📱 VulnCheck 2026: 1% des CVE 2025 exploitĂ©es, React2Shell et la chaĂźne SharePoint « ToolShell » en tĂȘte
📝 Source: VulnCheck — Exploit Intelligence Report 2026.
📖 cyberveille : https://cyberveille.ch/posts/2026-03-09-vulncheck-2026-1-des-cve-2025-exploitees-react2shell-et-la-chaine-sharepoint-toolshell-en-tete/
🌐 source : https://wwv.vulncheck.com/hubfs/Research/2026-VulnCheck-Exploit-Intelligence-Report.pdf
#Botnets #Microsoft_SharePoint #Cyberveille
VulnCheck 2026: 1% des CVE 2025 exploitĂ©es, React2Shell et la chaĂźne SharePoint « ToolShell » en tĂȘte

Source: VulnCheck — Exploit Intelligence Report 2026. Ce rapport rĂ©trospectif et chiffrĂ© dresse le panorama de l’exploitation des vulnĂ©rabilitĂ©s en 2025 (500+ sources, 2 douzaines d’indices VulnCheck), en priorisant l’exploitation in‑the‑wild, la maturitĂ© des exploits et le comportement des attaquants. Chiffres clĂ©s et tendances 48 174 CVE publiĂ©es en 2025 (83% avec identifiant 2025) ; ~1% exploitĂ©es in‑the‑wild Ă  fin 2025. 14 400+ exploits pour des CVE 2025 (+16,5% YoY), mais >98% restent des PoC non weaponized ; 417 exploits weaponized (majoritairement privĂ©s/commerciaux). 884 vulnĂ©rabilitĂ©s ajoutĂ©es au VulnCheck KEV en 2025 (47,7% avec identifiant 2025) ; 28,96% exploitĂ©es le jour de la publication CVE ou avant. Ransomware: 39 CVE 2025 attribuĂ©es, 56,4% dĂ©couvertes via exploitation zero‑day ; 1/3 sans exploit public/commercial au 01/2026. MontĂ©e du bruit IA: prolifĂ©ration de faux/faux‑positifs PoC gĂ©nĂ©rĂ©s par IA, contaminant l’écosystĂšme (ex: premiers PoC React2Shell non fonctionnels largement relayĂ©s). VulnĂ©rabilitĂ©s phares 2025

CyberVeille
14,000 routers are infected by malware that's highly resistant to takedowns https://arstechni.ca/hwAw #distributedhashtables #Security #botnets #malware #routers #Biz&IT #Tech #ASUS
14,000 routers are infected by malware that's highly resistant to takedowns

Most of the devices are made by Asus and are located in the US.

Ars Technica
Botnet for profit: Jeanson James Ancheta - Negative PID

Early hackers were fuelled by curiosity and defiance of authority. Jeanson James Ancheta changed that forever.

Negative PID

Poland’s Central Bureau for Combating Cybercrime (CBZC) has announced the arrest of a 20-year-old suspect linked to global DDoS activity.

Authorities state that the attacks leveraged C2 stressers and CNC nodes within a multi-layered botnet architecture. Equipment used to host and distribute the DDoS tooling was seized during a search, effectively dismantling the setup.

From a defensive standpoint, this case highlights how botnet infrastructure is assembled - and how law enforcement intervenes once attribution is established.

What defensive signals best indicate stresser-based DDoS activity at scale?

Source: https://www.helpnetsecurity.com/2026/02/05/ddos-poland-suspect-arrested/

Join the discussion and follow @technadu for grounded infosec reporting.

#Infosec #DDoSDefense #Botnets #IncidentResponse #CyberOperations #TechNadu #ThreatAnalysis

Rustdesk durch Botnet-Angriffe immer wieder offline (Feb. 2026)

Kurze Information fĂŒr Blog-Leser die die Remote Desktop-Lösung Rustdesk einsetzen. Ein Blog-Leser hat mich darĂŒber informiert (danke), dass deren Server „momentan“ offline seien. Aussage war: „das


Borns IT- und Windows-Blog

Instead, threats are shifting to weaker networks and resilient rogue hosting providers, while botnet controller domains continue to rise đŸŒâŹ†ïž.

Read the full Botnet Spotlight here 👉 https://www.spamhaus.org/resource-hub/botnet-c-c/botnet-spotlight-pressure-rises-on-botnets-but-the-fight-is-far-from-over/

#Botnets #Malware #BulletproofHosts

2/2

Resources | Spotlight Botnet Threat Update July - December 2025

Learn more about the fight against botnet in the latest edition of the Botnet Spotlight.

The Spamhaus Project
Votre #box alimente peut-ĂȘtre Ă  un #botnet, et cet outil gratuit permet de le verifier. On rĂ©pĂšte depuis des mois qu’il faut mettre Ă  jour ses box, #routeurs et objets connectĂ©s pour Ă©viter les #botnets, sans toujours expliquer comment vĂ©rifier si l’on hĂ©berge dĂ©jĂ  un #bot. GreyNoise tente d’apporter une rĂ©ponse avec #IPCheck, un outil en ligne gratuit.
https://www.clubic.com/actualite-594979-votre-box-alimente-peut-etre-a-un-botnet-et-cet-outil-gratuit-permet-de-le-verifier.html
Votre box alimente peut-ĂȘtre Ă  un botnet, et cet outil gratuit permet de le vĂ©rifier

On rĂ©pĂšte depuis des mois qu’il faut mettre Ă  jour ses box, routeurs et objets connectĂ©s pour Ă©viter les botnets, sans toujours expliquer comment vĂ©rifier si l’on hĂ©berge dĂ©jĂ  un bot. GreyNoise tente d’apporter une rĂ©ponse avec IP Check, un outil en ligne gratuit.

clubic.com
Who Benefited from the Aisuru and Kimwolf Botnets? – Krebs on Security

Lifehacker: This Tool Can Tell You If Your Home Network Has Been Compromised. “IP Check, from threat monitoring firm GreyNoise, will alert you if your IP address has been observed scanning the internet as part of a botnet or residential proxy network.”

https://rbfirehose.com/2025/12/20/lifehacker-this-tool-can-tell-you-if-your-home-network-has-been-compromised/
Lifehacker: This Tool Can Tell You If Your Home Network Has Been Compromised | ResearchBuzz: Firehose

ResearchBuzz: Firehose | Individual posts from ResearchBuzz

GreyNoise launches a free scanner to check if you’re part of a botnet

“GreyNoise Labs has launched a free tool called GreyNoise IP Check that lets users check if their IP address has been observed in malicious scanning operations, like botnet and residential proxy networks. The threat monitoring firm that tracks inter ...continues

See https://gadgeteer.co.za/greynoise-launches-a-free-scanner-to-check-if-youre-part-of-a-botnet/

#botnets #privacy #technology

GreyNoise launches a free scanner to check if you're part of a botnet

“GreyNoise Labs has launched a free tool called GreyNoise IP Check that lets users check if their IP address has been observed in malicious scanning

GadgeteerZA