FactualRisk Cyber Intelligence
← Accueil
Pays attaquants
5
Threat Actors connus
13
Acteurs observés
13
CVEs attribués
77
🌍 Pays d'origine identifiés
🇷🇺 RU26 CVE(s)
🌐 ??19 CVE(s)
🇨🇳 CN19 CVE(s)
🇰🇵 KP9 CVE(s)
🇮🇷 IR4 CVE(s)
🕵️ Threat Actors (base + observés)
🇷🇺 APT29observé11 CVE(s)
🇷🇺 APT28observé9 CVE(s)
🇰🇵 Lazarusobservé9 CVE(s)
🇨🇳 Volt Typhoonobservé9 CVE(s)
🌐 Cl0pobservé7 CVE(s)
🇨🇳 APT41observé6 CVE(s)
🇷🇺 Sandwormobservé6 CVE(s)
🌐 RansomHubobservé5 CVE(s)
🇨🇳 Salt Typhoonobservé4 CVE(s)
🇮🇷 MuddyWaterobservé4 CVE(s)
🌐 Akiraobservé3 CVE(s)
🌐 LockBitobservé2 CVE(s)
🌐 BlackCatobservé2 CVE(s)
CVEs avec attribution géopolitique
🕵️ APT29🇷🇺 RUScore: 218
Citrix ADC, Gateway, and SD-WAN WANOP Appliance Code Execution Vulnerability
🕵️ RansomHub🌐 ??Score: 218
Apache ActiveMQ Deserialization of Untrusted Data Vulnerability
🕵️ Volt Typhoon🇨🇳 CNScore: 218
Fortinet Multiple Products Authentication Bypass Vulnerability
🕵️ Volt Typhoon🇨🇳 CNScore: 218
Ivanti Connect Secure and Policy Secure Command Injection Vulnerability
🕵️ Sandworm🇷🇺 RUScore: 218
HTTP/2 Rapid Reset Attack Vulnerability
🕵️ LockBit🌐 ??Score: 218
Atlassian Confluence Data Center and Server Improper Authorization Vulnerability
🕵️ Cl0p🌐 ??Score: 218
Fortra GoAnywhere MFT Remote Code Execution Vulnerability
🕵️ Volt Typhoon🇨🇳 CNScore: 218
Ivanti Connect Secure and Policy Secure Authentication Bypass Vulnerability
🕵️ APT29🇷🇺 RUScore: 218
Microsoft SharePoint Server Privilege Escalation Vulnerability
🕵️ Lazarus🇰🇵 KPScore: 218
Apache Log4j2 Remote Code Execution Vulnerability
🕵️ Akira🌐 ??Score: 218
Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability
🕵️ RansomHub🌐 ??Score: 218
Atlassian Confluence Data Center and Server Broken Access Control Vulnerability
🕵️ Sandworm🇷🇺 RUScore: 218
Progress Kemp LoadMaster OS Command Injection Vulnerability
🕵️ Cl0p🌐 ??Score: 218
Progress MOVEit Transfer SQL Injection Vulnerability
🕵️ APT28🇷🇺 RUScore: 218
Microsoft Windows Print Spooler Remote Code Execution Vulnerability
🕵️ MuddyWater🇮🇷 IRScore: 218
Microsoft Exchange Server Remote Code Execution Vulnerability
🕵️ MuddyWater🇮🇷 IRScore: 218
Microsoft Exchange Server Privilege Escalation Vulnerability
🕵️ BlackCat🌐 ??Score: 218
Microsoft Exchange Server Security Feature Bypass Vulnerability
🕵️ Lazarus🇰🇵 KPScore: 218
Microsoft Windows Internet Shortcut Files Security Feature Bypass Vulnerability
🕵️ APT28🇷🇺 RUScore: 218
RARLAB WinRAR Code Execution Vulnerability
🕵️ RansomHub🌐 ??Score: 217
Citrix NetScaler ADC and NetScaler Gateway Code Injection Vulnerability
🕵️ APT29🇷🇺 RUScore: 217
Microsoft Outlook Improper Input Validation Vulnerability
🕵️ APT29🇷🇺 RUScore: 216
JetBrains TeamCity Authentication Bypass Vulnerability
🕵️ Volt Typhoon🇨🇳 CNScore: 213
Fortinet FortiOS and FortiProxy SSL-VPN Heap-Based Buffer Overflow Vulnerability
🕵️ Sandworm🇷🇺 RUScore: 206
Veeam Backup & Replication Cloud Connect Missing Authentication for Critical Function Vulnerability
🕵️ LockBit🌐 ??Score: 183
F5 BIG-IP and BIG-IQ Centralized Management iControl REST Remote Code Execution Vulnerability
🕵️ APT41🇨🇳 CNScore: 183
Atlassian Confluence Server and Data Center Server-Side Template Injection Vulnerability
🕵️ Volt Typhoon🇨🇳 CNScore: 183
GitLab Community and Enterprise Editions Remote Code Execution Vulnerability
🕵️ Lazarus🇰🇵 KPScore: 183
F5 BIG-IP Missing Authentication Vulnerability
🕵️ Lazarus🇰🇵 KPScore: 183
VMware vCenter Server File Upload Vulnerability
🎯 Attaques APT / espionnage (flux RSS)
Apple Rolls Out DarkSword Exploit Protection to More Devices
📅 02 April 2026📰 SecurityWeek
The DarkSword exploit kit has been used by both state-sponsored hackers and commercial spyware vendors. The post Apple Rolls Out DarkSword Exploit Protection to More Devices appeared first on Sec