Cyberveille
curated by Decio
Nuage de tags
Mur d'images
Quotidien
Rechercher
Flux RSS
Flux RSS
Daily Feed
Weekly Feed
Monthly Feed
tags
search
Sharp rise in reported cyber incidents in Switzerland
Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today's Adversaries | SentinelOne
Hello 0-Days, My Old Friend: A 2024 Zero-Day Exploitation Analysis
SuperCard X: exposing a Chinese-speaker MaaS for NFC Relay fraud operation
It takes two: The 2025 Sophos Active Adversary Report
Over 16.8 Billion Records Exposed as Data Breaches Increase 6%
U.S. Government Disclosed 39 Zero-Day Vulnerabilities in 2023, Per First-Ever Report
IoT Botnet Linked to Large-scale DDoS Attacks Since the End of 2024
Ransomware roundup: 2024 end-of-year report - Comparitech
Moonlock's 2024 macOS threat report
The State of Cloud Ransomware in 2024
31 new ransomware groups were discovered in 2024
Tracking Ransomware - August 2024 - CYFIRMA
DDoS attack volume rises, peak power reaches 1.7 Tbps
Geopolitical Tensions Drive Explosion in DDoS Attacks
IBM: Cost of a breach reaches nearly $5 million, with healthcare being hit the hardest
Mid-year Doppelgänger information operations in Europe and the US
NVD Analysis Report
UNC5537 Targets Snowflake Customer Instances for Data Theft and Extortion
Molding lies into reality || Exploiting CVE-2024-4358
Cache Me If You Can: Local Privilege Escalation in Zscaler Client Connector (CVE-2023-41973)
The Fall of LabHost: Law Enforcement Shuts Down Phishing Service Provider | Trend Micro (US)
DDoS threat report for 2024 Q1
State of WordPress Security In 2024
APT29 Uses WINELOADER to Target German Political Parties | Mandiant
Earth Krahang Exploits Intergovernmental Trust to Launch Cross-Government Attacks | Trend Micro (US)
Jamf says 9% of smartphone have fallen for phishing attacks
CVE-2024-21412: Water Hydra Targets Traders with Microsoft Defender SmartScreen Zero-Day
KV-Botnet: Don’t call it a Comeback - Lumen
Ransomware Hit $1 Billion in 2023
Qualys TRU Discovers Important Vulnerabilities in GNU C Library’s syslog()
FBI: Play ransomware gang has attacked 300 orgs since 2022
AlphV’s bid to report its victim to the SEC could backfire
From ScreenConnect to Hive Ransomware in 61 hours
Time keeps on slippin’ slippin’ slippin’: The 2023 Active Adversary Report for Tech Leaders – Sophos News
Cryptojacking: Understanding and defending against cloud compute resource abuse
DDoS threat report for 2023 Q2
The five-day job: A BlackByte ransomware intrusion case study
Malvertising Used as Entry Vector for BlackCat Actors Also Leverage SpyBoy Terminator
Attackers Use Containers for Profit via TrafficStealer
Vice Society: A Tale of Victim Data Exfiltration via PowerShell, aka Stealing off the Land
Mac Malware MacStealer Spreads as Fake P2E Apps
Creal: New Stealer Targeting Cryptocurrency Users Via Phishing Sites
West ill-prepared to deal with evolving cyber threats, report concludes
OneNote Embedded file abuse
Activision's Data Breach Contains Employee Information, Call of Duty and More, Report
Fog of war: how the Ukraine conflict transformed the cyber threat landscape
Killnet Threat to Health and Public Sectors
2023 Crypto Crime Trends: Illicit Cryptocurrency Volumes Reach All-Time Highs Amid Surge in Sanctions Designations and Hacking
No Pineapple! –DPRK Targeting of Medical Research and Technology Sector
Cost of data breaches to surpass US$5mn per incident in 2023
Nokia warns 5G security ‘breaches are the rule, not the exception’
Nation-state cyberattacks become more brazen as authoritarian leaders ramp up aggression
Amazon‑themed campaigns of Lazarus in the Netherlands and Belgium
Likely Iranian Threat Actor Conducts Politically Motivated Disruptive Activity Against Albanian Government Organizations
THREAT ANALYSIS REPORT: Bumblebee Loader – The High Road to Enterprise Domain Control
Europe’s PegasusGate: Countering spyware abuse
THREAT ALERT: Raspberry Robin Worm Abuses Windows Installer and QNAP Devices
Il malware EnvyScout (APT29) è stato veicolato anche in Italia
Cybersecurity experts question Microsoft's Ukraine report
Facing reality? Law enforcement and the challenge of deepfakes
Defending Ukraine: Early Lessons from the Cyber War
Fronton: A Botnet for Creation, Command, and Control of Coordinated Inauthentic Behavior
Kaspersky DDoS report, Q1 2022
Aquarium Leaks. Inside the GRU’s Psychological Warfare Program
SysJoker analyzing the first (macOS) malware of 2022!
Google Online Security Blog: Vulnerability Reward Program: 2021 Year in Review