Cyberveille
curated by Decio
Nuage de tags
Mur d'images
Quotidien
Rechercher
Flux RSS
Flux RSS
Daily Feed
Weekly Feed
Monthly Feed
tags
search
DDosia Project: How NoName057(16) is trying to improve the efficiency of DDoS attacks
2023 Kaspersky Incident Response report
Vulnerabilities Year-in-Review: 2023
From OneNote to RansomNote: An Ice Cold Intrusion - The DFIR Report
Google: Spyware vendors behind 50% of zero-days exploited in 2023
Google Online Security Blog: Vulnerability Reward Program: 2023 Year in Review
Ransomware Hit $1 Billion in 2023
AI will make scam emails look genuine, UK cybersecurity agency warns
SEC says X account hack was due to SIM swapping
CVE-2023-46805
Le CHU de Nantes victime d’une cyberattaque
CVE-2023-36025 Exploited for Defense Evasion in Phemedrone Stealer Campaign
Attack of the week: Airdrop tracing – A Few Thoughts on Cryptographic Engineering
SharePoint Pre-Auth RCE chain (CVE-2023–29357 & CVE-2023–24955) | STAR Labs
Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN
Ransomware gang takes credit for Christmas attack on global Lutheran organization
WCC hit by ransomware attack
Compromising Google Accounts: Malwares Exploiting Undocumented OAuth2 Functionality for session hijacking
LastPass to enforce a 12-character requirement for master passwords
CVE-2023-27532
ALPHV Ransomware Claims Cyberattack on US Firm Ultra Intelligence and Communications
Three New Malicious PyPI Packages Deploy CoinMiner on Linux Devices | FortiGuard Labs
Weak password and infostealer blamed for Orange Spain outage
The State of Ransomware in the U.S.: Report and Statistics 2023
Cactus RANSOMWARE gang hit the Swedish retail and grocery provider Coop
The biggest cybersecurity and cyberattack stories of 2023
La ville de Nyon se cherche un SOC
Porsche To Kill ICE-Powered Macan In Europe Over Cybersecurity Laws | Carscoops
Downfall - A Slay the Spire Fan Expansion :: Downfall (Steam Standalone) was Breached. Please read.
Hackers Attack UK's Nuclear Waste Services Through LinkedIn
Victoria Courts Confront Unprecedented Ransomware Assault on AV Technology Network
A New Kind of AI Copy Can Fully Replicate Famous People. The Law Is Powerless.
2023, une année riche en vulnérabilités critiques
Cyberattaques : 2023, année noire pour les ESN
ChatGPT-aided ransomware in China results in four arrests as AI raises cybersecurity concerns | South China Morning Post
New Black Basta decryptor exploits ransomware flaw to recover files
L'hôpital cantonal de Saint-Gall a trouvé son SOC
Cloud Atlas' Spear-Phishing Attacks Target Russian Agro and Research Companies
Russian military hackers target Ukraine with new MASEPIE malware
Ukraine war: What's the impact of cyber guerrillas?
Chinese Hackers Exploited New Zero-Day in Barracuda's ESG Appliances
‘Wall of Flippers’ detects Flipper Zero Bluetooth spam attacks
Hackers stole $2 billion in crypto in 2023, data shows
Amnesty confirms Apple warning: Indian journalists’ iPhones infected with Pegasus spyware
Lockbit ransomware disrupts emergency care at German hospitals
Lockbit ransomware attack interrupted medical emergencies gang at a German hospital network
Microsoft disables MSIX protocol handler abused in malware attacks
Les données médicales toujours plus vulnérables face aux cyberattaques
Les arnaques aux QR codes se multiplient depuis quelques mois
This Clever New Idea Could Fix AirTag Stalking While Maximizing Privacy
Operation Triangulation: The last (hardware) mystery
The Disturbing Impact of the Cyberattack at the British Library
GTA 5 source code reportedly leaked online a year after RockStar hack
Ubisoft says it's investigating reports of a new security breach
Personal Information Exploit on OpenAI’s ChatGPT Raise Privacy Concerns
Cyberattaque contre l’Iran : qui sont ces mystérieux hackers qui perturbent le pays ?
Google Search Overwhelmed By Massive Spam Attack
Crypto drainer steals $59 million from 63k people in Twitter ad push
Android Banking Trojan Chameleon can now bypass any Biometric Authentication
BattleRoyal, DarkGate Cluster Spreads via Email and Fake Browser Updates
German Authorities Dismantle Dark Web Hub 'Kingdom Market' in Global Operation
Hackers Exploiting MS Excel Vulnerability to Spread Agent Tesla Malware
Seedworm: Iranian Hackers Target Telecoms Orgs in North and East Africa
Russian Water Utility Cyberattack Impacts 6000 Systems
Lapsus$: GTA 6 hacker handed indefinite hospital order
Healthcare software provider data breach impacts 2.7 million
SSH protects the world’s most sensitive networks. It just got a lot weaker
Snikt! Rhysida dumps more than a terabyte of Insomniac Games’ internal data
Qakbot's Back, But Don't Y'all Panic: A Southern Tech Talk
Unveiling VISS: a revolutionary approach to vulnerability impact scoring
Web injections are back on the rise: 40+ banks affected by new malware campaign
Terrapin attacks can downgrade security of OpenSSH connections
Xfinity waited to patch critical Citrix Bleed 0-day. Now it’s paying the price
Justice Department Disrupts Prolific ALPHV/Blackcat Ransomware Variant | United States Department of Justice
Authorities claim seizure of notorious ALPHV ransomware gang's dark web leak site | TechCrunch
Vans, Supreme owner VF Corp. says personal data stolen and orders impacted in suspected ransomware attack | TechCrunch
Toward Ending the Domain Wars: Early Detection of Malicious Stockpiled Domains
The Curious Case of Predatory Sparrow
FBI: Play ransomware gang has attacked 300 orgs since 2022
SMTP Smuggling - Spoofing E-Mails Worldwide
Ukrainian cellular and Internet still out, 1 day after suspected Russian cyberattack | Ars Technica
Rhadamanthys v0.5.0 - a deep dive into the stealer’s components
MongoDB says customer data was exposed in a cyberattack
QNAP VioStor NVR vulnerability actively exploited by malware botnet
Microsoft’s AI Chatbot Replies to Election Questions With Conspiracies, Fake Scandals, and Lies
Marketing Company Claims That It Actually Is Listening to Your Phone and Smart Speakers to Target Ads
Exploiting GOG Galaxy XPC service for privilege escalation in macOS
Imperva Uncovers CVE-2023-22524, A RCE Vulnerability
3CX warns customers to disable SQL database integrations
Cyberextorsion : 2023, année de l’industrialisation
A pernicious potpourri of Python packages in PyPI
Paternity and fertility tests among data stolen in Asper Biogene cyberattack | News | ERR
Supply chain attack targeting Ledger crypto wallet leaves users hacked
CVE-2023-50164
Ledger's Web3 Connector library was compromised and replaced with a drainer
Apple will no longer give police users' push notification data without a warrant
Hackers are exploiting critical Apache Struts flaw using public PoC
Ukraine’s intelligence claims cyberattack on Russia’s state tax service
CALISTO doxxing : Sekoia.io findings concurs to Reuters’ investigation on FSB-related Andrey Korinets
Threat actors misuse OAuth applications to automate financially driven attacks
Spider-Man And Wolverine Devs Hit By Alleged Ransomware Attack
Apple’s new iPhone security setting keeps thieves out of your digital accounts
Ransomware Hive : arrestation d’un suspect à Paris | LeMagIT
pfSense Security: Sensing Code Vulnerabilities with SonarCloud
One in four apps remain exposed to Log4Shell
Sophos backports RCE fix after attacks on unsupported firewalls
50K WordPress sites exposed to RCE attacks by critical bug in backup plugin
AI Act, come funziona lo stop al riconoscimento biometrico della prima legge europea sull'intelligenza artificiale | Wired Italia
Apple Releases Security Updates to Patch Critical iOS and macOS Security Flaws
US healthcare giant Norton says hackers stole millions of patients' data during ransomware attack | TechCrunch
L’AI Act européen adopté après des négociations marathon | ICTjournal
The EU Just Passed Sweeping New Rules to Regulate AI
Amazon sues group that fakes returns so people can get free MacBooks - The Verge
Early Warning Notification - the use of Bluetooth trackers for geolocation in organised crime | Europol
Russian Hacker Vladimir Dunaev Pleads Guilty for Creating TrickBot Malware
Inside Job: How a Hacker Helped Cocaine Traffickers Infiltrate Europe’s Biggest Ports
Ransomware : un mois de novembre hors-norme
Scanning Danger: Unmasking the Threats of Quishing
Qualcomm Releases Details on Chip Vulnerabilities Exploited in Targeted Attacks
Fighting Ursa Aka APT28: Illuminating a Covert Campaign
Star Blizzard increases sophistication and evasion in ongoing attacks
UK names FSB unit behind hack-and-leak campaigns, summons Russian ambassador
Rhysida ransomware gang claimed China Energy hack
PLC Hacking - More Commonplace Than You Might Think
Researchers discover dozens of new bugs affecting Sierra Wireless routers
Jamf Threat Labs: Fake Lockdown Mode proof of concept
Analysis of a new macOS Trojan-Proxy
Apple Confirms Governments Using Push Notifications to Surveil Users - MacRumors
Windows 10 gets three more years of security updates, if you can afford them | Ars Technica
Atlassian Releases Critical Software Fixes to Prevent Remote Code Execution
Russian Hackers’ Lawsuit Reveals Weaknesses In Apple’s iOS 16
23andMe confirms hackers stole ancestry data on 6.9 million users
P2Pinfect - New Variant Targets MIPS Devices
Phineas Fisher, Hacktivism, and Magic Tricks
N. Korean Hackers 'Mixing' macOS Malware Tactics to Evade Detection
The Far-Reaching Consequences of LogoFAIL
Vidar Infostealer Steals Booking.com Credentials in Fraud Scam
Cyber Threats affecting "International Geneva"
Qlik Sense Remote Code Execution Technical Exploitation -
Les ministres français invités à désinstaller WhatsApp, Signal et Telegram
New BLUFFS attack lets attackers hijack Bluetooth connections
Okta reveals additional attackers' activities in October 2023 Breach
Play Ransomware Goes Commercial - Now Offered as a Service to Cybercriminals
Welltok data breach exposes data of 8.5 million US patients
Japan space agency hit with cyberattack, rocket and satellite info not accessed | Reuters
InfectedSlurs Botnet Spreads Mirai via Zero-Days
Spyware Targeting Against Serbian Civil Society - The Citizen Lab
Spyware in Serbia: civil society under attack - Access Now
DP World confirms data stolen in cyberattack, no ransomware used
DPRK Crypto Theft | macOS RustBucket Droppers Pivot to Deliver KandyKorn Payloads
440,000 Sets of Personal Info Affected by Hack of Line Operator | Nippon.com
Telekopye: Chamber of Neanderthals’ secrets
Into the Trash: Analyzing LitterDrifter
Concevis: des données du fisc auraient fuité (update 3)
iPhone: Why Apple is working hard to break into its own phones
USB worm unleashed by Russian state hackers spreads worldwide
Thousands of routers and cameras vulnerable to new 0-day attacks by hostile botnet | Ars Technica
The Ticking Supply Chain Attack Bomb of Exposed Kubernetes Secrets
How to bypass Windows Hello, log into vulnerable laptops
Le Conseil fédéral clarifie les tâches de l’Office fédéral de la cybersécurité
Hacking Employers and Seeking Employment: Two Job-Related Campaigns Bear Hallmarks of North Korean Threat Actors
Meet the Unique New "Hacking" Group: AlphaLock
Artificial Intelligence in Education – Legal Best Practices
Building an Exploit for FortiGate Vulnerability…
InfectedSlurs Botnet Spreads Mirai via Zero-Days
Understanding the Phobos affiliate structure and activity
Atomic Stealer distributed to Mac users via fake browser updates
Les Suisses préoccupés par leur cybersécurité même s'ils sont rarement touchés
Rhysida ransomware gang claims attack on British Library • The Register
Nearly 9 million patients' records compromised in data breach
Lumma Stealer malware now uses trigonometry to evade detection
Combien de PME mettent la clé sous la porte après une cyberattaque ? | LeMagIT
Pourquoi les hackers russes sont plus dangereux que jamais
GitHub - yunuscadirci/DIALStranger: details about DIAL protocol vulnerabilities
Thornaby: Woman targeted in £13k train station QR code scam
2023’s ransomware rookies are a remix of Conti and other classics
Hackers swipe Booking.com, damage from attack is global
Gang says ICBC paid ransom over hack that disrupted US Treasury market | Reuters
Toyota confirms breach after Medusa ransomware threatens to leak data
Zimbra 0-day used to target international government organizations
European Telecom Body to Open-Source Radio Encryption System
Uncovering thousands of unique secrets in PyPI packages
In a first, cryptographic keys protecting SSH connections stolen in new attack | Ars Technica
Google’s new Titan Security Keys let you store passkeys
Intel fixes high-severity CPU bug that causes “very strange behavior”
A Closer Look at ChatGPT's Role in Automated Malware Creation
The Mirai Confessions: Three Young Hackers Who Built a Web-Killing Monster Finally Tell Their Story | WIRED
C3RB3R Ransomware | Ongoing Exploitation of CVE-2023-22518 Targets Unpatched Confluence Servers - SentinelOne
Google researchers discover 'Reptar,’ a new CPU vulnerability
District of Puerto Rico | Russian and Moldovan National Pleads Guilty to Operating Illegal Botnet Proxy Service that Infected Tens of Thousands of Internet-Connected Devices Around the World | United States Department of Justice
Microsoft Patch Tuesday November 2023
La nLPD est directement applicable à l’intelligence artificielle
The $2,000 Phones that Let Anyone Make Robocalls
GameOver(lay) - Local Privilege Escalation in Ubuntu Kernel
Rançongiciel Phobos : arrestation de deux Russes, soupçonnés d’une dizaine d’attaques en France
Malaysian Police Dismantle “BulletProftLink” Phishing Operation
Bitter Pill: Third-Party Pharmaceutical Vendor Linked to Pharmacy and Health Clinic Cyberattack
Ivanti EPMM CVE-2023-39335/39337
Détournement de Microsoft et Cloudflare au cours d’une nouvelle attaque de QRishing
Here’s How Violent Extremists Are Exploiting Generative AI Tools
DP World: Australian ports to remain closed as AFP investigates cybersecurity breach
Apple neglects to patch multiple critical vulnerabilities in macOS
CVE-2023-38548
Detecting “Effluence”, an Unauthenticated Confluence Web Shell
ICBC hit by ransomware impacting global trades
Dozens of npm Packages Caught Attempting to Deploy Reverse Shell
Nude “before and after” photos stolen from plastic surgeon, posted online, and sent to victims' family and friends
Ransomware attack on ICBC disrupts trades in US Treasury market
Cloudflare website downed by DDoS attack claimed by Anonymous Sudan
Microsoft Temporarily Blocked Internal Access to ChatGPT, Citing Data Concerns
Atlassian confirms ransomware is exploiting latest Confluence bug
Sandworm Disrupts Power in Ukraine Using a Novel Attack Against Operational Technology
Malvertiser copies PC news site to deliver infostealer
Android Kitchen Sink: Send BLE spam to iOS, Android and Windows at once using Android app - Mobile Hacker
SysAid Zero-Day Vulnerability Exploited by Ransomware Group
SysAid On-Prem Software CVE-2023-47246 Vulnerability
Microsoft offers politicians protection against deepfakes
Predator AI | ChatGPT-Powered Infostealer Takes Aim at Cloud Platforms
Infomaniak intègre une IA souveraine à son service d'e-mails
Python obfuscation traps
Common Vulnerability Scoring System
ATT&CK v14 Unleashes Detection Enhancements, ICS Assets, and Mobile Structured Detections | by Amy L. Robertson
Jamf Threat Labs Discovers Malware from BlueNoroff
Critical Atlassian Confluence bug exploited in Cerber ransomware attacks
Not so lucky: BlackCat is back!
Discord will switch to temporary file links to block malware delivery
AI companies have all kinds of arguments against paying for copyrighted content
GhostSec offers Ransomware-as-a-Service Possibly Used to Target Israel
Suspected Exploitation of Apache ActiveMQ CVE-2023-46604
Four dozen countries declare they won't pay ransomware ransoms | CyberScoop
Apple 'Find My' network can be abused to steal keylogged passwords
Send My: Arbitrary data transmission via Apple's Find My network | Positive Security
New Microsoft Exchange zero-days allow RCE, data theft attacks
Microsoft is overhauling its software security after major Azure cloud attacks
How Kopeechka, an Automated Social Media Accounts Creation Service, Can Facilitate Cybercrime
Mozi botnet goes dark under mysterious circumstances
How a tiny Pacific Island became the global capital of cybercrime
FIRST Announces CVSS 4.0 - New Vulnerability Scoring System
Microsoft profiles new threat group with unusual but effective practices
Octo Tempest crosses boundaries to facilitate extortion, encryption, and destruction
Boeing says 'cyber incident' hit parts business after ransom threat | Reuters
CVE-2023-46604
Massive ransomware attack hinders services in 70 German municipalities
2022 RTF Global Ransomware Incident Map: Attacks continue worldwide, groups splinter, education sector hit hard
Massive cybercrime URL shortening service uncovered via DNS data
CVE-2023-46747
Atlassian warns of critical Confluence flaw leading to data loss
SEC accuses SolarWinds CISO of misleading investors before Russian cyberattack | TechCrunch
Surge in QR Code Quishing: Check Point Records 587% Attack Spike
Two Developers of the Ragnar Locker Ransomware Arrested in Spain
GHOSTPULSE haunts victims using defense evasion bag o' tricks
FakeUpdateRU Chrome Update Infection Spreads Trojan Malware
3 new NGINX ingress controller Kubernetes related vulnerabilities
Introducing HAR Sanitizer: secure HAR sharing
HackerOne paid ethical hackers over $300 million in bug bounties
SIM Swappers Are Working Directly with Ransomware Gangs Now
CVE-2023-45498: RCE in VinChin Backup
A cascade of compromise: unveiling Lazarus' new campaign
Hyundai to hold software-upgrade clinics across the US for vehicles targeted by thieves | AP News
StripedFly: Perennially flying under the radar
Triangulation: validators, post-compromise activity and modules | Securelist
VMSA-2023-0023
Hackers can force iOS and macOS browsers to divulge passwords and much more
Partout, les passkeys remplacent les mots de passe. Au tour des entreprises?
Citrix warns admins to patch NetScaler CVE-2023-4966 bug immediately
CVE-2023-4966: NetScaler Critical Security Update Now Available
Battling a new DarkGate malware campaign with Malwarebytes MDR
Citrix Bleed: Leaking Session Tokens with CVE-2023-4966
Okta incident and 1Password | 1Password
1Password Detects Suspicious Activity Following Okta Support Breach
Spain police dismantled a cybercriminal group who stole data of 4 million individuals
Okta stock falls after company says client files accessed by hackers via support system
How Cloudflare mitigated yet another Okta compromise
CVE-2023-38831 Exploited by Pro-Russia Hacking Groups in RU-UA Conflict Zone for Credential Harvesting Operations
Measures taken following the unprecedented cyber-attack on the ICC
Switzerland’s e-voting system has predictable implementation blunder
Un cybercriminel russe membre du gang Ragnar Locker arrêté en France
Cisco discloses new IOS XE zero-day exploited to deploy malware implant
D-Link confirms data breach after employee phishing attack
Ragnar Locker ransomware gang taken down by international police swoop
Casio keyed up after data loss hits customers in 149 countries • The Register
Ukrainian activists hack Trigona ransomware gang, wipe servers
Ragnar Locker ransomware’s dark web extortion sites seized by police
CIA exposed to intelligence interception due to X's URL bug
The forgotten malvertising campaign
Hackers exploit critical flaw in WordPress Royal Elementor plugin
Active exploitation of Cisco IOS XE Software Web Management User Interface vulnerability
Lausanne veut 2,24 millions pour sa sécurité IT
L’attaque contre Xplain bloque la modernisation de l’IT de la police vaudoise
Les polices vaudoises hésitent à numériser l’ensemble de leurs activités avec Xplain - rts.ch - Vaud
Disclosing the BLOODALCHEMY backdoor
Coordinated Disclosure: 1-Click RCE on GNOME (CVE-2023-43641)
LinkedIn Smart Links Fuel Credential Phishing Campaign
Users of Telegram, AWS, and Alibaba Cloud targeted in latest supply chain attack
The evolution of Windows authentication
Balada Injector Targets Unpatched tagDiv Plugin, Newspaper Theme & WordPress Admins
Steam Adds Security Layer for Devs After Some Had Their Accounts Compromised and Malware Was Injected in Games
The Predator Files: European Spyware Consortium Supplied Despots and Dictators
IZ1H9 Campaign Enhances Its Arsenal with Scores of Exploits | FortiGuard Labs
HTTP/2 Rapid Reset: deconstructing the record-breaking attack
The Art of Concealment: A New Magecart Campaign That’s Abusing 404 Pages | Akamai
Plus de la moitié des aînés ciblés par des cyber-escrocs
Les hôpitaux de Vittel et Neufchâteau victimes d'une cyberattaque
23andMe User Data Stolen in Targeted Attack on Ashkenazi Jews
90s Vulns In 90s Software (Exim) - Is the Sky Falling?
Rules of engagement issued to hacktivists after chaos
Android TV Boxes Infected with Backdoors, Compromising Home Networks
X-Force uncovers global NetScaler Gateway credential harvesting campaign
n their push for AI-generated content, tech companies are dancing on the edge between fucking around and finding out.
Genetics firm 23andMe says user data stolen in credential stuffing attack
Mirai Botnet's New Wave: hailBot,kiraiBot, catDDoS, and Their Fierce Onslaught - NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks.
New Supermicro BMC Vulnerabilities Could Expose Many Servers to Remote Attacks
Binarly REsearch Uncovers Major Vulnerabilities in Supermicro BMCs
The evolutionary tale of a persistent Python threat
CVE: Zero-Day Privilege Escalation in Confluence Server & Data Center
Coop et Migros vendent des données clients à des entreprises tierces
Sony confirms data breach impacting thousands in the U.S.
CVE-2023-4911: Looney Tunables - Local Privilege Escalation in the glibc’s ld.so
Vulnerable Arm GPU drivers under active exploitation. Patches may not be available | Ars Technica
Qualcomm says hackers exploit 3 zero-days in its GPU, DSP drivers
Microsoft Defender Flags Tor Browser as a Trojan and Removes it from the System
Critical vulnerabilities in Exim threaten over 250k email servers worldwide | Ars Technica
Routers have been rooted by Chinese spies US and Japan warn
NSA chief announces new AI Security Center, 'focal point' for AI use by government, defense industry
Vulnerability in popular ‘libwebp’ code more widespread than expected
CVE-2023-42793
New GPU Side-Channel Attack Allows Malicious Websites to Steal Data
Sony Investigating After Hackers Offer to Sell Stolen Data
Decade of newborn child registry data stolen in MOVEit mass-hack
Deux jeunes hackers jugés pour une campagne de mails « cryptoporno » en 2019
From ScreenConnect to Hive Ransomware in 61 hours
PREDATOR IN THE WIRES: Ahmed Eltantawy Targeted with Predator Spyware After Announcing Presidential Ambitions
0-days exploited by commercial surveillance vendor in Egypt
All thanks to ‘Big Yellow Taxi’: How State discovered Chinese hackers reading its emails
New Apple Zero-Days Exploited to Target Egyptian ex-MP with Predator Spyware
Apple emergency updates fix 3 new zero-days exploited in attacks
International Criminal Court hit with a cyber attack
US-Canada water commission confirms 'cybersecurity incident"
[CVE-2023-42752] integer overflow in Linux kernel leading to exploitable memory access
Fake CVE-2023-40477 Proof of Concept Leads to VenomRAT
38TB of data accidentally exposed by Microsoft AI researchers | Wiz Blog
Leaked Microsoft documents hint at new Doom and Dishonored games
Microsoft AI Employee Accidentally Leaks 38TB of Data
New Python NodeStealer Goes Beyond Facebook Credentials, Now Stealing All Browser Cookies and Login Credentials
BlackCat ransomware hits Azure Storage with Sphynx encryptor
Ransomware flingers hit Manchester cops in the supply chain • The Register
TikTok fined €345M by Irish DPC for violating children’s privacy
When MFA isn't actually MFA
How Google Authenticator made one company’s network breach much, much worse
Can't Be Contained: Finding a Command Injection Vulnerability in Kubernetes
Update Adobe Acrobat and Reader to Patch Actively Exploited Vulnerability
Argent russe: la place financière suisse rattrapée par une fuite de données
macOS MetaStealer | New Family of Obfuscated Go Infostealers Spread in Targeted Attacks
Trojanized Free Download Manager found to contain a Linux backdoor
Threat actor leaks sensitive data belonging to Airbus
Mozilla patches Firefox, Thunderbird against zero-day exploited in attacks
Critical WebP bug: many apps, not just browsers, under threat
With 0-days hitting Chrome, iOS, and dozens more this month, is no software safe? | Ars Technica
PSA: Ongoing Webex malvertising campaign drops BatLoader
Attacker combines phone, email lures into believable, complex attack chain
Ransomware crew hits Save The Children, steals 7TB of data
Microsoft to defend customers on AI copyright challenges
ChatGPT fails in languages like Tamil and Bengali
KNVB paid ransom to prevent cyber criminals from publishing footballers' passports
Cybersecurity issue prompts computer shutdowns at MGM Resorts properties across US
Active North Korean campaign targeting security researchers
North Korea-backed hackers target security researchers with 0-day
The International Criminal Court Will Now Prosecute Cyberwar Crimes
Last Week on My Mac: How quickly can Apple release a security update?
China’s iPhone ban expected to expand to more government agencies soon
Code Vulnerabilities Put Proton Mails at Risk
Mac users targeted in new malvertising campaign delivering Atomic Stealer
Apple discloses 2 new zero-days exploited to attack iPhones, Macs
How China Demands Tech Firms Reveal Hackable Flaws in Their Products
Rockstar Games reportedly sold games with Razor 1911 cracks on Steam
Compromised Microsoft Key: More Impactful Than We Thought
Developers Warned of Malicious PyPI, NPM, Ruby Packages Targeting Macs - SecurityWeek
Nascent Malware Campaign Targets npm, PyPI, and RubyGems Developers
What's in a NoName? Researchers see a lone-wolf DDoS group
Okta customers targeted in social engineering scam
Attackers access military data through fencing supplier
China Bans iPhone Use for Government Officials at Work
Zaun Data Breach
Is macOS’s new XProtect behavioural security preparing to go live?
Apple’s Decision to Kill Its CSAM Photo-Scanning Tool Sparks Fresh Controversy
The Emergence of Ransomed: An Uncertain Cyber Threat in the Making
Pay our ransom instead of a GDPR fine, cybercrime gang tells its targets
Healthcare Organizations Hit by Cyberattacks Last Year Reported Big Impact, Costs
VMConnect supply chain attack continues, evidence points to North Korea - Security Boulevard
An Ongoing Open Source Attack Reveals Roots Dating Back To 2021
New Twitter scam in China: sextortion scammers
Hackers modify open-source ‘SapphireStealer’ malware, leading to multiple variants
LogicMonitor customers hit by hackers, because of default passwords | TechCrunch
Unmasking Trickbot, One of the World’s Top Cybercrime Gangs
Raising Online Defenses Through Transparency and Collaboration | Meta
How NightOwl for Mac Added a Botnet
Xplain: les données de procédures pénales en cours sont sur le darknet
Exposing DuckTail
Qakbot botnet infrastructure shattered after international operation
The Cheap Radio Hack That Disrupted Poland’s Railway System
Qakbot botnet dismantled after infecting over 700,000 computers
Diving Deep into UNC4841 Operations Following Barracuda ESG Zero-Day Remediation (CVE-2023-2868)
Attacks on Citrix NetScaler systems linked to ransomware actor
Adversary On The Defense: ANTIBOT.PW
Lapsus$: Court finds teenagers carried out hacking spree
Poland investigates cyber-attack on rail network - BBC News
Met Police admits details of officers at risk of exposure after warrant card supplier was hacked
CVE-2023-36844 And Friends: RCE In Juniper Devices
MOVEit, the biggest hack of the year, by the numbers
Lazarus Group exploits ManageEngine vulnerability to deploy QuiteRAT
Time keeps on slippin’ slippin’ slippin’: The 2023 Active Adversary Report for Tech Leaders – Sophos News
Ransomware infection wipes all CloudNordic servers
Fake Roblox packages target npm with Luna Grabber information-stealing malware
Genève: Un élu a farfouillé sans droit dans les fichiers de la justice
#NoFilter - Abusing Windows Filtering Platform for Privilege Escalation
British court convicts two teen Lapsus$ members of hacking tech firms
XLoader's Latest Trick | New macOS Variant Disguised as Signed OfficeNote App
Ecuador’s national election agency says cyberattacks caused absentee voting issues
CVE-2023-34127
Sneaky Amazon Google ad leads to Microsoft support scam
Brazilian hacker claims Bolsonaro asked him to hack into the voting system ahead of 2022 vote | AP News
Data Theft Via MOVEit: 4.5 Million More Individuals Affected
Chinese Microsoft hackers also hit GOP Rep. Don Bacon of Nebraska
Threat actors use beta apps to bypass mobile app store security
New Apple iOS 16 Exploit Enables Stealthy Cellular Access Under Fake Airplane Mode
Approximately 2000 Citrix NetScalers backdoored in mass-exploitation campaign
Discord.io confirms breach after hacker steals data of 760K users
Des pirates informatiques s'emparent des données de 2800 policiers bernois
The New Frontline of Geopolitics | Understanding the Rise of State-Sponsored Cyber Attacks
Phishing pages placed on hacked websites
Users of cybercrime forums often fall victim to info-stealers, researchers find
Prominent Threat Actor Accidentally Infects Own Computer with Info-Stealer
Notorious phishing platform shut down, arrests in international police operation
LinkedIn under attack, malicious hackers seize accounts
PowerHell: Active Flaws in PowerShell Gallery Expose Users to Attacks
Dark Web Profile: 8Base Ransomware
Raccoon Stealer Announce Return After Hiatus
'DoubleDrive' attack turns Microsoft OneDrive into ransomware
This $70 device can spoof an Apple device and trick you into sharing your password
Livraison de chars à l’Ukraine: des cyberpirates russes publient un document du Seco
Ransomware tracker: The latest figures [August 2023]
Faire de la cybersécurité une tâche régalienne
Meet NoEscape: Avaddon ransomware gang's likely successor
Stealth Mode: Chinese Cyber Espionage Actors Continue to Evolve Tactics to Avoid Detection | Mandiant
Mac systems turned into proxy exit nodes by AdLoad
An Apple Malware-Flagging Tool Is ‘Trivially’ Easy to Bypass
Want to pwn a satellite? Turns out it's surprisingly easy
New ‘Downfall’ Flaw Exposes Valuable Data in Generations of Intel Chips
Analysis: MOVEit hack spawned over 600 breaches but is not done yet -cyber analysts | Reuters
Biden-Harris Administration Launches Artificial Intelligence Cyber Challenge to Protect America’s Critical Software | The White House
Cyber-attack on UK's electoral registers revealed
5 arrested in Poland for running bulletproof hosting service for cybercrime gangs | Europol
Des hackers ont accédé aux données client d’une banque en ligne
Microsoft’s Role in Email Breach by Suspected Chinese Hackers Part of US Inquiry
“Please do not make it public”: Vulnerabilities in Sogou Keyboard encryption expose keypresses to network eavesdropping
Researchers watched 100 hours of hackers hacking honeypot computers
Interpol takes down 16shop phishing-as-a-service platform
Nearly every AMD CPU since 2017 vulnerable to Inception bug
Electoral Commission apologises for security breach involving UK voters’ data | Electoral Commission | The Guardian
Spyware maker LetMeSpy shuts down after hacker deletes server data
Don’t you (forget NLP): Prompt injection with control characters in ChatGPT
Midnight Blizzard conducts targeted social engineering over Microsoft Teams
Tenable CEO accuses Microsoft of negligence in addressing security flaw
CVE-2023-35082 - MobileIron Core Unauthenticated API Access Vulnerability | Rapid7 Blog
Guarding the Bridge: New Attack Vectors in Azure AD Connect
Reptile Malware Targeting Linux Systems
Russia-backed hackers used Microsoft Teams to breach government agencies | TechCrunch
Unpacking the Threats Within: The Hidden Dangers of .zip Domains
Into the tank with Nitrogen
Tomcat Under Attack: Exploring Mirai Malware and Beyond
Apple Crimeware | Massive Rust Infostealer Campaign Aiming for macOS Sonoma Ahead of Public Release
GameOverlay Vulnerability Impacts 40% of Ubuntu Workloads
TETRA Radio Code Encryption Has a Flaw: A Backdoor
Critical Infrastructure Companies Warned to Watch for Ongoing Cyberattack
Ivanti warns of second vulnerability used in attacks on Norway gov’t
U.S. Hunts Chinese Malware That Could Disrupt American Military Operations
Two privilege escalation flaws affect 40% of Ubuntu workloads in OverlayFS
Almost 40% of Ubuntu users vulnerable to new privilege elevation flaws
Cryptojacking: Understanding and defending against cloud compute resource abuse
Apple issues third mobile OS update after zero-click spyware campaign
DDoS threat report for 2023 Q2
Apple slams UK surveillance-bill proposals
Threat Actors Add .zip Domains to Their Phishing Arsenals
JumpCloud says 'nation state' gang hit some customers
CVE-2023-38408: Remote Code Execution in OpenSSH’s forwarded ssh-agent
[Security Update] Incident Details
WormGPT - The Generative AI Tool Cybercriminals Are Using to Launch BEC Attacks
Microsoft takes pains to obscure role in 0-days that caused email breach
Inside the subsea cable firm secretly helping American take on China
WormGPT: New AI Tool Allows Cybercriminals to Launch Sophisticated Cyber Attacks
WordPress plugin installed on 1 million+ sites logged plaintext passwords
AVrecon malware infects 70,000 Linux routers to build botnet
BlackLotus UEFI Bootkit Source Code Leaked on GitHub
Cybercriminalité : sept suspects identifiés pour du « phishing / hameçonnage »
Microsoft changes signing key system breached by Chinese hackers to steal US gov’t data
ShadowVault is the latest Mac data-stealer malware, reportedly
Uncovering weaknesses in Apple macOS and VMWare vCenter: 12 vulnerabilities in RPC implementation
Chinese hackers breached US government email accounts, Microsoft and White House say | CNN Politics
Chinese hackers breached U.S. and European government email through Microsoft bug
Les données de hooligans ayant sévi en Suisse publiées sur le darknet (update) | ICTjournal
The Spies Who Loved You: Infected USB Drives to Steal Secrets
Hackers exploit gaping Windows loophole to give their malware kernel access
Microsoft Revokes Malicious Drivers in Patch Tuesday Culling
Apple releases emergency update to fix zero-day exploited in attacks
Storm-0978 attacks reveal financial and espionage motives
HCA Healthcare patient data stolen and for sale by hackers
Six Malicious Python Packages in the PyPI Targeting Windows Users
It’s Raining Phish and Scams – How Cloudflare Pages.dev and Workers.dev Domains Get Abused | Trustwave
The five-day job: A BlackByte ransomware intrusion case study
Une entreprise genevoise au cœur d’une vaste opération d’influence des Emirats arabes unis
Unmasking the Meduza Stealer: Comprehensive Analysis & Countermeasures
Hacks targeting British exam boards raise fears of students cheating
Port of Nagoya cyberattack: Japanese port paralysed by LockBit
BlueNoroff | How DPRK’s macOS RustBucket Seeks to Evade Analysis and Detection -
Suspected key figure of notorious cybercrime group arrested in joint operation
Clop Ransomware: History, Timeline, And Adversary Simulation
BlackCat Operators Distributing Ransomware Disguised as WinSCP via Malvertising
Campagne MOVEit : Cl0p divulgue une grande quantité de données volées à Cegedim
Au mois de juin, la menace des infostealers n’a pas faibli
Following NoName057(16) DDoSia Project’s Targets
Chinese Threat Actors Targeting Europe in SmugX Campaign
Detecting Popular Cobalt Strike Malleable C2 Profile Techniques
Malvertising Used as Entry Vector for BlackCat Actors Also Leverage SpyBoy Terminator
Decrypted: Akira Ransomware
NCSC marks 20th anniversary of first response to state-sponsored cyber attack
TSMC Says Supplier Hacked After Ransomware Group Claims Attack on Chip Giant
A cause de la cyberattaque contre Xplain, des secrets d'Etat sont en ligne
Des données confidentielles sur des conseillers fédéraux volées lors de la cyberattaque
CVE-2023-27997 is Exploitable, and 69% of FortiGate…
TSMC confirms data breach after LockBit cyberattack on third-party supplier
Malware Execution Method Using DNS TXT Record
SEC notifies SolarWinds CISO and CFO of possible action in cyber investigation
Tracing Ransomware Threat Actors Through Stylometric Analysis and Chat Log Examination
Akira Ransomware Extends Reach to Linux Platform
Swiss intelligence warns of fallout in cyberspace as West clamps down on spies
CHU de Rennes : un compte de prestataire détourné pour la cyberattaque
Microsoft Teams vulnerability allows attackers to deliver malware to employees
Dismantling encrypted criminal EncroChat communications leads to over 6 500 arrests and close to EUR 900 million seized
Pour la loi suisse, le piratage éthique peut être licite
VMware ESXi Zero-Day Used by Chinese Espionage Actor to Perform Privileged Guest Operations on Compromised Hypervisors
Siemens Energy confirms data breach after MOVEit data-theft attack
LetMeSpy, a phone tracking app spying on thousands, says it was hacked
Process Mockingjay: Echoing RWX In Userland To Achieve Code Execution
PindOS: New JavaScript Dropper Delivering Bumblebee and IcedID
PyPI Attackers Still At It: Malicious Packages Drop Trojans and Info-stealers
Emerging Threat! Exposing JOKERSPY
IoT Under Siege: The Anatomy of the Latest Mirai Campaign Leveraging Multiple IoT Exploits
Dissecting TriangleDB, a Triangulation spyware implant
Condi DDoS Botnet Spreads via TP-Link's CVE-2023-1389
BlueDelta Exploits Ukrainian Government Roundcube Mail Servers to Support Espionage Activities | Recorded Future
ASUS urges customers to patch critical router vulnerabilities
KeePassXC Vulnerability CVE-2023-35866 allows attackers to change the master password and second-factor authentication settings
Anonymous Sudan: Who are the hackers behind Microsoft’s cloud outages?
Le piratage de la société Xplain, une véritable bombe à retardement pour la Suisse
XSS Vulnerabilities in Azure Led to Unauthorized Access to User Sessions - SecurityWeek
Des données personnelles aussi touchées lors de la cyberattaque contre la Confédération - rts.ch - Suisse
Piratage: la Suisse est très mauvaise élève de la cybersécurité
Hijacking S3 Buckets: New Attack Technique
Microsoft says early June disruptions to Outlook, cloud platform, were cyberattacks
A simple bug exposed access to thousands of smart security alarm systems
Cyberattaques massives contre la Suisse, huit questions pour analyser une semaine folle
A Shady Chinese Firm’s Encryption Chips Got Inside NATO and NASA
Barracuda ESG Zero-Day Vulnerability (CVE-2023-2868) Exploited Globally by Aggressive and Skilled Actor, Suspected Links to China
Suspected LockBit ransomware affiliate arrested, charged in US
Fake Security Researcher GitHub Repositories Deliver Malicious Implant
Déferlante d’attaques DDoS en Suisse revendiquées par des hacktivistes pro-russes
Ransomware gang lists first victims of MOVEit mass-hacks, including US banks and universities | TechCrunch
Microsoft Encrypted Restricted Permission Messages Deliver Phishing | Trustwave
Ce qui se cache derrière les cyberattaques pro-russes contre la Suisse
Cadet Blizzard emerges as a novel and distinct Russian threat actor | Microsoft Security Blog
The Phantom Menace: Brute Ratel remains rare and targeted
Switzerland under cyberattack
Microsoft June 2023 Patch Tuesday fixes 78 flaws, 38 RCE bugs
Analysis of CVE-2023-27997 and Clarifications on Volt Typhoon Campaign
Xortigate, or CVE-2023-27997 - The Rumoured RCE That Was
CVE-2023-34362
How North Korea’s Hacker Army Stole $3 Billion in Crypto, Funding Nuclear Program
Shell Recharge security lapse exposed EV drivers’ data
Les CFF et le canton d'Argovie aussi concernés par la cyberattaque qui a touché la société Xplain
MOVEit Transfer and MOVEit Cloud Vulnerability
Turkish Citizens' Personal Data Offered Online After Govt Site Hacked
Pro-Ukraine hackers bring Russian banking system to its knees
La commune vaudoise de Bex touchée par une cyberattaque
Another huge US medical data breach confirmed after Fortra mass-hack
Clop Ransomware Likely Sitting on MOVEit Transfer Vulnerability (CVE-2023-34362) Since 2021
Analysis of CVE-2023-29336 Win32k Privilege Escalation
Unmasking the Darkrace Ransomware Gang
Le site web du parlement suisse attaqué par des hackers
CVE-2023-34362: MOVEit Transfer SQL Injection Vulnerability Threat Brief
ChatGPT creates mutating malware that evades detection by EDR
Mass exploitation of critical MOVEit flaw is ransacking orgs big and small | Ars Technica
Trustwave Action Response: Zero Day Exploitation of MOVEit (CVE-2023-34362)
How malicious extensions hide running arbitrary code
Hackers steal Swiss police and customs data
Russian Radio Stations Hacked, Fake Putin Message Announcing Invasion of Russia Broadcast
MOVEit hack: BBC, BA and Boots among cyber attack victims
New Magecart-Style Campaign Abusing Legitimate Websites to Attack Others | Akamai
Rapid7 Observed Exploitation of Critical MOVEit Transfer Vulnerability
Enzo Biochem Ransomware Attack Exposes Information of 2.5M Individuals - SecurityWeek
New macOS vulnerability, Migraine, could bypass System Integrity Protection | Microsoft Security Blog
‘Gravity Forms’ WordPress Plugin Found Vulnerable to PHP Object Injection
Zero-Day Vulnerability in MOVEit Transfer Exploited for Data Theft
“Clickless” iOS exploits infect Kaspersky iPhones with never-before-seen malware | Ars Technica
A Matter of Triangulation.
Zero Day Initiative — CVE-2023-24941: Microsoft Network File System Remote Code Execution
Millions of Gigabyte Motherboards Were Sold With a Firmware Backdoor | WIRED
EDR bypassing via memory manipulation techniques | WithSecure™ Labs
New hacking forum leaks data of 478,000 RaidForums members
Hauts-de-Seine : les petits pirates informatiques avaient rançonné le pôle Leonard de Vinci
The professionalization of cyber crime
ABB provides details about IT security incident
Tesla Files: Un vol de données met Tesla dans l'embarras
Vulnerability in GCP CloudSQL Leads to Data Exposure
Here’s how long it takes new BrutePrint attack to unlock 10 different smartphones
Mercenary mayhem: A technical analysis of Intellexa's PREDATOR spyware
Inner workings revealed for “Predator,” the Android malware that exploited 5 0-days
Old Wine in the New Bottle: Mirai Variant Targets Multiple IoT Devices
NHS data breach: trusts shared patient details with Facebook without consent | Health | The Guardian
Armenia spyware victims: Pegasus hacking in war
COSMICENERGY: New OT Malware Possibly Related To Russian Emergency Response Exercises | Mandiant
Barracuda email security appliances hacked via zero-day vulnerability (CVE-2023-2868) - Help Net Security
Chinese Cyberespionage Group BRONZE SILHOUETTE Targets U.S. Government and Defense Organizations
Free VPN Service SuperVPN Exposes 360 Million User Records
Wordfence Firewall Blocks Bizarre Large-Scale XSS Campaign
Barracuda identified a vulnerability (CVE-2023-2868) in our Email Security Gateway appliance (ESG) on May 19, 2023.
Volt Typhoon targets US critical infrastructure with living-off-the-land techniques
Malvertising via brand impersonation is back again
German arms company Rheinmetall confirms Black Basta ransomware group behind cyberattack
IT employee impersonates ransomware gang to extort employer
Apple fixes three new zero-days exploited to hack iPhones, Macs
Don't @ Me: URL Obfuscation Through Schema Abuse
BlackCat Ransomware Deploys New Signed Kernel Driver
Up to 100 cases taken over HSE cyberattack, judge told
Beijing Bans Micron as Supplier to Big Chinese Firms, Citing National Security
Popular Android TV boxes sold on Amazon are laced with malware
Lemon Group’s Cybercriminal Businesses Built on Preinfected Devices
Visualizing QakBot Infrastructure
“FleeceGPT” mobile apps target AI-curious to rake in cash
KeePass flaw allows retrieval of master password, PoC is public (CVE-2023-32784)
GitHub - vdohney/keepass-password-dumper
Discord discloses data breach after support agent got hacked
SIM Swapping and Abuse of the Microsoft Azure Serial Console: Serial Is Part of a Well Balanced Attack
Piratage et médias suisses, la justice entre en action
Malicious VSCode extensions with more than 45K downloads steal PII and enable backdoors - Check Point Blog
Review and analysis of fake Trezor cryptowallet
FBI confirms access to Breached cybercrime forum database
Securonix Threat Labs Security Advisory: Latest Update: Ongoing MEME#4CHAN Attack/Phishing Campaign uses Meme-Filled Code to Drop XWorm Payloads
WordPress Plugin Vulnerability Exposed Ferrari Website to Hackers
Hackers offer personal information of 500,000 Israeli students for sale
Ex-ByteDance Executive Accuses TikTok Parent Company of ‘Lawlessness’
How an Indiana hospital fought to recover from a cyberattack
The Race to Patch: Attackers Leverage Sample Exploit Code in Wordpress Plugin | Akamai
Toyota: Car location data of 2 million customers exposed for ten years
«Cloud souverain»: les cantons latins avancent groupés et font un appel du pied à la Confédération
Multinational tech firm ABB hit by Black Basta ransomware attack
White Phoenix: Beating Intermittent Encryption
Critical Privilege Escalation in Essential Addons for Elementor Plugin Affecting 1+ Million Sites
Uncovering RedStinger - Undetected APT cyber operations in Eastern Europe since 2020
Akira Ransomware is “bringin’ 1988 back”
infosec company owned completely by 4chan user
Ghost in the network
Cybersecurity Firm Breach Exposes Tobacco Giant Philip Morris
Tennessee, Georgia colleges respond to cyberattacks as school year wraps up
New phishing-as-a-service tool “Greatness” already seen in the wild
Leak of Intel Boot Guard Keys Could Have Security Repercussions for Years
Deconstructing a Cybersecurity Event
Global Surveillance: The Secretive Swiss Dealer Enabling Israeli Spy Firms - National Security & Cyber
Justice Department Announces Court-Authorized Disruption of the Snake Malware Network Controlled by Russia's Federal Security Service
How macOS now tracks the provenance of apps
Microsoft May 2023 Patch Tuesday
Apple Fails to Fully Reboot iOS Simulator Copyright Case
oss-sec: [CVE-2023-32233] Linux kernel use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary reads and writes in kernel memory
‘PlugwalkJoe’ pleads guilty for the massive 2020 Twitter hack - The Verge
The Team of Sleuths Quietly Hunting Cyberattack-for-Hire Services
On the trail of the Dark Avenger: the most dangerous virus writer in the world
WordPress Advanced Custom Fields Pro plugin <= 6.1.5 - Reflected Cross Site Scripting (XSS) vulnerability
Dump these Cisco phone adapters because it's not fixing them
MSI Breach Leaks Intel BootGuard & OEM Image Signing Keys, Compromises Security of Over 200 Devices & Major Vendors
OpenAI’s regulatory troubles are just beginning
Who Gets the Algorithm? The Bigger TikTok Danger
Can Better Training Reduce the Success Rate of Phishing Attacks?
From Campus Rape Cases to Child Abuse Reports, ‘Worst-Case’ Data Breach Rocks MN Schools
The malware threat landscape: NodeStealer, DuckTail, and more
Atomic Stealer | Threat Actor Spawns Second Variant of macOS Malware Sold on Telegram
Passkeys: What they are and how to use them
Apple et Google s’accordent sur un cahier des charges industriel pour lutter contre le pistage
Bad Actors Are Joining the AI Revolution: Here’s What We’ve Found in the Wild
AI-Powered 'BlackMamba' Keylogging Attack Evades Modern EDR Security
SolarWinds: The Untold Story of the Boldest Supply-Chain Hack
What is a Rapid Security Response (RSR)
BouldSpy: Android Spyware Tied to Iranian Police Targets Minorities
Apple uses iOS and macOS Rapid Security Response feature for the first time
FIN7 tradecraft seen in attacks against Veeam backup servers
Investigating ChatGPT phishing detection capabilities
AI Chatbots Have Been Used to Create Dozens of News Content Farms
LockBit and Cl0p ransomware gangs actively exploiting Papercut vulnerabilities
Magecart threat actor rolls out convincing modal forms
Hackers Leaked Minneapolis Students' Psychological Reports, Allegations of Abuse
RTM Locker Ransomware as a Service (RaaS) Now on Linux - Uptycs
Never Connect to RDP Servers Over Untrusted Networks
Mirai Botnet Attackers Exploit TP-Link Router Bug
Attackers Use Containers for Profit via TrafficStealer
Cyble — Threat Actor Selling New Atomic macOS (AMOS) Stealer on Telegram
VMware Patches Critical Vulnerability Disclosed at Pwn2Own Hacking Contest
Smartphones With Popular Qualcomm Chip Secretly Share Private Information With US Chip-Maker
Meet the hacker armies on Ukraine's cyber front line
Analysis of Pre-Auth RCE in Sophos Web Appliance (CVE-2023-1671)
Software Maker 3CX Was Compromised in First-of-its-Kind Threaded Supply-Chain Hack
X_Trader Supply Chain Attack Affects Critical Infrastructure Organizations in U.S. and Europe
Retour d'experience du Centre Hospitalier de Cahors
'RustBucket' malware targets macOS
Linux malware strengthens links between Lazarus and the 3CX supply‑chain attack
3CX Software Supply Chain Compromise Initiated by a Prior Software Supply Chain Compromise; Suspected North Korean Actor Responsible
Threat Actors Rapidly Adopt Web3 IPFS Technology
‘AuKill’ EDR killer malware abuses Process Explorer driver
Black Basta claims it's selling off stolen Capita data
in2al5d p3in4er is Almost Completely Undetectable
LockBit for Mac | How Real is the Risk of macOS Ransomware?
Apple’s high security mode blocked NSO spyware, researchers say | TechCrunch
Summary of the Investigation Related to CVE-2023-0669
Triple Threat: NSO Group’s Pegasus Spyware Returns in 2022 with a Trio of iOS 15 and iOS 16 Zero-Click Exploit Chains
QBot banker delivered through business correspondence
CVE-2023-21554: MSMQ
Analyzing an arm64 mach-O version of LockBit
Linux kernel logic allowed Spectre attack on major cloud
Google Chrome emergency update fixes first zero-day of 2023
The (Not so) Secret War on Discord
A Computer Generated Swatting Service Is Causing Havoc Across America
Espionage campaign linked to Russian intelligence services
New hacker advocacy group seeks to protect work of security researchers
Vice Society: A Tale of Victim Data Exfiltration via PowerShell, aka Stealing off the Land
Hackers claim vast access to Western Digital systems
En Suisse comme en France, la vidéosurveillance progresse à une vitesse fulgurante
Discord member details how documents leaked from closed chat group
Nokoyawa ransomware attacks with Windows zero-day
Microsoft’s April 2023 Patch Tuesday Addresses 97 CVEs (CVE-2023-28252)
DEV-0196: QuaDream’s “KingsPawn” malware used to target civil society in Europe, North America, the Middle East, and Southeast Asia
Sweet QuaDreams: A First Look at Spyware Vendor QuaDream’s Exploits, Victims, and Customers - The Citizen Lab
Mercenary spyware hacked iPhone victims with rogue calendar invites, researchers say | TechCrunch
Balada Injector: Synopsis of a Massive Ongoing WordPress Malware Campaign
Data-leak flaw in Qualcomm, HiSilicon-based Wi-Fi AP chips
MERCURY and DEV-1084: Destructive attack on hybrid environment - Microsoft Security Blog
Cyble — Demystifying Money Message Ransomware
Leaked Pentagon Document Claims Russian Hacktivists Breached Canadian Gas Pipeline Company
From Discord to 4chan: The Improbable Journey of a US Intelligence Leak - bellingcat
MSI Confirms Breach as Ransomware Gang Claims Responsibility
L'Anssi pourra bloquer les noms de domaine liés à des cyberattaques
Samsung Fab Workers Leak Confidential Data While Using ChatGPT
Cyble — New Cylance Ransomware with Power-Packed CommandLine Options
ALPHV Ransomware Affiliate Targets Vulnerable Backup Installations to Gain Initial Access
Special Report: Tesla workers shared sensitive images recorded by customer cars | Reuters
Apple fixes two zero-days exploited to hack iPhones and Macs
Stopping cybercriminals from abusing security tools
Resecurity uncovers STYX, new cybercriminal platform focused on financial fraud - Help Net Security
Mac Malware MacStealer Spreads as Fake P2E Apps
Troy Hunt: Seized Genesis Market Data is Now Searchable in Have I Been Pwned, Courtesy of the FBI and "Operation Cookie Monster"
Chinese fraudsters: evading detection and monetizing stolen credit card information
Who Broke NPM?: Malicious Packages Flood Leading to Denial of Service
National Cyber Force reveals how daily cyber operations protect the UK
Winter Vivern | Uncovering a Wave of Global Espionage
Rorschach – A New Sophisticated and Fast Ransomware
3CX Desktop App Compromised (CVE-2023-29059)
Android app from China executed 0-day exploit on millions of devices | Ars Technica
Cyble — Cl0p Ransomware: Active Threat Plaguing Businesses Worldwide
Western Digital discloses network breach, My Cloud service down
New Money Message ransomware demands million dollar ransoms
Pinduoduo: One of China's most popular apps has the ability to spy on its users, say experts
Meet the FSB contractor: 0Day Technologies
Qakbot mechanizes distribution of malicious OneNote notebooks
Information on Attacks Involving 3CX Desktop App
Creal: New Stealer Targeting Cryptocurrency Users Via Phishing Sites
Privacy, a chi tocca proteggere gli studenti?
Exploitation is a Dish Best Served Cold: Winter Vivern Uses Known Zimbra Vulnerability to Target Webmail Portals of NATO-Aligned Governments in Europe
Spyware vendors use 0-days and n-days against popular platforms
‘Vulkan files’ leak reveals Putin’s global and domestic cyberwarfare tactics
3CX VoIP Software Compromise & Supply Chain Threats
Ironing out (the macOS details) of a Smooth Operator
3CX: Supply Chain Attack Affects Thousands of Users Worldwide
Hackers compromise 3CX desktop app in a supply chain attack
3CX users under DLL-sideloading attack: What you need to know
New OpcJacker Malware Distributed via Fake VPN Malvertising
The criminal use of ChatGPT – a cautionary tale about large language models
Guidance for investigating attacks using CVE-2023-23397
France bans all recreational apps from government devices
MacStealer: New macOS-based Stealer Malware Identified
NCA infiltrates cyber crime market with disguised DDoS sites
Throttling and Blocking Email from Persistently Vulnerable Exchange Servers to Exchange Online - Microsoft Community Hub
La NZZ victime d'un ransomware
Shining Light on Dark Power: Yet Another Ransomware Gang
Raiffeisen, Cler, BCGE... Des données bancaires exposées sur le web, à l'insu des clients
OK, it’s time to freak out about AI
New victims come forward after mass-ransomware attack
Emotet resumes spam operations, switches to OneNote
Patch Tuesday -> Exploit Wednesday: Pwning Windows Ancillary Function Driver for WinSock (afd.sys) in 24 Hours
Journalist opens USB letter bomb in newsroom
Session Cookies, Keychains, SSH Keys and More | 7 Kinds of Data Malware Steals from macOS Users
Reversing Emotet Dropping Javascript
Ferrari Hacked - Attackers Compromised The Ferrari IT Systems
Move, Patch, Get Out the Way: 2022 Zero-Day Exploitation Continues at an Elevated Pace
BlackMamba ChatGPT Polymorphic Malware | A Case of Scareware or a Wake-up Call for Cyber Security?
A Fake Project Related to the Sandbox Malspam
Wave of Arrests Hits Cybercriminals
Pixel Markup vulnerability allows screenshots to be un-redacted
Les trackers GPS et Bluetooth, des petites balises dont il faut se méfier
Google says hackers could silently own your phone until Samsung fixes its modems
Everything We Know About CVE-2023-23397
Fortinet Zero-Day and Custom Malware Used by Suspected Chinese Actor in Espionage Operation
BatLoader Continues to Abuse Google Search Ads to Deliver…
Microsoft patches zero-days used by state-sponsored and ransomware threat actors (CVE-2023-23397, CVE-2023-24880)
Ransomware Attacks Have Entered a ‘Heinous’ New Phase
Microsoft’s March 2023 Patch Tuesday Addresses 76 CVEs (CVE-2023-23397)
Ransomware Group Claims Hack of Amazon's Ring
Prometei botnet improves modules and exhibits new capabilities in recent updates
Rogue CyberSecurity Company Employee Tried To Sell Powerful, Stolen iPhone Malware For $50-Million
GoBruteforcer: Golang-Based Botnet Actively Harvests Web Servers
Czech cybersecurity office labels TikTok a security threat
Ransomware gang posts video of data stolen from Minneapolis schools
Medusa ransomware gang picks up steam as it targets companies worldwide
Telehealth startup Cerebral shared millions of patients' data with advertisers
Netcat Attack Cases Targeting MS-SQL Servers (LOLBins)
SCARLETEEL: Operation leveraging Terraform, Kubernetes, and AWS for data theft
Alerte sur des tentatives de piratage de comptes bancaires en Suisse
Gang leaks Lehigh Valley Health Network cancer patient photos as part of data hack
New HiatusRAT router malware covertly spies on victims - Lumen
A Noteworthy Threat: How Cybercriminals are Abusing OneNote
CVE-2023-27532
Acer Breached, Hacker Selling Access to 160GB of Stolen Data
Meta’s LLaMA Leaked to the Public, Thanks To 4chan
PoC exploit for recently patched Microsoft Word RCE is public (CVE-2023-21716)
Germany and Ukraine hit two high-value ransomware targets
We Found 28,000 Apps Sending Data to TikTok. A Ban Won't Help.
PyPi Packages Deliver Python Remote Access Tools
Credit Suisse breach spills info of high-net-worth clients
Biden National Cyber Strategy Seeks to Hold Software Firms Liable for Insecurity
FACT SHEET: Biden-Harris Administration Announces National Cybersecurity Strategy
How cybercriminals attack young gamers
BlackLotus UEFI bootkit: Myth confirmed
West ill-prepared to deal with evolving cyber threats, report concludes
Hunting for Honkbox | Multistage macOS Cryptominer May Still Be Hiding
Lumma Stealer targets YouTubers via Spear-phishing Email | by S2W | S2W BLOG | Feb, 2023 | Medium
Intrusion dans les systèmes d'information de la Ville de Lille : le point sur la situation
U.S. Marshals Service hack compromises sensitive info
Danish parliament urges to remove TikTok over cybersecurity
LastPass breach update: The few additional bits of information
Canada bans TikTok on government devices
Hard-to-spot Mac crypto-mining threat, XMRig, hits Pirate Bay
PureCrypter targets government entities through Discord - Blog | Menlo Security
Stanford University discloses data breach affecting PhD applicants
Technical Advisory: Various Threat Actors Targeting ManageEngine Exploit CVE-2022-47966
TA569: SocGholish and Beyond
EXFILTRATOR-22 - An Emerging Post-Exploitation Framework
Cryptomonnaie: arrestation de deux Français suspectés d’avoir piraté la plateforme Platypus
OneNote Embedded file abuse
Suspect in major data theft case linked to Dutch-subsidized cybersecurity org
A year after Russia's invasion, the scope of cyberwar in Ukraine comes into focus
Beware of macOS cryptojacking malware.
Valve bans 40,000 Dota 2 cheaters through ‘honeypot’ patch
"Fobo" Trojan distributed as ChatGPT client for Windows
The Growing Threat of ChatGPT-Based Phishing Attacks
Google Delivers Record-Breaking $12M in Bug Bounties
Activision's Data Breach Contains Employee Information, Call of Duty and More, Report
Fortinet FortiNAC CVE-2022-39952 Deep-Dive and IOCs
Sensitive US military emails spill online
Hackers Start Selling Data Center Logins for Some of World’s Largest Corporations
The Gravediggers: How Eliminalia, a Spanish reputation management firm, buries the truth
Fog of war: how the Ukraine conflict transformed the cyber threat landscape
Magecart Attack Disguised as Google Tag Manager | Akamai
Ransomware pushes City of Oakland into state of emergency
German airport websites downed by DDoS attacks
FBI says it has 'contained' cyber incident on bureau's computer network
Clop ransomware claims it breached 130 orgs using GoAnywhere zero-day
Escroquerie aux SMS de l'Assurance maladie : les suspects volaient les numéros de téléphone depuis leur voiture
GoDaddy: Hackers stole source code, installed malware in multi-year breach
Hacker Uncovers How to Turn Traffic Lights Green With Flipper Zero
Microsoft February 2023 Patch Tuesday
Cisco warns of critical flaw in ClamAV antivirus
Hyundai and Kia issue software upgrades to thwart theft hack
Ethical hackers can now legally hack Belgian companies
The Israelis Destabilizing Democracy and Disrupting Elections Worldwide - National Security & Cyber - Haaretz
Ces hackers israéliens qui ont piraté les élections en Afrique
How undercover reporters caught ‘Team Jorge’ disinformation operatives on camera
Havoc Across the Cyberspace
IoC detection experiments with ChatGPT
Bogus URL Shorteners Redirect Thousands of Hacked Sites in AdSense Fraud Campaign
New MortalKombat ransomware and Laplas Clipper malware threats deployed in financially motivated campaign
Cloudflare mitigates record-breaking 71 million request-per-second DDoS attack
Apple sued for promising privacy, failing at it
Iran marks revolution anniversary, hackers interrupt state TV coverage
Uncle Sow: Dark Caracal in Latin America
Killnet Threat to Health and Public Sectors
Investigating Intrusions From Intriguing Exploits
Incendie OVH : une première décision de condamnation
Xiaomi, OnePlus, Top Android Phones in China Spy on You: Study
UK cracks down on ransomware actors
HTML Smuggling: The Hidden Threat in Your Inbox
Enigma Stealer Targets Cryptocurrency Industry with Fake Jobs
2023 Crypto Crime Trends: Illicit Cryptocurrency Volumes Reach All-Time Highs Amid Surge in Sanctions Designations and Hacking
Bitwarden password vaults targeted in Google ads phishing attack
OpenSSL fixes High Severity data-stealing bug – patch now!
Russia-linked Lockbit ransomware hacking gang threatens to publish Royal Mail data stolen in cyber attack
Sliver Malware With BYOVD Distributed Through Sunlogin Vulnerability Exploitations - ASEC BLOG
Iran responsible for Charlie Hebdo attacks
Cyberattaque contre l’Université de Zurich: des accès aux serveurs vendus sur le darkweb (update)
Onenote Malware: Classification and Personal Notes
Detecting OneNote Abuse
No Macro? No Worries. VSTO Being Weaponized by Threat Actors
Cybercrime: Les hackers avaient aussi sévi en Suisse
Massive ESXiArgs ransomware attack targets VMware ESXi servers worldwide
Ransomware : des centaines de serveurs VMware ESXi pris dans une vaste campagne
Un ransomware attaque les clients ESXi des hébergeurs français (MAJ)
Exploitation of GoAnywhere MFT zero-day vulnerability
Ransomware Roundup – Trigona Ransomware
.NET Virtualization Thrives in Malvertising Attacks
No Pineapple! –DPRK Targeting of Medical Research and Technology Sector
Following the Scent of TrickGate: 6-Year-Old Packer Used to Deploy the Most Wanted Malware
OneNote Documents Increasingly Used to Deliver Malware
Qakbot's Evolution Continues with New Strategies
HeadCrab: A Novel State-of-the-Art Redis Malware in a Global Campaign
Hospitals urged to tighten DDoS defenses after health data found on Killnet list
Pro-Russian DDoS attacks raise alarm in Denmark, U.S.
Google sponsored ads malvertising targets password manager
Action needed for GitHub Desktop and Atom users
‘InTheBox’ Web Injects Targeting Android Banking Applications Worldwide
Analyzing and remediating a malware infested T95 TV box from Amazon
Welcome to Goot Camp: Tracking the Evolution of GOOTLOADER Operations
IT specialists search and recruitment on the dark web
Exploring Killnet's Social Circles
A Major App Flaw Exposed the Data of Millions of Indian Students
Chinese PlugX Malware Hidden in Your USB Devices?
An unfaithful employee leaked Yandex source code repositoriesSecurity Affairs
Cybercriminals stung as HIVE infrastructure shut down
The Titan Stealer: Notorious Telegram Malware Campaign
Realtek SDK Vulnerability Attacks Highlight IoT Supply Chain Threats
La vidéosurveillance de l’armée présente des failles de sécurité
Suisse: Caméras de surveillance de l’armée jugées trop vulnérables
Apple patches are out – old iPhones get an old zero-day fix at last!
Following the LNK metadata trail
Threat groups are using Windows LNK files to gain access
Bitzlato: senior management arrested
how to completely own an airline in 3 easy steps
U.S. ‘No Fly List’ Leaks After Being Left in an Unsecured Airline Server
Hostile Takeover: Kraken Hacks Rival Darknet Market Solaris
Darth Vidar: The Dark Side of Evolving Threat Infrastructure
Risky Biz News: Crypto-crime volumes went down in 2022, ransomware payments too
New GTA Online exploit now allows cheaters to ban your account
Breaking Down the SEO Poisoning Attack | How Attackers Are Hijacking Search Results
Technical Advisory – Multiple Vulnerabilities in the Galaxy App Store (CVE-2023-21433, CVE-2023-21434)
Des hackers détournent des sites de l’UE pour voler des infos bancaires
PayPal Notifies 35,000 Users of Data Breach
ManageEngine CVE-2022-47966 Technical Deep Dive
T-Mobile hacked to steal data of 37 million accounts in API data breach
Hackers push malware via Google search ads for VLC, 7-Zip, CCleaner
DNS changer in malicious mobile app used by Roaming Mantis
Batloader Malware Abuses Legitimate Tools Uses Obfuscated JavaScript Files in Q4 2022 Attacks
Apple launches major security updates around the world
Mailchimp says it was hacked — again
Russian founder of a cryptocurrency exchange known for funneling ransomware profits arrested
Assessing Potential Exploitation of Sophos Firewall and CVE-2022-3236
Can you rely on macOS Ventura for malware protection?
7 Ways Threat Actors Deliver macOS Malware in the Enterprise
InfoSec Handlers Diary Blog - SANS Internet Storm Center
Google Ads Malware Wipes NFT Influencer's Crypto Wallet
Supply Chain Attack Using Identical PyPI Packages, “colorslib”, “httpslib”, and “libhttps”
Vice Society ransomware leaks University of Duisburg-Essen’s data
NortonLifeLock warns that hackers breached Password Manager accounts
Défense : les interrogations de l’état-major français face aux opérations cyber américaines en Europe
Sustaining Digital Certificate Security - TrustCor Certificate Distrust
Compromise of employee device, credentials led to CircleCI breach
A Police App Exposed Secret Details About Raids and Suspects | WIRED
Pro-Russia hackers use Telegram, GitHub to attack Czech presidential election
Royal Mail ransomware attackers threaten to publish stolen data
NoName057(16) - The Pro-Russian Hacktivist Group Targeting NATO
StrongPity espionage campaign targeting Android users
Misconfigured PostgreSQL Used to Target Kubernetes Clusters
Raspberry Robin's botnet second life
Nouvelles règles: Boom des enregistrements de pilotes de drone en Suisse
New Paper on Old Threema Protocol
Armed With ChatGPT, Cybercriminals Build Malware And Plot Fake Girl Bots
Schools hit by cyber attack and documents leaked
Twitter leak: 200m+ account database now free to download
Cyberattack shutters the Guardian's office for a month
CircleCI warns of security breach — rotate your secrets!
Jenkins discloses dozens of zero-day bugs in multiple plugins
Web Hackers vs. The Auto Industry: Critical Vulnerabilities in Ferrari, BMW, Rolls Royce, Porsche, and More
How do you know when macOS detects and remediates malware?
Data of over 200 million Deezer users stolen, leaks on hacking forum
Shc Linux Malware Installing CoinMiner
Ukraine Has Digitized Its Fighting Forces on a Shoestring
Ransomware gang gives decryptor to Toronto’s SickKids Hospital