Flux RSS

— Sources secondaires
452articles RSS
Reinitialiser
Russian CTRL Toolkit Delivered via Malicious LNK Files Hijacks RDP via FRP Tunnels
Threat IntelligenceThe Hacker Newsil y a 22 heures

Cybersecurity researchers have discovered a remote access toolkit of Russian-origin that's distributed via malicious Windows shortcut (LNK) files that are disguised as private key folders. The CTRL toolkit, according to Censys, is custom-built using .NET and includes various executables" to facilitate credential phishing, keylogging, Remote Desktop Protocol (RDP) hijacking, and reverse tunneling

Russian APT Star Blizzard Adopts DarkSword iOS Exploit Kit
Gouvernance & RégulationSecurityWeekil y a 23 heures

The state-sponsored group’s campaign has targeted government, higher education, financial, and legal entities, as well as think tanks. The post Russian APT Star Blizzard Adopts DarkSword iOS Exploit Kit appeared first on SecurityWeek.

The State of Secrets Sprawl 2026: 9 Takeaways for CISOs
Gouvernance & RégulationThe Hacker Newsil y a 23 heures

Secrets sprawl isn't slowing down: in 2025, it accelerated faster than most security teams anticipated. GitGuardian's State of Secrets Sprawl 2026 report analyzed billions of commits across public GitHub and uncovered 29 million new hardcoded secrets in 2025 alone, a 34% increase year over year and the largest single-year jump ever recorded. This year's findings reveal three core trends: AI has

European Commission Reports Cyber Intrusion and Data Theft
Gouvernance & RégulationSecurityWeekil y a 23 heures

The ShinyHunters hacker group claimed to have stolen over 350GB of information from European Commission cloud systems. The post European Commission Reports Cyber Intrusion and Data Theft appeared first on SecurityWeek.

Hackers exploiting critical F5 BIG-IP flaw in attacks, patch now
Gouvernance & RégulationBleepingComputeril y a 24 heures

F5 has reclassified a BIG-IP APM denial-of-service (DoS) vulnerability as a critical-severity remote code execution (RCE) flaw, warning that attackers are exploiting it to deploy webshells on unpatched devices. [...]

Telnyx Targeted in Growing TeamPCP Supply Chain Attack
Gouvernance & RégulationSecurityWeekil y a 24 heures

Two malicious versions of the popular SDK were uploaded to the PyPI registry, targeting Windows, macOS, and Linux. The post Telnyx Targeted in Growing TeamPCP Supply Chain Attack appeared first on SecurityWeek.

Exploitation of Fresh Citrix NetScaler Vulnerability Begins
Gouvernance & RégulationSecurityWeekhier

The critical-severity flaw leaks application memory and can be exploited to obtain authenticated administrative session IDs. The post Exploitation of Fresh Citrix NetScaler Vulnerability Begins appeared first on SecurityWeek.

Security contractor blew the whistle on support crew's viral indifference
Incidents & BreachesThe Register Securityhier

Career-limiting stupidity and rudeness exposed, with terminal consequences Who, Me? The week before Easter may be a short one for many in the Reg-reading world, but that won't stop us from opening it with a fresh installment of Who, Me? It's the reader-contributed column in which you share stories of things you did at work that had interesting consequences.…

Three China-Linked Clusters Target Southeast Asian Government in 2025 Cyber Campaign
Vulnérabilités & PatchesThe Hacker Newshier

Three threat activity clusters aligned with China have targeted a government organization in Southeast Asia as part of what has been described as a "complex and well-resourced operation." The campaigns have led to the deployment of various malware families, including HIUPAN (aka USBFect, MISTCLOAK, or U2DiskWatch), PUBLOAD, EggStremeFuel (aka RawCookie), EggStremeLoader (aka Gorem RAT), MASOL

Page 2 / 23