Malvertisers Using Google Ads to Target Users Searching for Popular Software
Details have emerged about a malvertising campaign that leverages Google Ads to direct users searching for popular software to fictitious landing pages and distribute next-stage payloads. Malwarebytes, which discovered the activity, said it’s « unique in its way to fingerprint users and distribute time sensitive payloads. » The attack singles out users searching for Notepad++ and PDF converters to
Vietnamese Hackers Target U.K., U.S., and India with DarkGate Malware
Attacks leveraging the DarkGate commodity malware targeting entities in the U.K., the U.S., and India have been linked to Vietnamese actors associated with the use of the infamous Ducktail stealer. « The overlap of tools and campaigns is very likely due to the effects of a cybercrime marketplace, » WithSecure said in a report published today. « Threat actors are able […]
La cybersécurité d’EDF épinglée au Royaume-Uni
Le régulateur britannique de l’industrie nucléaire a passé EDF au niveau maximal de surveillance sur le volet cybersécurité.
Plus de X jusqu’à nouvel ordre pour le Clusif
Au motif, entre autres, d’une dégradation de la qualité de l’information, le Clusif suspend ses activités sur X.
Unleashing the Power of the Internet of Things and Cyber Security
Due to the rapid evolution of technology, the Internet of Things (IoT) is changing the way business is conducted around the world. This advancement and the power of the IoT have been nothing short of transformational in making data-driven decisions, accelerating efficiencies, and streamlining operations to meet the demands of a competitive global marketplace. IoT […]
Qu’est-ce que l’ID-Proofing ? Pourquoi est-ce aussi important ?
L’objectif premier de l’ID-Proofing est d’offrir aux entreprises, à la fin de chaque processus, d’être certaine que l’identité revendiquée par la personne est unique, correcte et exacte – ou non.
ExelaStealer: A New Low-Cost Cybercrime Weapon Emerges
A new information stealer named ExelaStealer has become the latest entrant to an already crowded landscape filled with various off-the-shelf malware designed to capture sensitive data from compromised Windows systems. « ExelaStealer is a largely open-source infostealer with paid customizations available from the threat actor, » Fortinet FortiGuard Labs researcher James Slaughter said in a
L’IA, l’arme ultime pour l’armée américaine
L’ancien chef du Comité interarmées des chefs d’état-major unis des États-Unis, le général Mark Milley, affirme que l’intelligence artificielle (IA) deviendra un élément clé pour que l’armée américaine.
Sophisticated MATA Framework Strikes Eastern European Oil and Gas Companies
An updated version of a sophisticated backdoor framework called MATA has been used in attacks aimed at over a dozen Eastern European companies in the oil and gas sector and defense industry as part of a cyber espionage operation that took place between August 2022 and May 2023. « The actors behind the attack used spear-phishing mails to […]
Vulnerability Scanning: How Often Should I Scan?
The time between a vulnerability being discovered and hackers exploiting it is narrower than ever – just 12 days. So it makes sense that organizations are starting to recognize the importance of not leaving long gaps between their scans, and the term « continuous vulnerability scanning » is becoming more popular. Hackers won’t wait for your next scan […]