Vue lecture

Il y a de nouveaux articles disponibles, cliquez pour rafraîchir la page.

Comment devenir invisible sur Strava ?

Le 19 mars 2026, Le Monde est parvenu à localiser un officier de la marine nationale en footing sur le pont du Charles-de-Gaulle. Une activité sportive qui a involontairement révélé la position du porte-avions en Méditerranée via l'application Strava. Une faille de confidentialité simple, connue, et pourtant toujours pas systématiquement corrigée côté utilisateurs militaires.

DoJ Disrupts 3 Million-Device IoT Botnets Behind Record 31.4 Tbps Global DDoS Attacks

The U.S. Department of Justice (DoJ) on Thursday announced the disruption of command-and-control (C2) infrastructure used by several Internet of Things (IoT) botnets like AISURU, Kimwolf, JackSkid, and Mossad as part of a court-authorized law enforcement operation. The effort also saw authorities from Canada and Germany targeting the operators behind these botnets, with a number of private

Apple Warns Older iPhones Vulnerable to Coruna, DarkSword Exploit Kit Attacks

Apple is urging users who are still running an outdated version of iOS to update their iPhones to secure against web-based attacks carried out via powerful exploit kits like Coruna and DarkSword. These attacks employ malicious web content to target out-of-date versions of iOS, triggering an infection chain that leads to the theft of sensitive data. "For example, if you're using an older

Speagle Malware Hijacks Cobra DocGuard to Steal Data via Compromised Servers

Cybersecurity researchers have flagged a new malware dubbed Speagle that hijacks the functionality and infrastructure of a legitimate program called Cobra DocGuard. "Speagle is designed to surreptitiously harvest sensitive information from infected computers and transmit it to a Cobra DocGuard server that has been compromised by the attackers, masking the data exfiltration process as legitimate

54 EDR Killers Use BYOVD to Exploit 35 Signed Vulnerable Drivers and Disable Security

A new analysis of endpoint detection and response (EDR) killers has revealed that 54 of them leverage a technique known as bring your own vulnerable driver (BYOVD) by abusing a total of 35 vulnerable drivers. EDR killer programs have been a common presence in ransomware intrusions as they offer a way for affiliates to neutralize security software before deploying file-encrypting malware. This

Un nouveau rapport de Zimperium révèle l’expansion mondial des malwares bancaires, ciblant plus de 1 200 applications financières

L’analyse de zLabs identifie 34 familles actives de malwares ciblant 1 243 applications financières dans 90 pays, révélant comment les attaquants détournent des applications bancaires mobiles légitimes pour commettre des fraudes. Tribune – Zimperium, spécialiste de la sécurité mobile basée sur l’IA, a publié son rapport 2026 Banking Heist Report. Le constat est sans appel […]

The post Un nouveau rapport de Zimperium révèle l’expansion mondial des malwares bancaires, ciblant plus de 1 200 applications financières first appeared on UnderNews.

ThreatsDay Bulletin: FortiGate RaaS, Citrix Exploits, MCP Abuse, LiveChat Phish & More

ThreatsDay Bulletin is back on The Hacker News, and this week feels off in a familiar way. Nothing loud, nothing breaking everything at once. Just a lot of small things that shouldn’t work anymore but still do. Some of it looks simple, almost sloppy, until you see how well it lands. Other bits feel a little too practical, like they’re already closer to real-world use than anyone

❌