What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Blog.webp 2025-01-24 16:19:52 Hackers Use XWorm RAT to Exploit Script Kiddies, Pwning 18,000 Devices (lien direct) Crooks pwning crooks – Hackers exploit script kiddies with XWorm RAT, compromising 18,000+ devices globally and stealing sensitive…
Crooks pwning crooks – Hackers exploit script kiddies with XWorm RAT, compromising 18,000+ devices globally and stealing sensitive…
Threat ★★
Blog.webp 2025-01-22 20:35:23 Zendesk\\'s Subdomain Registration Exposed to Phishing, Pig Butchering Scams (lien direct) CloudSEK uncovers a Zendesk vulnerability allowing cybercriminals to exploit subdomains for phishing and investment scams. Learn about the…
CloudSEK uncovers a Zendesk vulnerability allowing cybercriminals to exploit subdomains for phishing and investment scams. Learn about the…
Vulnerability Threat ★★
Blog.webp 2025-01-22 18:07:54 Cloudflare Mitigates Massive 5.6 Tbps Mirai-Variant DDoS Attack (lien direct) Cloudflare mitigates a record-breaking 5.6 Tbps DDoS attack, highlighting the growing threat of hyper-volumetric assaults. Learn about the…
Cloudflare mitigates a record-breaking 5.6 Tbps DDoS attack, highlighting the growing threat of hyper-volumetric assaults. Learn about the…
Threat ★★★★
Blog.webp 2025-01-16 09:18:02 Scammers Exploit California Wildfires, Posing as Fire Relief Services (lien direct) Cybercriminals are exploiting the California wildfires by launching phishing scams. Learn how hackers are targeting victims with fake domains and deceptive tactics, and how to protect yourself from these cyber threats.
Cybercriminals are exploiting the California wildfires by launching phishing scams. Learn how hackers are targeting victims with fake domains and deceptive tactics, and how to protect yourself from these cyber threats.
Threat ★★★
Blog.webp 2025-01-14 13:03:02 Hackers Using Fake YouTube Links to Steal Login Credentials (lien direct) Cybercriminals exploit fake YouTube links to redirect users to phishing pages, stealing login credentials via URI manipulation and…
Cybercriminals exploit fake YouTube links to redirect users to phishing pages, stealing login credentials via URI manipulation and…
Threat ★★★
Blog.webp 2025-01-13 11:22:47 Hackers Breach Telefonica Network, Leak 2.3 GB of Data Online (lien direct) Telefónica faces a data breach impacting its internal systems, linked to hackers using compromised credentials. Learn more about this alarming cyber threat.
Telefónica faces a data breach impacting its internal systems, linked to hackers using compromised credentials. Learn more about this alarming cyber threat.
Data Breach Threat ★★★
Blog.webp 2025-01-11 13:47:03 Fake PoC Exploit Targets Cybersecurity Researchers with Malware (lien direct) A fake proof-of-concept (PoC) exploit designed to lure cybersecurity researchers into downloading malicious software. This deceptive tactic leverages a recently patched critical vulnerability in Microsoft\'s Windows LDAP service (CVE-2024-49113), which can cause denial-of-service attacks.
A fake proof-of-concept (PoC) exploit designed to lure cybersecurity researchers into downloading malicious software. This deceptive tactic leverages a recently patched critical vulnerability in Microsoft\'s Windows LDAP service (CVE-2024-49113), which can cause denial-of-service attacks.
Malware Vulnerability Threat ★★★
Blog.webp 2025-01-09 18:16:49 Harnessing AI for Proactive Threat Intelligence and Advanced Cyber Defense (lien direct) Discover how AI revolutionizes cybersecurity with real-time threat detection, adaptive protection, and advanced data protection to combat evolving…
Discover how AI revolutionizes cybersecurity with real-time threat detection, adaptive protection, and advanced data protection to combat evolving…
Threat ★★★
Blog.webp 2025-01-02 18:39:30 Fake 7-Zip Exploit Code Traced to AI-Generated Misinterpretation (lien direct) A recent claim that a critical zero-day vulnerability existed in the popular open-source file archiver 7-Zip has been met with skepticism from the software\'s creator and other security researchers.
A recent claim that a critical zero-day vulnerability existed in the popular open-source file archiver 7-Zip has been met with skepticism from the software\'s creator and other security researchers.
Vulnerability Threat ★★★
Blog.webp 2024-12-28 15:52:01 FICORA, CAPSAICIN Botnets Exploit Old D-Link Router Flaws for DDoS Attacks (lien direct) Mirai and Keksec botnet variants are exploiting critical vulnerabilities in D-Link routers. Learn about the impact, affected devices, and how to protect yourself from these attacks.
Mirai and Keksec botnet variants are exploiting critical vulnerabilities in D-Link routers. Learn about the impact, affected devices, and how to protect yourself from these attacks.
Vulnerability Threat ★★
Blog.webp 2024-12-26 10:58:01 Researchers Uncover Dark Web Operation Entirely Focused on KYC Bypass (lien direct) iProov uncovers a major Dark Web operation selling stolen identities with matching biometrics, posing a serious threat to KYC verification systems
iProov uncovers a major Dark Web operation selling stolen identities with matching biometrics, posing a serious threat to KYC verification systems
Threat ★★
Blog.webp 2024-12-25 22:24:39 SEO Poisoning: How Cybercriminals Are Turning Search Engines into Traps (lien direct) Stay protected from SEO poisoning, a cyber threat exploiting search engine rankings to spread malware and phishing scams.…
Stay protected from SEO poisoning, a cyber threat exploiting search engine rankings to spread malware and phishing scams.…
Malware Threat ★★
Blog.webp 2024-12-23 20:06:03 Lazarus Group Targets Nuclear Industry with CookiePlus Malware (lien direct) KEY SUMMARY POINTS Securelist by Kaspersky has published its latest threat intelligence report focused on the activities of…
KEY SUMMARY POINTS Securelist by Kaspersky has published its latest threat intelligence report focused on the activities of…
Malware Threat APT 38 ★★★★
Blog.webp 2024-12-17 14:12:35 Hackers Use Fake PoCs on GitHub to Steal WordPress Credentials, AWS Keys (lien direct) SUMMARY Datadog Security Labs\' cybersecurity researchers have discovered a new, malicious year-long campaign from a threat actor identified…
SUMMARY Datadog Security Labs\' cybersecurity researchers have discovered a new, malicious year-long campaign from a threat actor identified…
Threat ★★
Blog.webp 2024-12-12 19:33:38 US Sanctions Chinese Cybersecurity Firm for Firewall Exploit, Ransomware Attacks (lien direct) SUMMARY The United States has taken strong action against a Chinese cybersecurity company, Sichuan Silence Information Technology, for…
SUMMARY The United States has taken strong action against a Chinese cybersecurity company, Sichuan Silence Information Technology, for…
Ransomware Threat ★★★
Blog.webp 2024-12-12 13:10:09 Scammers Exploit Fake Domains in Dubai Police Phishing Scams (lien direct) BforeAI has discovered a surge in phishing attacks targeting the Dubai Police, a government-run entity. Learn how cybercriminals are exploiting the Dubai Police name to steal personal information and money.
BforeAI has discovered a surge in phishing attacks targeting the Dubai Police, a government-run entity. Learn how cybercriminals are exploiting the Dubai Police name to steal personal information and money.
Threat Legislation ★★★
Blog.webp 2024-12-10 14:57:28 Hackers Target Job Seekers with AppLite Trojan Using Fake Job Emails (lien direct) SUMMARY AppLite banking trojan is a newly discovered stealthy mobile malware threat targeting mobile devices. Learn about its…
SUMMARY AppLite banking trojan is a newly discovered stealthy mobile malware threat targeting mobile devices. Learn about its…
Malware Threat Mobile ★★★
Blog.webp 2024-12-09 21:36:14 Critical Windows Zero-Day Alert: No Patch Available Yet for Users (lien direct) Protect your systems with automated patching and server hardening strategies to defend against vulnerabilities like the NTLM zero-day.…
Protect your systems with automated patching and server hardening strategies to defend against vulnerabilities like the NTLM zero-day.…
Vulnerability Threat Patching ★★★★
Blog.webp 2024-12-05 13:46:51 “aiocpa” Python Package Exposed as Cryptocurrency Infostealer (lien direct) SUMMARY The machine learning-based threat-hunting system of leading threat intelligence and cybersecurity firm ReversingLabs (RL) recently detected malicious…
SUMMARY The machine learning-based threat-hunting system of leading threat intelligence and cybersecurity firm ReversingLabs (RL) recently detected malicious…
Threat ★★
Blog.webp 2024-12-03 01:03:36 How Attackers Use Corrupted Files to Slip Past Security (lien direct) New zero-day attack bypasses antivirus, sandboxes, and spam filters using corrupted files. Learn how ANY.RUN\'s sandbox detects and…
New zero-day attack bypasses antivirus, sandboxes, and spam filters using corrupted files. Learn how ANY.RUN\'s sandbox detects and…
Spam Vulnerability Threat ★★
Blog.webp 2024-11-27 16:15:07 Russian Hackers Exploit Firefox and Windows 0-Days to Deploy Backdoor (lien direct) Watch out for the Russian hackers from the infamous RomRom group, also known as Storm-0978, Tropical Scorpius, or UNC2596, and their use of a custom backdoor.
Watch out for the Russian hackers from the infamous RomRom group, also known as Storm-0978, Tropical Scorpius, or UNC2596, and their use of a custom backdoor.
Threat ★★
Blog.webp 2024-11-22 18:31:26 Operation Lunar Peek: More Than 2,000 Palo Alto Network Firewalls Hacked (lien direct) The Shadowserver Foundation reports over 2,000 Palo Alto Networks firewalls have been hacked via two zero-day vulnerabilities: CVE-2024-0012…
The Shadowserver Foundation reports over 2,000 Palo Alto Networks firewalls have been hacked via two zero-day vulnerabilities: CVE-2024-0012…
Vulnerability Threat ★★★
Blog.webp 2024-11-20 14:44:14 Hackers Exploit Misconfigured Jupyter Servers for Illegal Sports Streaming (lien direct) Aqua Nautilus\' research reveals hackers are leveraging vulnerable and misconfigured Jupyter Notebook servers to steal live sports streams.…
Aqua Nautilus\' research reveals hackers are leveraging vulnerable and misconfigured Jupyter Notebook servers to steal live sports streams.…
Threat ★★
Blog.webp 2024-11-12 22:00:14 Microsoft\\'s November Patch Tuesday Fixes 91 Vulnerabilities, 4 Zero-Days (lien direct) Microsoft\'s November 2024 Patch Tuesday update fixes 91 security vulnerabilities, including four zero-day vulnerabilities. Critical fixes address actively…
Microsoft\'s November 2024 Patch Tuesday update fixes 91 security vulnerabilities, including four zero-day vulnerabilities. Critical fixes address actively…
Vulnerability Threat ★★
Blog.webp 2024-11-11 00:02:57 L\\\\\\\\\\\'importance d\\\\\\\\\\\'une réponse efficace sur les incidents [L\\\\\\\\\\\'importance d\\\\\\\\\\\'une réponse efficace sur les incidents ] (lien direct) Avec des menaces de cybersécurité en évolution continue, un plan de réponse aux incidents (IR) (IR) est crucial pour les entreprises de tous…
With cybersecurity threats continuously evolving, having a strong incident response (IR) plan is crucial for businesses of all…
Threat ★★★
Blog.webp 2024-11-08 17:13:26 Les pirates peuvent accéder aux commandes de véhicules Mazda via les vulnérabilités du système
Hackers Can Access Mazda Vehicle Controls Via System Vulnerabilities
(lien direct)
Les pirates peuvent exploiter les vulnérabilités critiques dans le système d'infodivertissement de Mazda \\, y compris une qui permet l'exécution de code via USB, compromettant & # 8230;
Hackers can exploit critical vulnerabilities in Mazda\'s infotainment system, including one that enables code execution via USB, compromising…
Vulnerability Threat ★★★
Blog.webp 2024-11-01 00:32:10 Un guide étape par étape sur le fonctionnement de la chasse aux menaces
A Step-by-Step Guide to How Threat Hunting Works
(lien direct)
Restez en avance sur la cybercriminalité avec une chasse aux menaces proactive.Découvrez comment les chasseurs de menaces identifient les menaces cachées, protégez les systèmes critiques, & # 8230;
Stay ahead of cybercrime with proactive threat hunting. Learn how threat hunters identify hidden threats, protect critical systems,…
Threat ★★★
Blog.webp 2024-10-26 12:00:38 Une nouvelle attaque permet aux pirates de rétrograder Windows pour exploiter les défauts corrigés
New Attack Lets Hackers Downgrade Windows to Exploit Patched Flaws
(lien direct)
SafeBreach Labs dévoile & # 8216; Windows DownDate, & # 8217;une nouvelle méthode d'attaque qui compromet Windows 11 en rétrogradant les composants du système, et & # 8230;
SafeBreach Labs unveils ‘Windows Downdate,’ a new attack method which compromises Windows 11 by downgrading system components, and…
Threat ★★
Blog.webp 2024-10-25 12:03:48 UNC5820 exploite la vulnérabilité de Fortimanager (CVE-2024-47575)
UNC5820 Exploits FortiManager Zero-Day Vulnerability (CVE-2024-47575)
(lien direct)
Fortinet et Mandiant ont étudié l'exploitation de masse des dispositifs Fortimanager via CVE-2024-47575, ce qui concerne plus de 50 systèmes dans toutes les industries.Menace & # 8230;
Fortinet and Mandiant investigated the mass exploitation of FortiManager devices via CVE-2024-47575, impacting 50+ systems across industries. Threat…
Vulnerability Threat ★★
Blog.webp 2024-10-24 17:38:25 Le groupe Lazarus exploite Chrome 0-Day pour la crypto avec un faux jeu NFT
Lazarus Group Exploits Chrome 0-Day for Crypto with Fake NFT Game
(lien direct)
Les pirates nord-coréens du groupe Lazare ont exploité une vulnérabilité zéro-jour dans Google Chrome pour cibler les investisseurs de crypto-monnaie avec & # 8230;
North Korean hackers from Lazarus Group exploited a zero-day vulnerability in Google Chrome to target cryptocurrency investors with…
Vulnerability Threat APT 38 ★★
Blog.webp 2024-10-14 13:25:10 Les défauts zéro-jours ont exposé des chargeurs EV aux arrêts et vols de données
Zero-day Flaws Exposed EV Chargers to Shutdowns and Data Theft
(lien direct)
Les experts du groupe NCC partagent les détails de la façon dont ils ont exploité les vulnérabilités critiques du zéro-jour dans les chargeurs EV Contact EV (Electric & # 8230;
NCC Group experts share details of how they exploited critical zero-day vulnerabilities in Phoenix Contact EV chargers (electric…
Vulnerability Threat ★★
Blog.webp 2024-10-09 10:18:42 Les escrocs ont frappé les victimes d'ouragans de Floride avec de fausses réclamations FEMA, fichiers malveillants
Scammers Hit Florida Hurricane Victims with Fake FEMA Claims, Malware Files
(lien direct)
Les cybercriminels exploitent les efforts de secours en cas de catastrophe pour cibler des individus et des organisations vulnérables en Floride, compromettant l'intégrité du relief & # 8230;
Cybercriminals exploit disaster relief efforts to target vulnerable individuals and organizations in Florida, compromising the integrity of relief…
Malware Threat ★★
Blog.webp 2024-10-08 15:38:16 Lua malware ciblant les joueurs d'étudiants via de faux tricheurs de jeu
Lua Malware Targeting Student Gamers via Fake Game Cheats
(lien direct)
Les laboratoires de menace Morphisec découvrent sophistiqué Lua malware ciblant les joueurs et les établissements d'enseignement.Apprenez comment ces attaques fonctionnent & # 8230;
Morphisec Threat Labs uncovers sophisticated Lua malware targeting student gamers and educational institutions. Learn how these attacks work…
Malware Threat ★★★
Blog.webp 2024-10-08 11:24:51 L'acteur de menace de la tempête-1575 déploie de nouveaux panneaux de connexion pour les infrastructures de phishing
Storm-1575 Threat Actor Deploys New Login Panels for Phishing Infrastructure
(lien direct)
Le groupe Storm-1575 est connu pour renommer fréquemment son infrastructure de phishing.Récemment, Any.Run analystes a identifié le déploiement de & # 8230;
The Storm-1575 group is known for frequently rebranding its phishing infrastructure. Recently, ANY.RUN analysts identified the deployment of…
Threat ★★★
Blog.webp 2024-10-03 18:45:04 Any.run améliore l'intelligence des menaces pour identifier les menaces émergentes
ANY.RUN Upgrades Threat Intelligence to Identify Emerging Threats
(lien direct)
Dubaï Silicon Oasis, Émirats arabes unis, 3 octobre 2024, CyberNewswire
Dubai Silicon Oasis, United Arab Emirates, 3rd October 2024, CyberNewsWire
Threat ★★★
Blog.webp 2024-09-25 14:53:59 DragonForce Ransomware étend Raas, cible les entreprises du monde entier
DragonForce Ransomware Expands RaaS, Targets Firms Worldwide
(lien direct)
DragonForce Ransomware élargit son opération RAAS et devient une menace mondiale de cybersécurité contre les entreprises du monde entier.Les entreprises doivent & # 8230;
DragonForce ransomware is expanding its RaaS operation and becoming a global cybersecurity threat against businesses worldwide. Companies must…
Ransomware Threat ★★
Blog.webp 2024-09-19 13:14:21 US Sanctions Intellexa Spyware Network sur la menace de sécurité nationale
US Sanctions Intellexa Spyware Network Over Threat to National Security
(lien direct)
Le Trésor américain sanctionne le consortium Intellexa et les chiffres clés pour distribuer des logiciels espions prédateurs, une sécurité nationale sérieuse & # 8230;
The U.S. Treasury sanctions the Intellexa Consortium and key figures for distributing Predator spyware, a serious national security…
Threat ★★★
Blog.webp 2024-09-11 18:38:02 Les pirates de dragon chinois exploitent les serveurs Windows mondiaux dans la fraude du référencement
Chinese DragonRank Hackers Exploit Global Windows Servers in SEO Fraud
(lien direct)
Dragonrank, un groupe de piratage de langue chinois, a compromis plus de 30 serveurs Windows à l'échelle mondiale.Ils exploitent IIS des vulnérabilités pour manipuler le référencement & # 8230;
DragonRank, a Chinese-speaking hacking group, has compromised 30+ Windows servers globally. They exploit IIS vulnerabilities to manipulate SEO…
Vulnerability Threat ★★★
Blog.webp 2024-08-30 13:26:41 APT29 russe à l'aide d'exploits de style groupe NSO dans les attaques, Google
Russian APT29 Using NSO Group-Style Exploits in Attacks, Google
(lien direct)
Le groupe d'analyse des menaces de Google (TAG) a exposé une nouvelle campagne par APT29 soutenue par l'État russe, également connu sous le nom de Cozy & # 8230;
Google\'s Threat Analysis Group (TAG) has exposed a new campaign by Russian state-backed APT29, also known as Cozy…
Threat APT 29 ★★
Blog.webp 2024-08-27 11:37:11 Broisée de données TDECU: plus de 500 000 membres affectés par Moveit Exploit
TDECU Data Breach: 500,000+ Members Affected by MOVEit Exploit
(lien direct)
TDECU rapporte une violation de données affectant plus de 500 000 membres en raison d'une vulnérabilité Moveit.Les données compromises comprennent le social & # 8230;
TDECU reports a data breach affecting over 500,000 members due to a MOVEit vulnerability. Compromised data includes Social…
Data Breach Vulnerability Threat ★★★
Blog.webp 2024-08-20 22:49:25 De nouvelles attaques de phishing ciblent les utilisateurs de la Banque d'Europe de l'Est sur iOS et Android
New Phishing Attacks Target Eastern European Bank Users on iOS and Android
(lien direct)
Les cybercriminels exploitent les applications Web progressives (PWAS) dans la dernière arnaque de phishing, ciblant les utilisateurs mobiles en Tzechie, en Hongrie et & # 8230;
Cybercriminals exploit Progressive Web Apps (PWAs) in the latest phishing scam, targeting mobile users in Czechia, Hungary, and…
Threat Mobile ★★★
Blog.webp 2024-08-20 16:25:16 Todoswift Malware cible MacOS, déguisé en application Bitcoin PDF
TodoSwift Malware Targets macOS, Disguised as Bitcoin PDF App
(lien direct)
Rencontrez Todoswift, une application malveillante qui se masque en tant que téléchargeur PDF.Fabriqué par le Bluenoroff Threat Group, Todoswift Leverage & # 8230;
Meet TodoSwift, a malicious application that masquerades as a PDF downloader. Crafted by the BlueNoroff threat group, TodoSwift leverages…
Malware Threat ★★★
Blog.webp 2024-08-20 12:34:38 Les pirates pourraient exploiter les équipes Microsoft sur MacOS pour voler des données
Hackers Could Exploit Microsoft Teams on macOS to Steal Data
(lien direct)
Cisco Talos révèle 8 vulnérabilités dans les applications MacOS de Microsoft, exploitant les faiblesses du framework TCC.Les pirates peuvent contourner la sécurité, injecter & # 8230;
Cisco Talos reveals 8 vulnerabilities in Microsoft’s macOS apps, exploiting TCC framework weaknesses. Hackers can bypass security, inject…
Vulnerability Threat ★★★
Blog.webp 2024-08-12 14:01:09 La Criminal IP et Maltego collaborent pour élargir la recherche de données de renseignement sur les menaces
Criminal IP and Maltego Collaborate to Broaden Threat Intelligence Data Search
(lien direct)
Torrance, États-Unis / Californie, 12 août 2024, CyberNewswire
Torrance, United States / California, 12th August 2024, CyberNewsWire
Threat ★★
Blog.webp 2024-08-08 17:37:13 Black Hat USA 2024: Chip Flaw \\ 'Ghostwrite \\' vole les données de la mémoire du processeur
Black Hat USA 2024: Chip Flaw \\'GhostWrite\\' Steals Data from CPU Memory
(lien direct)
Black Hat USA 2024: Vulnérabilité critique RISC-V CPU découverte.Surnommé Ghostwrite;Les attaquants peuvent exploiter cette faille pour voler & # 8230;
Black Hat USA 2024: Critical RISC-V CPU vulnerability discovered. Dubbed GhostWrite; attackers can exploit this flaw to steal…
Vulnerability Threat ★★★
Blog.webp 2024-08-07 21:26:22 Protocole Nexera Defi piraté: 1,8 million de dollars volés dans les principaux contrats intelligents Exploit
Nexera DeFi Protocol Hacked: $1.8M Stolen in Major Smart Contract Exploit
(lien direct)
Découvrez comment une vulnérabilité de contrat intelligent a conduit au vol de 1,8 million de dollars de Nexera, un protocole Defi. & # 8230;
Learn how a smart contract vulnerability led to the theft of $1.8 million from Nexera, a DeFi protocol.…
Vulnerability Threat ★★★
Blog.webp 2024-08-02 16:47:03 Les nouveaux cahiers Jupyter DDOS Panamorfi exploits
New Panamorfi DDoS Attack Exploits Misconfigured Jupyter Notebooks
(lien direct)
& # 8220; Panamorfi, & # 8221;Une nouvelle attaque DDOS, exploite Discord, Minecraft et Jupyter Notebooks.Les chercheurs en cybersécurité préviennent cette menace ciblant & # 8230;
“Panamorfi,” a new DDoS attack, exploits Discord, Minecraft, and Jupyter Notebooks. Cybersecurity researchers warn of this threat targeting…
Threat ★★★
Blog.webp 2024-07-30 00:24:10 Hacker Stracches et publie la liste IOC de 100 000 lignes
Hacker Scrapes and Publishes 100,000-Line CrowdStrike IoC List
(lien direct)
USDOD Hacker éraflue et fuit un indicateur de 100 000 lignes de la liste des compromis (CIO) de CrowdStrike, révélant une intelligence détaillée des menaces & # 8230;
USDoD hacker scrapes and leaks a 100,000-line Indicator of Compromise (IoC) list from CrowdStrike, revealing detailed threat intelligence…
Threat ★★
Blog.webp 2024-07-26 17:22:17 Les chercheurs mettent en garde contre l'augmentation de l'activité de cyberterrorisme ciblant les Jeux olympiques de Paris
Researchers Warn of Increased Cyberterrorism Activity Targeting Paris Olympics
(lien direct)
Le cyberterrorisme est en augmentation, constituant une menace importante pour les événements mondiaux comme les Jeux olympiques et les élections de Paris, & # 8230;
Cyberterrorism is on the rise, posing a significant threat to global events like the Paris Olympics and elections,…
Threat ★★★
Blog.webp 2024-07-22 17:57:53 Télégramme Android Vulnérabilité «Evilvideo» envoie des logiciels malveillants sous forme de vidéos
Telegram Android Vulnerability “EvilVideo” Sends Malware as Videos
(lien direct)
Evilvideo Exploit in Telegram pour Android permet aux attaquants d'envoyer des logiciels malveillants déguisés en vidéos.ESET a découvert cette vulnérabilité zéro-jour, & # 8230;
EvilVideo exploit in Telegram for Android lets attackers send malware disguised as videos. ESET discovered this zero-day vulnerability,…
Malware Vulnerability Threat Mobile ★★★
Last update at: 2025-05-12 18:07:55
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter