Report: The Dark Side of Phishing Protection

The transition to the cloud, poor password hygiene and the evolution in webpage technologies have all enabled the rise in phishing attacks. But despite sincere efforts by security stakeholders to mitigate them – through email protection, firewall rules and employee education – phishing attacks are still a very risky attack vector. A new report by LayerX explores the state […]

Cybersécurité : comment les entreprises peuvent-elles se protéger judicieusement pendant (et après) les Jeux Olympiques ?

Les surfaces d’attaque seront démultipliées pendant les Jeux. Pendant cette période, le gouvernement recommande aux entreprises de privilégier le télétravail, essentiellement pour limiter la venue au bureau des collaborateurs au vu de l’organisation des transports.

New Tricks in the Phishing Playbook: Cloudflare Workers, HTML Smuggling, GenAI

Cybersecurity researchers are alerting of phishing campaigns that abuse Cloudflare Workers to serve phishing sites that are used to harvest users’ credentials associated with Microsoft, Gmail, Yahoo!, and cPanel Webmail. The attack method, called transparent phishing or adversary-in-the-middle (AitM) phishing, « uses Cloudflare Workers to act as a reverse proxy server for a

Cybersécurité : plus de startup en France et moins de levées de fonds en 2024

Dans sa 6ème édition, le Radar 2024 des startups cybersécurité française de Wavestone, en partenariat avec Bpifrance, relève la création de 50 jeunes entreprises supplémentaires sur un an et des levées de fonds moins nombreuses.

Pakistan-linked Hackers Deploy Python, Golang, and Rust Malware on Indian Targets

The Pakistan-nexus Transparent Tribe actor has been linked to a new set of attacks targeting Indian government, defense, and aerospace sectors using cross-platform malware written in Python, Golang, and Rust. « This cluster of activity spanned from late 2023 to April 2024 and is anticipated to persist, » the BlackBerry Research and Intelligence Team said in a technical report

Experts Find Flaw in Replicate AI Service Exposing Customers’ Models and Data

Cybersecurity researchers have discovered a critical security flaw in an artificial intelligence (AI)-as-a-service provider Replicate that could have allowed threat actors to gain access to proprietary AI models and sensitive information. « Exploitation of this vulnerability would have allowed unauthorized access to the AI prompts and results of all Replicate’s platform customers, »

Hackers Created Rogue VMs to Evade Detection in Recent MITRE Cyber Attack

The MITRE Corporation has revealed that the cyber attack targeting the not-for-profit company towards late December 2023 by exploiting zero-day flaws in Ivanti Connect Secure (ICS) involved the actor creating rogue virtual machines (VMs) within its VMware environment. « The adversary created their own rogue VMs within the VMware environment, leveraging compromised vCenter Server access, » MITRE

Fake Antivirus Websites Deliver Malware to Android and Windows Devices

Threat actors have been observed making use of fake websites masquerading as legitimate antivirus solutions from Avast, Bitdefender, and Malwarebytes to propagate malware capable of stealing sensitive information from Android and Windows devices. « Hosting malicious software through sites which look legitimate is predatory to general consumers, especially those who look to protect their devices

How Do Hackers Blend In So Well? Learn Their Tricks in This Expert Webinar

Don’t be fooled into thinking that cyber threats are only a problem for large organizations. The truth is that cybercriminals are increasingly targeting smaller businesses, and they’re getting smarter every day. Join our FREE webinar « Navigating the SMB Threat Landscape: Key Insights from Huntress’ Threat Report, » in which Jamie Levy — Director of Adversary Tactics […]

Courtroom Software Backdoored to Deliver RustDoor Malware in Supply Chain Attack

Malicious actors have backdoored the installer associated with courtroom video recording software developed by Justice AV Solutions (JAVS) to deliver malware that’s associated with a known backdoor called RustDoor. The software supply chain attack, tracked as CVE-2024-4978, impacts JAVS Viewer v8.3.7, a component of the JAVS Suite 8 that allows users to create, manage, publish,

Me contacter