Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
![RecordedFuture.webp](./Ressources/img/RecordedFuture.webp) |
2024-07-02 19:21:00 |
Supreme Court to take up Texas law requiring adults verify age to watch porn (lien direct) |
Pas de details / No more details |
|
|
|
![Google.webp](./Ressources/img/Google.webp) |
2024-07-02 19:18:32 |
GCP-2024-026 (lien direct) |
Published: 2024-05-07Updated: 2024-05-09Description
Description
Severity
Notes
2024-05-09 Update: Corrected severity from Medium to High. The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes:CVE-2024-26643 For instructions and more details, see the following bulletins: GKE security bulletin
GKE on VMware security bulletin
GKE on AWS security bulletin
GKE on Azure security bulletin
GKE on Bare Metal security bulletin
High
CVE-2024-26643
|
|
|
|
![Google.webp](./Ressources/img/Google.webp) |
2024-07-02 19:18:32 |
GCP-2024-029 (lien direct) |
Published: 2024-05-14Description
Description
Severity
Notes
The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes:CVE-2024-26642 For instructions and more details, see the following bulletins: GKE security bulletin
GKE on VMware security bulletin
GKE on AWS security bulletin
GKE on Azure security bulletin
GKE on Bare Metal security bulletin
High
CVE-2024-26642
|
|
|
|
![Google.webp](./Ressources/img/Google.webp) |
2024-07-02 19:18:32 |
GCP-2024-030 (lien direct) |
Published: 2024-05-15Description
Description
Severity
Notes
The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes:CVE-2023-52620 For instructions and more details, see the following bulletins: GKE security bulletin
GKE on VMware security bulletin
GKE on AWS security bulletin
GKE on Azure security bulletin
GKE on Bare Metal security bulletin
High
CVE-2023-52620
|
|
|
|
![Google.webp](./Ressources/img/Google.webp) |
2024-07-02 19:18:32 |
GCP-2024-038 (lien direct) |
Published: 2024-06-26Description
Description
Severity
Notes
The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes:CVE-2024-26924 For instructions and more details, see the following bulletins: GKE security bulletin
GDC software for VMware security bulletin
GKE on AWS security bulletin
GKE on Azure security bulletin
GDC software for bare metal security bulletin
High
CVE-2024-26924
|
|
|
|
![Google.webp](./Ressources/img/Google.webp) |
2024-07-02 19:18:32 |
GCP-2024-017 (lien direct) |
Published: 2024-03-06Description
Description
Severity
Notes
The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes:CVE-2023-3611 For instructions and more details, see the following bulletins: GKE security bulletin
GKE on VMware security bulletin
GKE on AWS security bulletin
GKE on Azure security bulletin
GKE on Bare Metal security bulletin
High
CVE-2023-3611
|
|
|
|
![Google.webp](./Ressources/img/Google.webp) |
2024-07-02 19:18:32 |
GCP-2024-018 (lien direct) |
Published: 2024-03-12Updated: 2024-04-04, 2024-05-06Description
Description
Severity
Notes
2024-05-06 Update: Added patch versions for GKE Ubuntu node pools. 2024-04-04 Update: Corrected minimum versions for GKE Container-Optimized OS node pools. The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes:CVE-2024-1085 For instructions and more details, see the following bulletins: GKE security bulletin
GKE on VMware security bulletin
GKE on AWS security bulletin
GKE on Azure security bulletin
GKE on Bare Metal security bulletin
High
CVE-2024-1085
|
|
|
|
![Google.webp](./Ressources/img/Google.webp) |
2024-07-02 19:18:32 |
GCP-2024-014 (lien direct) |
Published: 2024-02-26Description
Description
Severity
Notes
The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes:CVE-2023-3776 For instructions and more details, see the following bulletins: GKE security bulletin
GKE on VMware security bulletin
GKE on AWS security bulletin
GKE on Azure security bulletin
GKE on Bare Metal security bulletin
High
CVE-2023-3776
|
|
|
|
![Google.webp](./Ressources/img/Google.webp) |
2024-07-02 19:18:32 |
GCP-2024-012 (lien direct) |
Published: 2024-02-20Description
Description
Severity
Notes
The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes:CVE-2024-0193 For instructions and more details, see the following bulletins: GKE security bulletin
GKE on VMware security bulletin
GKE on AWS security bulletin
GKE on Azure security bulletin
GKE on Bare Metal security bulletin
High
CVE-2024-0193
|
|
|
|
![Google.webp](./Ressources/img/Google.webp) |
2024-07-02 19:18:32 |
GCP-2024-034 (lien direct) |
Published: 2024-06-11Description
Description
Severity
Notes
The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS nodes:CVE-2024-26583 For instructions and more details, see the following bulletins: GKE security bulletin
GKE on VMware security bulletin
GKE on AWS security bulletin
GKE on Azure security bulletin
GKE on Bare Metal security bulletin
High
CVE-2024-26583
|
|
|
|
![Google.webp](./Ressources/img/Google.webp) |
2024-07-02 19:18:32 |
GCP-2024-024 (lien direct) |
Published: 2024-04-25Description
Description
Severity
Notes
The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes:CVE-2024-26585 For instructions and more details, see the following bulletins: GKE security bulletin
GKE on VMware security bulletin
GKE on AWS security bulletin
GKE on Azure security bulletin
GKE on Bare Metal security bulletin
High
CVE-2024-26585
|
|
|
|
![Google.webp](./Ressources/img/Google.webp) |
2024-07-02 19:18:32 |
GCP-2024-013 (lien direct) |
Published: 2024-02-27Description
Description
Severity
Notes
The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes:CVE-2023-3610 For instructions and more details, see the following bulletins: GKE security bulletin
GKE on VMware security bulletin
GKE on AWS security bulletin
GKE on Azure security bulletin
GKE on Bare Metal security bulletin
High
CVE-2023-3610
|
|
|
|
![Google.webp](./Ressources/img/Google.webp) |
2024-07-02 19:18:32 |
GCP-2024-035 (lien direct) |
Published: 2024-06-12Description
Description
Severity
Notes
The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes:CVE-2024-26584 For instructions and more details, see the following bulletins: GKE security bulletin
GKE on VMware security bulletin
GKE on AWS security bulletin
GKE on Azure security bulletin
GKE on Bare Metal security bulletin
High
CVE-2024-26584
|
|
|
|
![Google.webp](./Ressources/img/Google.webp) |
2024-07-02 19:18:32 |
GCP-2024-033 (lien direct) |
Published: 2024-06-10Description
Description
Severity
Notes
The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS nodes:CVE-2022-23222 For instructions and more details, see the following bulletins: GKE security bulletin
GKE on VMware security bulletin
GKE on AWS security bulletin
GKE on Azure security bulletin
GKE on Bare Metal security bulletin
High
CVE-2022-23222
|
|
|
|
![Google.webp](./Ressources/img/Google.webp) |
2024-07-02 19:18:32 |
GCP-2024-036 (lien direct) |
Published: 2024-06-18Description
Description
Severity
Notes
The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS nodes:CVE-2024-26584 For instructions and more details, see the following bulletins: GKE security bulletin
GKE on VMware security bulletin
GKE on AWS security bulletin
GKE on Azure security bulletin
GKE on Bare Metal security bulletin
High
CVE-2024-26584
|
|
|
|
![Google.webp](./Ressources/img/Google.webp) |
2024-07-02 19:18:32 |
GCP-2024-011 (lien direct) |
Published: 2024-02-15Description
Description
Severity
Notes
The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes:CVE-2023-6932 For instructions and more details, see the following bulletins: GKE security bulletin
GKE on VMware security bulletin
GKE on AWS security bulletin
GKE on Azure security bulletin
GKE on Bare Metal security bulletin
High
CVE-2023-6932
|
|
|
|
![Google.webp](./Ressources/img/Google.webp) |
2024-07-02 19:18:32 |
GCP-2024-027 (lien direct) |
Published: 2024-05-08Updated: 2024-05-09, 2024-05-15Description
Description
Severity
Notes
2024-05-15 Update: Added patch versions for GKE Ubuntu node pools. 2024-05-09 Update: Corrected severity from Medium to High and clarified that GKE Autopilot clusters in the default configuration are not impacted. The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes:CVE-2024-26808 For instructions and more details, see the following bulletins: GKE security bulletin
GKE on VMware security bulletin
GKE on AWS security bulletin
GKE on Azure security bulletin
GKE on Bare Metal security bulletin
High
CVE-2024-26808
|
|
|
|
![Google.webp](./Ressources/img/Google.webp) |
2024-07-02 19:18:32 |
GCP-2024-028 (lien direct) |
Published: 2024-05-13Updated: 2024-05-22Description
Description
Severity
Notes
2024-05-22 Update: Added patch versions for Ubuntu The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes:CVE-2024-26581 For instructions and more details, see the following bulletins: GKE security bulletin
GKE on VMware security bulletin
GKE on AWS security bulletin
GKE on Azure security bulletin
GKE on Bare Metal security bulletin
High
CVE-2024-26581
|
|
|
|
![Google.webp](./Ressources/img/Google.webp) |
2024-07-02 19:18:32 |
GCP-2024-010 (lien direct) |
Published: 2024-02-14Updated: 2024-04-17Description
Description
Severity
Notes
2024-04-17 Update: Added patch versions for GKE on VMware. The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes.CVE-2023-6931 For instructions and more details, see the following bulletins: GKE security bulletin
GKE on VMware security bulletin
GKE on AWS security bulletin
GKE on Azure security bulletin
GKE on Bare Metal security bulletin
High
CVE-2023-6931
|
|
|
|
![Google.webp](./Ressources/img/Google.webp) |
2024-07-02 19:18:32 |
GCP-2024-039 (lien direct) |
Published: 2024-06-28Description
Description
Severity
Notes
The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes:CVE-2024-26923 For instructions and more details, see the following bulletins: GKE security bulletin
GDC software for VMware security bulletin
GKE on AWS security bulletin
GKE on Azure security bulletin
GDC software for bare metal security bulletin
High
CVE-2024-26923
|
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2024-07-02 18:42:49 |
Le bug de serveur de licences PTC a besoin de correctifs immédiats contre une faille critique PTC License Server Bug Needs Immediate Patch Against Critical Flaw (lien direct) |
Les serveurs CREO Elements / Direct License, qui permettent des logiciels de conception et de modélisation industriels, sont exposés à Internet, laissant une infrastructure critique vulnérable à l'exécution du code distant.
Creo Elements/Direct License Servers, which enable industrial design and modeling software, are exposed to the Internet, leaving critical infrastructure vulnerable to remote code execution. |
Industrial
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2024-07-02 18:12:41 |
Les chiffres de la cyber-travail augmentent pour les grandes organisations Cyber Workforce Numbers Rise for Larger Organizations (lien direct) |
Certaines organisations atteignent également des niveaux record de cyber-maturité, à 80% à 90%.
Some organizations are also reaching record-high levels of cyber maturity, at 80% to 90%. |
|
|
|
![knowbe4.webp](./Ressources/img/knowbe4.webp) |
2024-07-02 17:55:47 |
Épidémie de sextorsion ciblant les adolescents appelle à une action urgente Sextortion Epidemic Targeting Teenagers Calls for Urgent Action (lien direct) |
A few weeks ago I was privileged to visit the 8th grade of a high-school here in Cape Town and talk to the students about cybersecurity, social media, and emerging technology.
|
|
|
★★
|
![knowbe4.webp](./Ressources/img/knowbe4.webp) |
2024-07-02 17:55:38 |
Attaque des ransomwares contre le laboratoire des services de santé au Royaume-Uni perturbe les principaux services hospitaliers de Londres Ransomware Attack on U.K. Health Service Laboratory Disrupts Major London Hospital Services (lien direct) |
|
Ransomware
|
|
★★
|
![RiskIQ.webp](./Ressources/img/RiskIQ.webp) |
2024-07-02 17:47:06 |
L'acteur de menace nord-coréenne Kimsuky déploie une extension chromée malveillante pour l'espionnage académique North Korean Threat Actor Kimsuky Deploys Malicious Chrome Extension for Academic Espionage (lien direct) |
#### Géolocations ciblées
- Corée
#### Industries ciblées
- Éducation
## Instantané
Zscaler ManneyLabz a identifié de nouvelles activités par le groupe nord-coréen avancé de menace persistante (APT) Kimsuky, suivi par Microsof 9F41DD58E), ciblant le monde universitaire sud-coréen.
## Description
Connu pour son cyber-espionnage et ses attaques financières, Kimsuky cible principalement les organisations sud-coréennes, telles que les groupes de réflexion, les organismes gouvernementaux et le monde universitaire.Ils utilisent diverses tactiques, y compris les extensions malveillantes de Google Chrome, pour mener leurs opérations.
En juillet 2022, [Kimsuky a utilisé des extensions de chrome nocives] (https://www.volexity.com/blog/2022/07/28/sharptongue-deploys-clever-mail-staling-browser-extension-sharpext/) pour cibler les utilisateurs des utilisateurs pour cibler les utilisateursAux États-Unis, en Europe et en Corée du Sud.Récemment, ils ont introduit une nouvelle extension appelée "Translatext", conçue pour voler des informations sensibles comme les adresses e-mail, les noms d'utilisateur, les mots de passe, les cookies et les captures d'écran de navigateur.
Translatext a été téléchargé dans un référentiel Github contrôlé par l'attaquant le 7 mars 2024 et est capable de contourner les mesures de sécurité des principaux fournisseurs de messagerie comme Gmail et Kakao et Naver de la Corée du Sud.Les principaux objectifs étaient les universitaires sud-coréens impliqués dans la recherche politique sur les affaires nord-coréennes.
KimSuky Distributed Translatext via un fichier d'archive nommé«Revue de l'examen des arguments militaires coréens (1) .zip, qui traduit to "Revue d'une monographie sur l'histoire militaire coréenne", contenant des documents HWP leurres et un exécutable de Windows déguisé.Lorsqu'il est exécuté, le logiciel malveillant récupère un script PowerShell du serveur de l'acteur de menace, qui rassemble des informations sur la victime et crée des raccourcis pour récupérer plus de scripts.
Au cours de leur enquête, ThreatLabz a découvert un autre script PowerShell lié à un compte GitHub associé à l'acteur, montrant les données des victimes et une extension chromée précédemment supprimée.Translatext a été téléchargé par «googletranslate.crx», contenant un JavaScript malveillant pour voler des données et échapper aux mesures de sécurité.Le manifeste de l'extension \\ a demandé des autorisations excessives pour injecter des scripts dans les pages Web.
Translatext utilise des demandes de post HTTP pour les communications de commande et de contrôle (C2).Les commandes incluent la capture de captures d'écran du navigateur, la suppression des cookies et l'injection d'URL MS-PowerPoint pour initier des clics.Le script d'arrière-plan gère ces activités et envoie des données volées à un serveur C2 distant.
Les victimes connues de cette campagne sont les chercheurs universitaires sud-coréens axés sur les questions géopolitiques impliquant la Corée du Nord.Les caractéristiques du serveur C2 et la victimologie indiquent une implication de Kimsuk \\, le groupe utilisant la webshell B374K pour l'exfiltration des données.Les tactiques de redirection de la campagne s'alignent avec les stratégies connues de Kimsuky \\ pour éviter la détection.
## Les références
[L'acteur de menace nord-coréenne Kimsuky déploie une extension chromée malveillante pour l'espionnage académique] (https://www.zscaler.com/blogs/security-research/kimsuky-deploys-translatext-target-south-korean-academia#new_tab).Zscaler (consulté en 2024-07-02)
#### Targeted Geolocations
- Korea
#### Targeted Industries
- Education
## Snapshot
Zscaler ThreatLabz has identified new activities by the North Korean advanced persistent threat (APT) group Kimsuky, tracked by Microsoft as [Emerald Sleet](https://security |
Malware
Threat
|
|
★★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2024-07-02 17:43:03 |
Bloom Health Centers fournit un avis d'incident de sécurité des données Bloom Health Centers Provides Notice of Data Security Incident (lien direct) |
Pas de details / No more details |
|
|
★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2024-07-02 17:40:37 |
Human Technology Inc. - Notification de violation de données Human Technology Inc. - Notification of Data Breach (lien direct) |
Pas de details / No more details |
Data Breach
|
|
★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2024-07-02 17:29:56 |
Mise en œuvre de la confiance zéro et des risques d'atténuation: cours ISC2 pour soutenir votre développement Implementing Zero Trust and Mitigating Risk: ISC2 Courses to Support Your Development (lien direct) |
Pas de details / No more details |
|
|
★★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2024-07-02 17:20:33 |
Interlock lance une extension de sécurité WEB3 MENSELLAYER et une communauté de sécurité Internet sur le crowdsourced Interlock Launches ThreatSlayer Web3 Security Extension and Incentivized Crowdsourced Internet Security Community (lien direct) |
Pas de details / No more details |
|
|
★★★
|
![RecordedFuture.webp](./Ressources/img/RecordedFuture.webp) |
2024-07-02 17:15:55 |
FinTech Company Affirm dit Evolution Bank Attack Exposed Infos des clients Fintech company Affirm says Evolve Bank attack exposed customer info (lien direct) |
Pas de details / No more details |
|
|
★★
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2024-07-02 17:09:03 |
Odaseva recueille une série de 54 millions de dollars pour étendre les offres de produits et continuer le leadership des catégories Odaseva Raises $54M Series C Round to Expand Product Offerings and Continue Category Leadership (lien direct) |
Pas de details / No more details |
|
|
★★
|
![zataz.webp](./Ressources/img/zataz.webp) |
2024-07-02 16:59:39 |
Chorus Pro renforce sa cybersécurité (lien direct) |
La plateforme en ligne Chorus Pro améliore la sécurité de ses services pour mieux protéger les entreprises.... |
|
|
★★
|
![RecordedFuture.webp](./Ressources/img/RecordedFuture.webp) |
2024-07-02 16:51:33 |
Lockbit revendique la cyberattaque sur le plus grand hôpital de Croatie \\ LockBit claims cyberattack on Croatia\\'s largest hospital (lien direct) |
Pas de details / No more details |
|
|
★★
|
![RiskIQ.webp](./Ressources/img/RiskIQ.webp) |
2024-07-02 16:41:02 |
Hemlock Unfurling: un nouveau groupe de menaces utilise une campagne de bombes en cluster pour distribuer des logiciels malveillants Unfurling Hemlock: New threat Group Uses Cluster Bomb Campaign to Distribute Malware (lien direct) |
#### Targeted Geolocations
- United States
- Germany
## Snapshot
During a review of last year\'s malware campaigns, KrakenLabs discovered a campaign where hundreds of thousands of malicious files were distributed using a "malware cluster bomb" technique.
## Description
These findings were based on reports about malware like Amadey and Redline, indicating a massive, multi-month campaign likely orchestrated by a single group. This group, dubbed \'Unfurling Hemlock,\' utilized a complex nesting strategy within compressed cabinet files to distribute malware.
The infection method involved compressed files named “WEXTRACT.EXE.MUI,” with layers of nested compressed files each containing malware samples. This technique led to the distribution of over 50,000 files worldwide, primarily featuring stealers like Redline, RisePro, and Mystic Stealer, and loaders such as Amadey and SmokeLoader. Despite the samples appearing from various sources, many were traced back to Eastern European hosting services, suggesting a centralized origin.
Unfurling Hemlock\'s campaign aimed to maximize infection rates and financial gain by employing utilities to obfuscate malware, disable defenses, and enhance infection success. The group\'s operations seemed financially motivated, leveraging widespread malware distribution and possible partnerships with other cybercriminals for pay-per-infection schemes.
The malware execution followed a specific order, where nested files unpacked malware samples, which then executed sequentially to ensure maximum infection impact. This method resulted in multiple malware strains infecting a single victim, posing significant risks to organizations.
KrakenLabs\' analysis included over 2,100 samples, revealing distinct patterns and operational structures, confirming the campaign\'s extensive reach and sophistication. They observed multiple distribution methods, including email and compromised websites, and identified numerous command and control (C2) servers linked to the malware.
The primary targets of this campaign were companies and private institutions across various countries, with a significant number of uploaded samples originating from the United States and Germany. Interestingly, Russia was also a notable source, despite typical avoidance of CIS countries by regional cybercriminals.
KrakenLabs emphasized that while the malware itself was not highly sophisticated, the extensive distribution and redundancy in infection strategies posed substantial threats. The team also noted the potential for similar techniques to gain popularity among other threat actors in the future.
## Additional Analysis
Infostealers are commodity malware used to steal information from a target device and send it to the threat actor. Read Microsoft\'s write-up on information stealers [here](https://security.microsoft.com/intel-profiles/2296d491ea381b532b24f2575f9418d4b6723c17b8a1f507d20c2140a75d16d6).
### **Redline**
First observed in 2020, threat actors using Redline have leveraged the information stealer because of its availability and flexibility. It allows attackers to collect credentials from web browsers, cryptocurrency wallets, and applications, including passwords, cookies, browser history, and credit card information. Additionally, attackers can gather location information, screenshots, usernames, operating system details, User Account Control (UAC) settings, anti-virus tools, and file information from compromised devices. Redline is often advertised as a Malware-as-a-Service (MaaS) on a number of cybercriminal platforms like the dark web and Telegram, increasing its availability to both sophisticated and unsophisticated threat actors.
### RisePro
According to [Security Week](https://www.securityweek.com/new-risepro-infostealer-increasingly-popular-among-cybercriminals/), RisePro was first detected in December 2022 being sold on Russian Market, but a sharp increase of activity surroundin |
Ransomware
Spam
Malware
Tool
Threat
|
|
★★★
|
![News.webp](./Ressources/img/News.webp) |
2024-07-02 16:37:11 |
Pas de repos pour les commutateurs NEXUS de Cisco Flip sur le dernier jour zéro No rest for the wiry as Cisco Nexus switches flip out over latest zero-day (lien direct) |
Bogue d'injection de commande est abusé par des espions chinois présumés & # 8211;Patch up Les propriétaires de commutateurs Cisco devraient probablement appliquer le correctif qui vient de laisser tomber pour une vulnérabilité qui a été exploitée en avril en tant que zéro jour pour installer des logiciels malveillants sur un tableau de ses commutateurs Nexus.…
Command injection bug being abused by suspected Chinese spies – patch up Cisco switch owners should probably apply the patch that just dropped for a vulnerability that was exploited in April as a zero-day to install malware on an array of its Nexus switches.… |
Malware
Vulnerability
Threat
|
|
★★
|
![The_Hackers_News.webp](./Ressources/img/The_Hackers_News.webp) |
2024-07-02 16:30:00 |
How MFA Failures are Fueling a 500% Surge in Ransomware Losses (lien direct) |
Le paysage des menaces de cybersécurité a connu une augmentation spectaculaire et alarmante du paiement moyen des ransomwares, une augmentation supérieure à 500%.Sophos, un leader mondial de la cybersécurité, a révélé dans son rapport annuel "State of Ransomware 2024" selon lequel le paiement de rançon moyen a augmenté de 500% au cours de la dernière année avec des organisations qui ont payé une rançon déclarant un paiement moyen de 2 millions de dollars, en hausse par rapport à
The cybersecurity threat landscape has witnessed a dramatic and alarming rise in the average ransomware payment, an increase exceeding 500%. Sophos, a global leader in cybersecurity, revealed in its annual "State of Ransomware 2024" report that the average ransom payment has increased 500% in the last year with organizations that paid a ransom reporting an average payment of $2 million, up from |
Ransomware
Threat
|
|
★★★
|
![zataz.webp](./Ressources/img/zataz.webp) |
2024-07-02 16:29:14 |
Arrestation d\'un pirate informatique : création d\'un ransomware par IA (lien direct) |
La police a arrêté un jeune homme de 25 ans pour avoir créé un logiciel malveillant utilisant l'intelligence artificielle (IA).... |
Ransomware
Legislation
|
|
★★
|
![zataz.webp](./Ressources/img/zataz.webp) |
2024-07-02 16:18:05 |
Des scientifiques développent une IA pour prédire les crimes des tueurs en série (lien direct) |
Police prédictive : comme dans le film de science ficion 'Minority Report', des scientifiques ont entrepris de développer un programme informatique basé sur l'intelligence artificielle (IA) capable de prédire le lieu et l'heure des prochains crimes de tueurs en série.... |
Legislation
|
|
★★★
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2024-07-02 16:15:00 |
Le spam politique mobile est triple pour 2024 élection Mobile Political Spam Surges Threefold For 2024 Election (lien direct) |
Proofpoint a souligné comment le smirsh, l'identité et le spam érodaient la confiance dans la messagerie mobile
Proofpoint highlighted how smishing, impersonation and spam are eroding trust in mobile messaging |
Spam
Mobile
|
|
★★
|
![zataz.webp](./Ressources/img/zataz.webp) |
2024-07-02 16:02:08 |
Morgan Freeman remercie ses fans pour leur vigilance face aux fakenews (lien direct) |
Morgan Freeman, légendaire acteur de 87 ans, a partagé un message de remerciement à ses fans pour leurs efforts visant à dénoncer les imitations non autorisées de sa voix par des intelligences artificielles (IA).... |
|
|
★★★
|
![The_Hackers_News.webp](./Ressources/img/The_Hackers_News.webp) |
2024-07-02 15:58:00 |
Nouvelle vulnérabilité Intel CPU \\ 'indirector \\' expose des données sensibles New Intel CPU Vulnerability \\'Indirector\\' Exposes Sensitive Data (lien direct) |
Les processeurs modernes d'Intel, y compris le lac Raptor et le lac Alder, ont été trouvés vulnérables à une nouvelle attaque du canal secondaire qui pourrait être exploitée pour divulguer des informations sensibles des processeurs.
L'attaque, nommée indirectrice par les chercheurs en sécurité, Luyi Li, Hosein Yavarzadeh et Dean Tullsen, exploitent les lacunes identifiées dans le prédicteur de branche indirect (IBP) et le tampon cible de branche (BTB
Modern CPUs from Intel, including Raptor Lake and Alder Lake, have been found vulnerable to a new side-channel attack that could be exploited to leak sensitive information from the processors.
The attack, codenamed Indirector by security researchers Luyi Li, Hosein Yavarzadeh, and Dean Tullsen, leverages shortcomings identified in Indirect Branch Predictor (IBP) and the Branch Target Buffer (BTB |
Vulnerability
|
|
★★★
|
![zataz.webp](./Ressources/img/zataz.webp) |
2024-07-02 15:43:54 |
Arrestation d\'un étudiant pour triche à l\'aide de l\'IA (lien direct) |
La police a arrêté un futur étudiant universitaire accusé d'avoir élaboré un plan sophistiqué utilisant l'intelligence artificielle (IA) et des dispositifs cachés pour tricher lors d'un examen.... |
Legislation
|
|
★★★
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2024-07-02 15:30:00 |
La mise à jour Chrome bloquera les certificats d'attribution d'ici novembre 2024 Chrome Update Will Block Entrust Certificates by November 2024 (lien direct) |
Cette décision fait suite à une série d'échecs de conformité signalés et de manque de progrès dans la lutte contre les incidents divulgués publiquement
The move follows a series of reported compliance failures and lack of progress in addressing publicly disclosed incidents |
|
|
★★
|
![Netskope.webp](./Ressources/img/Netskope.webp) |
2024-07-02 15:20:55 |
Comment naviguer sur la sécurité des données à l'époque du Genai How to Navigate Data Security in the GenAI Era (lien direct) |
> Depuis son émergence grand public en 2022, l'IA générative a déclenché un changement sismique dans la gestion et la sécurité des données.On estime qu'un employé sur quatre utilise désormais quotidiennement les applications Genai, souvent à l'insu de leur employeur et de l'équipe informatique.Cela soulève des préoccupations, car Genai est conçu avec un appétit vorace pour consommer à la fois banal et [& # 8230;]
>Since its mainstream emergence in 2022, generative AI has triggered a seismic shift in data management and security. It is estimated that one in four employees now uses genAI apps daily, often unbeknownst to their employer and IT team. This raises concerns, as genAI is designed with a voracious appetite for consuming both mundane and […]
|
|
|
★★
|
![Checkpoint.webp](./Ressources/img/Checkpoint.webp) |
2024-07-02 15:20:10 |
Attaques cryptographiques modernes: un guide pour les perplexes Modern Cryptographic Attacks: A Guide for the Perplexed (lien direct) |
> Introduction Les attaques cryptographiques, encore plus avancées, sont souvent rendues plus difficiles à comprendre qu'elles ne doivent l'être.Parfois, c'est parce que l'explication est «trop trop tôt» - elle saute l'idée générale simple et va directement aux attaques du monde réel avec tous leurs détails désordonnés.D'autres fois, c'est à cause de trop [& # 8230;]
>Introduction Cryptographic attacks, even more advanced ones, are often made more difficult to understand than they need to be. Sometimes it\'s because the explanation is “too much too soon” - it skips the simple general idea and goes straight to real world attacks with all their messy details. Other times it\'s because of too much […]
|
|
|
★★
|
![Fortinet.webp](./Ressources/img/Fortinet.webp) |
2024-07-02 15:00:00 |
Life at Fortinet: Innovation marketing de produit Life at Fortinet: Product Marketing Innovation (lien direct) |
Une carrière dans la cybersécurité est une décision intelligente étant donné la diversité des rôles et des voies.Life at Fortinet: Rencontrez Alexandra Mehat, directrice du marketing produit.
A career in cybersecurity is a smart move given the diversity of roles and pathways. Life at Fortinet: Meet Alexandra Mehat, Director of Product Marketing. |
|
|
★★★
|
![SonarSource.webp](./Ressources/img/SonarSource.webp) |
2024-07-02 15:00:00 |
Sécuriser les outils du développeur: vulnérabilités de code non corrigées dans GOGS (1/2) Securing Developer Tools: Unpatched Code Vulnerabilities in Gogs (1/2) (lien direct) |
Nous avons découvert 4 vulnérabilités de code critiques dans GOGS, une solution d'hébergement de code source, qui sont toujours non corrigées.Lisez les détails et comment vous protéger.
We discovered 4 critical code vulnerabilities in Gogs, a source code hosting solution, which are still unpatched. Read about the details and how to protect yourself. |
Tool
Vulnerability
|
|
★★★
|
![globalsecuritymag.webp](./Ressources/img/globalsecuritymag.webp) |
2024-07-02 14:54:47 |
Keeper Security est reconnu comme un Leader dans le Rapport Radar de GigaOm pour la Gestion des Mots de Passe d\'Entreprise (lien direct) |
Le Rapport Radar de GigaOm pour la gestion des mots de passe d'entreprise nomme Keeper Security comme leader pour la troisième année consécutive
Keeper® est salué pour ses atouts en gestion des secrets, intégration IdP et conformité.
-
Magic Quadrant |
|
|
★★
|
![zataz.webp](./Ressources/img/zataz.webp) |
2024-07-02 14:51:17 |
Une banque utilise l\'IA pour réduire le harcèlement client dans les centres d\'appels (lien direct) |
Face à une augmentation du harcèlement client, le géant japonais de la technologie, SoftBank Corp., a développé une technologie téléphonique innovante utilisant l'intelligence artificielle (IA) pour atténuer les comportements agressifs des appelants. ... |
|
|
★★★
|
![zataz.webp](./Ressources/img/zataz.webp) |
2024-07-02 14:30:21 |
L\'IA à la rescousse des infirmières : l\'expérience pionnière d\'UW Health (lien direct) |
Dans le cadre d'un programme pilote conjoint d'intelligence artificielle lancé en 2023 avec Microsoft et Epic, UW Health explore comment un grand modèle linguistique (LLM) peut aider les infirmières à rédiger des réponses aux questions des patients.... |
|
|
★★★
|