New PEAKLIGHT Dropper Deployed in Attacks Targeting Windows with Malicious Movie Downloads
Cybersecurity researchers have uncovered a never-before-seen dropper that serves as a conduit to launch next-stage malware with the ultimate goal of infecting Windows systems with information stealers and loaders. « This memory-only dropper decrypts and executes a PowerShell-based downloader, » Google-owned Mandiant said. « This PowerShell-based downloader is being tracked as PEAKLIGHT. » Some of
Fuite du code source du New York Times, des secrets exposés
Un token GitHub ayant fait l’objet d’une fuite publique est à l’origine de la fuite du code source.
Réinventer la sécurité des applications à l’ère du cloud
La sécurité des applications cloud ne peut plus être réactive ; elle devient un pilier stratégique de l’innovation numérique et un catalyseur de transformation.
Focus on What Matters Most: Exposure Management and Your Attack Surface
Read the full article for key points from Intruder’s VP of Product, Andy Hornegold’s recent talk on exposure management. If you’d like to hear Andy’s insights first-hand, watch Intruder’s on-demand webinar. To learn more about reducing your attack surface, reach out to their team today. Attack surface management vs exposure management Attack surface management (ASM) is […]
Webinar: Experience the Power of a Must-Have All-in-One Cybersecurity Platform
Let’s be honest. The world of cybersecurity feels like a constant war zone. You’re bombarded by threats, scrambling to keep up with patches, and drowning in an endless flood of alerts. It’s exhausting, isn’t it? But what if there was a better way? Imagine having every essential cybersecurity tool at your fingertips, all within a […]
New Qilin Ransomware Attack Uses VPN Credentials, Steals Chrome Data
The threat actors behind a recently observed Qilin ransomware attack have stolen credentials stored in Google Chrome browsers on a small set of compromised endpoints. The use of credential harvesting in connection with a ransomware infection marks an unusual twist, and one that could have cascading consequences, cybersecurity firm Sophos said in a Thursday report. […]
Partage de fichiers, assistant et IA conversationnelle : une bombe à retardement pour la sécurité et la conformité
Il existe différentes approches en matière de contrôles autour du partage de fichiers auxquelles vous pouvez vous conformer, par exemple avec la norme ISO 27001.
New macOS Malware « Cthulhu Stealer » Targets Apple Users’ Data
Cybersecurity researchers have uncovered a new information stealer that’s designed to target Apple macOS hosts and harvest a wide range of information, underscoring how threat actors are increasingly setting their sights on the operating system. Dubbed Cthulhu Stealer, the malware has been available under a malware-as-a-service (MaaS) model for $500 a month from late 2023. […]
Latvian Hacker Extradited to U.S. for Role in Karakurt Cybercrime Group
A 33-year-old Latvian national living in Moscow, Russia, has been charged in the U.S. for allegedly stealing data, extorting victims, and laundering ransom payments since August 2021. Deniss Zolotarjovs (aka Sforza_cesarini) has been charged with conspiring to commit money laundering, wire fraud and Hobbs Act extortion. He was arrested in Georgia in December 2023 and […]
Hardware Backdoor Discovered in RFID Cards Used in Hotels and Offices Worldwide
Cybersecurity researchers have uncovered a hardware backdoor within a particular model of MIFARE Classic contactless cards that could allow authentication with an unknown key and open hotel rooms and office doors. The attacks have been demonstrated against FM11RF08S, a new variant of MIFARE Classic that was released by Shanghai Fudan Microelectronics in 2020. « The FM11RF08S […]