Flux RSS

— Sources secondaires
Intrusion dans l'environnement cloud AWS de la Commission Européenne
ÉlevéMenaces & RansomwareBleepingComputeril y a 17 heures

Un acteur malveillant a accédé à au moins un compte AWS de la Commission Européenne, avec accès à des informations d'employés et un serveur email. La Commission enquête sur cette brèche, potentiellement liée à des vulnérabilités Ivanti EPMM exploitées contre d'autres institutions EU. Impact potentiel sur infrastructures critiques EU et conformité DORA/NIS2 pour le secteur financier dépendant des services cloud EU.

Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials
Threat IntelligenceThe Hacker Newsil y a 4 jours

Cybersecurity researchers have uncovered a new set of malicious npm packages that are designed to steal cryptocurrency wallets and sensitive data. The activity is being tracked by ReversingLabs as the Ghost campaign. The list of identified packages, all published by a user named mikilanjillo, is below - react-performance-suite react-state-optimizer-core react-fast-utilsa ai-fast-auto-trader

FBI Warns Russian Hackers Target Signal, WhatsApp in Mass Phishing Attacks
Threat IntelligenceThe Hacker Newsil y a 7 jours

Threat actors affiliated with Russian Intelligence Services are conducting phishing campaigns to compromise commercial messaging applications (CMAs) like WhatsApp and Signal to seize control of accounts belonging to individuals with high intelligence value, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) said Friday. "The campaign