnerabilities Identified in LG WebOS
Security Advisory YSA-2024-01
PSG : le système de billetterie du club attaqué
Microsoft employees exposed internal passwords in security lapse
Muddled Libra’s Evolution to the Cloud
SurveyLama, plateforme de sondages en ligne française, a subi une attaque exposant les données de plus de 4 millions d'utilisateurs
+92,000 Internet-facing D-Link NAS devices can be easily hacked
Price of zero-day exploits rises as companies harden products against hackers
Over 92,000 exposed D-Link NAS devices have a backdoor account
Bringing process injection into view(s): exploiting all macOS apps using nib files · Sector 7
Researchers Observed Visual Studio Code Extensions Steals
Qakbot Strikes Back: Understanding the Threat
Distinctive Campaign Evolution of Pikabot Malware
Unveiling the Fallout: Operation Cronos' Impact on LockBit Following Landmark Disruption
Ukraine gives award to foreign vigilantes for hacks on Russia
New HTTP/2 DoS attack can crash web servers with a single connection
Kobold letters
Ivanti fixes VPN gateway vulnerability allowing RCE, DoS attacks
IntelBroker Leaks Alleged National Security Data Tied to US Contractor Acuity Inc.
A Vigilante Hacker Took Down North Korea’s Internet. Now He’s Taking Off His Mask
Ukrainian cybersecurity official reveals structure of Russian hacker groups
Sicurezza informatica e digitalizzazione dei servizi, 5 comuni si alleano
Exclusive: Hackers stole Russian prisoner database to avenge death of Navalny
DJI Mavic 3 Drone Research: Vulnerability Analysis
Threat Actors Deliver Malware via YouTube Video Game Cracks
Microsoft could have prevented Chinese cloud email hack, US cyber report says
Enregistré à son insu, son entretien RH finit sur le darknet
The Mystery of ‘Jia Tan,’ the XZ Backdoor Mastermind
Google fixes two Pixel zero-day flaws exploited by forensics firms
Introducing Sunlight, a CT implementation built for scalability, ease of operation, and reduced cost - Let's Encrypt
The Open Source Community is Building Cybersecurity Processes for CRA Compliance
OWASP Data Breach Notification
GitHub - amlweems/xzbot: notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)
Facebook snooped on users’ Snapchat traffic in secret project, documents reveal | TechCrunch
La FFF, victime d'une attaque informatique, annonce le vol de données de certains de ses adhérents
What we know about the xz Utils backdoor that almost infected the world
Infostealers continue to pose threat to macOS users
Vulnerabilities Year-in-Review: 2023
State of WordPress Security In 2024
Claro Company Hit by Trigona Ransomware
Check if you're vulnerable to CVE-2024-3094
xz-utils backdoor situation
xz/liblzma: Bash-stage Obfuscation Explained - gynvael.coldwind//vx.log
From OneNote to RansomNote: An Ice Cold Intrusion - The DFIR Report
Serious security breach hits EU police agency
Les clients Apple victimes de push bombing pour réinitialiser leur identifiant
AT&T confirms data for 73 million customers leaked on hacker forum
The Darkside of TheMoon
EU bans anonymous crypto payments to hosted wallets
Les attaques informatiques contre les ENT continuent dans le Nord ...
PHP Obfuscator with Backdoor
Easy privilege escalation exploit lands for Linux kernels
Urgent security alert for Fedora 41 and Fedora Rawhide users
Ransomware gang leaks stolen Scottish healthcare patient data in extortion bid
AI bots hallucinate software packages and devs download them
Decade-old Linux ‘wall’ bug helps make fake SUDO prompts, steal passwords
PyPI halted new users and projects while it fended off supply-chain attack
Jeffrey Epstein's Island Visitors Exposed by Data Broker
Diving Deeper into AI Package Hallucinations
Lighter Ransomware Locks Users Out of System
Out of the shadows - ’darcula’ iMessage and RCS smishing attacks target USPS and global postal services
Thousands of servers hacked in ongoing attack targeting Ray AI framework
Flipping Pages: An analysis of a new Linux vulnerability in nf_tables and hardened exploitation techniques
Finland confirms APT31 hackers behind 2021 parliament breach
Google: Spyware vendors behind 50% of zero-days exploited in 2023
BlueSpy - Spying on Bluetooth conversations
Des citoyens traquent les pédocriminels sur les réseaux sociaux avec des faux profils d'enfants
New ZenHammer memory attack impacts AMD Zen CPUs
Why X86 Needs To Die
Tycoon 2FA: an in-depth analysis of the latest version of the AiTM phishing kit
US sanctions APT31 hackers behind critical infrastructure attacks
Over 170K users hit by poisoned Python package ruse
New Go loader pushes Rhadamanthys stealer
APT29 Uses WINELOADER to Target German Political Parties | Mandiant
L’Active Directory et l’exposition Internet au programme du plan de sécurisation des hôpitaux
One Man’s Army of Streaming Bots Reveals a Whole Industry’s Problem | WIRED
IMF Investigates Cyber-Security Incident
Change Healthcare ransomware attack disrupting industry nationwide
Darknet marketplace Nemesis Market seized by German police
Large-Scale StrelaStealer Campaign in Early 2024
Google Online Security Blog: Vulnerability Reward Program: 2023 Year in Review
Des lycées bretons et franciliens visés par des menaces terroristes après un piratage informatique
The iSOON Disclosure: Exploring the Integrated Operations Platform
Ransomware Recruitment Efforts Following Law Enforcement Disruption
Apple Sued for Prioritizing Market Dominance Over Security
OpenAI's chatbot store is filling up with spam
Exploit released for Fortinet RCE bug used in attacks, patch now
Unpatchable vulnerability in Apple chip leaks secret encryption keys
Hackers Found a Way to Open Any of 3 Million Hotel Keycard Locks in Seconds | WIRED
Microsoft Threat Intelligence unveils targets and innovative tactics amidst tax season
Managing Attack Surface | Huntress Blog
The Updated APT Playbook: Tales from the Kimsuky threat actor group | Rapid7 Blog
Windows 11, Tesla, and Ubuntu Linux hacked at Pwn2Own Vancouver
Ivanti fixes critical Standalone Sentry bug reported by NATO
AceCryptor malware has surged in Europe, researchers say
Microsoft Copilot for Security: General Availability details
Loop DoS: New Denial-of-Service attack targets application-layer protocols
Cyberattaque contre France Travail : trois personnes mises en examen et incarcérées après le vol massif de données
Top 5 Russian-Speaking Dark Web Forums
Two Bytes is Plenty: FortiGate RCE with CVE-2024-21762
Misconfigured Firebase instances leaked 19 million plaintext passwords
New Attack Techniques Bypassing ML Security
Finland, Germany, Ireland, Japan, Poland, South Korea added to US-led spyware agreement
Interesting Multi-Stage StopCrypt Ransomware Variant Propagating in the Wild
Earth Krahang Exploits Intergovernmental Trust to Launch Cross-Government Attacks | Trend Micro (US)
Researchers spot updated version of malware that hit Viasat
Cyberattaque contre Franz Carl Weber: données d'employés publiées sur le darknet (update)
IT helpdeskers increasingly targeted by cybercriminals
Elon Musk's SpaceX builds spy satellite network for U.S. intelligence
'GhostRace' Speculative Execution Attack Impacts All CPU, OS Vendors
Ongoing ITG05 operations leverage evolving malware arsenal in global campaigns
National Vulnerability Database: Opaque changes and unanswered questions
Why hackers are targeting young public school students
Linux Foundation Launches Tazama: A Revolutionary Open Source Solution for Real-Time Fraud Management
Microsoft publie son outil interne de test de sécu d'IA générative
Exclusive: After LockBit’s takedown, its purported leader vows to hack on
Google Chrome gets real-time phishing protection later this month
The Architects of Evasion: a Crypters Threat Landscape
DarkGate Opens Organizations for Attack via Skype, Teams
Salt Labs research finds security flaws within ChatGPT Ecosystem (Remediated)
Researchers found multiple flaws in ChatGPT plugins
Secret Backdoor Codes in Safe Locks
GhostSec’s joint ransomware operation and evolution of their arsenal
World’s first major act to regulate AI passed by European lawmakers
LockBit ransomware affiliate gets four years in jail, to pay $860k
Threat actors leverage document publishing sites for ongoing credential and session token theft
JetBrains vulnerability exploitation highlights debate over 'silent patching'
Plusieurs ministères visés par des attaques informatiques depuis dimanche, annonce Matignon
La Commission se félicite de l'accord politique obtenu sur le règlement relatif à la cybersolidarité
Cyber Solidarity Act : qui va constituer le « bouclier cyber » européen ?
Magnet Goblin Targets Publicly Facing Servers Using 1-Day Vulnerabilities
EU Commission breached data protection rules using Microsoft 365, EU watchdog found – Euractiv
CISA forced to take two systems offline last month after Ivanti compromise
Russian spies keep hacking into Microsoft in 'ongoing attack,' company says
Switzerland: Play ransomware leaked 65,000 government documents
Flipper Zero WiFi phishing attack can unlock and steal Tesla cars
The Anatomy of an ALPHA SPIDER Ransomware Attack
Microsoft AI engineer says Copilot Designer creates disturbing images
US sanctions founder of spyware maker Intellexa for targeting Americans | TechCrunch
Duvel says it has "more than enough" beer after ransomware attack
Multistage RA World Ransomware Uses Anti-AV Tactics, Exploits GPO
It’ll be back: Attackers still abusing Terminator tool and variants
ACEMAGIC Addresses Virus Incident: Proactive Measures and Solutions
RATs Distributed Through Skype, Zoom, & Google Meet Lures
Rapid7 flames JetBrains over vulnerability disclosure
BlackCat ransomware shuts down in exit scam, blames the "feds"
Ukraine Claims it Hacked Russian MoD - Infosecurity Magazine
CVE-2024-21762 Vulnerability Scanner for FortiGate…
How AMOS macOS Stealer Avoids Detection
CVE-2024-27198 and CVE-2024-27199: JetBrains TeamCity Multiple Authentication Bypass Vulnerabilities (FIXED)
Police seized Crimemarket, the largest German-speaking cybercrime marketplace
BlackCat ransomware turns off servers amid claim they stole $22 million ransom
Hackers Behind the Change Healthcare Ransomware Attack Just Received a $22 Million Payment
Russia’s chief propagandist leaks intercepted German military Webex conversation
Ubiquiti owners warned Moscow may build another botnet • The Register
ALPHV/BlackCat hits healthcare after retaliation threat, FBI says
Popular video doorbells can be easily hijacked, researchers find
Russian hackers hijack Ubiquiti routers to launch stealthy attacks
US prescription market hamstrung for 9 days (so far) by ransomware attack | Ars Technica
Russia publishes German army meeting on Ukraine
NoName057(16) DDoSia project: 2024 updates and behavioural shifts
Here Come the AI Worms
GitHub besieged by millions of malicious repositories in ongoing attack | Ars Technica
CISA cautions against using hacked Ivanti VPN gateways even after factory resets
Failles d’Ivanti : une centaine d’organisations victimes en France
The Predator spyware ecosystem is not dead
DNS Used to Hide Fake Investment Platform Schemes | Infoblox
BlackCat Ransomware Affiliate TTPs
Lazarus and the FudModule Rootkit: Beyond BYOVD with an Admin-to-Kernel Zero-Day - Avast Threat Labs
Google CEO Sundar Pichai calls AI tool’s responses ‘completely unacceptable’
How the Pentagon Learned to Use Targeted Ads to Find Its Targets—and Vladimir Putin | WIRED
Paris 2024 : vol d'un ordinateur et de clés USB contenant des plans de sécurisation des JO
Civil society complaint raises concern that LinkedIn is violating DSA ad targeting restrictions
Joomla: PHP Bug Introduces Multiple XSS Vulnerabilities
Chatbots qui «hallucinent» et trompent les clients: quelle responsabilité légale? | ICTjournal
PIKABOT, I choose you!
SEO Poisoning to Domain Control: The Gootloader Saga Continues
LockBit ransomware returns, restores servers after police disruption
U.S. and U.K. Disrupt LockBit Ransomware Variant | United States Department of Justice
How your sensitive data can be sold after a data broker goes bankrupt
Ransomware Operation LockBit Reestablishes Dark Web Leak Site
Hackers Leak 2.5M Private Plane Owners' Data Linked to LA Intl. Airport Breach
Avast fined $16.5 million for ‘privacy’ software that actually sold users’ browsing data
Jamf says 9% of smartphone have fallen for phishing attacks
ChatGPT «devient fou», OpenAI s’explique
Multiple XSS flaws in Joomla can lead to remote code execution
Scattered Spider laying new eggs
Suisse: Le Team a été hackée, ce qu'on sait sur le ransomware
Internet Society veut empêcher Microsoft d'héberger les données de santé des Français
ConnectWise ScreenConnect: Authentication Bypass Deep Dive
A first analysis of the i-Soon data leak
Apple iOS 17.4: iMessage Gets Post-Quantum Encryption in New Update
European Parliament finds spyware on defense committee members’ phones
Anatsa Banking Trojan Resurfaces, Targets European Banks
Plus de 2000 serveurs Exchange suisses vulnérables à une faille
Police arrests LockBit ransomware members, release decryptor in global crackdown
Law enforcement disrupt world’s biggest ransomware operation
Cactus ransomware claim to steal 1.5TB of Schneider Electric data
Ransomware Experts See Problems With Banning Ransom Payments
LockBit ransomware gang disrupted by international law enforcement operation
Several Ukrainian media outlets attacked by Russian hackers
LockBit ransomware disrupted by global police operation
ESET fixed high-severity local privilege escalation bug in Windows products
Poland's PM says authorities in the previous government widely and illegally used Pegasus spyware | AP News
Cyberattaque : le Centre Hospitalier d’Armentières communique
Air Canada must honor refund policy invented by airline’s chatbot
Code injection or backdoor: A new look at Ivanti’s CVE-2021-44529
Russia-Aligned TAG-70 Targets European Government and Military Mail Servers in New Espionage Campaign
Magika: AI powered fast and efficient file type identification
Google launches AI Cyber Defense Initiative to improve security infrastructure
New ‘Magic’ Gmail Security Uses AI And Is Here Now, Google Says
BMW security lapse exposed sensitive company information, researcher finds
Vulnerable Fortinet Devices: Low-hanging Fruit for Threat Actors
Spyware startup Variston is losing staff — some say it’s closing
Ukrainian national pleads guilty for roles in Zeus, IcedID malware operations
Threat Intel Accelerates Detection & Response
Disrupting malicious uses of AI by state-affiliated threat actors
Patch Tuesday - February 2024
Imposer aux messageries de donner leurs clés pour déchiffrer les messages est illégal, estime la CEDH
Denmark orders schools to stop sending student data to Google
The Risks of the #MonikerLink Bug in Microsoft Outlook and the Big Picture
Zoom fixed critical flaw CVE-2024-24691 in Windows software
Clinique privée à Genève victime d'une cyberattaque
CVE-2024-21412: Water Hydra Targets Traders with Microsoft Defender SmartScreen Zero-Day
Portal Kombat : un réseau structuré et coordonné de propagande prorusse
Hackers exploit Ivanti SSRF flaw to deploy new DSLog backdoor
Community Alert: Ongoing Malicious Campaign Impacting Azure Cloud Environments
International Cybercrime Malware Service Dismantled by Federal Authorities: Key Malware Sales and Support Actors in Malta and Nigeria Charged in Federal Indictments
New MacOS Backdoor Written in Rust Shows Possible Link with Windows Ransomware Group
EU capitals fear Russian retaliation and cyberattacks after asset freezes
Fake LastPass App Sneaks Past Apple's Review Team
KV-Botnet: Don’t call it a Comeback - Lumen
Vaud: le canton rompt un contrat à 6 millions avec Xplain
New RustDoor macOS malware impersonates Visual Studio update
World Govs, Tech Giants Sign Spyware Responsibility Pledge
Hyundai Motor Europe hit by Black Basta ransomware attack
Reward Offers for Information to Bring Hive Ransomware Variant Co-Conspirators To Justice - United States Department of State
Ivanti: Patch new Connect Secure auth bypass bug immediately
Fortinet warns of new FortiSIEM RCE bugs in confusing disclosure
Raspberry Pi Pico cracks BitLocker in under a minute
Ransomware Hit $1 Billion in 2023
Security Researcher Allegedly Hacked Apple’s Backend, Scammed $2.5 Million
Thanksgiving 2023 security incident
Chinese hackers infect Dutch armed forces network with malware
Fingerprint photo led investigators to therapy centre hacking suspect
Zero Day Initiative — CVE-2023-46263: Ivanti Avalanche Arbitrary File Upload Vulnerability
Government hackers targeted iPhones owners with zero-days, Google says
Ransomware Retrospective 2024: Unit 42 Leak Site Analysis
Datasport subi un vol de données: 900’000 Suisses concernés
45,000 Jenkins servers remain vulnerable to RCE attacks
Finance worker pays out $25 million after video call with deepfake ‘chief financial officer’
Leaky Vessels flaws allow hackers to escape Docker, runc containers
Zyxel VPN Series Pre-auth Remote Command Execution
AnyDesk Incident: Customer Credentials Leaked and Published for Sale on the Dark Web
Investigation: Apparent Russian disinformation group posing as ex-president Poroshenko targets foreign fighters in Ukraine
AnyDesk says hackers breached its production servers, resets passwords
There Are Too Many Damn Honeypots
Here is Apple's official 'jailbroken' iPhone for security researchers | TechCrunch
How Memory Forensics Revealed Exploitation of Ivanti Connect Secure VPN Zero-Day Vulnerabilities
Apple fixes zero-day bug in Apple Vision Pro that 'may have been exploited'
DarkGate malware delivered via Microsoft Teams - detection and response
The "EventLogCrasher" 0day For Remotely Disabling Windows Event Log, And a Free Micropatch For It
Evolution of UNC4990: Uncovering USB Malware's Hidden Depths
Binance Code and Internal Passwords Exposed on GitHub for Months
Kasseika Ransomware Deploys BYOVD Attacks Abuses PsExec and Exploits Martini Driver
Qualys TRU Discovers Important Vulnerabilities in GNU C Library’s syslog()
Hundreds of network operators’ credentials found circulating in Dark Web
Energy giant Schneider Electric hit by Cactus ransomware attack
New Go-based Malware Loader Discovered I Arctic Wolf
Malicious PyPI Packages Slip WhiteSnake InfoStealer Malware onto Windows Machines
How a mistakenly published password exposed Mercedes-Benz source code
Buzzing on Christmas Eve: Trigona Ransomware in 3 Hours
Malicious NPM Packages Exfiltrate Hundreds of Developer SSH Keys via GitHub
Trello API abused to link email addresses to 15 million accounts
NSA is buying Americans’ internet browsing records without a warrant
Researchers Say the Deepfake Biden Robocall Was Likely Made With Tools From AI Startup ElevenLabs
Russian developer of Trickbot malware sentenced to five years in prison
Midnight Blizzard: Guidance for responders on nation-state attack
23andMe data breach: Hackers stole raw genotype data, health reports
Inside a Global Phone Spy Tool Monitoring Billions
X is being flooded with graphic Taylor Swift AI images
HPE reveals Russian attackers accessed internal emails
Over 5,300 GitLab servers exposed to zero-click account takeover attacks
AI will make scam emails look genuine, UK cybersecurity agency warns
SEC says X account hack was due to SIM swapping
CVE-2024-0204: Critical Authentication Bypass in Fortra GoAnywhere MFT | Rapid7 Blog
Info Stealing Packages Hidden in PyPI
Atlassian Confluence Server RCE attacks underway
178,000 SonicWall firewalls are vulnerable to old DoS bugs
Technology News Government News Get more insights with the Recorded Future Intelligence Cloud. Learn more. In alerting about two Citrix bugs, CISA recommends immediate attention for one
A backdoor with a cryptowallet stealer inside cracked macOS software
Balada Injector Infects Over 7,100 WordPress Sites Using Plugin Vulnerability
Microsoft network breached through password-spraying by Russian-state hackers
Microsoft's Top Execs' Emails Breached in Sophisticated Russia-Linked APT Attack
La Russie est suspectée d’avoir largement brouillé les GPS en Pologne
Jamf Threat Labs Discovers Pirated macOS Apps Similar to ZuRu Malware
Ivanti Connect Secure VPN Exploitation: New Observations
Researcher uncovers one of the biggest password dumps in recent history
Why Join The Navy If You Can Be A Pirate?
A Victim of Mallox Ransomware: How Truesec CSIRT Fought Back
The Many Faces of Undetected macOS InfoStealers | KeySteal, Atomic & CherryPie Continue to Adapt
MacOS info-stealers quickly evolve to evade XProtect detection
iShutdown scripts can help detect iOS spyware on your iPhone
LeftoverLocals: Listening to LLM responses through leaked GPU local memory
Bigpanzi Exposed: The Hidden Cyber Threat Behind Your Set-Top Box
NoName057(16) |
CVE-2023-46805
Le CHU de Nantes victime d’une cyberattaque
Apple fixed a bug in Magic Keyboard that allows to monitor Bluetooth traffic
Ivanti Connect Secure VPN Exploitation Goes Global
Opera MyFlaw Bug Could Let Hackers Run ANY File on Your Mac or Windows
Chrome Users Now Worth 30% Less Money Thanks to Google's Cookie Killing, Ad Firm Says
Framework Data Breach - General Topics - Framework Community
Volt Typhoon Compromises 30% of Cisco RV320/325 Devices in 37 Days
Welcome To 2024, The SSLVPN Chaos Continues - Ivanti CVE-2023-46805 & CVE-2024-21887
Further analysis of Denmark attacks leads to warning about unpatched network gear
Beware! YouTube Videos Promoting Cracked Software Distribute Lumma Stealer
Turkish Hackers Exploiting Poorly Secured MS SQL Servers Across the Globe
ShinyHunters member gets 3 years in prison for breaching 60 firms
Turkish hackers targeting database servers with Mimic ransomware
Anthropic researchers find that AI models can be trained to deceive
CVE-2024-21591 - Juniper J-Web OOB Write vulnerability
Hackers can infect network-connected wrenches to install ransomware
Cryptojacker arrested in Ukraine over EUR 1.8 million mining scheme
CVE-2023-36025 Exploited for Defense Evasion in Phemedrone Stealer Campaign
Attack of the week: Airdrop tracing – A Few Thoughts on Cryptographic Engineering
Act Now: CISA Flags Active Exploitation of Microsoft SharePoint Vulnerability
SharePoint Pre-Auth RCE chain (CVE-2023–29357 & CVE-2023–24955) | STAR Labs
Follow-On Extortion Campaign Targeting Victims of Akira and Royal Ransomware
Linux devices are under attack by a never-before-seen worm | Ars Technica
AirDrop 'Cracked' By Chinese Authorities to Identify Senders
Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN
Le service de renseignement suisse surveille aussi le trafic de données national
NSA official: hackers use AI bots like ChatGPT to perfect English
SEC Has Not Approved Bitcoin ETFs, but Its Hacked X Account Briefly Said Otherwise
AI aides nation-state hackers but also helps US spies to find them, says NSA cyber director | TechCrunch
Avast Updates Babuk Ransomware Decryptor in Cooperation with Cisco Talos and Dutch Police
Netgear, Hyundai latest X accounts hacked to push crypto drainers
Ransomware gang takes credit for Christmas attack on global Lutheran organization
WCC hit by ransomware attack
Revealed: How a secret Dutch mole aided the U.S.-Israeli Stuxnet cyberattack on Iran
Compromising Google Accounts: Malwares Exploiting Undocumented OAuth2 Functionality for session hijacking
Dutch man sabotaged Iranian nuclear program without Dutch government's knowledge: report
Multiple vulnerabilities in Lantronix EDS-MD IoT gateway for medical devices
LastPass to enforce a 12-character requirement for master passwords
CVE-2023-27532
ALPHV Ransomware Claims Cyberattack on US Firm Ultra Intelligence and Communications
L’UDC Andreas Glarner contraint de payer les frais de justice occasionnés par son «deepfake» de Sibel Arslan
Three New Malicious PyPI Packages Deploy CoinMiner on Linux Devices | FortiGuard Labs
Bitwarden Heist - How to Break Into Password Vaults Without Using Passwords
Analyzing DPRK's SpectralBlur
Ivanti warns critical EPM bug lets hackers hijack enrolled devices
Weak password and infostealer blamed for Orange Spain outage
Hackers hijack govt and business accounts on X for crypto scams
Hacker hijacks Orange Spain RIPE account to cause BGP havoc
The State of Ransomware in the U.S.: Report and Statistics 2023
Qualcomm chip vulnerability enables remote attack by voice call
Cactus RANSOMWARE gang hit the Swedish retail and grocery provider Coop
The biggest cybersecurity and cyberattack stories of 2023
La ville de Nyon se cherche un SOC
Porsche To Kill ICE-Powered Macan In Europe Over Cybersecurity Laws | Carscoops
Downfall - A Slay the Spire Fan Expansion :: Downfall (Steam Standalone) was Breached. Please read.
Cyber attacks hit the Assembly of the Republic of Albania and telecom company One Albania
CVE-2023-46747 : Unauthenticated Remote Code Execution in F5 BIG-IP - Malware Analysis - Malware Analysis, News and Indicators
After ransomware claims, Xerox says subsidiary hit with cyberattack
Hackers Attack UK's Nuclear Waste Services Through LinkedIn
Victoria Courts Confront Unprecedented Ransomware Assault on AV Technology Network
Objective-See's Blog
Les autorités suisses disposeront de moyens renforcés | blue News
A New Kind of AI Copy Can Fully Replicate Famous People. The Law Is Powerless.
2023, une année riche en vulnérabilités critiques
Cyberattaques : 2023, année noire pour les ESN
ChatGPT-aided ransomware in China results in four arrests as AI raises cybersecurity concerns | South China Morning Post
New Black Basta decryptor exploits ransomware flaw to recover files
L'hôpital cantonal de Saint-Gall a trouvé son SOC
Cloud Atlas' Spear-Phishing Attacks Target Russian Agro and Research Companies
Russian military hackers target Ukraine with new MASEPIE malware
Ukraine war: What's the impact of cyber guerrillas?
Chinese Hackers Exploited New Zero-Day in Barracuda's ESG Appliances
‘Wall of Flippers’ detects Flipper Zero Bluetooth spam attacks
Hackers stole $2 billion in crypto in 2023, data shows
Amnesty confirms Apple warning: Indian journalists’ iPhones infected with Pegasus spyware
Lockbit ransomware disrupts emergency care at German hospitals
Steam game mod breached to push password-stealing malware
New malware found in analysis of Russian hacks on Ukraine, Poland
Iranian Hackers Claim They Disrupted Albanian Institutions
Nighthawk 0.2.6 - Three Wise Monkeys - MDSec
Lockbit ransomware attack interrupted medical emergencies gang at a German hospital network
Microsoft disables MSIX protocol handler abused in malware attacks
Les données médicales toujours plus vulnérables face aux cyberattaques
Les arnaques aux QR codes se multiplient depuis quelques mois
This Clever New Idea Could Fix AirTag Stalking While Maximizing Privacy
Operation Triangulation: The last (hardware) mystery
The Disturbing Impact of the Cyberattack at the British Library
GTA 5 source code reportedly leaked online a year after RockStar hack
Ubisoft says it's investigating reports of a new security breach
Personal Information Exploit on OpenAI’s ChatGPT Raise Privacy Concerns
Cyberattaque contre l’Iran : qui sont ces mystérieux hackers qui perturbent le pays ?
Google Search Overwhelmed By Massive Spam Attack
Crypto drainer steals $59 million from 63k people in Twitter ad push
Android Banking Trojan Chameleon can now bypass any Biometric Authentication
BattleRoyal, DarkGate Cluster Spreads via Email and Fake Browser Updates
German Authorities Dismantle Dark Web Hub 'Kingdom Market' in Global Operation
Hackers Exploiting MS Excel Vulnerability to Spread Agent Tesla Malware
Seedworm: Iranian Hackers Target Telecoms Orgs in North and East Africa
Russian Water Utility Cyberattack Impacts 6000 Systems
Lapsus$: GTA 6 hacker handed indefinite hospital order
Healthcare software provider data breach impacts 2.7 million
SSH protects the world’s most sensitive networks. It just got a lot weaker
Snikt! Rhysida dumps more than a terabyte of Insomniac Games’ internal data
Qakbot's Back, But Don't Y'all Panic: A Southern Tech Talk
Unveiling VISS: a revolutionary approach to vulnerability impact scoring
Web injections are back on the rise: 40+ banks affected by new malware campaign
Terrapin attacks can downgrade security of OpenSSH connections
Xfinity waited to patch critical Citrix Bleed 0-day. Now it’s paying the price
Justice Department Disrupts Prolific ALPHV/Blackcat Ransomware Variant | United States Department of Justice
Authorities claim seizure of notorious ALPHV ransomware gang's dark web leak site | TechCrunch
Vans, Supreme owner VF Corp. says personal data stolen and orders impacted in suspected ransomware attack | TechCrunch
Toward Ending the Domain Wars: Early Detection of Malicious Stockpiled Domains
The Curious Case of Predatory Sparrow
FBI: Play ransomware gang has attacked 300 orgs since 2022
SMTP Smuggling - Spoofing E-Mails Worldwide
Ukrainian cellular and Internet still out, 1 day after suspected Russian cyberattack | Ars Technica
Rhadamanthys v0.5.0 - a deep dive into the stealer’s components
MongoDB says customer data was exposed in a cyberattack
QNAP VioStor NVR vulnerability actively exploited by malware botnet
Microsoft’s AI Chatbot Replies to Election Questions With Conspiracies, Fake Scandals, and Lies
Marketing Company Claims That It Actually Is Listening to Your Phone and Smart Speakers to Target Ads
Exploiting GOG Galaxy XPC service for privilege escalation in macOS
Imperva Uncovers CVE-2023-22524, A RCE Vulnerability
3CX warns customers to disable SQL database integrations
Cyberextorsion : 2023, année de l’industrialisation
A pernicious potpourri of Python packages in PyPI
Paternity and fertility tests among data stolen in Asper Biogene cyberattack | News | ERR
Supply chain attack targeting Ledger crypto wallet leaves users hacked
CVE-2023-50164
Ledger's Web3 Connector library was compromised and replaced with a drainer
Apple will no longer give police users' push notification data without a warrant
Hackers are exploiting critical Apache Struts flaw using public PoC
Ukraine’s intelligence claims cyberattack on Russia’s state tax service
CALISTO doxxing : Sekoia.io findings concurs to Reuters’ investigation on FSB-related Andrey Korinets
Threat actors misuse OAuth applications to automate financially driven attacks
Spider-Man And Wolverine Devs Hit By Alleged Ransomware Attack
Apple’s new iPhone security setting keeps thieves out of your digital accounts
Ransomware Hive : arrestation d’un suspect à Paris | LeMagIT
AlphV’s bid to report its victim to the SEC could backfire
pfSense Security: Sensing Code Vulnerabilities with SonarCloud
One in four apps remain exposed to Log4Shell
Kelvin Security hacking group leader arrested in Spain
Sophos backports RCE fix after attacks on unsupported firewalls
50K WordPress sites exposed to RCE attacks by critical bug in backup plugin
AI Act, come funziona lo stop al riconoscimento biometrico della prima legge europea sull'intelligenza artificiale | Wired Italia
Apple Releases Security Updates to Patch Critical iOS and macOS Security Flaws
US healthcare giant Norton says hackers stole millions of patients' data during ransomware attack | TechCrunch
L’AI Act européen adopté après des négociations marathon | ICTjournal
The EU Just Passed Sweeping New Rules to Regulate AI
Amazon sues group that fakes returns so people can get free MacBooks - The Verge
Early Warning Notification - the use of Bluetooth trackers for geolocation in organised crime | Europol
Russian Hacker Vladimir Dunaev Pleads Guilty for Creating TrickBot Malware
Inside Job: How a Hacker Helped Cocaine Traffickers Infiltrate Europe’s Biggest Ports
Ransomware : un mois de novembre hors-norme
Using AI to Automatically Jailbreak GPT-4 and Other LLMs in Under a Minute
Scanning Danger: Unmasking the Threats of Quishing
Qualcomm Releases Details on Chip Vulnerabilities Exploited in Targeted Attacks
Fighting Ursa Aka APT28: Illuminating a Covert Campaign
Star Blizzard increases sophistication and evasion in ongoing attacks
UK names FSB unit behind hack-and-leak campaigns, summons Russian ambassador
Rhysida ransomware gang claimed China Energy hack
PLC Hacking - More Commonplace Than You Might Think
Researchers discover dozens of new bugs affecting Sierra Wireless routers
Jamf Threat Labs: Fake Lockdown Mode proof of concept
Analysis of a new macOS Trojan-Proxy
Apple Confirms Governments Using Push Notifications to Surveil Users - MacRumors
Windows 10 gets three more years of security updates, if you can afford them | Ars Technica
Atlassian Releases Critical Software Fixes to Prevent Remote Code Execution
Russian Hackers’ Lawsuit Reveals Weaknesses In Apple’s iOS 16
23andMe confirms hackers stole ancestry data on 6.9 million users
P2Pinfect - New Variant Targets MIPS Devices
L’attaque contre Xplain bloque aussi la modernisation de l’IT du canton d'Argovie (update)
Phineas Fisher, Hacktivism, and Magic Tricks
N. Korean Hackers 'Mixing' macOS Malware Tactics to Evade Detection
The Far-Reaching Consequences of LogoFAIL
Vidar Infostealer Steals Booking.com Credentials in Fraud Scam
Cyber Threats affecting "International Geneva"
Qlik Sense Remote Code Execution Technical Exploitation -
Spyware are still having a ‘ball’ despite a decade of warnings - Binding hook
Les ministres français invités à désinstaller WhatsApp, Signal et Telegram
New BLUFFS attack lets attackers hijack Bluetooth connections
Okta reveals additional attackers' activities in October 2023 Breach
Play Ransomware Goes Commercial - Now Offered as a Service to Cybercriminals
Diamond Sleet supply chain compromise distributes a modified CyberLink installer
Welltok data breach exposes data of 8.5 million US patients
Japan space agency hit with cyberattack, rocket and satellite info not accessed | Reuters
InfectedSlurs Botnet Spreads Mirai via Zero-Days
Spyware Targeting Against Serbian Civil Society - The Citizen Lab
Spyware in Serbia: civil society under attack - Access Now
DP World confirms data stolen in cyberattack, no ransomware used
DPRK Crypto Theft | macOS RustBucket Droppers Pivot to Deliver KandyKorn Payloads
Report claims to reveal identity of Russian hacktivist leader
440,000 Sets of Personal Info Affected by Hack of Line Operator | Nippon.com
Telekopye: Chamber of Neanderthals’ secrets
Into the Trash: Analyzing LitterDrifter
Concevis: des données du fisc auraient fuité (update 3)
iPhone: Why Apple is working hard to break into its own phones
USB worm unleashed by Russian state hackers spreads worldwide
Thousands of routers and cameras vulnerable to new 0-day attacks by hostile botnet | Ars Technica
The Ticking Supply Chain Attack Bomb of Exposed Kubernetes Secrets
How to bypass Windows Hello, log into vulnerable laptops
Le Conseil fédéral clarifie les tâches de l’Office fédéral de la cybersécurité
CVE-2023-46604 (Apache ActiveMQ) Vulnerability Exploited to Infect Systems With Cryptominers and Rootkits
Hacking Employers and Seeking Employment: Two Job-Related Campaigns Bear Hallmarks of North Korean Threat Actors
Meet the Unique New "Hacking" Group: AlphaLock
Artificial Intelligence in Education – Legal Best Practices
Building an Exploit for FortiGate Vulnerability…
InfectedSlurs Botnet Spreads Mirai via Zero-Days
Understanding the Phobos affiliate structure and activity
Atomic Stealer distributed to Mac users via fake browser updates
Les Suisses préoccupés par leur cybersécurité même s'ils sont rarement touchés
Rhysida ransomware gang claims attack on British Library • The Register
Nearly 9 million patients' records compromised in data breach
Lumma Stealer malware now uses trigonometry to evade detection
Combien de PME mettent la clé sous la porte après une cyberattaque ? | LeMagIT
Pourquoi les hackers russes sont plus dangereux que jamais
GitHub - yunuscadirci/DIALStranger: details about DIAL protocol vulnerabilities
Thornaby: Woman targeted in £13k train station QR code scam
2023’s ransomware rookies are a remix of Conti and other classics
Hackers swipe Booking.com, damage from attack is global
Arnaque: les clients de booking.com ciblés par des pirates
Gang says ICBC paid ransom over hack that disrupted US Treasury market | Reuters
Toyota confirms breach after Medusa ransomware threatens to leak data
Les 10 principales vulnérabilités des modèles GPT
Zimbra 0-day used to target international government organizations
European Telecom Body to Open-Source Radio Encryption System
Uncovering thousands of unique secrets in PyPI packages
In a first, cryptographic keys protecting SSH connections stolen in new attack | Ars Technica
Google’s new Titan Security Keys let you store passkeys
Intel fixes high-severity CPU bug that causes “very strange behavior”
A Closer Look at ChatGPT's Role in Automated Malware Creation
The Mirai Confessions: Three Young Hackers Who Built a Web-Killing Monster Finally Tell Their Story | WIRED
C3RB3R Ransomware | Ongoing Exploitation of CVE-2023-22518 Targets Unpatched Confluence Servers - SentinelOne
Google researchers discover 'Reptar,’ a new CPU vulnerability
District of Puerto Rico | Russian and Moldovan National Pleads Guilty to Operating Illegal Botnet Proxy Service that Infected Tens of Thousands of Internet-Connected Devices Around the World | United States Department of Justice
Microsoft Patch Tuesday November 2023
La nLPD est directement applicable à l’intelligence artificielle
The $2,000 Phones that Let Anyone Make Robocalls
Child sexual abuse online: effective measures, no mass surveillance
Nothing new, still broken, insecure by default since then: Python's e-mail libraries and certificate verification
GameOver(lay) - Local Privilege Escalation in Ubuntu Kernel
Rançongiciel Phobos : arrestation de deux Russes, soupçonnés d’une dizaine d’attaques en France
Malaysian Police Dismantle “BulletProftLink” Phishing Operation
Bitter Pill: Third-Party Pharmaceutical Vendor Linked to Pharmacy and Health Clinic Cyberattack
Cybersécurité: plus de trois mois pour colmater une faille
Ivanti EPMM CVE-2023-39335/39337
Détournement de Microsoft et Cloudflare au cours d’une nouvelle attaque de QRishing
Here’s How Violent Extremists Are Exploiting Generative AI Tools
DP World: Australian ports to remain closed as AFP investigates cybersecurity breach
Apple neglects to patch multiple critical vulnerabilities in macOS
CVE-2023-38548
Detecting “Effluence”, an Unauthenticated Confluence Web Shell
ICBC hit by ransomware impacting global trades
Dozens of npm Packages Caught Attempting to Deploy Reverse Shell
Nude “before and after” photos stolen from plastic surgeon, posted online, and sent to victims' family and friends
Ransomware attack on ICBC disrupts trades in US Treasury market
Cloudflare website downed by DDoS attack claimed by Anonymous Sudan
Microsoft Temporarily Blocked Internal Access to ChatGPT, Citing Data Concerns
Atlassian confirms ransomware is exploiting latest Confluence bug
Sandworm Disrupts Power in Ukraine Using a Novel Attack Against Operational Technology
Malvertiser copies PC news site to deliver infostealer
Android Kitchen Sink: Send BLE spam to iOS, Android and Windows at once using Android app - Mobile Hacker
SysAid Zero-Day Vulnerability Exploited by Ransomware Group
SysAid On-Prem Software CVE-2023-47246 Vulnerability
Microsoft offers politicians protection against deepfakes
Predator AI | ChatGPT-Powered Infostealer Takes Aim at Cloud Platforms
Infomaniak intègre une IA souveraine à son service d'e-mails
Python obfuscation traps
Common Vulnerability Scoring System
ATT&CK v14 Unleashes Detection Enhancements, ICS Assets, and Mobile Structured Detections | by Amy L. Robertson
Jamf Threat Labs Discovers Malware from BlueNoroff
Critical Atlassian Confluence bug exploited in Cerber ransomware attacks
Not so lucky: BlackCat is back!
Discord will switch to temporary file links to block malware delivery
Elastic catches DPRK passing out KANDYKORN — Elastic Security Labs
AI companies have all kinds of arguments against paying for copyrighted content
GhostSec offers Ransomware-as-a-Service Possibly Used to Target Israel
Suspected Exploitation of Apache ActiveMQ CVE-2023-46604
Four dozen countries declare they won't pay ransomware ransoms | CyberScoop
Apple 'Find My' network can be abused to steal keylogged passwords
Send My: Arbitrary data transmission via Apple's Find My network | Positive Security
New Microsoft Exchange zero-days allow RCE, data theft attacks
Microsoft is overhauling its software security after major Azure cloud attacks
How Kopeechka, an Automated Social Media Accounts Creation Service, Can Facilitate Cybercrime
Mozi botnet goes dark under mysterious circumstances
How a tiny Pacific Island became the global capital of cybercrime
FIRST Announces CVSS 4.0 - New Vulnerability Scoring System
Microsoft profiles new threat group with unusual but effective practices
Octo Tempest crosses boundaries to facilitate extortion, encryption, and destruction
Boeing says 'cyber incident' hit parts business after ransom threat | Reuters
CVE-2023-46604
Massive ransomware attack hinders services in 70 German municipalities
2022 RTF Global Ransomware Incident Map: Attacks continue worldwide, groups splinter, education sector hit hard
Massive cybercrime URL shortening service uncovered via DNS data
CVE-2023-46747
Atlassian warns of critical Confluence flaw leading to data loss
SEC accuses SolarWinds CISO of misleading investors before Russian cyberattack | TechCrunch
Surge in QR Code Quishing: Check Point Records 587% Attack Spike
Two Developers of the Ragnar Locker Ransomware Arrested in Spain
GHOSTPULSE haunts victims using defense evasion bag o' tricks
FakeUpdateRU Chrome Update Infection Spreads Trojan Malware
3 new NGINX ingress controller Kubernetes related vulnerabilities
Introducing HAR Sanitizer: secure HAR sharing
HackerOne paid ethical hackers over $300 million in bug bounties
SIM Swappers Are Working Directly with Ransomware Gangs Now
CVE-2023-45498: RCE in VinChin Backup
Compromising F5 BIGIP with Request Smuggling | CVE-2023-46747
Chatbot Hallucinations Are Poisoning Web Search
European govt email servers hacked using Roundcube zero-day
A cascade of compromise: unveiling Lazarus' new campaign
Hyundai to hold software-upgrade clinics across the US for vehicles targeted by thieves | AP News
StripedFly: Perennially flying under the radar
Triangulation: validators, post-compromise activity and modules | Securelist
VMSA-2023-0023
Hackers can force iOS and macOS browsers to divulge passwords and much more
Partout, les passkeys remplacent les mots de passe. Au tour des entreprises?
Now Android and Windows devices aren't safe from Flipper Zero either | ZDNET
Citrix warns admins to patch NetScaler CVE-2023-4966 bug immediately
CVE-2023-4966: NetScaler Critical Security Update Now Available
Battling a new DarkGate malware campaign with Malwarebytes MDR
Citrix Bleed: Leaking Session Tokens with CVE-2023-4966
Okta incident and 1Password | 1Password
1Password Detects Suspicious Activity Following Okta Support Breach
Spain police dismantled a cybercriminal group who stole data of 4 million individuals
Okta stock falls after company says client files accessed by hackers via support system
How Cloudflare mitigated yet another Okta compromise
CVE-2023-38831 Exploited by Pro-Russia Hacking Groups in RU-UA Conflict Zone for Credential Harvesting Operations
Measures taken following the unprecedented cyber-attack on the ICC
Switzerland’s e-voting system has predictable implementation blunder
Un cybercriminel russe membre du gang Ragnar Locker arrêté en France
Cisco discloses new IOS XE zero-day exploited to deploy malware implant
D-Link confirms data breach after employee phishing attack
Ragnar Locker ransomware gang taken down by international police swoop
Casio keyed up after data loss hits customers in 149 countries • The Register
Ukrainian activists hack Trigona ransomware gang, wipe servers
Ragnar Locker ransomware’s dark web extortion sites seized by police
CIA exposed to intelligence interception due to X's URL bug
The forgotten malvertising campaign
Hackers exploit critical flaw in WordPress Royal Elementor plugin
Active exploitation of Cisco IOS XE Software Web Management User Interface vulnerability
Lausanne veut 2,24 millions pour sa sécurité IT
L’attaque contre Xplain bloque la modernisation de l’IT de la police vaudoise
Les polices vaudoises hésitent à numériser l’ensemble de leurs activités avec Xplain - rts.ch - Vaud
Disclosing the BLOODALCHEMY backdoor
Coordinated Disclosure: 1-Click RCE on GNOME (CVE-2023-43641)
LinkedIn Smart Links Fuel Credential Phishing Campaign
Users of Telegram, AWS, and Alibaba Cloud targeted in latest supply chain attack
The evolution of Windows authentication
Balada Injector Targets Unpatched tagDiv Plugin, Newspaper Theme & WordPress Admins
Steam Adds Security Layer for Devs After Some Had Their Accounts Compromised and Malware Was Injected in Games
The Predator Files: European Spyware Consortium Supplied Despots and Dictators
IZ1H9 Campaign Enhances Its Arsenal with Scores of Exploits | FortiGuard Labs
HTTP/2 Rapid Reset: deconstructing the record-breaking attack
The Art of Concealment: A New Magecart Campaign That’s Abusing 404 Pages | Akamai
Plus de la moitié des aînés ciblés par des cyber-escrocs
Les hôpitaux de Vittel et Neufchâteau victimes d'une cyberattaque
23andMe User Data Stolen in Targeted Attack on Ashkenazi Jews
90s Vulns In 90s Software (Exim) - Is the Sky Falling?
Rules of engagement issued to hacktivists after chaos
Android TV Boxes Infected with Backdoors, Compromising Home Networks
X-Force uncovers global NetScaler Gateway credential harvesting campaign
n their push for AI-generated content, tech companies are dancing on the edge between fucking around and finding out.
Genetics firm 23andMe says user data stolen in credential stuffing attack
Mirai Botnet's New Wave: hailBot,kiraiBot, catDDoS, and Their Fierce Onslaught - NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks.
New Supermicro BMC Vulnerabilities Could Expose Many Servers to Remote Attacks
Binarly REsearch Uncovers Major Vulnerabilities in Supermicro BMCs
The evolutionary tale of a persistent Python threat
CVE: Zero-Day Privilege Escalation in Confluence Server & Data Center
Coop et Migros vendent des données clients à des entreprises tierces
Sony confirms data breach impacting thousands in the U.S.
CVE-2023-4911: Looney Tunables - Local Privilege Escalation in the glibc’s ld.so
Vulnerable Arm GPU drivers under active exploitation. Patches may not be available | Ars Technica
Qualcomm says hackers exploit 3 zero-days in its GPU, DSP drivers
Microsoft Defender Flags Tor Browser as a Trojan and Removes it from the System
Critical vulnerabilities in Exim threaten over 250k email servers worldwide | Ars Technica
Cisco urges admins to fix IOS software zero-day exploited in attacks
Routers have been rooted by Chinese spies US and Japan warn
NSA chief announces new AI Security Center, 'focal point' for AI use by government, defense industry
Vulnerability in popular ‘libwebp’ code more widespread than expected
CVE-2023-42793
New GPU Side-Channel Attack Allows Malicious Websites to Steal Data
Sony Investigating After Hackers Offer to Sell Stolen Data
Decade of newborn child registry data stolen in MOVEit mass-hack
Deux jeunes hackers jugés pour une campagne de mails « cryptoporno » en 2019
From ScreenConnect to Hive Ransomware in 61 hours
PREDATOR IN THE WIRES: Ahmed Eltantawy Targeted with Predator Spyware After Announcing Presidential Ambitions
0-days exploited by commercial surveillance vendor in Egypt
All thanks to ‘Big Yellow Taxi’: How State discovered Chinese hackers reading its emails
New Apple Zero-Days Exploited to Target Egyptian ex-MP with Predator Spyware
Apple emergency updates fix 3 new zero-days exploited in attacks
International Criminal Court hit with a cyber attack
US-Canada water commission confirms 'cybersecurity incident"
GitLab addressed critical vulnerability CVE-2023-5009
Trend Micro addresses actively exploited zero-day in Apex One
[CVE-2023-42752] integer overflow in Linux kernel leading to exploitable memory access
Fake CVE-2023-40477 Proof of Concept Leads to VenomRAT
38TB of data accidentally exposed by Microsoft AI researchers | Wiz Blog
Leaked Microsoft documents hint at new Doom and Dishonored games
Microsoft AI Employee Accidentally Leaks 38TB of Data
New Python NodeStealer Goes Beyond Facebook Credentials, Now Stealing All Browser Cookies and Login Credentials
BlackCat ransomware hits Azure Storage with Sphynx encryptor
Ransomware flingers hit Manchester cops in the supply chain • The Register
TikTok fined €345M by Irish DPC for violating children’s privacy
When MFA isn't actually MFA
How Google Authenticator made one company’s network breach much, much worse
Can't Be Contained: Finding a Command Injection Vulnerability in Kubernetes
Update Adobe Acrobat and Reader to Patch Actively Exploited Vulnerability
Argent russe: la place financière suisse rattrapée par une fuite de données
macOS MetaStealer | New Family of Obfuscated Go Infostealers Spread in Targeted Attacks
Trojanized Free Download Manager found to contain a Linux backdoor
Threat actor leaks sensitive data belonging to Airbus
Mozilla patches Firefox, Thunderbird against zero-day exploited in attacks
Critical WebP bug: many apps, not just browsers, under threat
With 0-days hitting Chrome, iOS, and dozens more this month, is no software safe? | Ars Technica
PSA: Ongoing Webex malvertising campaign drops BatLoader
Attacker combines phone, email lures into believable, complex attack chain
Ransomware crew hits Save The Children, steals 7TB of data
Microsoft to defend customers on AI copyright challenges
ChatGPT fails in languages like Tamil and Bengali
KNVB paid ransom to prevent cyber criminals from publishing footballers' passports
Cybersecurity issue prompts computer shutdowns at MGM Resorts properties across US
Active North Korean campaign targeting security researchers
North Korea-backed hackers target security researchers with 0-day
Mozilla Report Finds That New Cars Give Out Lots of Your Info
The International Criminal Court Will Now Prosecute Cyberwar Crimes
Last Week on My Mac: How quickly can Apple release a security update?
China’s iPhone ban expected to expand to more government agencies soon
Code Vulnerabilities Put Proton Mails at Risk
Mac users targeted in new malvertising campaign delivering Atomic Stealer
Apple discloses 2 new zero-days exploited to attack iPhones, Macs
How China Demands Tech Firms Reveal Hackable Flaws in Their Products
Rockstar Games reportedly sold games with Razor 1911 cracks on Steam
Compromised Microsoft Key: More Impactful Than We Thought
Thinking about the security of AI systems
Developers Warned of Malicious PyPI, NPM, Ruby Packages Targeting Macs - SecurityWeek
Nascent Malware Campaign Targets npm, PyPI, and RubyGems Developers
What's in a NoName? Researchers see a lone-wolf DDoS group
Okta customers targeted in social engineering scam
Attackers access military data through fencing supplier
China Bans iPhone Use for Government Officials at Work
Zaun Data Breach
Is macOS’s new XProtect behavioural security preparing to go live?
Apple’s Decision to Kill Its CSAM Photo-Scanning Tool Sparks Fresh Controversy
The Emergence of Ransomed: An Uncertain Cyber Threat in the Making
Pay our ransom instead of a GDPR fine, cybercrime gang tells its targets
Healthcare Organizations Hit by Cyberattacks Last Year Reported Big Impact, Costs
VMConnect supply chain attack continues, evidence points to North Korea - Security Boulevard
An Ongoing Open Source Attack Reveals Roots Dating Back To 2021
New Twitter scam in China: sextortion scammers
Hackers modify open-source ‘SapphireStealer’ malware, leading to multiple variants
LogicMonitor customers hit by hackers, because of default passwords | TechCrunch
Unmasking Trickbot, One of the World’s Top Cybercrime Gangs
Qakbot Malware Takedown and Defending Forward
Raising Online Defenses Through Transparency and Collaboration | Meta
How NightOwl for Mac Added a Botnet
It Costs Just $400 to Build an AI Disinformation Machine
Xplain: les données de procédures pénales en cours sont sur le darknet
Exposing DuckTail
Qakbot botnet infrastructure shattered after international operation
The Cheap Radio Hack That Disrupted Poland’s Railway System
Qakbot botnet dismantled after infecting over 700,000 computers
Diving Deep into UNC4841 Operations Following Barracuda ESG Zero-Day Remediation (CVE-2023-2868)
Attacks on Citrix NetScaler systems linked to ransomware actor
Adversary On The Defense: ANTIBOT.PW
#FuckStalkerware pt. 3 - ownspy got, well, owned
GTA 6 Hacker Found To Be Teen With Amazon Fire Stick In Small Town Hotel Room
Lapsus$: Court finds teenagers carried out hacking spree
Security advisory: malicious crate rustdecimal
Poland investigates cyber-attack on rail network - BBC News
Met Police admits details of officers at risk of exposure after warrant card supplier was hacked
CVE-2023-36844 And Friends: RCE In Juniper Devices
MOVEit, the biggest hack of the year, by the numbers
Technical Advisory – SonicWall Global Management System (GMS) & Analytics – Multiple Critical Vulnerabilities
Lazarus Group exploits ManageEngine vulnerability to deploy QuiteRAT
Time keeps on slippin’ slippin’ slippin’: The 2023 Active Adversary Report for Tech Leaders – Sophos News
Ransomware infection wipes all CloudNordic servers
Fake Roblox packages target npm with Luna Grabber information-stealing malware
Genève: Un élu a farfouillé sans droit dans les fichiers de la justice
WinRAR 0-day that uses poisoned JPG and TXT files under exploit since April | Ars Technica
Using WinRAR? Be sure to patch against these code execution bugs… – Naked Security
#NoFilter - Abusing Windows Filtering Platform for Privilege Escalation
British court convicts two teen Lapsus$ members of hacking tech firms
XLoader's Latest Trick | New macOS Variant Disguised as Signed OfficeNote App
Ecuador’s national election agency says cyberattacks caused absentee voting issues
CVE-2023-34127
Sneaky Amazon Google ad leads to Microsoft support scam
Ivanti warns of new actively exploited MobileIron zero-day bug
Brazilian hacker claims Bolsonaro asked him to hack into the voting system ahead of 2022 vote | AP News
Data Theft Via MOVEit: 4.5 Million More Individuals Affected
Chinese Microsoft hackers also hit GOP Rep. Don Bacon of Nebraska
Threat actors use beta apps to bypass mobile app store security
New Apple iOS 16 Exploit Enables Stealthy Cellular Access Under Fake Airplane Mode
Approximately 2000 Citrix NetScalers backdoored in mass-exploitation campaign
Discord.io confirms breach after hacker steals data of 760K users
Piratage des numéros de téléphone des policiers bernois
Des pirates informatiques s'emparent des données de 2800 policiers bernois
The New Frontline of Geopolitics | Understanding the Rise of State-Sponsored Cyber Attacks
Phishing pages placed on hacked websites
Users of cybercrime forums often fall victim to info-stealers, researchers find
Prominent Threat Actor Accidentally Infects Own Computer with Info-Stealer
Notorious phishing platform shut down, arrests in international police operation
LinkedIn under attack, malicious hackers seize accounts
PowerHell: Active Flaws in PowerShell Gallery Expose Users to Attacks
Dark Web Profile: 8Base Ransomware
Raccoon Stealer Announce Return After Hiatus
'DoubleDrive' attack turns Microsoft OneDrive into ransomware
This $70 device can spoof an Apple device and trick you into sharing your password
Livraison de chars à l’Ukraine: des cyberpirates russes publient un document du Seco
Ransomware tracker: The latest figures [August 2023]
Faire de la cybersécurité une tâche régalienne
Meet NoEscape: Avaddon ransomware gang's likely successor
Stealth Mode: Chinese Cyber Espionage Actors Continue to Evolve Tactics to Avoid Detection | Mandiant
Mac systems turned into proxy exit nodes by AdLoad
An Apple Malware-Flagging Tool Is ‘Trivially’ Easy to Bypass
Want to pwn a satellite? Turns out it's surprisingly easy
New ‘Downfall’ Flaw Exposes Valuable Data in Generations of Intel Chips
Analysis: MOVEit hack spawned over 600 breaches but is not done yet -cyber analysts | Reuters
Biden-Harris Administration Launches Artificial Intelligence Cyber Challenge to Protect America’s Critical Software | The White House
Cyber-attack on UK's electoral registers revealed
5 arrested in Poland for running bulletproof hosting service for cybercrime gangs | Europol
Des hackers ont accédé aux données client d’une banque en ligne
Des pirates informatiques russes ont publié un document sensible de la Confédération
Microsoft’s Role in Email Breach by Suspected Chinese Hackers Part of US Inquiry
“Please do not make it public”: Vulnerabilities in Sogou Keyboard encryption expose keypresses to network eavesdropping
Researchers watched 100 hours of hackers hacking honeypot computers
Interpol takes down 16shop phishing-as-a-service platform
Nearly every AMD CPU since 2017 vulnerable to Inception bug
Electoral Commission apologises for security breach involving UK voters’ data | Electoral Commission | The Guardian
Spyware maker LetMeSpy shuts down after hacker deletes server data
Don’t you (forget NLP): Prompt injection with control characters in ChatGPT
Midnight Blizzard conducts targeted social engineering over Microsoft Teams
Tenable CEO accuses Microsoft of negligence in addressing security flaw
CVE-2023-35082 - MobileIron Core Unauthenticated API Access Vulnerability | Rapid7 Blog
Guarding the Bridge: New Attack Vectors in Azure AD Connect
Reptile Malware Targeting Linux Systems
Microsoft…The Truth Is Even Worse Than You Think
Russia-backed hackers used Microsoft Teams to breach government agencies | TechCrunch
Unpacking the Threats Within: The Hidden Dangers of .zip Domains
Into the tank with Nitrogen
Tomcat Under Attack: Exploring Mirai Malware and Beyond
Malicious Batch File (*.bat) Disguised as a Document Viewer Being Distributed (Kimsuky)
Apple Crimeware | Massive Rust Infostealer Campaign Aiming for macOS Sonoma Ahead of Public Release
GameOverlay Vulnerability Impacts 40% of Ubuntu Workloads
TETRA Radio Code Encryption Has a Flaw: A Backdoor
Critical Infrastructure Companies Warned to Watch for Ongoing Cyberattack
Ivanti warns of second vulnerability used in attacks on Norway gov’t
U.S. Hunts Chinese Malware That Could Disrupt American Military Operations
Two privilege escalation flaws affect 40% of Ubuntu workloads in OverlayFS
Almost 40% of Ubuntu users vulnerable to new privilege elevation flaws
Cryptojacking: Understanding and defending against cloud compute resource abuse
Apple issues third mobile OS update after zero-click spyware campaign
DDoS threat report for 2023 Q2
Apple slams UK surveillance-bill proposals
Threat Actors Add .zip Domains to Their Phishing Arsenals
JumpCloud says 'nation state' gang hit some customers
CVE-2023-38408: Remote Code Execution in OpenSSH’s forwarded ssh-agent
[Security Update] Incident Details
WormGPT - The Generative AI Tool Cybercriminals Are Using to Launch BEC Attacks
Microsoft takes pains to obscure role in 0-days that caused email breach
Inside the subsea cable firm secretly helping American take on China
WormGPT: New AI Tool Allows Cybercriminals to Launch Sophisticated Cyber Attacks
WordPress plugin installed on 1 million+ sites logged plaintext passwords
AVrecon malware infects 70,000 Linux routers to build botnet
BlackLotus UEFI Bootkit Source Code Leaked on GitHub
Cybercriminalité : sept suspects identifiés pour du « phishing / hameçonnage »
Piratage de Xplain: La Confédération menacée par une vague de plaintes
Microsoft changes signing key system breached by Chinese hackers to steal US gov’t data
ShadowVault is the latest Mac data-stealer malware, reportedly
Uncovering weaknesses in Apple macOS and VMWare vCenter: 12 vulnerabilities in RPC implementation
Chinese hackers breached US government email accounts, Microsoft and White House say | CNN Politics
Chinese hackers breached U.S. and European government email through Microsoft bug
Les données de hooligans ayant sévi en Suisse publiées sur le darknet (update) | ICTjournal
The Spies Who Loved You: Infected USB Drives to Steal Secrets
Hackers exploit gaping Windows loophole to give their malware kernel access
Microsoft Revokes Malicious Drivers in Patch Tuesday Culling
Apple confirms WebKit security updates break browsing on some sites
Apple releases emergency update to fix zero-day exploited in attacks
Inside the secret cyberwar against Putin’s regime
Storm-0978 attacks reveal financial and espionage motives
HCA Healthcare patient data stolen and for sale by hackers
Six Malicious Python Packages in the PyPI Targeting Windows Users
It’s Raining Phish and Scams – How Cloudflare Pages.dev and Workers.dev Domains Get Abused | Trustwave
The five-day job: A BlackByte ransomware intrusion case study
Une entreprise genevoise au cœur d’une vaste opération d’influence des Emirats arabes unis
Unmasking the Meduza Stealer: Comprehensive Analysis & Countermeasures
Two spyware tied with China found hiding on the Google Play Store
Operation Brainleeches: Malicious npm packages fuel supply chain and phishing attacks
Hacks targeting British exam boards raise fears of students cheating
FBI digital sting against Hive cybercrime group shows the promise — and limits — of hacking hackers
Port of Nagoya cyberattack: Japanese port paralysed by LockBit
BlueNoroff | How DPRK’s macOS RustBucket Seeks to Evade Analysis and Detection -
Suspected key figure of notorious cybercrime group arrested in joint operation
Clop Ransomware: History, Timeline, And Adversary Simulation
BlackCat Operators Distributing Ransomware Disguised as WinSCP via Malvertising
Campagne MOVEit : Cl0p divulgue une grande quantité de données volées à Cegedim
Au mois de juin, la menace des infostealers n’a pas faibli
Following NoName057(16) DDoSia Project’s Targets
Chinese Threat Actors Targeting Europe in SmugX Campaign
Detecting Popular Cobalt Strike Malleable C2 Profile Techniques
Malvertising Used as Entry Vector for BlackCat Actors Also Leverage SpyBoy Terminator
Decrypted: Akira Ransomware
NCSC marks 20th anniversary of first response to state-sponsored cyber attack
TSMC Says Supplier Hacked After Ransomware Group Claims Attack on Chip Giant
A cause de la cyberattaque contre Xplain, des secrets d'Etat sont en ligne
Des données confidentielles sur des conseillers fédéraux volées lors de la cyberattaque
High school changes every student’s password to ‘Ch@ngeme!’
CVE-2023-27997 is Exploitable, and 69% of FortiGate…
TSMC confirms data breach after LockBit cyberattack on third-party supplier
Malware Execution Method Using DNS TXT Record
SEC notifies SolarWinds CISO and CFO of possible action in cyber investigation
Tracing Ransomware Threat Actors Through Stylometric Analysis and Chat Log Examination
Une équipe d’intervention cantonale épaulera les communes vaudoises en cas de cyberattaque
Akira Ransomware Extends Reach to Linux Platform
Swiss intelligence warns of fallout in cyberspace as West clamps down on spies
CHU de Rennes : un compte de prestataire détourné pour la cyberattaque
Microsoft Teams vulnerability allows attackers to deliver malware to employees
Dismantling encrypted criminal EncroChat communications leads to over 6 500 arrests and close to EUR 900 million seized
Pour la loi suisse, le piratage éthique peut être licite
VMware ESXi Zero-Day Used by Chinese Espionage Actor to Perform Privileged Guest Operations on Compromised Hypervisors
Siemens Energy confirms data breach after MOVEit data-theft attack
LetMeSpy, a phone tracking app spying on thousands, says it was hacked
Process Mockingjay: Echoing RWX In Userland To Achieve Code Execution
PindOS: New JavaScript Dropper Delivering Bumblebee and IcedID
PyPI Attackers Still At It: Malicious Packages Drop Trojans and Info-stealers
Emerging Threat! Exposing JOKERSPY
IoT Under Siege: The Anatomy of the Latest Mirai Campaign Leveraging Multiple IoT Exploits
Dissecting TriangleDB, a Triangulation spyware implant
Condi DDoS Botnet Spreads via TP-Link's CVE-2023-1389
BlueDelta Exploits Ukrainian Government Roundcube Mail Servers to Support Espionage Activities | Recorded Future
ASUS urges customers to patch critical router vulnerabilities
KeePassXC Vulnerability CVE-2023-35866 allows attackers to change the master password and second-factor authentication settings
Anonymous Sudan: Who are the hackers behind Microsoft’s cloud outages?
Le piratage de la société Xplain, une véritable bombe à retardement pour la Suisse
XSS Vulnerabilities in Azure Led to Unauthorized Access to User Sessions - SecurityWeek
Des données personnelles aussi touchées lors de la cyberattaque contre la Confédération - rts.ch - Suisse
Piratage: la Suisse est très mauvaise élève de la cybersécurité
Hijacking S3 Buckets: New Attack Technique
Microsoft says early June disruptions to Outlook, cloud platform, were cyberattacks
A simple bug exposed access to thousands of smart security alarm systems
Cyberattaques massives contre la Suisse, huit questions pour analyser une semaine folle
A Shady Chinese Firm’s Encryption Chips Got Inside NATO and NASA
Barracuda ESG Zero-Day Vulnerability (CVE-2023-2868) Exploited Globally by Aggressive and Skilled Actor, Suspected Links to China
Suspected LockBit ransomware affiliate arrested, charged in US
Fake Security Researcher GitHub Repositories Deliver Malicious Implant
Déferlante d’attaques DDoS en Suisse revendiquées par des hacktivistes pro-russes
Ransomware gang lists first victims of MOVEit mass-hacks, including US banks and universities | TechCrunch
Microsoft Encrypted Restricted Permission Messages Deliver Phishing | Trustwave
Ce qui se cache derrière les cyberattaques pro-russes contre la Suisse
Cadet Blizzard emerges as a novel and distinct Russian threat actor | Microsoft Security Blog
The Phantom Menace: Brute Ratel remains rare and targeted
TAG Aviation: Black Basta pirate une compagnie romande
Switzerland under cyberattack
Microsoft June 2023 Patch Tuesday fixes 78 flaws, 38 RCE bugs
Analysis of CVE-2023-27997 and Clarifications on Volt Typhoon Campaign
Xortigate, or CVE-2023-27997 - The Rumoured RCE That Was
CVE-2023-34362
Sites officiels paralysés: L’administration fédérale suisse fait l’objet d’une attaque informatique | 24 heures
Microsoft 365 sous le feu nourri d'attaques DDoS Dominique Filippone , publié le 09 Juin 2023
How North Korea’s Hacker Army Stole $3 Billion in Crypto, Funding Nuclear Program
Shell Recharge security lapse exposed EV drivers’ data
Les CFF et le canton d'Argovie aussi concernés par la cyberattaque qui a touché la société Xplain
MOVEit Transfer and MOVEit Cloud Vulnerability
Turkish Citizens' Personal Data Offered Online After Govt Site Hacked
Pro-Ukraine hackers bring Russian banking system to its knees
La commune vaudoise de Bex touchée par une cyberattaque
Another huge US medical data breach confirmed after Fortra mass-hack
Clop Ransomware Likely Sitting on MOVEit Transfer Vulnerability (CVE-2023-34362) Since 2021
Analysis of CVE-2023-29336 Win32k Privilege Escalation
Unmasking the Darkrace Ransomware Gang
Le site web du parlement suisse attaqué par des hackers
CVE-2023-34362: MOVEit Transfer SQL Injection Vulnerability Threat Brief
ChatGPT creates mutating malware that evades detection by EDR
Mass exploitation of critical MOVEit flaw is ransacking orgs big and small | Ars Technica
Trustwave Action Response: Zero Day Exploitation of MOVEit (CVE-2023-34362)
GobRAT malware written in Go language targeting Linux routers
How malicious extensions hide running arbitrary code
Hackers steal Swiss police and customs data
Russian Radio Stations Hacked, Fake Putin Message Announcing Invasion of Russia Broadcast
L’armée suisse et Fedpol touchés par une cyberattaque
MOVEit hack: BBC, BA and Boots among cyber attack victims
New Magecart-Style Campaign Abusing Legitimate Websites to Attack Others | Akamai
Rapid7 Observed Exploitation of Critical MOVEit Transfer Vulnerability
Enzo Biochem Ransomware Attack Exposes Information of 2.5M Individuals - SecurityWeek
New macOS vulnerability, Migraine, could bypass System Integrity Protection | Microsoft Security Blog
‘Gravity Forms’ WordPress Plugin Found Vulnerable to PHP Object Injection
Zero-Day Vulnerability in MOVEit Transfer Exploited for Data Theft
“Clickless” iOS exploits infect Kaspersky iPhones with never-before-seen malware | Ars Technica
A Matter of Triangulation.
Zero Day Initiative — CVE-2023-24941: Microsoft Network File System Remote Code Execution
Terminator antivirus killer is a vulnerable Windows driver in disguise
Millions of Gigabyte Motherboards Were Sold With a Firmware Backdoor | WIRED
EDR bypassing via memory manipulation techniques | WithSecure™ Labs
Iranian dissidents take over high-security servers of regime presidency |
New hacking forum leaks data of 478,000 RaidForums members
Hauts-de-Seine : les petits pirates informatiques avaient rançonné le pôle Leonard de Vinci
The professionalization of cyber crime
ABB provides details about IT security incident
Tesla Files: Un vol de données met Tesla dans l'embarras
Vulnerability in GCP CloudSQL Leads to Data Exposure
Here’s how long it takes new BrutePrint attack to unlock 10 different smartphones
Mercenary mayhem: A technical analysis of Intellexa's PREDATOR spyware
Inner workings revealed for “Predator,” the Android malware that exploited 5 0-days
Old Wine in the New Bottle: Mirai Variant Targets Multiple IoT Devices
NHS data breach: trusts shared patient details with Facebook without consent | Health | The Guardian
Armenia spyware victims: Pegasus hacking in war
COSMICENERGY: New OT Malware Possibly Related To Russian Emergency Response Exercises | Mandiant
Barracuda email security appliances hacked via zero-day vulnerability (CVE-2023-2868) - Help Net Security
Chinese Cyberespionage Group BRONZE SILHOUETTE Targets U.S. Government and Defense Organizations
Free VPN Service SuperVPN Exposes 360 Million User Records
Wordfence Firewall Blocks Bizarre Large-Scale XSS Campaign
Barracuda identified a vulnerability (CVE-2023-2868) in our Email Security Gateway appliance (ESG) on May 19, 2023.
Volt Typhoon targets US critical infrastructure with living-off-the-land techniques
Malvertising via brand impersonation is back again
German arms company Rheinmetall confirms Black Basta ransomware group behind cyberattack
IT employee impersonates ransomware gang to extort employer
Apple fixes three new zero-days exploited to hack iPhones, Macs
Don't @ Me: URL Obfuscation Through Schema Abuse
BlackCat Ransomware Deploys New Signed Kernel Driver
Up to 100 cases taken over HSE cyberattack, judge told
Beijing Bans Micron as Supplier to Big Chinese Firms, Citing National Security
Popular Android TV boxes sold on Amazon are laced with malware
MalasLocker ransomware targets Zimbra servers, demands charity donation
Lemon Group’s Cybercriminal Businesses Built on Preinfected Devices
Visualizing QakBot Infrastructure
“FleeceGPT” mobile apps target AI-curious to rake in cash
KeePass flaw allows retrieval of master password, PoC is public (CVE-2023-32784)
GitHub - vdohney/keepass-password-dumper
Discord discloses data breach after support agent got hacked
SIM Swapping and Abuse of the Microsoft Azure Serial Console: Serial Is Part of a Well Balanced Attack
Piratage et médias suisses, la justice entre en action
Malicious VSCode extensions with more than 45K downloads steal PII and enable backdoors - Check Point Blog
Review and analysis of fake Trezor cryptowallet
FBI confirms access to Breached cybercrime forum database
Securonix Threat Labs Security Advisory: Latest Update: Ongoing MEME#4CHAN Attack/Phishing Campaign uses Meme-Filled Code to Drop XWorm Payloads
WordPress Plugin Vulnerability Exposed Ferrari Website to Hackers
Hackers offer personal information of 500,000 Israeli students for sale
Ex-ByteDance Executive Accuses TikTok Parent Company of ‘Lawlessness’
How an Indiana hospital fought to recover from a cyberattack
The Race to Patch: Attackers Leverage Sample Exploit Code in Wordpress Plugin | Akamai
Toyota: Car location data of 2 million customers exposed for ten years
«Cloud souverain»: les cantons latins avancent groupés et font un appel du pied à la Confédération
Multinational tech firm ABB hit by Black Basta ransomware attack
White Phoenix: Beating Intermittent Encryption
Critical Privilege Escalation in Essential Addons for Elementor Plugin Affecting 1+ Million Sites
Uncovering RedStinger - Undetected APT cyber operations in Eastern Europe since 2020
Akira Ransomware is “bringin’ 1988 back”
infosec company owned completely by 4chan user
Google will provide dark web monitoring to all US Gmail users
Ghost in the network
Cybersecurity Firm Breach Exposes Tobacco Giant Philip Morris
Tennessee, Georgia colleges respond to cyberattacks as school year wraps up
New phishing-as-a-service tool “Greatness” already seen in the wild
Leak of Intel Boot Guard Keys Could Have Security Repercussions for Years
Deconstructing a Cybersecurity Event
Global Surveillance: The Secretive Swiss Dealer Enabling Israeli Spy Firms - National Security & Cyber
Justice Department Announces Court-Authorized Disruption of the Snake Malware Network Controlled by Russia's Federal Security Service
How macOS now tracks the provenance of apps
Snake: Coming soon in Mac OS X flavour – Fox-IT International blog
Microsoft May 2023 Patch Tuesday
Apple Fails to Fully Reboot iOS Simulator Copyright Case
oss-sec: [CVE-2023-32233] Linux kernel use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary reads and writes in kernel memory
‘PlugwalkJoe’ pleads guilty for the massive 2020 Twitter hack - The Verge
The Team of Sleuths Quietly Hunting Cyberattack-for-Hire Services
On the trail of the Dark Avenger: the most dangerous virus writer in the world
WordPress Advanced Custom Fields Pro plugin <= 6.1.5 - Reflected Cross Site Scripting (XSS) vulnerability
Dump these Cisco phone adapters because it's not fixing them
Meet Akira — A new ransomware operation targeting the enterprise
MSI Breach Leaks Intel BootGuard & OEM Image Signing Keys, Compromises Security of Over 200 Devices & Major Vendors
OpenAI’s regulatory troubles are just beginning
Who Gets the Algorithm? The Bigger TikTok Danger
Can Better Training Reduce the Success Rate of Phishing Attacks?
From Campus Rape Cases to Child Abuse Reports, ‘Worst-Case’ Data Breach Rocks MN Schools
The malware threat landscape: NodeStealer, DuckTail, and more
Atomic Stealer | Threat Actor Spawns Second Variant of macOS Malware Sold on Telegram
Passkeys: What they are and how to use them
Apple et Google s’accordent sur un cahier des charges industriel pour lutter contre le pistage
Bad Actors Are Joining the AI Revolution: Here’s What We’ve Found in the Wild
AI-Powered 'BlackMamba' Keylogging Attack Evades Modern EDR Security
SolarWinds: The Untold Story of the Boldest Supply-Chain Hack
What is a Rapid Security Response (RSR)
BouldSpy: Android Spyware Tied to Iranian Police Targets Minorities
Apple uses iOS and macOS Rapid Security Response feature for the first time
FIN7 tradecraft seen in attacks against Veeam backup servers
Investigating ChatGPT phishing detection capabilities
AI Chatbots Have Been Used to Create Dozens of News Content Farms
LockBit and Cl0p ransomware gangs actively exploiting Papercut vulnerabilities
DOJ Detected SolarWinds Breach Months Before Public Disclosure
Le Département de la défense et des banques testent le partage confidentiel de données de cybermenace
Magecart threat actor rolls out convincing modal forms
Hackers Leaked Minneapolis Students' Psychological Reports, Allegations of Abuse
RTM Locker Ransomware as a Service (RaaS) Now on Linux - Uptycs
Never Connect to RDP Servers Over Untrusted Networks
Mirai Botnet Attackers Exploit TP-Link Router Bug
Attackers Use Containers for Profit via TrafficStealer
Cyble — Threat Actor Selling New Atomic macOS (AMOS) Stealer on Telegram
VMware Patches Critical Vulnerability Disclosed at Pwn2Own Hacking Contest
Smartphones With Popular Qualcomm Chip Secretly Share Private Information With US Chip-Maker
Meet the hacker armies on Ukraine's cyber front line
Analysis of Pre-Auth RCE in Sophos Web Appliance (CVE-2023-1671)
Software Maker 3CX Was Compromised in First-of-its-Kind Threaded Supply-Chain Hack
X_Trader Supply Chain Attack Affects Critical Infrastructure Organizations in U.S. and Europe
Retour d'experience du Centre Hospitalier de Cahors
'RustBucket' malware targets macOS
Linux malware strengthens links between Lazarus and the 3CX supply‑chain attack
3CX Software Supply Chain Compromise Initiated by a Prior Software Supply Chain Compromise; Suspected North Korean Actor Responsible
Threat Actors Rapidly Adopt Web3 IPFS Technology
‘AuKill’ EDR killer malware abuses Process Explorer driver
TikTok reste autorisé sur les téléphones des fonctionnaires suisses
Cybersécurité et désinformation: Berne crée un nouveau Secrétariat d’État pour la sécurité civile
Black Basta claims it's selling off stolen Capita data
in2al5d p3in4er is Almost Completely Undetectable
LockBit for Mac | How Real is the Risk of macOS Ransomware?
Apple’s high security mode blocked NSO spyware, researchers say | TechCrunch
Summary of the Investigation Related to CVE-2023-0669
Triple Threat: NSO Group’s Pegasus Spyware Returns in 2022 with a Trio of iOS 15 and iOS 16 Zero-Click Exploit Chains
QBot banker delivered through business correspondence
CVE-2023-21554: MSMQ
Analyzing an arm64 mach-O version of LockBit
Linux kernel logic allowed Spectre attack on major cloud
Google Chrome emergency update fixes first zero-day of 2023
The (Not so) Secret War on Discord
A Computer Generated Swatting Service Is Causing Havoc Across America
Espionage campaign linked to Russian intelligence services
New hacker advocacy group seeks to protect work of security researchers
Vice Society: A Tale of Victim Data Exfiltration via PowerShell, aka Stealing off the Land
Hackers claim vast access to Western Digital systems
En Suisse comme en France, la vidéosurveillance progresse à une vitesse fulgurante
Discord member details how documents leaked from closed chat group
Nokoyawa ransomware attacks with Windows zero-day
Microsoft’s April 2023 Patch Tuesday Addresses 97 CVEs (CVE-2023-28252)
DEV-0196: QuaDream’s “KingsPawn” malware used to target civil society in Europe, North America, the Middle East, and Southeast Asia
Sweet QuaDreams: A First Look at Spyware Vendor QuaDream’s Exploits, Victims, and Customers - The Citizen Lab
Mercenary spyware hacked iPhone victims with rogue calendar invites, researchers say | TechCrunch
Balada Injector: Synopsis of a Massive Ongoing WordPress Malware Campaign
Data-leak flaw in Qualcomm, HiSilicon-based Wi-Fi AP chips
MERCURY and DEV-1084: Destructive attack on hybrid environment - Microsoft Security Blog
Cyble — Demystifying Money Message Ransomware
Leaked Pentagon Document Claims Russian Hacktivists Breached Canadian Gas Pipeline Company
From Discord to 4chan: The Improbable Journey of a US Intelligence Leak - bellingcat
MSI Confirms Breach as Ransomware Gang Claims Responsibility
L'Anssi pourra bloquer les noms de domaine liés à des cyberattaques
Exploit available for critical bug in VM2 JavaScript sandbox library
Samsung Fab Workers Leak Confidential Data While Using ChatGPT
Cyble — New Cylance Ransomware with Power-Packed CommandLine Options
ALPHV Ransomware Affiliate Targets Vulnerable Backup Installations to Gain Initial Access
Special Report: Tesla workers shared sensitive images recorded by customer cars | Reuters
Apple fixes two zero-days exploited to hack iPhones and Macs
Stopping cybercriminals from abusing security tools
Resecurity uncovers STYX, new cybercriminal platform focused on financial fraud - Help Net Security
Mac Malware MacStealer Spreads as Fake P2E Apps
Troy Hunt: Seized Genesis Market Data is Now Searchable in Have I Been Pwned, Courtesy of the FBI and "Operation Cookie Monster"
Rilide: A New Malicious Browser Extension for Stealing Cryptocurrencies
Chinese fraudsters: evading detection and monetizing stolen credit card information
Who Broke NPM?: Malicious Packages Flood Leading to Denial of Service
National Cyber Force reveals how daily cyber operations protect the UK
Winter Vivern | Uncovering a Wave of Global Espionage
Not just an infostealer: Gopuram backdoor deployed through 3CX supply chain attack | Securelist
Rorschach – A New Sophisticated and Fast Ransomware
3CX Desktop App Compromised (CVE-2023-29059)
Android app from China executed 0-day exploit on millions of devices | Ars Technica
Cyble — Cl0p Ransomware: Active Threat Plaguing Businesses Worldwide
Western Digital discloses network breach, My Cloud service down
New Money Message ransomware demands million dollar ransoms
Pinduoduo: One of China's most popular apps has the ability to spy on its users, say experts
Meet the FSB contractor: 0Day Technologies
Qakbot mechanizes distribution of malicious OneNote notebooks
Information on Attacks Involving 3CX Desktop App
Creal: New Stealer Targeting Cryptocurrency Users Via Phishing Sites
Privacy, a chi tocca proteggere gli studenti?
Exploitation is a Dish Best Served Cold: Winter Vivern Uses Known Zimbra Vulnerability to Target Webmail Portals of NATO-Aligned Governments in Europe
Spyware vendors use 0-days and n-days against popular platforms
‘Vulkan files’ leak reveals Putin’s global and domestic cyberwarfare tactics
3CX VoIP Software Compromise & Supply Chain Threats
3CX Security Alert for Electron Windows App
Ironing out (the macOS details) of a Smooth Operator
3CX: Supply Chain Attack Affects Thousands of Users Worldwide
Hackers compromise 3CX desktop app in a supply chain attack
3CX users under DLL-sideloading attack: What you need to know
New OpcJacker Malware Distributed via Fake VPN Malvertising
The criminal use of ChatGPT – a cautionary tale about large language models
Guidance for investigating attacks using CVE-2023-23397
France bans all recreational apps from government devices
MacStealer: New macOS-based Stealer Malware Identified
NCA infiltrates cyber crime market with disguised DDoS sites
Throttling and Blocking Email from Persistently Vulnerable Exchange Servers to Exchange Online - Microsoft Community Hub
La NZZ victime d'un ransomware
Shining Light on Dark Power: Yet Another Ransomware Gang
Raiffeisen, Cler, BCGE... Des données bancaires exposées sur le web, à l'insu des clients
OK, it’s time to freak out about AI
New victims come forward after mass-ransomware attack
Emotet resumes spam operations, switches to OneNote
Patch Tuesday -> Exploit Wednesday: Pwning Windows Ancillary Function Driver for WinSock (afd.sys) in 24 Hours
Journalist opens USB letter bomb in newsroom
Session Cookies, Keychains, SSH Keys and More | 7 Kinds of Data Malware Steals from macOS Users
Reversing Emotet Dropping Javascript
Ferrari Hacked - Attackers Compromised The Ferrari IT Systems
Move, Patch, Get Out the Way: 2022 Zero-Day Exploitation Continues at an Elevated Pace
BlackMamba ChatGPT Polymorphic Malware | A Case of Scareware or a Wake-up Call for Cyber Security?
A Fake Project Related to the Sandbox Malspam
Wave of Arrests Hits Cybercriminals
Pixel Markup vulnerability allows screenshots to be un-redacted
Les trackers GPS et Bluetooth, des petites balises dont il faut se méfier
Google says hackers could silently own your phone until Samsung fixes its modems
Everything We Know About CVE-2023-23397
Fortinet Zero-Day and Custom Malware Used by Suspected Chinese Actor in Espionage Operation
BatLoader Continues to Abuse Google Search Ads to Deliver…
Microsoft patches zero-days used by state-sponsored and ransomware threat actors (CVE-2023-23397, CVE-2023-24880)
Ransomware Attacks Have Entered a ‘Heinous’ New Phase
Microsoft’s March 2023 Patch Tuesday Addresses 76 CVEs (CVE-2023-23397)
Ransomware Group Claims Hack of Amazon's Ring
Prometei botnet improves modules and exhibits new capabilities in recent updates
Rogue CyberSecurity Company Employee Tried To Sell Powerful, Stolen iPhone Malware For $50-Million
GoBruteforcer: Golang-Based Botnet Actively Harvests Web Servers
Czech cybersecurity office labels TikTok a security threat
Ransomware gang posts video of data stolen from Minneapolis schools
Medusa ransomware gang picks up steam as it targets companies worldwide
Telehealth startup Cerebral shared millions of patients' data with advertisers
Netcat Attack Cases Targeting MS-SQL Servers (LOLBins)
SCARLETEEL: Operation leveraging Terraform, Kubernetes, and AWS for data theft
Alerte sur des tentatives de piratage de comptes bancaires en Suisse
Gang leaks Lehigh Valley Health Network cancer patient photos as part of data hack
New HiatusRAT router malware covertly spies on victims - Lumen
A Noteworthy Threat: How Cybercriminals are Abusing OneNote
CVE-2023-27532
Acer Breached, Hacker Selling Access to 160GB of Stolen Data
Meta’s LLaMA Leaked to the Public, Thanks To 4chan
PoC exploit for recently patched Microsoft Word RCE is public (CVE-2023-21716)
Germany and Ukraine hit two high-value ransomware targets
We Found 28,000 Apps Sending Data to TikTok. A Ban Won't Help.
PyPi Packages Deliver Python Remote Access Tools
Credit Suisse breach spills info of high-net-worth clients
Biden National Cyber Strategy Seeks to Hold Software Firms Liable for Insecurity
FACT SHEET: Biden-Harris Administration Announces National Cybersecurity Strategy
How cybercriminals attack young gamers
BlackLotus UEFI bootkit: Myth confirmed
West ill-prepared to deal with evolving cyber threats, report concludes
Iron Tiger’s SysUpdate Reappears, Adds Linux Targeting
Hunting for Honkbox | Multistage macOS Cryptominer May Still Be Hiding
Lumma Stealer targets YouTubers via Spear-phishing Email | by S2W | S2W BLOG | Feb, 2023 | Medium
Intrusion dans les systèmes d'information de la Ville de Lille : le point sur la situation
U.S. Marshals Service hack compromises sensitive info
Danish parliament urges to remove TikTok over cybersecurity
LastPass breach update: The few additional bits of information
Canada bans TikTok on government devices
Hard-to-spot Mac crypto-mining threat, XMRig, hits Pirate Bay
PureCrypter targets government entities through Discord - Blog | Menlo Security
Stanford University discloses data breach affecting PhD applicants
Technical Advisory: Various Threat Actors Targeting ManageEngine Exploit CVE-2022-47966
TA569: SocGholish and Beyond
EXFILTRATOR-22 - An Emerging Post-Exploitation Framework
Cryptomonnaie: arrestation de deux Français suspectés d’avoir piraté la plateforme Platypus
OneNote Embedded file abuse
Suspect in major data theft case linked to Dutch-subsidized cybersecurity org
A year after Russia's invasion, the scope of cyberwar in Ukraine comes into focus
Beware of macOS cryptojacking malware.
Valve bans 40,000 Dota 2 cheaters through ‘honeypot’ patch
"Fobo" Trojan distributed as ChatGPT client for Windows
The Growing Threat of ChatGPT-Based Phishing Attacks
Google Delivers Record-Breaking $12M in Bug Bounties
Activision's Data Breach Contains Employee Information, Call of Duty and More, Report
Fortinet FortiNAC CVE-2022-39952 Deep-Dive and IOCs
Sensitive US military emails spill online
Hackers Start Selling Data Center Logins for Some of World’s Largest Corporations
The Gravediggers: How Eliminalia, a Spanish reputation management firm, buries the truth
Fog of war: how the Ukraine conflict transformed the cyber threat landscape
Magecart Attack Disguised as Google Tag Manager | Akamai
Ransomware pushes City of Oakland into state of emergency
German airport websites downed by DDoS attacks
FBI says it has 'contained' cyber incident on bureau's computer network
Clop ransomware claims it breached 130 orgs using GoAnywhere zero-day
Escroquerie aux SMS de l'Assurance maladie : les suspects volaient les numéros de téléphone depuis leur voiture
GoDaddy: Hackers stole source code, installed malware in multi-year breach
Hacker Uncovers How to Turn Traffic Lights Green With Flipper Zero
Microsoft February 2023 Patch Tuesday
Cisco warns of critical flaw in ClamAV antivirus
Hyundai and Kia issue software upgrades to thwart theft hack
Ethical hackers can now legally hack Belgian companies
The Israelis Destabilizing Democracy and Disrupting Elections Worldwide - National Security & Cyber - Haaretz
Ces hackers israéliens qui ont piraté les élections en Afrique
How undercover reporters caught ‘Team Jorge’ disinformation operatives on camera
Havoc Across the Cyberspace
IoC detection experiments with ChatGPT
Bogus URL Shorteners Redirect Thousands of Hacked Sites in AdSense Fraud Campaign
New MortalKombat ransomware and Laplas Clipper malware threats deployed in financially motivated campaign
Cloudflare mitigates record-breaking 71 million request-per-second DDoS attack
Apple sued for promising privacy, failing at it
Iran marks revolution anniversary, hackers interrupt state TV coverage
Uncle Sow: Dark Caracal in Latin America
Killnet Threat to Health and Public Sectors
Meet the Creator of North Korea’s Favorite Crypto Privacy Service
Investigating Intrusions From Intriguing Exploits
Une campagne de phishing fictive pour sensibiliser 25 PME romandes à la cybersécurité
Incendie OVH : une première décision de condamnation
Xiaomi, OnePlus, Top Android Phones in China Spy on You: Study
UK cracks down on ransomware actors
HTML Smuggling: The Hidden Threat in Your Inbox
Enigma Stealer Targets Cryptocurrency Industry with Fake Jobs
2023 Crypto Crime Trends: Illicit Cryptocurrency Volumes Reach All-Time Highs Amid Surge in Sanctions Designations and Hacking
Bitwarden password vaults targeted in Google ads phishing attack
OpenSSL fixes High Severity data-stealing bug – patch now!
Russia-linked Lockbit ransomware hacking gang threatens to publish Royal Mail data stolen in cyber attack
Sliver Malware With BYOVD Distributed Through Sunlogin Vulnerability Exploitations - ASEC BLOG
Iran responsible for Charlie Hebdo attacks
Cyberattaque contre l’Université de Zurich: des accès aux serveurs vendus sur le darkweb (update)
Onenote Malware: Classification and Personal Notes
Detecting OneNote Abuse
No Macro? No Worries. VSTO Being Weaponized by Threat Actors
Cybercrime: Les hackers avaient aussi sévi en Suisse
Massive ESXiArgs ransomware attack targets VMware ESXi servers worldwide
Ransomware : des centaines de serveurs VMware ESXi pris dans une vaste campagne
Un ransomware attaque les clients ESXi des hébergeurs français (MAJ)
Exploitation of GoAnywhere MFT zero-day vulnerability
https://infosec.exchange/@briankrebs/109795710941843934?s=09
Ransomware Roundup – Trigona Ransomware
.NET Virtualization Thrives in Malvertising Attacks
No Pineapple! –DPRK Targeting of Medical Research and Technology Sector
Following the Scent of TrickGate: 6-Year-Old Packer Used to Deploy the Most Wanted Malware
OneNote Documents Increasingly Used to Deliver Malware
Qakbot's Evolution Continues with New Strategies
HeadCrab: A Novel State-of-the-Art Redis Malware in a Global Campaign
Hospitals urged to tighten DDoS defenses after health data found on Killnet list
Pro-Russian DDoS attacks raise alarm in Denmark, U.S.
Google sponsored ads malvertising targets password manager
Action needed for GitHub Desktop and Atom users
‘InTheBox’ Web Injects Targeting Android Banking Applications Worldwide
Analyzing and remediating a malware infested T95 TV box from Amazon
Welcome to Goot Camp: Tracking the Evolution of GOOTLOADER Operations
IT specialists search and recruitment on the dark web
Exploring Killnet's Social Circles
A Major App Flaw Exposed the Data of Millions of Indian Students
Chinese PlugX Malware Hidden in Your USB Devices?
An unfaithful employee leaked Yandex source code repositoriesSecurity Affairs
Cybercriminals stung as HIVE infrastructure shut down
The Titan Stealer: Notorious Telegram Malware Campaign
Realtek SDK Vulnerability Attacks Highlight IoT Supply Chain Threats
La vidéosurveillance de l’armée présente des failles de sécurité
Suisse: Caméras de surveillance de l’armée jugées trop vulnérables
Apple patches are out – old iPhones get an old zero-day fix at last!
Following the LNK metadata trail
Threat groups are using Windows LNK files to gain access
Bitzlato: senior management arrested
how to completely own an airline in 3 easy steps
U.S. ‘No Fly List’ Leaks After Being Left in an Unsecured Airline Server
Hostile Takeover: Kraken Hacks Rival Darknet Market Solaris
Darth Vidar: The Dark Side of Evolving Threat Infrastructure
Risky Biz News: Crypto-crime volumes went down in 2022, ransomware payments too
New GTA Online exploit now allows cheaters to ban your account
Breaking Down the SEO Poisoning Attack | How Attackers Are Hijacking Search Results
Technical Advisory – Multiple Vulnerabilities in the Galaxy App Store (CVE-2023-21433, CVE-2023-21434)
Des hackers détournent des sites de l’UE pour voler des infos bancaires
PayPal Notifies 35,000 Users of Data Breach
ManageEngine CVE-2022-47966 Technical Deep Dive
T-Mobile hacked to steal data of 37 million accounts in API data breach
Hackers push malware via Google search ads for VLC, 7-Zip, CCleaner
DNS changer in malicious mobile app used by Roaming Mantis
Batloader Malware Abuses Legitimate Tools Uses Obfuscated JavaScript Files in Q4 2022 Attacks
Apple launches major security updates around the world
Mailchimp says it was hacked — again
Russian founder of a cryptocurrency exchange known for funneling ransomware profits arrested
Assessing Potential Exploitation of Sophos Firewall and CVE-2022-3236
Can you rely on macOS Ventura for malware protection?
7 Ways Threat Actors Deliver macOS Malware in the Enterprise
InfoSec Handlers Diary Blog - SANS Internet Storm Center
Google Ads Exploited to Spread Malware
Google Ads Malware Wipes NFT Influencer's Crypto Wallet
Supply Chain Attack Using Identical PyPI Packages, “colorslib”, “httpslib”, and “libhttps”
Vice Society ransomware leaks University of Duisburg-Essen’s data
NortonLifeLock warns that hackers breached Password Manager accounts
Défense : les interrogations de l’état-major français face aux opérations cyber américaines en Europe
Sustaining Digital Certificate Security - TrustCor Certificate Distrust
Compromise of employee device, credentials led to CircleCI breach
A Police App Exposed Secret Details About Raids and Suspects | WIRED
Watch: Ukraine Army Video Tells Russians How to Surrender to a Drone
Accidentally Crashing a Botnet
Pro-Russia hackers use Telegram, GitHub to attack Czech presidential election
Royal Mail ransomware attackers threaten to publish stolen data
NoName057(16) - The Pro-Russian Hacktivist Group Targeting NATO
StrongPity espionage campaign targeting Android users
Misconfigured PostgreSQL Used to Target Kubernetes Clusters
Raspberry Robin's botnet second life
The OWASSRF + TabShell exploit chain
Nouvelles règles: Boom des enregistrements de pilotes de drone en Suisse
New Paper on Old Threema Protocol
Air France and KLM notify customers of account hacks
Armed With ChatGPT, Cybercriminals Build Malware And Plot Fake Girl Bots
Schools hit by cyber attack and documents leaked
Twitter leak: 200m+ account database now free to download
Slack Security Update
Cyberattack shutters the Guardian's office for a month
CircleCI warns of security breach — rotate your secrets!
Jenkins discloses dozens of zero-day bugs in multiple plugins
Web Hackers vs. The Auto Industry: Critical Vulnerabilities in Ferrari, BMW, Rolls Royce, Porsche, and More
How do you know when macOS detects and remediates malware?
Data of over 200 million Deezer users stolen, leaks on hacking forum
New CatB Ransomware Employs 2-Year Old DLL Hijacking Technique To Evade Detection
Piratage Adecco : des données personnelles et bancaires (IBAN) dans la nature
Shc Linux Malware Installing CoinMiner
Ukraine Has Digitized Its Fighting Forces on a Shoestring
The Mac Malware of 2022 👾
Compromised PyTorch-nightly dependency chain between December 25th and December 30th, 2022.
U.S. targeted adversary cyber infrastructure to safeguard midterm vote
Ransomware gang gives decryptor to Toronto’s SickKids Hospital
Russian cyberattacks - Special Services - Gov.pl website
New YouTube Bot Malware Spotted Stealing User’s Sensitive Information
Pure coder offers multiple malware for sale in Darkweb forums
zhuowei/WDBFontOverwrite: Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.
Twitter in data-protection probe after '400 million' user details up for sale
ZINC weaponizing open-source software - Microsoft Security Blog
ZetaNile: Open source software trojans from North Korea
New RisePro Stealer distributed by the prominent PrivateLoader
Cost of data breaches to surpass US$5mn per incident in 2023
What’s in a PR statement: LastPass breach explained
Shlayer Malware: Continued Use of Flash Updates
Shlayer malware abusing Gatekeeper bypass on macOS
L’art de l’évasion How Shlayer hides its configuration inside Apple proprietary DMG files
Hacker claims to be selling Twitter data of 400 million users
Threat Spotlight: XLLing in Excel - threat actors using malicious add-ins
Raspberry Robin Malware Targets Telecom, Governments
Custom-Branded Ransomware: The Vice Society Group and the Threat of Outsourced Development - SentinelOne
An infostealer comes to town: Dissecting a highly evasive malware targeting Italy
Notice of Recent Security Incident
New Ransomware Strains Emerging from Leaked Conti’s Source Code
EXCLUSIVE: TikTok Spied On Forbes Journalists
Meddler-in-the-Middle Phishing Attacks Explained MitM
Stolen certificates in two waves of ransomware and wiper attacks
New Kiss-a-dog Cryptojacking Campaign Targets Docker and Kubernetes
A Roomba recorded a woman on the toilet. How did screenshots end up on Facebook?
Guardian hit by serious IT incident believed to be ransomware attack
Okta's source code stolen after GitHub repositories hacked
2022: A Look Back On A Year Of Mass Exploitation
SentinelSneak: Malicious PyPI module poses as security software development kit
CVE-2022-41040 and CVE-2022-41082 – zero-days in MS Exchange
GoTrim: Go-based Botnet Actively Brute Forces WordPress Websites
Support King, banned by FTC, linked to new phone spying operation
Google ads lead to fake software pages pushing IcedID (Bokbot)
How ChatGPT can turn anyone into a ransomware and malware threat actor
Global crackdown against DDoS services shuts down most popular platforms
Très courtisées, les sociétés suisses de cybersécurité s’arrachent
Microsoft-signed malicious Windows drivers used in ransomware attacks
A Custom Python Backdoor for VMWare ESXi Servers
Apple fixes 'actively exploited' zero-day security vulnerability affecting most iPhones
Mallox Ransomware showing signs of Increased Activity
State-sponsored attackers actively exploiting RCE in Citrix devices, patch ASAP! (CVE-2022-27518)
Released: Citrix ADC and Citrix Gateway (security bulletin CTX474995) security update
Check Point Research analyzes files on the Dark Web and finds millions of records available
Pulling the Curtains on Azov Ransomware: Not a Skidsware but Polymorphic Wiper - Check Point Research
Scammers Are Scamming Other Scammers Out of Millions of Dollars
Phylum Detects Ongoing Typosquat/Ransomware Campaign in PyPI and NPM
Apple announces 3 new security features
Cisco discloses high-severity IP phone zero-day with exploit code
Pilfered Keys Free App Infected by Malware Steals Keychain Data
Cryptocurrency Scam - Pig Butchering
Pulse Connect Secure: A View from the Internet
Gaming firm Razer wins lawsuit against IT vendor over data leak, awarded $8.7m in damages
Hitching a ride with Mustang Panda
New MuddyWater Threat: Old Kitten; New Tricks
Apple rolls out end-to-end encryption for iCloud backups
Mustang Panda Uses the Russian-Ukrainian War to Attack Europe and Asia Pacific Targets
Leaked: The Altrnativ world of cybersurveillance
Top 10 macOS Malware Discoveries in 2022
Zerobot – New Go-Based Botnet Campaign Targets Multiple Vulnerabilities
Vice Society: Profiling a Persistent Threat to the Education Sector
Le renseignement espagnol muet sur le scandale du logiciel espion Pegasus
Critical Ping Vulnerability Allows Remote Attackers to Take Over FreeBSD Systems
Winbiz change d’hébergeur: des milliers de clients toujours sans accès à leur comptabilité | ICTjournal
Blowing Cobalt Strike Out of the Water With Memory Analysis
Suspected Iran-Nexus TAG-56 Uses UAE Forum Lure for Credential Theft Against US Think Tank
W4SP continues to nest in PyPI: Same supply chain attack, different distribution method
Post-quantum cryptography: What is Emmanuel Macron talking about?
Purpose Built Proxy Services and the Malicious Activity They Enable
CVE-2022-21661: Exposing Database Info via WordPress SQL Injection
Connected medical devices are the Achilles' heel of healthcare orgs - Help Net Security
Schoolyard Bully Trojan Facebook Credential Stealer - Zimperium
En matière de transparence, communes et cantons sont à la traîne
Yvelines : cyberattaque contre l'hôpital André Mignot du centre hospitalier de Versailles
Preparing for a Russian cyber offensive against Ukraine this winter
Darknet markets generate millions in revenue selling stolen personal data
Fuite de données sensibles au Département de la justice à Zurich
La cybersécurité disposera de son propre office fédéral en Suisse
The Mystery of Metador | Unpicking Mafalda’s Anti-Analysis Techniques
Samsung, LG, Mediatek certificates compromised to sign Android malware
Google Online Security Blog: Memory Safe Languages in Android 13
Multiple Organisations compromised by Critical Authentication Bypass Vulnerability in Fortinet Products (CVE-2022-40684)
Lastpass says hackers accessed customer data in new breach
LockBit 3.0 ‘Black’ attacks and leaks reveal wormable capabilities and tooling
Play, ce nouveau ransomware utilisé contre les Alpes-Maritimes et ITS Group
Libye: la mise en examen de la société française Amesys et l'inculpation de deux cadres, confirmées en appel
U.S. bans sale and import of some tech from Chinese companies Huawei and ZTE
Detecting and Fingerprinting Infostealer Malware-as-a-Service platforms
Google pushes emergency Chrome update to fix 8th zero-day in 2022
Ransomware Roundup: Cryptonite Ransomware
Suisse: Une cyberattaque bloque la comptabilité de milliers de sociétés
Des dizaines de milliers d'entreprises victimes indirectes d'une cyberattaque
Nighthawk: An Up-and-Coming Pentest Tool Likely to Gain Threat Actor Notice | Proofpoint US
Nokia warns 5G security ‘breaches are the rule, not the exception’
Android SharkBot Droppers on Google Play Underline Platform's Security Needs
Why would you want to hack Electric Vehicle Charging Stations?
Researchers Explore Hacking VirusTotal to Find Stolen Credentials
Over 2 million users Affected with Browser Hijackers
Aurora: a rising stealer flying under the radar
A Leak Details Apple's Secret Dirt on Corellium, a Trusted Security Startup
Le ministre de l'Éducation nationale ne veut pas de Microsoft Office 365 ni de Google Workspace
Endurance Ransomware Claims Breach of US Federal Government
Vanuatu: Hackers strand Pacific island government for over a week
Control Your Types or Get Pwned: Remote Code Execution in Exchange PowerShell Backend
Exploit released for actively abused ProxyNotShell Exchange bug
Making Cobalt Strike harder for threat actors to abuse
Wi-Spy
Technical Analysis of the RedLine Stealer
AXLocker, Octocrypt, and Alice: Leading a new wave of Ransomware Campaigns
Michigan school districts reopen after three-day closure due to ransomware attack
A Comprehensive Look at Emotet’s Fall 2022 Return
CVE-2022-41622 and CVE-2022-41800 (FIXED): F5 BIG-IP and iControl REST Vulnerabilities and Exposures
Firefox fixes fullscreen fakery flaw – get the update now! – Naked Security
Cryptex: how a custom iPhone is changing macOS updates – The Eclectic Light Company
New RapperBot Campaign – We Know What You Bruting for this Time
Google Reaches $391.5 Million Settlement With States Over Location Tracking Practices
CVE-2022-45047: Apache MINA SSHD unsafe deserialization vulnerability
BumbleBee Zeros in on Meterpreter
Apple Hit With Class Action Alleging It Tracks Users Despite Privacy Assurances
LockBit ransomware suspect nabbed in Canada, faces charges in the US
Compromising Plesk via its REST API
Exploring ZIP Mark-of-the-Web Bypass Vulnerability (CVE-2022-41049)
PNG Steganography Hides Backdoor
Massive ois[.]is Black Hat Redirect Malware Campaign
Threat Spotlight: Cyber Criminal Adoption of IPFS for Phishing, Malware Campaigns
Attacking Apple's Neural Engine
Prigozhin interests and Russian information operations
Mysterious company with government ties plays key internet role
Microsoft fixes many zero-days under attack
The Case of Cloud9 Chrome Botnet
A cyberattack blocked the trains in Denmark
Nation-state cyberattacks become more brazen as authoritarian leaders ramp up aggression
Insurance giant settles NotPetya lawsuit, signaling cyber insurance shakeup
Inside the global hack-for-hire industry
Crime group hijacks hundreds of US news websites to push malware
Last Week on My Mac: Home truths about macOS
Department for Education warned after gambling companies benefit from learning records database
How Qatar hacked the World Cup
Apple's Poor Patching Policies Potentially Make Users' Security and Privacy Precarious
Microsoft ties Vice Society hackers to additional ransomware strains
Crimson Kingsnake: BEC Group Impersonates…
Exploiting Static Site Generators: When Static Is Not Actually Static
Black Basta Ransomware | Attacks Deploy Custom EDR Evasion Tools Tied to FIN7 Threat Actor
Malware on the Google Play store leads to harmful phishing sites
Malicious App Developer Remains on Google Play
U.S. banks processed about $1.2 billion in ransomware payments in 2021
Nothing PUNY About OpenSSL (CVE-2022-3602)
Phylum Discovers Dozens More PyPI Packages Attempting to Deliver W4SP Stealer in Ongoing Supply-Chain Attack
New Azov data wiper tries to frame researchers and BleepingComputer
Unmasking WindTape - Speaker Deck
How we handled a recent phishing incident that targeted Dropbox
Dormant Colors browser hijackers could be used for more nefarious tasks, report says
The Hunt for the Kingpin Behind AlphaBay, Part 1: The Shadow | WIRED
Inside TheTruthSpy, the stalkerware network spying on thousands • TechCrunch
What is ransomware-as-a-service and how is it evolving?
Incident Report: Employee and Customer Account Compromise
SiriSpy - iOS bug allowed apps to eavesdrop on your conversations with Siri
LV Ransomware Exploits ProxyShell in Attack on a Jordan-based Company
Pro-PRC DRAGONBRIDGE Influence Campaign Leverages New TTPs to Aggressively Target U.S. Interests, Including Midterm Elections
Stranger Strings: An exploitable flaw in SQLite
Advisory: Atlassian Jira Align Application, Version… | Bishop Fox
Unattributed RomCom Threat Actor Spoofing Popular Apps Now Hits Ukrainian Militaries
TommyLeaks and SchoolBoys: Two sides of the same ransomware gang
“Dormant Colors”: Live Campaign With Over 1M Data Stealing Extensions Installed
Intelligence Insights: October 2022
Mirai, RAR1Ransom, and GuardMiner – Multiple Malware Campaigns Target VMware Vulnerability
Operation Jackal: Interpol arrests Black Axe fraud suspects
Mairies : les pirates du groupe CUBA vident deux mairies françaises de leurs contenus
Exploited Windows zero-day lets JavaScript files bypass security warnings
Analysis of a Remote Code Execution (RCE) Vulnerability in Cobalt Strike 4.7.1
Reverse Engineering the Apple MultiPeer Connectivity Framework
How Vice Society got away with a global ransomware spree | Ars Technica
Starlink signals can be reverse-engineered to work like GPS—whether SpaceX likes it or not
Archive Sidestepping: Emotet Botnet Pushing Self-Unlocking Password-Protected RAR
From RM3 to LDR4: URSNIF Leaves Banking Fraud Behind
Domestic Kitten campaign spying on Iranian citizens with new FurBall malware
Grâce à une fausse enceinte Bluetooth JBL, ils réussissaient à voler des voitures
Melting the DNS Iceberg: Taking over your infrastructure Kaminsky style
TeamTNT Returns – or Does It?
Nouvelle cyberattaque contre le Réseau pédagogique neuchâtelois
Cyberattaque : comment Caen a évité le pire grâce à l’EDR d’HarfangLab
SafeBreach Uncovers Fully Undetectable Powershell Backdoor
A New Attack Surface on MS Exchange Part 4 - ProxyRelay!
CVE-2022-42889: Keep Calm and Stop Saying "4Shell"
Cyble Phishing ERMAC Android Malware Increasingly Active
Ransom Cartel Ransomware: A Possible Connection With REvil
BianLian Ransomware Encrypts Files in the Blink of an Eye
New “Prestige” ransomware impacts organizations in Ukraine and Poland
Microsoft Office 365 Message Encryption Insecure Mode of Operation | WithSecure™ Labs
New PHP Variant of Ducktail Infostealer Targeting Facebook Business Accounts
Software Delivery Shield protects the software supply chain
Threat Alert: Private npm Packages Disclosed via Timing Attacks
Alchimist: A new attack framework in Chinese for Mac, Linux and Windows
Black Basta Ransomware Gang Infiltrates networks via QAKBOT, Brute Ratel, and Cobalt Strike
POLONIUM targets Israel with Creepy malware
Malicious WhatsApp mod distributed through legitimate apps
Ransomware : qui paie et pourquoi ?
The Fresh Phish Market: Behind the Scenes of the Caffeine Phishing-as-a-Service Platform
New US Executive Order unlikely to satisfy EU law
Fake Ransomware Infection Under widespread
Intel Confirms Alder Lake BIOS Source Code Leak
Software Supply Chain Attackers; Organized, Persistent, and Operating for over a Year
On Agent Compromise in the Field
Hackers release data after LAUSD refuses to pay ransom
Jamf Threat Labs identifies macOS Archive Utility vulnerability allowing for Gatekeeper bypass (CVE-2022-32910)
White House announces new surveillance guardrails to meet EU Privacy Shield expectations
CVE-2022-40684: Critical Authentication Bypass in FortiOS and FortiProxy
CVE-2022-41352
Man arrested for alleged data breach SMS scam
MSSQL, meet Maggie. A novel backdoor for Microsoft SQL…
How 3 hours of inaction from Amazon cost cryptocurrency holders $235,000
Remove All The Callbacks – BlackByte Ransomware Disables EDR Via RTCore64.sys Abuse
PHP Supply Chain Attack on Composer
Bumblebee: increasing its capacity and evolving its TTPs
Malicious Tor Browser spreads through YouTube
A glimpse into the shadowy realm of a Chinese APT: detailed analysis of a ShadowPad intrusion – NCC Group Research
DeftTorero TTPs in 2019–2021
Bad VIB(E)s Part One: Investigating Novel Malware Persistence Within ESXi Hypervisors | Mandiant
Lazarus hackers abuse Dell driver bug using new FudModule rootkit
Amazon‑themed campaigns of Lazarus in the Netherlands and Belgium
Ukraine warns of 'massive cyberattacks' coming from Russia on critical infrastructure sites
Mystery Hackers Are ‘Hyperjacking’ Targets for Insidious Spying
Chaos is a Go-based Swiss army knife of malware
Warning: New attack campaign utilized a new 0-day RCE vulnerability on Microsoft Exchange Server
Witchetty: Group Uses Updated Toolset in Attacks on Governments in Middle East
ZINC weaponizing open-source software
Lindy Cameron at Chatham House security and defence conference 2022
BumbleBee: Round Two
NullMixer drops Redline Stealer, SmokeLoader and other malware | Securelist
Lazarus ‘Operation In(ter)ception’ Targets macOS Users Dreaming of Jobs in Crypto
Slack’s and Teams’ Lax App Security Raises Alarms
Poseidon’s Offspring: Charybdis and Scylla
In the footsteps of the Fancy Bear: PowerPoint mouse-over event abused to deliver Graphite implants
GRU: Rise of the (Telegram) MinIOns
BitBucket Server and Data Center at risk via Command Injection Vulnerability
Resolved RCE in Sophos Firewall (CVE-2022-3236)
New Malware Campaign Targets Zoom Users
2K Games' Support System Hacked
Unpatched 15-year old Python bug allows code execution in 350k projects
Tarfile: Exploiting the World With a 15-Year-Old Vulnerability
Noberus Ransomware: Darkside and BlackMatter Successor Continues to Evolve its Tactics
Malicious OAuth applications abuse cloud email services to spread spam
Void Balaur | The Sprawling Infrastructure of a Careless Mercenary
The Apple security landscape: Moving into the world of enterprise risk
Apple Kills Passwords in iOS 16 and macOS Ventura | WIRED
Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime
Revealed: US Military Bought Mass Monitoring Tool That Includes Internet Browsing, Email Data
Los Angeles School District Hit by Ransomware Attack
Online Attack Disrupts Michigan School District for 2nd Day
LockBit ransomware builder leaked online by “angry developer”
Azure Cloud Shell Command Injection Stealing User’s Access Tokens
Threat Alert: New Malware in the Cloud By TeamTNT
Chromium Blog: Announcing the Launch of the Chrome Root Program
Affaire Pegasus: l'Union européenne se penche sur le dossier suisse - rts.ch - Monde
Six months into Breached: The legacy of RaidForums?
Incoscienti e sfacciati: le tecniche dei teenager che violano aziende
Revolut hack exposes data of 50,000 users, fuels new phishing wave
Credential Gathering From Third-Party Software
Malvertising on Microsoft Edge's News Feed pushes tech support scams
Ermittlungserfolg gegen Ransomware-Gruppierung
GTA 6 gameplay leaks online in 90 videos
Security update
Iran’s cyberwar goes global
Webworm: Espionage Attackers Testing and Using Older Modified RATs
RedLine spreads through ads for cheats and cracks on YouTube
Undermining Microsoft Teams Security by Mining Tokens
How Human Traffickers Force Victims Into Cyberscamming
Charming Kitten: “Can We Have A Meeting?”
Breach of software maker used to backdoor as many as 200,000 servers
New Wave of Espionage Activity Targets Asian Governments
Bumblebee Returns with New Infection Technique
Lampion Trojan Utilizes New Delivery through Cloud-Based Sharing
Dead or Alive? An Emotet Story
The Curious Case of “Monti” Ransomware: A Real-World Doppelganger
Inside Fog Data Science, the Secretive Company Selling Mass Surveillance to Local Police
Likely Iranian Threat Actor Conducts Politically Motivated Disruptive Activity Against Albanian Government Organizations
Corte dei conti e l'hacker che ha violato account WhatsApp
Campagne de phishing Instagram : la certification sur les réseaux sociaux, ou le nouveau piège des hackers
Documentos portugueses da NATO apanhados à venda na darkweb
Microsoft investigates Iranian attacks against the Albanian government
Crimeware Trends | Ransomware Developers Turn to Intermittent Encryption to Evade Detection
L'Albanie accuse l'Iran d'une cyberattaque qui a paralysé ses services publics
Conti vs. Monti: A Reinvention or Just a Simple Rebranding?
Centre hospitalier Sud-Francilien : ce que dit l’autopsie de la cyberattaque
PSA: Nearly 5 Million Attacks Blocked Targeting 0-Day in BackupBuddy Plugin
MagicRAT: Lazarus’ latest gateway into victim networks
Shikitega - New stealthy malware targeting Linux
Mirai Variant MooBot Targeting D-Link Devices
QNAP warns of zero-day vulnerability in latest DeadBolt ransomware campaign
SafeBreach Uncovers New Remote Access Trojan (RAT)
Malicious Cookie Stuffing Chrome Extensions with 1.4 Million Users
Sharkbot is back in Google Play
Stealing Clouds
Hackers Create Traffic Jam in Moscow by Ordering Dozens of Taxis at Once Through App
PyPI Phishing Campaign | JuiceLedger Threat Actor Pivots From Fake Apps to Supply Chain Attacks
Tech tool offers police ‘mass surveillance on a budget’
Researchers found one-click exploits in Discord and Teams
Traffers: a deep dive into the information stealer ecosystem
Cette entreprise vend des données aussi sensibles que des visites dans des centres IVG - Numerama
FTC says data broker sold consumers’ precise geolocation, including presence at sensitive healthcare facilities
EU and Greece veer toward standoff over wiretapping scandal – POLITICO
5G Networks Are Worryingly Hackable
Kimsuky’s GoldDragon cluster and its C2 operations | Securelist
Revealing Europe's NSO
An interview with initial access broker Wazawaka: 'There is no such money anywhere as there is in ransomware
Linux Kernel Exploit (CVE-2022-32250) with mqueue
Roasting 0ktapus: The phishing campaign going after Okta identity credentials
Looking for the ‘Sliver’ lining: Hunting for emerging command-and-control frameworks - Microsoft Security Blog
MagicWeb: NOBELIUM’s post-compromise trick to authenticate as anyone
Legitimate SaaS Platforms Being Used to Host Phishing Attacks
XCSSET Malware Update | macOS Threat Actors Prepare for Life Without Python
Vulnerability in Linux containers – investigation and mitigation
THREAT ANALYSIS REPORT: Bumblebee Loader – The High Road to Enterprise Domain Control
Fake DDoS Pages On WordPress Sites Lead to Drive-By-Downloads
Lloyd’s to Exclude Catastrophic Nation-Backed Cyberattacks From Insurance Coverage
CVE-2022-27925
Google And Cloudflare Are Changing The Trust Infrastructure of the Internet: A Long Goodbye to RSA and a Hello to ECC and ECDSA
New macOS malware 'CloudMensis' detected and prevented
Overview of the Cyber Weapons Used in the Ukraine
Reservations Requested: TA558 Targets Hospitality and Travel
Making Sense of the Killnet, Russia’s Favorite Hacktivists
Disrupting SEABORGIUM’s ongoing phishing operations
Operation In(ter)ception: Aerospace and military companies in the crosshairs of cyberspies | WeLiveSecurity
North Korean hackers use signed macOS malware to target IT job seekers
An inside view of domain anonymization as-a-service
The Return of LOIC, HOIC, HULK, and Slowloris to the Threat Landscape
DigitalOcean says customer email addresses were exposed after latest Mailchimp breach – TechCrunch
Impact to DigitalOcean customers resulting from Mailchimp security incident
Ransomware Now Threatens the Global South
Zoom’s latest update on Mac includes a fix for a dangerous security flaw
NHS IT supplier held to ransom by hackers
Cisco confirms May attack by Yanluowang ransomware group
Phishers who breached Twilio and targeted Cloudflare could easily get you, too
Hands-on with Lockdown Mode in iOS 16
You're M̶u̶t̶e̶d̶ Rooted
Palo Alto bug used for DDoS attacks and there's no fix yet
The Hacking of Starlink Terminals Has Begun
CISA warns of Windows and UnRAR flaws exploited in the wild
Comprehensive Threat Intelligence: Cisco Talos shares insights related to recent cyber attack on Cisco
So RapperBot, What Ya Bruting For?
Greek intelligence service admits spying on journalist
Last Week on My Mac: Is your Mac still secure from malware?
Attackers leveraging Dark Utilities "C2aaS" platform in malware campaigns
Woody RAT: A new feature-rich malware spotted in the wild
A Detailed Analysis of the RedLine Stealer
Manjusaka: A Chinese sibling of Sliver and Cobalt Strike
Large-Scale AiTM Attack targeting enterprise users of Microsoft email services
Raccoon Stealer v2: The Latest Generation of the Raccoon Family
Investigation report about the abuse of the Mac Appstore | by Privacy1St
A Cyberattack Illuminates the Shaky State of Student Privacy
Discovery of new UEFI rootkit exposes an ugly truth: The attacks are invisible to us
Microsoft links Raspberry Robin malware to Evil Corp attacks
IPFS: The New Hotbed of Phishing
SEKOIA.IO Mid-2022 Ransomware Threat Landscape
LockBit Implements New Technique by Leaking Victim Negotiations
LockBit Ransomware Group Augments Its Latest Variant, LockBit 3.0, With BlackMatter Capabilities
Untangling KNOTWEED: European private-sector offensive actor using 0-day exploits
Justice Department seizes $500K from North Korean hackers who targeted US medical organizations
8220 Gang Massively Expands Cloud Botnet to 30,000 Infected Hosts
Kaspersky report on Luna and Black Basta ransomware
Exclusive: U.S. probes China's Huawei over equipment near missile silos
[CVE-2022-34918] A crack in the Linux firewall
Google ads lead to major malvertising campaign
Russia Released a Ukrainian App for Hacking Russia That Was Actually Malware
China: Declaration by the Minister for Foreign Affairs on behalf of the Belgian Government urging Chinese authorities to take action against malicious cyber activities undertaken by Chinese actors
I see what you did there: A look at the CloudMensis macOS spyware
Pegasus used to spy on protesters, a popular actress, and dozens more in Thailand, report shows
Busting browser fails: What attackers see when they hack your employees’ browser
Joker, Facestealer and Coper banking malwares on Google Play store
How I Hacked my Car Guides: Creating Custom Firmware
CVE-2022-30333
North Korean threat actor targets small and midsize businesses with H0lyGh0st ransomware
Did You Know Your Browser’s Autofill Credentials Could Be Stolen via Cross-Site Scripting (XSS)
Google Play hides app permissions in favor of developer-written descriptions
From cookie theft to BEC: Attackers use AiTM phishing sites as entry point to further financial fraud
Ongoing phishing campaign can hack you even when you’re protected with MFA
European Central Bank head targeted in hacking attempt
Vice Society: a discreet but steady double extortion ransomware group
Why organizations should (and should not) worry about…
The US military wants to understand the most important software on Earth
A New Attack Can Unmask Anonymous Users on Any Major Browser
En Suisse, les Tesla filmant en permanence posent de gros problèmes
Uncovering a macOS App Sandbox escape vulnerability: A deep dive into CVE-2022-26706 - Microsoft Security Blog
Europe’s PegasusGate: Countering spyware abuse
Russia, Killnet ha dichiarato guerra ai paesi che sostengono l'Ucraina
Verified Twitter accounts phished via hate speech warnings
Predatory Sparrow: Who are the hackers who say they started a fire in Iran?
THREAT ALERT: Raspberry Robin Worm Abuses Windows Installer and QNAP Devices
Identifier les détenteurs de véhicules peut être dangereux, en Suisse comme aux Etats-Unis
The Danger of License Plate Readers in Post-Roe America | WIRED
'I can fight with a keyboard': How one Ukrainian IT specialist exposed a notorious Russian ransomware gang
Hacktivists claiming attack on Iranian steel facilities dump tranche of 'top secret documents
Google Let Sberbank-Owned RuTarget Harvest User Data for Months
Il malware EnvyScout (APT29) è stato veicolato anche in Italia
This Is the Code the FBI Used to Wiretap the World
Cybersecurity experts question Microsoft's Ukraine report
After invasion of Ukraine, a reckoning on Russian influence in Austria
China Police Database Was Left Open Online for Over a Year, Enabling Leak
How a fake job offer took down the world’s most popular crypto game
Why the Equation Group (EQGRP) is NOT the NSA | xorl %eax, %eax
Unprecedented Shift: The Trickbot Group is Systematically Attacking Ukraine
Mykhailo Fedorov, de l’ombre à la cyberguerre
Dutch university wins big after Bitcoin ransom returned
Microsoft finds Raspberry Robin worm in hundreds of Windows networks
Ransomware review: June 2022
Mandiant Finds Possible Link Between Kremlin, Pro-Russian ‘Hacktivists’
Flubot: the evolution of a notorious Android Banking Malware
The SessionManager IIS backdoor: a possibly overlooked GELSEMIUM artefact
ZuoRAT Hijacks SOHO Routers to Silently Stalk Networks
Facing reality? Law enforcement and the challenge of deepfakes
FBI warns hackers are using deepfakes to apply for jobs
Unrar Path Traversal Vulnerability affects Zimbra Mail
Conti vs. LockBit: A Comparative Analysis of Ransomware Groups
LockBit 3.0 introduces the first ransomware bug bounty program
The Untold Story of NotPetya, the Most Devastating Cyberattack in History
Python packages upload your AWS keys, env vars, secrets to the web
The hateful eight: Kaspersky’s guide to modern ransomware groups’ TTPs
There Is More Than One Way to Sleep: Dive Deep Into the Implementations of API Hammering by Various Malware Families
From NtObjectManager to PetitPotam
Conti ransomware finally shuts down data leak, negotiation sites
NSA, Partners Recommend Properly Configuring, Monitoring PowerShell in New Report
7-zip now supports Windows ‘Mark-of-the-Web’ security feature
Raspberry Robin gets the worm early
The forgotten SUAVEEYEFUL FreeBSD software implant of the EQUATION GROUP
The curious tale of a fake Carrier.app
Spyware vendor targets users in Italy and Kazakhstan
APT ToddyCat
Defending Ukraine: Early Lessons from the Cyber War
Microsoft Plans to Eliminate Face Analysis Tools in Push for ‘Responsible A.I.’
How Russia’s vaunted cyber capabilities were frustrated in Ukraine
Council conclusions on a Framework for a coordinated EU response to hybrid campaigns
Nothing Has Changed: Website Retailers Selling Domains Meant for Illicit Goods and Services, Digital Citizens Alliance Investigation Finds
The Cybersecurity 202: Internet domain names are ripe for scam during coronavirus crisis
FBI says fraud on LinkedIn a 'significant threat' to platform and consumers
Russia's APT28 uses fear of nuclear war to spread Follina docs in Ukraine
Zero Day Initiative — CVE-2022-23088: Exploiting a Heap Overflow in the FreeBSD Wi-Fi Stack
BRATA is evolving into an Advanced Persistent Threat
Lookout Découverte d'un logiciel espion Android déployé au Kazakhstan
What It Means that the U.S. Is Conducting Offensive Cyber Operations Against Russia
Last Week on My Mac: Introducing XProtect Remediator, successor to MRT – The Eclectic Light Company
Analysis of dark web posts selling access to corporate networks
Telerik UI exploitation leads to cryptominer, Cobalt Strike infections
Police Linked to Hacking Campaign to Frame Indian Activists
Zimbra Email - Stealing Clear-Text Credentials via Memcache injection
Alphv-BlackCat non è più solo darkweb, pubblica anche su Internet "in chiaro"
A new vulnerability in Intel and AMD CPUs lets hackers steal encryption keys
Linux Threat Hunting: 'Syslogk' a kernel rootkit found under development in the wild
Vulnerability discovered in Apple M1 chip
SeaFlower 藏海花 A backdoor targeting iOS web3 wallets
Lyceum .NET DNS Backdoor
ASyncRat surpasses Dridex, TrickBot and Emotet to become dominant email threat
Ucraina, oltre 100 attacchi cyber della guerra hanno avuto impatti in Europa
Symbiote: A New, Nearly-Impossible-to-Detect Linux Threat
EXCLUSIVE: U.S. Government Ordered Travel Companies To Spy On Russian Hacker For Years And Report His Whereabouts Every Week
Microsoft Diagnostic Tool "DogWalk" Package Path Traversal Gets Free Micropatches (0day/WontFix)
DOJ, FBI shut down marketplace for stolen Social Security numbers - The Record by Recorded Future
Russian Cyberattack Hits Wales-Ukraine Football Broadcast
SVCReady: A New Loader Gets Ready
Liveness tests used by banks to verify ID are ‘extremely vulnerable’ to deepfake attacks
Smartphones Blur the Line Between Civilian and Combatant
TrustPid is another worrying, imperfect attempt to replace tracking cookies
Horde Webmail - Remote Code Execution via Email
Analysis and Attribution of the Eternity Ransomware: Timeline and Emergence of the Eternity Group
Anonymous Hacktivists Leak 1TB of Top Russian Law Firm Data
Deadly secret: Electronic warfare shapes Russia-Ukraine war
Zero-Day Exploitation of Atlassian Confluence
Apple has pushed a silent Mac update to remove hidden Zoom web server
Cyberattaques: «Il s'agit davantage de terrorisme que de crime organisé»
US military hackers conducting offensive operations in support of Ukraine, says head of Cyber Command
Android FluBot enters Switzerland – SWITCH Security-Blog
Takedown of SMS-based FluBot spyware infecting Android phones
XLoader Botnet: Find Me If You Can
Pegasus, il Parlamento europeo vuole chiarezza. Gli Stati Ue no
ICO fines facial recognition database company Clearview AI Inc more than £7.5m and orders UK data to be deleted
Fronton: A Botnet for Creation, Command, and Control of Coordinated Inauthentic Behavior
Des chercheurs reprogramment un AirTag et pointent quelques trous dans la raquette d'Apple
Gimmick MacOS Malware Spreads Through Customized Files, Enables MacOS CodeSign Bypass - CloudSEK
New Linux-Based Ransomware Cheerscrypt Targets ESXi Devices
Large-scale Analysis of DNS-based Tracking Evasion - broad data leaks included?
Exclusive: Russian hackers are linked to new Brexit leak website, Google says
Guerre en Ukraine : Anonymous déclare la cyberguerre à Killnet, un collectif de hackers pro-russes
Anonymous Declares Cyber War Against Pro-Russia Hacker Group Killnet
PyPI package 'ctx' and PHP library 'phpass' compromised to steal environment variables
Remote Code Execution on Western Digital PR4100 NAS (CVE-2022-23121)
Rise in XorDdos: A deeper look at the stealthy DDoS malware targeting Linux devices - Microsoft Security Blog
Pegasus vs. Predator: Dissident's Doubly-Infected iPhone Reveals Cytrox Mercenary Spyware
CrateDepression | Rust Supply-Chain Attack Infects Cloud CI Pipelines with Go Malware
Protecting Android users from 0-Day attacks
The IO Offensive: Information Operations Surrounding the Russian Invasion of Ukraine
Canada bans Huawei and ZTE from 5G networks over security concerns
Malicious PyPI package opens backdoors on Windows, Linux, and Macs
Fears grow for smaller nations after ransomware attack on Costa Rica escalates
President Rodrigo Chaves says Costa Rica is at war with Conti hackers
Exploiting an Unbounded memcpy in Parallels Desktop
KillNet: Pro-Russian Hacktivists.
Killnet Cyber Attacks Against Italy and NATO Countries
New 'Smart' Cheese Rinds Help Fight Parmesan Fraud
Data Marketplace Selling Info About Who Uses Period Tracking Apps
Critical Privilege Escalation Vulnerability in Jupiter and JupiterX Premium Themes
Researchers devise iPhone malware that runs even when device is turned off
La vulnérabilité PetitPotam persiste malgré le patch tuesday
Eternity, poche centinaia di dollari per un ransomware o un malware per furto dati
Multi-factor Authentication to Generate $27 Billion Globally for Mobile Operators in 2022, Juniper Research Study Finds
Web ad firms scrape email addresses before you know it
US links Thanos and Jigsaw ransomware to 55-year-old doctor
A closer look at Eternity Malware
macOS Vulnerabilities Hiding in Plain Sight (Black Hat Asia 2022 presentation)
EU lands new law to fight off hackers in critical sectors
The Linux Foundation and Open Source Software Security Foundation (OpenSSF) Gather Industry and Government Leaders for Open Source Software Security Summit II
Zyxel silently patches command-injection vulnerability with 9.8 severity rating
Known macOS Vulnerabilities Led Researcher to Root Out New Flaws
Patch tuesday mai 2022 : 74 failles corrigées dont 1 exploitée
CVE-2022-26925 : Patchez vos machines Windows sans attendre
Russia hacked an American satellite company one hour before the Ukraine invasion
npm Supply Chain Attack Targeting Germany-Based Companies
Ransomware-as-a-service: Understanding the cybercrime gig economy and how to protect yourself
Costa Rica declares national emergency after Conti ransomware attacks
L’Europe de la cyberdéfense
Dissecting Saintstealer
Russian TVs, search engines hacked on Victory Day with antiwar message
Apple, Google, and Microsoft commit to expanded support for FIDO standard
Vulnerability Analysis - CVE-2022-1388
From the Front Lines | Unsigned macOS oRAT Malware Gambles For The Win
MacOS Two-machine Kernel Debugging
Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation
Apple, Google and Microsoft Commit to Expanded Support for FIDO Standard to Accelerate Availability of Passwordless Sign-Ins
How Data Brokers Sell Access to the Backbone of the Internet
Update on cyber activity in Eastern Europe
Nozomi Networks Discovers Unpatched DNS Bug in Popular C Standard Library Putting IoT at Risk
UNC3524: Eye Spy on Your Email
Google Online Security Blog: The Package Analysis Project: Scalable detection of malicious open source packages
Spanish prime minister’s phone ‘targeted with Pegasus spyware’
Russia’s cyber warfare against Ukraine more nuanced than expected
Russian troops in Melitopol plunder $5M farm vehicles from Ukraine -- to find they've been remotely disabled
How the French fiber optic cable attacks accentuate critical infrastructure vulnerabilities
OverWatch Insights: Reviewing a New Intrusion Targeting Mac Systems
What does APT Activity Look Like on MacOS?
Jamf Threat Labs identifies Safari vulnerability (CVE-2022-22616) allowing for Gatekeeper bypass
Dec0ne/KrbRelayUp: KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default settings).
Microsoft finds new elevation of privilege Linux vulnerability, Nimbuspwn
Kaspersky DDoS report, Q1 2022
Zero Tolerance: More Zero-Days Exploited in 2021 Than Ever Before
LemonDuck botnet plunders Docker cloud instances in cryptocurrency crime wave
When coin miners evolve, Part 1: Exposing LemonDuck and LemonCat, modern mining malware infrastructure
CVE-2022-21449: Psychic Signatures in Java
The More You Know, The More You Know You Don’t Know
Pegasus spyware found on 5 French cabinet members' phones
CatalanGate: Extensive Mercenary Spyware Operation against Catalans Using Pegasus and Candiru
GitHub: Attacker breached dozens of orgs using stolen OAuth tokens
Increased Enterprise Use of iOS, Mac Means More Malware
Researcher uses 379-year-old algorithm to crack crypto keys found in the wild
Microsoft Zero-Days, Wormable Bugs Spark Concern
Russia’s Sandworm hackers attempted a third blackout in Ukraine
RaidForums hacking forum seized by police, owner arrested
Git security vulnerability announced
The U.S. is using declassified intel to fight an info war with Russia, even when the intel isn't rock solid
Industroyer2: Industroyer reloaded
CVE-2022-22965 Analyzing the Exploitation of Spring4Shell Vulnerability in Weaponizing and Executing the Mirai Botnet Malware
Spionaggio cyber alla Commissione europea
Police Records Show Women Are Being Stalked With Apple AirTags Across the Country
FBI Disrupts Cyclops Blink Botnet Used by Russian Intelligence Directorate
DoS attacks hit Finnish websites during Zelenskyy address • The Register
Svizzera, covo di spie russe
AcidRain | A Modem Wiper Rains Down on Europe
U.S. Says It Secretly Removed Malware Worldwide, Pre-empting Russian Cyberattacks - The New York Times
Chinese hackers abuse VLC Media Player to launch malware loader
MacOS SUHelper Root Privilege Escalation Vulnerability A Deep Dive Into CVE-2022-22639
Hackers breach MailChimp's internal tools to target crypto customers
Explaining Spring4Shell: The Internet security disaster that wasn’t
Faille Spring4shell, encore un cauchemar pour les entreprises
En Russie, des informations sur la police secrète fuitent à cause d'une appli de livraison
Lapsus$: Two UK teenagers charged with hacking for gang
Apple releases macOS 12.3.1, iOS 15.4.1, watchOS 8.5.1 and more - The Mac Security Blog
Chinese Hackers Target VMware Horizon Servers with Log4Shell to Deploy Rootkit
QNAP warns severe OpenSSL bug affects most of its NAS devices
Putin's hackers gained full access to Hungary's foreign ministry networks, the Orbán government has been unable to stop them
Apple and Meta Gave User Data to Hackers Who Used Forged Legal Requests
Lapsus$ and SolarWinds hackers both use the same old trick to bypass MFA
New Lapsus$ Hack Documents Make Okta’s Response Look More Bizarre
Sophos patches critical remote code execution vulnerability in Firewall
When Nokia Pulled Out of Russia, a Vast Surveillance System Remained
Fake sites stealing Steam credentials
Chrome Releases: Stable Channel Update for Desktop
Behold, a password phishing site that can trick even savvy users
Lapsus$: Oxford teen accused of being multi-millionaire cyber-criminal
Storm Cloud on the Horizon: GIMMICK Malware Strikes at macOS
Lapsus$: when kiddies play in the big league
Piratage Okta : 375 des clients concernés par l'attaque de Lapsus$
Updated Okta Statement on LAPSUS$
DEV-0537 criminal actor targeting organizations for data exfiltration and destruction
Anonymous Takes Anti-Putin Battle To Russian People With Printer Attack To Disrupt Kremlin's Propaganda
Lapsus$ hackers leak 37GB of Microsoft's alleged source code
Piratage d'Okta : l'entreprise admet enquêter, LAPSUS$ revendique
Protestware : l’open source n’échappe pas au conflit russo-ukrainien
Activists are targeting Russians with open-source "protestware"
Ukraine warns of InvisiMole attacks tied to state-sponsored Russian hackers
Exposing initial access broker with ties to Conti
Gas Is Too Expensive; Let’s Make It Cheap!
Sabotage: Code added to popular NPM package wiped files in Russia and Belarus | Ars Technica
OpenSSL plombé par une importante faille de sécurité
L’Ukraine reconnaît « une énorme perte de communication » après la cyberattaque contre le satellite KA-SAT
PROPHET SPIDER Exploits Citrix ShareFile
Cyber-attaques en Suisse sur des particuliers? «On ne peut rien exclure»
Raccoon Stealer: “Trash panda” abuses Telegram
Cyber Security Incident Pushes Ubisoft to Issue Internal Password Reset
Exclusive: U.S. spy agency probes sabotage of satellite internet during Russian invasion, sources say | Reuters
Armis Finds Three Critical Zero-Day Vulnerabilities in APC Smart-UPS Devices, Dubbed "TLStorm," Exposing More than 20 Million Enterprise Devices
EU and UK launch antitrust investigation into Google and Meta’s adtech dealings - The Verge
Iranian linked conglomerate MuddyWater comprised of regionally focused subgroups
Guerre en Ukraine : les utilisateurs du réseau satellitaire Viasat victimes d’une cyberattaque
New method that amplifies DDoSes by 4 billion-fold. What could go wrong?
Belarus conducted widespread phishing campaigns against Ukraine, Poland, Google says
China-backed APT41 compromised ‘at least’ six US state governments
An update on the threat landscape
Samsung confirms hackers stole Galaxy devices source code
Hackers leak 190GB of alleged Samsung data, source code
Cybercriminals who breached Nvidia issue one of the most unusual demands ever
Malware now using stolen NVIDIA code signing certificates
Crypto Bug in Samsung Galaxy Devices: Breaking Trusted Execution Environments (TEEs)
New Linux Vulnerability CVE-2022-0492 Affecting Cgroups: Can Containers Escape?
Scam E-Mail Impersonating Red CrossScam E-Mail Impersonating Red Cross
Asylum Ambuscade: State Actor Uses Compromised Private Ukrainian Military Emails to Target European Governments and Refugee Movement
L'Anssi sème le doute sur l'usage des solutions Kaspersky
Cyber Realism in a Time of War
Phishing attacks target countries aiding Ukrainian refugees
Toyota suspends domestic factory operations after suspected cyber attack
Ukrainian cyber resistance group targets Russian power grid, railways
Face à un incident de cybersécurité, Nvidia soupçonné d'avoir répliqué - ZDNet
Nvidia Confirms Company Data Was Stolen in Hack
IsaacWiper and HermeticWizard: New wiper and worm targeting Ukraine
Cybersécurité : l’Union européenne va aider l’Ukraine face à la Russie
Ukrainian Researcher Leaks Conti Ransomware Gang Data
Cyberattaque contre l’Université de Neuchâtel: des données volées publiées sur le darkweb (update)
The Next Web
Crypto Donations to Ukraine Jumps to $20M
Chinese Cybersecurity Company Doxes Apparent NSA Hacking Operation
Google follows YouTube in cutting off ad revenue to Russian state media
2022 Russia-Ukraine war — Cyber group tracker
STORMOUS ransomware si schiera senza dirlo, contro l'Ucraina - (in)sicurezza digitale
Twitter and Facebook restricted in Russia amid conflict with Ukraine
Facebook, Twitter remove disinformation accounts targeting Ukrainians
Ukraine border control hit with wiper cyberattack, slowing refugee crossing
Anonymous: the hacker collective that has declared cyberwar on Russia | Ukraine
Nvidia allegedly hacked its hackers, stole its data back
Ukraine takes the resistance to cyberspace, assembling an “IT army” to hack sites from Russia and its allies, calls on tech leaders to get involved
New Malware Capable of Controlling Social Media Accounts Infects 5,000+ Machines and is actively being Distributed via Gaming Applications on Microsoft's Official Store
Anonymous hacktivists, ransomware groups get involved in Ukraine-Russia conflict
US microchip powerhouse Nvidia hit by cyber attack
Conti ransomware group announces support of Russia, threatens retaliatory attacks
Attacchi informatici, c'è un nuovo malware di uno dei più importanti gruppi di cybercriminali russi
TrickBot malware operation shuts down, devs move to BazarBackdoor
Ukraine links phishing targeting military to Belarusian hackers
Aquarium Leaks. Inside the GRU’s Psychological Warfare Program
Ukraine: Disk-wiping Attacks Precede Russian Invasion
EXCLUSIVE Ukraine calls on hacker underground to defend against Russia
HermeticWiper | New Destructive Malware Used In Cyber Attacks on Ukraine
New data-wiping malware used in destructive attacks on Ukraine
The Bvp47 - a Top-tier Backdoor of US NSA Equation Group
Find You: Building a stealth AirTag clone | Positive Security
Un ex-officier de la CIA sur l’Ukraine: «Jamais les Etats-Unis n’ont divulgué autant d’informations sensibles et aussi vite»
Chinese cyber-attackers 'targeted Taiwanese financial firms'
Horde Webmail 5.2.22 - Account Takeover via Email
Behind the stalkerware network spilling the private phone data of hundreds of thousands
The US is unmasking Russian hackers faster than ever
Comment le leader mondial des data centers a contré l’attaque par rançongiciel de NetWalker
Risque de cybersécurité – RUAG doit être plus vigilante sur ses données sensibles
Une faille vulnérabilise le gestionnaire de paquets Snap pour Linux
Cosa sappiamo di sLoad e perchè è così elusivo? –
Pegasus spyware scandal uncovered by fake image file on an iPhone
Who Is Behind QAnon? Linguistic Detectives Find Fingerprints
Cyberattack targets Vodafone Portugal, disrupts services
‘Zero-Click’ Hacks Are Growing in Popularity. There’s Practically No Way to Stop Them
Une cyberattaque met à genou l’Université de Neuchâtel
Kazakhstan's Internet Shutdowns Could Be a Warning for Ukraine
VMware Horizon servers are under active exploit by Iranian state hackers
The Elite Hackers of the FSB
Passware parvient à trouver le mot de passe des Mac T2 par force brute
Twitter cans 2FA service provider over surveillance claims
Red Cross traces hack back to unpatched Zoho vulnerability
Assurances cyber : vers une « jurisprudence NotPetya » ?
Merck’s $1.4 Billion Insurance Win Splits Cyber From ‘Act of War’
Chrome Zero-Day Under Active Attack: Patch ASAP | Threatpost
New Emotet Infection Method
Russian hackers have obtained sensitive defense information technology by targeting US contractors, according to CISA
Meta to Pay $90 Million to Settle Facebook Data Privacy Lawsuit
Flood of malicious junk traffic makes Ukrainian websites unreachable | Ars Technica
Cyber-attack on ICRC: What we know
Vaud – Etudiant débouté en raison de son inactivité en ligne
Cyberattack takes Ukraine military, bank websites offline
Apple's AirTag uncovers a secret German intelligence agency
New DeadBolt ransomware targets QNAP devices, asks 50 BTC for master key
Linux-Targeted Malware Increases by 35% in 2021
EDPS Preliminary Remarks on Modern Spyware
KlaySwap crypto users lose funds after BGP hijack
Twitter Tells U.S. Senator It’s Cutting Ties to Swiss Tech Firm
Twitter, Google, WhatsApp, Telegram... pourquoi la double authentification n'est finalement pas si sécurisée
De nombreuses sociétés suisses touchées par le piratage affectant le monde des télécoms
Charting TA2541's Flight
Minaccia Malware prende di mira il settore dell'aviazione e dell'industria aerospaziale
Dropping Files on a Domain Controller Using CVE-2021-43893
PrivateLoader to Anubis Loader. By: Jason Reaves and Joshua Platt
PrivateLoader: The first step in many malware schemes
Safari Flaws Exposed Webcams, Online Accounts, and More
Webcam Hacking (again) - Safari UXSS
Objective-See's Blog
Analyzing a watering hole campaign using macOS exploits
Watering hole deploys new macOS malware, DazzleSpy, in Asia
SysJoker : un malware pour macOS, Windows et Linux qui opère discrètement depuis des mois
Backdoor RAT for Windows, macOS, and Linux went undetected until now | Ars Technica
New SysJoker Backdoor Targets Windows, Linux, and macOS
SysJoker analyzing the first (macOS) malware of 2022!
Google Docs Comment Exploit Allows for Distribution of Phishing and Malware
Can You Trust a File’s Digital Signature? New Zloader Campaign exploits Microsoft’s Signature Verification putting users at risk
iPhone flaw exploited by second Israeli spy firm-sources
Israelis didn’t care about NSO and Pegasus – until this scandal
Le piratage d'une société américaine a des conséquences en Suisse
Critical Vulnerabilities in PHP Everywhere Allow Remote Code Execution
Google Online Security Blog: Vulnerability Reward Program: 2021 Year in Review
ModifiedElephant APT and a Decade of Fabricating Evidence
Swisscom, Sunrise et Salt touchés par un piratage aux Etats-Unis
North Korea Hacked Him. So He Took Down Its Internet
I Used Apple AirTags, Tiles and a GPS Tracker to Watch My Husband’s Every Move - The New York Times
Emsisoft Decryptor for Maze / Sekhmet / Egregor - Emsisoft: Free Ransomware Decryption Tools
[LEAK] Maze + Egregor + Sekhmet keys along with m0yv (expiro) source code
Decryptor released for Maze, Egregor, and Sekhmet ransomware strains | ZDNet
Exposed documents reveal how the powerful clean up their digital past using a reputation laundering firm
Les 200 mots de passe les plus populaires en 2021
Why is the Zoom app listening on my microphone...
Who Needs to Exploit Vulnerabilities When You Have Macros?
Operation EmailThief: Active Exploitation of Zero-day XSS Vulnerability in Zimbra
PwnKit: Local Privilege Escalation Vulnerability Discovered in polkit’s pkexec (CVE-2021-4034)
Helping users stay safe: Blocking internet macros by default in Office
A walk through Project Zero metrics
Mettez à jour iOS ! WebKit contient une vulnérabilité dangereuse
Nouvelle version de Safari 15.3 sur Big Sur et Catalina pour combler une faille importante | MacGeneration