Blog

New Linux Variant of FASTCash Malware Targets Payment Switches in ATM Heists

Actualités
North Korean threat actors have been observed using a Linux variant of a known malware family called FASTCash to steal funds as part of a financially-motivated campaign. The malware is "installed on payment switches within compromised networks that handle card transactions for the means of facilitating the unauthorized withdrawal of cash from ATMs," a security researcher who goes by HaxRob said.
Read More

New Malware Campaign Uses PureCrypter Loader to Deliver DarkVision RAT

Actualités
Cybersecurity researchers have disclosed a new malware campaign that leverages a malware loader named PureCrypter to deliver a commodity remote access trojan (RAT) called DarkVision RAT. The activity, observed by Zscaler ThreatLabz in July 2024, involves a multi-stage process to deliver the RAT payload. "DarkVision RAT communicates with its command-and-control (C2) server using a custom network
Read More

EU Cybersecurity Skills Conference 2024 (ENISA)

Actualités
ENISA, in collaboration with the Hungarian Presidency of the EU Council, hosted the 3rd Cybersecurity Skills Conference on September 26-27, 2024, in Budapest. Day 1 focused on NIS2 implementation, the Cyber Skills Academy, and capacity building for the Western Balkans. Day 2 explored the diverse applications of the European Cybersecurity Skills Framework (ECSF) by various stakeholders in different contexts.
Read More

The Rise of Zero-Day Vulnerabilities: Why Traditional Security Solutions Fall Short

Actualités
In recent years, the number and sophistication of zero-day vulnerabilities have surged, posing a critical threat to organizations of all sizes. A zero-day vulnerability is a security flaw in software that is unknown to the vendor and remains unpatched at the time of discovery. Attackers exploit these flaws before any defensive measures can be implemented, making zero-days a potent weapon for
Read More

Researchers Uncover Hijack Loader Malware Using Stolen Code-Signing Certificates

Actualités
Cybersecurity researchers have disclosed a new malware campaign that delivers Hijack Loader artifacts that are signed with legitimate code-signing certificates. French cybersecurity company HarfangLab, which detected the activity at the start of the month, said the attack chains aim to deploy an information stealer known as Lumma. Hijack Loader, also known as DOILoader, IDAT Loader, and
Read More

China Accuses U.S. of Fabricating Volt Typhoon to Hide Its Own Hacking Campaigns

Actualités
China's National Computer Virus Emergency Response Center (CVERC) has doubled down on claims that the threat actor known as the Volt Typhoon is a fabrication of the U.S. and its allies. The agency, in collaboration with the National Engineering Laboratory for Computer Virus Prevention Technology, went on to accuse the U.S. federal government, intelligence agencies, and Five Eyes countries of
Read More