What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Blog.webp 2025-01-15 09:46:31 How Much Does It Cost To Host A Website? (lien direct) Host a website effortlessly with the right hosting plan. From shared to cloud hosting, explore affordable options tailored…
Host a website effortlessly with the right hosting plan. From shared to cloud hosting, explore affordable options tailored…
Cloud ★★
Blog.webp 2025-01-15 09:29:08 Hackers Use CVE-2024-50603 to Deploy Backdoor on Aviatrix Controllers (lien direct) A critical vulnerability (CVE-2024-50603) in the Aviatrix Controller allows unauthenticated RCE. Active exploitation observed by Wiz Research in…
A critical vulnerability (CVE-2024-50603) in the Aviatrix Controller allows unauthenticated RCE. Active exploitation observed by Wiz Research in…
Vulnerability ★★★
Blog.webp 2025-01-14 18:43:10 Blockchain in cybersecurity: opportunities and challenges (lien direct) Cybersecurity is facing new challenges with advances in AI, cloud tech, and increasing cyber threats. Solutions like blockchain…
Cybersecurity is facing new challenges with advances in AI, cloud tech, and increasing cyber threats. Solutions like blockchain…
Cloud ★★★
Blog.webp 2025-01-14 13:03:02 Hackers Using Fake YouTube Links to Steal Login Credentials (lien direct) Cybercriminals exploit fake YouTube links to redirect users to phishing pages, stealing login credentials via URI manipulation and…
Cybercriminals exploit fake YouTube links to redirect users to phishing pages, stealing login credentials via URI manipulation and…
Threat ★★★
Blog.webp 2025-01-14 12:06:32 New Codefinger Ransomware Exploits AWS to Encrypt S3 Buckets (lien direct) The Halcyon RISE Team has identified a new Codefinger ransomware campaign targeting Amazon S3 buckets. This attack leverages…
The Halcyon RISE Team has identified a new Codefinger ransomware campaign targeting Amazon S3 buckets. This attack leverages…
Ransomware ★★★
Blog.webp 2025-01-14 10:49:38 AI, Web3 and Decentralization: Tech Trends Shaping 2025\\'s Altcoin Season (lien direct) Prepare for the 2025 altcoin season: experts predict rising interest in altcoins like WorldCoin, driven by Web3, blockchain,…
Prepare for the 2025 altcoin season: experts predict rising interest in altcoins like WorldCoin, driven by Web3, blockchain,…
Prediction ★★★
Blog.webp 2025-01-14 09:33:33 Malicious Kong Ingress Controller Image Found on DockerHub (lien direct) A critical security breach in the software supply chain has been detected. An attacker accessed Kong’s DockerHub account…
A critical security breach in the software supply chain has been detected. An attacker accessed Kong’s DockerHub account…
★★★
Blog.webp 2025-01-13 12:41:35 3 Russians Indicted for Operating Blender.io and Sinbad.io Crypto Mixers (lien direct) SUMMARY Three Russian nationals have been indicted for their alleged roles in running cryptocurrency mixing services Blender.io and…
SUMMARY Three Russian nationals have been indicted for their alleged roles in running cryptocurrency mixing services Blender.io and…
★★★
Blog.webp 2025-01-13 11:22:47 Hackers Breach Telefonica Network, Leak 2.3 GB of Data Online (lien direct) Telefónica faces a data breach impacting its internal systems, linked to hackers using compromised credentials. Learn more about this alarming cyber threat.
Telefónica faces a data breach impacting its internal systems, linked to hackers using compromised credentials. Learn more about this alarming cyber threat.
Data Breach Threat ★★★
Blog.webp 2025-01-12 22:07:13 The Metaverse Will Become More Popular Than the Real World: Will Reality Disappear? (lien direct) With the advent of virtual reality, everyone got scared that the life we ​​know will disappear, and only…
With the advent of virtual reality, everyone got scared that the life we ​​know will disappear, and only…
★★★
Blog.webp 2025-01-11 14:36:46 Fake CrowdStrike Recruiters Distribute Malware Via Phishing Emails (lien direct) SUMMARY Cybercriminals are deploying a tricky new phishing campaign impersonating the cybersecurity firm CrowdStrike‘s recruiters to distribute a…
SUMMARY Cybercriminals are deploying a tricky new phishing campaign impersonating the cybersecurity firm CrowdStrike‘s recruiters to distribute a…
Malware ★★★
Blog.webp 2025-01-11 13:47:03 Fake PoC Exploit Targets Cybersecurity Researchers with Malware (lien direct) A fake proof-of-concept (PoC) exploit designed to lure cybersecurity researchers into downloading malicious software. This deceptive tactic leverages a recently patched critical vulnerability in Microsoft\'s Windows LDAP service (CVE-2024-49113), which can cause denial-of-service attacks.
A fake proof-of-concept (PoC) exploit designed to lure cybersecurity researchers into downloading malicious software. This deceptive tactic leverages a recently patched critical vulnerability in Microsoft\'s Windows LDAP service (CVE-2024-49113), which can cause denial-of-service attacks.
Malware Vulnerability Threat ★★★
Blog.webp 2025-01-11 10:51:22 Muddling Meerkat Linked to Domain Spoofing in Global Spam Scams (lien direct) Infoblox cybersecurity researchers investigating the mysterious activities of \'Muddling Meerkat\' unexpectedly uncovered widespread use of domain spoofing in malicious spam campaigns.
Infoblox cybersecurity researchers investigating the mysterious activities of \'Muddling Meerkat\' unexpectedly uncovered widespread use of domain spoofing in malicious spam campaigns.
Spam ★★★
Blog.webp 2025-01-10 21:21:27 Ivanti Urges Patch for Flaws in Connect Secure, Policy Secure and ZTA Gateways (lien direct) Ivanti has issued a critical security advisory addressing two vulnerabilities in its Connect Secure, Policy Secure, and ZTA Gateway products.
Ivanti has issued a critical security advisory addressing two vulnerabilities in its Connect Secure, Policy Secure, and ZTA Gateway products.
Vulnerability ★★★
Blog.webp 2025-01-10 11:21:15 Banshee Stealer Hits macOS Users via Fake GitHub Repositories (lien direct) SUMMARY Cybersecurity researchers at Check Point detected a new version of Banshee Stealer in late September 2024, distributed…
SUMMARY Cybersecurity researchers at Check Point detected a new version of Banshee Stealer in late September 2024, distributed…
★★★
Blog.webp 2025-01-09 18:16:49 Harnessing AI for Proactive Threat Intelligence and Advanced Cyber Defense (lien direct) Discover how AI revolutionizes cybersecurity with real-time threat detection, adaptive protection, and advanced data protection to combat evolving…
Discover how AI revolutionizes cybersecurity with real-time threat detection, adaptive protection, and advanced data protection to combat evolving…
Threat ★★★
Blog.webp 2025-01-09 15:28:26 Cybersecurity Risks in Crypto: Phishing, Ransomware and Other Emerging Threats (lien direct) Explore top cybersecurity risks in crypto, including phishing, ransomware, and MitM attacks. Learn practical tips to safeguard your…
Explore top cybersecurity risks in crypto, including phishing, ransomware, and MitM attacks. Learn practical tips to safeguard your…
Ransomware ★★★
Blog.webp 2025-01-09 15:00:12 Criminal IP Launches Real-Time Phishing Detection Tool on Microsoft Marketplace (lien direct) Torrance, United States / California, 9th January 2025, CyberNewsWire
Torrance, United States / California, 9th January 2025, CyberNewsWire
Tool ★★★
Blog.webp 2025-01-09 12:56:49 Thousands of Live Hacker Backdoors Found in Expired Domains (lien direct) SUMMARY Cybersecurity researchers at watchTowr have identified over 4,000 live hacker backdoors, exploiting abandoned infrastructure and expired domains.…
SUMMARY Cybersecurity researchers at watchTowr have identified over 4,000 live hacker backdoors, exploiting abandoned infrastructure and expired domains.…
★★★★
Blog.webp 2025-01-08 14:02:58 New PayPal Phishing Scam Exploits MS365 Tools and Genuine-Looking Emails (lien direct) Fortinet uncovers a new PayPal phishing scam exploiting legitimate platform features. Learn how this sophisticated attack works and how to protect yourself from falling victim.
Fortinet uncovers a new PayPal phishing scam exploiting legitimate platform features. Learn how this sophisticated attack works and how to protect yourself from falling victim.
Tool ★★★
Blog.webp 2025-01-08 12:00:56 Scammers Impersonate Authorities to Swipe OTPs with Remote Access Apps (lien direct) SUMMARY Cybersecurity researchers at Group-IB have discovered a sophisticated refund scam where scammers are using remote access tools…
SUMMARY Cybersecurity researchers at Group-IB have discovered a sophisticated refund scam where scammers are using remote access tools…
★★★
Blog.webp 2025-01-08 10:00:21 Millions of Email Servers Exposed Due to Missing TLS Encryption (lien direct) Millions of email servers worldwide remain alarmingly vulnerable to cyberattacks due to a critical security oversight: the absence of Transport Layer Security (TLS) encryption.
Millions of email servers worldwide remain alarmingly vulnerable to cyberattacks due to a critical security oversight: the absence of Transport Layer Security (TLS) encryption.
★★★
Blog.webp 2025-01-08 09:05:24 Critical Vulnerabilities in Moxa Routers Allow Root Privilege Escalation (lien direct) Critical security vulnerabilities have been found in Moxa cellular routers and network security appliances. Learn about CVE-2024-9138 &…
Critical security vulnerabilities have been found in Moxa cellular routers and network security appliances. Learn about CVE-2024-9138 &…
Vulnerability ★★★
Blog.webp 2025-01-07 15:52:26 Security Risk Advisors joins the Microsoft Intelligent Security Association (lien direct) Philadelphia, Pennsylvania, 7th January 2025, CyberNewsWire
Philadelphia, Pennsylvania, 7th January 2025, CyberNewsWire
★★★
Blog.webp 2025-01-07 14:00:16 CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in minutes (lien direct) Ramat Gan, Israel, 7th January 2025, CyberNewsWire
Ramat Gan, Israel, 7th January 2025, CyberNewsWire
★★
Blog.webp 2025-01-07 10:20:12 US Telecom Breaches Widen as 9 Firms Hit by Chinese Salt Typhoon Hackers (lien direct) The Wall Street Journal reports that Charter, Consolidated, and Windstream have been added to the growing list of…
The Wall Street Journal reports that Charter, Consolidated, and Windstream have been added to the growing list of…
★★★
Blog.webp 2025-01-07 09:03:46 U.S. Sanctions Chinese Cybersecurity Firm Over Cyberattacks (lien direct) US sanctions Beijing-based Integrity Technology Group for aiding “Flax Typhoon” hackers in cyberattacks on American infrastructure, freezing assets…
US sanctions Beijing-based Integrity Technology Group for aiding “Flax Typhoon” hackers in cyberattacks on American infrastructure, freezing assets…
★★★
Blog.webp 2025-01-06 21:42:27 New PhishWP Plugin on Russian Forum Turns Sites into Phishing Pages (lien direct) SlashNext has discovered a malicious WordPress plugin, PhishWP, which creates convincing fake payment pages to steal your credit card information, 3DS codes, and personal data.
SlashNext has discovered a malicious WordPress plugin, PhishWP, which creates convincing fake payment pages to steal your credit card information, 3DS codes, and personal data.
★★
Blog.webp 2025-01-06 19:57:15 Hiring For Tech Positions: Balancing Experience And Potential (lien direct) Explore diverse tech positions blending seasoned expertise and fresh talent. Discover how top companies balance experience and innovation…
Explore diverse tech positions blending seasoned expertise and fresh talent. Discover how top companies balance experience and innovation…
★★
Blog.webp 2025-01-06 10:54:42 6 Reasons Why You Should Integrate AI in Your Business in 2025 (lien direct) AI is now essential for businesses, driving efficiency, innovation, and growth. Leverage its power for better decisions, customer…
AI is now essential for businesses, driving efficiency, innovation, and growth. Leverage its power for better decisions, customer…
★★★
Blog.webp 2025-01-06 09:40:55 Terraform Labs Founder Do Kwon Extradited to US, Faces 130-Year Sentence (lien direct) SUMMARY: Do Hyeong Kwon (Do Kwon), the 33-year-old co-founder and former CEO of Terraform Labs, has been extradited…
SUMMARY: Do Hyeong Kwon (Do Kwon), the 33-year-old co-founder and former CEO of Terraform Labs, has been extradited…
★★★
Blog.webp 2025-01-04 13:00:00 New FireScam Infostealer Spyware Hits Android via Fake Telegram Premium (lien direct) Researchers at Cyfirma have discovered FireScam, an Android malware disguised as \'Telegram Premium\' that steals data, monitors activity, and infiltrates devices. Learn about its distribution, functionality, and the impact on user privacy.
Researchers at Cyfirma have discovered FireScam, an Android malware disguised as \'Telegram Premium\' that steals data, monitors activity, and infiltrates devices. Learn about its distribution, functionality, and the impact on user privacy.
Malware Mobile ★★★
Blog.webp 2025-01-03 21:07:13 Legacy App Migration: Transforming Outdated Systems (lien direct) Businesses are perpetually under pressure to innovate in a fast-paced digital era. But legacy applications, written with outdated…
Businesses are perpetually under pressure to innovate in a fast-paced digital era. But legacy applications, written with outdated…
★★★
Blog.webp 2025-01-03 20:20:30 Top Tips for Weather API Integration and Data Utilization (lien direct) Integrate weather APIs to enhance your app with real-time data, forecasts, and personalized insights. Improve user experience while…
Integrate weather APIs to enhance your app with real-time data, forecasts, and personalized insights. Improve user experience while…
★★★
Blog.webp 2025-01-03 17:30:10 A New Dawn for Storytelling: The Intersection of AI and Cinema (lien direct) Discover how AI (Artificial Intelligence) transforms storytelling in filmmaking with scriptwriting, casting, editing, and immersive viewer experiences. The…
Discover how AI (Artificial Intelligence) transforms storytelling in filmmaking with scriptwriting, casting, editing, and immersive viewer experiences. The…
★★★
Blog.webp 2025-01-03 11:08:25 (Déjà vu) NPM Package Disguised as an Ethereum Tool Deploys Quasar RAT (lien direct) Researchers discovered a malicious package on the npm package registry that resembles a library for Ethereum smart contract vulnerabilities but actually drops an open-source remote access trojan called Quasar RAT onto developer systems.
Researchers discovered a malicious package on the npm package registry that resembles a library for Ethereum smart contract vulnerabilities but actually drops an open-source remote access trojan called Quasar RAT onto developer systems.
Tool Vulnerability ★★
Blog.webp 2025-01-02 18:39:30 Fake 7-Zip Exploit Code Traced to AI-Generated Misinterpretation (lien direct) A recent claim that a critical zero-day vulnerability existed in the popular open-source file archiver 7-Zip has been met with skepticism from the software\'s creator and other security researchers.
A recent claim that a critical zero-day vulnerability existed in the popular open-source file archiver 7-Zip has been met with skepticism from the software\'s creator and other security researchers.
Vulnerability Threat ★★★
Blog.webp 2025-01-01 10:42:35 FortiGuard Labs Links New EC2 Grouper Hackers to AWS Credential Exploits (lien direct) Researchers at FortiGuard Labs have identified a prolific attacker group known as "EC2 Grouper" who frequently exploits compromised credentials using AWS tools.
Researchers at FortiGuard Labs have identified a prolific attacker group known as "EC2 Grouper" who frequently exploits compromised credentials using AWS tools.
Tool ★★
Blog.webp 2024-12-30 22:04:37 16 Chrome Extensions Hacked in Large-Scale Credential Theft Scheme (lien direct) SUMMARY A sophisticated attack campaign has compromised at least 16 Chrome browser extensions, exposing over 600,000 users to…
SUMMARY A sophisticated attack campaign has compromised at least 16 Chrome browser extensions, exposing over 600,000 users to…
★★
Blog.webp 2024-12-30 15:00:06 SquareX Researchers Expose OAuth Attack on Chrome Extensions Days Before Major Breach (lien direct) Palo Alto, Calif., USA, 30th December 2024, CyberNewsWire
Palo Alto, Calif., USA, 30th December 2024, CyberNewsWire
★★
Blog.webp 2024-12-30 12:48:26 Exposed Cloud Server Tracks 800,000 Volkswagen, Audi, and Skoda EVs (lien direct) SUMMARY A recent report from the German news outlet Spiegel has revealed a significant security breach impacting hundreds…
SUMMARY A recent report from the German news outlet Spiegel has revealed a significant security breach impacting hundreds…
Cloud ★★★
Blog.webp 2024-12-30 06:13:40 Critical Flaw Exposes Four-Faith Routers to Remote Exploitation (lien direct) SUMMARY: VulnCheck has discovered a critical new vulnerability (CVE-2024-12856) affecting Four-Faith industrial routers (F3x24 and F3x36), with evidence…
SUMMARY: VulnCheck has discovered a critical new vulnerability (CVE-2024-12856) affecting Four-Faith industrial routers (F3x24 and F3x36), with evidence…
Vulnerability Industrial ★★
Blog.webp 2024-12-29 20:52:26 Study Finds AI Can Guess Crypto Seed Phrases in 0.02 Seconds (lien direct) IN THIS ARTICLE, YOU WILL LEARN: NFT-focused news website NFTEvening and the NFT market\'s data and analytics-based platform…
IN THIS ARTICLE, YOU WILL LEARN: NFT-focused news website NFTEvening and the NFT market\'s data and analytics-based platform…
Studies ★★★
Blog.webp 2024-12-28 16:43:09 Secure Gaming During the Holidays (lien direct) Secure Gaming during holidays is essential as cyberattacks rise by 50%. Protect accounts with 2FA, avoid fake promotions,…
Secure Gaming during holidays is essential as cyberattacks rise by 50%. Protect accounts with 2FA, avoid fake promotions,…
★★
Blog.webp 2024-12-28 15:52:01 FICORA, CAPSAICIN Botnets Exploit Old D-Link Router Flaws for DDoS Attacks (lien direct) Mirai and Keksec botnet variants are exploiting critical vulnerabilities in D-Link routers. Learn about the impact, affected devices, and how to protect yourself from these attacks.
Mirai and Keksec botnet variants are exploiting critical vulnerabilities in D-Link routers. Learn about the impact, affected devices, and how to protect yourself from these attacks.
Vulnerability Threat ★★
Blog.webp 2024-12-27 04:46:46 Hackers Release Second Batch of Stolen Cisco Data (lien direct) IN THIS ARTICLE: Hackers have released what they claim to be the second batch of data stolen in…
IN THIS ARTICLE: Hackers have released what they claim to be the second batch of data stolen in…
★★★
Blog.webp 2024-12-26 18:12:16 Two Californians charged in the largest NFT fraud case to date (lien direct) SUMMARY Two California men have been arrested and charged in what is being called the largest NFT fraud…
SUMMARY Two California men have been arrested and charged in what is being called the largest NFT fraud…
★★
Blog.webp 2024-12-26 10:58:01 Researchers Uncover Dark Web Operation Entirely Focused on KYC Bypass (lien direct) iProov uncovers a major Dark Web operation selling stolen identities with matching biometrics, posing a serious threat to KYC verification systems
iProov uncovers a major Dark Web operation selling stolen identities with matching biometrics, posing a serious threat to KYC verification systems
Threat ★★
Blog.webp 2024-12-25 22:24:39 SEO Poisoning: How Cybercriminals Are Turning Search Engines into Traps (lien direct) Stay protected from SEO poisoning, a cyber threat exploiting search engine rankings to spread malware and phishing scams.…
Stay protected from SEO poisoning, a cyber threat exploiting search engine rankings to spread malware and phishing scams.…
Malware Threat ★★
Blog.webp 2024-12-25 16:22:24 WhatsApp Wins Lawsuit Against Israeli Spyware Maker NSO Group (lien direct) A US court ruled against NSO Group, an Israeli spyware maker, finding them liable for hacking WhatsApp users. The ruling has major implications for the surveillance technology industry."
A US court ruled against NSO Group, an Israeli spyware maker, finding them liable for hacking WhatsApp users. The ruling has major implications for the surveillance technology industry."
★★
Last update at: 2025-05-12 15:53:01
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter