What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
SecurityAffairs.png 2019-09-19 13:32:39 Emotet is back, it spreads reusing stolen email content (lien direct)

Emotet is back, its operators leverage a recently introduced spear-phishing technique to deliver their malware, they are hijacking legitimate email conversations. In 2019, security experts haven’t detected any activity associated with Emotet since early April, when researchers at Trend Micro have uncovered a malware campaign distributing a new Emotet Trojan variant that compromises devices and […]

The post Emotet is back, it spreads reusing stolen email content appeared first on Security Affairs.

Malware
SecurityWeek.png 2019-09-19 13:26:25 Critical Vulnerability Exposes Harbor Registries to Attacks (lien direct)

Harbor registries with default settings are impacted by a vulnerability that allows any user to elevate privileges to administrator, Palo Alto Networks reports.

read more

Vulnerability
SecureMac.png 2019-09-19 13:00:38 Red team, blue team: Understanding enterprise cybersecurity roles (lien direct)

If you\'re trying to understand how cybersecurity works in an enterprise setting, you\'re bound to come across terms like “red team”, “blue team”, and “purple team”.

The terms have their origins in the war games used by militaries to assess and improve their readiness. But what do these color-coded teams mean in the context of cybersecurity? What does each of them do, and how are they different from one another? 

That\'s what ...

The post Red team, blue team: Understanding enterprise cybersecurity roles appeared first on SecureMac.

WiredThreatLevel.png 2019-09-19 13:00:00 Roku Ultra and Express (2019): Price, Specs, Release Date (lien direct)

The cord-cutting king\'s new streamers are smaller and faster, and its software now makes it easier for the indecisive viewers to find something to watch.

WiredThreatLevel.png 2019-09-19 13:00:00 How to Go to the Bathroom in Space (lien direct)

Hear from a real-live astronaut about pee rainbows, poop practice, and the cosmic quest for good hygiene in zero gravity.

WiredThreatLevel.png 2019-09-19 13:00:00 An Exclusive Look Inside Apple\'s A13 Bionic Chip (lien direct)

What Apple\'s A13 Bionic chip signals about the future of mobile technology.

SecurityWeek.png 2019-09-19 12:37:50 Magecart Hackers Target Mobile Users of Hotel Websites (lien direct)

A Magecart threat actor has compromised the websites of two hotel chains to inject scripts targeting Android and iOS users, Trend Micro\'s security researchers warn.

read more

Threat
bleepingcomputer.png 2019-09-19 12:17:59 Celebrity Instagram Accounts Being Hacked to Push Scams (lien direct)

The streak of hacked celebrity Instagram accounts continues as cybercriminals temporarily hijacked Nicole Scherzinger\'s social media profile and promised access to an alleged sex tape of the singer-songwriter. [...]

Trend.png 2019-09-19 12:14:56 Fileless Cryptocurrency-Miner GhostMiner Weaponizes WMI Objects, Kills Other Cryptocurrency-Mining Payloads (lien direct)

By Carl Maverick Pascual (Threats Analyst) Cybercriminals continue to use cryptocurrency-mining malware to abuse computing resources for profit. As early as 2017, we have also observed how they have applied fileless techniques to make detection and monitoring more difficult. On August 2, we observed a fileless cryptocurrency-mining malware, dubbed GhostMiner, that weaponizes Windows management instrumentation...

The post Fileless Cryptocurrency-Miner GhostMiner Weaponizes WMI Objects, Kills Other Cryptocurrency-Mining Payloads appeared first on .

Malware
SecurityWeek.png 2019-09-19 12:08:50 Microsoft Rushes to Fix Bug That Broke Windows Defender Scans (lien direct)

Microsoft has rushed to fix a bug that prevented users from running a quick scan or a full system scan with Windows Defender.

Many users reported this week that after they installed the latest update for Windows Defender the security application would only scan a small number of files - reports say between 4 and 64 files.

read more

zataz.png 2019-09-19 12:02:19 Faux bloqueurs de publicité infiltrent des millions d\'internautes (lien direct)

La grande tendance chez les internautes est de râler contre la publicité sur le web. Bilan, des bloqueurs de publicité apparaissent. Deux d’entre eux viennent de piéger des millions de navigateurs. Faux bloqueurs de publicité ! Selon une étude menée par la société Adguard, deux bloqueurs de pu...

Cet article Faux bloqueurs de publicité infiltrent des millions d’internautes est apparu en premier sur ZATAZ.

WiredThreatLevel.png 2019-09-19 12:00:00 Veja\'s New Running Shoe Subtracts the Plastic (lien direct)

The so-called "post-petroleum" shoe joins the growing ranks of eco-runners.

WiredThreatLevel.png 2019-09-19 12:00:00 Trump Threatens California\'s Role as a Clean-Air Pioneer (lien direct)

From the catalytic converter to electric vehicles, the Golden State has pushed automakers to build cleaner cars.

WiredThreatLevel.png 2019-09-19 11:48:27 AI Could Reinvent Medicine-Or Become a Patient\'s Nightmare (lien direct)

The Mayo Clinic will store health data in Google\'s cloud and use its AI expertise to unearth insights. But Google has made mistakes before.

ZDNet.png 2019-09-19 11:38:56 Smart TVs send user data to tech heavyweights including Facebook, Google, Netflix (lien direct)

A research study suggests that private information is being transferred even when devices are idle.

no_ico.png 2019-09-19 11:30:17 MITRE\'s Top 25 Most Dangerous Software Errors (lien direct)

It has been reported that MITRE has released a list of the top 25 most dangerous software weaknesses and errors that can be exploited by attackers to compromise our systems. The non-profit’s 2019 Common Weakness Enumeration (CWE) Top 25 Most Dangerous Software Errors report is a compilation of errors, bugs, and potential attack vectors developers should make sure they are …

The ISBuzz Post: This Post MITRE’s Top 25 Most Dangerous Software Errors appeared first on Information Security Buzz.

no_ico.png 2019-09-19 11:22:41 Comments: NCSC Warns UK Universities Of The Risks Of Sate-sponsored Cyberattacks (lien direct)

The UK\'s National Cybersecurity Centre has issued an advisory which warns UK universities that “state espionage will continue to pose the most significant threat to the long-term health of both universities and the UK itself”, adding that there is a real possibility that “the threat will increase in-line with increased scrutiny of foreign direct investment and the …

The ISBuzz Post: This Post Comments: NCSC Warns UK Universities Of The Risks Of Sate-sponsored Cyberattacks appeared first on Information Security Buzz.

Threat
itsecurityguru.png 2019-09-19 11:19:56 Robot Receptionists Aren\'t The Answer: Why The Hotel Industry Should Rethink Its Approach To Smart Technology. (lien direct)

Luke Irwin, Copywriter at GRC International Group Plc and a finalist in the Cyber Writer category in the Security Serious Unsung Heroes Awards 2019. The hospitality sector has been clamouring for technological innovation recently, with organisations eager to find novel ways to improve the customer experience. You might have heard about Connie, a Watson-enabled robot […]

The post Robot Receptionists Aren\'t The Answer: Why The Hotel Industry Should Rethink Its Approach To Smart Technology. appeared first on IT Security Guru.

no_ico.png 2019-09-19 11:15:10 Commenst On Magecart Skimming Attack Targets Mobile Users Of Hotel Chain Booking Websites (lien direct)

Trend Micro has just published the following findings:  Magecart Skimming Attack Targets Mobile Users of Hotel Chain Booking Websites. Forbes is reporting on the findings, noting that Trend Micro discovered credit card skimming malware in the reservation systems of two international hotel chains. The significant attack affects hotel chains with over 180 locations in 14 different countries. The affected …

The ISBuzz Post: This Post Commenst On Magecart Skimming Attack Targets Mobile Users Of Hotel Chain Booking Websites appeared first on Information Security Buzz.

itsecurityguru.png 2019-09-19 11:11:47 Skimmer infects hotel websites via supply chain attack. (lien direct)

A Magecart card-skimming campaign this month sabotaged the mobile websites of two hotel chains by executing a supply chain attack on a third-party partner, researchers have reported. The third party in both instances was Roomleader, a Barcelona-based provider of digital marketing and web development services. One of the ways Roomleader helps hospitality companies build out their online […]

The post Skimmer infects hotel websites via supply chain attack. appeared first on IT Security Guru.

itsecurityguru.png 2019-09-19 11:10:52 (Déjà vu) Harbour container registry gives admin access by a critical bug. (lien direct)

Attackers can exploit a critical security vulnerability in Harbor cloud native registry for container images to obtain admin privileges on a vulnerable hosting system. Harbor is open source and can integrate with Docker Hub and various image registries like Docker Registry and Google Container Registry, to add security, identity, and management features. Source: Bleeping Computer

The post Harbour container registry gives admin access by a critical bug. appeared first on IT Security Guru.

Vulnerability
itsecurityguru.png 2019-09-19 11:09:49 Fake credit card accounts probed by CFPB at Bank of America. (lien direct)

The Consumer Financial Protection Bureau (CFPB) has been probing of Bank of America (BoA) for allegedly opening customer credit card accounts with authorization a la Wells Fargo. The BoA investigation emerged after the bureau posted documents to its site showing the back and forth regarding turning over emails and other records with the bank\'s attorneys, one of whom […]

The post Fake credit card accounts probed by CFPB at Bank of America. appeared first on IT Security Guru.

itsecurityguru.png 2019-09-19 11:09:05 (Déjà vu) Stolen Microsoft Logins sent Phishing page using JavaScript. (lien direct)

A new landing page for a Microsoft account phishing scam has been discovered that utilizes the SmtpJS service to send stolen credentials via email to the attacker. There is nothing special about the appearance of the Microsoft account phishing page shown below that was discovered by MalwareHunterTeam. It’s your standard Microsoft login template that will ask […]

The post Stolen Microsoft Logins sent Phishing page using JavaScript. appeared first on IT Security Guru.

itsecurityguru.png 2019-09-19 11:08:11 Phishing Emails Target Restaurant Depot Customers. (lien direct)

Customers of commercial food service wholesaler Restaurant Depot received phishing emails asking for payment of an (attached) outstanding invoice or else the company would deduct the balance from their accounts. Some of those recipients began tweeting to the company\'s customer service department with one noting that he “finally got through to tell them. They\'re aware. It\'s pretty big, the […]

The post Phishing Emails Target Restaurant Depot Customers. appeared first on IT Security Guru.

no_ico.png 2019-09-19 11:07:00 Scotiabank\'s \'Muppet-grade Security\' And Tortoiseshell Infecting IT Providers To Hit Their Customers (lien direct)

Canadian financial giant, Scotiabank, has torn down GitHub repositories, which were inadvertently left open to the public and contained sensitive internal source code information, as well as some private login keys to backend systems. .@Scotiabank embracing open source – puts code on Github https://t.co/RUuLFWyjsj via @Finextra #fintech — Adam Nanjee (@adamnanjee) August 16, 2018

The ISBuzz Post: This Post Scotiabank’s ‘Muppet-grade Security’ And Tortoiseshell Infecting IT Providers To Hit Their Customers appeared first on Information Security Buzz.

WiredThreatLevel.png 2019-09-19 11:00:00 The Viral App That Labels You Isn\'t Quite What You Think (lien direct)

ImageNet Roulette reveals biases in artificial intelligence algorithms. But the vast majority of tags attached to people are rarely used.

WiredThreatLevel.png 2019-09-19 11:00:00 Sorry, Streamers: The Race to Snag Old Shows Leads Nowhere (lien direct)

Reruns of \'Friends\' and \'The Office\' have been a phenomenon for Netflix, but aren\'t a lock to attract subscribers in the coming streaming wars.

SecurityAffairs.png 2019-09-19 10:35:45 Smominru Botnet continues to rapidly spread worldwide (lien direct)

Researchers at Guardicore Labs reported that the Smominru botnet is rapidly spreading and now is already infecting over 90,000 machines each month around worldwide. In February 2018, researchers from Proofpoint discovered a huge botnet dubbed \'Smominru\' that was using the EternalBlue exploit to infect Windows computers and recruit them in Monero cryptocurrency mining activities. According to the […]

The post Smominru Botnet continues to rapidly spread worldwide appeared first on Security Affairs.

SecurityWeek.png 2019-09-19 10:10:33 Ping Identity IPO Shares Priced at $15 (lien direct)

Denver-based identity management solutions provider Ping Identity on Thursday announced that it\'s offering 12,500,000 shares of its common stock at $15 per share, which means the company hopes to raise at least $187 million in its initial public offering (IPO).

read more

01net.png 2019-09-19 10:02:49 McAfee lance un antivirus dédié... aux gamers (lien direct)

Doté d\'un moteur antiviral allégé, il promet d\'économiser au mieux les ressources de la machine. L\'analyse de sécurité est alors principalement déporté vers le cloud de l\'éditeur.

WiredThreatLevel.png 2019-09-19 10:00:00 Jack Conte, Patreon, and the Plight of the Creative Class (lien direct)

The DIY musician\'s crowdfunding platform set out to provide a livelihood for artists on the internet. Is it more than just a band-aid for a broken system?

ZDNet.png 2019-09-19 09:59:11 Patch now: 1,300 Harbor cloud registries open to attack (lien direct)

A severe critical privilege escalation vulnerability has been found in the open source registry software.

Vulnerability
The_Hackers_News.png 2019-09-19 09:48:13 Update Google Chrome Browser to Patch New Critical Security Flaws (lien direct)

Google has released an urgent software update for its Chrome web browser and is urging Windows, Mac, and Linux users to upgrade the application to the latest available version immediately. Started rolling out to users worldwide this Wednesday, the Chrome 77.0.3865.90 version contains security patches for 1 critical and 3 high-risk security vulnerabilities, the most severe of which could allow

Korben.png 2019-09-19 09:28:21 J\'ai testé le poste de travail ergonomique ! #TravaillerDebout #Santé (lien direct)

J’ai eu le plaisir avant l’été de me faire installer par la société Ergosanté, une chaise de bureau ergonomique ainsi qu’un bureau qui monte et qui descend. Avant cela, j’avais un bureau tout à fait classique et une chaise de bureau Ikea (vous savez celle qu’on voit partout) qui commençait … Suite

Pirate.png 2019-09-19 09:24:24 La sécurité des échanges, une donnée-clé des établissements de santé (lien direct)
À l\'image des autres secteurs d\'activités, les professionnels de santé (hôpitaux, cliniques, etc.) doivent garantir une parfaite sécurisation des données qu\'ils échangent. Ce constat est d\'autant plus important que les acteurs du monde de la santé manipulent des données sensibles. Bien entendu, il convient, lorsque l\'on évoque la sécurité IT, de la penser dans son ensemble, mais dans notre propos, nous allons nous concentrer sur un point précis : la sécurité des données échangées par mail.
01net.png 2019-09-19 08:41:25 Les mouchards publicitaires prolifèrent sur les chaînes d\'Amazon Fire TV et Roku (lien direct)

A l\'image des sites internet, la plupart des chaînes IPTV sont eux aussi infestées de trackers. Certaines comptent jusqu\'à soixante mouchards par chaîne.

zataz.png 2019-09-19 08:30:45 The Americans : La Russie aurait mis sur écoute le FBI (lien direct)

Pour ceux qui connaissent la série TV " The Americans ", l’affaire que vient de révéler un ancien de la CIA a de quoi faire sourire. " The Americans " traite de ces agents Russes infiltrés aux USA. On vient d’apprendre d’un agent retraité que la Russie avait mis sur écoute le FBI p...

Cet article The Americans : La Russie aurait mis sur écoute le FBI est apparu en premier sur ZATAZ.

Pirate.png 2019-09-19 08:29:22 Santé : 47 500 dossiers patients français accessibles en ligne (lien direct)
Entre mi-juillet 2019 et début septembre 2019, Greenbone Networks a mené une analyse d\'environ 2 300 systèmes d\'archivage d\'images médicales connectés à Internet.
Logo_logpoint.jpg 2019-09-19 08:21:15 Meet LogPoint at Les Assises: Demonstrating unique time-to-value with LogPoint (lien direct)

LogPoint is disrupting the SIEM industry, and we would like to show you how. Meet the LogPoint team at Les Assises in Monaco on 9-12 OctoberWe are excited to attend Les Assises de la Securité, and this year we will be focusing on how the LogPoint implements faster than any other SIEM solution, providing unique [...]

The post Meet LogPoint at Les Assises: Demonstrating unique time-to-value with LogPoint appeared first on LogPoint.

NextINpact.png 2019-09-19 08:17:29 Google fait évoluer sa gestion centralisée des appareils Android en entreprise (lien direct)

Depuis le 16 septembre, tout nouvel appareil enregistré dans une organisation cliente de la G Suite reçoit un nouveau composant baptisé Android Device Policy, remplaçant l’ancien Google Apps Device Policy. Ce client ...

Pirate.png 2019-09-19 07:13:16 Enquête mondiale Forbes Insights auprès de RSSI (lien direct)
Le nouveau rapport Forbes Insights montre que les RSSI considèrent que les capacités des attaquants dépassent leur habilité à défendre leurs organisations. L\'enquête révèle comment les RSSI modifient leurs priorités et leurs stratégies de sécurité pour gérer des menaces de plus en plus avancées avec des ressources limitées.
Korben.png 2019-09-19 07:00:36 Comment a été réalisé le design sonore de Mortal Kombat 11 ? (lien direct)

Si vous avez déjà joué au célèbre jeu de baston Mortal Kombat, vous savez que la bande-son (bruitages, musique, effets sonores …) est l’un de ses plus gros points forts. Du célèbre " Fight ! " de début de match aux sons bien gluants des différents Fatality il y a de quoi … Suite

SecurityWeek.png 2019-09-19 06:38:56 Smominru Botnet Infects Thousands of Hosts Daily (lien direct)

The Smominru botnet continues to spread at a fast pace, infecting around 4,700 new hosts daily during the month of August, Guardicore Labs reports.

read more

SecurityWeek.png 2019-09-19 04:42:48 Zuckerberg Sets Talks in Washington on \'Future Regulation\' (lien direct)

Facebook chief executive Mark Zuckerberg was expected in Washington Thursday for private talks with policymakers as the leading social network faces a myriad of regulatory and legal issues.

Zuckerberg\'s visit comes five months after his stormy appearance before Congress, where he was grilled on Facebook\'s data protection and privacy missteps.

read more

bleepingcomputer.png 2019-09-19 03:28:26 Critical Bug In Harbor Container Registry Gives Admin Access (lien direct)

Attackers can exploit a critical security vulnerability in Harbor cloud native registry for container images to obtain admin privileges on a vulnerable hosting system. [...]

Vulnerability
CSO.png 2019-09-19 03:00:00 10 signs you\'re being socially engineered (lien direct)

Together, phishing and social engineering are by far the number one root-cause attack vector, and they have been around nearly since computers themselves were invented.

To read this article in full, please click here

ZDNet.png 2019-09-19 00:23:00 Ubisoft to send out cease & desist requests to DDoS-for-hire services (lien direct)

Because all cybercriminals are law-abiding citizens and have a legal department.

TechRepublic.png 2019-09-19 00:16:15 How to use Lifesize Go for free video conference calls (lien direct)

If your video conferencing needs are minimal, the free browser-based Lifesize Go service is a useful option.

TechRepublic.png 2019-09-19 00:02:44 How to use Mission Control to optimize macOS operation (lien direct)

Mission Control can significantly improve your daily efficiency. Here\'s how to ensure you\'re making the most of the time-saving macOS feature.

TechRepublic.png 2019-09-18 23:49:59 How to deploy and manage Google\'s Chrome browser at your organization (lien direct)

Learn how to use Google\'s Enterprise version of Chrome to install the browser and then turn to Group Policy to manage it.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21

Information mise à jours le: 2019-09-22 08:07:45
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Notre RSS (filtré) Twitter