Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
 |
2025-01-15 09:46:31 |
How Much Does It Cost To Host A Website? (lien direct) |
Host a website effortlessly with the right hosting plan. From shared to cloud hosting, explore affordable options tailored…
Host a website effortlessly with the right hosting plan. From shared to cloud hosting, explore affordable options tailored… |
Cloud
|
|
★★
|
 |
2025-01-15 09:29:08 |
Hackers Use CVE-2024-50603 to Deploy Backdoor on Aviatrix Controllers (lien direct) |
A critical vulnerability (CVE-2024-50603) in the Aviatrix Controller allows unauthenticated RCE. Active exploitation observed by Wiz Research in…
A critical vulnerability (CVE-2024-50603) in the Aviatrix Controller allows unauthenticated RCE. Active exploitation observed by Wiz Research in… |
Vulnerability
|
|
★★★
|
 |
2025-01-14 18:43:10 |
Blockchain in cybersecurity: opportunities and challenges (lien direct) |
Cybersecurity is facing new challenges with advances in AI, cloud tech, and increasing cyber threats. Solutions like blockchain…
Cybersecurity is facing new challenges with advances in AI, cloud tech, and increasing cyber threats. Solutions like blockchain… |
Cloud
|
|
★★★
|
 |
2025-01-14 13:03:02 |
Hackers Using Fake YouTube Links to Steal Login Credentials (lien direct) |
Cybercriminals exploit fake YouTube links to redirect users to phishing pages, stealing login credentials via URI manipulation and…
Cybercriminals exploit fake YouTube links to redirect users to phishing pages, stealing login credentials via URI manipulation and… |
Threat
|
|
★★★
|
 |
2025-01-14 12:06:32 |
New Codefinger Ransomware Exploits AWS to Encrypt S3 Buckets (lien direct) |
The Halcyon RISE Team has identified a new Codefinger ransomware campaign targeting Amazon S3 buckets. This attack leverages…
The Halcyon RISE Team has identified a new Codefinger ransomware campaign targeting Amazon S3 buckets. This attack leverages… |
Ransomware
|
|
★★★
|
 |
2025-01-14 10:49:38 |
AI, Web3 and Decentralization: Tech Trends Shaping 2025\\'s Altcoin Season (lien direct) |
Prepare for the 2025 altcoin season: experts predict rising interest in altcoins like WorldCoin, driven by Web3, blockchain,…
Prepare for the 2025 altcoin season: experts predict rising interest in altcoins like WorldCoin, driven by Web3, blockchain,… |
Prediction
|
|
★★★
|
 |
2025-01-14 09:33:33 |
Malicious Kong Ingress Controller Image Found on DockerHub (lien direct) |
A critical security breach in the software supply chain has been detected. An attacker accessed Kong’s DockerHub account…
A critical security breach in the software supply chain has been detected. An attacker accessed Kong’s DockerHub account… |
|
|
★★★
|
 |
2025-01-13 12:41:35 |
3 Russians Indicted for Operating Blender.io and Sinbad.io Crypto Mixers (lien direct) |
SUMMARY Three Russian nationals have been indicted for their alleged roles in running cryptocurrency mixing services Blender.io and…
SUMMARY Three Russian nationals have been indicted for their alleged roles in running cryptocurrency mixing services Blender.io and… |
|
|
★★★
|
 |
2025-01-13 11:22:47 |
Hackers Breach Telefonica Network, Leak 2.3 GB of Data Online (lien direct) |
Telefónica faces a data breach impacting its internal systems, linked to hackers using compromised credentials. Learn more about this alarming cyber threat.
Telefónica faces a data breach impacting its internal systems, linked to hackers using compromised credentials. Learn more about this alarming cyber threat. |
Data Breach
Threat
|
|
★★★
|
 |
2025-01-12 22:07:13 |
The Metaverse Will Become More Popular Than the Real World: Will Reality Disappear? (lien direct) |
With the advent of virtual reality, everyone got scared that the life we know will disappear, and only…
With the advent of virtual reality, everyone got scared that the life we know will disappear, and only… |
|
|
★★★
|
 |
2025-01-11 14:36:46 |
Fake CrowdStrike Recruiters Distribute Malware Via Phishing Emails (lien direct) |
SUMMARY Cybercriminals are deploying a tricky new phishing campaign impersonating the cybersecurity firm CrowdStrike‘s recruiters to distribute a…
SUMMARY Cybercriminals are deploying a tricky new phishing campaign impersonating the cybersecurity firm CrowdStrike‘s recruiters to distribute a… |
Malware
|
|
★★★
|
 |
2025-01-11 13:47:03 |
Fake PoC Exploit Targets Cybersecurity Researchers with Malware (lien direct) |
A fake proof-of-concept (PoC) exploit designed to lure cybersecurity researchers into downloading malicious software. This deceptive tactic leverages a recently patched critical vulnerability in Microsoft\'s Windows LDAP service (CVE-2024-49113), which can cause denial-of-service attacks.
A fake proof-of-concept (PoC) exploit designed to lure cybersecurity researchers into downloading malicious software. This deceptive tactic leverages a recently patched critical vulnerability in Microsoft\'s Windows LDAP service (CVE-2024-49113), which can cause denial-of-service attacks. |
Malware
Vulnerability
Threat
|
|
★★★
|
 |
2025-01-11 10:51:22 |
Muddling Meerkat Linked to Domain Spoofing in Global Spam Scams (lien direct) |
Infoblox cybersecurity researchers investigating the mysterious activities of \'Muddling Meerkat\' unexpectedly uncovered widespread use of domain spoofing in malicious spam campaigns.
Infoblox cybersecurity researchers investigating the mysterious activities of \'Muddling Meerkat\' unexpectedly uncovered widespread use of domain spoofing in malicious spam campaigns. |
Spam
|
|
★★★
|
 |
2025-01-10 21:21:27 |
Ivanti Urges Patch for Flaws in Connect Secure, Policy Secure and ZTA Gateways (lien direct) |
Ivanti has issued a critical security advisory addressing two vulnerabilities in its Connect Secure, Policy Secure, and ZTA Gateway products.
Ivanti has issued a critical security advisory addressing two vulnerabilities in its Connect Secure, Policy Secure, and ZTA Gateway products. |
Vulnerability
|
|
★★★
|
 |
2025-01-10 11:21:15 |
Banshee Stealer Hits macOS Users via Fake GitHub Repositories (lien direct) |
SUMMARY Cybersecurity researchers at Check Point detected a new version of Banshee Stealer in late September 2024, distributed…
SUMMARY Cybersecurity researchers at Check Point detected a new version of Banshee Stealer in late September 2024, distributed… |
|
|
★★★
|
 |
2025-01-09 18:16:49 |
Harnessing AI for Proactive Threat Intelligence and Advanced Cyber Defense (lien direct) |
Discover how AI revolutionizes cybersecurity with real-time threat detection, adaptive protection, and advanced data protection to combat evolving…
Discover how AI revolutionizes cybersecurity with real-time threat detection, adaptive protection, and advanced data protection to combat evolving… |
Threat
|
|
★★★
|
 |
2025-01-09 15:28:26 |
Cybersecurity Risks in Crypto: Phishing, Ransomware and Other Emerging Threats (lien direct) |
Explore top cybersecurity risks in crypto, including phishing, ransomware, and MitM attacks. Learn practical tips to safeguard your…
Explore top cybersecurity risks in crypto, including phishing, ransomware, and MitM attacks. Learn practical tips to safeguard your… |
Ransomware
|
|
★★★
|
 |
2025-01-09 15:00:12 |
Criminal IP Launches Real-Time Phishing Detection Tool on Microsoft Marketplace (lien direct) |
Torrance, United States / California, 9th January 2025, CyberNewsWire
Torrance, United States / California, 9th January 2025, CyberNewsWire |
Tool
|
|
★★★
|
 |
2025-01-09 12:56:49 |
Thousands of Live Hacker Backdoors Found in Expired Domains (lien direct) |
SUMMARY Cybersecurity researchers at watchTowr have identified over 4,000 live hacker backdoors, exploiting abandoned infrastructure and expired domains.…
SUMMARY Cybersecurity researchers at watchTowr have identified over 4,000 live hacker backdoors, exploiting abandoned infrastructure and expired domains.… |
|
|
★★★★
|
 |
2025-01-08 14:02:58 |
New PayPal Phishing Scam Exploits MS365 Tools and Genuine-Looking Emails (lien direct) |
Fortinet uncovers a new PayPal phishing scam exploiting legitimate platform features. Learn how this sophisticated attack works and how to protect yourself from falling victim.
Fortinet uncovers a new PayPal phishing scam exploiting legitimate platform features. Learn how this sophisticated attack works and how to protect yourself from falling victim. |
Tool
|
|
★★★
|
 |
2025-01-08 12:00:56 |
Scammers Impersonate Authorities to Swipe OTPs with Remote Access Apps (lien direct) |
SUMMARY Cybersecurity researchers at Group-IB have discovered a sophisticated refund scam where scammers are using remote access tools…
SUMMARY Cybersecurity researchers at Group-IB have discovered a sophisticated refund scam where scammers are using remote access tools… |
|
|
★★★
|
 |
2025-01-08 10:00:21 |
Millions of Email Servers Exposed Due to Missing TLS Encryption (lien direct) |
Millions of email servers worldwide remain alarmingly vulnerable to cyberattacks due to a critical security oversight: the absence of Transport Layer Security (TLS) encryption.
Millions of email servers worldwide remain alarmingly vulnerable to cyberattacks due to a critical security oversight: the absence of Transport Layer Security (TLS) encryption. |
|
|
★★★
|
 |
2025-01-08 09:05:24 |
Critical Vulnerabilities in Moxa Routers Allow Root Privilege Escalation (lien direct) |
Critical security vulnerabilities have been found in Moxa cellular routers and network security appliances. Learn about CVE-2024-9138 &…
Critical security vulnerabilities have been found in Moxa cellular routers and network security appliances. Learn about CVE-2024-9138 &… |
Vulnerability
|
|
★★★
|
 |
2025-01-07 15:52:26 |
Security Risk Advisors joins the Microsoft Intelligent Security Association (lien direct) |
Philadelphia, Pennsylvania, 7th January 2025, CyberNewsWire
Philadelphia, Pennsylvania, 7th January 2025, CyberNewsWire |
|
|
★★★
|
 |
2025-01-07 14:00:16 |
CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in minutes (lien direct) |
Ramat Gan, Israel, 7th January 2025, CyberNewsWire
Ramat Gan, Israel, 7th January 2025, CyberNewsWire |
|
|
★★
|
 |
2025-01-07 10:20:12 |
US Telecom Breaches Widen as 9 Firms Hit by Chinese Salt Typhoon Hackers (lien direct) |
The Wall Street Journal reports that Charter, Consolidated, and Windstream have been added to the growing list of…
The Wall Street Journal reports that Charter, Consolidated, and Windstream have been added to the growing list of… |
|
|
★★★
|
 |
2025-01-07 09:03:46 |
U.S. Sanctions Chinese Cybersecurity Firm Over Cyberattacks (lien direct) |
US sanctions Beijing-based Integrity Technology Group for aiding “Flax Typhoon” hackers in cyberattacks on American infrastructure, freezing assets…
US sanctions Beijing-based Integrity Technology Group for aiding “Flax Typhoon” hackers in cyberattacks on American infrastructure, freezing assets… |
|
|
★★★
|
 |
2025-01-06 21:42:27 |
New PhishWP Plugin on Russian Forum Turns Sites into Phishing Pages (lien direct) |
SlashNext has discovered a malicious WordPress plugin, PhishWP, which creates convincing fake payment pages to steal your credit card information, 3DS codes, and personal data.
SlashNext has discovered a malicious WordPress plugin, PhishWP, which creates convincing fake payment pages to steal your credit card information, 3DS codes, and personal data. |
|
|
★★
|
 |
2025-01-06 19:57:15 |
Hiring For Tech Positions: Balancing Experience And Potential (lien direct) |
Explore diverse tech positions blending seasoned expertise and fresh talent. Discover how top companies balance experience and innovation…
Explore diverse tech positions blending seasoned expertise and fresh talent. Discover how top companies balance experience and innovation… |
|
|
★★
|
 |
2025-01-06 10:54:42 |
6 Reasons Why You Should Integrate AI in Your Business in 2025 (lien direct) |
AI is now essential for businesses, driving efficiency, innovation, and growth. Leverage its power for better decisions, customer…
AI is now essential for businesses, driving efficiency, innovation, and growth. Leverage its power for better decisions, customer… |
|
|
★★★
|
 |
2025-01-06 09:40:55 |
Terraform Labs Founder Do Kwon Extradited to US, Faces 130-Year Sentence (lien direct) |
SUMMARY: Do Hyeong Kwon (Do Kwon), the 33-year-old co-founder and former CEO of Terraform Labs, has been extradited…
SUMMARY: Do Hyeong Kwon (Do Kwon), the 33-year-old co-founder and former CEO of Terraform Labs, has been extradited… |
|
|
★★★
|
 |
2025-01-04 13:00:00 |
New FireScam Infostealer Spyware Hits Android via Fake Telegram Premium (lien direct) |
Researchers at Cyfirma have discovered FireScam, an Android malware disguised as \'Telegram Premium\' that steals data, monitors activity, and infiltrates devices. Learn about its distribution, functionality, and the impact on user privacy.
Researchers at Cyfirma have discovered FireScam, an Android malware disguised as \'Telegram Premium\' that steals data, monitors activity, and infiltrates devices. Learn about its distribution, functionality, and the impact on user privacy. |
Malware
Mobile
|
|
★★★
|
 |
2025-01-03 21:07:13 |
Legacy App Migration: Transforming Outdated Systems (lien direct) |
Businesses are perpetually under pressure to innovate in a fast-paced digital era. But legacy applications, written with outdated…
Businesses are perpetually under pressure to innovate in a fast-paced digital era. But legacy applications, written with outdated… |
|
|
★★★
|
 |
2025-01-03 20:20:30 |
Top Tips for Weather API Integration and Data Utilization (lien direct) |
Integrate weather APIs to enhance your app with real-time data, forecasts, and personalized insights. Improve user experience while…
Integrate weather APIs to enhance your app with real-time data, forecasts, and personalized insights. Improve user experience while… |
|
|
★★★
|
 |
2025-01-03 17:30:10 |
A New Dawn for Storytelling: The Intersection of AI and Cinema (lien direct) |
Discover how AI (Artificial Intelligence) transforms storytelling in filmmaking with scriptwriting, casting, editing, and immersive viewer experiences. The…
Discover how AI (Artificial Intelligence) transforms storytelling in filmmaking with scriptwriting, casting, editing, and immersive viewer experiences. The… |
|
|
★★★
|
 |
2025-01-03 11:08:25 |
(Déjà vu) NPM Package Disguised as an Ethereum Tool Deploys Quasar RAT (lien direct) |
Researchers discovered a malicious package on the npm package registry that resembles a library for Ethereum smart contract vulnerabilities but actually drops an open-source remote access trojan called Quasar RAT onto developer systems.
Researchers discovered a malicious package on the npm package registry that resembles a library for Ethereum smart contract vulnerabilities but actually drops an open-source remote access trojan called Quasar RAT onto developer systems. |
Tool
Vulnerability
|
|
★★
|
 |
2025-01-02 18:39:30 |
Fake 7-Zip Exploit Code Traced to AI-Generated Misinterpretation (lien direct) |
A recent claim that a critical zero-day vulnerability existed in the popular open-source file archiver 7-Zip has been met with skepticism from the software\'s creator and other security researchers.
A recent claim that a critical zero-day vulnerability existed in the popular open-source file archiver 7-Zip has been met with skepticism from the software\'s creator and other security researchers. |
Vulnerability
Threat
|
|
★★★
|
 |
2025-01-01 10:42:35 |
FortiGuard Labs Links New EC2 Grouper Hackers to AWS Credential Exploits (lien direct) |
Researchers at FortiGuard Labs have identified a prolific attacker group known as "EC2 Grouper" who frequently exploits compromised credentials using AWS tools.
Researchers at FortiGuard Labs have identified a prolific attacker group known as "EC2 Grouper" who frequently exploits compromised credentials using AWS tools. |
Tool
|
|
★★
|
 |
2024-12-30 22:04:37 |
16 Chrome Extensions Hacked in Large-Scale Credential Theft Scheme (lien direct) |
SUMMARY A sophisticated attack campaign has compromised at least 16 Chrome browser extensions, exposing over 600,000 users to…
SUMMARY A sophisticated attack campaign has compromised at least 16 Chrome browser extensions, exposing over 600,000 users to… |
|
|
★★
|
 |
2024-12-30 15:00:06 |
SquareX Researchers Expose OAuth Attack on Chrome Extensions Days Before Major Breach (lien direct) |
Palo Alto, Calif., USA, 30th December 2024, CyberNewsWire
Palo Alto, Calif., USA, 30th December 2024, CyberNewsWire |
|
|
★★
|
 |
2024-12-30 12:48:26 |
Exposed Cloud Server Tracks 800,000 Volkswagen, Audi, and Skoda EVs (lien direct) |
SUMMARY A recent report from the German news outlet Spiegel has revealed a significant security breach impacting hundreds…
SUMMARY A recent report from the German news outlet Spiegel has revealed a significant security breach impacting hundreds… |
Cloud
|
|
★★★
|
 |
2024-12-30 06:13:40 |
Critical Flaw Exposes Four-Faith Routers to Remote Exploitation (lien direct) |
SUMMARY: VulnCheck has discovered a critical new vulnerability (CVE-2024-12856) affecting Four-Faith industrial routers (F3x24 and F3x36), with evidence…
SUMMARY: VulnCheck has discovered a critical new vulnerability (CVE-2024-12856) affecting Four-Faith industrial routers (F3x24 and F3x36), with evidence… |
Vulnerability
Industrial
|
|
★★
|
 |
2024-12-29 20:52:26 |
Study Finds AI Can Guess Crypto Seed Phrases in 0.02 Seconds (lien direct) |
IN THIS ARTICLE, YOU WILL LEARN: NFT-focused news website NFTEvening and the NFT market\'s data and analytics-based platform…
IN THIS ARTICLE, YOU WILL LEARN: NFT-focused news website NFTEvening and the NFT market\'s data and analytics-based platform… |
Studies
|
|
★★★
|
 |
2024-12-28 16:43:09 |
Secure Gaming During the Holidays (lien direct) |
Secure Gaming during holidays is essential as cyberattacks rise by 50%. Protect accounts with 2FA, avoid fake promotions,…
Secure Gaming during holidays is essential as cyberattacks rise by 50%. Protect accounts with 2FA, avoid fake promotions,… |
|
|
★★
|
 |
2024-12-28 15:52:01 |
FICORA, CAPSAICIN Botnets Exploit Old D-Link Router Flaws for DDoS Attacks (lien direct) |
Mirai and Keksec botnet variants are exploiting critical vulnerabilities in D-Link routers. Learn about the impact, affected devices, and how to protect yourself from these attacks.
Mirai and Keksec botnet variants are exploiting critical vulnerabilities in D-Link routers. Learn about the impact, affected devices, and how to protect yourself from these attacks. |
Vulnerability
Threat
|
|
★★
|
 |
2024-12-27 04:46:46 |
Hackers Release Second Batch of Stolen Cisco Data (lien direct) |
IN THIS ARTICLE: Hackers have released what they claim to be the second batch of data stolen in…
IN THIS ARTICLE: Hackers have released what they claim to be the second batch of data stolen in… |
|
|
★★★
|
 |
2024-12-26 18:12:16 |
Two Californians charged in the largest NFT fraud case to date (lien direct) |
SUMMARY Two California men have been arrested and charged in what is being called the largest NFT fraud…
SUMMARY Two California men have been arrested and charged in what is being called the largest NFT fraud… |
|
|
★★
|
 |
2024-12-26 10:58:01 |
Researchers Uncover Dark Web Operation Entirely Focused on KYC Bypass (lien direct) |
iProov uncovers a major Dark Web operation selling stolen identities with matching biometrics, posing a serious threat to KYC verification systems
iProov uncovers a major Dark Web operation selling stolen identities with matching biometrics, posing a serious threat to KYC verification systems |
Threat
|
|
★★
|
 |
2024-12-25 22:24:39 |
SEO Poisoning: How Cybercriminals Are Turning Search Engines into Traps (lien direct) |
Stay protected from SEO poisoning, a cyber threat exploiting search engine rankings to spread malware and phishing scams.…
Stay protected from SEO poisoning, a cyber threat exploiting search engine rankings to spread malware and phishing scams.… |
Malware
Threat
|
|
★★
|
 |
2024-12-25 16:22:24 |
WhatsApp Wins Lawsuit Against Israeli Spyware Maker NSO Group (lien direct) |
A US court ruled against NSO Group, an Israeli spyware maker, finding them liable for hacking WhatsApp users. The ruling has major implications for the surveillance technology industry."
A US court ruled against NSO Group, an Israeli spyware maker, finding them liable for hacking WhatsApp users. The ruling has major implications for the surveillance technology industry." |
|
|
★★
|