What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
SC_Mag.webp 2023-01-13 00:51:10 Old Intel driver vulnerability exploited to evade security systems (lien direct) The Scattered Spider threat operation has been engaging in a Bring Your Own Vulnerable Driver attack exploiting an old high-severity Intel Ethernet diagnostics driver flaw to bypass endpoint detection and response systems, according to BleepingComputer. Vulnerability Threat ★★
SC_Mag.webp 2023-01-13 00:35:48 Repurposable nature of Raspberry Robin detailed (lien direct) Numerous threat actors could repurpose Raspberry Robin, also known as QNAP worm, for their own attacks, reports The Hacker News. Threat
SC_Mag.webp 2023-01-08 16:31:17 New tools, infection chain part of Blind Eagle comeback (lien direct) Colombia- and Ecuador-based organizations are being targeted by the Spanish-speaking threat group Blind Eagle, also known as APT-C-36, which has reemerged with a strengthened toolset and infection chain, The Hacker News reports. Threat APT-C-36 ★★
SC_Mag.webp 2023-01-05 17:26:49 New malware campaign exploits Windows error reporting tool (lien direct) K7 Security Labs reports that unidentified threat actors are using a DLL sideloading technique to deploy malware into victims' systems after gaining entry through abuse of the Windows Problem Reporting tool, according to BleepingComputer. Malware Tool Threat ★★
SC_Mag.webp 2023-01-05 17:25:15 Hacker offers to sell over 200 million compromised Twitter profiles (lien direct) A post by an unknown threat actor on the Breached hacking forum is allegedly offering a data set composed of 200 million compromised Twitter accounts for around $2, BleepingComputer reports. Threat ★★★
SC_Mag.webp 2023-01-05 16:32:52 Are threat actors gaining cloud skills faster than enterprises? (lien direct) In showing how threat actor group Automated Libra bypassed CAPTCHA, used freejacking techniques to set up phony cloud sites, and then leveraged DevOps to launch cryptomining attacks, security researchers point to the increased sophistication of the threat actors. Threat ★★
SC_Mag.webp 2023-01-04 16:50:24 Microsoft Macros: The sneaky threat looming in files (lien direct) Here are three good questions to ask that will help security teams get control of malicious macros. Threat ★★★
SC_Mag.webp 2023-01-04 12:42:26 Phishing campaign capitalizes on popularity of Flipper Zero (lien direct) Phishing campaign capitalizes on popularity of Flipper Zero BleepingComputer reports that threat actors have launched a new phishing campaign that exploits the growing number of people who are interested in the Flipper Zero cybersecurity tool. Threat ★★★
SC_Mag.webp 2023-01-03 23:13:07 Check Point, Intel to bolster ransomware defenses in processors (lien direct) SiliconAngle reports that Check Point Software Technologies has partnered with Intel to integrate the threat detection technology of the Intel vPro platform into its Check Point Harmony Endpoint, enabling stronger hardware- and software-level ransomware defenses. Ransomware Threat ★★
SC_Mag.webp 2023-01-03 23:07:21 Insights on disrupting cybercrime economics (lien direct) Disrupting threat actors' revenue streams is needed to combat cyberattacks, according to SiliconAngle. Threat ★★
SC_Mag.webp 2023-01-03 10:58:53 2023 threat predictions: Beware \'economic uncertainty\' for the cybersecurity community (lien direct) With 2023 in mind, the phrase “economic uncertainty” was often invoked in predictions from market leaders, and may be the mantra for security professionals decision making. Threat Guideline ★★★
SC_Mag.webp 2022-12-29 11:56:34 Malware increasingly spread through Google Ads exploits (lien direct) More threat actors have been distributing malware through fraudulent websites of widely used software products that are being promoted by exploiting the Google Ads platform, according to BleepingComputer. Malware Threat ★★
SC_Mag.webp 2022-12-23 12:56:06 Royal ransomware tied to Conti gang (lien direct) Former Conti Team One threat actors have been operating Royal ransomware, which has been used in a slew of cyberattacks between September and December, SecurityWeek reports. Ransomware Threat ★★
SC_Mag.webp 2022-12-21 19:59:49 Godfather uses \'web fakes\' to serve-up a \'banking trojan that\'s impossible to refuse\' (lien direct) Group-IB researchers say Godfather uses “web fakes” to lure victims and then drain their accounts; a link to Russian-speaking threat actors hinted. Threat ★★
SC_Mag.webp 2022-12-21 17:03:42 More cybercriminals leveraging RisePro info-stealing malware (lien direct) More than 2,000 logs have been noted by the cybercrime market Russian Market to have been stolen using the new RisePro information stealer, indicating its rising popularity among threat actors, SecurityWeek reports. Malware Threat ★★
SC_Mag.webp 2022-12-21 16:59:43 XLL files in Excel increasingly used for malicious activity (lien direct) Significantly more advanced persistent threat groups and malware families have adopted XLL files in Excel to serve as an initial vector following the adoption of the technique by the Dridex and Formbook commodity malware families last year, reports The Register. Malware Threat ★★
SC_Mag.webp 2022-12-20 17:49:05 Addressed macOS vulnerability enables malware evasion of security checks (lien direct) BleepingComputer reports that threat actors could exploit a macOS vulnerability to facilitate malware distribution without being detected by Gatekeeper through application execution restrictions. Malware Vulnerability Threat ★★★
SC_Mag.webp 2020-12-31 17:18:40 Financial services industry hit with tens of millions of attacks per day (lien direct) The report found that the bad threat actors primarily used common attack paths, such as SQL injection, local file inclusion and cross-site scripting. Threat
SC_Mag.webp 2020-12-24 18:21:52 DDoS attacks hit Citrix Application Delivery Controllers, hindering customer performance (lien direct) Citrix reported Thursday a DDoS attack that was hitting its Citrix Application Delivery Controllers (ADCs), the networking products that let security and network teams manage the delivery speed and quality of applications to end users. According to the Citrix threat advisory, the attacker or bots can overwhelm the Citrix ADC Datagram Transport Layer Security (DTLS)… Threat
Last update at: 2024-05-07 21:08:00
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter