Toute l'actualité de la Cybersécurité
Printer Company Distributes Malicious Drivers Infected with XRed Malware
2025-05-16 16:47:12
Procolored, a printer manufacturing company, has been found distributing software drivers infected with malicious code, including the notorious XRed backdoor malware. The issue came to light when Cameron...
Metasploit Wrap-Up 05/16/2025
2025-05-16 16:38:30
This week's release includes 5 new modules including RCEs for Car Rental System, and three Wordpress plugins. The execute-assembly post module was also updated with 32-bit support.
Chinese Agent Impersonate as Stanford Student For Intelligence Gathering
2025-05-16 16:34:54
Chinese intelligence operative posing as a Stanford University student has been uncovered following an investigation into suspicious approaches made to students conducting China-related research. The...
Ivanti EPMM Hit by Two Actively Exploited 0day Vulnerabilities
2025-05-16 16:32:54
Ivanti EPMM users urgently need to patch against actively exploited 0day vulnerabilities (CVE-2025-4427, CVE-2025-4428) that enable pre-authenticated remote…
Arista en passe d'acquérir VeloCloud
2025-05-16 16:32:53
L’actualité de VMware ne tourne pas simplement autour des licences. Son portefeuille de solutions est au centre de négociations d’acquisition. (...)
Israel arrests new suspect behind Nomad Bridge 0M crypto hack
2025-05-16 16:25:50
An American-Israeli national named Osei Morrell has been arrested in Israel for his alleged involvement in exploiting the Nomad bridge smart-contract in August 2022 that allowed hackers to siphon 0...
Piratage d'un géant hôtelier turc : les données de millions de clients en vente ?
2025-05-16 16:02:00
À l'approche des vacances, les cybercriminels redoublent d'activité. ZATAZ révèle qu'une base de données massive issue d'un grand groupe hôtelier turc est proposée à la vente sur le dark...
ChatGPT rolls out Codex, an AI tool for software programming
2025-05-16 15:49:22
OpenAI is rolling out 'Codex' for ChatGPT, which is an AI agent that automates and delegates programming tasks for software engineers. [...]
Pro-Ukraine Group Targets Russian Developers with Python Backdoor
2025-05-16 15:48:01
ReversingLabs discovers dbgpkg, a fake Python debugger that secretly backdoors systems to steal data. Researchers suspect a pro-Ukraine…
SSH Auth Keys Reuse Exposes Sophisticated Targeted Phishing Attack
2025-05-16 15:31:06
A coordinated phishing campaign targeting Kuwait’s critical sectors has been exposed through a distinctive operational security lapse: the consistent reuse of SSH authentication keys across multiple...
Révolte des machines ? Un robot Unitree attaque un ingénieur en Chine
2025-05-16 15:29:22
"Hasta la vista, baby"... Ou pas. L'incident rappelle les pires scénarios de science-fiction. Et si Terminator n'était plus seulement un film, mais une prophétie en avance sur son temps ?...
Hackers exploit VMware ESXi, Microsoft SharePoint zero-days at Pwn2Own
2025-05-16 15:23:22
During the second day of Pwn2Own Berlin 2025, competitors earned 5,000 after exploiting zero-day bugs in multiple products, including Microsoft SharePoint, VMware ESXi, Oracle VirtualBox, Red Hat Enterprise...
En rachetant Hornetsecurity, Proofpoint s'empare de son ennemi Vade
2025-05-16 15:18:40
Le rachat de Hornetsecurity par Proofpoint doit avoir un goût un peu amer pour les équipes de l’éditeur français Vade (...)
L'amour en ligne transformé en piège : le fléau grandissant du pig butchering
2025-05-16 15:08:31
Une arnaque redoutable mêlant sentiments et fraude financière, appelée "pig butchering", se propage à grande vitesse sur les applications de rencontre, exploitant solitude, IA et crypto pour dépouiller...
Linux Kernel Patching and Preventing Exploits in 2025
2025-05-16 15:00:00
As the Linux kernel continues to power everything from cloud infrastructure to embedded devices, its security remains critical. In 2025, patching strategies face unprecedented challenges: a 3,529%...
Printer maker Procolored offered malware-laced drivers for months
2025-05-16 14:56:51
For at least half a year, the official software supplied with Procolored printers included malware in the form of a remote access trojan and a cryptocurrency stealer. [...]
Trafic numérique : des boîtes SIM au cœur d'une guerre de l'ombre entre la Russie et l'Ukraine
2025-05-16 14:53:41
Un réseau de cybercriminels utilisant des dispositifs de masse pour diffuser des messages frauduleux a été démantelé en Russie, révélant l'ampleur d'un marché parallèle où les cartes SIM...
Une base de données d'un géant du sport français mise en vente pour 600 dollars
2025-05-16 14:42:31
Un pirate propose l'accès administrateur au site d'une entreprise française de vêtements de sport. Prix affiché : 600 dollars. Le nom de la marque reste confidentiel....
Identités à vendre : plongée dans le marché noir des faux dossiers RH
2025-05-16 14:27:39
Un pirate a récemment mis en vente un pack complet de documents d'identité sur le dark web. Une annonce explicite repérée par le site Zataz qui dévoile une réalité inquiétante : la marchandisation...
New Vulnerability Affects All Intel Processors From The Last 6 Years
2025-05-16 14:16:43
A newly discovered class of vulnerabilities in Intel processors, termed Branch Predictor Race Conditions (BPRC), allows attackers to systematically extract sensitive data from the cache and random-access...
Impact of AI on cyber threat from now to 2027
2025-05-16 14:09:11
An NCSC assessment highlighting the impacts on cyber threat from AI developments between now and 2027.
Chinese Agent Impersonates as Stanford Student For Intelligence Gathering
2025-05-16 14:08:29
A recent investigation has uncovered a concerning case of espionage at one of America’s premier academic institutions, where a Chinese intelligence agent posed as a Stanford University student to...
Ransomware gangs increasingly use Skitnet post-exploitation malware
2025-05-16 14:00:00
Ransomware gang members increasingly use a new malware called Skitnet ("Bossnet") to perform stealthy post-exploitation activities on breached networks. [...]
How to Develop and Communicate Metrics for CSIRPs
2025-05-16 14:00:00
A well-documented cybersecurity incident response program (CSIRP) provides the transparency needed for informed decision-making, protecting the organization in a constantly changing threat environment....
Malware Mastermind Andrei Tarasov Evades US Extradition Returns to Russia
2025-05-16 13:49:59
In a significant setback for US cybercrime enforcement efforts, Russian hacker Andrei Tarasov has evaded extradition to the United States and successfully returned to his homeland, intelligence sources...
FBI Warns of US Govt Officials Impersonated in Malicious Message Campaign
2025-05-16 13:38:16
The Federal Bureau of Investigation (FBI) issued an urgent warning Thursday about an ongoing malicious campaign where cybercriminals are impersonating senior US officials through text messages and AI-generated...
Windows 10 KB5058379 Update Causes PCs to Enter Recovery Mode and Prompt for BitLocker Key
2025-05-16 13:35:20
Security update KB5058379 for Windows 10, released in May 2025, is causing significant technical issues for numerous systems. Users report their devices are unexpectedly booting into Windows Recovery...
Multiple Ivanti Endpoint Mobile Manager Vulnerabilities Allows Remote Code Execution
2025-05-16 13:31:24
Critical security flaws have been uncovered in Ivanti Endpoint Manager Mobile (EPMM), a widely used mobile device management (MDM) solution, exposing organizations to the risk of unauthenticated remote...
Cybercriminal Andrei Tarasov Escapes US Extradition, Returns to Russia
2025-05-16 13:01:34
Andrei Vladimirovich Tarasov, a 33-year-old Russian cybercrime figure known online as “Aels,” has returned to Russia after evading US extradition. Released from Berlin’s Moabit Prison...
Windows Security Updates – How to Stay Ahead of Vulnerabilities
2025-05-16 13:00:00
In April 2025, cybersecurity teams were starkly reminded of the stakes involved in patch management when Microsoft disclosed CVE-2025-29824, a zero-day privilege escalation flaw in the Windows Common...
Windows 10 KB5058379 Update Boots PCs into Windows Recovery
2025-05-16 12:57:19
Multiple users and IT administrators are reporting that Microsoft’s latest security update KB5058379, released on May 13, 2025, is causing widespread issues with BitLocker recovery prompts and system...
Hackers Attacking Industrial Automation Systems With 11,600+ Malware Families
2025-05-16 12:27:00
Industrial automation systems worldwide are facing an unprecedented scale of cyber threats, with security researchers detecting a staggering 11,679 distinct malware families targeting critical infrastructure...
Investing: Where To Look For The Next Cybersecurity Unicorn
2025-05-16 12:24:19
This week in cybersecurity from the editors at Cybercrime Magazine –Read the full story in Forbes Sausalito, Calif. – May 16, 2025 Google recently invested billion in Wiz, a Cloud Security Platform....
Data broker protection rule quietly withdrawn by CFPB
2025-05-16 11:53:04
The CFPB has decided to withdraw a 2024 rule that was aimed at limiting the sale of Americans' personal information by data brokers.
Meta sent cease and desist letter over AI training
2025-05-16 11:30:26
A privacy advocacy group has clapped back at Meta over its plans to start training its AI model on European users' data.
FBI Alerts Public to Malicious Campaign Impersonating US Government Officials
2025-05-16 11:25:53
Federal Bureau of Investigation has issued a warning about an ongoing malicious messaging campaign targeting current and former senior US government officials and their contacts. Since April 2025, threat...
Avec l'IA, Cato Networks optimise les politiques de sécurité du SASE
2025-05-16 11:23:54
Le déploiement des stratégie SASE (secure access service edge) peut être complexe. Cato Networks a dévoilé récemment (...)
Frigidstealer Malware Targets macOS Users to Harvest Login Credentials
2025-05-16 11:17:04
An macOS users, a new information-stealing malware dubbed FrigidStealer has emerged as a formidable threat since January 2025. This insidious malware capitalizes on user trust by masquerading as routine...
APT Group 123 Targets Windows Systems in Ongoing Malicious Payload Campaign
2025-05-16 11:09:07
Group123, a North Korean state-sponsored Advanced Persistent Threat (APT) group also known by aliases such as APT37, Reaper, and ScarCruft, continues to target Windows-based systems across multiple regions....
Ivanti Endpoint Manager Mobile exploit chain exploited in the wild
2025-05-16 11:00:20
On May 13, 2025, Ivanti disclosed an exploited in the wild exploit chain, comprising of two new vulnerabilities affecting Ivanti Endpoint Manager Mobile: CVE-2025-4427 and CVE-2025-4428.
SSH Auth Key Reuse Uncovers Advanced Targeted Phishing Campaign
2025-05-16 10:54:01
A meticulously orchestrated phishing campaign targeting Kuwait’s fisheries, telecommunications, and insurance sectors has been exposed by Hunt.io researchers, revealing a sprawling network of over...
Ivanti Endpoint Manager Vulnerabilities Allow Unauthenticated Remote Code Execution
2025-05-16 10:49:11
Critical vulnerability chain in Ivanti Endpoint Manager Mobile (EPMM) has exposed enterprise mobile device management systems to pre-authenticated remote code execution (RCE) attacks. The flaws, tracked...
Hackers Now Targeting US Retailers After UK Attacks, Google
2025-05-16 10:37:12
Hackers from the Scattered Spider group, known for UK retail attacks, are now targeting US retailers, Google cybersecurity…
Jenkins Released Security Updates – Multiple Vulnerabilities Fixed That Allow Attackers to Exploit CI/CD Pipelines
2025-05-16 10:14:04
Jenkins, the widely used automation server for CI/CD pipelines, has released a critical security advisory addressing several vulnerabilities in popular plugins. These flaws-ranging from authentication...
Salt Security Partners With Wiz, Combines Cloud and API Security
2025-05-16 10:06:58
API security orgnanisation Salt Security has announced its expanded partnership and new integration with Wiz, the leader in cloud security. The integration between Salt Security and Wiz enables organisations...
Meta plans to train AI on EU user data from May 27 without consent
2025-05-16 10:06:54
Meta plans to train AI on EU user data from May 27 without consent; privacy group noyb threatens lawsuit over lack of explicit opt-in. Meta plans to use EU user data for AI training starting May 27 without...
Android 16 : Google ajoute une nouvelle option pour protéger son smartphone contre le piratage
2025-05-16 09:43:39
Google vient d'annoncer une nouvelle option pour sécuriser son smartphone qui active certaines protections existantes et en ajoute de nouvelles. Conçue pour simplifier la sécurité du mobile, cette...
US charges 12 more suspects linked to 0 million crypto theft
2025-05-16 09:06:41
Twelve more suspects were charged in a RICO conspiracy for their alleged involvement in the theft of over 0 million in cryptocurrency and laundering the funds using crypto exchanges and mixing services....
7 manières d'optimiser le chiffrement des données
2025-05-16 09:02:30
Le concept de cryptographie existe depuis des millénaires. Mais il est devenu indispensable à la protection des données dans les SI (...)
AI in the Cloud: The Rising Tide of Security and Privacy Risks
2025-05-16 08:18:49
Over half of firms adopted AI in 2024, but cloud tools like Azure OpenAI raise growing concerns over data security and privacy risks. As enterprises embrace artificial intelligence (AI) to streamline...
CISA tags recently patched Chrome bug as actively exploited
2025-05-16 08:13:19
On Thursday, CISA warned U.S. federal agencies to secure their systems against ongoing attacks exploiting a high-severity vulnerability in the Chrome web browser. [...]
Google fixed a Chrome vulnerability that could lead to full account takeover
2025-05-16 07:40:34
Google released emergency security updates to fix a Chrome vulnerability that could lead to full account takeover. Google released emergency security updates to address a Chrome browser vulnerability,...
Les risques cachés de l'IA : les entreprises sur la corde raide
2025-05-16 07:30:40
L'IA s'impose dans les entreprises, mais son usage échappe parfois aux contrôles les plus élémentaires, laissant les responsables de la sécurité dans une course effrénée contre une technologie...
Guet-apens, violence et escroqueries : l'envers glaçant du site Coco.gg
2025-05-16 07:18:33
Une série de guet-apens mortels et d'escroqueries sophistiquées secoue la justice à Grenoble : douze jeunes, au profil étonnamment "normal", risquent aujourd'hui d'être jugés pour des faits...
Turkish APT Exploits Chat App Zero-Day to Spy on Iraqi Kurds
2025-05-16 06:30:00
Even after their zero-day turned into an n-day, attackers known as Marbled Dust or Sea Turtle continued to spy on military targets that had failed to patch Output Messenger.
The TechBeat: The Startup Playbook Is a Lie. Ask Better Questions. (5/16/2025)
2025-05-16 06:10:57
How are you, hacker?
🪐Want to know what's trending right now?:
The Techbeat by HackerNoon has got you covered with fresh content from our trending stories of the day! Set email preference here.
...
Part-2️♂️Bug Bounty Secrets They Don't Tell You: Tricks From 100+ Reported Bugs
2025-05-16 05:05:52
✨Free Article LinkContinue reading on InfoSec Write-ups »
0 Bounty: Race Condition in Hacker101 CTF Group Join
2025-05-16 05:02:36
0 for discovering a timing flaw in Hacker101’s invite system that let users join the same team multiple timesContinue reading on InfoSec Write-ups »
Secret to find bugs in five minutes. Juicy reality.
2025-05-16 05:02:02
Finding bugs in 5-minutes.I have seen many articles with the title of something like ‘This is how I found $$$$ bug in 5 minutes' or ‘Found RCE within 5 minutes'.If you read medium articles then...
Securing MCP Servers: Key Lessons from a Vulnerable Project
2025-05-16 05:01:16
Securing MCP Servers: Key Lessons from a Vulnerable ProjectThere is so much that goes into the big space of cybersecurity with its big brands Windows servers, Linux, web applications, and APIs. However,...
Microsoft Goes Passwordless: What You Need to Know
2025-05-16 05:01:04
Microsoft Goes Passwordless: What You Need to KnowPasswords are ubiquitous — from email and social media to banking and work accounts. But let's face it: passwords are annoying. They're difficult...
NoSQL Injection Detection — A hands-on Exploitation Walkthrough
2025-05-16 05:00:16
NoSQL Injection Detection — A hands-on Exploitation Walkthrough with Burp 🔍Unleashing logic flipping payloads in the neon-lit alleys of NoSQL One Injection at a Time.🧠 IntroductionNoSQL...
How hackers chat securely on the darkweb
2025-05-16 05:00:01
This is how hackers chat securely on the darknet 2024Continue reading on InfoSec Write-ups »
How a Simple Logic Flaw Led to a ,250 Bounty
2025-05-16 04:59:05
Claiming Unclaimed Restaurants on Zomato via OTP ManipulationContinue reading on InfoSec Write-ups »
From 0 to $$$: Finding Rate Limit Bypasses Like a Pro
2025-05-16 04:58:05
A beginner-friendly guide to finding rate limit bugs with real techniques, testing steps, and real-world impact.🙋♂️ Who Am I?Hi, I'm Anonymous — a part-time bug bounty hunter and full-time...
Top Tools That Helped Me Earn 0 in 30 Days
2025-05-16 04:57:24
How I used these tools & commands to find bugs fastContinue reading on InfoSec Write-ups »
Explicit Expansion and Bounds of Spectral Projector in ESPRIT Analysis
2025-05-16 02:30:04
This section details the explicit formulas for higher-order terms in the perturbation expansion of the spectral projector, along with their bounds
Vulnérabilité dans Python (16 mai 2025)
16/05/2025
Une vulnérabilité a été découverte dans Python. Elle permet à un attaquant de provoquer un déni de service.
Vulnérabilité dans Synacor Zimbra Collaboration (16 mai 2025)
16/05/2025
Une vulnérabilité a été découverte dans Synacor Zimbra Collaboration. Elle permet à un attaquant de provoquer un déni de service à distance.
Vulnérabilité dans Spring Framework (16 mai 2025)
16/05/2025
Une vulnérabilité a été découverte dans Spring Framework. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.
Multiples vulnérabilités dans Microsoft Edge (16 mai 2025)
16/05/2025
De multiples vulnérabilités ont été découvertes dans Microsoft Edge. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur. Microsoft indique que...
Vulnérabilité dans Microsoft Defender pour Endpoint (16 mai 2025)
16/05/2025
Une vulnérabilité a été découverte Microsoft Defender pour Endpoint. Elle permet à un attaquant de provoquer une élévation de privilèges.
Multiples vulnérabilités dans les produits Nextcloud (16 mai 2025)
16/05/2025
De multiples vulnérabilités ont été découvertes dans les produits Nextcloud. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité...
Multiples vulnérabilités dans le noyau Linux de Red Hat (16 mai 2025)
16/05/2025
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation...
Multiples vulnérabilités dans IBM QRadar SIEM (16 mai 2025)
16/05/2025
De multiples vulnérabilités ont été découvertes dans IBM QRadar SIEM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service...