Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
 |
2025-01-24 16:19:52 |
Hackers Use XWorm RAT to Exploit Script Kiddies, Pwning 18,000 Devices (lien direct) |
Crooks pwning crooks – Hackers exploit script kiddies with XWorm RAT, compromising 18,000+ devices globally and stealing sensitive…
Crooks pwning crooks – Hackers exploit script kiddies with XWorm RAT, compromising 18,000+ devices globally and stealing sensitive… |
Threat
|
|
★★
|
 |
2025-01-22 20:35:23 |
Zendesk\\'s Subdomain Registration Exposed to Phishing, Pig Butchering Scams (lien direct) |
CloudSEK uncovers a Zendesk vulnerability allowing cybercriminals to exploit subdomains for phishing and investment scams. Learn about the…
CloudSEK uncovers a Zendesk vulnerability allowing cybercriminals to exploit subdomains for phishing and investment scams. Learn about the… |
Vulnerability
Threat
|
|
★★
|
 |
2025-01-22 18:07:54 |
Cloudflare Mitigates Massive 5.6 Tbps Mirai-Variant DDoS Attack (lien direct) |
Cloudflare mitigates a record-breaking 5.6 Tbps DDoS attack, highlighting the growing threat of hyper-volumetric assaults. Learn about the…
Cloudflare mitigates a record-breaking 5.6 Tbps DDoS attack, highlighting the growing threat of hyper-volumetric assaults. Learn about the… |
Threat
|
|
★★★★
|
 |
2025-01-16 09:18:02 |
Scammers Exploit California Wildfires, Posing as Fire Relief Services (lien direct) |
Cybercriminals are exploiting the California wildfires by launching phishing scams. Learn how hackers are targeting victims with fake domains and deceptive tactics, and how to protect yourself from these cyber threats.
Cybercriminals are exploiting the California wildfires by launching phishing scams. Learn how hackers are targeting victims with fake domains and deceptive tactics, and how to protect yourself from these cyber threats. |
Threat
|
|
★★★
|
 |
2025-01-14 13:03:02 |
Hackers Using Fake YouTube Links to Steal Login Credentials (lien direct) |
Cybercriminals exploit fake YouTube links to redirect users to phishing pages, stealing login credentials via URI manipulation and…
Cybercriminals exploit fake YouTube links to redirect users to phishing pages, stealing login credentials via URI manipulation and… |
Threat
|
|
★★★
|
 |
2025-01-13 11:22:47 |
Hackers Breach Telefonica Network, Leak 2.3 GB of Data Online (lien direct) |
Telefónica faces a data breach impacting its internal systems, linked to hackers using compromised credentials. Learn more about this alarming cyber threat.
Telefónica faces a data breach impacting its internal systems, linked to hackers using compromised credentials. Learn more about this alarming cyber threat. |
Data Breach
Threat
|
|
★★★
|
 |
2025-01-11 13:47:03 |
Fake PoC Exploit Targets Cybersecurity Researchers with Malware (lien direct) |
A fake proof-of-concept (PoC) exploit designed to lure cybersecurity researchers into downloading malicious software. This deceptive tactic leverages a recently patched critical vulnerability in Microsoft\'s Windows LDAP service (CVE-2024-49113), which can cause denial-of-service attacks.
A fake proof-of-concept (PoC) exploit designed to lure cybersecurity researchers into downloading malicious software. This deceptive tactic leverages a recently patched critical vulnerability in Microsoft\'s Windows LDAP service (CVE-2024-49113), which can cause denial-of-service attacks. |
Malware
Vulnerability
Threat
|
|
★★★
|
 |
2025-01-09 18:16:49 |
Harnessing AI for Proactive Threat Intelligence and Advanced Cyber Defense (lien direct) |
Discover how AI revolutionizes cybersecurity with real-time threat detection, adaptive protection, and advanced data protection to combat evolving…
Discover how AI revolutionizes cybersecurity with real-time threat detection, adaptive protection, and advanced data protection to combat evolving… |
Threat
|
|
★★★
|
 |
2025-01-02 18:39:30 |
Fake 7-Zip Exploit Code Traced to AI-Generated Misinterpretation (lien direct) |
A recent claim that a critical zero-day vulnerability existed in the popular open-source file archiver 7-Zip has been met with skepticism from the software\'s creator and other security researchers.
A recent claim that a critical zero-day vulnerability existed in the popular open-source file archiver 7-Zip has been met with skepticism from the software\'s creator and other security researchers. |
Vulnerability
Threat
|
|
★★★
|
 |
2024-12-28 15:52:01 |
FICORA, CAPSAICIN Botnets Exploit Old D-Link Router Flaws for DDoS Attacks (lien direct) |
Mirai and Keksec botnet variants are exploiting critical vulnerabilities in D-Link routers. Learn about the impact, affected devices, and how to protect yourself from these attacks.
Mirai and Keksec botnet variants are exploiting critical vulnerabilities in D-Link routers. Learn about the impact, affected devices, and how to protect yourself from these attacks. |
Vulnerability
Threat
|
|
★★
|
 |
2024-12-26 10:58:01 |
Researchers Uncover Dark Web Operation Entirely Focused on KYC Bypass (lien direct) |
iProov uncovers a major Dark Web operation selling stolen identities with matching biometrics, posing a serious threat to KYC verification systems
iProov uncovers a major Dark Web operation selling stolen identities with matching biometrics, posing a serious threat to KYC verification systems |
Threat
|
|
★★
|
 |
2024-12-25 22:24:39 |
SEO Poisoning: How Cybercriminals Are Turning Search Engines into Traps (lien direct) |
Stay protected from SEO poisoning, a cyber threat exploiting search engine rankings to spread malware and phishing scams.…
Stay protected from SEO poisoning, a cyber threat exploiting search engine rankings to spread malware and phishing scams.… |
Malware
Threat
|
|
★★
|
 |
2024-12-23 20:06:03 |
Lazarus Group Targets Nuclear Industry with CookiePlus Malware (lien direct) |
KEY SUMMARY POINTS Securelist by Kaspersky has published its latest threat intelligence report focused on the activities of…
KEY SUMMARY POINTS Securelist by Kaspersky has published its latest threat intelligence report focused on the activities of… |
Malware
Threat
|
APT 38
|
★★★★
|
 |
2024-12-17 14:12:35 |
Hackers Use Fake PoCs on GitHub to Steal WordPress Credentials, AWS Keys (lien direct) |
SUMMARY Datadog Security Labs\' cybersecurity researchers have discovered a new, malicious year-long campaign from a threat actor identified…
SUMMARY Datadog Security Labs\' cybersecurity researchers have discovered a new, malicious year-long campaign from a threat actor identified… |
Threat
|
|
★★
|
 |
2024-12-12 19:33:38 |
US Sanctions Chinese Cybersecurity Firm for Firewall Exploit, Ransomware Attacks (lien direct) |
SUMMARY The United States has taken strong action against a Chinese cybersecurity company, Sichuan Silence Information Technology, for…
SUMMARY The United States has taken strong action against a Chinese cybersecurity company, Sichuan Silence Information Technology, for… |
Ransomware
Threat
|
|
★★★
|
 |
2024-12-12 13:10:09 |
Scammers Exploit Fake Domains in Dubai Police Phishing Scams (lien direct) |
BforeAI has discovered a surge in phishing attacks targeting the Dubai Police, a government-run entity. Learn how cybercriminals are exploiting the Dubai Police name to steal personal information and money.
BforeAI has discovered a surge in phishing attacks targeting the Dubai Police, a government-run entity. Learn how cybercriminals are exploiting the Dubai Police name to steal personal information and money. |
Threat
Legislation
|
|
★★★
|
 |
2024-12-10 14:57:28 |
Hackers Target Job Seekers with AppLite Trojan Using Fake Job Emails (lien direct) |
SUMMARY AppLite banking trojan is a newly discovered stealthy mobile malware threat targeting mobile devices. Learn about its…
SUMMARY AppLite banking trojan is a newly discovered stealthy mobile malware threat targeting mobile devices. Learn about its… |
Malware
Threat
Mobile
|
|
★★★
|
 |
2024-12-09 21:36:14 |
Critical Windows Zero-Day Alert: No Patch Available Yet for Users (lien direct) |
Protect your systems with automated patching and server hardening strategies to defend against vulnerabilities like the NTLM zero-day.…
Protect your systems with automated patching and server hardening strategies to defend against vulnerabilities like the NTLM zero-day.… |
Vulnerability
Threat
Patching
|
|
★★★★
|
 |
2024-12-05 13:46:51 |
“aiocpa” Python Package Exposed as Cryptocurrency Infostealer (lien direct) |
SUMMARY The machine learning-based threat-hunting system of leading threat intelligence and cybersecurity firm ReversingLabs (RL) recently detected malicious…
SUMMARY The machine learning-based threat-hunting system of leading threat intelligence and cybersecurity firm ReversingLabs (RL) recently detected malicious… |
Threat
|
|
★★
|
 |
2024-12-03 01:03:36 |
How Attackers Use Corrupted Files to Slip Past Security (lien direct) |
New zero-day attack bypasses antivirus, sandboxes, and spam filters using corrupted files. Learn how ANY.RUN\'s sandbox detects and…
New zero-day attack bypasses antivirus, sandboxes, and spam filters using corrupted files. Learn how ANY.RUN\'s sandbox detects and… |
Spam
Vulnerability
Threat
|
|
★★
|
 |
2024-11-27 16:15:07 |
Russian Hackers Exploit Firefox and Windows 0-Days to Deploy Backdoor (lien direct) |
Watch out for the Russian hackers from the infamous RomRom group, also known as Storm-0978, Tropical Scorpius, or UNC2596, and their use of a custom backdoor.
Watch out for the Russian hackers from the infamous RomRom group, also known as Storm-0978, Tropical Scorpius, or UNC2596, and their use of a custom backdoor. |
Threat
|
|
★★
|
 |
2024-11-22 18:31:26 |
Operation Lunar Peek: More Than 2,000 Palo Alto Network Firewalls Hacked (lien direct) |
The Shadowserver Foundation reports over 2,000 Palo Alto Networks firewalls have been hacked via two zero-day vulnerabilities: CVE-2024-0012…
The Shadowserver Foundation reports over 2,000 Palo Alto Networks firewalls have been hacked via two zero-day vulnerabilities: CVE-2024-0012… |
Vulnerability
Threat
|
|
★★★
|
 |
2024-11-20 14:44:14 |
Hackers Exploit Misconfigured Jupyter Servers for Illegal Sports Streaming (lien direct) |
Aqua Nautilus\' research reveals hackers are leveraging vulnerable and misconfigured Jupyter Notebook servers to steal live sports streams.…
Aqua Nautilus\' research reveals hackers are leveraging vulnerable and misconfigured Jupyter Notebook servers to steal live sports streams.… |
Threat
|
|
★★
|
 |
2024-11-12 22:00:14 |
Microsoft\\'s November Patch Tuesday Fixes 91 Vulnerabilities, 4 Zero-Days (lien direct) |
Microsoft\'s November 2024 Patch Tuesday update fixes 91 security vulnerabilities, including four zero-day vulnerabilities. Critical fixes address actively…
Microsoft\'s November 2024 Patch Tuesday update fixes 91 security vulnerabilities, including four zero-day vulnerabilities. Critical fixes address actively… |
Vulnerability
Threat
|
|
★★
|
 |
2024-11-11 00:02:57 |
L\\\\\\\\\\\'importance d\\\\\\\\\\\'une réponse efficace sur les incidents [L\\\\\\\\\\\'importance d\\\\\\\\\\\'une réponse efficace sur les incidents ] (lien direct) |
Avec des menaces de cybersécurité en évolution continue, un plan de réponse aux incidents (IR) (IR) est crucial pour les entreprises de tous…
With cybersecurity threats continuously evolving, having a strong incident response (IR) plan is crucial for businesses of all… |
Threat
|
|
★★★
|
 |
2024-11-08 17:13:26 |
Les pirates peuvent accéder aux commandes de véhicules Mazda via les vulnérabilités du système Hackers Can Access Mazda Vehicle Controls Via System Vulnerabilities (lien direct) |
Les pirates peuvent exploiter les vulnérabilités critiques dans le système d'infodivertissement de Mazda \\, y compris une qui permet l'exécution de code via USB, compromettant & # 8230;
Hackers can exploit critical vulnerabilities in Mazda\'s infotainment system, including one that enables code execution via USB, compromising… |
Vulnerability
Threat
|
|
★★★
|
 |
2024-11-01 00:32:10 |
Un guide étape par étape sur le fonctionnement de la chasse aux menaces A Step-by-Step Guide to How Threat Hunting Works (lien direct) |
Restez en avance sur la cybercriminalité avec une chasse aux menaces proactive.Découvrez comment les chasseurs de menaces identifient les menaces cachées, protégez les systèmes critiques, & # 8230;
Stay ahead of cybercrime with proactive threat hunting. Learn how threat hunters identify hidden threats, protect critical systems,… |
Threat
|
|
★★★
|
 |
2024-10-26 12:00:38 |
Une nouvelle attaque permet aux pirates de rétrograder Windows pour exploiter les défauts corrigés New Attack Lets Hackers Downgrade Windows to Exploit Patched Flaws (lien direct) |
SafeBreach Labs dévoile & # 8216; Windows DownDate, & # 8217;une nouvelle méthode d'attaque qui compromet Windows 11 en rétrogradant les composants du système, et & # 8230;
SafeBreach Labs unveils ‘Windows Downdate,’ a new attack method which compromises Windows 11 by downgrading system components, and… |
Threat
|
|
★★
|
 |
2024-10-25 12:03:48 |
UNC5820 exploite la vulnérabilité de Fortimanager (CVE-2024-47575) UNC5820 Exploits FortiManager Zero-Day Vulnerability (CVE-2024-47575) (lien direct) |
Fortinet et Mandiant ont étudié l'exploitation de masse des dispositifs Fortimanager via CVE-2024-47575, ce qui concerne plus de 50 systèmes dans toutes les industries.Menace & # 8230;
Fortinet and Mandiant investigated the mass exploitation of FortiManager devices via CVE-2024-47575, impacting 50+ systems across industries. Threat… |
Vulnerability
Threat
|
|
★★
|
 |
2024-10-24 17:38:25 |
Le groupe Lazarus exploite Chrome 0-Day pour la crypto avec un faux jeu NFT Lazarus Group Exploits Chrome 0-Day for Crypto with Fake NFT Game (lien direct) |
Les pirates nord-coréens du groupe Lazare ont exploité une vulnérabilité zéro-jour dans Google Chrome pour cibler les investisseurs de crypto-monnaie avec & # 8230;
North Korean hackers from Lazarus Group exploited a zero-day vulnerability in Google Chrome to target cryptocurrency investors with… |
Vulnerability
Threat
|
APT 38
|
★★
|
 |
2024-10-14 13:25:10 |
Les défauts zéro-jours ont exposé des chargeurs EV aux arrêts et vols de données Zero-day Flaws Exposed EV Chargers to Shutdowns and Data Theft (lien direct) |
Les experts du groupe NCC partagent les détails de la façon dont ils ont exploité les vulnérabilités critiques du zéro-jour dans les chargeurs EV Contact EV (Electric & # 8230;
NCC Group experts share details of how they exploited critical zero-day vulnerabilities in Phoenix Contact EV chargers (electric… |
Vulnerability
Threat
|
|
★★
|
 |
2024-10-09 10:18:42 |
Les escrocs ont frappé les victimes d'ouragans de Floride avec de fausses réclamations FEMA, fichiers malveillants Scammers Hit Florida Hurricane Victims with Fake FEMA Claims, Malware Files (lien direct) |
Les cybercriminels exploitent les efforts de secours en cas de catastrophe pour cibler des individus et des organisations vulnérables en Floride, compromettant l'intégrité du relief & # 8230;
Cybercriminals exploit disaster relief efforts to target vulnerable individuals and organizations in Florida, compromising the integrity of relief… |
Malware
Threat
|
|
★★
|
 |
2024-10-08 15:38:16 |
Lua malware ciblant les joueurs d'étudiants via de faux tricheurs de jeu Lua Malware Targeting Student Gamers via Fake Game Cheats (lien direct) |
Les laboratoires de menace Morphisec découvrent sophistiqué Lua malware ciblant les joueurs et les établissements d'enseignement.Apprenez comment ces attaques fonctionnent & # 8230;
Morphisec Threat Labs uncovers sophisticated Lua malware targeting student gamers and educational institutions. Learn how these attacks work… |
Malware
Threat
|
|
★★★
|
 |
2024-10-08 11:24:51 |
L'acteur de menace de la tempête-1575 déploie de nouveaux panneaux de connexion pour les infrastructures de phishing Storm-1575 Threat Actor Deploys New Login Panels for Phishing Infrastructure (lien direct) |
Le groupe Storm-1575 est connu pour renommer fréquemment son infrastructure de phishing.Récemment, Any.Run analystes a identifié le déploiement de & # 8230;
The Storm-1575 group is known for frequently rebranding its phishing infrastructure. Recently, ANY.RUN analysts identified the deployment of… |
Threat
|
|
★★★
|
 |
2024-10-03 18:45:04 |
Any.run améliore l'intelligence des menaces pour identifier les menaces émergentes ANY.RUN Upgrades Threat Intelligence to Identify Emerging Threats (lien direct) |
Dubaï Silicon Oasis, Émirats arabes unis, 3 octobre 2024, CyberNewswire
Dubai Silicon Oasis, United Arab Emirates, 3rd October 2024, CyberNewsWire |
Threat
|
|
★★★
|
 |
2024-09-25 14:53:59 |
DragonForce Ransomware étend Raas, cible les entreprises du monde entier DragonForce Ransomware Expands RaaS, Targets Firms Worldwide (lien direct) |
DragonForce Ransomware élargit son opération RAAS et devient une menace mondiale de cybersécurité contre les entreprises du monde entier.Les entreprises doivent & # 8230;
DragonForce ransomware is expanding its RaaS operation and becoming a global cybersecurity threat against businesses worldwide. Companies must… |
Ransomware
Threat
|
|
★★
|
 |
2024-09-19 13:14:21 |
US Sanctions Intellexa Spyware Network sur la menace de sécurité nationale US Sanctions Intellexa Spyware Network Over Threat to National Security (lien direct) |
Le Trésor américain sanctionne le consortium Intellexa et les chiffres clés pour distribuer des logiciels espions prédateurs, une sécurité nationale sérieuse & # 8230;
The U.S. Treasury sanctions the Intellexa Consortium and key figures for distributing Predator spyware, a serious national security… |
Threat
|
|
★★★
|
 |
2024-09-11 18:38:02 |
Les pirates de dragon chinois exploitent les serveurs Windows mondiaux dans la fraude du référencement Chinese DragonRank Hackers Exploit Global Windows Servers in SEO Fraud (lien direct) |
Dragonrank, un groupe de piratage de langue chinois, a compromis plus de 30 serveurs Windows à l'échelle mondiale.Ils exploitent IIS des vulnérabilités pour manipuler le référencement & # 8230;
DragonRank, a Chinese-speaking hacking group, has compromised 30+ Windows servers globally. They exploit IIS vulnerabilities to manipulate SEO… |
Vulnerability
Threat
|
|
★★★
|
 |
2024-08-30 13:26:41 |
APT29 russe à l'aide d'exploits de style groupe NSO dans les attaques, Google Russian APT29 Using NSO Group-Style Exploits in Attacks, Google (lien direct) |
Le groupe d'analyse des menaces de Google (TAG) a exposé une nouvelle campagne par APT29 soutenue par l'État russe, également connu sous le nom de Cozy & # 8230;
Google\'s Threat Analysis Group (TAG) has exposed a new campaign by Russian state-backed APT29, also known as Cozy… |
Threat
|
APT 29
|
★★
|
 |
2024-08-27 11:37:11 |
Broisée de données TDECU: plus de 500 000 membres affectés par Moveit Exploit TDECU Data Breach: 500,000+ Members Affected by MOVEit Exploit (lien direct) |
TDECU rapporte une violation de données affectant plus de 500 000 membres en raison d'une vulnérabilité Moveit.Les données compromises comprennent le social & # 8230;
TDECU reports a data breach affecting over 500,000 members due to a MOVEit vulnerability. Compromised data includes Social… |
Data Breach
Vulnerability
Threat
|
|
★★★
|
 |
2024-08-20 22:49:25 |
De nouvelles attaques de phishing ciblent les utilisateurs de la Banque d'Europe de l'Est sur iOS et Android New Phishing Attacks Target Eastern European Bank Users on iOS and Android (lien direct) |
Les cybercriminels exploitent les applications Web progressives (PWAS) dans la dernière arnaque de phishing, ciblant les utilisateurs mobiles en Tzechie, en Hongrie et & # 8230;
Cybercriminals exploit Progressive Web Apps (PWAs) in the latest phishing scam, targeting mobile users in Czechia, Hungary, and… |
Threat
Mobile
|
|
★★★
|
 |
2024-08-20 16:25:16 |
Todoswift Malware cible MacOS, déguisé en application Bitcoin PDF TodoSwift Malware Targets macOS, Disguised as Bitcoin PDF App (lien direct) |
Rencontrez Todoswift, une application malveillante qui se masque en tant que téléchargeur PDF.Fabriqué par le Bluenoroff Threat Group, Todoswift Leverage & # 8230;
Meet TodoSwift, a malicious application that masquerades as a PDF downloader. Crafted by the BlueNoroff threat group, TodoSwift leverages… |
Malware
Threat
|
|
★★★
|
 |
2024-08-20 12:34:38 |
Les pirates pourraient exploiter les équipes Microsoft sur MacOS pour voler des données Hackers Could Exploit Microsoft Teams on macOS to Steal Data (lien direct) |
Cisco Talos révèle 8 vulnérabilités dans les applications MacOS de Microsoft, exploitant les faiblesses du framework TCC.Les pirates peuvent contourner la sécurité, injecter & # 8230;
Cisco Talos reveals 8 vulnerabilities in Microsoft’s macOS apps, exploiting TCC framework weaknesses. Hackers can bypass security, inject… |
Vulnerability
Threat
|
|
★★★
|
 |
2024-08-12 14:01:09 |
La Criminal IP et Maltego collaborent pour élargir la recherche de données de renseignement sur les menaces Criminal IP and Maltego Collaborate to Broaden Threat Intelligence Data Search (lien direct) |
Torrance, États-Unis / Californie, 12 août 2024, CyberNewswire
Torrance, United States / California, 12th August 2024, CyberNewsWire |
Threat
|
|
★★
|
 |
2024-08-08 17:37:13 |
Black Hat USA 2024: Chip Flaw \\ 'Ghostwrite \\' vole les données de la mémoire du processeur Black Hat USA 2024: Chip Flaw \\'GhostWrite\\' Steals Data from CPU Memory (lien direct) |
Black Hat USA 2024: Vulnérabilité critique RISC-V CPU découverte.Surnommé Ghostwrite;Les attaquants peuvent exploiter cette faille pour voler & # 8230;
Black Hat USA 2024: Critical RISC-V CPU vulnerability discovered. Dubbed GhostWrite; attackers can exploit this flaw to steal… |
Vulnerability
Threat
|
|
★★★
|
 |
2024-08-07 21:26:22 |
Protocole Nexera Defi piraté: 1,8 million de dollars volés dans les principaux contrats intelligents Exploit Nexera DeFi Protocol Hacked: $1.8M Stolen in Major Smart Contract Exploit (lien direct) |
Découvrez comment une vulnérabilité de contrat intelligent a conduit au vol de 1,8 million de dollars de Nexera, un protocole Defi. & # 8230;
Learn how a smart contract vulnerability led to the theft of $1.8 million from Nexera, a DeFi protocol.… |
Vulnerability
Threat
|
|
★★★
|
 |
2024-08-02 16:47:03 |
Les nouveaux cahiers Jupyter DDOS Panamorfi exploits New Panamorfi DDoS Attack Exploits Misconfigured Jupyter Notebooks (lien direct) |
& # 8220; Panamorfi, & # 8221;Une nouvelle attaque DDOS, exploite Discord, Minecraft et Jupyter Notebooks.Les chercheurs en cybersécurité préviennent cette menace ciblant & # 8230;
“Panamorfi,” a new DDoS attack, exploits Discord, Minecraft, and Jupyter Notebooks. Cybersecurity researchers warn of this threat targeting… |
Threat
|
|
★★★
|
 |
2024-07-30 00:24:10 |
Hacker Stracches et publie la liste IOC de 100 000 lignes Hacker Scrapes and Publishes 100,000-Line CrowdStrike IoC List (lien direct) |
USDOD Hacker éraflue et fuit un indicateur de 100 000 lignes de la liste des compromis (CIO) de CrowdStrike, révélant une intelligence détaillée des menaces & # 8230;
USDoD hacker scrapes and leaks a 100,000-line Indicator of Compromise (IoC) list from CrowdStrike, revealing detailed threat intelligence… |
Threat
|
|
★★
|
 |
2024-07-26 17:22:17 |
Les chercheurs mettent en garde contre l'augmentation de l'activité de cyberterrorisme ciblant les Jeux olympiques de Paris Researchers Warn of Increased Cyberterrorism Activity Targeting Paris Olympics (lien direct) |
Le cyberterrorisme est en augmentation, constituant une menace importante pour les événements mondiaux comme les Jeux olympiques et les élections de Paris, & # 8230;
Cyberterrorism is on the rise, posing a significant threat to global events like the Paris Olympics and elections,… |
Threat
|
|
★★★
|
 |
2024-07-22 17:57:53 |
Télégramme Android Vulnérabilité «Evilvideo» envoie des logiciels malveillants sous forme de vidéos Telegram Android Vulnerability “EvilVideo” Sends Malware as Videos (lien direct) |
Evilvideo Exploit in Telegram pour Android permet aux attaquants d'envoyer des logiciels malveillants déguisés en vidéos.ESET a découvert cette vulnérabilité zéro-jour, & # 8230;
EvilVideo exploit in Telegram for Android lets attackers send malware disguised as videos. ESET discovered this zero-day vulnerability,… |
Malware
Vulnerability
Threat
Mobile
|
|
★★★
|