Flux RSS

— Sources secondaires
North Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle Malware
Malware & RansomwareThe Hacker Newsil y a 4 jours

The North Korean threat actors behind the Contagious Interview campaign, also tracked as WaterPlum, have been attributed to a malware family tracked as StoatWaffle that's distributed via malicious Microsoft Visual Studio Code (VS Code) projects. The use of VS Code "tasks.json" to distribute malware is a relatively new tactic adopted by the threat actor since December 2025, with the attacks

US chip testing firm shrugged off ransomware hit as minor – then came the data leak
Malware & RansomwareThe Register Securityil y a 5 jours

Trio-Tech International initially said hack wasn't 'material,' but then stolen data was published Trio-Tech International initially shrugged off a ransomware attack at a Singapore subsidiary as immaterial, only to reverse course days later after discovering stolen data had been disclosed.…

Trivy Hack Spreads Infostealer via Docker, Triggers Worm and Kubernetes Wiper
Malware & RansomwareThe Hacker Newsil y a 5 jours

Cybersecurity researchers have uncovered malicious artifacts distributed via Docker Hub following the Trivy supply chain attack, highlighting the widening blast radius across developer environments. The last known clean release of Trivy on Docker Hub is 0.69.3. The malicious versions 0.69.4, 0.69.5, and 0.69.6 have since been removed from the container image library. "New image tags 0.69.5 and

Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages
Malware & RansomwareThe Hacker Newsil y a 7 jours

The threat actors behind the supply chain attack targeting the popular Trivy scanner are suspected to be conducting follow-on attacks that have led to the compromise of a large number of npm packages with a previously undocumented self-propagating worm dubbed CanisterWorm. The name is a reference to the fact that the malware uses an ICP canister, which denotes a tamperproof smart contract on

Google Adds 24-Hour Wait for Unverified App Sideloading to Reduce Malware and Scams
Malware & RansomwareThe Hacker Newsil y a 8 jours

Google on Thursday announced a new "advanced flow" for Android sideloading that requires a mandatory 24-hour wait period to install apps from unverified developers in an attempt to balance openness with safety. The new changes come against the backdrop of a developer verification mandate the tech giant announced last year that requires all Android apps to be registered by verified developers to

LeakNet ransomware: what you need to know
Malware & RansomwareGraham Cluleyil y a 8 jours

A ransomware gang that claims to be a group of "investigative journalists"? Meet LeakNet - the group using fake CAPTCHA pages to trick employees into hacking themselves. Read more in my article on the Fortra blog.

The Importance of Behavioral Analytics in AI-Enabled Cyber Attacks
Malware & RansomwareThe Hacker Newsil y a 8 jours

Artificial Intelligence (AI) is changing how individuals and organizations conduct many activities, including how cybercriminals carry out phishing attacks and iterate on malware. Now, cybercriminals are using AI to generate personalized phishing emails, deepfakes and malware that evade traditional detection by impersonating normal user activity and bypassing legacy security models. As a result,

Feds Disrupt IoT Botnets Behind Huge DDoS Attacks
Malware & RansomwareKrebs on Securityil y a 8 jours

The U.S. Justice Department joined authorities in Canada and Germany in dismantling the online infrastructure behind four highly disruptive botnets that compromised more than three million hacked Internet of Things (IoT) devices, such as routers and web cameras. The feds say the four botnets -- named Aisuru, Kimwolf, JackSkid and Mossad -- are responsible for a series of recent record-smashing distributed denial-of-service (DDoS) attacks capable of knocking nearly any target offline.

Speagle Malware Hijacks Cobra DocGuard to Steal Data via Compromised Servers
Malware & RansomwareThe Hacker Newsil y a 8 jours

Cybersecurity researchers have flagged a new malware dubbed Speagle that hijacks the functionality and infrastructure of a legitimate program called Cobra DocGuard. "Speagle is designed to surreptitiously harvest sensitive information from infected computers and transmit it to a Cobra DocGuard server that has been compromised by the attackers, masking the data exfiltration process as legitimate

New Perseus Android Banking Malware Monitors Notes Apps to Extract Sensitive Data
Malware & RansomwareThe Hacker Newsil y a 9 jours

Cybersecurity researchers have disclosed a new Android malware family called Perseus that's being actively distributed in the wild with an aim to conduct device takeover (DTO) and financial fraud. Perseus is built upon the foundations of Cerberus and Phoenix, at the same time evolving into a "more flexible and capable platform" for compromising Android devices through dropper apps distributed

Claude Code Security and Magecart: Getting the Threat Model Right
Malware & RansomwareThe Hacker Newsil y a 10 jours

When a Magecart payload hides inside the EXIF data of a dynamically loaded third-party favicon, no repository scanner will catch it – because the malicious code never actually touches your repo. As teams adopt Claude Code Security for static analysis, this is the exact technical boundary where AI code scanning stops and client-side runtime execution begins. A detailed analysis of where Claude

More Attackers Are Logging In, Not Breaking In
Malware & RansomwareDark Readingil y a 10 jours

Credential theft soared in the second half of 2025, thanks in part to the industrialization of infostealer malware and AI-enabled social engineering.