Les hackers nord-coréens tentent de dérober des cryptomonnaies avec de fausses annonces d’embauche
Les pirates de la Corée du Nord mènent une nouvelle campagne pour piéger des employés travaillant pour des entreprises du secteur des cryptomonnaies. De fausses annonces d'embauche incitent les cibles à postuler et à installer un logiciel malveillant. Les hackers nord-coréens continuent de chasser les employés de la
Industrial tech manufacturer Sensata says ransomware attack is impacting production
Sensata Technologies, a U.S.-based manufacturer or industrial technologies with operations in about a dozen countries, told federal regulators that a recent ransomware attack disrupted key systems.
Hackers target SSRF bugs in EC2-hosted sites to steal AWS credentials
A targeted campaign exploited Server-Side Request Forgery (SSRF) vulnerabilities in websites hosted on AWS EC2 instances to extract EC2 Metadata, which could include Identity and Access Management (IAM) credentials from the IMDSv1 endpoint.
Google takes on Cursor with Firebase Studio, its AI builder for vibe coding
Google has quietly launched Firebase Studio, which is a cloud-based AI-powered integrated development environment that lets you build full-fledged apps using prompts.
Windows 11 April update unexpectedly creates new 'inetpub' folder
Microsoft's April 2025 Patch Tuesday updates are strangely creating an empty "inetpub" folder in the root of the C:\ drive, even on systems that do not have Internet Information Services (IIS) installed.
Oracle finally confirmed in email notifications sent to customers that a hacker stole and leaked credentials that were stolen from what it described as "two obsolete servers."
BadBazaar and Moonshine malware targets Taiwanese, Tibetan and Uyghur groups, U.K. warns | CyberScoop
Two spyware variants are targeting Uyghur, Taiwanese and Tibetan groups and individuals, the U.K.’s National Cyber Security Centre warned in a joint alert Wednesday with Western allies.
Stopping attacks against on-premises Exchange Server and SharePoint Server with AMSI
Exchange Server and SharePoint Server are business-critical assets and considered crown-jewels for many organizations, making them attractive targets for attacks. To help customers protect their environments and respond to these attacks, Exchange Server and SharePoint Server integrated Windows Antimalware Scan Interface (AMSI), providing an essential layer of protection by preventing harmful web requests from reaching backend endpoints. The blog outlines several attacks prevented by AMSI integration and highlights recent enhancements. The blog also provides protection and mitigation guidance and how defenders can respond.
How cyberattackers exploit domain controllers using ransomware
Cyberattackers exploit domain controllers to gain privileged system access where they deploy ransomware that causes widespread damage and operational disruption.
Rights group calls on Thai government to end alleged cyberattacks against civil society
Human rights non-profit Amnesty International urged Thai authorities this week to investigate claims of state-sponsored cyberattacks against human rights organizations and pro-democracy activists following the leak of internal government documents that detailed such an operation.
Treasury bureau notifies Congress that email hack was a ‘major’ cybersecurity incident | CyberScoop
The OCC said the February incident resulted in the theft of “highly sensitive information" tied to the financial conditions of federally regulated institutions.
News alert: Gcore launches Super Transit – accelerated DDoS protection to safeguard enterprises
Luxembourg, Luxembourg, Apr. 9, 2025, CyberNewswire -- Gcore, the global edge AI, cloud, network, and security solutions provider, has launched Super Transit, a cutting-edge DDoS protection and acceleration feature, designed to safeguard enterprise infrastructure while delivering lightning-fast connectivity. This comes as organizations face a 56% year-on-year increase in high-volume, complex DDoS attacks that disrupt operations,
Trends-To-Watch Q&A: The future of edge—will decentralization ever be more than a talking point?
For decades, a handful of tech giants have shaped digital infrastructure—and, with it, how businesses and governments manage data, security, and connectivity. Related: Practical uses for edge computing Now, the rise of distributed edge computing is being touted as a potential game-changer—pushing processing power closer to users, improving security, and redistributing control over digital assets.
Treasury Department bank regulator discloses major hack
Attackers gained unauthorized, prolonged access to the Office of the Comptroller of the Currency’s email system, accessing numerous emails containing highly sensitive regulatory data.