Messages récents

Pages: 1 2 3 4 [5] 6 7 8 9 10
41
News / [SecList]Arkanix Stealer: a C++ & Python infostealer
« Dernier message par igor51 le février 24, 2026, 10:00:17 »
Arkanix Stealer: a C++ & Python infostealer

Kaspersky researchers analyze a C++ and Python stealer dubbed "Arkanix Stealer", which was active for several months, targeted wide range of data, was distributed as MaaS and offered referral program to its partners.
Source: Arkanix Stealer: a C++ & Python infostealer
42
Divide and conquer: how the new Keenadu backdoor exposed links between major Android botnets

Kaspersky experts have uncovered Keenadu, a sophisticated new backdoor targeting tablet firmware as well as system-level and Google Play apps. They also revealed connections between the world's most prolific Android botnets.
Source: Divide and conquer: how the new Keenadu backdoor exposed links between major Android botnets
43
The game is over: when “free” comes at too high a price. What we know about RenEngine

We disclose new details about campaigns involving RenEngine and HijackLoader malware. Since March 2025, attackers have been distributing the Lumma stealer in a complex chain of infections, and in February 2026, ongoing attacks using ACR Stealer became known.
Source: The game is over: when “free” comes at too high a price. What we know about RenEngine
44
News / [Eset]Faking it on the phone: How to tell if a voice call is AI or not
« Dernier message par igor51 le février 24, 2026, 08:03:04 »
Faking it on the phone: How to tell if a voice call is AI or not

Can you believe your ears? Increasingly, the answer is no. Here’s what’s at stake for your business, and how to beat the deepfakers.

Source: Faking it on the phone: How to tell if a voice call is AI or not
45
News / [CERT-AVIS]Multiples vulnérabilités dans Ivanti Endpoint Manager (11 février 2026)
« Dernier message par igor51 le février 24, 2026, 07:00:52 »
Multiples vulnérabilités dans Ivanti Endpoint Manager (11 février 2026)

De multiples vulnérabilités ont été découvertes dans Ivanti Endpoint Manager. Elles permettent à un attaquant de provoquer une injection SQL (SQLi) et un contournement de la politique de sécurité.
Source: Multiples vulnérabilités dans Ivanti Endpoint Manager (11 février 2026)
46
News / [SecList]Spam and phishing in 2025
« Dernier message par igor51 le février 24, 2026, 07:00:49 »
Spam and phishing in 2025

The report contains statistics on spam and phishing in 2025, outlining the main trends: phishing and scam QR codes, ClickFix attacks, ChatGPT subscription lures and others.
Source: Spam and phishing in 2025
47
News / [CERT-AVIS]Multiples vulnérabilités dans Tenable Security Center (18 février 2026)
« Dernier message par igor51 le février 24, 2026, 01:00:29 »
Multiples vulnérabilités dans Tenable Security Center (18 février 2026)

De multiples vulnérabilités ont été découvertes dans Tenable Security Center. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Source: Multiples vulnérabilités dans Tenable Security Center (18 février 2026)
48
News / [SecList]Stan Ghouls targeting Russia and Uzbekistan with NetSupport RAT
« Dernier message par igor51 le février 23, 2026, 23:00:19 »
Stan Ghouls targeting Russia and Uzbekistan with NetSupport RAT

We analyze the recent Stan Ghouls campaign targeting organizations in Russia and Uzbekistan: Java-based loaders, the NetSupport RAT, and a potential interest in IoT.
Source: Stan Ghouls targeting Russia and Uzbekistan with NetSupport RAT
49
News / [SecList]The Notepad++ supply chain attack — unnoticed execution chains and new IoCs
« Dernier message par igor51 le février 23, 2026, 22:00:27 »
The Notepad++ supply chain attack — unnoticed execution chains and new IoCs

Kaspersky GReAT experts discovered previously undocumented infection chains used in the Notepad++ supply chain attacks. The article provides new IoCs related to those incidents which employ DLL sideloading and Cobalt Strike Beacon delivery.
Source: The Notepad++ supply chain attack — unnoticed execution chains and new IoCs
50
Supply chain attack on eScan antivirus: detecting and remediating malicious updates

On January 20, Kaspersky solutions detected malware used in eScan antivirus supply chain attack. In this article we provide available information on the threat: indicators of compromise, threat hunting and mitigating tips, etc.
Source: Supply chain attack on eScan antivirus: detecting and remediating malicious updates
Pages: 1 2 3 4 [5] 6 7 8 9 10

Erreur de base de données

Merci de réessayer. Si l'erreur se reproduit, signalez cette erreur à un administrateur.