X

Vous n'êtes pas connecté

Maroc Maroc - BLEEPINGCOMPUTER.COM - A La Une - Hier 14:00

New Amaranth Dragon cyberespionage group exploits WinRAR flaw

A new threat actor called Amaranth Dragon, linked to APT41 state-sponsored Chinese operations, exploited the CVE-2025-8088 vulnerability in WinRAR in espionage attacks on government and law enforcement agencies. [...]

Articles similaires

Sorry! Image not available at this time

New Amaranth Dragon cyberespionage group exploits WinRAR flaw

bleepingcomputer.com - 14:00

A new threat actor called Amaranth Dragon, linked to APT41 state-sponsored Chinese operations, exploited the CVE-2025-8088 vulnerability in WinRAR...

Sorry! Image not available at this time

WinRAR path traversal flaw still exploited by numerous hackers

bleepingcomputer.com - 27/Jan 19:38

Multiple threat actors, both state-sponsored and financially motivated, are exploiting the CVE-2025-8088 high-severity vulnerability in WinRAR for...

Sorry! Image not available at this time

WinRAR path traversal flaw still exploited by numerous hackers

bleepingcomputer.com - 27/Jan 19:38

Multiple threat actors, both state-sponsored and financially motivated, are exploiting the CVE-2025-8088 high-severity vulnerability in WinRAR for...

Sorry! Image not available at this time

Nation-state and criminal actors leverage WinRAR flaw in attacks

securityaffairs.co - 29/Jan 10:53

Multiple threat actors exploited a now-patched critical WinRAR flaw to gain initial access and deliver various malicious payloads. Google Threat...

Sorry! Image not available at this time

APTs, Cybercriminals Widely Exploiting WinRAR Vulnerability

itsecuritynews.info - 28/Jan 09:32

Russian and Chinese state-sponsored threat actors have been exploiting CVE-2025-8088 since July 2025. The post APTs, Cybercriminals Widely Exploiting...

Sorry! Image not available at this time

Op Neusploit: Russian APT28 Uses Microsoft Office Flaw in Malware Attacks

itsecuritynews.info - 03/Feb 18:16

A new campaign by the Russian-linked group APT28, called Op Neusploit, exploits a Microsoft Office flaw to steal emails for remote control of devices...

Sorry! Image not available at this time

APT28 exploits Microsoft Office flaw in Operation Neusploit

securityaffairs.co - 03/Feb 12:13

Russia-linked APT28 is behind Operation Neusploit, exploiting a newly disclosed Microsoft Office vulnerability in targeted attacks. Russia-linked...

Sorry! Image not available at this time

CISA flags critical SolarWinds RCE flaw as exploited in attacks

bleepingcomputer.com - 03/Feb 19:37

CISA has flagged a critical SolarWinds Web Help Desk vulnerability as actively exploited in attacks and ordered federal agencies to patch their...

Sorry! Image not available at this time

CISA warns of five-year-old GitLab flaw exploited in attacks

bleepingcomputer.com - 15:42

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) ordered government agencies to patch their systems against a five-year-old GitLab...

Sorry! Image not available at this time

CISA warns of five-year-old GitLab flaw exploited in attacks

bleepingcomputer.com - 15:42

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) ordered government agencies to patch their systems against a five-year-old GitLab...