Cyberveille
curated by Decio
Nuage de tags
Mur d'images
Quotidien
Rechercher
Flux RSS
Flux RSS
Daily Feed
Weekly Feed
Monthly Feed
tags
search
Microsoft Dynamics 365 Customer Voice Phishing Scam
The State of Ransomware in the First Quarter of 2025: Record-Breaking 126% Spike in Public Extortion Cases
VanHelsing, new RaaS in Town
Banshee: The Stealer That "Stole Code" From MacOS XProtect
Cracking the Code: How Banshee Stealer Targets macOS Users
FunkSec – Alleged Top Ransomware Group Powered by AI
Google Calendar Notifications Bypassing Email Security Policies
Gaming Engines: An Undetected Playground for Malware Loaders
CopyRh(ight)adamantys Campaign: Rhadamantys Exploits Intellectual Property Infringement Baits
Unmasking Styx Stealer: How a Hacker's Slip Led to an Intelligence Treasure Trove - Check Point Research
Stargazers Ghost Network
Resurrecting Internet Explorer: Threat Actors Using Zero-day Tricks in Internet Shortcut File to Lure Victims (CVE-2024-38112)
Rafel RAT, Android Malware from Espionage to Ransomware Operations
Check Point - Wrong Check Point (CVE-2024-24919)
Foxit PDF “Flawed Design” Exploitation
Magnet Goblin Targets Publicly Facing Servers Using 1-Day Vulnerabilities
The Risks of the #MonikerLink Bug in Microsoft Outlook and the Big Picture
Rhadamanthys v0.5.0 - a deep dive into the stealer’s components
Into the Trash: Analyzing LitterDrifter
Chinese Threat Actors Targeting Europe in SmugX Campaign
Malicious VSCode extensions with more than 45K downloads steal PII and enable backdoors - Check Point Blog
Rorschach – A New Sophisticated and Fast Ransomware
Following the Scent of TrickGate: 6-Year-Old Packer Used to Deploy the Most Wanted Malware
Check Point Research analyzes files on the Dark Web and finds millions of records available
Pulling the Curtains on Azov Ransomware: Not a Skidsware but Polymorphic Wiper - Check Point Research
Bumblebee: increasing its capacity and evolving its TTPs
XLoader Botnet: Find Me If You Can
New Malware Capable of Controlling Social Media Accounts Infects 5,000+ Machines and is actively being Distributed via Gaming Applications on Microsoft's Official Store
Can You Trust a File’s Digital Signature? New Zloader Campaign exploits Microsoft’s Signature Verification putting users at risk