Vue lecture

Il y a de nouveaux articles disponibles, cliquez pour rafraîchir la page.

CAN 2025 : jouer la carte de la sécurité pour ne pas tomber dans le piège des arnaques sportives

À partir du 25 septembre, les billets de la CAN seront mis en vente, un moment attendu par des millions de fans. Mais cette popularité est du pain béni pour les cybercriminels, qui profitent des grands événements sportifs pour multiplier les arnaques. Streaming illégal, faux billets, produits dérivés frauduleux : Kaspersky alerte sur les escroqueries […]

The post CAN 2025 : jouer la carte de la sécurité pour ne pas tomber dans le piège des arnaques sportives first appeared on UnderNews.

SolarWinds Releases Hotfix for Critical CVE-2025-26399 Remote Code Execution Flaw

SolarWinds has released hot fixes to address a critical security flaw impacting its Web Help Desk software that, if successfully exploited, could allow attackers to execute arbitrary commands on susceptible systems. The vulnerability, tracked as CVE-2025-26399 (CVSS score: 9.8), has been described as an instance of deserialization of untrusted data that could result in code execution. It affects

Lean Teams, Higher Stakes: Why CISOs Must Rethink Incident Remediation

Big companies are getting smaller, and their CEOs want everyone to know it. Wells Fargo has cut its workforce by 23% over five years, Bank of America has shed 88,000 employees since 2010, and Verizon's CEO recently boasted that headcount is "going down all the time." What was once a sign of corporate distress has become a badge of honor, with executives celebrating lean operations and AI-driven

ShadowV2 Botnet Exploits Misconfigured AWS Docker Containers for DDoS-for-Hire Service

Cybersecurity researchers have disclosed details of a new botnet that customers can rent access to conduct distributed denial-of-service (DDoS) attacks against targets of interest. The ShadowV2 botnet, according to Darktrace, predominantly targets misconfigured Docker containers on Amazon Web Services (AWS) cloud servers to deploy a Go-based malware that turns infected systems into attack nodes

GitHub Mandates 2FA and Short-Lived Tokens to Strengthen npm Supply Chain Security

GitHub on Monday announced that it will be changing its authentication and publishing options "in the near future" in response to a recent wave of supply chain attacks targeting the npm ecosystem, including the Shai-Hulud attack. This includes steps to address threats posed by token abuse and self-replicating malware by allowing local publishing with required two-factor authentication (2FA),

BadIIS Malware Spreads via SEO Poisoning — Redirects Traffic, Plants Web Shells

Cybersecurity researchers are calling attention to a search engine optimization (SEO) poisoning campaign likely undertaken by a Chinese-speaking threat actor using a malware called BadIIS in attacks targeting East and Southeast Asia, particularly with a focus on Vietnam. The activity, dubbed Operation Rewrite, is being tracked by Palo Alto Networks Unit 42 under the moniker CL-UNK-1037, where "

Après la cyberattaque des aéroports en Europe, on en sait plus sur les motivations des hackers

Depuis le 20 septembre, plusieurs aéroports européens font face à des vols retardés ou annulés. En cause, une cyberattaque ayant visé Collins Aerospace, l’un des principaux fournisseurs mondiaux de systèmes critiques pour l’aviation civile. Alors qu’une enquête est en cours, les premiers éléments commencent à préciser la nature de l’attaque.

❌