What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
InfoSecurityMag.webp 2023-03-23 17:00:00 L'escroquerie de phishing SharePoint cible 1600 à travers les États-Unis, l'Europe [SharePoint Phishing Scam Targets 1600 Across US, Europe] (lien direct) Les cybercriminels ont utilisé l'arnaque pour voler les informations d'identification pour divers comptes de messagerie
Cyber-criminals used the scam to steal the credentials for various email accounts
Threat ★★★
InfoSecurityMag.webp 2023-03-22 10:40:00 Les chercheurs en sécurité repérer 36 millions de dollars Bec Attaque [Security Researchers Spot $36m BEC Attack] (lien direct) Les acteurs de la menace ont issu l'identité du vendeur de la société cible \\
Threat actors impersonated target company\'s vendor
Threat General Information ★★
InfoSecurityMag.webp 2023-03-16 10:30:00 NCSC Calms Fears Over ChatGPT Threat (lien direct) Tool won't democratize cybercrime, agency argues Tool Threat ChatGPT ChatGPT ★★
InfoSecurityMag.webp 2023-03-15 10:00:00 Phishing Campaigns Use SVB Collapse to Harvest Crypto (lien direct) Experts warn users to be on their guard Threat ★★
InfoSecurityMag.webp 2023-03-15 09:30:00 Microsoft Patches Two Zero Days This Month (lien direct) They include one likely exploited by Russian-linked threat actors Threat ★★
InfoSecurityMag.webp 2023-03-14 17:30:00 YoroTrooper Espionage Campaigns Target CIS, EU Countries (lien direct) The threat actors mainly targeted organizations across Azerbaijan, Tajikistan and Kyrgyzstan Threat ★★★
InfoSecurityMag.webp 2023-03-14 17:00:00 DEV-1101 Updates Open Source Phishing Kit (lien direct) The kit is written in NodeJS and has automated setup and detection evasion capabilities Threat ★★★★
InfoSecurityMag.webp 2023-03-13 16:30:00 Infostealers Spread Via AI-Generated YouTube Videos (lien direct) Infostealers observed to be delivered via these videos included Vidar, RedLine and Raccoon Threat ★★
InfoSecurityMag.webp 2023-03-09 16:30:00 Acer Confirms Unauthorized Access But Says No Consumer Data Stolen (lien direct) Kernelware threat actor claimed responsibility for the hack on a dark web forum Hack Threat ★★
InfoSecurityMag.webp 2023-03-09 10:15:00 House Members at Risk After Insurer Data Breach (lien direct) Threat actor claims to have info on 170,000 victims Data Breach Threat ★★★
InfoSecurityMag.webp 2023-03-07 16:30:00 Ransomware Attack Against Barcelona Hospital Disrupts Operations (lien direct) A Catalonia government statement attributed the attack to the threat actor known as RansomHouse Ransomware Threat ★★
InfoSecurityMag.webp 2023-03-02 13:00:00 WH Smith Discloses Cyber-Attack, Company Data Theft (lien direct) Employee data was accessed by the threat actors, including names, addresses, and more Threat ★★
InfoSecurityMag.webp 2023-03-01 15:30:00 Public SaaS Assets Are a Major Risk For Medium, Large Firms (lien direct) The findings come from DoControl's latest SaaS Security Threat Landscape report Threat Cloud ★★
InfoSecurityMag.webp 2023-03-01 10:30:00 Attacker Breakout Time Drops to Just 84 Minutes (lien direct) Every second counts as threat actors accelerate lateral movement Threat ★★★
InfoSecurityMag.webp 2023-02-28 17:00:00 (Déjà vu) LastPass Data Stolen in August 2022 Breach Used For December Attack (lien direct) Threat actors obtained credentials and keys later used to access and decrypt some storage volumes Threat LastPass ★★
InfoSecurityMag.webp 2023-02-27 17:00:00 News Corp Reveals Two-Year-Long Breach (lien direct) A threat actor accessed business documents and emails between February 2020 and January 2022 Threat ★★★
InfoSecurityMag.webp 2023-02-27 10:00:00 Governments Targeted by Discord-Based Threat Campaign (lien direct) Threat actor delivers multiple malware types via PureCrypter Malware Threat ★★
InfoSecurityMag.webp 2023-02-20 16:00:00 Frebniis Malware Exploits Microsoft IIS Feature (lien direct) The malware was used by a previously unknown threat actor against targets in Taiwan Malware Threat ★★
InfoSecurityMag.webp 2023-02-17 18:00:00 Cloud Infrastructure Used By WIP26 For Espionage Attacks on Telcos (lien direct) The threat actor initiated infection chains by targeting employees through WhatsApp messages Threat ★★
InfoSecurityMag.webp 2023-02-17 16:10:00 Google Report Reveals Russia\'s Elaborate Cyber Strategy in Ukraine (lien direct) One year after the invasion of Ukraine, Google and Mandiant analyzed the cyber strategy of Russia-backed threat actors Threat ★★
InfoSecurityMag.webp 2023-02-15 16:51:00 LockBit and Royal Mail Ransomware Negotiation Leaked (lien direct) It shows the threat actor trying to convince Royal Mail to pay the ransom using various techniques Ransomware Threat ★★
InfoSecurityMag.webp 2023-02-15 12:00:00 Threat Analysis: VMware ESXi Attacks Soared in 2022 (lien direct) Recorded Future analyzed how threat actors have been exploiting VMware ESXi vulnerabilities over the past three years Threat ★★
InfoSecurityMag.webp 2023-02-15 09:30:00 SideWinder APT Attacks Regional Targets in New Campaign (lien direct) Indian threat group conducts hundreds of operations in a short time-span Threat APT-C-17 ★★
InfoSecurityMag.webp 2023-02-13 17:00:00 Group-IB Blocks Attack By Chinese Tonto Team Hackers (lien direct) The threat actors used phishing to deliver malicious files created with the Royal Road Weaponizer Threat ★★
InfoSecurityMag.webp 2023-02-10 09:30:00 New Threat Group Reviews Screenshots Before Striking (lien direct) Threat actor has been dubbed TA866 by Proofpoint Threat ★★★
InfoSecurityMag.webp 2023-02-08 16:30:00 UK Politician\'s Email Hacked by Suspected Russian Threat Actors (lien direct) The SNP MP revealed details of the incident, in which he clicked on a malicious file purportedly about the military situation in Ukraine Threat ★★★
InfoSecurityMag.webp 2023-02-08 10:00:00 CISA Releases Recovery Tool for VMware Ransomware Victims (lien direct) Legacy bug in ESXi servers is being targeted by threat actors Ransomware Tool Threat ★★★
InfoSecurityMag.webp 2023-02-06 17:00:00 Iranian Threat Actor Neptunium Associated With Charlie Hebdo Cyber-Attacks (lien direct) Microsoft's Digital Threat Analysis Center shared the findings last Friday in a blog post Threat ★★
InfoSecurityMag.webp 2023-02-02 18:00:00 Threat Actors Use ClickFunnels to Bypass Security Services (lien direct) They created pages with malicious links and ultimately conducted credential-harvesting attacks Threat ★★
InfoSecurityMag.webp 2023-01-30 17:00:00 Hackers Use TrickGate Software to Deploy Emotet, REvil, Other Malware (lien direct) Threat actors used TrickGate to conduct between 40 and 650 attacks per week in the last two years Malware Threat ★★
InfoSecurityMag.webp 2023-01-27 16:00:00 New \'Pig Butchering\' Scam in West Africa Impersonates US Financial Advisors (lien direct) DomainTools said most of these attacks exploited professional network services such as LinkedIn Threat ★★★
InfoSecurityMag.webp 2023-01-26 18:00:00 Iranian Group Cobalt Sapling Targets Saudi Arabia With New Persona (lien direct) The findings come from cybersecurity experts at Secureworks' Counter Threat Unit Threat ★★★
InfoSecurityMag.webp 2023-01-26 12:00:00 NCSC: Iranian and Russian Groups Targeting Government, Activists and Journalists With Spearphishing (lien direct) The NCSC advisory details tactics used by Russia-based threat actor SEABORGIUM and Iran-based group TA453 Threat ★★
InfoSecurityMag.webp 2023-01-25 18:00:00 North Korean Group TA444 Shows \'Startup\' Culture, Tries Numerous Infection Methods (lien direct) The threat actor has been targeting cryptocurrency exchanges since at least 2017 Threat ★★
InfoSecurityMag.webp 2023-01-23 09:30:00 New Government Cyber Advice for £100bn UK Charity Sector (lien direct) NCSC report warns of surging threat to the third sector Threat ★★
InfoSecurityMag.webp 2023-01-19 17:00:00 ThreatModeler Makes DevSecOps More Accessible With New Marketplace (lien direct) The store includes pre-built threat models that can be integrated into a development pipeline Threat
InfoSecurityMag.webp 2023-01-17 18:00:00 Vice Society Claims Ransomware Attack Against University of Duisburg-Essen (lien direct) The threat actor has also reportedly published some stolen data on the dark web Ransomware Threat ★★
InfoSecurityMag.webp 2023-01-16 16:00:00 Qbot Overtakes Emotet in December 2022\'s Most Wanted Malware List (lien direct) The findings come from Check Point Software's latest Global Threat Index report Malware Threat ★★★
InfoSecurityMag.webp 2023-01-09 18:00:00 Freejacking Campaign By PurpleUrchin Bypasses Captchas (lien direct) The threat actors also deployed more aggressive techniques for mining CPU resources Threat ★★★
InfoSecurityMag.webp 2023-01-09 10:00:00 Threat Actors Spread RAT Via Pokemon NFT Card Site (lien direct) Phishing page lures unsuspecting users into installing remote access malware Malware Threat ★★
InfoSecurityMag.webp 2023-01-05 18:00:00 Hackers Leverage Compromised Fortinet Devices to Distribute Ransomware (lien direct) The findings come from eSentire's Threat Response Unit Ransomware Threat ★★
InfoSecurityMag.webp 2023-01-04 14:15:00 New Phishing Campaign Impersonates Flipper Zero to Target Cyber Professionals (lien direct) The threat actor is using an angler phishing technique to leverage the shortage of the popular hacking tool Tool Threat ★★★★
InfoSecurityMag.webp 2022-12-21 10:00:00 Adult Google Ad Fraud Campaign Garnered Millions of Impressions (lien direct) Fraudster used "popunders" and obfuscation to generate cash Threat ★★★
InfoSecurityMag.webp 2022-12-20 16:30:00 Organizations Warned of New Attack Vector in Amazon Web Services (lien direct) Researchers warned that threat actors could potentially exploit Elastic IP transfer and compromise an IP address Threat ★★★
InfoSecurityMag.webp 2022-12-19 11:30:00 Mobile App Users at Risk as API Keys of Email Marketing Services Exposed (lien direct) Leaked API keys allow threat actors to perform a variety of unauthorized actions Threat ★★★
InfoSecurityMag.webp 2022-12-14 18:00:00 (Déjà vu) Signed Microsoft Drivers Used in Attacks Against Businesses (lien direct) In some cases, the threat actor's intent was to ultimately provide SIM-swapping services Threat
InfoSecurityMag.webp 2022-12-06 16:00:00 Threat Actors Use Malicious File Systems to Scale Crypto-Mining Operations (lien direct) The hackers used PRoot to increase the scope of their operations to several Linux distributions Threat ★★
InfoSecurityMag.webp 2022-12-06 10:00:00 Russian Hackers Use Western Networks to Attack Ukraine (lien direct) Lupovis used decoys to find out more about threat actors Threat ★★
InfoSecurityMag.webp 2022-12-02 17:00:00 \'Black Proxies\' Enable Threat Actors to Conduct Malicious Activity (lien direct) First used as botnets, their lucrative nature turned them into independent criminal enterprises Threat ★★
InfoSecurityMag.webp 2022-12-01 17:00:00 Spyware Vendor Variston Exploited N-Days in Chrome, Firefox, Windows (lien direct) The claims come from Google's Threat Analysis Group, which published an advisory about the threat Threat ★★★
Last update at: 2024-06-03 03:08:06
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter