Cyberveille
curated by Decio
Nuage de tags
Mur d'images
Quotidien
Rechercher
Flux RSS
Flux RSS
Daily Feed
Weekly Feed
Monthly Feed
tags
search
CyberAv3ngers: The Iranian Saboteurs Hacking Water and Gas Systems Worldwide
SuperCard X: exposing a Chinese-speaker MaaS for NFC Relay fraud operation
Threat actors misuse Node.js to deliver malware and other malicious payloads | Microsoft Security Blog
A miner and the ClipBanker Trojan being distributed via SourceForge | Securelist
Outlaw Linux Malware: Persistent, Unsophisticated, and Surprisingly Effective — Elastic Security Labs
Tomcat in the Crosshairs: New Research Reveals Ongoing Attacks
Hidden Malware Strikes Again: Mu-Plugins Under Attack
Phishing campaign impersonates Booking .com, delivers a suite of credential-stealing malware
WordPress ClickFix Malware Causes Google Warnings and Infected Computers
Microsoft spots XCSSET macOS malware variant used for crypto theft
Hidden Backdoors Uncovered in WordPress Malware Investigation
PirateFi game on Steam caught installing password-stealing malware
Unpacking the BADBOX Botnet with Censys
SparkCat crypto stealer in Google Play and App Store
macOS FlexibleFerret | Further Variants of DPRK Malware Family Unearthed
10,000 WordPress Websites Found Delivering MacOS and Windows Malware
New TorNet backdoor seen in widespread campaign
2024 macOS Malware Review | Infostealers, Backdoors, and APT Campaigns Targeting the Enterprise
How GhostGPT Empowers Cybercriminals with Uncensored AI | Abnormal
Hundreds of fake Reddit sites push Lumma Stealer malware
IoT Botnet Linked to Large-scale DDoS Attacks Since the End of 2024
Over 5,000 WordPress sites caught in WP3.XYZ malware attack
Cracking the Code: How Banshee Stealer Targets macOS Users
Inside FireScam : An Information Stealer with Spyware Capabilities
Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit
Malicious ads push Lumma infostealer via fake CAPTCHA pages
Supply Chain Attack on Rspack npm Packages Injects Cryptojac...
Moonlock's 2024 macOS threat report
Unidentified Threat Actor Utilizes Android Malware to Target High-Value Assets in South Asia
Malicious Ads in Search Results Are Driving New Generations of Scams | WIRED
PHP Reinfector and Backdoor Malware Target WordPress Sites
China-Nexus TAG-112 Compromises Tibetan Websites to Distribute Cobalt Strike
FrostyGoop’s Zoom-In: A Closer Look into the Malware Artifacts, Behaviors and Network Communications
North Korean hackers employ new tactics to compromise crypto-related businesses - Help Net Security
BlueNoroff Hidden Risk | Threat Actor Targets Macs with Fake Crypto News and Novel Persistence
Inside Sophos' 5-Year War With the Chinese Hackers Hijacking Its Devices
FASTCash for Linux
Gamers Tricked Into Downloading Lua-Based Malware via Fake Cheating Script Engines
Ukrainian pleads guilty to operating Raccoon Stealer malware
perfctl: A Stealthy Malware Targeting Millions of Linux Servers
Behind the CAPTCHA: A Clever Gateway of Malware
Global infostealer malware operation targets crypto users, gamers
New macOS malware HZ RAT lets attackers control Macs remotely
Clever 'GitHub Scanner' campaign abusing repos to push malware
Hadooken Malware Targets Weblogic Applications
Fake OnlyFans Checker Tool Infects Hackers with Lummac Stealer Malware
The Malware That Must Not Be Named: Suspected Espionage Campaign Delivers “Voldemort”
Spoofed GlobalProtect Used to Deliver Unique WikiLoader Variant
Fake Palo Alto GlobalProtect used as lure to backdoor enterprises
HZ Rat backdoor for macOS harvests data from WeChat and DingTalk
WordPress Websites Used to Distribute ClearFake Trojan Malware
Unveiling sedexp: A Stealthy Linux Malware Exploiting udev Rules
TodoSwift Disguises Malware Download Behind Bitcoin PDF
NGate Android malware relays NFC traffic to steal cash
Gafgyt Malware Variant Exploits GPU Power and Cloud Native Environments
Extension Trojan Malware Campaign
A Dive into Earth Baku’s Latest Campaign
Ransomware gang targets IT workers with new SharpRhino malware
Black Basta ransomware switches to more evasive custom malware
Cyber Espionage Group XDSpy Targets Companies in Russia and Moldova
Social Media Malvertising Campaign Promotes Fake AI Editor Website for Credential Theft
Google ads push fake Google Authenticator site installing malware
Intelligence Brief: Impact of FrostyGoop Modbus Malware on Connected OT Systems
NullBulge | Threat Actor Masquerades as Hacktivist Group Rebelling Against AI
ClickFix Deception: A Social Engineering Tactic to Deploy Malware
CloudSorcerer APT uses cloud services and GitHub as C2 | Securelist
EDR as an Offensive Tool
Cisco warns of NX-OS zero-day exploited to deploy custom malware
Polyfill, Cloudflare trade barbs after reports of supply chain attack threatening 100k websites
New Medusa malware variants target Android users in seven countries
South Korean telecom company attacks torrent users with malware — over 600,000 customers report missing files, strange folders, and disabled PCs
XZ backdoor behavior inside OpenSSH
Rafel RAT, Android Malware from Espionage to Ransomware Operations
PikaBot: a Guide to its Deep Secrets and Operations - Sekoia.io Blog
macOS version of elusive 'LightSpy' spyware tool discovered
How ransomware abuses BitLocker | Securelist
Russian hackers use new Lunar malware to breach a European govt's agencies
Log4j Exploited by XMRig Cryptominer Malware: Analysis & Mitigation
An Infostealer's Brewin': Cuckoo & AtomicStealer Get Creative
Eight Arms to Hold You: The Cuttlefish Malware
Nearly 20% of Docker Hub Repositories Spread Malware & Phishing Scams
Leaked LockBit builder in a real-life incident response case | Securelist
Kaspersky analysis of the backdoor in XZ
Distinctive Campaign Evolution of Pikabot Malware
Threat Actors Deliver Malware via YouTube Video Game Cracks
AceCryptor malware has surged in Europe, researchers say
DarkGate Opens Organizations for Attack via Skype, Teams
European Parliament finds spyware on defense committee members’ phones
Poland's PM says authorities in the previous government widely and illegally used Pegasus spyware | AP News
Hackers exploit Ivanti SSRF flaw to deploy new DSLog backdoor
New RustDoor macOS malware impersonates Visual Studio update
Chinese hackers infect Dutch armed forces network with malware
DarkGate malware delivered via Microsoft Teams - detection and response
Evolution of UNC4990: Uncovering USB Malware's Hidden Depths
New Go-based Malware Loader Discovered I Arctic Wolf
Malicious PyPI Packages Slip WhiteSnake InfoStealer Malware onto Windows Machines
Info Stealing Packages Hidden in PyPI
A backdoor with a cryptowallet stealer inside cracked macOS software
Balada Injector Infects Over 7,100 WordPress Sites Using Plugin Vulnerability
Jamf Threat Labs Discovers Pirated macOS Apps Similar to ZuRu Malware
MacOS info-stealers quickly evolve to evade XProtect detection
iShutdown scripts can help detect iOS spyware on your iPhone
Analyzing DPRK's SpectralBlur
Objective-See's Blog
Steam game mod breached to push password-stealing malware
Microsoft disables MSIX protocol handler abused in malware attacks
Operation Triangulation: The last (hardware) mystery
Hackers Exploiting MS Excel Vulnerability to Spread Agent Tesla Malware
Qakbot's Back, But Don't Y'all Panic: A Southern Tech Talk
Web injections are back on the rise: 40+ banks affected by new malware campaign
Rhadamanthys v0.5.0 - a deep dive into the stealer’s components
QNAP VioStor NVR vulnerability actively exploited by malware botnet
Ukraine’s intelligence claims cyberattack on Russia’s state tax service
Russian Hacker Vladimir Dunaev Pleads Guilty for Creating TrickBot Malware
Analysis of a new macOS Trojan-Proxy
N. Korean Hackers 'Mixing' macOS Malware Tactics to Evade Detection
Hacking Employers and Seeking Employment: Two Job-Related Campaigns Bear Hallmarks of North Korean Threat Actors
Lumma Stealer malware now uses trigonometry to evade detection
A Closer Look at ChatGPT's Role in Automated Malware Creation
Jamf Threat Labs Discovers Malware from BlueNoroff
Elastic catches DPRK passing out KANDYKORN — Elastic Security Labs
FakeUpdateRU Chrome Update Infection Spreads Trojan Malware
Triangulation: validators, post-compromise activity and modules | Securelist
Battling a new DarkGate malware campaign with Malwarebytes MDR
Android TV Boxes Infected with Backdoors, Compromising Home Networks
Trojanized Free Download Manager found to contain a Linux backdoor
Hackers modify open-source ‘SapphireStealer’ malware, leading to multiple variants
Qakbot botnet dismantled after infecting over 700,000 computers
Malicious Batch File (*.bat) Disguised as a Document Viewer Being Distributed (Kimsuky)
U.S. Hunts Chinese Malware That Could Disrupt American Military Operations
AVrecon malware infects 70,000 Linux routers to build botnet
ShadowVault is the latest Mac data-stealer malware, reportedly
The Spies Who Loved You: Infected USB Drives to Steal Secrets
Malvertising Used as Entry Vector for BlackCat Actors Also Leverage SpyBoy Terminator
Malware Execution Method Using DNS TXT Record
Microsoft Teams vulnerability allows attackers to deliver malware to employees
PyPI Attackers Still At It: Malicious Packages Drop Trojans and Info-stealers
Dissecting TriangleDB, a Triangulation spyware implant
Fake Security Researcher GitHub Repositories Deliver Malicious Implant
GobRAT malware written in Go language targeting Linux routers
Millions of Gigabyte Motherboards Were Sold With a Firmware Backdoor | WIRED
COSMICENERGY: New OT Malware Possibly Related To Russian Emergency Response Exercises | Mandiant
Popular Android TV boxes sold on Amazon are laced with malware
Lemon Group’s Cybercriminal Businesses Built on Preinfected Devices
Justice Department Announces Court-Authorized Disruption of the Snake Malware Network Controlled by Russia's Federal Security Service
Snake: Coming soon in Mac OS X flavour – Fox-IT International blog
The malware threat landscape: NodeStealer, DuckTail, and more
Atomic Stealer | Threat Actor Spawns Second Variant of macOS Malware Sold on Telegram
'RustBucket' malware targets macOS
Apple’s high security mode blocked NSO spyware, researchers say | TechCrunch
QBot banker delivered through business correspondence
The (Not so) Secret War on Discord
Mac Malware MacStealer Spreads as Fake P2E Apps
New OpcJacker Malware Distributed via Fake VPN Malvertising
BlackMamba ChatGPT Polymorphic Malware | A Case of Scareware or a Wake-up Call for Cyber Security?
Fortinet Zero-Day and Custom Malware Used by Suspected Chinese Actor in Espionage Operation
Ransomware Attacks Have Entered a ‘Heinous’ New Phase
Iron Tiger’s SysUpdate Reappears, Adds Linux Targeting
Hard-to-spot Mac crypto-mining threat, XMRig, hits Pirate Bay
Beware of macOS cryptojacking malware.
New MortalKombat ransomware and Laplas Clipper malware threats deployed in financially motivated campaign
HTML Smuggling: The Hidden Threat in Your Inbox
Enigma Stealer Targets Cryptocurrency Industry with Fake Jobs
Onenote Malware: Classification and Personal Notes
OneNote Documents Increasingly Used to Deliver Malware
HeadCrab: A Novel State-of-the-Art Redis Malware in a Global Campaign
Google sponsored ads malvertising targets password manager
Analyzing and remediating a malware infested T95 TV box from Amazon
IT specialists search and recruitment on the dark web
Breaking Down the SEO Poisoning Attack | How Attackers Are Hijacking Search Results
Batloader Malware Abuses Legitimate Tools Uses Obfuscated JavaScript Files in Q4 2022 Attacks
Can you rely on macOS Ventura for malware protection?
7 Ways Threat Actors Deliver macOS Malware in the Enterprise
InfoSec Handlers Diary Blog - SANS Internet Storm Center
Google Ads Exploited to Spread Malware
Accidentally Crashing a Botnet
Misconfigured PostgreSQL Used to Target Kubernetes Clusters
Raspberry Robin's botnet second life
How do you know when macOS detects and remediates malware?
Shc Linux Malware Installing CoinMiner
The Mac Malware of 2022 👾
New YouTube Bot Malware Spotted Stealing User’s Sensitive Information
Pure coder offers multiple malware for sale in Darkweb forums
ZetaNile: Open source software trojans from North Korea
New RisePro Stealer distributed by the prominent PrivateLoader
Shlayer malware abusing Gatekeeper bypass on macOS
L’art de l’évasion How Shlayer hides its configuration inside Apple proprietary DMG files
Raspberry Robin Malware Targets Telecom, Governments
Stolen certificates in two waves of ransomware and wiper attacks
GoTrim: Go-based Botnet Actively Brute Forces WordPress Websites
Scammers Are Scamming Other Scammers Out of Millions of Dollars
Pilfered Keys Free App Infected by Malware Steals Keychain Data
Mustang Panda Uses the Russian-Ukrainian War to Attack Europe and Asia Pacific Targets
Top 10 macOS Malware Discoveries in 2022
Samsung, LG, Mediatek certificates compromised to sign Android malware
Aurora: a rising stealer flying under the radar
Massive ois[.]is Black Hat Redirect Malware Campaign
Threat Spotlight: Cyber Criminal Adoption of IPFS for Phishing, Malware Campaigns
The Case of Cloud9 Chrome Botnet
Crime group hijacks hundreds of US news websites to push malware
Malware on the Google Play store leads to harmful phishing sites
From RM3 to LDR4: URSNIF Leaves Banking Fraud Behind
Cyble Phishing ERMAC Android Malware Increasingly Active
Black Basta Ransomware Gang Infiltrates networks via QAKBOT, Brute Ratel, and Cobalt Strike
POLONIUM targets Israel with Creepy malware
MSSQL, meet Maggie. A novel backdoor for Microsoft SQL…
Bumblebee: increasing its capacity and evolving its TTPs
Bad VIB(E)s Part One: Investigating Novel Malware Persistence Within ESXi Hypervisors | Mandiant
Lazarus hackers abuse Dell driver bug using new FudModule rootkit
Mystery Hackers Are ‘Hyperjacking’ Targets for Insidious Spying
Chaos is a Go-based Swiss army knife of malware
NullMixer drops Redline Stealer, SmokeLoader and other malware | Securelist
New Malware Campaign Targets Zoom Users
Lampion Trojan Utilizes New Delivery through Cloud-Based Sharing
Shikitega - New stealthy malware targeting Linux
PyPI Phishing Campaign | JuiceLedger Threat Actor Pivots From Fake Apps to Supply Chain Attacks
North Korean hackers use signed macOS malware to target IT job seekers
Last Week on My Mac: Is your Mac still secure from malware?
Raccoon Stealer v2: The Latest Generation of the Raccoon Family
Microsoft links Raspberry Robin malware to Evil Corp attacks
LockBit Ransomware Group Augments Its Latest Variant, LockBit 3.0, With BlackMatter Capabilities
Russia Released a Ukrainian App for Hacking Russia That Was Actually Malware
Joker, Facestealer and Coper banking malwares on Google Play store
Il malware EnvyScout (APT29) è stato veicolato anche in Italia
Microsoft finds Raspberry Robin worm in hundreds of Windows networks
Flubot: the evolution of a notorious Android Banking Malware
The SessionManager IIS backdoor: a possibly overlooked GELSEMIUM artefact
Conti vs. LockBit: A Comparative Analysis of Ransomware Groups
There Is More Than One Way to Sleep: Dive Deep Into the Implementations of API Hammering by Various Malware Families
BRATA is evolving into an Advanced Persistent Threat
Police Linked to Hacking Campaign to Frame Indian Activists
Linux Threat Hunting: 'Syslogk' a kernel rootkit found under development in the wild
Symbiote: A New, Nearly-Impossible-to-Detect Linux Threat
SVCReady: A New Loader Gets Ready
Android FluBot enters Switzerland – SWITCH Security-Blog
XLoader Botnet: Find Me If You Can
Gimmick MacOS Malware Spreads Through Customized Files, Enables MacOS CodeSign Bypass - CloudSEK
Rise in XorDdos: A deeper look at the stealthy DDoS malware targeting Linux devices - Microsoft Security Blog
Researchers devise iPhone malware that runs even when device is turned off
A closer look at Eternity Malware
When coin miners evolve, Part 1: Exposing LemonDuck and LemonCat, modern mining malware infrastructure
Russia’s Sandworm hackers attempted a third blackout in Ukraine
Storm Cloud on the Horizon: GIMMICK Malware Strikes at macOS
Raccoon Stealer: “Trash panda” abuses Telegram
China-backed APT41 compromised ‘at least’ six US state governments
Malware now using stolen NVIDIA code signing certificates
Phishing attacks target countries aiding Ukrainian refugees
Face à un incident de cybersécurité, Nvidia soupçonné d'avoir répliqué - ZDNet
Nvidia Confirms Company Data Was Stolen in Hack
Attacchi informatici, c'è un nuovo malware di uno dei più importanti gruppi di cybercriminali russi
TrickBot malware operation shuts down, devs move to BazarBackdoor
HermeticWiper | New Destructive Malware Used In Cyber Attacks on Ukraine
Chrome Zero-Day Under Active Attack: Patch ASAP | Threatpost
New Emotet Infection Method
Linux-Targeted Malware Increases by 35% in 2021
Minaccia Malware prende di mira il settore dell'aviazione e dell'industria aerospaziale
PrivateLoader to Anubis Loader. By: Jason Reaves and Joshua Platt
PrivateLoader: The first step in many malware schemes
Watering hole deploys new macOS malware, DazzleSpy, in Asia
SysJoker : un malware pour macOS, Windows et Linux qui opère discrètement depuis des mois
New SysJoker Backdoor Targets Windows, Linux, and macOS
SysJoker analyzing the first (macOS) malware of 2022!