Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-25 16:32:12 |
Targeted Malware Campaign Uses HWP Documents (lien direct) |
A recently observed targeted malware campaign against South Korean users was using Hangul Word Processor (HWP) documents as the infection vector, Talos researchers reveal.
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-24 19:21:09 |
MySQL Databases Targeted in New Ransom Attacks (lien direct) |
Thousands of MySQL databases are potential victims to a ransom attack that appears to be an evolution of the MongoDB ransack campaign observed a couple months ago, GuardiCore warns.
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-24 14:14:04 |
U.S. Oil and Gas Industry Lagging in Security: Report (lien direct) |
The oil and gas industry in the United States is largely unprepared to address cybersecurity risks in operational technology (OT) environments, according to a study commissioned by German engineering giant Siemens.
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-24 12:58:52 |
Briton Arrested Over Deutsche Telekom Hacking (lien direct) |
A British national has been arrested at a London airport on suspicion of staging a cyber attack on Deutsche Telekom last year that knocked around a million German households offline, officials in both countries said Thursday.
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-24 11:42:15 |
D-Link Patches Serious Flaws in DGS-1510 Switches (lien direct) |
D-Link has released firmware updates for the company's DGS-1510 stackable managed switches to address serious vulnerabilities that can be exploited remotely to hijack the devices.
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-24 09:51:35 |
CloudFlare Leaked Sensitive Customer Data (lien direct) |
CloudFlare has been working around the clock in the past few days to address a critical security problem that led to sensitive customer data getting leaked and cached by search engines.
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-24 02:05:04 |
New "Filecoder" macOS Ransomware Surfaces (lien direct) |
New Filecoder macOS Ransomware is Poorly Coded, Destructive
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-23 20:18:10 |
Poison Ivy RAT Campaign Leverages New Delivery Techniques (lien direct) |
A recently observed campaign using the Poison Ivy remote access tool (RAT) against individuals within the Mongolian government uses publicly available techniques that haven't been observed in previous campaigns, FireEye reports.
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-23 18:04:53 |
This What Hackers Think of Your Defenses (lien direct) |
Billions of dollars are spent every year on cyber security products; and yet those products continually fail to protect businesses. Thousands of reports analyze breaches and provide reams of data on what happened; but still the picture worsens. A new study takes a different approach; instead of trying to prevent hacking based on what hacking has achieved, it asks real hackers, how do you do it?
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-23 15:50:13 |
First SHA-1 Collision Attack Conducted by Google, CWI (lien direct) |
Researchers at Google and Centrum Wiskunde & Informatica (CWI) in the Netherlands have managed to conduct the first real world collision attack against SHA-1, creating two documents with different content but identical hashes.
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-23 15:46:08 |
These Were the Top Threats Targeting Healthcare Firms in Q4 2016 (lien direct) |
Healthcare is a consistent target for cybercriminals, with IBM's 2016 Cyber Security Intelligence Index claiming it had become the single most attacked industry. Today FortiGuard Labs has released details on the top 5 methods used to attack healthcare in Q4, 2016.
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-23 15:35:28 |
Noise-Canceling Headphones for Your Threat Intel Team (lien direct) |
With Transparency and Customized Scoring, You Cancel Out The Noise That's Distracting Your Threat Intelligence Team
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-23 14:46:15 |
Understanding and Combating the Evolving Attack Chain (lien direct) |
Adversaries continue to find new ways to operate, using varied techniques to accomplish their mission. And, unless you remain informed about these changes, it's hard to defend against these evolving threats.
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-23 13:32:09 |
Code Execution Flaw Affected Linux Kernel Since 2005 (lien direct) |
A researcher has discovered a serious locally exploitable vulnerability that appears to have been around in the Linux kernel for more than 11 years. The flaw has been addressed in the kernel and Linux distributions are working on releasing patches.
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-23 11:20:24 |
Hard Drive LED Allows Data Theft From Air-Gapped PCs (lien direct) |
Researchers at Ben-Gurion University of the Negev in Israel have disclosed yet another method that can be used to exfiltrate data from air-gapped computers, and this time it involves the activity LED of hard disk drives (HDDs).
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-23 09:08:29 |
Netflix Releases Open Source Security Tool "Stethoscope" (lien direct) |
Netflix this week released Stethoscope, an open source web application that gives users specific recommendations for securing their computers, smartphones and tablets.
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-23 04:32:28 |
Android Ransomware Demands Victims Speak Unlock Code (lien direct) |
A newly discovered Android ransomware variant that packs speech recognition capabilities demands that victims speak a code provided by the attackers to unlock their devices, Symantec warns.
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-22 17:15:09 |
Can the World Economic Forum\'s Cyber Security Principles Advance Cyber Resilience? (lien direct) |
A few weeks ago, the World Economic Forum (WEF) met in Davos, Switzerland where an expert working group issued a report “Advancing Cyber Resilience: Principles and Tools for Boards.†It is touted as a first-of-its-kind resource to support board of directors and CEOs on cyber security and cyber resilience strategy.
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-22 16:51:20 |
Yahoo Slashes Price of Verizon Deal $350 Million After Data Breaches (lien direct) |
NEW YORK - Yahoo slashed the price of the sale of its core Internet business to Verizon by $350 million following a pair of major data breaches at Yahoo, the two companies announced Tuesday.
|
|
Yahoo
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-22 16:12:40 |
Cisco Launches New Firepower Firewalls (lien direct) |
Cisco announced on Wednesday the launch of four new threat-focused Firepower next-generation firewalls (NGFWs) designed for banks, retailers and other businesses that conduct a high volume of sensitive transactions.
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-22 15:24:20 |
Firefox Users Fingerprinted via Cached Intermediate CA Certificates (lien direct) |
An attacker can discover various details about Firefox users due to the manner in which the browser caches intermediate CA certificates, a researcher has discovered.
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-22 15:04:53 |
Three Ways to Combat Shadow IT 2.0 (lien direct) |
While we can blame the cloud for shadow IT 2.0, SaaS isn't the culprit this time. New competitive disruptors to our businesses are armed with digital services, making digitalization a mandate for business survival. Digitalization, though, requires agility. Waiting six weeks for new server infrastructure doesn't work in today's competitive environment.
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-22 13:51:17 |
Microsoft Flaws Mitigated by Removing Admin Rights: Avecto (lien direct) |
Microsoft patched a total of 530 vulnerabilities in 2016 and many of them were mitigated by the removal of administrator rights, according to a report published this week by endpoint security firm Avecto.
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-22 11:10:59 |
Serious Breach Linked to Chinese APTs Comes to Light (lien direct) |
Several major organizations may have been affected by a breach suffered by an IT services and software provider. The attack, linked to threat actors believed to be located in China, took place in 2015, but it has only now come to light.
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-22 07:22:47 |
Microsoft Releases Security Update for Flash Player Libraries (lien direct) |
While most of this month's security updates have been postponed to March 14, Microsoft has decided to release one bulletin to address the Flash Player vulnerabilities fixed by Adobe on Patch Tuesday.
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-21 19:07:00 |
Mirai for Windows Built by Experienced Bot Herder: Kaspersky (lien direct) |
The Windows variant of the infamous Mirai Linux botnet is the offspring of a more experienced bot herder, possibly of Chinese origin, Kaspersky Lab security researchers warn.
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-21 17:20:10 |
Logic Bombs Pose Threat to ICS: Researchers (lien direct) |
Logic bombs can pose a significant threat to industrial control systems (ICS), particularly programmable logic controllers (PLCs), researchers warned in a paper published last week.
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-21 16:16:25 |
The Evolution of Ransomware: Part 2 (lien direct) |
For most, ransomware attacks are the byproduct of uninformed users opening malicious attachments sent by devious and anonymous criminals.
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-21 15:54:48 |
CompTIA Offers New Security Analyst Certification (lien direct) |
An ISACA survey released during RSA week sought to illustrate the state of cyber security workforce development and its current trends. The results would surprise no-one in the industry: recruiting security talent is hard.
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-21 15:36:58 |
TeamSpy Malware Spotted in New Campaign (lien direct) |
TeamSpy, the data-stealing malware that was associated with a decade-long cyber-espionage operation several years ago, has resurfaced in a new attack campaign, Heimdal Security researchers warn.
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-21 12:39:17 |
Unpatched Flaws in Python, Java Allow Firewall Bypass (lien direct) |
Unpatched vulnerabilities related to how Java and Python handle file transfer protocol (FTP) URLs can be exploited for various purposes, including for sending unauthorized emails and bypassing firewalls, researchers warned.
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-21 09:57:19 |
Severe Vulnerability Patched in Siklu Radios (lien direct) |
Researcher Ian Ling has discovered a serious remote command execution (RCE) vulnerability in Siklu's EtherHaul wireless point-to-point radios. Updates that patch the flaw have been released for a majority of the affected products.
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-20 18:36:15 |
Trojan Downloader Masquerades as Defunct Flash Player for Android (lien direct) |
A recently observed malware downloader targeting Android users is masquerading as an update for Adobe Flash Player, ESET researchers warn.
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-20 18:31:49 |
Russian Words Used as Decoy in Lazarus-Linked Bank Attacks (lien direct) |
A group of hackers that has been targeting financial organizations around the world has unsuccessfully attempted to trick researchers into attributing their operation to Russian-speaking attackers.
|
|
APT 38
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-20 17:57:47 |
Android RAT Targeting Israeli Soldiers Part of Larger Campaign (lien direct) |
An Android Remote Access Trojan (RAT) recently revealed to be targeting Israeli servicemen is part of a larger campaign that might not be associated with Hamas, as initially believed, security researchers have determined.
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-20 17:43:15 |
Google Discloses Unpatched Windows GDI Vulnerability (lien direct) |
An unpatched vulnerability affecting the Windows Graphics Device Interface (Windows GDI) was publicly disclosed last week after Microsoft failed to address it within 90 days after being notified.
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-20 15:36:05 |
Former Sysadmin Sentenced to Prison for Hacking Industrial Facility (lien direct) |
A man has been sentenced to 34 months in prison and three years of supervised release for hacking into the systems of pulp and paper company Georgia-Pacific, the Department of Justice announced on Friday.
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-20 13:41:10 |
Bug Allowed Theft of Over $400,000 in Zcoins (lien direct) |
An implementation bug has allowed someone to make a profit of more than $400,000 after creating roughly 370,000 units of the Zcoin cryptocurrency, users were told on Friday.
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-20 09:28:12 |
Ukrainian Cybercriminal Sentenced to Prison in U.S. (lien direct) |
Hacker Who Tried to Get Revenge on Brian Krebs for Exposing Him Sentenced to Prison
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-17 20:33:48 |
Germany Bans Internet-connected \'Spy\' Doll Cayla (lien direct) |
German regulators have banned an internet-connected doll called "My Friend Cayla" that can chat with children, warning Friday that it was a de facto "spying device".
Parents were urged to disable the interactive toy by the Federal Network Agency which enforces bans on surveillance devices.
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-17 19:24:18 |
Self-Healing Malware Hits Magento Stores (lien direct) |
A newly discovered piece of malware targeting Magento stores has a self-healing routine to restore itself after deletion, security researchers have discovered.
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-17 17:39:28 |
Google Shares Data on Corporate Email Attacks (lien direct) |
A corporate email account is much more likely to receive malware, phishing and spam emails than a personal inbox, according to an analysis conducted by Google.
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-17 16:52:09 |
Ursnif Banking Trojan\'s Distribution Networks Exposed (lien direct) |
Security researchers from Palo Alto Networks have managed to identify distribution networks used by the Ursnif banking Trojan to target various users worldwide.
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-17 16:36:19 |
App-in-the-Middle Attacks Bypass Android Sandbox: Skycure (lien direct) |
The Android sandbox environment previously known as Android for Work is susceptible to "app-in-the-middle attacks" that put enterprise data at risk, Skycure security researchers say.
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-17 15:44:13 |
Moving Beyond "Moving Left": The Case for Developer Enablement (lien direct) |
For far too long software security has been comprised of a curious bifurcation of roles. Developers develop and IT security testers test for security issues. Fortunately, a confluence of circumstances has forced a recalibration of the developer's role in software security. In fact, I think we are about to see a new wave of what I call developer enablement.
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-17 15:42:04 |
China-Linked Group Uses New Malware in Japan Attacks (lien direct) |
A China-linked threat actor has been using a new Trojan in attacks aimed at individuals and organizations located in or with ties to Japan, Palo Alto Networks reported on Thursday.
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-17 15:30:35 |
Microsoft Calls for Cyber Geneva Convention (lien direct) |
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-17 13:29:38 |
Insecure Android Apps Expose Connected Cars (lien direct) |
Researchers at Kaspersky Lab have analyzed several Android applications for connected cars and determined that most of them lack important security features, making it easier for hackers to unlock the vehicles.
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-17 09:56:09 |
Many Ukrainian Organizations Targeted in Reconnaissance Operation (lien direct) |
CyberX, a company that specializes in ICS security, has been monitoring a well-organized campaign that has targeted at least 70 entities with ties to Ukraine, including the country's critical infrastructure.
|
|
|
|
![SecurityWeek.webp](./Ressources/img/SecurityWeek.webp) |
2017-02-16 15:21:31 |
Apple Patches Code Execution Flaw in GarageBand (lien direct) |
An update released this week by Apple for the music creation app GarageBand addresses a high severity vulnerability that can be exploited for arbitrary code execution.
|
|
|
|