What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
InfoSecurityMag.webp 2025-05-09 09:00:00 Le FBI semble alarmer sur les services de cybercriminalité voyous ciblant les routeurs obsolètes
FBI Sounds Alarm on Rogue Cybercrime Services Targeting Obsolete Routers
(lien direct)
Le FBI a détecté des indicateurs de logiciels malveillants ciblant les routeurs de fin de vie associés aux services de proxy anyproxy et 5socks
The FBI has detected indicators of malware targeting end-of-life routers associated with Anyproxy and 5Socks proxy services
Malware ★★★
InfoSecurityMag.webp 2025-05-08 15:00:00 Le groupe russe lance des logiciels malveillants LostKeys lors d'attaques
Russian Group Launches LOSTKEYS Malware in Attacks
(lien direct)
New LostKeys Malware a été identifié et lié à Coldriver par GTIG, volant des fichiers et des données système dans des attaques ciblées
New LOSTKEYS malware has been identified and linked to COLDRIVER by GTIG, stealing files and system data in targeted attacks
Malware ★★★
InfoSecurityMag.webp 2025-05-01 15:00:00 Les campagnes de phishing à grande échelle ciblent la Russie et l'Ukraine
Large-Scale Phishing Campaigns Target Russia and Ukraine
(lien direct)
Une campagne de phishing à grande échelle utilisant Darkwatchman et un logiciel malveillant shérif a été observée des sociétés de ciblage en Russie et en Ukraine
A large-scale phishing campaign using DarkWatchman and Sheriff malware has been observed targeting companies in Russia and Ukraine
Malware ★★★
InfoSecurityMag.webp 2025-04-29 15:45:00 New WordPress Malware se masque comme plugin
New WordPress Malware Masquerades as Plugin
(lien direct)
Un nouveau logiciel malveillant WordPress déguisé en plugin donne aux attaquants un accès persistant et injecte un code malveillant permettant le contrôle administratif
New WordPress malware disguised as a plugin gives attackers persistent access and injects malicious code enabling administrative control
Malware ★★
InfoSecurityMag.webp 2025-04-28 14:15:00 Groupe de diaspora ouïghour ciblé avec des logiciels malveillants de surveillance à distance
Uyghur Diaspora Group Targeted with Remote Surveillance Malware
(lien direct)
Selon le Citizen Lab.
Members of the World Uyghur Congress living in exile were targeted with a spear phishing campaign deploying surveillance malware, according to the Citizen Lab
Malware ★★
InfoSecurityMag.webp 2025-04-22 15:45:00 Supercard X permet la fraude ATM sans contact en temps réel
SuperCard X Enables Contactless ATM Fraud in Real-Time
(lien direct)
Une nouvelle campagne de logiciels malveillants utilisant des techniques de relais NFC a été identifiée effectuant des transactions non autorisées via les systèmes POS et les distributeurs automatiques de billets
A new malware campaign utilizing NFC-relay techniques has been identified carrying out unauthorized transactions through POS systems and ATMs
Malware ★★★
InfoSecurityMag.webp 2025-04-22 14:15:00 Le nouveau cryptojacking malware cible Docker avec une nouvelle technique d'exploitation
New Cryptojacking Malware Targets Docker with Novel Mining Technique
(lien direct)
Darktrace et Cado ont déclaré que la nouvelle campagne met en évidence une évolution vers des méthodes alternatives pour l'exploitation des crypto-monnaies
Darktrace and Cado said the new campaign highlights a shift towards alternative methods of mining cryptocurrencies
Malware ★★★
InfoSecurityMag.webp 2025-04-18 08:30:00 La blizzard de minuit cible les diplomates européens avec un leurre de phishing au goût de vin
Midnight Blizzard Targets European Diplomats with Wine Tasting Phishing Lure
(lien direct)
L'acteur d'État russe Midnight Blizzard utilise de faux événements de dégustation de vin comme leurre pour répandre les logiciels malveillants à des fins d'espionnage, selon Check Point
Russian state actor Midnight Blizzard is using fake wine tasting events as a lure to spread malware for espionage purposes, according to Check Point
Malware ★★
InfoSecurityMag.webp 2025-04-15 14:15:00 Les pirates nord-coréens exploitent LinkedIn pour infecter les développeurs de cryptographie avec des infosteaux
North Korean Hackers Exploit LinkedIn to Infect Crypto Developers with Infostealers
(lien direct)
Se faisant passer pour des employeurs potentiels, les pirates de poissons lents cachent des logiciels malveillants dans les défis de codage envoyés aux développeurs de crypto-monnaie sur LinkedIn
Posing as potential employers, Slow Pisces hackers conceal malware in coding challenges sent to cryptocurrency developers on LinkedIn
Malware Threat ★★★
InfoSecurityMag.webp 2025-04-14 13:00:00 Nouveau malware Resolverrat cible les secteurs des soins de santé et de la pharmacie
New Malware ResolverRAT Targets Healthcare and Pharma Sectors
(lien direct)
Resolverrat cible les organisations de soins de santé utilisant des techniques d'évasion avancées et l'ingénierie sociale
ResolverRAT targets healthcare organizations using advanced evasion techniques and social engineering
Malware Medical ★★★
InfoSecurityMag.webp 2025-04-10 13:00:00 Spynote malware cible les utilisateurs d'Android avec de fausses pages de lecture Google
SpyNote Malware Targets Android Users with Fake Google Play Pages
(lien direct)
Une nouvelle campagne de logiciels malveillants Android utilise de fausses pages de lecture Google pour distribuer le Spynote Trojan
A new Android malware campaign uses fake Google Play pages to distribute the SpyNote Trojan
Malware Mobile ★★★
InfoSecurityMag.webp 2025-04-10 08:30:00 Opération Endgame se poursuit avec les arrestations de clients SmokeLoader
Operation Endgame Continues with Smokeloader Customer Arrests
(lien direct)
La police a procédé à plus d'arrestations dans l'opération en cours de fin de partie, réprimandant les clients malveillants
Police have made more arrests in the ongoing Operation Endgame, cracking down on malware customers
Malware Legislation ★★
InfoSecurityMag.webp 2025-04-03 13:00:00 Le piratage amateur exploite le serveur d'hébergement russe à l'épreuve des balles pour répandre les logiciels malveillants
Amateur Hacker Leverages Russian Bulletproof Hosting Server to Spread Malware
(lien direct)
Le cybercrimiral utilise le service de Proton66, un tristement célèbre fournisseur d'hébergement à l'épreuve des balles basée en Russie, pour déployer des logiciels malveillants
The cybercriminal uses the service of Proton66, an infamous Russian-based bulletproof hosting provider, to deploy malware
Malware ★★★
InfoSecurityMag.webp 2025-03-31 15:45:00 Nouvelle variante malware Resurge exploite ivanti vulnérabilité
New Malware Variant RESURGE Exploits Ivanti Vulnerability
(lien direct)
La CISA recommande une action immédiate pour lutter contre les variants de logiciels malveillants Resurge exploitant la vulnérabilité Ivanti CVE-2025-0282
CISA recommends immediate action to address malware variant RESURGE exploiting Ivanti vulnerability CVE-2025-0282
Malware Vulnerability ★★★
InfoSecurityMag.webp 2025-03-27 16:45:00 Coodeloder Maleware Loader lié aux opérations de smokeloader
CoffeeLoader Malware Loader Linked to SmokeLoader Operations
(lien direct)
Coffeeoader nouvellement identifié utilise plusieurs techniques d'évasion et mécanismes de persistance pour déployer des charges utiles et contourner la sécurité des points de terminaison
Newly identified CoffeeLoader uses multiple evasion techniques and persistence mechanisms to deploy payloads and bypass endpoint security
Malware ★★★
InfoSecurityMag.webp 2025-03-27 16:00:00 Pjobrat malware cible les utilisateurs de Taiwan via de fausses applications
PJobRAT Malware Targets Users in Taiwan via Fake Apps
(lien direct)
Pjobrat malware cible les utilisateurs d'Android de Taiwan, volant des données via de fausses plates-formes de messagerie
PJobRAT malware targets Taiwan Android users, stealing data through fake messaging platforms
Malware Mobile ★★★
InfoSecurityMag.webp 2025-03-26 13:30:00 Les packages NPM malveillants offrent des coquilles inverses sophistiquées
Malicious npm Packages Deliver Sophisticated Reverse Shells
(lien direct)
Une campagne de logiciels malveillants nouvellement découverte utilise des packages NPM malveillants pour déployer des coquilles inversées, compromettant les environnements de développement
A newly discovered malware campaign uses malicious npm packages to deploy reverse shells, compromising development environments
Malware ★★★
InfoSecurityMag.webp 2025-03-25 17:15:00 Un nouveau malware Android utilise .net Maui pour échapper à la détection
New Android Malware Uses .NET MAUI to Evade Detection
(lien direct)
Les chercheurs de McAfee ont identifié une nouvelle vague de campagnes de logiciels malveillants Android en tirant parti de .Net Maui pour voler des informations d'utilisateurs sensibles via de fausses applications
McAfee researchers have identified a new wave of Android malware campaigns leveraging .NET MAUI to steal sensitive user information through fake apps
Malware Mobile ★★★
InfoSecurityMag.webp 2025-03-18 15:30:00 Le chercheur en sécurité prouve que les outils Genai peuvent développer des infostenteurs Google Chrome
Security Researcher Proves GenAI Tools Can Develop Google Chrome Infostealers
(lien direct)
Un chercheur Cato Networks a découvert une nouvelle technique de jailbreak LLM permettant la création de logiciels malveillants voleurs de mot de passe
A Cato Networks researcher discovered a new LLM jailbreaking technique enabling the creation of password-stealing malware
Malware Tool ★★★
InfoSecurityMag.webp 2025-03-13 15:00:00 \Ret
\\'ClickFix\\' Phishing Scam Impersonates Booking.com to Target Hospitality
(lien direct)
Microsoft a déclaré que la campagne de phishing en cours est conçue pour infecter les entreprises hôtelières avec plusieurs logiciels malveillants de vol d'identification
Microsoft said the ongoing phishing campaign is designed to infect hospitality firms with multiple credential-stealing malware
Malware ★★★
InfoSecurityMag.webp 2025-03-12 14:00:00 Implant de pirates chinois MALWORIAUX DE BARDOOR SUR LES ROUTEURS JUNIPER
Chinese Hackers Implant Backdoor Malware on Juniper Routers
(lien direct)
Mandiant a révélé que l'acteur d'espionnage chinois UNC3886 a déployé des versions modifiées de la porte dérobée Tinyshell sur plusieurs routeurs OS Juniper
Mandiant revealed that Chinese espionage actor UNC3886 has deployed modified versions of the TinyShell backdoor across multiple Juniper OS routers
Malware ★★
InfoSecurityMag.webp 2025-03-10 10:30:00 Développeur du Texas condamné après Kill Switch Sabotage Terrain
Texas Developer Convicted After Kill Switch Sabotage Plot
(lien direct)
Le développeur de logiciels Davis Lu a coûté à son employeur des centaines de milliers après avoir déployé des logiciels malveillants qui ont provoqué des accidents et des connexions échouées
Software developer Davis Lu cost his employer hundreds of thousands after deploying malware that caused crashes and failed logins
Malware ★★★
InfoSecurityMag.webp 2025-03-04 16:30:00 Une nouvelle campagne de cyber-espionnage cible l'aviation et le transport des EAU
New Cyber-Espionage Campaign Targets UAE Aviation and Transport
(lien direct)
Une campagne de cyber-espionnage ciblant l'aviation et le transport des EAU a été identifiée par des chercheurs, en utilisant des leurres personnalisés pour déployer des logiciels malveillants Sosano
A cyber-espionage campaign targeting UAE aviation and transport has been identified by researchers, using customized lures to deploy Sosano malware
Malware ★★
InfoSecurityMag.webp 2025-03-03 16:30:00 Les attaquants exploitent les équipes Microsoft et l'assistance rapide pour l'accès
Attackers Leverage Microsoft Teams and Quick Assist for Access
(lien direct)
PHIGHISS ATTACH exploite les techniques d'ingénierie sociale aux côtés d'équipes Microsoft et de logiciels d'accès à distance pour déployer des logiciels malveillants en arrière-plan
Phishing attack exploits social engineering techniques alongside Microsoft Teams and remote access software to deploy BackConnect malware
Malware ★★★
InfoSecurityMag.webp 2025-02-27 16:00:00 Les logiciels malveillants WinOS 4.0 ciblent Taiwan avec une usurpation d'identité de courrier électronique
Winos 4.0 Malware Targets Taiwan With Email Impersonation
(lien direct)
Les logiciels malveillants WinOS 4.0 utilisent des e-mails de phishing pour cibler les organisations à Taiwan, les experts Fortinet avertissent
Winos 4.0 malware uses phishing emails to target organizations in Taiwan, Fortinet experts warn
Malware ★★
InfoSecurityMag.webp 2025-02-25 13:40:00 Plantes de renard argenté soutenues par le chinois dans les réseaux de soins de santé
Chinese-Backed Silver Fox Plants Backdoors in Healthcare Networks
(lien direct)
ForeScout a observé le groupe de piratage chinois récemment identifié à l'aide d'applications logicielles d'imagerie médicale pour fournir des logiciels malveillants
Forescout observed the recently identified Chinese hacking group using medical imaging software applications to deliver malware
Malware Medical ★★★
InfoSecurityMag.webp 2025-02-20 16:30:00 Malicious Ads Target Freelance Developers via GitHub (lien direct) Fake job ads target freelance developers, spreading malware via GitHub
Fake job ads target freelance developers, spreading malware via GitHub
Malware ★★
InfoSecurityMag.webp 2025-02-18 15:00:00 Mustang Panda Leverages Microsoft Tools to Bypass Anti-Virus Solutions (lien direct) Trend Micro found that Chinese espionage group Mustang Panda is deploying malware via legitimate Microsoft tools, enabling it to bypass ESET antivirus applications
Trend Micro found that Chinese espionage group Mustang Panda is deploying malware via legitimate Microsoft tools, enabling it to bypass ESET antivirus applications
Malware Tool Prediction ★★★
InfoSecurityMag.webp 2025-02-17 14:30:00 Microsoft Detects New XCSSET MacOS Malware Variant (lien direct) Microsoft has observed a new variant of XCSSET, a sophisticated macOS malware that infects Xcode projects
Microsoft has observed a new variant of XCSSET, a sophisticated macOS malware that infects Xcode projects
Malware ★★★
InfoSecurityMag.webp 2025-02-17 11:15:00 Telegram Used as C2 Channel for New Golang Malware (lien direct) A Golang backdoor is using Telegram as its command and control (C2) channel, an approach that makes detection harder for defenders, according to Netskope researchers
A Golang backdoor is using Telegram as its command and control (C2) channel, an approach that makes detection harder for defenders, according to Netskope researchers
Malware ★★★
InfoSecurityMag.webp 2025-02-13 10:15:00 North Korea Targets Crypto Devs Through NPM Packages (lien direct) SecurityScorecard has uncovered a sophisticated campaign linked to North Korea\'s Lazarus Group, distributing crypto-stealing malware
SecurityScorecard has uncovered a sophisticated campaign linked to North Korea\'s Lazarus Group, distributing crypto-stealing malware
Malware APT 38 ★★★
InfoSecurityMag.webp 2025-02-10 17:15:00 BadIIS Malware Exploits IIS Servers for SEO Fraud (lien direct) Trend Micro uncovers BadIIS malware exploiting IIS servers for SEO fraud and malicious redirects
Trend Micro uncovers BadIIS malware exploiting IIS servers for SEO fraud and malicious redirects
Malware Prediction ★★★
InfoSecurityMag.webp 2025-02-05 14:00:00 Mobile Malware Targeting Indian Banks Exposes 50,000 Users (lien direct) Indian banking malware attack exposes 50,000 users, stealing financial data via SMS interception and phishing
Indian banking malware attack exposes 50,000 users, stealing financial data via SMS interception and phishing
Malware Mobile ★★★
InfoSecurityMag.webp 2025-02-05 10:30:00 Cybercriminals Eye DeepSeek, Alibaba LLMs for Malware Development (lien direct) Check Point has observed cybercriminals toy with Alibaba\'s Qwen LLM to develop infostealers
Check Point has observed cybercriminals toy with Alibaba\'s Qwen LLM to develop infostealers
Malware ★★
InfoSecurityMag.webp 2025-02-04 14:30:00 DaggerFly-Linked Linux Malware Targets Network Appliances (lien direct) DaggerFly\'s Lunar Peek campaign is using a new malware strain, identified by FortiGuard Labs, to compromise Linux networks
DaggerFly\'s Lunar Peek campaign is using a new malware strain, identified by FortiGuard Labs, to compromise Linux networks
Malware ★★★
InfoSecurityMag.webp 2025-02-04 14:00:00 Threefold Increase in Malware Targeting Credential Stores (lien direct) Picus Security reports infostealer surge after revealing credentials appear in 29% of malware
Picus Security reports infostealer surge after revealing credentials appear in 29% of malware
Malware ★★★
InfoSecurityMag.webp 2025-01-29 16:00:00 Nation-State Hackers Abuse Gemini AI Tool (lien direct) Google highlighted significant abuse of its Gemini LLM tool by nation state actors to support malicious activities, including research and malware development
Google highlighted significant abuse of its Gemini LLM tool by nation state actors to support malicious activities, including research and malware development
Malware Tool ★★★
InfoSecurityMag.webp 2025-01-24 12:15:00 Russian Scammers Target Crypto Influencers with Infostealers (lien direct) Crazy Evil, a group of crypto scammers, exploit NFTs and cryptocurrencies with malware targeting influencers and tech professionals
Crazy Evil, a group of crypto scammers, exploit NFTs and cryptocurrencies with malware targeting influencers and tech professionals
Malware Threat ★★★
InfoSecurityMag.webp 2025-01-23 11:30:00 New GhostGPT AI Chatbot Facilitates Malware Creation and Phishing (lien direct) Cybercriminals are selling access to the malicious GenAI chatbot via Telegram, providing rapid assistance for a range of nefarious activities, according to Abnormal Security
Cybercriminals are selling access to the malicious GenAI chatbot via Telegram, providing rapid assistance for a range of nefarious activities, according to Abnormal Security
Malware ★★★
InfoSecurityMag.webp 2025-01-21 17:00:00 New Mirai Malware Variant Targets AVTECH Cameras, Huawei Routers (lien direct) Murdoc_Botnet used Mirai malware to exploit IoT vulnerabilities, targeting devices globally
Murdoc_Botnet used Mirai malware to exploit IoT vulnerabilities, targeting devices globally
Malware Vulnerability Threat ★★★
InfoSecurityMag.webp 2025-01-16 09:01:00 Hackers Use Image-Based Malware and GenAI to Evade Email Security (lien direct) HP Wolf highlighted novel techniques used by attackers to bypass email protections, including embedding malicious code inside images and utilizing GenAI
HP Wolf highlighted novel techniques used by attackers to bypass email protections, including embedding malicious code inside images and utilizing GenAI
Malware ★★★
InfoSecurityMag.webp 2025-01-15 14:00:00 Chinese PlugX Malware Deleted in Global Law Enforcement Operation (lien direct) The FBI deleted Chinese PlugX malware from thousands of devices in the US, using a technique developed by French cybersecurity firm Sekoia.io
The FBI deleted Chinese PlugX malware from thousands of devices in the US, using a technique developed by French cybersecurity firm Sekoia.io
Malware Legislation ★★★
InfoSecurityMag.webp 2025-01-14 15:00:00 Browser-Based Cyber-Threats Surge as Email Malware Declines (lien direct) Browser-based cyber-threats surged in 2024, with credential abuse and infostealers on the rise
Browser-based cyber-threats surged in 2024, with credential abuse and infostealers on the rise
Malware ★★★
InfoSecurityMag.webp 2025-01-13 16:30:00 Russian Malware Campaign Hits Central Asian Diplomatic Files (lien direct) Diplomatic entities in Kazakhstan and Central Asia have been targeted by UAC-0063 using weaponized Word docs deploying HATVIBE malware
Diplomatic entities in Kazakhstan and Central Asia have been targeted by UAC-0063 using weaponized Word docs deploying HATVIBE malware
Malware ★★★
InfoSecurityMag.webp 2025-01-13 13:00:00 New Ransomware Group Uses AI to Develop Nefarious Tools (lien direct) Researchers at Check Point said FunkSec operators appear to use AI for malware development
Researchers at Check Point said FunkSec operators appear to use AI for malware development
Ransomware Malware Tool ★★★
InfoSecurityMag.webp 2025-01-06 11:10:00 New Infostealer Campaign Uses Discord Videogame Lure (lien direct) Threat actors are tricking victims into downloading malware with the promise of testing a new videogame
Threat actors are tricking victims into downloading malware with the promise of testing a new videogame
Malware Threat ★★★
InfoSecurityMag.webp 2025-01-02 17:15:00 Global Campaign Targets PlugX Malware with Innovative Portal (lien direct) Sekoia\'s innovative PlugX malware disinfection campaign removed active threats across ten countries
Sekoia\'s innovative PlugX malware disinfection campaign removed active threats across ten countries
Malware ★★
InfoSecurityMag.webp 2024-12-23 16:30:00 Cryptomining Malware Found in Popular Open Source Packages (lien direct) Cryptomining malware hits popular npm packages rspack and vant, posing risks to open source tools
Cryptomining malware hits popular npm packages rspack and vant, posing risks to open source tools
Malware Tool ★★
InfoSecurityMag.webp 2024-12-20 11:20:00 Webcams and DVRs Vulnerable to HiatusRAT, FBI Warns (lien direct) The FBI has issued a warning about the Hiatus RAT malware targeting Xiongmai and Hikvision web cameras and DVRs, urging users isolate these devices from networks
The FBI has issued a warning about the Hiatus RAT malware targeting Xiongmai and Hikvision web cameras and DVRs, urging users isolate these devices from networks
Malware ★★★
InfoSecurityMag.webp 2024-12-19 14:00:00 New Malware Can Kill Engineering Processes in ICS Environments (lien direct) Forescout identified a new type of malware capable of terminating engineering processes, used to target Siemens engineering workstations
Forescout identified a new type of malware capable of terminating engineering processes, used to target Siemens engineering workstations
Malware Industrial ★★
Last update at: 2025-05-10 12:07:58
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter