Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
 |
2025-02-13 21:32:35 |
Chinese APT \\'Emperor Dragonfly\\' Moonlights With Ransomware (lien direct) |
Pivoting from prior cyber espionage, the threat group deployed its backdoor tool set to ultimately push out RA World malware, demanding $2 million from its victim.
Pivoting from prior cyber espionage, the threat group deployed its backdoor tool set to ultimately push out RA World malware, demanding $2 million from its victim. |
Ransomware
Malware
Tool
Threat
|
|
★★★
|
 |
2025-02-13 02:00:00 |
Japan Goes on Offense With New \\'Active Cyber Defense\\' Bill (lien direct) |
Japan is on a mission to catch up to the US standard of national cyber preparedness, and its new legislation is a measure intended to stop escalating Chinese cyber-espionage efforts, experts say.
Japan is on a mission to catch up to the US standard of national cyber preparedness, and its new legislation is a measure intended to stop escalating Chinese cyber-espionage efforts, experts say. |
Legislation
|
|
★★★
|
 |
2025-02-12 23:02:31 |
President Trump to Nominate Former RNC Official as National Cyber Director (lien direct) |
Sean Cairncross will be one of the primary advisers to the administration on national cybersecurity matters.
Sean Cairncross will be one of the primary advisers to the administration on national cybersecurity matters. |
|
|
★★★
|
 |
2025-02-12 20:27:51 |
Content Credentials Technology Verifies Image, Video Authenticity (lien direct) |
The open technology tackles disinformation by verifying whether the image is real or has been modified. The standard, created to document the provenance of photos and other media, has gained steam in the past year, surpassing 500 corporate members and releasing open-source tools for developers.
The open technology tackles disinformation by verifying whether the image is real or has been modified. The standard, created to document the provenance of photos and other media, has gained steam in the past year, surpassing 500 corporate members and releasing open-source tools for developers. |
Tool
|
|
★★★
|
 |
2025-02-12 19:30:41 |
Feds Sanction Russian Hosting Provider for Supporting LockBit Attacks (lien direct) |
US, UK, and Australian law enforcement have targeted a company called Zservers (and two of its administrators) for providing bulletproof hosting services to the infamous ransomware gang.
US, UK, and Australian law enforcement have targeted a company called Zservers (and two of its administrators) for providing bulletproof hosting services to the infamous ransomware gang. |
Ransomware
Legislation
|
|
★★★
|
 |
2025-02-12 17:00:00 |
Microsoft: Russia\\'s Sandworm APT Exploits Edge Bugs Globally (lien direct) |
Sandworm (aka Seashell Blizzard) has an initial access wing called "BadPilot" that uses standard intrusion tactics to spread Russia\'s tendrils around the world.
Sandworm (aka Seashell Blizzard) has an initial access wing called "BadPilot" that uses standard intrusion tactics to spread Russia\'s tendrils around the world. |
|
APT 44
|
★★★
|
 |
2025-02-12 15:00:00 |
Is AI a Friend or Foe of Healthcare Security? (lien direct) |
When it comes to keeping patient information safe, people empowerment is just as necessary as deploying new technologies.
When it comes to keeping patient information safe, people empowerment is just as necessary as deploying new technologies. |
Medical
|
|
★★★
|
 |
2025-02-12 05:01:00 |
India\\'s Cybercrime Problems Grow as Nation Digitizes (lien direct) |
More than half of attacks on Indian businesses come from outside the country, while 45% of those targeting consumers come from Cambodia, Myanmar, and Laos.
More than half of attacks on Indian businesses come from outside the country, while 45% of those targeting consumers come from Cambodia, Myanmar, and Laos. |
|
|
★★★
|
 |
2025-02-11 23:24:17 |
Gartner: Most Security Leaders Cannot Balance Data Security, Business Goals (lien direct) |
The analyst firm recommends defining security and governance processes while reducing friction for business stakeholders.
The analyst firm recommends defining security and governance processes while reducing friction for business stakeholders. |
|
|
★★
|
 |
2025-02-11 22:57:48 |
Drata Acquires SafeBase to Strengthen GRC Portfolio (lien direct) |
The combined companies will create a seamless ecosystem of trust, governance, risk, and compliance.
The combined companies will create a seamless ecosystem of trust, governance, risk, and compliance. |
|
|
★★
|
 |
2025-02-11 21:55:35 |
Microsoft\\'s February Patch a Lighter Lift Than January\\'s (lien direct) |
But there\'s plenty in it - including two zero-days - that need immediate attention.
But there\'s plenty in it - including two zero-days - that need immediate attention. |
|
|
★★
|
 |
2025-02-11 21:41:57 |
Apple Releases Urgent Patch for USB Vulnerability (lien direct) |
The vulnerability could allow a threat actor to disable the security feature on a locked device and gain access to user data.
The vulnerability could allow a threat actor to disable the security feature on a locked device and gain access to user data. |
Vulnerability
Threat
|
|
★★★
|
 |
2025-02-11 20:08:33 |
CISA Places Election Security Staffers on Leave (lien direct) |
The staffers were tasked with building relationships on the ground across the country in local election jurisdictions, teaching election officials tactics on mitigating cyber threats, cyber hygiene, combating misinformation and foreign influence, and more.
The staffers were tasked with building relationships on the ground across the country in local election jurisdictions, teaching election officials tactics on mitigating cyber threats, cyber hygiene, combating misinformation and foreign influence, and more. |
|
|
★★★
|
 |
2025-02-11 15:55:06 |
Data Leaks Happen Most Often in These States - Here\\'s Why (lien direct) |
State-led data privacy laws and commitment to enforcement play a major factor in shoring up business data security, an analysis shows.
State-led data privacy laws and commitment to enforcement play a major factor in shoring up business data security, an analysis shows. |
Legislation
|
|
★★★
|
 |
2025-02-11 15:00:00 |
Salt Typhoon\\'s Impact on the US & Beyond (lien direct) |
Salt Typhoon underscores the urgent need for organizations to rapidly adopt modern security practices to meet evolving threats.
Salt Typhoon underscores the urgent need for organizations to rapidly adopt modern security practices to meet evolving threats. |
|
|
★★★
|
 |
2025-02-11 14:56:58 |
DeepSeek AI Fails Multiple Security Tests, Raising Red Flag for Businesses (lien direct) |
The popular generative AI (GenAI) model allows hallucinations, easily avoidable guardrails, susceptibility to jailbreaking and malware creation requests, and more at critically high rates, researchers find.
The popular generative AI (GenAI) model allows hallucinations, easily avoidable guardrails, susceptibility to jailbreaking and malware creation requests, and more at critically high rates, researchers find. |
Malware
|
|
★★★
|
 |
2025-02-11 13:25:19 |
Ransomware Groups Made Less Money in 2024 (lien direct) |
Improvements in cyber hygiene and resiliency made it possible for victim organizations to skip paying ransom amounts in 2024.
Improvements in cyber hygiene and resiliency made it possible for victim organizations to skip paying ransom amounts in 2024. |
Ransomware
|
|
★★★
|
 |
2025-02-10 21:58:30 |
XE Group Shifts From Card Skimming to Supply Chain Attacks (lien direct) |
The likely Vietnam-based threat actor has been using two zero-days in VeraCore\'s warehouse management software in some of its latest cyberattacks.
The likely Vietnam-based threat actor has been using two zero-days in VeraCore\'s warehouse management software in some of its latest cyberattacks. |
Threat
|
|
★★★
|
 |
2025-02-10 21:34:29 |
120K Victims Compromised in Memorial Hospital Ransomware Attack (lien direct) |
After claiming responsibility for the ransomware attack in 2024, the "Embargo" ransomware group posted 1.15 terabytes of stolen data to its public Tor site.
After claiming responsibility for the ransomware attack in 2024, the "Embargo" ransomware group posted 1.15 terabytes of stolen data to its public Tor site. |
Ransomware
|
|
★★★
|
 |
2025-02-10 21:18:11 |
Guilty Plea in Hacking of the SEC\\'s X Account That Caused Bitcoin Value Spike (lien direct) |
Pas de details / No more details |
|
|
★★
|
 |
2025-02-10 19:42:00 |
Newspaper Giant Lee Enterprises Reels From Cyberattack (lien direct) |
The newspaper company expects the investigation to take some time, but said in an SEC filing that it has not yet identified any material impact.
The newspaper company expects the investigation to take some time, but said in an SEC filing that it has not yet identified any material impact. |
|
|
★★★
|
 |
2025-02-10 15:19:00 |
Magecart Attackers Abuse Google Ad Tool to Steal Data (lien direct) |
Attackers are smuggling payment card-skimming malicious code into checkout pages on Magento-based e-commerce sites by abusing the Google Tag Manager ad tool.
Attackers are smuggling payment card-skimming malicious code into checkout pages on Magento-based e-commerce sites by abusing the Google Tag Manager ad tool. |
Tool
|
|
★★★
|
 |
2025-02-10 15:00:00 |
Analyst Burnout Is an Advanced Persistent Threat (lien direct) |
For too long, we\'ve treated our analysts as mere cogs in a machine, expecting them to conform to the limitations of our tools and processes. It\'s time to revolutionize security operations.
For too long, we\'ve treated our analysts as mere cogs in a machine, expecting them to conform to the limitations of our tools and processes. It\'s time to revolutionize security operations. |
Tool
Threat
|
|
★★★
|
 |
2025-02-07 20:27:54 |
LLM Hijackers Quickly Incorporate DeepSeek API Keys (lien direct) |
The secret use of other people\'s generative AI platforms, wherein hijackers gain unauthorized access to an LLM while someone else foots the bill, is getting quicker and stealthier by the month.
The secret use of other people\'s generative AI platforms, wherein hijackers gain unauthorized access to an LLM while someone else foots the bill, is getting quicker and stealthier by the month. |
|
|
★★
|
 |
2025-02-07 19:49:48 |
SolarWinds to Go Private for $4.4B (lien direct) |
Five years after a Russian APT infiltrated a software update to gain access to thousands of SolarWinds customers, the board has voted unanimously to sell at a top valuation and plans for uninterrupted operations.
Five years after a Russian APT infiltrated a software update to gain access to thousands of SolarWinds customers, the board has voted unanimously to sell at a top valuation and plans for uninterrupted operations. |
|
|
★★★
|
 |
2025-02-07 19:39:55 |
Microsoft: Thousands of Public ASP.NET Keys Allow Web Server RCE (lien direct) |
Developers are pulling in publicly available ASP.NET keys into their environments, without realizing that cyberattackers can use them for clandestine code injection.
Developers are pulling in publicly available ASP.NET keys into their environments, without realizing that cyberattackers can use them for clandestine code injection. |
|
|
★★★
|
 |
2025-02-07 18:09:42 |
Canadian Man Charged in $65M Cryptocurrency Hacking Schemes (lien direct) |
Pas de details / No more details |
|
|
★★★
|
 |
2025-02-07 18:06:24 |
2024 Breaks Records With Highest Ever Ransomware Attacks (lien direct) |
Pas de details / No more details |
Ransomware
|
|
★★★
|
 |
2025-02-07 17:57:45 |
Databarracks Launches Air Gap Recover (lien direct) |
Pas de details / No more details |
|
|
★★★
|
 |
2025-02-07 17:00:04 |
Google\\'s DMARC Push Pays Off, but Email Security Challenges Remain (lien direct) |
A year after Google and Yahoo started requiring DMARC, the adoption rate of the email authentication specification has doubled; and yet, 87% of domains remain unprotected.
A year after Google and Yahoo started requiring DMARC, the adoption rate of the email authentication specification has doubled; and yet, 87% of domains remain unprotected. |
|
Yahoo
|
★★★
|
 |
2025-02-07 15:00:00 |
Behavioral Analytics in Cybersecurity: Who Benefits Most? (lien direct) |
As the cost of data breaches continues to climb, the role of user and entity behavioral analytics (UEBA) has never been more important.
As the cost of data breaches continues to climb, the role of user and entity behavioral analytics (UEBA) has never been more important. |
|
|
★★★
|
 |
2025-02-06 23:29:34 |
Cybercrime Forces Local Law Enforcement to Shift Focus (lien direct) |
Local law enforcement have to shift away from "place-based policing" when investigating cybercrime.
Local law enforcement have to shift away from "place-based policing" when investigating cybercrime. |
Legislation
|
|
★★★
|
 |
2025-02-06 22:36:16 |
7AI Streamlines Security Operations With Autonomous AI Agents (lien direct) |
Cybereason co-founders launch their second act with a security startup focused offering a platform that uses agentic AI to offload repetitive tasks commonly performed by security analysts.
Cybereason co-founders launch their second act with a security startup focused offering a platform that uses agentic AI to offload repetitive tasks commonly performed by security analysts. |
|
|
★★★
|
 |
2025-02-06 21:20:50 |
Researcher Outsmarts, Jailbreaks OpenAI\\'s New o3-mini (lien direct) |
OpenAI\'s latest tech can reason better than its previous models could, but not well enough to ferret out careful social engineering.
OpenAI\'s latest tech can reason better than its previous models could, but not well enough to ferret out careful social engineering. |
|
|
★★★
|
 |
2025-02-06 21:15:35 |
US Cybersecurity Efforts for Spacecraft Are Up in the Air (lien direct) |
While President Trump supported federal space efforts during his first administration, the addition of SpaceX chief Elon Musk to his circle likely means challenges for regulating spacecraft cybersecurity, experts say.
While President Trump supported federal space efforts during his first administration, the addition of SpaceX chief Elon Musk to his circle likely means challenges for regulating spacecraft cybersecurity, experts say. |
|
|
★★★
|
 |
2025-02-06 20:54:57 |
DeepSeek Phishing Sites Pursue User Data, Crypto Wallets (lien direct) |
Riding the wave of notoriety from the Chinese company\'s R1 AT chatbot, attackers are spinning up lookalike sites for different malicious use cases.
Riding the wave of notoriety from the Chinese company\'s R1 AT chatbot, attackers are spinning up lookalike sites for different malicious use cases. |
|
|
★★★
|
 |
2025-02-06 20:53:41 |
Agencies Sound Alarm on Patient Monitors With Hardcoded Backdoor (lien direct) |
CISA and the FDA are warning that Contec CMS8000 and Epsimed MN-120 patient monitors are open to meddling and data theft; Claroty Team82 flagged the vulnerability as an avoidable insecure design issue.
CISA and the FDA are warning that Contec CMS8000 and Epsimed MN-120 patient monitors are open to meddling and data theft; Claroty Team82 flagged the vulnerability as an avoidable insecure design issue. |
Vulnerability
|
|
★★★
|
 |
2025-02-06 15:00:00 |
The Cyber Savanna: A Rigged Race You Can\\'t Win, but Must Run Anyway (lien direct) |
When it comes to protecting your company from cyberattacks, you don\'t have to be the fastest gazelle - you just can\'t afford to be the slowest.
When it comes to protecting your company from cyberattacks, you don\'t have to be the fastest gazelle - you just can\'t afford to be the slowest. |
|
|
★★★
|
 |
2025-02-06 03:30:00 |
Basket of Bank Trojans Defraud Citizens of East India (lien direct) |
Cheap banking scams are often easier to pull off in a country with older devices, fewer regulations, and experienced fraudsters.
Cheap banking scams are often easier to pull off in a country with older devices, fewer regulations, and experienced fraudsters. |
|
|
★★★
|
 |
2025-02-05 17:30:04 |
Abandoned AWS Cloud Storage: A Major Cyberattack Vector (lien direct) |
New research highlights how bad actors could abuse deleted AWS S3 buckets to create all sorts of mayhem, including a SolarWinds-style supply chain attack.
New research highlights how bad actors could abuse deleted AWS S3 buckets to create all sorts of mayhem, including a SolarWinds-style supply chain attack. |
Cloud
|
|
★★★
|
 |
2025-02-05 16:06:41 |
Attackers Target Education Sector, Hijack Microsoft Accounts (lien direct) |
A sophisticated cyberattack campaign is targeting organizations that still rely on Active Directory Federation Services (ADFS) for authentication across applications and services.
A sophisticated cyberattack campaign is targeting organizations that still rely on Active Directory Federation Services (ADFS) for authentication across applications and services. |
|
|
★★★
|
 |
2025-02-04 23:15:37 |
How Are Modern Fraud Groups Using GenAI and Deepfakes? (lien direct) |
Fraud groups are using AI and deepfake technology to scale up their operations to create fake identities and execute fraud campaigns.
Fraud groups are using AI and deepfake technology to scale up their operations to create fake identities and execute fraud campaigns. |
|
|
★★★
|
 |
2025-02-04 22:42:18 |
Backline Tackles Enterprise Security Backlogs With AI (lien direct) |
The security startup\'s autonomous security remediation platform uses off-the-shelf large language models (LLMs) to analyze security alerts and apply the fixes.
The security startup\'s autonomous security remediation platform uses off-the-shelf large language models (LLMs) to analyze security alerts and apply the fixes. |
|
|
★★
|
 |
2025-02-04 22:15:59 |
Credential Theft Becomes Cybercriminals\\' Favorite Target (lien direct) |
Researchers measured a threefold increase in credential stealing between 2023 and 2024, with more than 11.3 million such thefts last year.
Researchers measured a threefold increase in credential stealing between 2023 and 2024, with more than 11.3 million such thefts last year. |
|
|
★★★
|
 |
2025-02-04 21:45:12 |
Ferret Malware Added to \\'Contagious Interview\\' Campaign (lien direct) |
Targets are lured into a fake interview process that convinces them to download malware needed for a virtual interview.
Targets are lured into a fake interview process that convinces them to download malware needed for a virtual interview. |
Malware
|
|
★★★
|
 |
2025-02-04 19:40:10 |
Cybercriminals Court Traitorous Insiders via Ransom Notes (lien direct) |
Ransomware actors are offering individuals millions to turn on their employers and divulge private company information, in a brand-new cybercrime tactic.
Ransomware actors are offering individuals millions to turn on their employers and divulge private company information, in a brand-new cybercrime tactic. |
Ransomware
|
|
★★★
|
 |
2025-02-04 19:26:22 |
Chinese \\'Infrastructure Laundering\\' Abuses AWS, Microsoft Cloud (lien direct) |
Funnull CDN rents IPs from legitimate cloud service providers and uses them to host criminal websites, continuously cycling cloud resources in and out of use and acquiring new ones to stay ahead of cyber-defender detection.
Funnull CDN rents IPs from legitimate cloud service providers and uses them to host criminal websites, continuously cycling cloud resources in and out of use and acquiring new ones to stay ahead of cyber-defender detection. |
Cloud
|
|
★★
|
 |
2025-02-04 15:00:00 |
Managing Software Risk in a World of Exploding Vulnerabilities (lien direct) |
Organizations and development teams need to evolve from "being prepared" to "managing the risk" of security breaches.
Organizations and development teams need to evolve from "being prepared" to "managing the risk" of security breaches. |
Vulnerability
|
|
★★
|
 |
2025-02-04 08:00:09 |
Nigeria Touts Cyber Success, Even as Cybercrime Rises in Africa (lien direct) |
Organizations continue to be at high risk from cybercrime in Africa, despite law enforcement takedowns of cybercriminal syndicates in Nigeria and other African nations.
Organizations continue to be at high risk from cybercrime in Africa, despite law enforcement takedowns of cybercriminal syndicates in Nigeria and other African nations. |
Legislation
|
|
★★
|
 |
2025-02-03 23:04:37 |
DNSFilter\\'s Annual Security Report Reveals Worrisome Spike in Malicious DNS Requests (lien direct) |
Pas de details / No more details |
Studies
|
|
★★★★
|