Cyberveille
curated by Decio
Nuage de tags
Mur d'images
Quotidien
Rechercher
Flux RSS
Flux RSS
Daily Feed
Weekly Feed
Monthly Feed
tags
search
Fake GIF Leveraged in Multi-Stage Reverse-Proxy Card Skimming Attack
Incident update: Mitigating a DDoS attack on April 21, 2025
Google Spoofed Via DKIM Replay Attack
Xerox Versalink C7025 Multifunction Printer: Pass-Back Attack Vuln (Fixed) | Rapid7 Blog
Tata Technologies says ransomware attack hit IT assets, investigation ongoing
Targeted supply chain attack against Chrome browser extensions
Government and university websites targeted in ScriptAPI[.]dev client-side attack - c/side
Over 5,000 WordPress sites caught in WP3.XYZ malware attack
Energy industry contractor says ransomware attack has limited access to IT systems | The Record from Recorded Future News
Abnormal Security
New Windows Driver Signature bypass allows kernel rootkit installs
Cyble Honeypot Sensors Detect WordPress Plugin Attack, New Banking Trojan
Hacker plants false memories in ChatGPT to steal user data in perpetuity
Unprecedented 3.15 Billion Packet Rate DDoS Attack Mitigated by Global Secure Layer
DDoS attack volume rises, peak power reaches 1.7 Tbps
TuDoor
Lviv neighbourhood left without heating, hot water by hacker attack
South African pathology labs down after ransomware attack
New SnailLoad Attack Exploits Network Latency to Spy on Users' Web Activities
New attack uses MSC files and Windows XSS flaw to breach networks
Okta warns of "unprecedented" credential stuffing attacks on customers
Round 2: Change Healthcare Targeted in Second Ransomware Attack
A Vigilante Hacker Took Down North Korea’s Internet. Now He’s Taking Off His Mask
PyPI halted new users and projects while it fended off supply-chain attack
Thousands of servers hacked in ongoing attack targeting Ray AI framework
Managing Attack Surface | Huntress Blog
GitHub besieged by millions of malicious repositories in ongoing attack | Ars Technica
Midnight Blizzard: Guidance for responders on nation-state attack
Microsoft's Top Execs' Emails Breached in Sophisticated Russia-Linked APT Attack
Google Search Overwhelmed By Massive Spam Attack
SSH protects the world’s most sensitive networks. It just got a lot weaker
The Curious Case of Predatory Sparrow
New BLUFFS attack lets attackers hijack Bluetooth connections
Surge in QR Code Quishing: Check Point Records 587% Attack Spike
New GPU Side-Channel Attack Allows Malicious Websites to Steal Data
When MFA isn't actually MFA
Guarding the Bridge: New Attack Vectors in Azure AD Connect
The five-day job: A BlackByte ransomware intrusion case study
NCSC marks 20th anniversary of first response to state-sponsored cyber attack
Here’s how long it takes new BrutePrint attack to unlock 10 different smartphones
New victims come forward after mass-ransomware attack
No Pineapple! –DPRK Targeting of Medical Research and Technology Sector
NortonLifeLock warns that hackers breached Password Manager accounts
Schools hit by cyber attack and documents leaked
Guardian hit by serious IT incident believed to be ransomware attack
Phylum Discovers Dozens More PyPI Packages Attempting to Deliver W4SP Stealer in Ongoing Supply-Chain Attack
Melting the DNS Iceberg: Taking over your infrastructure Kaminsky style
Threat Alert: Private npm Packages Disclosed via Timing Attacks
Software Supply Chain Attackers; Organized, Persistent, and Operating for over a Year
Malicious OAuth applications abuse cloud email services to spread spam
Microsoft investigates Iranian attacks against the Albanian government
Stealing Clouds
Legitimate SaaS Platforms Being Used to Host Phishing Attacks
Comprehensive Threat Intelligence: Cisco Talos shares insights related to recent cyber attack on Cisco
A New Attack Can Unmask Anonymous Users on Any Major Browser
A new vulnerability in Intel and AMD CPUs lets hackers steal encryption keys
PyPI package 'ctx' and PHP library 'phpass' compromised to steal environment variables
npm Supply Chain Attack Targeting Germany-Based Companies
How the French fiber optic cable attacks accentuate critical infrastructure vulnerabilities
Toyota suspends domestic factory operations after suspected cyber attack
Cyberattack targets Vodafone Portugal, disrupts services
‘Zero-Click’ Hacks Are Growing in Popularity. There’s Practically No Way to Stop Them
Cyber-attack on ICRC: What we know
Google Docs Comment Exploit Allows for Distribution of Phishing and Malware