Vue lecture

Il y a de nouveaux articles disponibles, cliquez pour rafraîchir la page.

Former pour mieux détecter les cybermenaces

Google Cloud Security vient de publier les conclusions de son nouveau Threat Intelligence Benchmark : « Stop Reacting; Start Anticipating »*, une étude réalisée en partenariat avec Forrester. Les résultats mettent en lumière un écart alarmant entre la visibilité sur les menaces et le niveau de préparation des dirigeants, dans un environnement de cybermenaces en perpétuelle mutation. […]

The post Former pour mieux détecter les cybermenaces first appeared on UnderNews.

⚡ Weekly Recap — SharePoint Breach, Spyware, IoT Hijacks, DPRK Fraud, Crypto Drains and More

Some risks don’t breach the perimeter—they arrive through signed software, clean resumes, or sanctioned vendors still hiding in plain sight. This week, the clearest threats weren’t the loudest—they were the most legitimate-looking. In an environment where identity, trust, and tooling are all interlinked, the strongest attack path is often the one that looks like it belongs. Security teams are

Email Security Is Stuck in the Antivirus Era: Why It Needs a Modern Approach

Picture this: you’ve hardened every laptop in your fleet with real‑time telemetry, rapid isolation, and automated rollback. But the corporate mailbox—the front door for most attackers—is still guarded by what is effectively a 1990s-era filter. This isn't a balanced approach. Email remains a primary vector for breaches, yet we often treat it as a static stream of messages instead of a dynamic,

Quand un hacker tente de transformer l’assistant IA d’Amazon en outil destructeur

Suggestions de code, aide au débogage, automatisation des tâches… la promesse d’Amazon Q Developer est simple : fluidifier le travail des développeurs. Et si cette extension, téléchargée près d’un million de fois, était piratée et se retrouvait programmée pour essayer d’effacer toutes vos données ? C’est le scénario qu’un hacker a cherché à démontrer en injectant un prompt destructeur dans une version officielle de l’assistant d’Amazon, publiée à la mi-juillet 2025. 

Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure

The notorious cybercrime group known as Scattered Spider is targeting VMware ESXi hypervisors in attacks targeting retail, airline, and transportation sectors in North America. "The group's core tactics have remained consistent and do not rely on software exploits. Instead, they use a proven playbook centered on phone calls to an IT help desk," Google's Mandiant team said in an extensive

Critical Flaws in Niagara Framework Threaten Smart Buildings and Industrial Systems Worldwide

Cybersecurity researchers have discovered over a dozen security vulnerabilities impacting Tridium's Niagara Framework that could allow an attacker on the same network to compromise the system under certain circumstances. "These vulnerabilities are fully exploitable if a Niagara system is misconfigured, thereby disabling encryption on a specific network device," Nozomi Networks Labs said in a

U.S. Sanctions Firm Behind N. Korean IT Scheme; Arizona Woman Jailed for Running Laptop Farm

The U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) sanctioned a North Korean front company and three associated individuals for their involvement in the fraudulent remote information technology (IT) worker scheme designed to generate illicit revenues for Pyongyang. The sanctions target Korea Sobaeksu Trading Company (aka Sobaeksu United Corporation), and Kim Se Un, Jo

Patchwork Targets Turkish Defense Firms with Spear-Phishing Using Malicious LNK Files

The threat actor known as Patchwork has been attributed to a new spear-phishing campaign targeting Turkish defense contractors with the goal of gathering strategic intelligence. "The campaign employs a five-stage execution chain delivered via malicious LNK files disguised as conference invitations sent to targets interested in learning more about unmanned vehicle systems," Arctic Wolf Labs said

❌