Flux RSS

— Sources secondaires
Russian initial access broker who fed ransomware crews gets 81 months in US prison
Malware & RansomwareThe Register Securityil y a 4 jours

Aleksei Volkov sentenced after enabling attacks that cost victims millions A Russian national who sold the keys to corporate networks faces nearly seven years in a US prison after prosecutors tied his handiwork to a string of ransomware attacks costing victims millions of dollars.…

Smooth criminals talking their way into cloud environments, Google says
Threat IntelligenceThe Register Securityil y a 5 jours

Voice phishing is second most common initial access method across all IR probes, and top in cloud break-ins RSAC 2026 Voice phishing surged last year to become the second most common method used by cybercriminals to gain initial access to their victims' IT estate – and the No. 1 tactic used when breaking into cloud environments.…

US chip testing firm shrugged off ransomware hit as minor – then came the data leak
Malware & RansomwareThe Register Securityil y a 5 jours

Trio-Tech International initially said hack wasn't 'material,' but then stolen data was published Trio-Tech International initially shrugged off a ransomware attack at a Singapore subsidiary as immaterial, only to reverse course days later after discovering stolen data had been disclosed.…

Russians are posing as Signal support to launch phishing attacks
Threat IntelligenceThe Register Securityil y a 5 jours

PLUS: US takes down Iranian propaganda sites; Marketing company asks 'Why Do We Have Your Information?' And more! Infosec In Brief Russian intelligence-affiliated parties are posing as customer support services on commercial messaging applications such as Signal to compromise accounts and conduct phishing attacks, the FBI and Cybersecurity and Infrastructure Security Agency (CISA) warned last Friday.…

Post-Quantum Web Could be Safer, Faster
Threat IntelligenceDark Readingil y a 9 jours

Major providers are testing a quantum-safe version of HTTPS that shrinks certificates to one-tenth their previous size, decreasing latency and adding transparency.

SideWinder Espionage Campaign Expands Across Southeast Asia
Threat IntelligenceDark Readingil y a 10 jours

The suspected India-linked threat group targets governments, telecom, and critical infrastructure using spear-phishing, old vulnerabilities, and rapidly rotating infrastructure to maintain persistent access.

More Attackers Are Logging In, Not Breaking In
Malware & RansomwareDark Readingil y a 10 jours

Credential theft soared in the second half of 2025, thanks in part to the industrialization of infostealer malware and AI-enabled social engineering.