Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
 |
2025-05-09 09:00:00 |
Le FBI semble alarmer sur les services de cybercriminalité voyous ciblant les routeurs obsolètes FBI Sounds Alarm on Rogue Cybercrime Services Targeting Obsolete Routers (lien direct) |
Le FBI a détecté des indicateurs de logiciels malveillants ciblant les routeurs de fin de vie associés aux services de proxy anyproxy et 5socks
The FBI has detected indicators of malware targeting end-of-life routers associated with Anyproxy and 5Socks proxy services |
Malware
|
|
★★★
|
 |
2025-05-08 15:00:00 |
Le groupe russe lance des logiciels malveillants LostKeys lors d'attaques Russian Group Launches LOSTKEYS Malware in Attacks (lien direct) |
New LostKeys Malware a été identifié et lié à Coldriver par GTIG, volant des fichiers et des données système dans des attaques ciblées
New LOSTKEYS malware has been identified and linked to COLDRIVER by GTIG, stealing files and system data in targeted attacks |
Malware
|
|
★★★
|
 |
2025-05-01 15:00:00 |
Les campagnes de phishing à grande échelle ciblent la Russie et l'Ukraine Large-Scale Phishing Campaigns Target Russia and Ukraine (lien direct) |
Une campagne de phishing à grande échelle utilisant Darkwatchman et un logiciel malveillant shérif a été observée des sociétés de ciblage en Russie et en Ukraine
A large-scale phishing campaign using DarkWatchman and Sheriff malware has been observed targeting companies in Russia and Ukraine |
Malware
|
|
★★★
|
 |
2025-04-29 15:45:00 |
New WordPress Malware se masque comme plugin New WordPress Malware Masquerades as Plugin (lien direct) |
Un nouveau logiciel malveillant WordPress déguisé en plugin donne aux attaquants un accès persistant et injecte un code malveillant permettant le contrôle administratif
New WordPress malware disguised as a plugin gives attackers persistent access and injects malicious code enabling administrative control |
Malware
|
|
★★
|
 |
2025-04-28 14:15:00 |
Groupe de diaspora ouïghour ciblé avec des logiciels malveillants de surveillance à distance Uyghur Diaspora Group Targeted with Remote Surveillance Malware (lien direct) |
Selon le Citizen Lab.
Members of the World Uyghur Congress living in exile were targeted with a spear phishing campaign deploying surveillance malware, according to the Citizen Lab |
Malware
|
|
★★
|
 |
2025-04-22 15:45:00 |
Supercard X permet la fraude ATM sans contact en temps réel SuperCard X Enables Contactless ATM Fraud in Real-Time (lien direct) |
Une nouvelle campagne de logiciels malveillants utilisant des techniques de relais NFC a été identifiée effectuant des transactions non autorisées via les systèmes POS et les distributeurs automatiques de billets
A new malware campaign utilizing NFC-relay techniques has been identified carrying out unauthorized transactions through POS systems and ATMs |
Malware
|
|
★★★
|
 |
2025-04-22 14:15:00 |
Le nouveau cryptojacking malware cible Docker avec une nouvelle technique d'exploitation New Cryptojacking Malware Targets Docker with Novel Mining Technique (lien direct) |
Darktrace et Cado ont déclaré que la nouvelle campagne met en évidence une évolution vers des méthodes alternatives pour l'exploitation des crypto-monnaies
Darktrace and Cado said the new campaign highlights a shift towards alternative methods of mining cryptocurrencies |
Malware
|
|
★★★
|
 |
2025-04-18 08:30:00 |
La blizzard de minuit cible les diplomates européens avec un leurre de phishing au goût de vin Midnight Blizzard Targets European Diplomats with Wine Tasting Phishing Lure (lien direct) |
L'acteur d'État russe Midnight Blizzard utilise de faux événements de dégustation de vin comme leurre pour répandre les logiciels malveillants à des fins d'espionnage, selon Check Point
Russian state actor Midnight Blizzard is using fake wine tasting events as a lure to spread malware for espionage purposes, according to Check Point |
Malware
|
|
★★
|
 |
2025-04-15 14:15:00 |
Les pirates nord-coréens exploitent LinkedIn pour infecter les développeurs de cryptographie avec des infosteaux North Korean Hackers Exploit LinkedIn to Infect Crypto Developers with Infostealers (lien direct) |
Se faisant passer pour des employeurs potentiels, les pirates de poissons lents cachent des logiciels malveillants dans les défis de codage envoyés aux développeurs de crypto-monnaie sur LinkedIn
Posing as potential employers, Slow Pisces hackers conceal malware in coding challenges sent to cryptocurrency developers on LinkedIn |
Malware
Threat
|
|
★★★
|
 |
2025-04-14 13:00:00 |
Nouveau malware Resolverrat cible les secteurs des soins de santé et de la pharmacie New Malware ResolverRAT Targets Healthcare and Pharma Sectors (lien direct) |
Resolverrat cible les organisations de soins de santé utilisant des techniques d'évasion avancées et l'ingénierie sociale
ResolverRAT targets healthcare organizations using advanced evasion techniques and social engineering |
Malware
Medical
|
|
★★★
|
 |
2025-04-10 13:00:00 |
Spynote malware cible les utilisateurs d'Android avec de fausses pages de lecture Google SpyNote Malware Targets Android Users with Fake Google Play Pages (lien direct) |
Une nouvelle campagne de logiciels malveillants Android utilise de fausses pages de lecture Google pour distribuer le Spynote Trojan
A new Android malware campaign uses fake Google Play pages to distribute the SpyNote Trojan |
Malware
Mobile
|
|
★★★
|
 |
2025-04-10 08:30:00 |
Opération Endgame se poursuit avec les arrestations de clients SmokeLoader Operation Endgame Continues with Smokeloader Customer Arrests (lien direct) |
La police a procédé à plus d'arrestations dans l'opération en cours de fin de partie, réprimandant les clients malveillants
Police have made more arrests in the ongoing Operation Endgame, cracking down on malware customers |
Malware
Legislation
|
|
★★
|
 |
2025-04-03 13:00:00 |
Le piratage amateur exploite le serveur d'hébergement russe à l'épreuve des balles pour répandre les logiciels malveillants Amateur Hacker Leverages Russian Bulletproof Hosting Server to Spread Malware (lien direct) |
Le cybercrimiral utilise le service de Proton66, un tristement célèbre fournisseur d'hébergement à l'épreuve des balles basée en Russie, pour déployer des logiciels malveillants
The cybercriminal uses the service of Proton66, an infamous Russian-based bulletproof hosting provider, to deploy malware |
Malware
|
|
★★★
|
 |
2025-03-31 15:45:00 |
Nouvelle variante malware Resurge exploite ivanti vulnérabilité New Malware Variant RESURGE Exploits Ivanti Vulnerability (lien direct) |
La CISA recommande une action immédiate pour lutter contre les variants de logiciels malveillants Resurge exploitant la vulnérabilité Ivanti CVE-2025-0282
CISA recommends immediate action to address malware variant RESURGE exploiting Ivanti vulnerability CVE-2025-0282 |
Malware
Vulnerability
|
|
★★★
|
 |
2025-03-27 16:45:00 |
Coodeloder Maleware Loader lié aux opérations de smokeloader CoffeeLoader Malware Loader Linked to SmokeLoader Operations (lien direct) |
Coffeeoader nouvellement identifié utilise plusieurs techniques d'évasion et mécanismes de persistance pour déployer des charges utiles et contourner la sécurité des points de terminaison
Newly identified CoffeeLoader uses multiple evasion techniques and persistence mechanisms to deploy payloads and bypass endpoint security |
Malware
|
|
★★★
|
 |
2025-03-27 16:00:00 |
Pjobrat malware cible les utilisateurs de Taiwan via de fausses applications PJobRAT Malware Targets Users in Taiwan via Fake Apps (lien direct) |
Pjobrat malware cible les utilisateurs d'Android de Taiwan, volant des données via de fausses plates-formes de messagerie
PJobRAT malware targets Taiwan Android users, stealing data through fake messaging platforms |
Malware
Mobile
|
|
★★★
|
 |
2025-03-26 13:30:00 |
Les packages NPM malveillants offrent des coquilles inverses sophistiquées Malicious npm Packages Deliver Sophisticated Reverse Shells (lien direct) |
Une campagne de logiciels malveillants nouvellement découverte utilise des packages NPM malveillants pour déployer des coquilles inversées, compromettant les environnements de développement
A newly discovered malware campaign uses malicious npm packages to deploy reverse shells, compromising development environments |
Malware
|
|
★★★
|
 |
2025-03-25 17:15:00 |
Un nouveau malware Android utilise .net Maui pour échapper à la détection New Android Malware Uses .NET MAUI to Evade Detection (lien direct) |
Les chercheurs de McAfee ont identifié une nouvelle vague de campagnes de logiciels malveillants Android en tirant parti de .Net Maui pour voler des informations d'utilisateurs sensibles via de fausses applications
McAfee researchers have identified a new wave of Android malware campaigns leveraging .NET MAUI to steal sensitive user information through fake apps |
Malware
Mobile
|
|
★★★
|
 |
2025-03-18 15:30:00 |
Le chercheur en sécurité prouve que les outils Genai peuvent développer des infostenteurs Google Chrome Security Researcher Proves GenAI Tools Can Develop Google Chrome Infostealers (lien direct) |
Un chercheur Cato Networks a découvert une nouvelle technique de jailbreak LLM permettant la création de logiciels malveillants voleurs de mot de passe
A Cato Networks researcher discovered a new LLM jailbreaking technique enabling the creation of password-stealing malware |
Malware
Tool
|
|
★★★
|
 |
2025-03-13 15:00:00 |
\Ret \\'ClickFix\\' Phishing Scam Impersonates Booking.com to Target Hospitality (lien direct) |
Microsoft a déclaré que la campagne de phishing en cours est conçue pour infecter les entreprises hôtelières avec plusieurs logiciels malveillants de vol d'identification
Microsoft said the ongoing phishing campaign is designed to infect hospitality firms with multiple credential-stealing malware |
Malware
|
|
★★★
|
 |
2025-03-12 14:00:00 |
Implant de pirates chinois MALWORIAUX DE BARDOOR SUR LES ROUTEURS JUNIPER Chinese Hackers Implant Backdoor Malware on Juniper Routers (lien direct) |
Mandiant a révélé que l'acteur d'espionnage chinois UNC3886 a déployé des versions modifiées de la porte dérobée Tinyshell sur plusieurs routeurs OS Juniper
Mandiant revealed that Chinese espionage actor UNC3886 has deployed modified versions of the TinyShell backdoor across multiple Juniper OS routers |
Malware
|
|
★★
|
 |
2025-03-10 10:30:00 |
Développeur du Texas condamné après Kill Switch Sabotage Terrain Texas Developer Convicted After Kill Switch Sabotage Plot (lien direct) |
Le développeur de logiciels Davis Lu a coûté à son employeur des centaines de milliers après avoir déployé des logiciels malveillants qui ont provoqué des accidents et des connexions échouées
Software developer Davis Lu cost his employer hundreds of thousands after deploying malware that caused crashes and failed logins |
Malware
|
|
★★★
|
 |
2025-03-04 16:30:00 |
Une nouvelle campagne de cyber-espionnage cible l'aviation et le transport des EAU New Cyber-Espionage Campaign Targets UAE Aviation and Transport (lien direct) |
Une campagne de cyber-espionnage ciblant l'aviation et le transport des EAU a été identifiée par des chercheurs, en utilisant des leurres personnalisés pour déployer des logiciels malveillants Sosano
A cyber-espionage campaign targeting UAE aviation and transport has been identified by researchers, using customized lures to deploy Sosano malware |
Malware
|
|
★★
|
 |
2025-03-03 16:30:00 |
Les attaquants exploitent les équipes Microsoft et l'assistance rapide pour l'accès Attackers Leverage Microsoft Teams and Quick Assist for Access (lien direct) |
PHIGHISS ATTACH exploite les techniques d'ingénierie sociale aux côtés d'équipes Microsoft et de logiciels d'accès à distance pour déployer des logiciels malveillants en arrière-plan
Phishing attack exploits social engineering techniques alongside Microsoft Teams and remote access software to deploy BackConnect malware |
Malware
|
|
★★★
|
 |
2025-02-27 16:00:00 |
Les logiciels malveillants WinOS 4.0 ciblent Taiwan avec une usurpation d'identité de courrier électronique Winos 4.0 Malware Targets Taiwan With Email Impersonation (lien direct) |
Les logiciels malveillants WinOS 4.0 utilisent des e-mails de phishing pour cibler les organisations à Taiwan, les experts Fortinet avertissent
Winos 4.0 malware uses phishing emails to target organizations in Taiwan, Fortinet experts warn |
Malware
|
|
★★
|
 |
2025-02-25 13:40:00 |
Plantes de renard argenté soutenues par le chinois dans les réseaux de soins de santé Chinese-Backed Silver Fox Plants Backdoors in Healthcare Networks (lien direct) |
ForeScout a observé le groupe de piratage chinois récemment identifié à l'aide d'applications logicielles d'imagerie médicale pour fournir des logiciels malveillants
Forescout observed the recently identified Chinese hacking group using medical imaging software applications to deliver malware |
Malware
Medical
|
|
★★★
|
 |
2025-02-20 16:30:00 |
Malicious Ads Target Freelance Developers via GitHub (lien direct) |
Fake job ads target freelance developers, spreading malware via GitHub
Fake job ads target freelance developers, spreading malware via GitHub |
Malware
|
|
★★
|
 |
2025-02-18 15:00:00 |
Mustang Panda Leverages Microsoft Tools to Bypass Anti-Virus Solutions (lien direct) |
Trend Micro found that Chinese espionage group Mustang Panda is deploying malware via legitimate Microsoft tools, enabling it to bypass ESET antivirus applications
Trend Micro found that Chinese espionage group Mustang Panda is deploying malware via legitimate Microsoft tools, enabling it to bypass ESET antivirus applications |
Malware
Tool
Prediction
|
|
★★★
|
 |
2025-02-17 14:30:00 |
Microsoft Detects New XCSSET MacOS Malware Variant (lien direct) |
Microsoft has observed a new variant of XCSSET, a sophisticated macOS malware that infects Xcode projects
Microsoft has observed a new variant of XCSSET, a sophisticated macOS malware that infects Xcode projects |
Malware
|
|
★★★
|
 |
2025-02-17 11:15:00 |
Telegram Used as C2 Channel for New Golang Malware (lien direct) |
A Golang backdoor is using Telegram as its command and control (C2) channel, an approach that makes detection harder for defenders, according to Netskope researchers
A Golang backdoor is using Telegram as its command and control (C2) channel, an approach that makes detection harder for defenders, according to Netskope researchers |
Malware
|
|
★★★
|
 |
2025-02-13 10:15:00 |
North Korea Targets Crypto Devs Through NPM Packages (lien direct) |
SecurityScorecard has uncovered a sophisticated campaign linked to North Korea\'s Lazarus Group, distributing crypto-stealing malware
SecurityScorecard has uncovered a sophisticated campaign linked to North Korea\'s Lazarus Group, distributing crypto-stealing malware |
Malware
|
APT 38
|
★★★
|
 |
2025-02-10 17:15:00 |
BadIIS Malware Exploits IIS Servers for SEO Fraud (lien direct) |
Trend Micro uncovers BadIIS malware exploiting IIS servers for SEO fraud and malicious redirects
Trend Micro uncovers BadIIS malware exploiting IIS servers for SEO fraud and malicious redirects |
Malware
Prediction
|
|
★★★
|
 |
2025-02-05 14:00:00 |
Mobile Malware Targeting Indian Banks Exposes 50,000 Users (lien direct) |
Indian banking malware attack exposes 50,000 users, stealing financial data via SMS interception and phishing
Indian banking malware attack exposes 50,000 users, stealing financial data via SMS interception and phishing |
Malware
Mobile
|
|
★★★
|
 |
2025-02-05 10:30:00 |
Cybercriminals Eye DeepSeek, Alibaba LLMs for Malware Development (lien direct) |
Check Point has observed cybercriminals toy with Alibaba\'s Qwen LLM to develop infostealers
Check Point has observed cybercriminals toy with Alibaba\'s Qwen LLM to develop infostealers |
Malware
|
|
★★
|
 |
2025-02-04 14:30:00 |
DaggerFly-Linked Linux Malware Targets Network Appliances (lien direct) |
DaggerFly\'s Lunar Peek campaign is using a new malware strain, identified by FortiGuard Labs, to compromise Linux networks
DaggerFly\'s Lunar Peek campaign is using a new malware strain, identified by FortiGuard Labs, to compromise Linux networks |
Malware
|
|
★★★
|
 |
2025-02-04 14:00:00 |
Threefold Increase in Malware Targeting Credential Stores (lien direct) |
Picus Security reports infostealer surge after revealing credentials appear in 29% of malware
Picus Security reports infostealer surge after revealing credentials appear in 29% of malware |
Malware
|
|
★★★
|
 |
2025-01-29 16:00:00 |
Nation-State Hackers Abuse Gemini AI Tool (lien direct) |
Google highlighted significant abuse of its Gemini LLM tool by nation state actors to support malicious activities, including research and malware development
Google highlighted significant abuse of its Gemini LLM tool by nation state actors to support malicious activities, including research and malware development |
Malware
Tool
|
|
★★★
|
 |
2025-01-24 12:15:00 |
Russian Scammers Target Crypto Influencers with Infostealers (lien direct) |
Crazy Evil, a group of crypto scammers, exploit NFTs and cryptocurrencies with malware targeting influencers and tech professionals
Crazy Evil, a group of crypto scammers, exploit NFTs and cryptocurrencies with malware targeting influencers and tech professionals |
Malware
Threat
|
|
★★★
|
 |
2025-01-23 11:30:00 |
New GhostGPT AI Chatbot Facilitates Malware Creation and Phishing (lien direct) |
Cybercriminals are selling access to the malicious GenAI chatbot via Telegram, providing rapid assistance for a range of nefarious activities, according to Abnormal Security
Cybercriminals are selling access to the malicious GenAI chatbot via Telegram, providing rapid assistance for a range of nefarious activities, according to Abnormal Security |
Malware
|
|
★★★
|
 |
2025-01-21 17:00:00 |
New Mirai Malware Variant Targets AVTECH Cameras, Huawei Routers (lien direct) |
Murdoc_Botnet used Mirai malware to exploit IoT vulnerabilities, targeting devices globally
Murdoc_Botnet used Mirai malware to exploit IoT vulnerabilities, targeting devices globally |
Malware
Vulnerability
Threat
|
|
★★★
|
 |
2025-01-16 09:01:00 |
Hackers Use Image-Based Malware and GenAI to Evade Email Security (lien direct) |
HP Wolf highlighted novel techniques used by attackers to bypass email protections, including embedding malicious code inside images and utilizing GenAI
HP Wolf highlighted novel techniques used by attackers to bypass email protections, including embedding malicious code inside images and utilizing GenAI |
Malware
|
|
★★★
|
 |
2025-01-15 14:00:00 |
Chinese PlugX Malware Deleted in Global Law Enforcement Operation (lien direct) |
The FBI deleted Chinese PlugX malware from thousands of devices in the US, using a technique developed by French cybersecurity firm Sekoia.io
The FBI deleted Chinese PlugX malware from thousands of devices in the US, using a technique developed by French cybersecurity firm Sekoia.io |
Malware
Legislation
|
|
★★★
|
 |
2025-01-14 15:00:00 |
Browser-Based Cyber-Threats Surge as Email Malware Declines (lien direct) |
Browser-based cyber-threats surged in 2024, with credential abuse and infostealers on the rise
Browser-based cyber-threats surged in 2024, with credential abuse and infostealers on the rise |
Malware
|
|
★★★
|
 |
2025-01-13 16:30:00 |
Russian Malware Campaign Hits Central Asian Diplomatic Files (lien direct) |
Diplomatic entities in Kazakhstan and Central Asia have been targeted by UAC-0063 using weaponized Word docs deploying HATVIBE malware
Diplomatic entities in Kazakhstan and Central Asia have been targeted by UAC-0063 using weaponized Word docs deploying HATVIBE malware |
Malware
|
|
★★★
|
 |
2025-01-13 13:00:00 |
New Ransomware Group Uses AI to Develop Nefarious Tools (lien direct) |
Researchers at Check Point said FunkSec operators appear to use AI for malware development
Researchers at Check Point said FunkSec operators appear to use AI for malware development |
Ransomware
Malware
Tool
|
|
★★★
|
 |
2025-01-06 11:10:00 |
New Infostealer Campaign Uses Discord Videogame Lure (lien direct) |
Threat actors are tricking victims into downloading malware with the promise of testing a new videogame
Threat actors are tricking victims into downloading malware with the promise of testing a new videogame |
Malware
Threat
|
|
★★★
|
 |
2025-01-02 17:15:00 |
Global Campaign Targets PlugX Malware with Innovative Portal (lien direct) |
Sekoia\'s innovative PlugX malware disinfection campaign removed active threats across ten countries
Sekoia\'s innovative PlugX malware disinfection campaign removed active threats across ten countries |
Malware
|
|
★★
|
 |
2024-12-23 16:30:00 |
Cryptomining Malware Found in Popular Open Source Packages (lien direct) |
Cryptomining malware hits popular npm packages rspack and vant, posing risks to open source tools
Cryptomining malware hits popular npm packages rspack and vant, posing risks to open source tools |
Malware
Tool
|
|
★★
|
 |
2024-12-20 11:20:00 |
Webcams and DVRs Vulnerable to HiatusRAT, FBI Warns (lien direct) |
The FBI has issued a warning about the Hiatus RAT malware targeting Xiongmai and Hikvision web cameras and DVRs, urging users isolate these devices from networks
The FBI has issued a warning about the Hiatus RAT malware targeting Xiongmai and Hikvision web cameras and DVRs, urging users isolate these devices from networks |
Malware
|
|
★★★
|
 |
2024-12-19 14:00:00 |
New Malware Can Kill Engineering Processes in ICS Environments (lien direct) |
Forescout identified a new type of malware capable of terminating engineering processes, used to target Siemens engineering workstations
Forescout identified a new type of malware capable of terminating engineering processes, used to target Siemens engineering workstations |
Malware
Industrial
|
|
★★
|