Cyberveille
curated by Decio
Nuage de tags
Mur d'images
Quotidien
Rechercher
Flux RSS
Flux RSS
Daily Feed
Weekly Feed
Monthly Feed
tags
search
Hackers now testing ClickFix attacks against Linux targets
Threat Brief: CVE-2025-31324
Attacco hacker a Roma Tre, siti dell'Università inaccessibili. «Tutto il settore tecnico impegnato per il ripristino»
[CVE-2025-37752] Two Bytes Of Madness: Pwning The Linux Kernel With A 0x0000 Written 262636 Bytes Out-Of-Bounds
RATatouille: A Malicious Recipe Hidden in rand-user-agent (Supply Chain Compromise)
UK pioneering global move away from passwords
Schneier warns that AI loses integrity due to corporate bias
Malicious PyPI Package Targets Discord Developers with Remot...
DOGE software engineer’s computer infected by info-stealing malware - Ars Technica
Microsoft Dynamics 365 Customer Voice Phishing Scam
Multiple vulnerabilities in SonicWall SMA 100 series (FIXED)
On Lockbit's plaintext passwords
NSO Group must pay more than $167 million in damages to WhatsApp for spyware campaign | TechCrunch
LockBit ransomware gang hacked, victim negotiations exposed
DDoS-for-hire empire brought down: Poland arrests 4 administrators, US seizes 9 domains | Europol
Police takes down six DDoS-for-hire services, arrests admins
Betrugsmasche mit gefälschten Postquittungen
Evil Deno: Abusing the Nicest JavaScript Runtime: Taggart Tech
Sharp rise in reported cyber incidents in Switzerland
Signal clone used by Trump official stops operations after report it was hacked
wget to Wipeout: Malicious Go Modules Fetch Destructive Payload
Linux wiper malware hidden in malicious Go modules on GitHub
CVE-2024-7399
Security Researchers Warn a Widely Used Open Source Tool Poses a 'Persistent' Risk to the US
DragonForce Ransomware Gang | From Hacktivists to High Street Extortionists
Backdoor found in popular ecommerce components
Exposing Darcula: a rare look behind the scenes of a global Phishing-as-a-Service operation
I StealC You: Tracking the Rapid Changes To StealC
macOS Vulnerabilities: A Year of Security Research at Kandji
The Signal Clone the Trump Admin Uses Was Hacked
MCP Prompt Injection: Not Just For Evil
Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today's Adversaries | SentinelOne
Russie – Attribution de cyberattaques contre la France au service de renseignement militaire russe (APT28) (29.04.25) - Ministère de l’Europe et des Affaires étrangères
Eight countries launch Operational Taskforce to tackle violence-as-a-service
Hitachi Vantara takes servers offline after Akira ransomware attack
NCSC statement: Incident impacting retailers
Ransomware attacks on food and agriculture industry have doubled in 2025 | The Record from Recorded Future News
SonicBoom, From Stolen Tokens to Remote Shells - SonicWall SMA (CVE-2023-44221, CVE-2024-38475)
Harrods is latest retailer to be hit by cyber-attack | Harrods | The Guardian
Active Subscription Scam Campaigns Flooding the Internet
Ledger scammers are sending letters to steal seed phrases
Grafana security update: no customer impact from GitHub workflow vulnerability
Using Trusted Protocols Against You: Gmail as a C2 Mechanism...
Windows RDP lets you log in using revoked passwords. Microsoft is OK with that.
TheWizards APT group uses SLAAC spoofing to perform adversary-in-the-middle attacks
Some M&S stores left with empty shelves after cyber attack
Hello 0-Days, My Old Friend: A 2024 Zero-Day Exploitation Analysis
Introducing ToyMaker, an initial access broker working in cahoots with double extortion gangs
Navigating Through The Fog
Did 5G kill the IMSI catcher?
Despite Recent Security Hardening, Entra ID Synchronization Feature Remains Open for Abuse
European Parliament’s Iran delegation chair victim of Tehran-linked hacking
British firms urged to hold video or in-person interviews amid North Korea job scam | Technology | The Guardian
CyberAv3ngers: The Iranian Saboteurs Hacking Water and Gas Systems Worldwide
2025 Q1 Trends in Vulnerability Exploitation | Blog | VulnCheck
Proton66 Part 1: Mass Scanning and Exploit Campaigns
A Chinese AI video startup appears to be blocking politically sensitive images | TechCrunch
M&S stops online orders and issues refunds after cyber attack
Russian Infrastructure Plays Crucial Role in North Korean Cybercrime Operations | Trend Micro (US)
Fake GIF Leveraged in Multi-Stage Reverse-Proxy Card Skimming Attack
SAP fixes suspected Netweaver zero-day exploited in attacks
Largest telecom in Africa warns of cyber incident exposing customer data | The Record from Recorded Future News
How to steal the internet
StarCraft 2 Hackers Forcing Players To Watch Shooting Videos
ReliaQuest Uncovers Potential New Vulnerability in SAP NetWeaver
M-Trends 2025: Data, Insights, and Recommendations From the Frontlines
UK bans export of video game controllers to Russia to hinder attack drone pilots
Fire In The Hole, We’re Breaching The Vault - Commvault Remote Code Execution (CVE-2025-34028)
9X Surge in Ivanti Connect Secure Scanning Activity
JFrog Detects Malicious PyPi package Stealing Crypto Tokens
International investigation disrupts phishing-as-a-service platform LabHost
Emerging Phishing Techniques: New Threats and Attack Vectors
DslogdRAT Malware Installed in Ivanti Connect Secure
The State of Ransomware in the First Quarter of 2025: Record-Breaking 126% Spike in Public Extortion Cases
Cookie-Bite: How Your Digital Crumbs Let Threat Actors Bypass MFA and Maintain Access to Cloud Environments
Incident update: Mitigating a DDoS attack on April 21, 2025
XRP supply chain attack: Official NPM package infected with crypto stealing backdoor
Thousands of Baltimore students, teachers affected by data breach following February ransomware attack
Cisco Webex bug lets hackers gain code execution via meeting links
Phishing for Codes: Russian Threat Actors Target Microsoft 365 OAuth Workflows
Google Spoofed Via DKIM Replay Attack
Phishers abuse Google OAuth to spoof Google in DKIM replay attack
Widespread Microsoft Entra lockouts tied to new security feature rollout
SuperCard X: exposing a Chinese-speaker MaaS for NFC Relay fraud operation
npm Malware Targets Telegram Bot Developers with Persistent SSH Backdoors
Silicon Valley crosswalk buttons hacked to imitate Musk, Zuckerberg's voices
Is Ivanti the problem or a symptom of a systemic issue with network devices?
Threat actors misuse Node.js to deliver malware and other malicious payloads | Microsoft Security Blog
PasivRobber: Chinese Spyware or Security Tool?
The Ever-Evolving Threat of the Russian-Speaking Cybercriminal Underground | Trend Micro (US)
Cyberattaque sur le réseau informatique de l'UCBA - UCBA
MITRE warns that funding for critical CVE program expires today
China accuses NSA of launching cyberattacks on Asian Winter Games
"Rejoignez-nous" : ce que révèle le procès de deux agents de Wagner sur leur activité en Europe
SSL/TLS certificates will last 47 days max by 2029
Hack The Sandbox: Unveiling the Truth Behind Disappearing Artifacts - Researcher Blog - ITOCHU Cyber & Intelligence Inc.
Exploitation of CLFS zero-day leads to ransomware activity
Researcher uncovers dozens of sketchy Chrome extensions with 4 million installs - Ars Technica
Searching for something unknow
Darknet’s Xanthorox AI Offers Customizable Tools for Hacker
Gamaredon's Evolving Cyber Threats: A Closer Look
OCC Notifies Congress of Incident Involving Email System
Hackers breach Morocco's social security database in unprecedented cyberattack
China admitted its role in Volt Typhoon cyberattacks on U.S. infrastructure
Germany suspects Russian cyber attack on research group
Algerian hackers leak sensitive data from Morocco's CNSS and Ministry of Employment
The Rise of Slopsquatting: How AI Hallucinations Are Fueling a New Class of Supply Chain Attacks
OpenAI helps spammers plaster 80,000 sites with messages that bypassed filters
AkiraBot | AI-Powered Bot Bypasses CAPTCHAs, Spams Websites At Scale
CVE-2025-22457
Popular French retailers confirm hackers stole customer data
Inside Black Basta: Uncovering the Secrets of a Ransomware Powerhouse
A miner and the ClipBanker Trojan being distributed via SourceForge | Securelist
NCSC issues warning over Chinese Moonshine and BadBazaar spyware
Don't open that file in WhatsApp for Windows just yet
Anatomy of an LLM RCE
EncryptHub's dual life: Cybercriminal vs Windows bug-bounty researcher
Russia arrests CEO of tech company linked to Doppelgänger disinformation campaign
Carding tool abusing WooCommerce API downloaded 34K times on PyPI
Someone hacked ransomware gang Everest’s leak site
British Army and Royal Navy hit by cyberattacks from pro-Russian and pro-Palestinian hackers | The Standard
IngressNightmare | Critical Unauthenticated RCE Vulnerabilities in Kubernetes Ingress NGINX
Google Online Security Blog: Google announces Sec-Gemini v1, a new experimental cybersecurity model
One Time Pwnage: SEAL Releases Advisory On SLOVENLY COMET
Someone is trying to recruit security researchers in bizarre hacking campaign | TechCrunch
Surge in Palo Alto Networks Scanner Activity Indicates Possible Upcoming Threats
TTP - Apple Offers Apps With Ties to Chinese Military
Outlaw Linux Malware: Persistent, Unsophisticated, and Surprisingly Effective — Elastic Security Labs
Oracle privately confirms Cloud breach to customers
Global crackdown on Kidflix, a major child sexual exploitation platform with almost two million users | Europol
PhaaS actor uses DoH and DNS MX to dynamically distribute phishing
It takes two: The 2025 Sophos Active Adversary Report
Hacktivists Target France Over Diplomatic Moves
Russian Hacktivists Target Energy And Water Infrastructure
Tomcat in the Crosshairs: New Research Reveals Ongoing Attacks
Apple belatedly fixes exploited flaws in older OSes
Analyzing open-source bootloaders: Finding vulnerabilities faster with AI
From Contagious to ClickFake Interview: Lazarus leveraging the ClickFix tactic
CrushFTP Authentication Bypass - CVE-2025-2825
Fake Zoom Ends in BlackSuit Ransomware
ClickFix: Another Deceptive Social Engineering Technique
Pulling the Threads on the Phish of Troy Hunt
TCCing is Believing
Hidden Malware Strikes Again: Mu-Plugins Under Attack
Ransomware crews add EDR killers to their arsenal
Oracle Health breach compromises patient data at US hospitals
SAMLStorm: Critical Authentication Bypass in xml-crypto and Node.js libraries
Malware found on npm infecting local package with reverse shell
CVE-2025-29927: Next.js Middleware Authorization Bypass
Micropatches released for SCF File NTLM Hash Disclosure Vulnerability (0day)
GorillaBot: Technical Analysis and Code Similarities with Mirai
Troy Hunt: A Sneaky Phish Just Grabbed my Mailchimp Mailing List
VanHelsing, new RaaS in Town
Weaver Ant: Tracking a China-Nexus Cyber Espionage Operation
Chinese hackers spent four years inside Asian telco’s networks
VanHelsing Ransomware
Resurgence of In-The-Wild Activity Targeting Critical ServiceNow Vulnerabilities
Oracle denies breach after hacker claims theft of 6 million data records
Large enterprises scramble after supply-chain attack spills their secrets
How to find Next.js on your network
Next.js Middleware Exploit: Deep Dive into CVE-2025-29927 Authorization Bypass - ZeroPath Blog
Phishing campaign impersonates Booking .com, delivers a suite of credential-stealing malware
SSD Advisory - Linux kernel hfsplus slab-out-of-bounds Write - SSD Secure Disclosure
Exploit Attempts for Cisco Smart Licensing Utility CVE-2024-20439 and CVE-2024-20440
VSCode extensions found downloading early-stage ransomware
Critical Veeam Backup & Replication CVE-2025-23120
Virtue or Vice? A First Look at Proliferating Spyware Operations
Secure Annex - Enterprise Browser Extension Security & Management Platform
Over 16.8 Billion Records Exposed as Data Breaches Increase 6%
Cobalt Strike 4.11: Shhhhhh, Beacon is Sleeping....
Facial Recognition Injection Attacks - An Overview
Decrypting Encrypted files from Akira Ransomware (Linux/ESXI variant 2024) using a bunch of GPUs
Akira ransomware can be cracked with sixteen RTX 4090 GPUs in around ten hours — new counterattack breaks encryption | Tom's Hardware
Inside BRUTED: Black Basta (RaaS) Members Used Automated Brute Forcing Framework to Target Edge Network Devices
Les filiales Spar et les magasins TopCC ont été victimes d’une cyberattaque
ICANN moves to retire Soviet-era .SU country domain name - Domain Name Wire
Exclusive: Hackers claim cyber attack on Trump winery, golf courses
NIST Selects HQC as Fifth Algorithm for Post-Quantum Encryption
North Korean government hackers snuck spyware on Android app store | TechCrunch
Lookout Discovers North Korean APT37 Mobile Spyware | Threat Intel
DOGE axes CISA ‘red team’ staffers amid ongoing federal cuts | TechCrunch
Medusa Ransomware Activity Continues to Increase
GreyNoise Detects Mass Exploitation of Critical PHP-CGI Vulnerability (CVE-2024-4577)
Google paid $12 million in bug bounties last year to security researchers
Swiss critical sector faces new 24-hour cyberattack reporting rule
ENQUETE. "TrackingFiles" : comment la vie privée de militaires, de diplomates et du personnel politique français est exposée par les données de géolocalisation
Undocumented "backdoor" found in Bluetooth chip used by a billion devices
DPRK IT Fraud Network Uses GitHub to Target Global Companies
North Korean Fake IT Workers Leverage GitHub to Build Personas
Data breach at Japanese telecom giant NTT hits 18,000 companies
Thousands of websites hit by four backdoors in 3rd party JavaScript attack
Silk Typhoon targeting IT supply chain
District of Columbia | Chinese Nationals with Ties to the PRC Government and “APT27” Charged in a Computer Hacking Campaign for Profit, Targeting Numerous U.S. Companies, Institutions, and Municipalities | United States Department of Justice
Blog: Zen and the Art of Microcode Hacking
Cisco warns of Webex for BroadWorks flaw exposing credentials
New DDoS Botnet Discovered: Over 30,000 Hacked Devices, Majority of Observed Activity Traced to Iran
Des cybercriminels s'en prennent à Cistec, fournisseur suisse de système clinique | ICTjournal
360XSS: Mass Website Exploitation via Virtual Tour Framework for SEO Poisoning
Zapier says someone broke into its code repositories and may have accessed customer data
Spyzie stalkerware is spying on thousands of Android and iPhone users
Le plus grave incident de sécurité jamais connu par la Sûreté de l'État: "Des pirates informatiques chinois ont pu rentrer dans ce logiciel"
Cellebrite zero-day exploit used to target phone of Serbian student activist - Amnesty International Security Lab
Researchers uncover unknown Android flaws used to hack into a student's phone
Exclusive: Hegseth orders Cyber Command to stand down on Russia planning
Trump administration retreats in fight against Russian cyber threats
Ransomware : sur la piste trouble de l’un des leaders de Black Basta
Cellebrite suspends Serbia as customer after claims police used firm's tech to plant spyware | TechCrunch
Confluence Exploit Leads to LockBit Ransomware
Lumma Stealer Chronicles: PDF-themed Campaign Using Compromised Educational Institutions' Infrastructure
Researchers accuse North Korea of $1.4 billion Bybit crypto heist
An Update on Fake Updates: Two New Actors, and New Mac Malware
Xerox Versalink C7025 Multifunction Printer: Pass-Back Attack Vuln (Fixed) | Rapid7 Blog
WordPress ClickFix Malware Causes Google Warnings and Infected Computers
Beware: PayPal "New Address" feature abused to send phishing emails
Weathering the storm: In the midst of a Typhoon
Black Basta is latest ransomware group to be hit by leak of chat logs
CISA and FBI: Ghost ransomware breached orgs in 70 countries
UK healthcare giant HCRG confirms hack after ransomware gang claims theft of sensitive data
OpenSSH bugs threaten enterprise security, uptime
Threat Spotlight: Inside the World's Fastest Rising Ransomware Operator — BlackLock
Ecuador's legislature says hackers attempted to access confidential information
Microsoft spots XCSSET macOS malware variant used for crypto theft
CVE-2022-31631: High-Risk PHP Vulnerability Demands Immediate Patch
Network Security Issues in RedNote
Investigating Anonymous VPS services used by Ransomware Gangs
Hidden Backdoors Uncovered in WordPress Malware Investigation
Sweden’s PM on suspected cable sabotage: ‘We don’t believe random things suddenly happen quite often’
Storm-2372 conducts device code phishing campaign
PirateFi game on Steam caught installing password-stealing malware
Key figures behind Phobos and 8Base ransomware arrested in international cybercrime crackdown
Cyberattack disrupts Lee newspapers' operations across the US
Spyware maker caught distributing malicious Android apps for years | TechCrunch
An Italian journalist speaks about being targeted with Paragon spyware
CVE-2024-12356
Dutch police say they took down 127 servers used by sanctioned hosting service | The Record from Recorded Future News
Multiple Russian Threat Actors Targeting Microsoft Device Code Authentication
Cybercrime: A Multifaceted National Security Threat
New Exploitation Surge: Attackers Target ThinkPHP and ownCloud Flaws at Scale | GreyNoise Blog
Sky ECC encrypted service distributors arrested in Spain, Netherlands
New UK sanctions target Russian cybercrime network
Four alleged hackers arrested in Phuket for hacking 17 Swiss firms
8 Million Requests Later, We Made The SolarWinds Supply Chain Attack Look Amateur
Go Module Mirror served backdoor to devs for 3+ years - Ars Technica
Spain arrests suspected hacker of US and Spanish military agencies
British engineering firm IMI discloses breach, shares no details
Ransomware payments dropped 35% in 2024
Active Directory Domain Services Elevation of Privilege Vulnerability (CVE-2025-21293)
CVE-2025-0411: Ukrainian Organizations Targeted in Zero-Day Campaign and Homoglyph Attacks
U.S. Government Disclosed 39 Zero-Day Vulnerabilities in 2023, Per First-Ever Report
BSI analysis shows: Nextcloud server stored passwords in plain text | heise online
Arma Reforger And DayZ DDOS Attack Continues, Devs "Making Progress"
Kimsuky hackers use new custom RDP Wrapper for remote access
Deloitte to provide Rhode Island $5M for ransomware recovery
Code injection attacks using publicly disclosed ASP.NET machine keys
Critical Cisco ISE bug can let attackers run commands as root
Swissmem: vol de donnée par des hackers russes
Spyware maker Paragon terminates contract with Italian government: media reports | TechCrunch
Law enforcement hammered cybercrime in 2024. Is it…
Genève: un fournisseur de logiciels bancaires piraté | Tribune de Genève
Unpacking the BADBOX Botnet with Censys
Router maker Zyxel tells customers to replace vulnerable hardware exploited by hackers
Zyxel Telnet Vulnerabilities
SparkCat crypto stealer in Google Play and App Store
macOS FlexibleFerret | Further Variants of DPRK Malware Family Unearthed
Une cyberattaque paralyse Radio Top et Tele Top à Winterthour
How Switzerland is caught up in Russia’s propaganda machine
Recent Jailbreaks Demonstrate Emerging Threat to DeepSeek
Live Chat Blog #2: Cisco Webex Connect - Access to millions of chats histories
Exposed SMB: The Hidden Risk Behind ‘WantToCry’ Ransomware Attacks
Eradicating trivial vulnerabilities, at scale
DeepSeek’s Popular AI App Is Explicitly Sending US Data to China | WIRED
Tbilisi public transport hacked, playing pro-European messages
Tata Technologies says ransomware attack hit IT assets, investigation ongoing
X Phishing | Campaign Targeting High Profile Accounts Returns, Promoting Crypto Scams
Swiss tax authority forced to buy Bahamas domain name after URL typo
Active Exploitation of Zero-day Zyxel CPE Vulnerability (CVE-2024-40891)
Norway seizes ship suspected of sabotage, says crew are Russian nationals
10,000 WordPress Websites Found Delivering MacOS and Windows Malware
Wiz Research Uncovers Exposed DeepSeek Database Leaking Sensitive Information, Including Chat History | Wiz Blog
New TorNet backdoor seen in widespread campaign
After security breach at D-Trust: CCC speaks of "cyber window-dressing" | heise online
Salt Typhoon: An Analysis of Vulnerabilities Exploited by this State-Sponsored Actor
Updated: Frederick Health takes systems offline due to ransomware attack
Unmasking FleshStealer: A New Infostealer Threat in 2025
OpenAI launches ChatGPT Gov for U.S. government agencies
Apple fixes this year’s first actively exploited zero-day bug
Cobalt Strike and a Pair of SOCKS Lead to LockBit Ransomware
UnitedHealth updates number of data breach victims to 190 million
Mysterious backdoor found on select Juniper routers
48,000+ internet-facing Fortinet firewalls still open to attack
The J-Magic Show: Magic Packets and Where to find them - Lumen Blog
HellCat and Morpheus | Two Brands, One Payload as Ransomware Affiliates Drop Identical Code
2024 macOS Malware Review | Infostealers, Backdoors, and APT Campaigns Targeting the Enterprise
How A Large-Scale Russian Botnet Operation Stays Under the Radar
fasthttp Used in New Bruteforce Campaign
Targeted supply chain attack against Chrome browser extensions
Government and university websites targeted in ScriptAPI[.]dev client-side attack - c/side
Hundreds of fake Reddit sites push Lumma Stealer malware
Google launches customizable Web Store for Enterprise extensions
Malware Redirects WordPress Traffic to Harmful Sites
Analyse de la cybersécurité des systèmes d’information hospitaliers (SIH)
Swiss cities targeted by Russian hackers during WEF
Mass Campaign of Murdoc Botnet Mirai: A New Variant of Corona Mirai | Qualys Security Blog
Record-breaking 5.6 Tbps DDoS attack and global DDoS trends for 2024 Q4
Malicious extensions circumvent Google’s remote code ban
Researchers Accessed Windows BitLocker Encrypted Files Disassembling the Laptop
IoT Botnet Linked to Large-scale DDoS Attacks Since the End of 2024
Will the Real Volt Typhoon Please Stand Up?
Gootloader inside out
FBI Warns iPhone, Android, Windows Users—Do Not Install These Apps
RansomHub Affiliate leverages Python-based backdoor
The great Google Ads heist: criminals ransack advertiser accounts via fake Google ads | Malwarebytes
Banshee: The Stealer That "Stole Code" From MacOS XProtect
Europe readies ‘action plan’ to secure hospitals from crippling cyberattacks – POLITICO
Bolstering the cybersecurity of the healthcare sector
Passkeys: they're not perfect but they're getting better
Under the cloak of UEFI Secure Boot: Introducing CVE-2024-7344
sfewer-r7's assessment of CVE-2025-0282
Chinese hackers breached US government office that assesses foreign investments for national security risks
EU law enforcement training agency data breach: Data of 97,000 individuals compromised - Help Net Security
French submarine crew accidentally leak sensitive information through Strava app | Euronews
Ransomware roundup: 2024 end-of-year report - Comparitech
Après l’attaque par rançongiciel, la PME bretonne fait condamner ...
Gootloader inside out – Sophos News
Over 5,000 WordPress sites caught in WP3.XYZ malware attack
IntelBroker Unmasked: KELA’s In-Depth Analysis of a Cybercrime Leader
Luxembourg government websites knocked offline in latest cyberattack | Luxembourg Times
Telefonica Breach Exposes Jira Tickets, Customer Data
Victime d'une cyberattaque début décembre, VidyMed a restauré les données ciblées (update)
Cracking the Code: How Banshee Stealer Targets macOS Users
Ransomware abuses Amazon AWS feature to encrypt S3 buckets
UK domain giant Nominet confirms cybersecurity incident linked to Ivanti VPN hacks | TechCrunch
Scholastic Hack: Furry Finds 8 Million People Exposed
Industrial networking manufacturer Moxa reports 'critical' router bugs
Backdooring Your Backdoors - Another $20 Domain, More Governments
Inside FireScam : An Information Stealer with Spyware Capabilities
“Can you try a game I made?” Fake game sites lead to information stealers
Telegram hands over data on thousands of users to US law enforcement
Microsoft moves to disrupt hacking-as-a-service scheme that’s bypassing AI safety measures
Green Bay Packers' online store hacked to steal credit cards
UN aviation agency ‘investigating’ security breach after hacker claims theft of personal data
Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit
Hackers Claim Massive Breach of Location Data Giant, Threaten to Leak Data
Ivanti Connect Secure VPN Targeted in New Zero-Day Exploitation
CVE-2025-0282: Ivanti Connect Secure zero-day exploited in the wild | Rapid7 Blog
"Ils nous ont contactés via une messagerie cryptée pour obtenir une rançon" : cette cyberattaque rend la vie impossible aux éleveurs
Casio says hackers stole personal data of 8,500 people during October ransomware attack
PowerSchool hack exposes student, teacher data from K-12 districts
Hackers reportedly compromise Argentina’s airport security payroll system | The Record from Recorded Future News
Chinese hackers also breached Charter and Windstream networks
Rhode Island warns of cybercriminals leaking stolen state files as Deloitte works to restore system
US sanctions Chinese cyber firm linked to Flax Typhoon hacks | TechCrunch