Advertisement · 728 × 90

Posts by TuxPanik

🔍 Whether you’re a researcher, analyst, engineer, or developer, we invite you to join our community — test it, improve it, and help it grow!

6 months ago 1 0 0 0

⚙️ The project features with a modular, extensible, and automation architecture. It leverages well-known components from StrangeBee; such as Cortex for processing and can seamlessly interact with TheHive Project.

💪 The project reflects our team’s strong expertise and passion for cybersecurity.

6 months ago 1 0 1 0
LinkedIn This link will take you to a page that’s not on LinkedIn

🚀 I’m very proud to announce the release of "Suspicious", a framework developed by our team and now available as Open Source! 🎉

💼 Built by members of the @tha-cert.bsky.social , this platform enables employees to self-assess suspicious e-mails or files efficiently.

👉 Check it out: lnkd.in/ecQd-N_F

6 months ago 1 0 1 0
Preview
La France va devenir le premier actionnaire de l'opérateur européen de satellites Eutelsat Eutelsat, concurrent de l'entreprise Starlink d'Elon Musk, va voir l'État français devenir son premier actionnaire à la faveur d'un réinvestissement de 717 millions d'euros dans le groupe européen, deuxième opérateur mondial de satellites en orbite basse.

La France va devenir le premier actionnaire de l'opérateur européen de satellites Eutelsat

10 months ago 19 3 0 0
Preview
L’adoption de DMARC n’est pas assez généralisée, ce qui favorise les attaques de phishing - IT SOCIAL Selon une nouvelle étude, plus de 90 % des principaux domaines de messagerie électronique dans le monde sont vulnérables à l’usurpation d’identité. Cette faille permet aux cybercriminels de lancer…

⚡L’adoption de DMARC n’est pas assez généralisée, ce qui favorise les attaques de phishing

10 months ago 0 1 0 0
Preview
Éducation nationale : Stormous semble avoir constitué une « combolist » | LeMagIT Le groupe malveillant Stormous vient de revendiquer une cyberattaque contre les systèmes de l’éducation nationale. L’échantillon de données publié pour le moment suggère la création d’une liste…

💡 L'authentification à facteurs multiples (#MFA) n'est aujourd'hui plus une option.
Mais il faut aussi (ré)apprendre à fermer sa session, à se déconnecter d'un service Web après usage, avant de fermer la fenêtre ou l'onglet de son navigateur.

www.lemagit.fr/actualites/3...

10 months ago 1 1 0 0
Post image

#VIGINUM publie avec les contributions de partenaires internationaux, un rapport sur African Initiative, une agence de presse russe, pensée comme l'un des principaux vecteurs de la réarticulation du dispositif d’influence de la Russie en Afrique post-Prigojine ➡️ www.sgdsn.gouv.fr/publications...

10 months ago 27 14 0 1
Preview
Hack of Contractor Was at Root of Massive Federal Data Breach A software company that handles sensitive data for nearly every US federal agency was the victim of a cyber breach earlier this year due to a "major

Two rogue employees from IT company Opexus have stolen data and destroyed over 30 US government databases

www.insurancejournal.com/news/nationa...

10 months ago 11 9 0 0
Preview
UAT-6382 exploits Cityworks zero-day vulnerability to deliver malware Talos has observed exploitation of CVE-2025-0994 in the wild by UAT-6382, a Chinese-speaking threat actor, who then deployed malware payloads via TetraLoader.

Cisco Talos says a group tracked as UAT-6382 has used a recent Trimble CityWorks zero-day (CVE-2025-0944) to breach local governing bodies in the US

blog.talosintelligence.com/uat-6382-exp...

10 months ago 8 2 0 0
Advertisement
Post image

La victimologie de l'infostealer Lumma. Graphique Microsoft.

10 months ago 5 3 1 0
Post image Post image

Looks like there's a DanaBot botnet takedown happening tomorrow

😂

10 months ago 3 1 1 0
Preview
Modèle de Politique de Sécurité des Systèmes d’Information pour l’IA - NoLimitSecu Episode #502 Dans cet épisode, Michel Dubois nous parle d’un document de référence réalisé par le CLUSIF pouvant servir de base à une Politique de Sécurité des Systèmes d’Information (PSSI) dédiée à l...

#Podcast #Cybersécurité

Épisode #502 : un modèle de PSSI pour l'IA (publié par le CLUSIF), avec Michel Dubois

www.nolimitsecu.fr/modele-de-po...

11 months ago 4 5 0 0
Preview
Operation RoundPress targeting high-value webmail servers ESET researchers uncover a Russia-aligned espionage operation that they named RoundPress and that targets webmail servers via XSS vulnerabilities.

ESET researchers uncover a Russia-aligned espionage operation targeting webmail servers via XSS vulnerabilities | www.welivesecurity.com/en/eset-rese... @esetofficial.bsky.social

11 months ago 21 7 0 0
Post image

This DTEX report on North Korea's hacking capabilities, along with Viginum's Russian info op report from last week, are probably the best reports of the year so far

You MUST read it!

PDF: reports.dtexsystems.com/DTEX-Exposin...

11 months ago 21 11 0 0
Preview
Zero-Day Attacks Highlight Another Busy Microsoft Patch Tuesday Patch Tuesday: Microsoft patches at least 70 security bugs and flagged five zero-days in the “exploitation detected” category.

Zero-Day Attacks Highlight Another Busy Microsoft Patch Tuesday
www.securityweek.com/zero-day-att...

#Infosec #Security #Cybersecurity #CeptBiro #ZeroDayAttacks #Microsoft #PatchTuesday

11 months ago 0 1 0 0
 Microsoft’s May 2025 Patch Tuesday fixes 73 vulnerabilities, including 5 zero-days actively exploited in the wild and 6 critical flaws.

Microsoft’s May 2025 Patch Tuesday fixes 73 vulnerabilities, including 5 zero-days actively exploited in the wild and 6 critical flaws.

🚨 Microsoft’s May 2025 Patch Tuesday fixes 73 vulnerabilities, including 5 zero-days actively exploited in the wild and 6 critical flaws. windows101tricks.com/microsoft-pa...
💻 Windows users: update now to stay secure.
#CyberSecurity #PatchTuesday #Microsoft #ZeroDay #Windows11 #windows10 #technews

11 months ago 1 1 0 0
Advertisement
Preview
Détection vs Recherche de Compromissions : La discussion continue - NoLimitSecu Épisode #502 – Détection vs Recherche : La discussion continue (épisode #491) Avec Stéfan LE BERRE

#Podcast #Cybersécurité

Épisode #501 : détection vs. recherche de compromissions (suite de l'épisode #491), avec @heurs.bsky.social

www.nolimitsecu.fr/detection-vs...

11 months ago 5 7 0 0
Preview
Threat Analysis: SAP Vulnerability in the Wild by Chinese Threat Actor Forescout’s Vedere Labs research and threat hunting team analyzes SAP vulnerability (CVE-2025-31324) in the wild.

A Chinese threat actor that Forescout tracks as Chaya_004 is behind a recent SAP NetWeaver zero-day (CVE-2025-31324)

www.forescout.com/blog/threat-...

11 months ago 4 3 0 0
Preview
Conti Ransomware Gang Rank EDR Solutions Based on Ease of Evasion | CyberMaxx Conti ransomware gang recently published a list of EDR solutions based on how easy they are to bypass during active intrusions.

Ransomware group ranks EDR/Anti-Malware products. Microsoft in the LOL Tier is surprising. Seems like a great result for CrowdStrike customers.

11 months ago 8 5 0 0
Preview
Amazon, CrowdStrike, Google and Palo Alto Networks claim no change to threat intel sharing under Trump Top security leaders at some of the largest tech and cybersecurity vendors said public-private collaborative work continues, despite budget cuts and personnel changes.

Amazon, CrowdStrike, Google and Palo Alto Networks claim no change to threat intel sharing under Trump. Top security leaders at some of the largest tech and cybersecurity vendors said public-private collaborative work continues, despite budget cuts and personnel changes. via @mattkapko.com

11 months ago 5 5 0 1
Source

🇯🇵 Hitachi Vantara (hitachivantara.com) victime d'une cyberattaque autour du 26 avril 2025.
👉 https://www.ransomware.live/#/recentcyberattacks

11 months ago 1 1 0 0
Preview
Hitachi Vantara takes servers offline after Akira ransomware attack Hitachi Vantara, a subsidiary of Japanese multinational conglomerate Hitachi, was forced to take servers offline over the weekend to contain an Akira ransomware attack.

Takes a fairly big ransomware attack to break through all the noise…this definitely qualifies.

via @bleepingcomputer.com

11 months ago 3 3 1 0
Post image

Did you know that there is a monument to NotPetya in Moscow? It was installed by INVITRO, a Russian medical firm & one of the victims of the 2017 global attack initially aimed at Ukraine. INVITRO's PR goal was to remind the world that it knows how to fight viruses

11 months ago 16 13 1 1
Advertisement

Fortinet's security team has spotted a new Mirai-based IoT botnet in the wild.

They named this one RustoBot because it's coded in Rust.

So far, the botnet only targets TOTOLINK routers.

www.fortinet.com/blog/threat-...

11 months ago 12 3 2 0
Preview
Attacks against Teltonika Networks SMS Gateways - SANS Internet Storm Center Attacks against Teltonika Networks SMS Gateways, Author: Johannes Ullrich

Threat actors are hacking Teltonika SMS gateways in what appears to be massive SMS spam campaigns.

Attackers are targeting devices that still use their default login credentials of user1/user_pass.

isc.sans.edu/diary/rss/31...

11 months ago 22 8 2 1

Web browser Brave has open-sourced Cookiecrumbler, a tool to detect and block cookie consent banners

github.com/brave/cookie...

brave.com/privacy-upda...

11 months ago 15 3 0 0
Preview
CVE-2025-24054, NTLM Exploit in the Wild - Check Point Research Key Points Introduction NTLM (New Technology LAN Manager) is a suite of authentication protocols developed by Microsoft to verify user identities and protect the integrity and confidentiality of netwo...

Check Point published a write-up of CVE-2025-24054, an NTLM leak that Microsoft patched last month.

The company says the vulnerability is now being exploited in the wild, with one campaign targeting government and private institutions in Poland and Romania.

research.checkpoint.com/2025/cve-202...

1 year ago 7 8 1 1