Vue normale

Il y a de nouveaux articles disponibles, cliquez pour rafraîchir la page.
Hier — 2 juillet 2025Securité

That Network Traffic Looks Legit, But it Could be Hiding a Serious Threat

With nearly 80% of cyber threats now mimicking legitimate user behavior, how are top SOCs determining what’s legitimate traffic and what is potentially dangerous? Where do you turn when firewalls and endpoint detection and response (EDR) fall short at detecting the most important threats to your organization? Breaches at edge devices and VPN gateways have risen from 3% to 22%, according to

Hackers Using PDFs to Impersonate Microsoft, DocuSign, and More in Callback Phishing Campaigns

Cybersecurity researchers are calling attention to phishing campaigns that impersonate popular brands and trick targets into calling phone numbers operated by threat actors. "A significant portion of email threats with PDF payloads persuade victims to call adversary-controlled phone numbers, displaying another popular social engineering technique known as Telephone-Oriented Attack Delivery (TOAD

Cyber attaque Quantas

Par : UnderNews
2 juillet 2025 à 11:15

Le secteur aérien fait beaucoup parler de lui ces derniers temps. Comme vous l’avez sans doute vu, la plus grande compagnie aérienne australienne, Qantas, a annoncé avoir été victime d’un cyber-incident. Tribune – Les experts de Mandiant nous font part de leurs réflexions sur cette cyberattaque ciblée : « Bien que Scattered Spider ait déjà pris […]

The post Cyber attaque Quantas first appeared on UnderNews.

Laptop Farms : l’incroyable réseau de télétravailleurs nord-coréen démantelé par les États-Unis

2 juillet 2025 à 11:07

Fin juin 2025, la justice américaine a dévoilé l’opération DPRK RevGen, une initiative des principales agences de sécurité du pays (NSA, FBI, contre-espionnage) visant à démanteler un vaste réseau de travailleurs informatiques nord-coréens.

U.S. Sanctions Russian Bulletproof Hosting Provider for Supporting Cybercriminals Behind Ransomware

The U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) has levied sanctions against Russia-based bulletproof hosting (BPH) service provider Aeza Group to assist threat actors in their malicious activities and targeting victims in the country and across the world. The sanctions also extend to its subsidiaries Aeza International Ltd., the U.K. branch of Aeza Group, as well

La riposte iranienne se fera-t-elle sur le cyber ? Les agences américaines en état d’alerte

1 juillet 2025 à 17:09

Malgré un cessez-le-feu, la tension reste palpable entre les différents acteurs du conflit Iran-Israël. Les autorités américaines en ont bien conscience et tirent la sonnette d'alarme : une vague de cyberattaques iraniennes pourrait frapper des infrastructures américaines dans les jours ou semaines à venir.

Vercel's v0 AI Tool Weaponized by Cybercriminals to Rapidly Create Fake Login Pages at Scale

Unknown threat actors have been observed weaponizing v0, a generative artificial intelligence (AI) tool from Vercel, to design fake sign-in pages that impersonate their legitimate counterparts. "This observation signals a new evolution in the weaponization of Generative AI by threat actors who have demonstrated an ability to generate a functional phishing site from simple text prompts," Okta

Critical Vulnerability in Anthropic's MCP Exposes Developer Machines to Remote Exploits

Cybersecurity researchers have discovered a critical security vulnerability in artificial intelligence (AI) company Anthropic's Model Context Protocol (MCP) Inspector project that could result in remote code execution (RCE) and allow an attacker to gain complete access to the hosts. The vulnerability, tracked as CVE-2025-49596, carries a CVSS score of 9.4 out of a maximum of 10.0. "This is one

TA829 and UNK_GreenSec Share Tactics and Infrastructure in Ongoing Malware Campaigns

Cybersecurity researchers have flagged the tactical similarities between the threat actors behind the RomCom RAT and a cluster that has been observed delivering a loader dubbed TransferLoader. Enterprise security firm Proofpoint is tracking the activity associated with TransferLoader to a group dubbed UNK_GreenSec and the RomCom RAT actors under the moniker TA829. The latter is also known by the

New Flaw in IDEs Like Visual Studio Code Lets Malicious Extensions Bypass Verified Status

A new study of integrated development environments (IDEs) like Microsoft Visual Studio Code, Visual Studio, IntelliJ IDEA, and Cursor has revealed weaknesses in how they handle the extension verification process, ultimately enabling attackers to execute malicious code on developer machines. "We discovered that flawed verification checks in Visual Studio Code allow publishers to add functionality

❌
❌