Flux RSS

— Sources secondaires
U.S. Sentences Russian Hacker to 6.75 Years for Role in $9M Ransomware Damage
Malware & RansomwareThe Hacker Newsil y a 4 jours

A 26-year-old Russian citizen has been sentenced in the U.S. to 6.75 years (81 months) in prison for his role in assisting major cybercrime groups, including the Yanluowang ransomware crew, in conducting numerous attacks against U.S. companies and other organizations. According to the U.S. Department of Justice (DoJ), Aleksei Olegovich Volkov facilitated dozens of ransomware attacks across the

Claude attacks were 'Rorschach test' for infosec community, scaring former NSA boss
Outils & RechercheThe Register Securityil y a 4 jours

'It freakin' worked' says Rob Joyce - and shows how relentless AI agents can find holes humans miss RSAC 2026 The now-infamous Anthropic report about Chinese cyberspies abusing Claude AI to automate cyberattacks was a Rorschach test for the infosec community, according to former NSA cyber boss Rob Joyce.…

North Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle Malware
Malware & RansomwareThe Hacker Newsil y a 4 jours

The North Korean threat actors behind the Contagious Interview campaign, also tracked as WaterPlum, have been attributed to a malware family tracked as StoatWaffle that's distributed via malicious Microsoft Visual Studio Code (VS Code) projects. The use of VS Code "tasks.json" to distribute malware is a relatively new tactic adopted by the threat actor since December 2025, with the attacks

US chip testing firm shrugged off ransomware hit as minor – then came the data leak
Malware & RansomwareThe Register Securityil y a 5 jours

Trio-Tech International initially said hack wasn't 'material,' but then stolen data was published Trio-Tech International initially shrugged off a ransomware attack at a Singapore subsidiary as immaterial, only to reverse course days later after discovering stolen data had been disclosed.…

Trivy Hack Spreads Infostealer via Docker, Triggers Worm and Kubernetes Wiper
Malware & RansomwareThe Hacker Newsil y a 5 jours

Cybersecurity researchers have uncovered malicious artifacts distributed via Docker Hub following the Trivy supply chain attack, highlighting the widening blast radius across developer environments. The last known clean release of Trivy on Docker Hub is 0.69.3. The malicious versions 0.69.4, 0.69.5, and 0.69.6 have since been removed from the container image library. "New image tags 0.69.5 and

Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages
Malware & RansomwareThe Hacker Newsil y a 7 jours

The threat actors behind the supply chain attack targeting the popular Trivy scanner are suspected to be conducting follow-on attacks that have led to the compromise of a large number of npm packages with a previously undocumented self-propagating worm dubbed CanisterWorm. The name is a reference to the fact that the malware uses an ICP canister, which denotes a tamperproof smart contract on

Google Adds 24-Hour Wait for Unverified App Sideloading to Reduce Malware and Scams
Malware & RansomwareThe Hacker Newsil y a 8 jours

Google on Thursday announced a new "advanced flow" for Android sideloading that requires a mandatory 24-hour wait period to install apps from unverified developers in an attempt to balance openness with safety. The new changes come against the backdrop of a developer verification mandate the tech giant announced last year that requires all Android apps to be registered by verified developers to

LeakNet ransomware: what you need to know
Malware & RansomwareGraham Cluleyil y a 8 jours

A ransomware gang that claims to be a group of "investigative journalists"? Meet LeakNet - the group using fake CAPTCHA pages to trick employees into hacking themselves. Read more in my article on the Fortra blog.

The Importance of Behavioral Analytics in AI-Enabled Cyber Attacks
Malware & RansomwareThe Hacker Newsil y a 8 jours

Artificial Intelligence (AI) is changing how individuals and organizations conduct many activities, including how cybercriminals carry out phishing attacks and iterate on malware. Now, cybercriminals are using AI to generate personalized phishing emails, deepfakes and malware that evade traditional detection by impersonating normal user activity and bypassing legacy security models. As a result,

Feds Disrupt IoT Botnets Behind Huge DDoS Attacks
Malware & RansomwareKrebs on Securityil y a 8 jours

The U.S. Justice Department joined authorities in Canada and Germany in dismantling the online infrastructure behind four highly disruptive botnets that compromised more than three million hacked Internet of Things (IoT) devices, such as routers and web cameras. The feds say the four botnets -- named Aisuru, Kimwolf, JackSkid and Mossad -- are responsible for a series of recent record-smashing distributed denial-of-service (DDoS) attacks capable of knocking nearly any target offline.

Speagle Malware Hijacks Cobra DocGuard to Steal Data via Compromised Servers
Malware & RansomwareThe Hacker Newsil y a 8 jours

Cybersecurity researchers have flagged a new malware dubbed Speagle that hijacks the functionality and infrastructure of a legitimate program called Cobra DocGuard. "Speagle is designed to surreptitiously harvest sensitive information from infected computers and transmit it to a Cobra DocGuard server that has been compromised by the attackers, masking the data exfiltration process as legitimate

Lock down Microsoft Intune, feds warn after Stryker attack
Outils & RechercheThe Register Securityil y a 9 jours

Iran-linked attackers wiped employees' devices using Intune The US government has urged companies to better secure Microsoft Intune, an endpoint management tool that was abused in last week's cyberattack against med-tech firm Stryker.…

New Perseus Android Banking Malware Monitors Notes Apps to Extract Sensitive Data
Malware & RansomwareThe Hacker Newsil y a 9 jours

Cybersecurity researchers have disclosed a new Android malware family called Perseus that's being actively distributed in the wild with an aim to conduct device takeover (DTO) and financial fraud. Perseus is built upon the foundations of Cerberus and Phoenix, at the same time evolving into a "more flexible and capable platform" for compromising Android devices through dropper apps distributed