Webinar: Learn to Spot Risks and Patch Safely with Community-Maintained Tools

Actualités
If you're using community tools like Chocolatey or Winget to keep systems updated, you're not alone. These platforms are fast, flexible, and easy to work with—making them favorites for IT teams. But there’s a catch... The very tools that make your job easier might also be the reason your systems are at risk. These tools are run by the community. That means anyone can add or update packages. Some
Read More

Chrome Extension Caught Injecting Hidden Solana Transfer Fees Into Raydium Swaps

Actualités
Cybersecurity researchers have discovered a new malicious extension on the Chrome Web Store that's capable of injecting a stealthy Solana transfer into a swap transaction and transferring the funds to an attacker-controlled cryptocurrency wallet. The extension, named Crypto Copilot, was first published by a user named "sjclark76" on May 7, 2024. The developer describes the browser add-on as
Read More

RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware

Actualités
The threat actors behind a malware family known as RomCom targeted a U.S.-based civil engineering company via a JavaScript loader dubbed SocGholish to deliver the Mythic Agent. "This is the first time that a RomCom payload has been observed being distributed by SocGholish," Arctic Wolf Labs researcher Jacob Faires said in a Tuesday report. The activity has been attributed with medium-to-high
Read More

FBI Reports $262M in ATO Fraud as Researchers Cite Growing AI Phishing and Holiday Scams

Actualités
The U.S. Federal Bureau of Investigation (FBI) has warned that cybercriminals are impersonating financial institutions with an aim to steal money or sensitive information to facilitate account takeover (ATO) fraud schemes. The activity targets individuals, businesses, and organizations of varied sizes and across sectors, the agency said, adding the fraudulent schemes have led to more than $262
Read More

Years of JSONFormatter and CodeBeautify Leaks Expose Thousands of Passwords and API Keys

Actualités
New research has found that organizations in various sensitive sectors, including governments, telecoms, and critical infrastructure, are pasting passwords and credentials into online tools like JSONformatter and CodeBeautify that are used to format and validate code. Cybersecurity company watchTowr Labs said it captured a dataset of over 80,000 files on these sites, uncovering thousands of
Read More

JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers

Actualités
Cybersecurity researchers are calling attention to a new campaign that's leveraging a combination of ClickFix lures and fake adult websites to deceive users into running malicious commands under the guise of a "critical" Windows security update. "Campaign leverages fake adult websites (xHamster, PornHub clones) as its phishing mechanism, likely distributed via malvertising," Acronis said in a
Read More

NIS 2 : les entités assujetties peuvent se pré-enregistrer (ANSSI – Actualités)

Actualités
NIS 2 : les entités assujetties peuvent se pré-enregistrer anssiadm lun 24/11/2025 - 14:07 Le service de pré-enregistrement des entités assujetties à la directive NIS 2 est désormais disponible. Le service de pré-enregistrement des entités assujetties à la directive NIS 2 est désormais disponible.   Dans le cadre de la mise en œuvre de la directive NIS 2, et dans l'attente de l'entrée en vigueur de l'obligation d'enregistrement qui interviendra avec la publication des textes réglementaires, l’ANSSI met à disposition des entités un service de pré-enregistrement pour leur permettre d'anticiper cette étape.   Le pré-enregistrement constitue la première brique de l’entrée en vigueur de NIS 2 et un premier pas pour les entités dans le respect de leurs obligations.   En effet, cette étape permettra aux entités de bénéficier d’un…
Read More

ToddyCat’s New Hacking Tools Steal Outlook Emails and Microsoft 365 Access Tokens

Actualités
The threat actor known as ToddyCat has been observed adopting new methods to obtain access to corporate email data belonging to target companies, including using a custom tool dubbed TCSectorCopy. "This attack allows them to obtain tokens for the OAuth 2.0 authorization protocol using the user's browser, which can be used outside the perimeter of the compromised infrastructure to access
Read More

3 SOC Challenges You Need to Solve Before 2026

Actualités
2026 will mark a pivotal shift in cybersecurity. Threat actors are moving from experimenting with AI to making it their primary weapon, using it to scale attacks, automate reconnaissance, and craft hyper-realistic social engineering campaigns. The Storm on the Horizon Global world instability, coupled with rapid technological advancement, will force security teams to adapt not just their
Read More

Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware

Actualités
Cybersecurity researchers have disclosed details of a new campaign that has leveraged Blender Foundation files to deliver an information stealer known as StealC V2. "This ongoing operation, active for at least six months, involves implanting malicious .blend files on platforms like CGTrader," Morphisec researcher Shmuel Uzan said in a report shared with The Hacker News. "Users unknowingly
Read More