Vue lecture

Il y a de nouveaux articles disponibles, cliquez pour rafraîchir la page.

DoNot APT Expands Operations, Targets European Foreign Ministries with LoptikMod Malware

A threat actor with suspected ties to India has been observed targeting a European foreign affairs ministry with malware capable of harvesting sensitive data from compromised hosts. The activity has been attributed by Trellix Advanced Research Center to an advanced persistent threat (APT) group called DoNot Team, which is also known as APT-C-35, Mint Tempest, Origami Elephant, SECTOR02, and

U.S. Sanctions North Korean Andariel Hacker Behind Fraudulent IT Worker Scheme

The U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) on Tuesday sanctioned a member of a North Korean hacking group called Andariel for their role in the infamous remote information technology (IT) worker scheme. The Treasury said Song Kum Hyok, a 38-year-old North Korean national with an address in the Chinese province of Jilin, enabled the fraudulent operation by using

How To Automate Ticket Creation, Device Identification and Threat Triage With Tines

Run by the team at workflow orchestration and AI platform Tines, the Tines library features over 1,000 pre-built workflows shared by security practitioners from across the community - all free to import and deploy through the platform’s Community Edition. A recent standout is a workflow that handles malware alerts with CrowdStrike, Oomnitza, GitHub, and PagerDuty. Developed by Lucas Cantor at

Chinese Hacker Xu Zewei Arrested for Ties to Silk Typhoon Group and U.S. Cyber Attacks

A Chinese national has been arrested in Milan, Italy, for his alleged links to a state-sponsored hacking group known as Silk Typhoon and for carrying out cyber attacks against American organizations and government agencies. The 33-year-old, Xu Zewei, has been charged with nine counts of wire fraud and conspiracy to cause damage to and obtain information by unauthorized access to protected

Arrestation membre Silk Typhoon – Déclaration du GTIG

Ci-dessous, une déclaration de John Hultquist, analyste en chef du Google Threat IntelligenceGroup, sur l’importance de l’arrestation d’un membre présumé de Silk Typhoon. Communiqué. « Cette arrestation couronne plus d’une décennie d’inculpations et d’autres efforts des forces de l’ordre qui étaient généralement considérés comme symboliques. Il était généralement admis que ces acteurs ne se retrouveraient jamais […]

The post Arrestation membre Silk Typhoon – Déclaration du GTIG first appeared on UnderNews.

Rapport Threat Lab WatchGuard : une augmentation de 171 % des malwares inédits détectés. Un nouveau record !

Hausse des menaces par e-mail, multiplication des attaques furtives sur les endpoints et baisse du ransomware : un paysage façonné par l’essor de l’IA. Tribune – WatchGuard® Technologies, leader mondial de la cybersécurité unifiée à destination des fournisseurs de services managés (MSP), dévoile les résultats de son dernier rapport trimestriel sur la sécurité Internet. Ce […]

The post Rapport Threat Lab WatchGuard : une augmentation de 171 % des malwares inédits détectés. Un nouveau record ! first appeared on UnderNews.

Microsoft Patches 130 Vulnerabilities, Including Critical Flaws in SPNEGO and SQL Server

For the first time in 2025, Microsoft's Patch Tuesday updates did not bundle fixes for exploited security vulnerabilities, but the company acknowledged one of the addressed flaws had been publicly known. The patches resolve a whopping 130 vulnerabilities, along with 10 other non-Microsoft CVEs that affect Visual Studio, AMD, and its Chromium-based Edge browser. Of these 10 are rated Critical and

❌