Toute l'actualité de la Cybersécurité
Des investissements en cybersécurité peu rentables
2025-05-22 08:49:53
Trop d'investissement dans la cyber, pas assez de résultats. C'est en somme la conclusion d'une étude menée par Vanson Bourne auprès (...)
Hackers Exploiting Trusted Google Domains to Inject Malicious Scripts
2025-05-22 08:19:51
A sophisticated new malvertising scheme has emerged, transforming legitimate e-commerce websites into phishing platforms without the knowledge of site owners or advertisers. Cybercriminals are exploiting...
New Process Injection Technique Evades EDR by Injecting Malicious Code into Windows Processes
2025-05-22 08:19:36
Researchers revealed this method exploits shared memory regions and thread context manipulation to execute malicious payloads without triggering standard detection heuristics. Novel process injection...
Grafana 0-Day Vulnerability Let Attackers to Redirect Users to Malicious Websites
2025-05-22 08:03:23
A high-severity cross-site scripting (XSS) vulnerability in Grafana could allow attackers to redirect users to malicious websites. The vulnerability, tracked as CVE-2025-4123 received a CVSS score of...
BIND DNS Vulnerability Let Attackers Crash DNS Servers With Malicious Packet
2025-05-22 07:32:45
A high-severity vulnerability in the BIND DNS server software was recently disclosed that allows attackers to crash DNS servers by sending just a single malicious packet. The Internet Systems Consortium...
Hackers Attacking Coinbase Users in a Sophisticated Social Engineering Attack
2025-05-22 07:20:52
A massive wave of targeted social engineering attacks has been hitting Coinbase users since early 2025, with scammers exploiting insider access to obtain sensitive customer data. Unlike traditional technical...
INE Security Partners with Abadnet Institute for Cybersecurity Training Programs in Saudi Arabia
2025-05-22 07:01:36
Cary, North Carolina, 22nd May 2025, CyberNewsWire
Lumma Stealer Infrastructure With 2,300 Domains That Attacks Millions of Users Worldwide Seized
2025-05-22 06:54:00
In a coordinated global operation announced on May 21, 2025, law enforcement and cybersecurity partners have successfully disrupted the infrastructure behind Lumma Stealer, one of the most prolific information-stealing...
Russia-linked APT28 targets western logistics entities and technology firms
2025-05-22 06:36:27
CISA warns Russia-linked group APT28 is targeting Western logistics and tech firms aiding Ukraine, posing an elevated threat to supply chains Russia-linked cyberespionage group APT28 intensifies its operations...
New Attack Exploits dMSA in Windows Server 2025 to Compromise Any Active Directory Users
2025-05-22 06:33:42
A critical vulnerability in Windows Server 2025 that enables attackers to compromise any user in Active Directory, including highly privileged accounts. Dubbed “BadSuccessor,” this attack...
Hackers Leverage PyBitmessage Library to Bypass AV & Network Security Detections
2025-05-22 05:48:26
Cybersecurity experts have identified a sophisticated new malware strain that combines a Monero cryptocurrency miner with an advanced backdoor component, presenting a significant threat to organizational...
ThreatBook Recognized as a Notable Vendor in Global Network Analysis and Visibility (NAV) Report
2025-05-22 05:23:49
ThreatBook, a global leader cyber threat and response solutions backed by threat intelligence and AI, has been recognized as a notable vendor in Forrester’s Network Analysis And Visibility Solutions...
ThreatBook Named a Notable Vendor in Global Network Analysis and Visibility (NAV) Independent Report
2025-05-22 05:20:52
ThreatBook, a global leader cyber threat and response solutions backed by threat intelligence and AI, has been recognized as a notable vendor in Forrester’s Network Analysis And Visibility Solutions...
Hackers Attacking Mobile Users Leveraging PWA JavaScript & Browser Protections
2025-05-22 04:23:59
A sophisticated malware campaign has emerged targeting mobile device users through Progressive Web Applications (PWAs), representing an alarming shift in attack methodology. Security researchers have...
Docker Zombie Malware Infects Containers to Mine Crypto and Self-Replicate
2025-05-22 03:13:59
A sophisticated self-replicating malware strain targeting Docker environments has been discovered propagating across insecurely published Docker APIs. This “zombie” malware, observed in May...
Fedora 42: mozilla-ublock-origin 2025-01794be9b3
2025-05-22 01:48:57
Latest upstream release. Changelog: https://github.com/gorhill/uBlock/releases/tag/1.64.0 . Fixes CVE-2025-4215 .