Plus récents

L'agence fédérale américaine du commerce (FTC) gonfle ses muscles afin de créer un rapport de force en menaçant d'utiliser toute son autorité légale pour poursuivre en justice les entreprises qui ne protégent pas les données des consommateurs contre l'exposition à des vulnérabilités connues

lemondeinformatique.fr/actuali

CVE-2021-20047 - SonicWall Global VPN client version 4.10.6 (32-bit and 64-bit) and earlier have a DLL Search Order Hijacking vulnerability. Successful exploitation via a local attacker could result in RCE in the target system.

cyberis.co.uk/blog/CVE-2021-20

Passer par les sous-traitants attaquer des grands groupes est une technique établie. Terminé les escarmouches, ce sont de vraies batailles que se livrent états, services secrets, entreprises et électrons libres du dark web. Avec, comme dans le champ du terrorisme, une frontière parfois très poreuse entre cyberguerre et cybercriminalité.

le-tout-lyon.fr/a-lyon-les-age

New Zloader campaign exploits Microsoft's Signature Verification putting users at risk. 🔥 This banking malware designed to steal user credentials and private information is back with a simple yet sophisticated infection chain.

research.checkpoint.com/2022/c

Increasing incidence of cyberattacks will be a key driver fueling the mobile security software market. Mobile market size is estimated to grow by USD 2.75 billion from 2021 to 2025 at a CAGR of 10% with the enterprises segment having largest market share.

technavio.com/report/mobile-se

CVE-2021-22045 - VMware ESXi (7.0, 6.7 before ESXi670-202111101-SG and 6.5 before ESXi650-202110101-SG), VMware Workstation (16.2.0) and VMware Fusion (12.2.0) contains a heap-overflow vulnerability in CD-ROM device emulation. Someone with access to a VM with CD-ROM device emulation may be able to exploit it in conjunction with other issues to execute code on the hypervisor from a virtual machine.

vmware.com/security/advisories

Purple Fox - The threat actors have noticed that the attacks generally take advantage of legitimate software for implementing malicious payloads. The vulnerability has been named CVE-2021-1732, and this vulnerability generally optimizes rootkit capabilities that are leveraged in their attacks.

blog.minerva-labs.com/maliciou

🇺🇸 IBEX Global Solutions, Inc. (ibex.co) announced that the company's IT systems were the target of a malware attack, resulting in sensitive consumer data of more than 174,000 people being compromised.

jdsupra.com/legalnews/data-bre

Russian businessman Vladislav Klyushin pleaded not guilty to participating in an $82 million insider trading scheme that relied on information stolen through hacking.

reuters.com/world/russian-busi

credential stuffing : more than 1.1 million online accounts compromised in cyberattacks at 17 well-known companies - « Right now, there are more than 15 billion stolen credentials being circulated across the »

ag.ny.gov/press-release/2022/a

🐘 Elephant Beetle, a financially motivated threat group targeting and infiltrating organizations from the finance and commerce sectors in Latin America. The group executes its attacks patiently over long periods of time, blending in with the target’s environment and going completely undetected while it quietly liberates organizations of large amounts of money.

blog.sygnia.co/elephant-beetle

Plus anciens