What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
zataz.png 2023-11-27 15:07:54 L\'identité du leader hacktiviste russe Killnet révélé ? (lien direct) Le groupe hacktiviste pro-russe Killnet fait l'objet d'une surveillance accrue après qu'un site d'information Russe ait révélé la présumé identité de son chef Killmilk.... ★★
bleepingcomputer.png 2023-11-27 15:06:14 Ransomware attack on indie game maker wiped all player accounts (lien direct) A ransomware attack on the "Ethyrial: Echoes of Yore" MMORPG last Friday destroyed 17,000 player accounts, deleting their in-game items and progress in the game. [...] ★★
DarkReading.png 2023-11-27 15:00:00 Data De-Identification: Balancing Privacy, Efficacy & Cybersecurity (lien direct) Companies must do a delicate dance between consumer privacy protection, upholding their product's efficacy, and de-risking cyber breaches to run the business. ★★
WiredThreatLevel.png 2023-11-27 14:50:52 34 Cyber Monday Laptop Deals-Plus Clickety-Clack Keyboards (lien direct) Editing a video, playing a game, or getting homework done? Cyber Monday laptop deals on our favorite models will help.
Amnesty.webp 2023-11-27 14:41:27 https:// post processing test (lien direct) Editing a video, playing a game, or getting homework done? Cyber Monday laptop deals on our favorite models will help.
globalsecuritymag.png 2023-11-27 14:28:28 Cohesity annonce l\'intégration de Cohesity DataProtect et Microsoft 365 Backup Storage (lien direct) Cohesity et Microsoft renforcent leur collaboration pour l'amélioration de la sécurité des données et la protection des sauvegardes L'intégration de Cohesity DataProtect et Microsoft 365 Backup Storage permet une récupération rapide des données, améliorant ainsi la cyber-résilience des organisations - Produits ★★
zataz.png 2023-11-27 14:22:52 LE GENDARME DE LA VIE PRIVÉE AU CANADA ENQUÊTE SUR UN PIRATAGE AFFECTANT LE PERSONNEL MILITAIRE ET DE LA GRC (lien direct) Le Commissaire à la protection de la vie privée du Canada mène une enquête sur une cyberattaque qui a compromis les données de membres actuels et anciens des forces armées du pays et de la Gendarmerie royale du Canada (GRC).... ★★
WiredThreatLevel.png 2023-11-27 14:22:26 These Are Our Favorite Walmart Cyber Monday Deals (lien direct) Work? Work is hard. Let's go shopping. From the Apple Watch to the Nintendo Switch, these are the best Cyber Monday deals at Walmart.
Blog.png 2023-11-27 14:16:09 Study Finds Amazon, eBay and Afterpay as Top Android User Data Collectors (lien direct) >By Deeba Ahmed Amazon and eBay have been declared the highest data-collecting platforms among all the Android shopping apps researchers examined. This is a post from HackRead.com Read the original post: Study Finds Amazon, eBay and Afterpay as Top Android User Data Collectors ★★
datasecuritybreach.png 2023-11-27 14:02:24 APPLE AVERTIT LES ARMÉNIENS DE TENTATIVES DE PIRATAGE SOUTENUES PAR L\'ÉTAT (lien direct) Récemment, Apple a envoyé des alertes à ses clients en Arménie, les informant que leurs téléphones sont ciblés par des pirates informatiques soutenus par un État. ★★★
Fortinet.png 2023-11-27 14:00:00 FortiPoints: A New Program to Simplify and Accelerate the Adoption of Fortinet Solutions and Services (lien direct) Learn about FortiPoints, a new program that makes it easier than ever to acquire and consume Fortinet solutions and services. ★★
globalsecuritymag.png 2023-11-27 13:44:32 Hanwha Vision is ready to meet CRA and NIS 2 cybersecurity regulations (lien direct) Hanwha Vision is ready to meet CRA and NIS 2 cybersecurity regulations - Business News ★★
Checkpoint.png 2023-11-27 13:44:29 27th November – Threat Intelligence Report (lien direct) >For the latest discoveries in cyber research for the week of 27th November, please download our Threat_Intelligence Bulletin. TOP ATTACKS AND BREACHES Nevada-based medical transcription company, Perry Johnson & Associates (PJ&A), has disclosed a data breach that affected more than 9M patients at multiple healthcare providers in the US. The exposed data includes patients' names, […] ★★
WiredThreatLevel.png 2023-11-27 13:17:33 6 Theragun Cyber Monday Deals (2023): Percussive Massage Devices (lien direct) Whether you have sore muscles, tired eyes, or dull skin, there's a Therabody massager on sale that could help.
WiredThreatLevel.png 2023-11-27 13:00:30 The 26 Greatest Cyber Monday Deals on Gear We Love (lien direct) We've made it less overwhelming to find the best discounts on WIRED-approved gear in this Netscape hellscape.
Checkpoint.png 2023-11-27 13:00:17 CRN Names Check Point\'s Christina Ruth to its 2023 Channel Women on the Rise List (lien direct) Check Point is proud to announce that CRN®, a brand of The Channel Company, has named Christina Ruth, Channel Account Manager, to its 2023 Channel Women on the Rise list. This list honors up-and-coming, dedicated, driven women who are making a difference for solution providers throughout the IT channel. The selection process involved recommendations from esteemed channel chiefs and other channel management executives. To celebrate Christina's achievements, we asked her some questions to get to know her better. How did you get into cybersecurity? Before I worked at Check Point, I was an IT recruiter. I recruited specifically for infrastructure […] ★★
SecurityWeek.png 2023-11-27 13:00:00 Hacktivism: What\'s in a Name… It May be More Than You Expect (lien direct) >Hacktivism is evolving. It is important for both the law and cyber defenders to understand the current and potential activity of hacktivism to better understand how it should be treated. ★★
bleepingcomputer.png 2023-11-27 12:54:41 Ardent hospital ERs disrupted in 6 states after ransomware attack (lien direct) Ardent Health Services, a healthcare provider operating 30 hospitals across five U.S. states, disclosed today that its systems were hit by a ransomware attack on Thursday. [...] ★★
zataz.png 2023-11-27 12:46:01 PROCÈS CONTRE LES MEMBRES PRÉSUMÉS DU GROUPE DE HACKERS REVIL (lien direct) Un procès contre des individus soupçonnés d'appartenir au groupe de hackers malveillants REvil, aussi connu sous le nom de Sodinokibi, a débuté à Saint-Pétersbourg. Un sac de nœuds qui pourrait permettre aux présumés pirates de s'en sortir !... ★★
TroyHunt.png 2023-11-27 12:30:03 Cyber Monday 2023: The best deals on Lenovo, Herman Miller, Apple, Anker, Dyson, and more (lien direct) Cyber Week is here, and these are the best deals on Apple, Dyson, Lenovo, Vitamix, and more. ★★
The_Hackers_News.png 2023-11-27 12:25:00 Les États-Unis, le Royaume-Uni et les partenaires mondiaux publient des directives de développement du système d'IA sécurisées
U.S., U.K., and Global Partners Release Secure AI System Development Guidelines
(lien direct)
Le Royaume-Uni et les États-Unis, ainsi que des partenaires internationaux de 16 autres pays, ont publié de nouvelles directives pour le développement de systèmes d'intelligence artificielle sécurisée (IA). "L'approche priorise la propriété des résultats de sécurité pour les clients, embrasse la transparence et la responsabilité radicales, et établit des structures organisationnelles où la conception sécurisée est une priorité absolue", les États-Unis
The U.K. and U.S., along with international partners from 16 other countries, have released new guidelines for the development of secure artificial intelligence (AI) systems. "The approach prioritizes ownership of security outcomes for customers, embraces radical transparency and accountability, and establishes organizational structures where secure design is a top priority," the U.S.
silicon.fr.png 2023-11-27 12:11:55 ownCloud : une acquisition… et des failles de sécurité (lien direct) Parallèlement à son acquisition par un éditeur américaine, ownCloud a fait part de trois vulnérabilités, dont deux critiques. ★★
Chercheur.png 2023-11-27 11:59:17 Secret White House Warrantless Surveillance Program (lien direct) There seems to be no end to warrantless surveillance: According to the letter, a surveillance program now known as Data Analytical Services (DAS) has for more than a decade allowed federal, state, and local law enforcement agencies to mine the details of Americans' calls, analyzing the phone records of countless people who are not suspected of any crime, including victims. Using a technique known as chain analysis, the program targets not only those in direct phone contact with a criminal suspect but anyone with whom those individuals have been in contact as well... ★★★
SocRadar.webp 2023-11-27 11:54:21 Dark Strom\'s Android RAT, Sales of Financial Data and UK RDP Access, SiegedSec\'s Government Breach (lien direct) The SOCRadar Dark Web Team unveils a fresh wave of illicit activities as the relentless... ★★
WiredThreatLevel.png 2023-11-27 11:45:01 These 15 Amazon Deals on WIRED-Tested Gear Have Never Been Cheaper (lien direct) From TVs and tablets to headphones and cozy blankets, these Cyber Monday deals are the lowest prices we've ever seen on these WIRED-recommended items. ★★
zataz.png 2023-11-27 11:21:31 LUMMA, LE MALWARE CAPABLE DE RESTAURER LES COOKIES GOOGLE EXPIRÉS (lien direct) Lumma, un malware déjà connu pour son efficacité dans le vol de données, vient d'ajouter une corde à son arc. Cette nouvelle capacité permet aux opérateurs de Lumma de restaurer les cookies d'authentification Google expirés, ouvrant ainsi une brèche inédite dans la sécurité des comptes utilisateurs.... ★★
bleepingcomputer.png 2023-11-27 11:16:01 Slovenia\'s largest power provider HSE hit by ransomware attack (lien direct) Slovenian power company Holding Slovenske Elektrarne (HSE) has suffered a ransomware attack that compromised its systems and encrypted files, yet the company says the incident did not disrupt electric power production. [...] ★★★
News.png 2023-11-27 11:02:09 Leader of pro-Russia DDoS crew Killnet unmasked by Russian state media (lien direct) Also: Qakbot on verge of permadeath, Australia can't deliver on ransom payment ban (yet), and Justin Sun's very bad month Infosec in Brief  Cybercriminals working out of Russia go to great lengths to conceal their real identities, and you won't ever find the state trying to unmask them either – as long as they keep supplying the attacks on Axis nations. It's the reason why we found it so amusing that of all the ways the identity of an organized cybercrime gang leader could be revealed, it was Russian state media that may have recently outed someone of note.… ★★★
CS.webp 2023-11-27 11:00:00 Shadowy hacking group targeting Israel shows outsized capabilities (lien direct) >A sophisticated campaign that has targeted Israel for at least 8 years shows evidence of improving its capabilities. ★★
AlienVault.png 2023-11-27 11:00:00 Gift cards or data theft? Ensuring safe online shopping this festive season (lien direct) The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Gift cards have become a go-to Christmas present for many people, but their dramatic rise in popularity has also unfortunately made them a prime target for hackers. The reason why gift cards are such a popular present is because of how practical they are to use. When you’re not sure what to buy someone, gift cards present an easy and accessible way to show someone how much you appreciate them. But don’t allow the convenience of gift cards to get the better of your judgment in regard to security. It’s easy to think that gift cards are safe from cybercriminals, but in reality, gift card fraud (also known as gift card scamming) is a very real threat not only to retailers and business owners but to everyday individuals such as yourself as well.  Overlooking basic cybersecurity hygiene when you’re rushing to score the best deals that you can online has always been a risk you’ve taken in the past, but it also may not be a risk you can afford to take this year. Read on to find out why and how you can prevent it.  Why do scammers like gift cards? Gift card fraud is a bigger problem than most people realize. In 2022, for example, FTC data revealed that nearly $230 million was lost to gift card fraud, affecting more than 48,000 people in total. Gift cards are popular with retailers because they present a very reliable stream of revenue. But at the same time, they prevent a viable opportunity for scammers to get away with easy money because of how difficult they are to track. Scammers like gift card cards because they are easy to break into and also because they do not have the same level of security authentication that credit or debit cards have. Most cybercriminals will steal gift card numbers online from stores offering them. They can accomplish this by using botnets that perform brute force attacks. The only thing a criminal has to do is to test thousands of different combinations of PIN and gift card numbers before hacking into a user’s account and depleting the card of its funds.  Furthermore, once the attack is completed, there’s usually no trace of the criminal’s identity and the funds cannot be traced. And even though most gift cards have limited amounts of money loaded on them (most gift cards run between $15 to $500 at the most), when cybercriminals are running their operations on a large scale they can turn a very sizable profit.  Cybercriminals can also monetize gift cards by illegally selling them on the dark web or other third-party websites. Some of these websites will offer the ability to convert gift cards to cash at 30%+ of the total card value, presenting an easy way to make quick money.  In the next section, we’ll dive into the specific types of gift card fraud that can affect you.  Types of gift card scams  Here are the most common types of gift card scams: Fictitious ads In this method, cybercriminals will post fake but realistic-looking advertisements for items ‘on sale’ on ecommerce websites where they will trick users to into sharing their gift card numbers to purchase the items. Once the money has been received, the ads will disappear, and the victim will be out of luck.  In other words, people can fall for this trick the same way they can fall for other common types of identity theft, with people being unassuming since the threa ★★
datasecuritybreach.png 2023-11-27 10:52:36 L\'EXPLOIT PERMETTANT DE CONTOURNER WINDOWS DEFENDER SMARTSCREEN DIVULGUÉ (lien direct) Le code d'exploitation de démonstration (preuve de concept, PoC) d'une vulnérabilité critique dans Windows Defender a été rendu public. ★★
WiredThreatLevel.png 2023-11-27 10:51:16 Here are all the Cyber Monday deals for 2023 (lien direct) These Cyber Monday deals are hand-picked by WIRED editors who spend all year testing gear and logging prices to bring you the best stuff at the best prices.
zataz.png 2023-11-27 10:40:10 LE FBI A, SANS LE SAVOIR, PEUT ÊTRE AIDÉ LA RUSSIE FACE AUX ATTAQUES DDOS (lien direct) Le paysage des attaques par déni de service distribué (DDoS) a connu des changements significatifs en 2023, en particulier en Russie, notamment en ce qui concerne les motivations derrière ces attaques.... ★★★
globalsecuritymag.png 2023-11-27 10:34:55 Protégez vos achats de Noël en ligne grâce à une gestion prudente des mots de passe (lien direct) Protégez vos achats de Noël en ligne grâce à une gestion prudente des mots de passe par Arnaud De Backer Channel Sales Manager EMEA Chez Keeper Security - Points de Vue ★★
ESET.png 2023-11-27 10:30:00 \'Tis the season to be wary: 12 steps to ruin a cybercriminal\'s day (lien direct) The holiday shopping season may be the time to splurge, but it's a also favorite time of year for cybercriminals to target shoppers with phony deals, phishing scams and other threats ★★
InfoSecurityMag.png 2023-11-27 10:30:00 KyberSwap Says Hackers Stole $55m in Crypto (lien direct) Decentralized exchange offers $5m bounty
globalsecuritymag.png 2023-11-27 10:26:33 Imperva annonce ses prédictions en matière de cybersécurité pour 2024 (lien direct) Imperva annonce ses prédictions en matière de cybersécurité pour 2024. Des équipes de sécurité plus faibles, la réalité de la GenAI et des risques accrus pour la sécurité des API - Points de Vue Prediction ★★
bleepingcomputer.png 2023-11-27 10:02:04 Leveraging Wazuh to combat insider threats (lien direct) Effective strategies for mitigating insider threats involve a combination of detective and preventive controls. Such controls are provided by the Wazuh SIEM and XDR platform. [...] ★★
InfoSecurityMag.png 2023-11-27 10:00:00 General Electric Enquête sur une violation présumée de la DARPA
General Electric Investigates Alleged DARPA Breach
(lien direct)
Intelbroker prétend vendre des données militaires sensibles
IntelBroker claims to be selling sensitive military data
zataz.png 2023-11-27 09:58:40 BIG BROTHER IS WATCHING YOU : LA RUSSIE VEUT CENTRALISER SA VIDÉOSURVEILLANCE (lien direct) La Russie réfléchit à centraliser les images issues de la vidéosurveillance publique afin d'analyser plus rapidement les contenus.... ★★
SocRadar.webp 2023-11-27 09:55:54 Mastering Online Fraud Prevention with SOCRadar\'s Cyber Bible (lien direct) The digital transformation of commerce has brought unparalleled convenience and opened the floodgates to an... ★★
zataz.png 2023-11-27 09:34:26 MERCI ! ZATAZ, 9ÈME INFLUENCEUR CYBERSÉCURITÉ D\'EUROPE (lien direct) ZATAZ figure dans le top 500 des plus importants influenceurs high-tech d'Europe, et occupe la 9ème place parmi les influenceurs en cybersécurité dans le top 500 Tyto Tech 2023.... Commercial
InfoSecurityMag.png 2023-11-27 09:30:00 Le Royaume-Uni publie les premières lignes directrices sur le développement de l'IA sûr
UK Publishes First Guidelines on Safe AI Development
(lien direct)
L'effort NCSC et CISA approuvé par 18 pays
NCSC and CISA effort endorsed by 18 countries
ProofPoint.png 2023-11-27 09:26:51 8 Essential Cybersecurity Topics to Include in Your Training Program (lien direct) Your employees have a critical role to play as a first line of defense against cyberthreats. But to be effective, they need to know what those threats are-and stay apprised of how they're evolving.  A comprehensive security awareness program is the key to helping your users grow their understanding of attackers' methods and objectives so they can become more proactive defenders. That includes knowing what strategies malicious actors employ to manipulate people so they can use them to enable their campaigns.  The importance of security awareness   It's well worth taking the time to craft a meaningful and engaging security awareness program. By presenting the right mix of information to your users in a compelling way, you can empower them to help you improve your organization's security posture as well as create a more robust security culture overall.   The cybersecurity topics that you include in your program should be relevant to your business and industry, of course. Companies face different cyberthreat challenges and regulatory compliance requirements related to data protection and data privacy. That said, there are several subjects that almost any modern business, regardless of its industry, will want to ensure its employees understand.   We list eight of these cybersecurity topics below. They are the go-to approaches and tools that attackers around the world commonly use to compromise users and their accounts, disrupt normal business operations, steal money or data, and do other damage.   Here's a high-level overview of these eight must-know cybersecurity topics:  1. Social engineering  Social engineering is a collection of techniques malicious actors use to manipulate human psychology. Attackers rely on these strategies to trick or threaten users to take actions such as giving up account credentials, handing over sensitive data, running malicious code and transferring funds. They do this by taking advantage of users':  Emotions, by conveying a sense of urgency, generating excitement about an opportunity, or creating fear around losing money or doing something wrong  Trust, by posing as someone familiar to the user or a trusted brand or authority-such as the Internal Revenue Service (IRS), UPS, Amazon or Microsoft  Fatigue, by timing attacks when users are likely to be tired or distracted and more inclined to let their “emotional mind” guide their decision-making  Common social engineering tactics include phishing-which we cover in the next section-and these others:   Social media reconnaissance. Attackers often turn to social media to gather information about users that they target with their campaigns. These efforts can include direct outreach to users.  Vishing (voice phishing) and smishing (SMS/text phishing). Vishing is the fraudulent practice of making phone calls or leaving voice messages purporting to be from a trusted brand or authority. With smishing, attackers use text messages to send SMS messages to users or robocall them. The messages often promise gifts or services in exchange for payment.   Telephone-oriented attack delivery (TOAD). TOAD attacks start with an email that claims to be from a legitimate source and includes a phone number for customer assistance. Callers are connected to fake customer service representatives who then direct the victim through the attack. They may instruct the victim to let them access their machine remotely or download a file that turns out to be malware. Or they might direct them to a phishing site.  Common sense can go a long way toward preventing a social engineering attack. Make sure to reiterate that if a message seems too good to be true, it's very likely a scam. And if something doesn't look or sound right, it probably isn't.  2. Phishing  Phishing is an example of social engineering. Most phishing messages are sent by email. But some attackers deliver these messages through other methods, including smishing and vishing. Here are some typical strategies:  Malicious links. When a user clicks on a maliciou ★★
zataz.png 2023-11-27 09:24:59 LE QUISHING : PHISHING UTILISANT LES CODES QR (lien direct) Qu'est-ce que le quishing ? Non, ce n'est pas une tarte salée d'origine française, mais un type de phishing, d'hameçonnage exploitant les QR Codes pour piéger les internautes.... ★★
silicon.fr.png 2023-11-27 09:05:52 AWS se lance dans le client léger… à partir d\'une box TV (lien direct) Amazon reconvertit son Fire TV Cube en client léger adossé aux offres VDI d'AWS. ★★
globalsecuritymag.png 2023-11-27 08:56:29 Starburst étend son partenariat avec Google Cloud et la portée de Vertex AI avec son moteur de fédération de donnée (lien direct) Starburst renforce son partenariat avec Google Cloud via sa plateforme de machine learning Vertex AI. Cette association aidera les utilisateurs de Starburst à créer, entraîner et déployer des applications d'IA générative et étendra aussi la portée des services d'IA de Google Cloud à de multiples sources de données, quel que soit l'endroit où elles se trouvent. Starburst peut être associé à Google Cloud pour fournir une solution de bout en bout et complète pour les analyses basées sur du machine (...) - Business ★★★
globalsecuritymag.png 2023-11-27 08:52:33 Cactus: défendre contre un nouveau venu ransomware
Cactus: Defending against a ransomware newcomer
(lien direct)
cactus: défendre contre un nouveau venu ransomware Cactus a émergé en mars de cette année et a depuis construit un vaste portefeuille de victimes de haut niveau. logpoint a analysé les tactiques, les techniques et les procédures (TTP) et les indicateurs de compromis (IOCS)pour établir des défenses. - mise à jour malveillant
Cactus: Defending against a ransomware newcomer Cactus emerged in March this year and has since built an extensive portfolio of high-profile victims. Logpoint has analyzed Tactics, Techniques, and Procedures (TTPs) and Indicators of Compromise (IoCs) to establish defenses. - Malware Update
globalsecuritymag.png 2023-11-27 08:50:07 Cactus : Se défendre contre un nouveau venu chez les ransomwares (lien direct) Cactus : Se défendre contre un nouveau venu chez les ransomwares Cactus est apparu en mars cette année et a depuis déjà fait des ravages chez plusieurs victimes. Logpoint a analysé les tactiques, techniques et procédures (TTP) ainsi que les indicateurs de compromission (IoC) pour établir des défenses. - Malwares
WiredThreatLevel.png 2023-11-27 08:49:04 135 Absolute Best Cyber Monday Offres en ce moment (2023): Apple Watchs, Router, et plus
135 Absolute Best Cyber Monday Deals Right Now (2023): Apple Watches, Routers, and More
(lien direct)
Ce sont les réductions les plus importantes que nous avons trouvées sur le Web.Que vous souhaitiez un iPad ou un commutateur Nintendo, il y a quelque chose pour tout le monde.
These are the top discounts we\'ve found across the web. Whether you want an iPad or a Nintendo Switch, there\'s something for everyone.
Last update at: 2023-11-29 21:09:40
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter