Une vulnérabilité a été découverte dans le noyau Linux de SUSE. Elle permet à un attaquant de...
Mois : mai 2022
De multiples vulnérabilités ont été découvertes dans Google Chrome OS. Elles permettent à un attaquant de provoquer...
Une vulnérabilité a été découverte dans le noyau Linux de Red Hat. Elle permet à un attaquant...
PyPI module ‘ctx’ that gets downloaded over 20,000 times a week has been compromised in a software supply...
NIST may be on the brink of revealing which post-quantum computing encryption algorithms it is endorsing, solidifying...
US car manufacturer GM disclosed that it was the victim of a credential stuffing attack last month...
An analysis from Google TAG shows that Android zero-day exploits were packaged and sold for state-backed surveillance.
Malicious Python Repository Package Drops Cobalt Strike on Windows, macOS & Linux Systems

1 min read
The PyPI « pymafka » package is the latest example of growing attacker interest in abusing widely used open...
A threat actor targeted security researchers with fake Windows proof-of-concept exploits that infected devices with the Cobalt...
Analysts have seen a massive spike in malicious activity by the XorDdos trojan in the last six...