Cyberveille
curated by Decio
Nuage de tags
Mur d'images
Quotidien
Rechercher
Flux RSS
Flux RSS
Daily Feed
Weekly Feed
Monthly Feed
tags
search
The Fall of LabHost: Law Enforcement Shuts Down Phishing Service Provider | Trend Micro (US)
DDoS threat report for 2024 Q1
State of WordPress Security In 2024
APT29 Uses WINELOADER to Target German Political Parties | Mandiant
Earth Krahang Exploits Intergovernmental Trust to Launch Cross-Government Attacks | Trend Micro (US)
Jamf says 9% of smartphone have fallen for phishing attacks
CVE-2024-21412: Water Hydra Targets Traders with Microsoft Defender SmartScreen Zero-Day
KV-Botnet: Don’t call it a Comeback - Lumen
Ransomware Hit $1 Billion in 2023
Qualys TRU Discovers Important Vulnerabilities in GNU C Library’s syslog()
FBI: Play ransomware gang has attacked 300 orgs since 2022
AlphV’s bid to report its victim to the SEC could backfire
From ScreenConnect to Hive Ransomware in 61 hours
Time keeps on slippin’ slippin’ slippin’: The 2023 Active Adversary Report for Tech Leaders – Sophos News
Cryptojacking: Understanding and defending against cloud compute resource abuse
DDoS threat report for 2023 Q2
The five-day job: A BlackByte ransomware intrusion case study
Malvertising Used as Entry Vector for BlackCat Actors Also Leverage SpyBoy Terminator
Attackers Use Containers for Profit via TrafficStealer
Vice Society: A Tale of Victim Data Exfiltration via PowerShell, aka Stealing off the Land
Mac Malware MacStealer Spreads as Fake P2E Apps
Creal: New Stealer Targeting Cryptocurrency Users Via Phishing Sites
West ill-prepared to deal with evolving cyber threats, report concludes
OneNote Embedded file abuse
Activision's Data Breach Contains Employee Information, Call of Duty and More, Report
Fog of war: how the Ukraine conflict transformed the cyber threat landscape
Killnet Threat to Health and Public Sectors
2023 Crypto Crime Trends: Illicit Cryptocurrency Volumes Reach All-Time Highs Amid Surge in Sanctions Designations and Hacking
No Pineapple! –DPRK Targeting of Medical Research and Technology Sector
Cost of data breaches to surpass US$5mn per incident in 2023
Nokia warns 5G security ‘breaches are the rule, not the exception’
Nation-state cyberattacks become more brazen as authoritarian leaders ramp up aggression
Amazon‑themed campaigns of Lazarus in the Netherlands and Belgium
Likely Iranian Threat Actor Conducts Politically Motivated Disruptive Activity Against Albanian Government Organizations
THREAT ANALYSIS REPORT: Bumblebee Loader – The High Road to Enterprise Domain Control
Europe’s PegasusGate: Countering spyware abuse
THREAT ALERT: Raspberry Robin Worm Abuses Windows Installer and QNAP Devices
Il malware EnvyScout (APT29) è stato veicolato anche in Italia
Cybersecurity experts question Microsoft's Ukraine report
Facing reality? Law enforcement and the challenge of deepfakes
Defending Ukraine: Early Lessons from the Cyber War
Fronton: A Botnet for Creation, Command, and Control of Coordinated Inauthentic Behavior
Kaspersky DDoS report, Q1 2022
Aquarium Leaks. Inside the GRU’s Psychological Warfare Program
SysJoker analyzing the first (macOS) malware of 2022!
Google Online Security Blog: Vulnerability Reward Program: 2021 Year in Review