Vue lecture

Il y a de nouveaux articles disponibles, cliquez pour rafraîchir la page.

Rapport Check Point sur les ransomware T2 2025

Le nouveau rapport de Check Point portant sur les menaces liées aux ransomware, nous indique à quel point l’écosystème du ransomware évolue rapidement. Il est question ce trimestre de malwares générés par IA, d’un effondrement de la confiance dans le déchiffrement, de cartels soutenus par des affiliés, et d’un paysage de la menace fragmenté, plus […]

The post Rapport Check Point sur les ransomware T2 2025 first appeared on UnderNews.

Secret Blizzard Deploys Malware in ISP-Level AitM Attacks on Moscow Embassies

The Russian nation-state threat actor known as Secret Blizzard has been observed orchestrating a new cyber espionage campaign targeting foreign embassies located in Moscow by means of an adversary-in-the-middle (AitM) attack at the Internet Service Provider (ISP) level and delivering a custom malware dubbed ApolloShadow. "ApolloShadow has the capability to install a trusted root certificate to

Experts Detect Multi-Layer Redirect Tactic Used to Steal Microsoft 365 Login Credentials

Cybersecurity researchers have disclosed details of a new phishing campaign that conceals malicious payloads by abusing link wrapping services from Proofpoint and Intermedia to bypass defenses. "Link wrapping is designed by vendors like Proofpoint to protect users by routing all clicked URLs through a scanning service, allowing them to block known malicious destinations at the moment of click,"

N. Korean Hackers Used Job Lures, Cloud Account Access, and Malware to Steal Millions in Crypto

The North Korea-linked threat actor known as UNC4899 has been attributed to attacks targeting two different organizations by approaching their employees via LinkedIn and Telegram. "Under the guise of freelance opportunities for software development work, UNC4899 leveraged social engineering techniques to successfully convince the targeted employees to execute malicious Docker containers in their

Les DSI français, trop frileux face à l’innovation technologique ?

Dans un monde où l’innovation technologique est devenue le moteur principal de compétitivité, les directions des systèmes d’information (DSI) françaises font preuve d’une prudence étonnante. Si la majorité des entreprises se disent tournées vers l’innovation, la réalité sur le terrain dépeint un tableau plus nuancé. L’adoption de technologies comme le cloud, l’intelligence artificielle ou les […]

The post Les DSI français, trop frileux face à l’innovation technologique ? first appeared on UnderNews.

AI-Driven Trends in Endpoint Security: What the 2025 Gartner® Magic Quadrant™ Reveals

Cyber threats and attacks like ransomware continue to increase in volume and complexity with the endpoint typically being the most sought after and valued target. With the rapid expansion and adoption of AI, it is more critical than ever to ensure the endpoint is adequately secured by a platform capable of not just keeping pace, but staying ahead of an ever-evolving threat landscape.

Une campagne d’usurpation d’identité via l’application Microsoft OAuth contourne la MFA

Les chercheurs de la société de cybersécurité Proofpoint publient aujourd’hui une analyse sur une campagne de phishing sophistiquée qui utilise de fausses applications Microsoft OAuth pour contourner l’authentification multifactorielle (MFA) et compromettre les comptes Microsoft 365. Voici les principales conclusions : Les auteurs de la menace créent de fausses applications Microsoft OAuth usurpant l’identité de […]

The post Une campagne d’usurpation d’identité via l’application Microsoft OAuth contourne la MFA first appeared on UnderNews.

UNC2891 Breaches ATM Network via 4G Raspberry Pi, Tries CAKETAP Rootkit for Fraud

The financially motivated threat actor known as UNC2891 has been observed targeting Automatic Teller Machine (ATM) infrastructure using a 4G-equipped Raspberry Pi as part of a covert attack. The cyber-physical attack involved the adversary leveraging their physical access to install the Raspberry Pi device and have it connected directly to the same network switch as the ATM, effectively placing

Alert Fatigue, Data Overload, and the Fall of Traditional SIEMs

Security Operations Centers (SOCs) are stretched to their limits. Log volumes are surging, threat landscapes are growing more complex, and security teams are chronically understaffed. Analysts face a daily battle with alert noise, fragmented tools, and incomplete data visibility. At the same time, more vendors are phasing out their on-premises SIEM solutions, encouraging migration to SaaS

Après la cyberattaque contre Aeroflot, c’est au tour des pharmacies russes d’être visées par des hackers

Depuis fin juillet, des centaines de pharmacies russes n'accueillent plus aucun patient. La raison ? Deux des plus grands réseaux d'officines du pays sont victimes d'une cyberattaque majeure. Réservation de médicaments en ligne indisponible, personnel mis au chômage forcé : un nouveau pan de l'économie russe est visé par les hackers.

Hackers Exploit Critical WordPress Theme Flaw to Hijack Sites via Remote Plugin Install

Threat actors are actively exploiting a critical security flaw in "Alone – Charity Multipurpose Non-profit WordPress Theme" to take over susceptible sites. The vulnerability, tracked as CVE-2025-5394, carries a CVSS score of 9.8. Security researcher Thái An has been credited with discovering and reporting the bug. According to Wordfence, the shortcoming relates to an arbitrary file upload

❌