What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
no_ico.webp 2023-09-21 09:38:26 L'enquête révèle: 50% des répondants sont confrontés à des cyberattaques chaque année - les employeurs blâment les employés
Survey Reveals: 50% Of Respondents Face Cyberattacks Yearly - Employers Blame Employees
(lien direct)
Environ 24% des employés n'ont jamais suivi de formation en cybersécurité, selon une nouvelle étude de Nordlocker.Cette enquête a également révélé que, en ce qui concerne la responsabilité des attaques de phishing, des attaques de ransomwares et des infections de logiciels malveillants, les répondants ont indiqué que les entreprises ont fréquemment transféré le blâme sur les employés et ont estimé qu'ils devraient être responsables de ces types de menaces.[& # 8230;]
Around 24% of employees have never had any cybersecurity training, according to a new study by NordLocker. This survey also revealed that when it comes to responsibility for phishing attacks, ransomware attacks, and malware infections, respondents indicated that companies frequently shifted the blame onto employees and felt they should bear accountability for these types of threats. […]
Ransomware Malware Studies ★★★★
no_ico.webp 2023-08-31 14:18:03 Le FBI démantèle le botnet Qakbot dans la plus grande opération de cybercriminalité
FBI Dismantles QakBot Botnet In Largest-Ever Cybercrime Operation
(lien direct)
L'opération Duck Hunt saisit 52 serveurs, plus de 8,6 millions de dollars en crypto-monnaie dans une réalisation révolutionnaire qui marque une victoire importante pour la cybersécurité mondiale, le FBI, dirigeant une multinationale d'application de la loi,Dismanted Qakbot, un chargeur de logiciels malveillants notoire fortement exploité par les cybercriminels.À l'intérieurOpération Duck Hunt Code nommé & # 8220; Operation Duck Hunt, & # 8221;Le FBI a acquis un accès privilégié [& # 8230;]
Operation Duck Hunt Seizes 52 Servers, Over $8.6 Million in Cryptocurrency In a groundbreaking achievement that marks a significant win for global cybersecurity, the FBI, leading a multinational law enforcement coalition, has dismantled QakBot, a notorious malware loader heavily exploited by cybercriminals. Inside Operation Duck Hunt Code-named “Operation Duck Hunt,” the FBI gained privileged access […]
Malware ★★★
no_ico.webp 2023-05-26 04:21:11 Cosmicenergy, nouvelle souche russe de logiciels malveillants attaquant les grilles électriques
CosmicEnergy, Russian New Strain Of Malware Attacking Electric Grids
(lien direct)
Les spécialistes de la sécurité ont détecté un nouveau type de logiciels malveillants, nommé & # 8220; Cosmicenergy, & # 8221;qui possède le potentiel de faire des ravages sur les systèmes d'infrastructure clés et les réseaux d'électricité.Les chercheurs de Mandiant ont découvert les logiciels malveillants, qui, selon eux, ont des capacités similaires au logiciel malveillant industriel dévastateur utilisé par le russe soutenu par l'État & # 8220; Sandworm & # 8221;Équipe de piratage pour faire tomber l'Ukraine & # 8217; s [& # 8230;]
Security specialists have detected a new type of malware, named “CosmicEnergy,” that possesses the potential to wreak havoc on key infrastructure systems and electricity networks. The researchers from Mandiant discovered the malware, which they claim has capabilities similar to the devastating Industroyer malware utilized by the Russian state-backed “Sandworm” hacking team to bring down Ukraine’s […]
Malware CosmicEnergy ★★★
no_ico.webp 2023-05-16 20:27:10 Hackers chinois Mustang Panda attaque les routeurs TP-Link
Chinese Hackers Mustang Panda Attacks TP-Link Routers
(lien direct)
La tenue de piratage chinoise parrainée par l'État & # 8220; Camaro Dragon & # 8221;Attaque des routeurs TP-Link ménagers avec sur mesure & # 8220; Horse Shell & # 8221;des logiciels malveillants pour attaquer les organisations européennes des affaires étrangères.Les pirates utilisent le virus de la porte dérobée dans un micrologiciel personnalisé pour les routeurs TP-Link pour lancer des assauts à partir des réseaux domestiques.Selon Check Point Research, cette attaque cible les réseaux résidentiels et domestiques, et non des réseaux importants.Ainsi, infectant [& # 8230;]
The Chinese state-sponsored hacking outfit “Camaro Dragon” attacks household TP-Link routers with bespoke “Horse Shell” malware to attack European foreign affairs organizations. Hackers use backdoor virus in custom firmware for TP-Link routers to launch assaults from home networks. According to Check Point research, this attack targets residential and home networks, not important networks. Thus, infecting […]
Malware ★★★
no_ico.webp 2023-05-13 13:18:21 Revue des nouvelles et des événements qui se sont produits cette semaine
Review Of News and Events That Happened This Week
(lien direct)
Un aperçu des titres des nouvelles et des événements de la semaine dernière concernant les ransomwares, les violations de données, la sécurité rapide des réponses et d'autres sujets connexes.Les attaques de logiciels malveillants de SmokeLoader et Roarbat, CER-UA avertissent CERT-UA a signalé la propagation de SmokeLoader Malware via des campagnes de phishing sur le thème des factures, qui détournent des comptes pour envoyer des e-mails avec un package zip [& # 8230;]
A rundown of the headlines of news and events from the past week pertaining to ransomware, data breaches, quick response security, and other related topics. Malware Attacks From SmokeLoader And RoarBAT, CERT-UA Warns CERT-UA has reported the spread of SmokeLoader malware through invoice-themed phishing campaigns, which hijack accounts to send emails with a ZIP package […]
Malware ★★
no_ico.webp 2023-05-09 20:18:57 Défauts de chahut sévères utilisés par les logiciels malveillants DDOS DDOS frais
Severe Ruckus RCE Flaws Utilized By Fresh DDoS Botnet Malware
(lien direct)
& # 8220; AndoryUbot & # 8217;est un nouveau botnet malveillant qui infecte les points d'accès Wi-Fi non corrigées pour les assauts DDOS à l'aide d'une faiblesse du panneau d'administration sans fil de Ruckus.Le CVE-2023-25717 permet aux attaquants distants d'exécuter du code sur les panneaux d'administration sans fil de chahut sensibles version 10.4 et plus en envoyant des demandes de GET HTTP non authentifiées.Le 8 février 2023, a trouvé et corrigé le problème.Beaucoup [& # 8230;]
“AndoryuBot’ is a new malware botnet that infects unpatched Wi-Fi access points for DDoS assaults using a key Ruckus Wireless Admin panel weakness. CVE-2023-25717 allows remote attackers to execute code on susceptible Ruckus Wireless Admin panels version 10.4 and older by sending unauthenticated HTTP GET requests. February 8, 2023, found and corrected the problem. Many […]
Malware ★★
no_ico.webp 2023-05-08 08:48:08 Les attaques de logiciels malveillants de SmokeLoader et Roarbat, CERT-UA avertissent
Malware Attacks From SmokeLoader And RoarBAT, CERT-UA Warns
(lien direct)
Sur la base de l'équipe d'intervention d'urgence informatique d'Ukraine (CERT-UA), le malware SmokeLoader est maintenant réparti via une campagne de phishing en utilisant des leurres centrés sur des factures.Un dossier zip contenant un faux document et un fichier JavaScript est joint aux e-mails, qui, selon l'agence, ont été envoyés à partir de comptes piratés.Après le JavaScript, c'est [& # 8230;]
Based on the Computer Emergency Response Team of Ukraine (CERT-UA), the SmokeLoader malware is now being spread via a phishing campaign using lures centered around invoices. A ZIP folder containing a fake document and a JavaScript file is attached to the emails, which the agency says were sent from hacked accounts. After the JavaScript is […]
Malware ★★
no_ico.webp 2023-05-04 12:02:59 Meta déracine les opérations de cyber-espionnage des médias sociaux en Asie du Sud
Meta Unravels Social Media Cyber Espionage Operations In South Asia
(lien direct)
Des centaines de faux profils bien développés sur Facebook et Instagram ont été utilisés par trois acteurs de menace distincts pour lancer des assauts séparés contre des utilisateurs d'Asie du Sud.Pour diffuser leurs logiciels malveillants et voler des informations sensibles, chacun de ces APT s'est considérablement appuyé sur l'ingénierie sociale, selon Guy Rosen, le chef de la sécurité de l'information de Meta.Ils ont pu [& # 8230;]
Hundreds of well-developed fake profiles on Facebook and Instagram were used by three separate threat actors to launch separate assaults on users in Southern Asia. To spread their malware and steal sensitive information, each of these APTs leaned significantly on social engineering, according to Guy Rosen, Meta’s chief information security officer. They were able to […]
Malware Threat ★★
no_ico.webp 2023-04-28 14:35:13 50 portefeuilles cryptographiques ciblés par des logiciels malveillants atomiques
50 Crypto Wallets Targeted by Atomic MacOS Malware
(lien direct)
Les professionnels de la sécurité ont émis des alertes concernant un nouveau type de logiciels malveillants qui cible les appareils MacOS dans le but de voler des données sensibles, y compris les détails de la carte de crédit, les dates d'expiration des cartes de crédit et les informations de plus de 50 extensions de navigateur Bitcoin.La menace, surnommée & # 8220; atomic & # 8221;(également connu sous le nom de & # 8220; AMOS & # 8221;), est proposé pour 1 000 $ par mois sur Telegram, [& # 8230;]
Security professionals have issued alerts regarding a new type of malware that targets MacOS devices in an effort to steal sensitive data, including credit card details, credit card expiration dates, and information from over 50 Bitcoin browser extensions. The threat, dubbed “Atomic” (also known as “AMOS”), is being offered for $1,000 per month on Telegram, […]
Malware ★★
no_ico.webp 2023-04-27 11:09:17 Google va après les distributeurs de cryptbot volant des données sensibles
Google Goes After CryptBot Distributors Stealing Sensitive Data
(lien direct)
Google a déposé une plainte contre les personnes qui utilisent CryptBot pour infecter les utilisateurs de Google Chrome et voler leurs données.Dans le cadre de ses efforts pour lutter contre cette activité malveillante, Google supprime l'infrastructure de logiciels malveillants associé à CryptBot.Dans le paysage en constante évolution en constante évolution des menaces de cybersécurité, des entreprises telles que Google jouent un rôle essentiel [& # 8230;]
Google has filed a lawsuit against individuals who use Cryptbot to infect Google Chrome users and steal their data. As part of its efforts to combat this malicious activity, Google is taking down the malware infrastructure associated with Cryptbot. In today’s constantly evolving landscape of cybersecurity threats, companies such as Google play a critical role […]
Malware ★★
no_ico.webp 2023-04-20 12:06:29 Raspberry Robin adopte les techniques d'évasion initiées
Raspberry Robin Adopts Initiates Evasion Techniques
(lien direct)
Les chercheurs en sécurité de Check Point Research (RCR) ont publié un avis qui détaille les techniques d'évasion uniques employées par des acteurs de la menace qui comptent sur le malware de Raspberry Robin pour éviter la détection.Dans l'avis publié mardi, les experts en RCR expliquent les nouvelles fonctionnalités malveillantes et fournissent des détails techniques sur la façon de se prémunir contre eux.Selon CPR Security [& # 8230;]
Security researchers at Check Point Research (CPR) have released an advisory that details the unique evasion techniques employed by threat actors who rely on the Raspberry Robin malware to avoid detection. In the advisory published on Tuesday, CPR experts explain the novel malware features and provide technical details on how to guard against them. According to CPR security […]
Malware Threat ★★
no_ico.webp 2023-04-18 17:45:25 Goldoson Malware frappe 100 millions de téléchargements sur Google Play Store
Goldoson Malware Hits 100 Million Downloads On Google Play Store
(lien direct)
Goldoson Malware, une nouvelle épidémie de logiciels malveillants Android, a été trouvé dans plus de 60 applications authentiques Google Play Store avec plus de 100 millions de téléchargements.Un magasin, un marché populaire d'applications tiers sud-coréennes, a enregistré huit millions d'installations supplémentaires.Le composant Rogue, qui fait partie d'une bibliothèque de logiciels tiers utilisés par les applications, peut collecter des informations sur [& # 8230;]
Goldoson malware, a new Android malware outbreak, has been found in over 60 genuine Google Play Store apps with over 100 million downloads. ONE shop, a popular South Korean third-party app marketplace, has logged eight million more installations. The rogue component, part of a third-party software library utilized by the apps, can collect information about […]
Malware ★★
no_ico.webp 2023-04-18 11:45:02 Apparents appareils Apple MacOS maintenant soumis de ransomware de verrouillage
Apple MacOS Devices Now Subject Of LockBit Ransomware
(lien direct)
Selon MalwareHunterTeam, le groupe Ransomware Lockbit travaille prétendument sur une nouvelle variante de logiciels malveillants qui peuvent crypter des données sur Apple MacOS.Bien que Lockbit se concentre traditionnellement sur les systèmes Linux et Windows, ce serait la première instance de logiciels malveillants visant les appareils Mac.L'organisation Ransomware est réputée pour son entreprise RAAS (Ransomware-as-a-Service), [& # 8230;]
According to MalwareHunterTeam, the LockBit ransomware group is purportedly working on a new variant of malware that may encrypt data on Apple macOS. Although LockBit has traditionally concentrated on Linux and Windows systems, this would be the first instance of malware aiming at Mac devices. The ransomware organization is renowned for its RaaS (ransomware-as-a-service) business, […]
Ransomware Malware ★★★
no_ico.webp 2023-04-17 06:41:16 Que sont les vers d'ordinateur et comment les empêcher
What Are Computer Worms And How To Prevent Them
(lien direct)
Avez-vous déjà entendu parler de vers d'ordinateur?Ces programmes malveillants peuvent faire des ravages sur votre système informatique et compromettre vos données.Dans le monde de la cybersécurité, les vers informatiques sont une menace sérieuse.Ce sont des logiciels malveillants qui se propagent dans les réseaux, infectant des ordinateurs et causant des dommages aux fichiers et aux logiciels.Le premier ver d'ordinateur a été créé dans [& # 8230;]
Have you ever heard of computer worms? These malicious programs can cause havoc on your computer system and compromise your data. In the world of cybersecurity, computer worms are a serious threat. They are malware that spreads through networks, infecting computers and causing damage to files and software. The first computer worm was created in […]
Malware ★★
no_ico.webp 2023-04-14 10:46:17 WhatsApp améliore la défense contre le rachat de compte malveillant
WhatsApp Improves Defense Against Malware-Based Account Takeover
(lien direct)
De nombreuses nouvelles fonctionnalités de sécurité pour WhatsApp ont été dévoilées aujourd'hui, dont l'une s'appelle & # 8220; Vérification des périphériques & # 8221;et est destiné à offrir une amélioration des assauts de reprise du compte (ATO).La vérification de l'appareil empêche les logiciels malveillants d'identifier les comptes et l'utilisation des clés d'authentification volées pour envoyer des messages de phishing et d'escroquerie aux contacts sur les utilisateurs ciblés & # 8217;listes de contacts [& # 8230;]
Many new security features for WhatsApp have been unveiled today, one of which is called “Device Verification” and is intended to offer improved defense against account takeover (ATO) assaults. Device Verification stops malware from impersonating accounts and using stolen authentication keys to send phishing and scam messages to contacts on the targeted users’ contact lists […]
Malware ★★
no_ico.webp 2023-04-11 17:25:27 Cybercriminels pour ajouter des logiciels malveillants Android sur Google Play jusqu'à 20 000 $
Cybercriminals To Add Android Malware On Google Play Up To $20,000
(lien direct)
Selon le type de comportement malveillant que les criminels en ligne exigent, les producteurs de logiciels malveillants ont établi un marché en plein essor.C'est là qu'ils proposent d'ajouter des applications malveillantes Android dangereuses à Google Play pour 2 000 $ et 20 000 $.Sur les forums de pirate ou les canaux télégrammes, le coût spécifique de ces services est négocié au cas par cas, permettant des cybercriminels [& # 8230;]
Depending on the type of malicious behaviour that online criminals demand, malware producers have established a booming market. This is where they offer to add dangerous Android malware apps to Google Play for anywhere between $2,000 and $20,000. On hacker forums or Telegram channels, the specific cost of these services is negotiated case-by-case, enabling cybercriminals […]
Malware ★★
no_ico.webp 2023-04-04 16:06:23 Arid Viper utilisant des logiciels malveillants améliorés dans les cyberattaques du Moyen-Orient
Arid Viper Using Upgraded Malware In Middle East Cyberattacks
(lien direct)
Depuis septembre 2022, les entités palestiniennes sont ciblées par Arid Viper, un acteur de menace observé à l'aide de versions mises à jour de sa boîte à outils malware.Selon Symantec, qui surveille le groupe sous le nom de Mantis, l'adversaire prend des mesures importantes pour maintenir une présence continue sur les réseaux qu'elle cible.Kaspersky, dans un rapport publié en février 2015, [& # 8230;]
Since September 2022, Palestinian entities have been targeted by Arid Viper, a threat actor observed using updated versions of its malware toolkit. According to Symantec, which monitors the group under the name Mantis, the adversary is taking significant measures to sustain a continual presence on the networks it targets.  Kaspersky, in a report published in February 2015, […]
Malware Threat APT-C-23 ★★
no_ico.webp 2023-04-04 10:30:08 Sécurité onenote serrée par Microsoft pour bloquer 120 extensions de fichiers
OneNote Security Tightened By Microsoft To Block 120 File Extensions
(lien direct)
Après des allégations selon lesquelles le service de prise de notes est de plus en plus mal utilisé pour la transmission de logiciels malveillants, Microsoft a révélé des étapes pour supprimer automatiquement les fichiers intégrés avec & # 8220; extensions dangereuses & # 8221;Dans OneNote Security.Les utilisateurs ont déjà été présentés avec une fenêtre les avertissant que l'ouverture des pièces jointes spécifiques pourrait endommager leur ordinateur et leurs données, mais ils pouvaient l'ignorer et accéder au [& # 8230;]
After allegations that the note-taking service is being increasingly misused for malware transmission, Microsoft has revealed steps to automatically remove embedded files with “dangerous extensions” in OneNote security. Users were previously presented with a window warning them that opening specific attachments could damage their computer and data, but they could ignore it and access the […]
Malware ★★
no_ico.webp 2023-03-28 09:30:26 De nouvelles variantes icedids passent de la livraison de logiciels malveillants à la fraude bancaire [New IcedID Variants Switch From Delivering Malware To Bank Fraud] (lien direct) Le programme Banking Trojan IceDID, qui a récemment été utilisé pour répandre les ransomwares, a deux nouvelles variations que les experts en sécurité ont observées dans les campagnes d'attaque.Les deux nouvelles variations sont plus légères que l'original car certaines fonctionnalités ont été supprimées, dont l'une semble être associée à l'EmoTet Botnet.Dans un [& # 8230;]
The banking Trojan program IcedID, which has recently been used to spread ransomware, has two new variations that security experts have observed being utilized in attack campaigns. The two new variations are lighter than the original since certain functionality has been removed, one of which looks to be associated with the Emotet botnet. In a […]
Malware ★★★
no_ico.webp 2023-03-23 14:10:11 Agences allemandes et sud-coréennes alertes des attaques de Kimsuky \\ [German and South Korean Agencies Alerts of Kimsuky\\'s Attacks] (lien direct) Les agences de renseignement allemandes et sud-coréennes ont émis un avertissement conjoint contre les tactiques de cyberattaque croissantes d'un groupe de pirates nord-coréen appelé Kimsuky.Le groupe, soutenu par le gouvernement nord-coréen, a ciblé des organisations dans les deux pays avec des campagnes de phishing sophistiquées et des attaques de logiciels malveillants.L'avertissement intervient alors que les cyberattaques continuent [& # 8230;]
German and South Korean intelligence agencies have issued a joint warning against the increasing cyber-attack tactics of a North Korean hacker group called Kimsuky. The group, believed to be backed by the North Korean government, has been targeting organizations in both countries with sophisticated phishing campaigns and malware attacks. The warning comes as cyber-attacks continue […]
Malware General Information ★★★
no_ico.webp 2023-03-10 20:34:34 Xenomorph Android Malware Steals Data From 400 Banks (lien direct) A new automatic transfer system (ATS) framework and the capacity to steal login information for 400 banks are two of the main capabilities added to the Xenomorph Android virus in this new iteration. ThreatFabric found the initial iteration in February 2022. The banking malware has amassed over 50,000 downloads on the Google Play store. Using […] Malware
no_ico.webp 2023-03-10 12:58:14 SoulSearcher Malware Released By Chinese Sharp Panda Group (lien direct) Sharp Panda’s new “SoulSearcher” malware framework is targeting high-profile government agencies in Vietnam, Thailand, and Indonesia. Chinese APTs used the virus to spy on vital Southeast Asian organizations. Check Point found a spear-phishing-based malware campaign that started in late 2022 and continues into 2023. The latest Sharp Panda operation sends spear-phishing emails with malicious DOCX […] Malware ★★
no_ico.webp 2023-03-10 10:54:50 Police Seize Netwire RAT Malware Framework, Detains Admin (lien direct) After seizing the website and bringing down the infrastructure used by criminals connected to the NetWire remote access malware, international law enforcement authorities have declared another triumph over cybercriminals (RAT). A guy who allegedly ran the worldwiredlabs website, which has long sold the NetWire malware, was detained by Croatian police on Tuesday. Swiss law enforcement […] Malware ★★★
no_ico.webp 2023-03-09 10:35:58 There\'s A RAT In mi Note, What Am I Gonna Do? (lien direct) Cybercriminals use Microsoft OneNote attachments in phishing emails to spread malware and password stealers. Phishing campaigns are one of the most typical ways criminals obtain private or sensitive information. According to Verizon Data Breach Investigations Report, 94% of the malware is delivered by email. Malicious Word and Excel attachments for phishing have been prevalent for […] Data Breach Malware ★★★
no_ico.webp 2023-03-01 18:45:28 Cybercriminals Targets Law Firms With GootLoader & FakeUpdates (lien direct) According to cybersecurity company eSentire, six law firms were the targets of distinct GootLoader and SocGholish malware attacks in January and February 2023. The first effort, which targeted employees of legal firms, sought to infect victims’ machines with GootLoader, a malware family known for installing the Cobalt Strike implant, REvil ransomware, and GootKit remote access […] Malware ★★
no_ico.webp 2023-02-24 16:07:11 New S1deload Malware Hijacking Youtube And Facebook Accounts (lien direct) A new malware campaign called S1deload Stealer has been discovered by Bitdefender’s Advanced Threat Control (ATC) team, targeting YouTube and Facebook users. The malware infects computers, hijacks social media accounts, and uses devices to mine cryptocurrency. Security researchers discovered that the malware uses DLL sideloading to evade detection. Bitdefender products detected over 600 unique users […] Malware Threat ★★★
no_ico.webp 2023-02-19 15:41:52 GoDaddy: Hackers Grabbed Source Code And Inserts Malware (lien direct) GoDaddy, a major provider of web hosting services, claims that a multi-year attack on its cPanel shared hosting environment resulted in a breach where unidentified attackers took source code and put malware on its servers. Even though the attackers had access to the company’s network for a while, GoDaddy didn’t become aware of the security […] Malware ★★★★
no_ico.webp 2023-02-15 17:25:14 Beep: New Evasive Malware That Can Escape Under The Radar (lien direct) Beep 4 was discovered last week, a brand-new stealthy virus with several capabilities to avoid analysis and detection by security tools. After a flurry of samples were posted to VirusTotal, an internet portal for file scanning and harmful content identification, Minerva analysts became aware of the infection. Even though Beep is still under development and […] Malware ★★
no_ico.webp 2023-02-15 14:31:19 MortalKombat Ransomware Infects Computer, Steals Crypto From Users (lien direct) Organizations in the Philippines, Turkey, the Philippines, and the United Kingdom have recently been affected by MortalKombat, a new ransomware that cybersecurity experts are pointing out. Using MortalKombat and a brand-new piece of malware called Laplas Clipper, researchers from Cisco’s Talos security team claim to have tracked a ransomware organization that has been stealing cryptocurrency […] Ransomware Malware ★★★
no_ico.webp 2023-02-15 10:06:57 RedEyes Hackers Adopts New Malware, Steals Data From Devices (lien direct) The APT37 threat group targets people for intelligence gathering using the new elusive “M2RAT” malware and steganography. North Korea’s APT37, sometimes referred to as “RedEyes” or “ScarCruft,” is a hacker collective thought to be funded by the government. The hacker gang was observed in 2022 using Internet Explorer zero-day vulnerabilities to distribute a wide range […] Malware Threat Cloud APT 37 ★★
no_ico.webp 2023-02-13 17:17:33 Pepsi Bottling Ventures Breached Following Malware Attack (lien direct) Following a network intrusion in which information-stealing malware was installed, and data was extracted, Pepsi Bottling Ventures LLC, one of the largest bottlers of Pepsi-Cola beverages in the United States, experienced a data breach. Although the security lapse occurred on December 23, 2022, it was uncovered on January 10, 2023. The scope of the breach […] Malware ★★★
no_ico.webp 2023-02-09 17:05:17 Hackers Bypass ChatGPT Restrictions Via Telegram Bots (lien direct) Researchers revealed on Wednesday that hackers had found a means to get beyond ChatGPT’s limitations and are using it to market services that let users produce malware and phishing emails. ChatGPT is a chatbot that imitates human output by using artificial intelligence to respond to inquiries and carry out tasks.  People can use it to […] Malware ChatGPT ★★
no_ico.webp 2023-02-09 13:01:38 Russian Hackers Steal Data In Ukraine With New Graphiron Malware (lien direct) There is evidence that hackers with ties to Russia are using new software designed to steal information to launch attacks against Ukraine. This malware, discovered by the Computer Emergency Response Team of Ukraine (CERT-UA) and dubbed Graphiron by Broadcom-owned Symantec, was developed by an espionage group called Nodaria and is known as UAC-0056. According to […] Malware ★★
no_ico.webp 2023-02-02 11:50:00 (Déjà vu) HeadCrab Malware Infects 1,200 Redis servers to Mine Monero (lien direct) Since September 2021, about a thousand Redis servers have been infected by new stealthy malware meant to hunt down unprotected Redis servers online and create a botnet that mines for the Monero cryptocurrency. The malware, nicknamed HeadCrab by Aqua Security experts Nitzan Yaakov and Asaf Eitani, has so far infected at least 1,200 of these servers, which […] Malware
no_ico.webp 2023-01-11 14:13:11 Kinsing Malware Hits Kubernetes Clusters By Flawed PostgreSQL (lien direct) As of late, Kubernetes clusters have been actively breached by the Kinsing malware, which exploits vulnerabilities in container images and misconfigured, exposed PostgreSQL containers. While not new, the Defender for Cloud team at Microsoft has noticed a spike in recent months, suggesting that the threat actors are increasingly focusing on narrow access points. Kinsing is […] Malware Threat Uber ★★
no_ico.webp 2023-01-02 15:05:06 Linux Malware Exploits 30+ Plugins Into WordPress Sites (lien direct) A new strain of Linux malware is targeting WordPress sites and exploiting vulnerabilities in over two dozen plugins and themes to compromise systems. Russian security firm Doctor Web discovered the malware, which has been tracked as Linux.BackDoor.WordPressExploit.1. It targets both 32-bit and 64-bit versions of Linux and has backdoor capabilities that allow it to attack […] Malware ★★★
no_ico.webp 2022-12-22 14:03:30 Brazilian Bank Users Are the Target of a New BrasDex Malware (lien direct) Cybercriminals have recently launched a new Android trojan called BrasDex that targets Brazilian bank users. This trojan is part of a more extensive, ongoing multi-platform campaign that has been attributed to the threat players behind the Windows banking malware Casbaneiro. Dutch security firm ThreatFabric published a report last week stating that BrasDex has “a very […] Malware Threat ★★
no_ico.webp 2022-12-21 15:10:49 Top 26 Open Source Cyber Security Tools that is Best for you (lien direct) Cybersecurity is a crucial aspect of protecting businesses, organizations, and individuals while there are wide variety of open source tools and technologies available to help. Businesses, organizations and individuals needs proper safeguarding against these threats from cyber attacks such as data breaches, malware attacks, and phishing scams. Hence open source solutions are an increasingly popular […] Malware ★★★★
no_ico.webp 2022-12-05 17:11:57 Newly Discovered Trojan Steals 300,000 Facebook Users Details In 4 Year-Long Campaign (lien direct) It has been reported that a newly discovered Trojan has stolen Facebook logins from over 300,000 users in a campaign lasting four years, according to Zimperium. The security vendor claimed to have found the “Schoolyard Bully” malware hidden in several applications available on both Google Play and third-party app stores. Malware ★★
no_ico.webp 2022-11-26 13:49:47 7 Email Security Risks And How To Tackle Them (lien direct) Email is one of the top two distribution mechanisms for harmful payloads, with the average company receiving over 75% of its malware over email, according to Verizon’s 2022 Data Breach Investigations Report. Even if just a small percentage of employees actively click on phishing emails, the overall numbers are still high enough to make this […] Data Breach Malware ★★
no_ico.webp 2022-11-23 11:07:32 Google Makes Cobalt Strike Harder To Abuse, Expert Weighs In (lien direct) Google Clamps Down on Cobalt Strike Abuses Google announced earlier this month that it had removed the ability to run JavaScript from inside.  HTML tags on its advertisement platform, in an effort to clamp down on ad fraud. And abuse perpetrated by cryptomining malware like Cobalt Strike and Coinhive. But what does this change mean […] Malware
no_ico.webp 2022-11-18 12:25:50 Magento E-commerce Attacks More Than Double In November (lien direct) E-commerce malware detection firm Sansec is tracking a surge in cyberattacks targeting Magento stores.  At least seven Magecart groups are injecting TrojanOrders at approximately 38% of Magento and Adobe Commerce websites in November. The trend in recent weeks paints a grim picture for ecommerce DevOps teams worldwide for the coming weeks. There is a big increase of […] Malware
no_ico.webp 2022-11-16 19:30:56 (Déjà vu) China-Based Sophisticated Phishing Campaign Uses 42,000 Domains (lien direct) It has been reported that security researchers have uncovered a sophisticated phishing campaign using tens of thousands of malicious domains to spread malware and generate advertising revenue. Dubbed “Fangxiao,” the group directs unsuspecting users to the domains via WhatsApp messages telling them they've won a prize, according to security vendor Cyjax. The phishing site landing pages apparently impersonate […] Malware
no_ico.webp 2022-11-11 11:55:16 Malware Campaign Redirects 15,000 Sites (lien direct) It has been reported that security researchers have spotted an intriguing malware campaign designed to increase the search engine rankings of spam websites under the control of threat actors. Spam Malware Threat
no_ico.webp 2022-11-10 13:40:53 Advanced RAT AgentTesla Revealed As Most Widespread Malware In October (lien direct) It has been reported that info-stealing malware accounted for the three most widespread variants in October, comprising nearly a fifth (16%) of global detections, according to Check Point. The security vendor's Global Threat Index for October 2022 is compiled from hundreds of millions of its own threat intelligence sensors, installed across customer networks, endpoints and mobile devices. Malware Threat
no_ico.webp 2022-11-10 13:28:52 Security Expert On IceXLoader Malware (lien direct) A new version of IceXLoader that has compromised thousands of personal and enterprise Windows machines, security experts reacted below. Malware
no_ico.webp 2022-10-25 14:12:28 (Déjà vu) Thousands Of Fake PoC Exploits In GitHub Repositories Deliver Malware – Expert Comments (lien direct) A technical paper from the researchers at Leiden Institute of Advanced Computer Science details how researchers discovered thousands of repositories on GitHub that offer fake proof-of-concept (PoC) exploits for various vulnerabilities, some of them including malware. In an inspection of 47,313 downloaded and checked repositories, fully 10.3% (4893), were found to “have symptoms of malicious intent.” This number […] Malware
no_ico.webp 2022-10-25 13:40:13 Payment Card Attack Could Be Worth $3.3M (lien direct) It has been reported that a PoS payment card attack involving a pair of malware variants was used to steal more than 167,000 payment records from 212 infected devices mostly in the U.S.  Full story: Researchers uncover more than 167,000 stolen credit card numbers, primarily from the U.S. – CyberScoop Malware
no_ico.webp 2022-10-25 13:28:52 Typosquat Campaign Mimics 27 Brands To Push Windows, Android Malware (lien direct) It has been reported that the Typosquat campaign mimics 27 brands to push Windows, Android malware.  Full story: Typosquat campaign mimics 27 brands to push Windows, Android malware (bleepingcomputer.com) Malware
no_ico.webp 2022-10-10 10:12:56 Kaspersky Warns Of A New Wave Of Malicious Email Campaign, Spreading The Qbot Malware (lien direct) Kaspersky has discovered a new wave of malicious email activity which spreads the dangerous malware Qbot, targeting corporate users and stealing sensitive data from networks.  After initially dying down earlier this year the second wave of attacks has taken place and now over 1,500 users have been affected since 28th September – with the number still […] Malware
Last update at: 2024-04-28 18:07:58
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter