New WinTapix.sys Malware Engages in Multi-Stage Attack Across Middle East
An unknown threat actor has been observed leveraging a malicious Windows kernel driver in attacks likely targeting the Middle East since at least May 2020. Fortinet Fortiguard Labs, which dubbed the artifact WINTAPIX (WinTapix.sys), attributed the malware with low confidence to an Iranian threat actor. « WinTapix.sys is essentially a loader, » security researchers Geri Revay and […]
China Bans U.S. Chip Giant Micron, Citing « Serious Cybersecurity Problems »
China has banned U.S. chip maker Micron from selling its products to Chinese companies working on key infrastructure projects, citing national security risks. The development comes nearly two months after the country’s cybersecurity authority initiated a probe in late March 2023 to assess potential network security risks. « The purpose of this network security review of Micron’s products […]
L’importance de l’expertise pour l’évolution et l’exploitation d’infrastructures cloud : efficacité, sécurité et agilité
Dans un monde numérique en constante évolution, les infrastructures cloud sont devenues la clé de voûte des entreprises qui cherchent à optimiser leurs opérations, à sécuriser leurs données et à maintenir leur agilité.
Indonesian Cybercriminals Exploit AWS for Profitable Crypto Mining Operations
A financially motivated threat actor of Indonesian origin has been observed leveraging Amazon Web Services (AWS) Elastic Compute Cloud (EC2) instances to carry out illicit crypto mining operations. Cloud security company’s Permiso P0 Labs, which first detected the group in November 2021, has assigned it the moniker GUI-vil (pronounced Goo-ee-vil). « The group displays a preference for Graphical
CERTFR-2023-ACT-022 : Bulletin d’actualité CERTFR-2023-ACT-022 (22 mai 2023)
Ce bulletin d’actualité du CERT-FR revient sur les vulnérabilités significatives de la semaine passée pour souligner leurs criticités. Il ne remplace pas …
Bad Magic’s Extended Reign in Cyber Espionage Goes Back Over a Decade
New findings about a hacker group linked to cyber attacks targeting companies in the Russo-Ukrainian conflict area reveal that it may have been around for much longer than previously thought. The threat actor, tracked as Bad Magic (aka Red Stinger), has not only been linked to a fresh sophisticated campaign, but also to an activity cluster that […]
Are Your APIs Leaking Sensitive Data?
It’s no secret that data leaks have become a major concern for both citizens and institutions across the globe. They can cause serious damage to an organization’s reputation, induce considerable financial losses, and even have serious legal repercussions. From the infamous Cambridge Analytica scandal to the Equifax data breach, there have been some pretty high-profile […]
La détection des menaces en cybersécurité : une clé pour la protection des données
Avec l’explosion du nombre de données numériques produites et la multiplication des cyberattaques, la nécessité de protéger nos informations n’a jamais été aussi importante.
U.K. Fraudster Behind iSpoof Scam Receives 13-Year Jail Term for Cyber Crimes
A U.K. national responsible for his role as the administrator of the now-defunct iSpoof online phone number spoofing service has been sentenced to 13 years and 4 months in prison. Tejay Fletcher, 35, of Western Gateway, London, was awarded the sentence on May 18, 2023. He pleaded guilty last month to a number of cyber offenses, including facilitating fraud […]
KeePass Exploit Allows Attackers to Recover Master Passwords from Memory
A proof-of-concept (PoC) has been made available for a security flaw impacting the KeePass password manager that could be exploited to recover a victim’s master password in cleartext under specific circumstances. The issue, tracked as CVE-2023-32784, impacts KeePass versions 2.x for Windows, Linux, and macOS, and is expected to be patched in version 2.54, which is likely to […]