Hackers Abusing GitHub to Evade Detection and Control Compromised Hosts
Threat actors are increasingly making use of GitHub for malicious purposes through novel methods, including abusing secret Gists and issuing malicious commands via git commit messages. « Malware authors occasionally place their samples in services like Dropbox, Google Drive, OneDrive, and Discord to host second stage malware and sidestep detection tools, » ReversingLabs researcher Karlo Zanki 
Are We Ready to Give Up on Security Awareness Training?
Some of you have already started budgeting for 2024 and allocating funds to security areas within your organization. It is safe to say that employee security awareness training is one of the expenditure items, too. However, its effectiveness is an open question with people still engaging in insecure behaviors at the workplace. Besides, social engineering […]
Iranian Hackers Using MuddyC2Go in Telecom Espionage Attacks Across Africa
The Iranian nation-state actor known as MuddyWater has leveraged a newly discovered command-and-control (C2) framework called MuddyC2Go in its attacks on the telecommunications sector in Egypt, Sudan, and Tanzania. The Symantec Threat Hunter Team, part of Broadcom, is tracking the activity under the name Seedworm, which is also tracked under the monikers Boggy Serpens, Cobalt
En 2024, les magasins d’apps devront s’ouvrir davantage (Google comme Apple !)
L’ouverture des magasins d’applications semble être en passe de devenir la norme pour 2024. Ainsi, Alphabet vient d’accepter de payer 700 millions de dollars dans le cadre d’un accord conséquent aux USA et d’apporter des modifications à sa boutique d’applications en ligne.
New Malvertising Campaign Distributing PikaBot Disguised as Popular Software
The malware loader known as PikaBot is being distributed as part of a malvertising campaign targeting users searching for legitimate software like AnyDesk. « PikaBot was previously only distributed via malspam campaigns similarly to QakBot and emerged as one of the preferred payloads for a threat actor known as TA577, » Malwarebytes’ Jérôme Segura said. The malware family,
Automobile : TomTom s’associe à Microsoft pour créer un assistant conversationnel alimenté par l’IA
TomTom, le spécialiste néerlandais des technologies de localisation, annonce ce mardi 19 décembre avoir travaillé avec Microsoft sur un…
Threads cartonne en France !
Après quelques mois de retard, Meta a lancé son nouveau bébé -baptisé Thread- le 15 décembre dernier en Europe. Et en quelques jours, la naissance s’avère placée sous les meilleurs augures !
Manipulation de modèles linguistiques, piratage de casques VR, attaques de Vishing : que nous réserve l’année « cyber » 2024 ?
Chaque nouvelle tendance technologique ouvre de nouveaux vecteurs d’attaque pour les cybercriminels. En 2024, les menaces émergentes ciblant les entreprises et les particuliers seront encore plus intenses, complexes et difficiles à gérer.
TikTok fait peau neuve sur l’iPad
L’application TikTok sur iPadOS vient de recevoir une Gross mise à jour avec de nouvelles barres de navigation, un flux vidéo plus clair et la prise en charge de l’orientation paysage / portrait.
8220 Gang Exploiting Oracle WebLogic Server Vulnerability to Spread Malware
The threat actors associated with the 8220 Gang have been observed exploiting a high-severity flaw in Oracle WebLogic Server to propagate their malware. The security shortcoming is CVE-2020-14883 (CVSS score: 7.2), a remote code execution bug that could be exploited by authenticated attackers to take over susceptible servers. « This vulnerability allows remote authenticated