FactualRisk Cyber Intelligence
Mise à jour : 6 Apr 2026 · 05:00
← Accueil
🛡 Dashboard💥 Attaques🔧 Patches🦠 Ransomware📡 Exploitation🌍 Géopolitique🕵️ Acteurs📰 News📈 Statistiques📋 Briefing
← Retour FactualRisk
Pays attaquants
5
Threat Actors connus
13
Acteurs observés
13
CVEs attribués
77
🌍 Pays d'origine identifiés
🇷🇺 RU26 CVE(s)
🌐 ??19 CVE(s)
🇨🇳 CN19 CVE(s)
🇰🇵 KP9 CVE(s)
🇮🇷 IR4 CVE(s)
🕵️ Threat Actors (base + observés)
🇷🇺 APT29observé11 CVE(s)
🇷🇺 APT28observé9 CVE(s)
🇰🇵 Lazarusobservé9 CVE(s)
🇨🇳 Volt Typhoonobservé9 CVE(s)
🌐 Cl0pobservé7 CVE(s)
🇨🇳 APT41observé6 CVE(s)
🇷🇺 Sandwormobservé6 CVE(s)
🌐 RansomHubobservé5 CVE(s)
🇨🇳 Salt Typhoonobservé4 CVE(s)
🇮🇷 MuddyWaterobservé4 CVE(s)
🌐 Akiraobservé3 CVE(s)
🌐 LockBitobservé2 CVE(s)
🌐 BlackCatobservé2 CVE(s)
CVEs avec attribution géopolitique
🕵️ RansomHub🌐 ??Score: 218
Apache ActiveMQ Deserialization of Untrusted Data Vulnerability
🕵️ Volt Typhoon🇨🇳 CNScore: 218
Fortinet Multiple Products Authentication Bypass Vulnerability
🕵️ Volt Typhoon🇨🇳 CNScore: 218
Ivanti Connect Secure and Policy Secure Command Injection Vulnerability
🕵️ Sandworm🇷🇺 RUScore: 218
HTTP/2 Rapid Reset Attack Vulnerability
🕵️ LockBit🌐 ??Score: 218
Atlassian Confluence Data Center and Server Improper Authorization Vulnerability
🕵️ Cl0p🌐 ??Score: 218
Fortra GoAnywhere MFT Remote Code Execution Vulnerability
🕵️ Volt Typhoon🇨🇳 CNScore: 218
Ivanti Connect Secure and Policy Secure Authentication Bypass Vulnerability
🕵️ APT29🇷🇺 RUScore: 218
Microsoft SharePoint Server Privilege Escalation Vulnerability
🕵️ Lazarus🇰🇵 KPScore: 218
Apache Log4j2 Remote Code Execution Vulnerability
🕵️ Akira🌐 ??Score: 218
Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability
🕵️ RansomHub🌐 ??Score: 218
Atlassian Confluence Data Center and Server Broken Access Control Vulnerability
🕵️ Sandworm🇷🇺 RUScore: 218
Progress Kemp LoadMaster OS Command Injection Vulnerability
🕵️ Cl0p🌐 ??Score: 218
Progress MOVEit Transfer SQL Injection Vulnerability
🕵️ APT28🇷🇺 RUScore: 218
RARLAB WinRAR Code Execution Vulnerability
🕵️ Lazarus🇰🇵 KPScore: 218
Microsoft Windows Internet Shortcut Files Security Feature Bypass Vulnerability
🕵️ RansomHub🌐 ??Score: 217
Citrix NetScaler ADC and NetScaler Gateway Code Injection Vulnerability
🕵️ APT29🇷🇺 RUScore: 217
Microsoft Outlook Improper Input Validation Vulnerability
🕵️ APT29🇷🇺 RUScore: 216
JetBrains TeamCity Authentication Bypass Vulnerability
🕵️ Volt Typhoon🇨🇳 CNScore: 213
Fortinet FortiOS and FortiProxy SSL-VPN Heap-Based Buffer Overflow Vulnerability
🕵️ Sandworm🇷🇺 RUScore: 205
Veeam Backup & Replication Cloud Connect Missing Authentication for Critical Function Vulnerability
🕵️ Lazarus🇰🇵 KPScore: 183
F5 BIG-IP Missing Authentication Vulnerability
🕵️ MuddyWater🇮🇷 IRScore: 183
WSO2 Multiple Products Unrestrictive Upload of File Vulnerability
🕵️ Lazarus🇰🇵 KPScore: 183
Zoho ManageEngine Multiple Products Remote Code Execution Vulnerability
🕵️ RansomHub🌐 ??Score: 183
Palo Alto Networks PAN-OS Command Injection Vulnerability
🕵️ APT41🇨🇳 CNScore: 183
Zoho ManageEngine ServiceDesk Plus Remote Code Execution Vulnerability
🕵️ Salt Typhoon🇨🇳 CNScore: 183
Cisco IOS XE Web UI Privilege Escalation Vulnerability
🕵️ Volt Typhoon🇨🇳 CNScore: 183
Fortinet FortiOS Heap-Based Buffer Overflow Vulnerability
🕵️ APT28🇷🇺 RUScore: 182
Microsoft Exchange Server Remote Code Execution Vulnerability
🕵️ APT28🇷🇺 RUScore: 182
Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability
🕵️ APT29🇷🇺 RUScore: 182
Microsoft Office Outlook Privilege Escalation Vulnerability
🎯 Attaques APT / espionnage (flux RSS)
Traffic violation scams switch to QR codes in new phishing texts
📅 05 April 2026📰 BleepingComputer
Scammers are sending fake "Notice of Default" traffic violation text messages impersonating state courts across the U.S., pressuring recipients to scan a QR code that leads to a phishing site demandin