What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
RecordedFuture.webp 2025-04-30 18:12:04 Les dommages-intérêts du groupe NSO dans WhatsApp Spyware pourraient être dans les dizaines de millions, \\ 'experts prédisent
NSO Group damages in WhatsApp spyware case could be in the \\'tens of millions,\\' experts predict
(lien direct)
Les dommages provenant de l'utilisation de l'outil de Pegasus du fabricant de logiciels spyware \\ du fabricant \\ pour pirater les appareils \\ 'de WhatsApp sont susceptibles d'être onéreux - mais il est peu probable que cela mette fin à son utilisation, ont déclaré les observateurs.
The damages stemming from the use of the Israeli spyware maker\'s Pegasus tool to hack into WhatsApp users\' devices are likely to be onerous - but unlikely to put an end to its use, observers said.
Hack Tool Prediction ★★★
RecordedFuture.webp 2025-04-29 17:13:46 WhatsApp dit que les outils AI dans l'application garderont toujours des messages secrètes
WhatsApp says in-app AI tools will still keep messages secret
(lien direct)
L'annonce coïncide avec les préoccupations publiques concernant la manière dont les fournisseurs de services d'IA peuvent accéder aux interactions des utilisateurs avec leurs outils, donnant potentiellement aux fournisseurs de matériel supplémentaire pour former leurs modèles.
The announcement coincides with public concerns about the ways in which AI service providers can access users\' interactions with their tools, potentially giving providers additional material to train their models.
Tool ★★
RecordedFuture.webp 2025-04-24 19:05:03 Les travailleurs informatiques nord-coréens ont vu des outils d'IA pour escroquer les entreprises pour les embaucher
North Korean IT workers seen using AI tools to scam firms into hiring them
(lien direct)
Les travailleurs informatiques nord-coréens obtiennent illicitement l'emploi dans les entreprises technologiques américaines et européennes utilisent de plus en plus l'intelligence artificielle générative de diverses façons pour les aider tout au long du processus de demande d'emploi et d'entrevue.
North Korean IT workers illicitly gaining employment at U.S. and European tech companies are increasingly using generative artificial intelligence in a variety of ways to assist them throughout the job application and interview process.
Tool ★★★
RecordedFuture.webp 2025-04-18 14:53:27 Une nouvelle arnaque de carte de paiement implique un appel téléphonique, des logiciels malveillants et un robinet personnel
New payment-card scam involves a phone call, some malware and a personal tap
(lien direct)
Une nouvelle arnaque de carte de paiement utilise des logiciels malveillants déguisés en outil de sécurité ou utilitaire de vérification pour capturer les détails de la carte et accéder aux fonds.
A new payment card scam uses malware disguised as a security tool or verification utility to capture card details and access funds.
Malware Tool ★★★
RecordedFuture.webp 2025-04-16 16:20:51 Plus de 100 000 informations ont été volées à Hertz via l'outil de partage de fichiers CLEO
More than 100,000 had information stolen from Hertz through Cleo file share tool
(lien direct)
Le géant de la location de voitures Hertz a informé les régulateurs d'État d'une violation de données qui s'est produite via un logiciel de partage de fichiers tiers. Des dizaines de milliers de personnes sont touchées, mais la société n'a pas spécifié un nombre total.
Car rental giant Hertz has been notifying state regulators of a data breach that occurred through third-party file sharing software. Tens of thousands of people are affected, but the company hasn\'t specified a total number.
Data Breach Tool ★★★
RecordedFuture.webp 2025-04-08 18:03:56 CISA, les experts mettent en garde contre les attaques de transfert de fichiers Crush alors que le gang de ransomware fait des menaces
CISA, experts warn of Crush file transfer attacks as ransomware gang makes threats
(lien direct)
Les fabricants de l'outil de transfert de fichiers populaire Crushftp affirment qu'une vulnérabilité divulguée de manière responsable dans le logiciel a été armé. La CISA et les cyber-chercheurs sonnent des sonnettes d'alarme.
The makers of the popular file transfer tool CrushFTP say a responsibly disclosed vulnerability in the software has been weaponized. CISA and cyber researchers are sounding alarm bells.
Ransomware Tool Vulnerability ★★
RecordedFuture.webp 2025-04-02 12:56:34 Paris prêt à organiser des négociations difficiles sur la lutte contre les outils de piratage commercial
Paris set to host difficult negotiations on tackling commercial hacking tools
(lien direct)
Cette semaine à Paris, l'initiative diplomatique anciennement connue sous le nom de processus Pall Mall continuera de rechercher un accord international sur les questions épineuses liées aux outils de piratage connus sous le nom de capacités commerciales de cyber-intrusion (CCIC).
This week in Paris, the diplomatic initiative formerly known as the Pall Mall Process will continue to look for international agreement on thorny issues related to hacking tools known as commercial cyber intrusion capabilities (CCICs).
Tool Commercial ★★★
RecordedFuture.webp 2025-03-31 18:26:36 Dernier gambit pour Gamaredon: Fake Ukraine Troop Movement Documents avec des liens malveillants
Latest gambit for Gamaredon: Fake Ukraine troop movement documents with malicious links
(lien direct)
Le groupe de piratage lié au Kremlin, Gamaredon, semble être à l'origine d'une récente campagne qui vise à installer une version malveillante de l'outil REMCOS sur les ordinateurs ukrainiens.
The Kremlin-linked hacking group Gamaredon appears to be behind a recent campaign that aims to install a malicious version of the Remcos tool on Ukrainian computers.
Tool ★★★
RecordedFuture.webp 2025-03-31 14:56:41 Le régulateur français amene la pomme 162 millions de dollars pour l'utilisation anticoncurrentielle de l'outil de confidentialité
French regulator fines Apple $162 million for anticompetitive use of privacy tool
(lien direct)
L'autorité de compétition française a constaté qu'Apple a exploité sa domination sur le marché de la publicité des applications mobiles via un outil qui permet aux utilisateurs d'iPhone et d'iPad de déterminer quand les applications peuvent surveiller leur activité en ligne.
The French Competition Authority found that Apple exploited its dominance in the mobile app advertising market through a tool that allows iPhone and iPad users to determine when apps can monitor their online activity.
Tool Mobile ★★★
RecordedFuture.webp 2025-03-17 23:24:41 Crypto Exchange Okx Arrête l'outil utilisé par les pirates nord-coréens pour blanchir des fonds volés
Crypto exchange OKX shuts down tool used by North Korean hackers to launder stolen funds
(lien direct)
OKX a déclaré avoir détecté un effort coordonné de l'une des tenues de piratage les plus prolifiques de la Corée du Nord pour abuser de ses services de finance (DEFI) décentralisés.
OKX said it detected a coordinated effort by one of North Korea\'s most prolific hacking outfits to misuse its decentralized finance (DeFi) services.
Tool ★★★
RecordedFuture.webp 2025-03-17 20:36:44 GitHub restaure le code après des modifications malveillantes de l'outil TJ-Actionn
GitHub restores code following malicious changes to tj-actions tool
(lien direct)
Github a été contraint de prendre des mesures ce week-end pour aider les utilisateurs après qu'un acteur de menace a compromis un package open source populaire utilisé par plus de 23 000 organisations.
GitHub was forced to take action this weekend to help users after a threat actor compromised a popular open source package used by more than 23,000 organizations.
Tool Threat ★★★
RecordedFuture.webp 2025-03-10 16:35:47 SIBITEUR SUPPOSSION DE BINANCE SPAM
Scam spoofs Binance website and uses TRUMP coin as lure for malware
(lien direct)
Les chercheurs de la société de défense de phishing Cofense disent que les pirates diffusent un outil d'accès à distance malveillant via une fausse page de binance qui offre un accès à la pièce Trump.
Researchers at phishing defense company Cofense say hackers are spreading a malicious remote access tool through a fake Binance page that offers access to the TRUMP coin.
Malware Tool ★★★
RecordedFuture.webp 2025-03-04 13:51:25 Dark Caracal Group a peut-être actualisé ses logiciels malveillants, disent les chercheurs
Dark Caracal group might have refreshed its malware, researchers say
(lien direct)
Dark Caracal, un groupe soupçonné d'activités de cyber-mercenaire, a semblé se déplacer vers un nouvel outil d'espionnage dans une campagne destinée aux cibles latino-américaines, selon les chercheurs.
Dark Caracal, a group suspected of cyber mercenary activities, appeared to shift to a new espionage tool in a campaign aimed at Latin American targets, according to researchers.
Malware Tool ★★★
RecordedFuture.webp 2025-02-27 18:51:51 Microsoft nomme les développeurs derrière des outils d'IA illicites utilisés dans le schéma de célébrités Deepfake
Microsoft names developers behind illicit AI tools used in celebrity deepfake scheme
(lien direct)
Microsoft a sorti quatre développeurs étrangers et deux développeurs américains qui ont déclaré illicitement les services d'IA - y compris les propres sociétés - dans un programme de célébrités Deepfake.
Microsoft outed four foreign and two U.S. developers who it said illicitly used AI services - including the company\'s own - in a celebrity deepfake scheme.
Tool ★★★
RecordedFuture.webp 2025-02-07 22:17:56 Hackers exploiting bug in popular Trimble Cityworks tool used by local gov\\'ts (lien direct) Federal civilian agencies have been ordered to patch a vulnerability impacting Trimble Cityworks - a popular tool used by many governments to manage public infrastructure.
Federal civilian agencies have been ordered to patch a vulnerability impacting Trimble Cityworks - a popular tool used by many governments to manage public infrastructure.
Tool Vulnerability ★★★
RecordedFuture.webp 2025-02-06 22:02:54 Lawmakers push for DeepSeek ban from federal devices over China concerns (lien direct) Rep. Josh Gottheimer (D-N.J.) called the emergence of DeepSeek\'s AI tools "a five alarm national security fire.”
Rep. Josh Gottheimer (D-N.J.) called the emergence of DeepSeek\'s AI tools "a five alarm national security fire.”
Tool ★★
RecordedFuture.webp 2025-02-05 02:28:20 Researchers warn of risks tied to abandoned cloud storage buckets (lien direct) Cloud storage tools used by military, government and even cybersecurity organizations around the world have been left abandoned by their users, exposing them to a wide variety of security risks.
Cloud storage tools used by military, government and even cybersecurity organizations around the world have been left abandoned by their users, exposing them to a wide variety of security risks.
Tool Cloud ★★★
RecordedFuture.webp 2025-01-31 17:16:12 Italy blocks Chinese AI tool DeepSeek over privacy concerns (lien direct) Italy\'s data protection authority on Thursday announced it has banned DeepSeek from operating in the country after the Chinese artificial intelligence company told regulators it does not fall under the purview of European data privacy laws.
Italy\'s data protection authority on Thursday announced it has banned DeepSeek from operating in the country after the Chinese artificial intelligence company told regulators it does not fall under the purview of European data privacy laws.
Tool ★★★
RecordedFuture.webp 2025-01-31 15:17:53 Pakistan-based cybercrime network dismantled by US, Dutch authorities (lien direct) Law enforcement seized dozens of domains linked to a group known as Saim Raza, or HeartSender, which has been selling hacking tools since at least 2020.
Law enforcement seized dozens of domains linked to a group known as Saim Raza, or HeartSender, which has been selling hacking tools since at least 2020.
Tool Legislation ★★
RecordedFuture.webp 2025-01-28 20:23:35 Prosecutors say they can\\'t obtain murder conviction after judge throws out evidence from facial recognition match (lien direct) An Ohio judge threw out key evidence in a murder case earlier this month because the prosecution improperly relied on facial recognition technology, highlighting the limitations of a tool being widely adopted by police departments across the country.
An Ohio judge threw out key evidence in a murder case earlier this month because the prosecution improperly relied on facial recognition technology, highlighting the limitations of a tool being widely adopted by police departments across the country.
Tool Legislation ★★★
RecordedFuture.webp 2025-01-27 18:33:23 Brazil bans iris scan company co-founded by Sam Altman from paying citizens for biometric data (lien direct) Brazil\'s National Data Protection Authority (ANPD) is blocking Tools for Humanity - a company co-founded by OpenAI\'s Sam Altman - from offering individuals cryptocurrency in return for iris scans intended for an online identity program.
Brazil\'s National Data Protection Authority (ANPD) is blocking Tools for Humanity - a company co-founded by OpenAI\'s Sam Altman - from offering individuals cryptocurrency in return for iris scans intended for an online identity program.
Tool ★★★
RecordedFuture.webp 2025-01-21 19:40:15 Disciplinary and special ed records of Toronto students may have leaked in PowerSchool breach (lien direct) The data breach at the educational software company may affect millions of students at Toronto public schools - one of thousands of districts using PowerSchool tools.
The data breach at the educational software company may affect millions of students at Toronto public schools - one of thousands of districts using PowerSchool tools.
Data Breach Tool ★★★
RecordedFuture.webp 2025-01-13 18:18:00 \\'Codefinger\\' hackers encrypting Amazon cloud storage buckets (lien direct) On several occasions recently, hackers have gone after Amazon Web Services\' cloud storage products known as S3 buckets and used the company\'s own encryption tools to lock customers out of their data.
On several occasions recently, hackers have gone after Amazon Web Services\' cloud storage products known as S3 buckets and used the company\'s own encryption tools to lock customers out of their data.
Tool Cloud ★★★
RecordedFuture.webp 2025-01-02 19:56:51 Hackers target dozens of VPN and AI extensions for Google Chrome to compromise data (lien direct) As of Wednesday, a total of 36 Chrome extensions injected with data-stealing code have been detected, mostly related to artificial intelligence tools and virtual private networks.
As of Wednesday, a total of 36 Chrome extensions injected with data-stealing code have been detected, mostly related to artificial intelligence tools and virtual private networks.
Tool ★★
RecordedFuture.webp 2024-12-23 19:32:18 North Korean hackers spotted using new tools on employees of \\'nuclear-related\\' org (lien direct) Researchers at Kaspersky said they found the Lazarus Group using “a complex infection chain that included multiple types of malware, such as a downloader, loader, and backdoor, demonstrating the group\'s evolved delivery and improved persistence methods.”
Researchers at Kaspersky said they found the Lazarus Group using “a complex infection chain that included multiple types of malware, such as a downloader, loader, and backdoor, demonstrating the group\'s evolved delivery and improved persistence methods.”
Malware Tool APT 38 ★★
RecordedFuture.webp 2024-12-18 01:31:04 CISA orders federal agencies to secure Microsoft cloud systems after \\'recent\\' intrusions (lien direct) The Cybersecurity and Infrastructure Security Agency (CISA) issued a binding directive on Tuesday giving federal agencies a series of deadlines to identify cloud systems, implement assessment tools and abide by the agency\'s Secure Cloud Business Applications (SCuBA) secure configuration baselines.
The Cybersecurity and Infrastructure Security Agency (CISA) issued a binding directive on Tuesday giving federal agencies a series of deadlines to identify cloud systems, implement assessment tools and abide by the agency\'s Secure Cloud Business Applications (SCuBA) secure configuration baselines.
Tool Cloud ★★★
RecordedFuture.webp 2024-12-12 13:32:59 For Russian spies, existing cybercrime tools become avenues into Ukrainian military devices (lien direct) A Kremlin-backed group tracked as Secret Blizzard or Turla recently used existing cybercrime infrastructure for an espionage campaign aimed at Ukrainian military devices.
A Kremlin-backed group tracked as Secret Blizzard or Turla recently used existing cybercrime infrastructure for an espionage campaign aimed at Ukrainian military devices.
Tool ★★
RecordedFuture.webp 2024-12-11 20:38:30 Chinese provincial security teams used spyware to collect texts, audio recordings (lien direct) The researchers said development of the EagleMsgSpy tool has continued throughout 2024, with the company behind it adding new capabilities and obfuscation features.
The researchers said development of the EagleMsgSpy tool has continued throughout 2024, with the company behind it adding new capabilities and obfuscation features.
Tool ★★★
RecordedFuture.webp 2024-12-05 21:18:49 US org with \\'significant presence in China\\' targeted by hackers, Symantec says (lien direct) The cybersecurity firm did not name the company but said the attack was “likely carried out by a China-based threat actor, since some of the tools used in this attack have been previously associated with Chinese attackers.”
The cybersecurity firm did not name the company but said the attack was “likely carried out by a China-based threat actor, since some of the tools used in this attack have been previously associated with Chinese attackers.”
Tool Threat ★★★
RecordedFuture.webp 2024-12-05 18:39:10 Russian state hackers abuse Cloudflare services to spy on Ukrainian targets (lien direct) The group known as Gamaredon has been observed using Cloudflare Tunnels - a tool that helps hide the real location of servers or infrastructure - to infect their targets with custom GammaDrop malware and stay undetected.
The group known as Gamaredon has been observed using Cloudflare Tunnels - a tool that helps hide the real location of servers or infrastructure - to infect their targets with custom GammaDrop malware and stay undetected.
Malware Tool ★★
RecordedFuture.webp 2024-11-19 14:55:45 Testimony from NSO Group raises questions about its culpability for spyware abuses (lien direct) Recently released court documents appear to show that spyware maker NSO Group plays a greater role in loading its surveillance tools onto targets\' devices than previously understood.
Recently released court documents appear to show that spyware maker NSO Group plays a greater role in loading its surveillance tools onto targets\' devices than previously understood.
Tool ★★★
RecordedFuture.webp 2024-11-13 15:31:47 Bitdefender releases decryptor for ShrinkLocker ransomware (lien direct) The decryptor targets a novel ransomware strain that has emerged in the last year and exploits the legitimate BitLocker tool to encrypt devices. Ransomware Tool ★★
RecordedFuture.webp 2024-11-04 01:36:00 Google utilise un modèle grand langage pour découvrir la vulnérabilité du monde réel
Google uses large language model to discover real-world vulnerability
(lien direct)
Vendredi, dans un article de blog, Google a déclaré qu'il pensait que le bogue est le premier exemple public d'un outil d'IA trouvant un problème de sécurité de mémoire exploitable auparavant inconnu dans des logiciels largement utilisés.
In a blog post on Friday, Google said it believes the bug is the first public example of an AI tool finding a previously unknown exploitable memory-safety issue in widely used real-world software.
Tool Vulnerability ★★★
RecordedFuture.webp 2024-10-28 12:19:07 Free, la deuxième plus grande entreprise de télécommunications de France \\, confirme d'être touchée par Cyberattack
Free, France\\'s second-largest telecoms company, confirms being hit by cyberattack
(lien direct)
Free, basée à Paris, a déclaré que des intrus ciblaient un outil de gestion interne et que l'accès non autorisé impliquait «des données personnelles associées aux comptes de certains abonnés».
Paris-based Free said intruders targeted an internal management tool and that the unauthorized access involved “personal data associated with the accounts of certain subscribers.”
Tool ★★★
RecordedFuture.webp 2024-10-24 20:42:17 CFPB avertit l'industrie contre la surveillance numérique \\ 'profondément invasive \\'
CFPB warns industry against \\'deeply invasive\\' workplace digital surveillance
(lien direct)
Les entreprises qui utilisent des tiers pour analyser et compiler les informations récoltées à partir de badges numériques, d'intelligence artificielle et d'autres outils de surveillance électronique du lieu de travail pourraient violer la Fair Credit Reporting Act (FCRA), selon de nouvelles directives émises par l'agence.
Companies that use third parties to analyze and compile information harvested from digital badges, artificial intelligence and other electronic workplace surveillance tools could be violating the Fair Credit Reporting Act (FCRA), according to new guidance issued by the agency.
Tool ★★★
RecordedFuture.webp 2024-10-17 15:44:12 Les plans de reconnaissance faciale de Kroger ont suscité des préoccupations croissantes des législateurs
Kroger\\'s facial recognition plans draw increasing concern from lawmakers
(lien direct)
Les plans de Kroger pour déployer des outils de reconnaissance faciale dans ses épiceries attirent les critiques accrues de la part des législateurs, qui avertissent qu'il pourrait être exploité pour augmenter les prix que certaines personnes paient pour la nourriture et mettent des données personnelles en danger.
Kroger\'s plans to roll out facial recognition tools at its grocery stores is attracting increased criticism from lawmakers, who warn that it could be exploited to increase the prices certain individuals pay for food and put customers\' personal data at risk.
Tool ★★★
RecordedFuture.webp 2024-10-08 15:17:22 Les pirates à soutenir l'État \\ 'GoldenJackal \\' déploient de nouveaux outils contre des entités gouvernementales
State-backed \\'GoldenJackal\\' hackers deploy new tools against government entities
(lien direct)
Les objectifs du groupe parrainé par l'État comprennent une ambassade d'Asie du Sud au Biélorussie et une organisation gouvernementale sans nom de l'Union européenne, selon un rapport publié lundi par la société de cybersécurité basée en Slovaquie ESET.
The state-sponsored group\'s targets include a South Asian embassy in Belarus and an unnamed European Union government organization, according to a report published Monday by Slovakia-based cybersecurity firm ESET.
Tool ★★★
RecordedFuture.webp 2024-10-08 01:05:40 Industrie de la cyber-fraude d'Asie du Sud-Est \\ 'Overpacing \\' Application de la loi avec de nouveaux outils: Un
Southeast Asian cyber-fraud industry \\'outpacing\\' law enforcement with new tools: UN
(lien direct)
Les groupes criminels transnationaux en Asie du Sud-Est intègrent de nouveaux outils tels que l'intelligence artificielle et la technologie DeepFake pour étendre leurs capacités de cyber-fraude, a déclaré lundi le bureau des Nations Unies sur la drogue et le crime.
Transnational criminal groups in Southeast Asia are incorporating new tools like artificial intelligence and deepfake technology to expand their cyber fraud capabilities, the United Nations Office on Drugs and Crime said Monday.
Tool Legislation ★★★
RecordedFuture.webp 2024-08-12 13:02:48 La Grande-Bretagne et la France pour discuter de l'utilisation abusive des outils commerciaux de cyber-intrusion
Britain and France to discuss misuse of commercial cyber intrusion tools
(lien direct)
Pas de details / No more details Tool Commercial ★★
RecordedFuture.webp 2024-07-18 13:50:00 Comment un outil peu connu balaie l'industrie immobilière en donnant un accès instantané à de grandes quantités de données d'acheteurs de maison
How a little-known tool is sweeping the real estate industry by giving instant access to vast amounts of homebuyer data
(lien direct)
Pas de details / No more details Tool ★★★
RecordedFuture.webp 2024-07-18 12:21:48 Le nouveau groupe de pirates utilise des outils open source pour espionner les entités de la région Asie-Pacifique
New hacker group uses open-source tools to spy on entities in Asia-Pacific region
(lien direct)
Pas de details / No more details Tool ★★★
RecordedFuture.webp 2024-07-17 16:56:57 Les pirates Fin7 liés à la Russie vendent leur outil d'évasion de sécurité à d'autres groupes sur DarkNet
Russia-linked FIN7 hackers sell their security evasion tool to other groups on darknet
(lien direct)
Pas de details / No more details Tool ★★
RecordedFuture.webp 2024-07-10 18:24:30 Les chercheurs russes identifient un développeur ukrainien présumé d'outil d'accès à distance malveillant
Russian researchers identify alleged Ukrainian developer of malicious remote access tool
(lien direct)
Pas de details / No more details Tool ★★★
RecordedFuture.webp 2024-07-03 15:24:52 Strike de Cobalt: l'opération internationale de l'application des lois s'attaque aux utilisations illégales de \\ 'Swiss Army Knife \\' Pentest Tool
Cobalt Strike: International law enforcement operation tackles illegal uses of \\'Swiss army knife\\' pentesting tool
(lien direct)
Pas de details / No more details Tool Legislation ★★★
RecordedFuture.webp 2024-04-26 16:20:45 Les outils de suivi du site Web de Kaiser \\ ont peut-être compromis des données sur 13 millions de clients
Kaiser\\'s website tracking tools may have compromised data on 13 million customers
(lien direct)
Pas de details / No more details Tool ★★★
RecordedFuture.webp 2024-04-22 21:16:14 Crushftp exhorte les clients à corriger l'outil de transfert de fichiers \\ 'ASAP \\'
CrushFTP urges customers to patch file transfer tool \\'ASAP\\'
(lien direct)
Pas de details / No more details Tool ★★★
RecordedFuture.webp 2024-04-17 19:17:10 \\ 'brut \\' outils de ransomware proliférant sur le Web sombre pour pas cher, les chercheurs trouvent
\\'Crude\\' ransomware tools proliferating on the dark web for cheap, researchers find
(lien direct)
Pas de details / No more details Ransomware Tool ★★
RecordedFuture.webp 2024-04-09 00:37:43 La FCC ouvre une réglementation à la sonde de la voiture connectée
FCC opens rulemaking to probe connected car stalking
(lien direct)
La Federal Communications Commission (FCC) a annoncé lundi qu'elle lançait une procédure officielle pour étudier les moyens d'empêcher les agresseurs d'utiliser des outils de connectivité automobile pour harceler les survivants de la violence domestique.L'agence a déclaré avoir publié un avis de réglementation proposée qui abritera comment s'assurer que les constructeurs automobiles et les services sans fil
The Federal Communications Commission (FCC) announced Monday that it is launching a formal proceeding to study ways to prevent abusers from using car connectivity tools to harass domestic violence survivors. The agency said it has issued a notice of proposed rulemaking which will home in on how to make sure automakers and wireless service
Tool Studies ★★
RecordedFuture.webp 2024-04-04 17:04:16 Les cybercriminels répartissent les logiciels malveillants à travers les pages Facebook imitant les marques d'IA
Cybercriminals are spreading malware through Facebook pages impersonating AI brands
(lien direct)
Les cybercriminels prennent le contrôle des pages Facebook et les utilisent pour annoncer de faux logiciels d'intelligence artificielle générative chargés de logiciels malveillants. & Nbsp;Selon des chercheurs de la société de cybersécurité Bitdefender, les CyberCrooks profitent de la popularité des nouveaux outils génératifs d'IA et utilisent «malvertising» pour usurper l'identité de produits légitimes comme MidJourney, Sora AI, Chatgpt 5 et
Cybercriminals are taking over Facebook pages and using them to advertise fake generative artificial intelligence software loaded with malware.  According to researchers at the cybersecurity company Bitdefender, the cybercrooks are taking advantage of the popularity of new generative AI tools and using “malvertising” to impersonate legitimate products like Midjourney, Sora AI, ChatGPT 5 and
Malware Tool ChatGPT ★★
RecordedFuture.webp 2024-03-29 20:28:35 Code de porte dérobée malveillant intégré à l'outil Linux populaire, CISA et Red Hat Warn
Malicious backdoor code embedded in popular Linux tool, CISA and Red Hat warn
(lien direct)
La société de logiciels Red Hat et la principale agence de cybersécurité de la nation \\ ont publié un avertissement du Vendredi Saint concernant le code malveillant intégré dans un outil Linux populaire.Le problème - tagué sous le nom de CVE-2024-3094 - affecte XZ Utils, un outil qui aide à compresser les formats de fichiers grands en plus petits plus gérables pour le partage via le transfert de fichiers.
The software company Red Hat and the nation\'s top cybersecurity agency released a Good Friday warning about malicious code being embedded in a popular Linux tool. The issue - tagged as CVE-2024-3094 - affects XZ Utils, a tool that helps compress large file formats into smaller more manageable ones for sharing via file transfer.
Tool ★★
Last update at: 2025-05-12 17:08:11
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter