Vue normale

Il y a de nouveaux articles disponibles, cliquez pour rafraîchir la page.
Aujourd’hui — 1 août 2025Securité

You Are What You Eat: Why Your AI Security Tools Are Only as Strong as the Data You Feed Them

Just as triathletes know that peak performance requires more than expensive gear, cybersecurity teams are discovering that AI success depends less on the tools they deploy and more on the data that powers them The junk food problem in cybersecurity Imagine a triathlete who spares no expense on equipment—carbon fiber bikes, hydrodynamic wetsuits, precision GPS watches—but fuels their

Storm-2603 Deploys DNS-Controlled Backdoor in Warlock and LockBit Ransomware Attacks

The threat actor linked to the exploitation of the recently disclosed security flaws in Microsoft SharePoint Server is using a bespoke command-and-control (C2) framework called AK47 C2 (also spelled ak47c2) in its operations. The framework includes at least two different types of clients, HTTP-based and Domain Name System (DNS)-based, which have been dubbed AK47HTTP and AK47DNS, respectively, by

Proton tente de rendre Google inutile avec ce nouvel outil de sécurité

1 août 2025 à 13:21

Proton Authenticator

Proton annonce le lancement de Proton Authenticator, un logiciel pour smartphone et pour ordinateur pour gérer ses codes pour la double authentification. L'outil vient challenger les ténors du genre, comme Google Authenticator.

Microsoft dévoile comment Moscou espionne les diplomates sur son sol

1 août 2025 à 11:50

Dans un rapport publié le 31 juillet 2025, Microsoft détaille le mode opératoire d'une campagne de cyberespionnage très sophistiquée qui vise les ambassades étrangères basées en Russie. À l'origine de cette attaque furtive ? Le groupe Secret Blizzard, fortement soupçonné d'être piloté par le Service fédéral de sécurité russe.

Rapport Check Point sur les ransomware T2 2025

Par : UnderNews
31 juillet 2025 à 16:30

Le nouveau rapport de Check Point portant sur les menaces liées aux ransomware, nous indique à quel point l’écosystème du ransomware évolue rapidement. Il est question ce trimestre de malwares générés par IA, d’un effondrement de la confiance dans le déchiffrement, de cartels soutenus par des affiliés, et d’un paysage de la menace fragmenté, plus […]

The post Rapport Check Point sur les ransomware T2 2025 first appeared on UnderNews.

Secret Blizzard Deploys Malware in ISP-Level AitM Attacks on Moscow Embassies

The Russian nation-state threat actor known as Secret Blizzard has been observed orchestrating a new cyber espionage campaign targeting foreign embassies located in Moscow by means of an adversary-in-the-middle (AitM) attack at the Internet Service Provider (ISP) level and delivering a custom malware dubbed ApolloShadow. "ApolloShadow has the capability to install a trusted root certificate to

Experts Detect Multi-Layer Redirect Tactic Used to Steal Microsoft 365 Login Credentials

Cybersecurity researchers have disclosed details of a new phishing campaign that conceals malicious payloads by abusing link wrapping services from Proofpoint and Intermedia to bypass defenses. "Link wrapping is designed by vendors like Proofpoint to protect users by routing all clicked URLs through a scanning service, allowing them to block known malicious destinations at the moment of click,"

Hier — 31 juillet 2025Securité

Spikes in malicious activity precede new security flaws in 80% of cases

Par : Bill Toulas
31 juillet 2025 à 15:00
Researchers have found that in roughly 80% of cases, spikes in malicious activity like network reconnaissance, targeted scanning, and brute-forcing attempts targeting edge networking devices are a precursor to the disclosure of new security vulnerabilities (CVEs) within six weeks. [...]

N. Korean Hackers Used Job Lures, Cloud Account Access, and Malware to Steal Millions in Crypto

The North Korea-linked threat actor known as UNC4899 has been attributed to attacks targeting two different organizations by approaching their employees via LinkedIn and Telegram. "Under the guise of freelance opportunities for software development work, UNC4899 leveraged social engineering techniques to successfully convince the targeted employees to execute malicious Docker containers in their

Les DSI français, trop frileux face à l’innovation technologique ?

Par : UnderNews
31 juillet 2025 à 16:14

Dans un monde où l’innovation technologique est devenue le moteur principal de compétitivité, les directions des systèmes d’information (DSI) françaises font preuve d’une prudence étonnante. Si la majorité des entreprises se disent tournées vers l’innovation, la réalité sur le terrain dépeint un tableau plus nuancé. L’adoption de technologies comme le cloud, l’intelligence artificielle ou les […]

The post Les DSI français, trop frileux face à l’innovation technologique ? first appeared on UnderNews.

AI-Driven Trends in Endpoint Security: What the 2025 Gartner® Magic Quadrant™ Reveals

Cyber threats and attacks like ransomware continue to increase in volume and complexity with the endpoint typically being the most sought after and valued target. With the rapid expansion and adoption of AI, it is more critical than ever to ensure the endpoint is adequately secured by a platform capable of not just keeping pace, but staying ahead of an ever-evolving threat landscape.

❌
❌