Vue normale

Il y a de nouveaux articles disponibles, cliquez pour rafraîchir la page.
Aujourd’hui — 26 novembre 2025Securité

FBI Reports $262M in ATO Fraud as Researchers Cite Growing AI Phishing and Holiday Scams

The U.S. Federal Bureau of Investigation (FBI) has warned that cybercriminals are impersonating financial institutions with an aim to steal money or sensitive information to facilitate account takeover (ATO) fraud schemes. The activity targets individuals, businesses, and organizations of varied sizes and across sectors, the agency said, adding the fraudulent schemes have led to more than $262

Hier — 25 novembre 2025Securité

The Black Friday 2025 Cybersecurity, IT, VPN, & Antivirus Deals

25 novembre 2025 à 20:14
Black Friday 2025 is almost here, and early deals are already live across security software, online courses, system administration tools, antivirus products, and VPN services. These discounts are limited-time offers and vary by provider, so if you see something that fits your needs, it's best to act while it's available. [...]

Years of JSONFormatter and CodeBeautify Leaks Expose Thousands of Passwords and API Keys

New research has found that organizations in various sensitive sectors, including governments, telecoms, and critical infrastructure, are pasting passwords and credentials into online tools like JSONformatter and CodeBeautify that are used to format and validate code. Cybersecurity company watchTowr Labs said it captured a dataset of over 80,000 files on these sites, uncovering thousands of

Ghost in the Shell avait tout prévu avec 30 ans d’avance sur la cybersécurité

25 novembre 2025 à 17:00

Ghost in the Shell Une

Ghost in the Shell avait déjà tout compris à la cybersécurité, entre piratage massif, analyse des logiciels malveillants et espionnage 2.0 qui rappellent les méthodes actuelles. Un classique cyberpunk prémonitoire.

JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers

Cybersecurity researchers are calling attention to a new campaign that's leveraging a combination of ClickFix lures and fake adult websites to deceive users into running malicious commands under the guise of a "critical" Windows security update. "Campaign leverages fake adult websites (xHamster, PornHub clones) as its phishing mechanism, likely distributed via malvertising," Acronis said in a

Alerte – Le ver SSC « Shai-Hulud » revient avec 181 nouveaux packages compromis ciblant NPM/GitHub

Par : UnderNews
25 novembre 2025 à 14:15

Une découverte exclusive émanant de JFrog Security Research concernant une importante attaque de chaîne d’approvisionnement logicielle provenant de packages npm déclenche une alerte. Avec 181 nouveaux packages compromis identifiés par JFrog à ce jour, le risque est généralisé. Une remédiation immédiate exige la rotation de tous les jetons d’environnement compromis. Tribune JFrog – Le nouveau […]

The post Alerte – Le ver SSC « Shai-Hulud » revient avec 181 nouveaux packages compromis ciblant NPM/GitHub first appeared on UnderNews.

Year-end approaches: How to maximize your cyber spend

25 novembre 2025 à 15:03
Year-end budgeting is the perfect time to close real security gaps by strengthening identity controls, reducing redundant tools, and investing in outcome-driven engagements. The article highlights how targeting credential risks and documenting results helps teams maximize spend and justify next year's budget. [...]

ToddyCat’s New Hacking Tools Steal Outlook Emails and Microsoft 365 Access Tokens

The threat actor known as ToddyCat has been observed adopting new methods to obtain access to corporate email data belonging to target companies, including using a custom tool dubbed TCSectorCopy. "This attack allows them to obtain tokens for the OAuth 2.0 authorization protocol using the user's browser, which can be used outside the perimeter of the compromised infrastructure to access

3 SOC Challenges You Need to Solve Before 2026

2026 will mark a pivotal shift in cybersecurity. Threat actors are moving from experimenting with AI to making it their primary weapon, using it to scale attacks, automate reconnaissance, and craft hyper-realistic social engineering campaigns. The Storm on the Horizon Global world instability, coupled with rapid technological advancement, will force security teams to adapt not just their

Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware

Cybersecurity researchers have disclosed details of a new campaign that has leveraged Blender Foundation files to deliver an information stealer known as StealC V2. "This ongoing operation, active for at least six months, involves implanting malicious .blend files on platforms like CGTrader," Morphisec researcher Shmuel Uzan said in a report shared with The Hacker News. "Users unknowingly

Comment les logiciels espions finissent dans les téléphones des « individus de grande valeur » ?

25 novembre 2025 à 12:08

La Cybersecurity and Infrastructure Security Agency (CISA) revient sur les principales campagnes de cyberespionnage menées via des logiciels espions et ayant pour cible des « individus de grande valeur ». L'occasion pour l'organisme américain de détailler les principaux modes d'intrusion exploités par les pirates.

❌
❌