www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2025-05-10T20:25:21+00:00 www.secnews.physaphae.fr The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Google paie 1,375 milliard de dollars au Texas sur le suivi non autorisé et la collecte de données biométriques<br>Google Pays $1.375 Billion to Texas Over Unauthorized Tracking and Biometric Data Collection Google has agreed to pay the U.S. state of Texas nearly $1.4 billion to settle two lawsuits that accused the company of tracking users\' personal location and maintaining their facial recognition data without consent. The $1.375 billion payment dwarfs the fines the tech giant has paid to settle similar lawsuits brought by other U.S. states. In November 2022, it paid $391 million to a group of 40]]> 2025-05-10T12:24:00+00:00 https://thehackernews.com/2025/05/google-pays-1375-billion-to-texas-over.html www.secnews.physaphae.fr/article.php?IdArticle=8674003 False None None None The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) L'Allemagne arrête le blanchiment de 1,9 milliard de dollars, saisit 34 millions d'euros en crypto et 8 To de données<br>Germany Shuts Down eXch Over $1.9B Laundering, Seizes €34M in Crypto and 8TB of Data Germany\'s Federal Criminal Police Office (aka Bundeskriminalamt or BKA) has seized the online infrastructure and shutdown linked to the eXch cryptocurrency exchange over allegations of money laundering and operating a criminal trading platform. The operation was carried out on April 30, 2025, authorities said, adding they also confiscated 8 terabytes worth of data and cryptocurrency assets]]> 2025-05-10T12:17:00+00:00 https://thehackernews.com/2025/05/germany-shuts-down-exch-over-19b.html www.secnews.physaphae.fr/article.php?IdArticle=8674004 False Legislation None None The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) BRISE: 7 000-appareils Proxy Botnet Utilisation de l'IoT, Systèmes EOL Démontants aux États-Unis - Opération néerlandaise<br>BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. - Dutch Operation A joint law enforcement operation undertaken by Dutch and U.S. authorities has dismantled a criminal proxy network that\'s powered by thousands of infected Internet of Things (IoT) and end-of-life (EoL) devices, enlisting them into a botnet for providing anonymity to malicious actors. In conjunction with the domain seizure, Russian nationals, Alexey Viktorovich Chertkov, 37, Kirill Vladimirovich]]> 2025-05-09T21:58:00+00:00 https://thehackernews.com/2025/05/breaking-7000-device-proxy-botnet-using.html www.secnews.physaphae.fr/article.php?IdArticle=8673788 False Legislation None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Ottercookie V4 ajoute la détection de VM et Chrome, Capacités de vol d'identification Metamask<br>OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities The North Korean threat actors behind the Contagious Interview campaign have been observed using updated versions of a cross-platform malware called OtterCookie with capabilities to steal credentials from web browsers and other files. NTT Security Holdings, which detailed the new findings, said the attackers have "actively and continuously" updated the malware, introducing versions v3 and v4 in]]> 2025-05-09T21:55:00+00:00 https://thehackernews.com/2025/05/ottercookie-v4-adds-vm-detection-and.html www.secnews.physaphae.fr/article.php?IdArticle=8673789 False Malware,Threat None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les courtiers d'accès initiaux ciblent les dirigeants du Brésil via le spam NF-E et les essais RMM légitimes<br>Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials Cybersecurity researchers are warning of a new campaign that\'s targeting Portuguese-speaking users in Brazil with trial versions of commercial remote monitoring and management (RMM) software since January 2025. "The spam message uses the Brazilian electronic invoice system, NF-e, as a lure to entice users into clicking hyperlinks and accessing malicious content hosted in Dropbox," Cisco Talos]]> 2025-05-09T17:10:00+00:00 https://thehackernews.com/2025/05/initial-access-brokers-target-brazil.html www.secnews.physaphae.fr/article.php?IdArticle=8673657 False Spam,Commercial None None The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Déploiement d'agents d'IA? Apprenez à les sécuriser avant que les pirates ne frappent votre entreprise<br>Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business AI agents are changing the way businesses work. They can answer questions, automate tasks, and create better user experiences. But with this power comes new risks - like data leaks, identity theft, and malicious misuse. If your company is exploring or already using AI agents, you need to ask: Are they secure? AI agents work with sensitive data and make real-time decisions. If they\'re not]]> 2025-05-09T16:41:00+00:00 https://thehackernews.com/2025/05/deploying-ai-agents-learn-to-secure.html www.secnews.physaphae.fr/article.php?IdArticle=8673658 False None None None The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les packages NPM malveillants infectent 3200+ utilisateurs de curseur avec une porte dérobée, voler des informations d'identification<br>Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials Cybersecurity researchers have flagged three malicious npm packages that are designed to target the Apple macOS version of Cursor, a popular artificial intelligence (AI)-powered source code editor. "Disguised as developer tools offering \'the cheapest Cursor API,\' these packages steal user credentials, fetch an encrypted payload from threat actor-controlled infrastructure, overwrite Cursor\'s]]> 2025-05-09T16:27:00+00:00 https://thehackernews.com/2025/05/malicious-npm-packages-infect-3200.html www.secnews.physaphae.fr/article.php?IdArticle=8673659 False Tool,Threat None None The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Au-delà de la gestion de la vulnérabilité - pouvez-vous cve ce que je cve?<br>Beyond Vulnerability Management – Can You CVE What I CVE? The Vulnerability Treadmill The reactive nature of vulnerability management, combined with delays from policy and process, strains security teams. Capacity is limited and patching everything immediately is a struggle. Our Vulnerability Operation Center (VOC) dataset analysis identified 1,337,797 unique findings (security issues) across 68,500 unique customer assets. 32,585 of them were distinct]]> 2025-05-09T15:30:00+00:00 https://thehackernews.com/2025/05/beyond-vulnerability-management-cves.html www.secnews.physaphae.fr/article.php?IdArticle=8673638 False Vulnerability,Patching None None The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Google déploie les protections d'IA à disque pour détecter les escroqueries dans Chrome et Android<br>Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android Google on Thursday announced it\'s rolling out new artificial intelligence (AI)-powered countermeasures to combat scams across Chrome, Search, and Android. The tech giant said it will begin using Gemini Nano, its on-device large language model (LLM), to improve Safe Browsing in Chrome 137 on desktops. "The on-device approach provides instant insight on risky websites and allows us to offer]]> 2025-05-09T12:43:00+00:00 https://thehackernews.com/2025/05/google-rolls-out-on-device-ai.html www.secnews.physaphae.fr/article.php?IdArticle=8673565 False Mobile None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les pirates chinois exploitent SAP RCE FLAW CVE-2025-31324, Déployer SuperShell, basé à Golang,<br>Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell A China-linked unnamed threat actor dubbed Chaya_004 has been observed exploiting a recently disclosed security flaw in SAP NetWeaver. Forescout Vedere Labs, in a report published today, said it uncovered a malicious infrastructure likely associated with the hacking group weaponizing CVE-2025-31324 (CVSS score: 10.0) since April 29, 2025. CVE-2025-31324 refers to a critical SAP NetWeaver flaw]]> 2025-05-09T09:59:00+00:00 https://thehackernews.com/2025/05/chinese-hackers-exploit-sap-rce-flaw.html www.secnews.physaphae.fr/article.php?IdArticle=8673508 False Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Plus de 38 000 sous-domaines Freedrain ont trouvé l'exploitation du référencement pour voler des phrases de graines de portefeuille cryptographique<br>38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases Cybersecurity researchers have exposed what they say is an "industrial-scale, global cryptocurrency phishing operation" engineered to steal digital assets from cryptocurrency wallets for several years. The campaign has been codenamed FreeDrain by threat intelligence firms SentinelOne and Validin. "FreeDrain uses SEO manipulation, free-tier web services (like gitbook.io, webflow.io, and github.io]]> 2025-05-08T20:53:00+00:00 https://thehackernews.com/2025/05/38000-freedrain-subdomains-found.html www.secnews.physaphae.fr/article.php?IdArticle=8673308 False Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Sonicwall patchs 3 défauts dans les appareils SMA 100 permettant aux attaquants d'exécuter du code comme racine<br>SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root SonicWall has released patches to address three security flaws affecting SMA 100 Secure Mobile Access (SMA) appliances that could be fashioned to result in remote code execution. The vulnerabilities are listed below - CVE-2025-32819 (CVSS score: 8.8) - A vulnerability in SMA100 allows a remote authenticated attacker with SSL-VPN user privileges to bypass the path traversal checks and delete an]]> 2025-05-08T19:26:00+00:00 https://thehackernews.com/2025/05/sonicwall-patches-3-flaws-in-sma-100.html www.secnews.physaphae.fr/article.php?IdArticle=8673286 False Vulnerability,Mobile None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Qilin mène avril 2025 Ransomware Spike avec 45 violations à l'aide de malware Netxloader<br>Qilin Leads April 2025 Ransomware Spike with 45 Breaches Using NETXLOADER Malware Threat actors with ties to the Qilin ransomware family have leveraged malware known as SmokeLoader along with a previously undocumented .NET compiled loader codenamed NETXLOADER as part of a campaign observed in November 2024. "NETXLOADER is a new .NET-based loader that plays a critical role in cyber attacks," Trend Micro researchers Jacob Santos, Raymart Yambot, John Rainier Navato, Sarah Pearl]]> 2025-05-08T19:17:00+00:00 https://thehackernews.com/2025/05/qilin-leads-april-2025-ransomware-spike.html www.secnews.physaphae.fr/article.php?IdArticle=8673237 False Ransomware,Malware,Threat,Prediction None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les outils de sécurité seuls ne vous protégent pas - l'efficacité du contrôle fait<br>Security Tools Alone Don\\'t Protect You - Control Effectiveness Does 61% of security leaders reported suffering a breach due to failed or misconfigured controls over the past 12 months. This is despite having an average of 43 cybersecurity tools in place. This massive rate of security failure is clearly not a security investment problem. It is a configuration problem. Organizations are beginning to understand that a security control installed or deployed is not]]> 2025-05-08T16:30:00+00:00 https://thehackernews.com/2025/05/security-tools-alone-dont-protect-you.html www.secnews.physaphae.fr/article.php?IdArticle=8673188 False Tool None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Mirrorface cible le Japon et Taiwan avec Roamingmouse et amélioré les logiciels malveillants ANEL<br>MirrorFace Targets Japan and Taiwan with ROAMINGMOUSE and Upgraded ANEL Malware The nation-state threat actor known as MirrorFace has been observed deploying malware dubbed ROAMINGMOUSE as part of a cyber espionage campaign directed against government agencies and public institutions in Japan and Taiwan. The activity, detected by Trend Micro in March 2025, involved the use of spear-phishing lures to deliver an updated version of a backdoor called ANEL. "The ANEL file from]]> 2025-05-08T16:02:00+00:00 https://thehackernews.com/2025/05/mirrorface-targets-japan-and-taiwan.html www.secnews.physaphae.fr/article.php?IdArticle=8673189 False Malware,Threat,Prediction None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Hackers russes utilisant Clickfix Fake Captcha pour déployer de nouveaux logiciels malveillants LostKeys<br>Russian Hackers Using ClickFix Fake CAPTCHA to Deploy New LOSTKEYS Malware The Russia-linked threat actor known as COLDRIVER has been observed distributing a new malware called LOSTKEYS as part of an espionage-focused campaign using ClickFix-like social engineering lures. "LOSTKEYS is capable of stealing files from a hard-coded list of extensions and directories, along with sending system information and running processes to the attacker," the Google Threat]]> 2025-05-08T12:27:00+00:00 https://thehackernews.com/2025/05/russian-hackers-using-clickfix-fake.html www.secnews.physaphae.fr/article.php?IdArticle=8673091 False Malware,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Cisco Patches CVE-2025-20188 (10,0 CVSS) dans iOS XE qui permet des exploits racine via JWT<br>Cisco Patches CVE-2025-20188 (10.0 CVSS) in IOS XE That Enables Root Exploits via JWT Cisco has released software fixes to address a maximum-severity security flaw in its IOS XE Wireless Controller that could enable an unauthenticated, remote attacker to upload arbitrary files to a susceptible system. The vulnerability, tracked as CVE-2025-20188, has been rated 10.0 on the CVSS scoring system. "This vulnerability is due to the presence of a hard-coded JSON Web Token (JWT) on an]]> 2025-05-08T10:27:00+00:00 https://thehackernews.com/2025/05/cisco-patches-cve-2025-20188-100-cvss.html www.secnews.physaphae.fr/article.php?IdArticle=8673071 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Europol arrête six services DDOS pour la location utilisés dans les attaques mondiales<br>Europol Shuts Down Six DDoS-for-Hire Services Used in Global Attacks Europol has announced the takedown of distributed denial of service (DDoS)-for-hire services that were used to launch thousands of cyber-attacks across the world. In connection with the operation, Polish authorities have arrested four individuals and the United States has seized nine domains that are associated with the now-defunct platforms. "The suspects are believed to be behind six separate]]> 2025-05-07T19:24:00+00:00 https://thehackernews.com/2025/05/europol-shuts-down-six-ddos-for-hire.html www.secnews.physaphae.fr/article.php?IdArticle=8672785 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Plugin Ottokit WordPress avec 100k + installations frappées par des exploits ciblant plusieurs défauts<br>OttoKit WordPress Plugin with 100K+ Installs Hit by Exploits Targeting Multiple Flaws A second security flaw impacting the OttoKit (formerly SureTriggers) WordPress plugin has come under active exploitation in the wild. The vulnerability, tracked as CVE-2025-27007 (CVSS score: 9.8), is a privilege escalation bug impacting all versions of the plugin prior to and including version 1.0.82.  "This is due to the create_wp_connection() function missing a capability check and]]> 2025-05-07T19:14:00+00:00 https://thehackernews.com/2025/05/ottokit-wordpress-plugin-with-100k.html www.secnews.physaphae.fr/article.php?IdArticle=8672786 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Sysaid Patches 4 Flaws critiques permettant un RCE pré-AUTH dans la version sur site<br>SysAid Patches 4 Critical Flaws Enabling Pre-Auth RCE in On-Premise Version Cybersecurity researchers have disclosed multiple security flaw in the on-premise version of SysAid IT support software that could be exploited to achieve pre-authenticated remote code execution with elevated privileges. The vulnerabilities, tracked as CVE-2025-2775, CVE-2025-2776, and CVE-2025-2777, have all been described as XML External Entity (XXE) injections, which occur when an attacker is]]> 2025-05-07T17:01:00+00:00 https://thehackernews.com/2025/05/sysaid-patches-4-critical-flaws.html www.secnews.physaphae.fr/article.php?IdArticle=8672729 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Réévaluation des SSE: une analyse technique de l'écart de la protection du dernier mile<br>Reevaluating SSEs: A Technical Gap Analysis of Last-Mile Protection Security Service Edge (SSE) platforms have become the go-to architecture for securing hybrid work and SaaS access. They promise centralized enforcement, simplified connectivity, and consistent policy control across users and devices. But there\'s a problem: they stop short of where the most sensitive user activity actually happens-the browser. This isn\'t a small omission. It\'s a structural]]> 2025-05-07T16:26:00+00:00 https://thehackernews.com/2025/05/reevaluating-sses-technical-gap.html www.secnews.physaphae.fr/article.php?IdArticle=8672730 False Legislation,Cloud,Technical None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Jouez à Ransomware exploité Windows CVE-2025-29824 comme zéro jour pour briser l'organisation américaine<br>Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day to Breach U.S. Organization Threat actors with links to the Play ransomware family exploited a recently patched security flaw in Microsoft Windows as a zero-day as part of an attack targeting an unnamed organization in the United States. The attack, per the Symantec Threat Hunter Team, part of Broadcom, leveraged CVE-2025-29824, a privilege escalation flaw in the Common Log File System (CLFS) driver. It was patched by]]> 2025-05-07T16:14:00+00:00 https://thehackernews.com/2025/05/play-ransomware-exploited-windows-cve.html www.secnews.physaphae.fr/article.php?IdArticle=8672700 False Ransomware,Vulnerability,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les chercheurs découvrent les logiciels malveillants dans Fake Discord PYPI Package téléchargé plus de 11 500 fois<br>Researchers Uncover Malware in Fake Discord PyPI Package Downloaded 11,500+ Times Cybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI) repository that masquerades as a seemingly harmless Discord-related utility but incorporates a remote access trojan. The package in question is discordpydebug, which was uploaded to PyPI on March 21, 2022. It has been downloaded 11,574 times and continues to be available on the open-source registry.]]> 2025-05-07T13:07:00+00:00 https://thehackernews.com/2025/05/researchers-uncover-malware-in-fake.html www.secnews.physaphae.fr/article.php?IdArticle=8672656 False Malware None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) NSO Group a condamné à une amende de 168 millions de dollars pour avoir ciblé 1 400 utilisateurs de WhatsApp avec des logiciels espions Pegasus<br>NSO Group Fined $168M for Targeting 1,400 WhatsApp Users With Pegasus Spyware A federal jury on Tuesday decided that NSO Group must pay Meta-owned WhatsApp WhatsApp approximately $168 million in monetary damages, more than four months after a federal judge ruled that the Israeli company violated U.S. laws by exploiting WhatsApp servers to deploy Pegasus spyware, targeting over 1,400 individuals globally. WhatsApp originally filed the lawsuit against NSO Group in 2019,]]> 2025-05-07T11:52:00+00:00 https://thehackernews.com/2025/05/nso-group-fined-168m-for-targeting-1400.html www.secnews.physaphae.fr/article.php?IdArticle=8672607 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les pirates exploitent Samsung Magicinfo, Geovision IoT Flaws pour déployer Mirai Botnet<br>Hackers Exploit Samsung MagicINFO, GeoVision IoT Flaws to Deploy Mirai Botnet Threat actors have been observed actively exploiting security flaws in GeoVision end-of-life (EoL) Internet of Things (IoT) devices to corral them into a Mirai botnet for conducting distributed denial-of-service (DDoS) attacks. The activity, first observed by the Akamai Security Intelligence and Response Team (SIRT) in early April 2025, involves the exploitation of two operating system command]]> 2025-05-06T21:03:00+00:00 https://thehackernews.com/2025/05/hackers-exploit-samsung-magicinfo.html www.secnews.physaphae.fr/article.php?IdArticle=8672357 False Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) De nouvelles escroqueries d'investissement utilisent les publicités Facebook, les domaines RDGA et les vérifications IP pour filtrer les victimes<br>New Investment Scams Use Facebook Ads, RDGA Domains, and IP Checks to Filter Victims Cybersecurity researchers have lifted the lid on two threat actors that orchestrate investment scams through spoofed celebrity endorsements and conceal their activity through traffic distribution systems (TDSes). The activity clusters have been codenamed Reckless Rabbit and Ruthless Rabbit by DNS threat intelligence firm Infoblox. The attacks have been observed to lure victims with bogus]]> 2025-05-06T19:06:00+00:00 https://thehackernews.com/2025/05/new-investment-scams-use-facebook-ads.html www.secnews.physaphae.fr/article.php?IdArticle=8672311 False Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Tiers et références de machine: les pilotes silencieux derrière les pires violations de 2025<br>Third Parties and Machine Credentials: The Silent Drivers Behind 2025\\'s Worst Breaches It wasn\'t ransomware headlines or zero-day exploits that stood out most in this year\'s Verizon 2025 Data Breach Investigations Report (DBIR) - it was what fueled them. Quietly, yet consistently, two underlying factors played a role in some of the worst breaches: third-party exposure and machine credential abuse. According to the 2025 DBIR, third-party involvement in breaches doubled]]> 2025-05-06T16:55:00+00:00 https://thehackernews.com/2025/05/third-parties-and-machine-credentials.html www.secnews.physaphae.fr/article.php?IdArticle=8672281 False Ransomware,Data Breach,Vulnerability,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Microsoft avertit que les graphiques de barre par défaut pourraient laisser les applications Kubernetes exposées aux fuites de données<br>Microsoft Warns Default Helm Charts Could Leave Kubernetes Apps Exposed to Data Leaks Microsoft has warned that using pre-made templates, such as out-of-the-box Helm charts, during Kubernetes deployments could open the door to misconfigurations and leak valuable data. "While these \'plug-and-play\' options greatly simplify the setup process, they often prioritize ease of use over security," Michael Katchinskiy and Yossi Weizman from the Microsoft Defender for Cloud Research team]]> 2025-05-06T16:35:00+00:00 https://thehackernews.com/2025/05/microsoft-warns-default-helm-charts-for.html www.secnews.physaphae.fr/article.php?IdArticle=8672256 False Cloud None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Protection des données de l'identification ENTRA: essentielle ou exagérée?<br>Entra ID Data Protection: Essential or Overkill? Microsoft Entra ID (formerly Azure Active Directory) is the backbone of modern identity management, enabling secure access to the applications, data, and services your business relies on. As hybrid work and cloud adoption accelerate, Entra ID plays an even more central role - managing authentication, enforcing policy, and connecting users across distributed environments. That prominence also]]> 2025-05-06T15:30:00+00:00 https://thehackernews.com/2025/05/entra-id-data-protectionessential-or.html www.secnews.physaphae.fr/article.php?IdArticle=8672235 False Cloud None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Google corrige un défaut du système Android exploité activement en mai 2025 Mise à jour de sécurité<br>Google Fixes Actively Exploited Android System Flaw in May 2025 Security Update Google has released its monthly security updates for Android with fixes for 46 security flaws, including one vulnerability that it said has been exploited in the wild. The vulnerability in question is CVE-2025-27363 (CVSS score: 8.1), a high-severity flaw in the System component that could lead to local code execution without requiring any additional execution privileges. "The most severe of]]> 2025-05-06T11:16:00+00:00 https://thehackernews.com/2025/05/google-fixes-actively-exploited-android.html www.secnews.physaphae.fr/article.php?IdArticle=8672163 False Vulnerability,Mobile None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Flaw de Langflow critique ajouté à la liste CISA KEV au milieu des preuves d'exploitation en cours<br>Critical Langflow Flaw Added to CISA KEV List Amid Ongoing Exploitation Evidence A recently disclosed critical security flaw impacting the open-source Langflow platform has been added to the Known Exploited Vulnerabilities (KEV) catalog by the U.S. Cybersecurity and Infrastructure Security Agency (CISA), citing evidence of active exploitation. The vulnerability, tracked as CVE-2025-3248, carries a CVSS score of 9.8 out of a maximum of 10.0. "Langflow contains a missing]]> 2025-05-06T09:54:00+00:00 https://thehackernews.com/2025/05/critical-langflow-flaw-added-to-cisa.html www.secnews.physaphae.fr/article.php?IdArticle=8672142 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les défauts d'aérlay vermable activent un clic zéro sur les appareils Apple via le Wi-Fi public<br>Wormable AirPlay Flaws Enable Zero-Click RCE on Apple Devices via Public Wi-Fi Cybersecurity researchers have disclosed a series of now-patched security vulnerabilities in Apple\'s AirPlay protocol that, if successfully exploited, could enable an attacker to take over susceptible devices supporting the proprietary wireless technology. The shortcomings have been collectively codenamed AirBorne by Israeli cybersecurity company Oligo. "These vulnerabilities can be chained by]]> 2025-05-05T22:36:00+00:00 https://thehackernews.com/2025/05/wormable-airplay-flaws-enable-zero.html www.secnews.physaphae.fr/article.php?IdArticle=8671938 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Commvault CVE-2025-34028 ajouté à CISA KEV après l'exploitation active confirmée<br>Commvault CVE-2025-34028 Added to CISA KEV After Active Exploitation Confirmed The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a maximum-severity security flaw impacting Commvault Command Center to its Known Exploited Vulnerabilities (KEV) catalog, a little over a week after it was publicly disclosed. The vulnerability in question is CVE-2025-34028 (CVSS score: 10.0), a path traversal bug that affects 11.38 Innovation Release, from versions]]> 2025-05-05T21:31:00+00:00 https://thehackernews.com/2025/05/commvault-cve-2025-34028-added-to-cisa.html www.secnews.physaphae.fr/article.php?IdArticle=8671939 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) ⚡ Récapitulatif hebdomadaire: hacks d'État à l'échelle nationale, alertes spyware, logiciels malveillants Deepfake, bourse de chaîne d'approvisionnement<br>⚡ Weekly Recap: Nation-State Hacks, Spyware Alerts, Deepfake Malware, Supply Chain Backdoors What if attackers aren\'t breaking in-they\'re already inside, watching, and adapting? This week showed a sharp rise in stealth tactics built for long-term access and silent control. AI is being used to shape opinions. Malware is hiding inside software we trust. And old threats are returning under new names. The real danger isn\'t just the breach-it\'s not knowing who\'s still lurking in your]]> 2025-05-05T16:59:00+00:00 https://thehackernews.com/2025/05/weekly-recap-nation-state-hacks-spyware.html www.secnews.physaphae.fr/article.php?IdArticle=8671823 False Malware None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) La perfection est un mythe. Levier n'est pas \\ 't: comment les petites équipes peuvent sécuriser leur espace de travail Google<br>Perfection is a Myth. Leverage Isn\\'t: How Small Teams Can Secure Their Google Workspace Let\'s be honest: if you\'re one of the first (or the first) security hires at a small or midsize business, chances are you\'re also the unofficial CISO, SOC, IT Help Desk, and whatever additional roles need filling. You\'re not running a security department. You are THE security department. You\'re getting pinged about RFPs in one area, and reviewing phishing alerts in another, all while sifting]]> 2025-05-05T16:30:00+00:00 https://thehackernews.com/2025/05/perfection-is-myth-leverage-isnt-how.html www.secnews.physaphae.fr/article.php?IdArticle=8671824 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les poulets Golden déploient TerRasteRerev2 pour voler des informations d'identification du navigateur et des données de portefeuille crypto<br>Golden Chickens Deploy TerraStealerV2 to Steal Browser Credentials and Crypto Wallet Data The threat actors known as Golden Chickens have been attributed to two new malware families dubbed TerraStealerV2 and TerraLogger, suggesting continued development efforts to fine-tune and diversify their arsenal. "TerraStealerV2 is designed to collect browser credentials, cryptocurrency wallet data, and browser extension information," Recorded Future Insikt Group said. "TerraLogger, by contrast]]> 2025-05-05T11:09:00+00:00 https://thehackernews.com/2025/05/golden-chickens-deploy-terrastealerv2.html www.secnews.physaphae.fr/article.php?IdArticle=8671701 False Malware,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les modules de go malveillants fournissent des logiciels malveillants Linux à l'attribution du disque dans une attaque de chaîne d'approvisionnement avancée<br>Malicious Go Modules Deliver Disk-Wiping Linux Malware in Advanced Supply Chain Attack Cybersecurity researchers have discovered three malicious Go modules that include obfuscated code to fetch next-stage payloads that can irrevocably overwrite a Linux system\'s primary disk and render it unbootable. The names of the packages are listed below - github[.]com/truthfulpharm/prototransform github[.]com/blankloggia/go-mcp github[.]com/steelpoor/tlsproxy "Despite appearing legitimate,]]> 2025-05-03T20:01:00+00:00 https://thehackernews.com/2025/05/malicious-go-modules-deliver-disk.html www.secnews.physaphae.fr/article.php?IdArticle=8671070 False Malware None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les pirates iraniens maintiennent un accès à 2 ans au Moyen-Orient CNI via des défauts VPN et des logiciels malveillants<br>Iranian Hackers Maintain 2-Year Access to Middle East CNI via VPN Flaws and Malware An Iranian state-sponsored threat group has been attributed to a long-term cyber intrusion aimed at a critical national infrastructure (CNI) in the Middle East that lasted nearly two years. The activity, which lasted from at least May 2023 to February 2025, entailed "extensive espionage operations and suspected network prepositioning – a tactic often used to maintain persistent access for future]]> 2025-05-03T15:03:00+00:00 https://thehackernews.com/2025/05/iranian-hackers-maintain-2-year-access.html www.secnews.physaphae.fr/article.php?IdArticle=8670979 False Malware,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les États-Unis facturent un pirate yéménite derrière le ransomware du Royaume noir ciblant 1 500 systèmes<br>U.S. Charges Yemeni Hacker Behind Black Kingdom Ransomware Targeting 1,500 Systems The U.S. Department of Justice (DoJ) on Thursday announced charges against a 36-year-old Yemeni national for allegedly deploying the Black Kingdom ransomware against global targets, including businesses, schools, and hospitals in the United States. Rami Khaled Ahmed of Sana\'a, Yemen, has been charged with one count of conspiracy, one count of intentional damage to a protected computer, and one]]> 2025-05-03T12:36:00+00:00 https://thehackernews.com/2025/05/us-charges-yemeni-hacker-behind-black.html www.secnews.physaphae.fr/article.php?IdArticle=8670925 False Ransomware None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Tiktok a critiqué 530 millions d'euros du RGPD pour avoir envoyé un UE. Données à la Chine<br>TikTok Slammed With €530 Million GDPR Fine for Sending E.U. Data to China Ireland\'s Data Protection Commission (DPC) on Tuesday fined popular video-sharing platform TikTok €530 million ($601 million) for infringing data protection regulations in the region by transferring European users\' data to China. "TikTok infringed the GDPR regarding its transfers of EEA [European Economic Area] User Data to China and its transparency requirements," the DPC said in a statement. "]]> 2025-05-02T17:55:00+00:00 https://thehackernews.com/2025/05/tiktok-slammed-with-530-million-gdpr.html www.secnews.physaphae.fr/article.php?IdArticle=8670572 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Comment automatiser la réponse consultative des CVE et de la vulnérabilité avec des dents<br>How to Automate CVE and Vulnerability Advisory Response with Tines Run by the team at workflow orchestration and AI platform Tines, the Tines library features pre-built workflows shared by security practitioners from across the community - all free to import and deploy through the platform\'s Community Edition. A recent standout is a workflow that automates monitoring for security advisories from CISA and other vendors, enriches advisories with CrowdStrike]]> 2025-05-02T16:00:00+00:00 https://thehackernews.com/2025/05/how-to-automate-cve-and-vulnerability.html www.secnews.physaphae.fr/article.php?IdArticle=8670533 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) MintSloader laisse tomber Ghostweaver via Phishing, ClickFix - utilise DGA, TLS pour les attaques furtives<br>MintsLoader Drops GhostWeaver via Phishing, ClickFix - Uses DGA, TLS for Stealth Attacks The malware loader known as MintsLoader has been used to deliver a PowerShell-based remote access trojan called GhostWeaver. "MintsLoader operates through a multi-stage infection chain involving obfuscated JavaScript and PowerShell scripts," Recorded Future\'s Insikt Group said in a report shared with The Hacker News. "The malware employs sandbox and virtual machine evasion techniques, a domain]]> 2025-05-02T14:27:00+00:00 https://thehackernews.com/2025/05/mintsloader-drops-ghostweaver-via.html www.secnews.physaphae.fr/article.php?IdArticle=8670507 False Malware None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Microsoft définit la valeur par défaut de PassKeys pour les nouveaux comptes; 15 milliards d'utilisateurs obtiennent une prise en charge sans mot de passe<br>Microsoft Sets Passkeys Default for New Accounts; 15 Billion Users Gain Passwordless Support A year after Microsoft announced passkeys support for consumer accounts, the tech giant has announced a big change that pushes individuals signing up for new accounts to use the phishing-resistant authentication method by default. "Brand new Microsoft accounts will now be \'passwordless by default,\'" Microsoft\'s Joy Chik and Vasu Jakkal said. "New users will have several passwordless options for]]> 2025-05-02T12:10:00+00:00 https://thehackernews.com/2025/05/microsoft-sets-passkeys-default-for-new.html www.secnews.physaphae.fr/article.php?IdArticle=8670461 False None None 4.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Le faux plugin de sécurité sur WordPress permet l'accès à l'administrateur distant pour les attaquants<br>Fake Security Plugin on WordPress Enables Remote Admin Access for Attackers Cybersecurity researchers have shed light on a new campaign targeting WordPress sites that disguises the malware as a security plugin. The plugin, which goes by the name "WP-antymalwary-bot.php," comes with a variety of features to maintain access, hide itself from the admin dashboard, and execute remote code. "Pinging functionality that can report back to a command-and-control (C&C) server]]> 2025-05-01T21:17:00+00:00 https://thehackernews.com/2025/05/fake-security-plugin-on-wordpress.html www.secnews.physaphae.fr/article.php?IdArticle=8670150 False Malware None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Pourquoi les meilleures équipes SOC se déplacent vers la détection et la réponse du réseau<br>Why top SOC teams are shifting to Network Detection and Response Security Operations Center (SOC) teams are facing a fundamentally new challenge — traditional cybersecurity tools are failing to detect advanced adversaries who have become experts at evading endpoint-based defenses and signature-based detection systems. The reality of these “invisible intruders” is driving a significant need for a multi-layered approach to detecting threats,]]> 2025-05-01T16:55:00+00:00 https://thehackernews.com/2025/05/why-top-soc-teams-are-shifting-to.html www.secnews.physaphae.fr/article.php?IdArticle=8670116 False Tool None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Claude AI a exploité pour exploiter plus de 100 fausses personnalités politiques dans la campagne d'influence mondiale<br>Claude AI Exploited to Operate 100+ Fake Political Personas in Global Influence Campaign Artificial intelligence (AI) company Anthropic has revealed that unknown threat actors leveraged its Claude chatbot for an "influence-as-a-service" operation to engage with authentic accounts across Facebook and X. The sophisticated activity, branded as financially-motivated, is said to have used its AI tool to orchestrate 100 distinct persons on the two social media platforms, creating a]]> 2025-05-01T16:32:00+00:00 https://thehackernews.com/2025/05/claude-ai-exploited-to-operate-100-fake.html www.secnews.physaphae.fr/article.php?IdArticle=8670117 False Tool,Threat None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les nouvelles recherches révèlent: 95% des correctifs AppSec ne réduisent pas le risque<br>New Research Reveals: 95% of AppSec Fixes Don\\'t Reduce Risk For over a decade, application security teams have faced a brutal irony: the more advanced the detection tools became, the less useful their results proved to be. As alerts from static analysis tools, scanners, and CVE databases surged, the promise of better security grew more distant. In its place, a new reality took hold-one defined by alert fatigue and overwhelmed teams. According to OX]]> 2025-05-01T15:14:00+00:00 https://thehackernews.com/2025/05/new-research-reveals-95-of-appsec-fixes.html www.secnews.physaphae.fr/article.php?IdArticle=8670109 False Tool None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Darkwatchman, le malware du shérif a frappé la Russie et l'Ukraine avec des tactiques furtives et de qualité nationale<br>DarkWatchman, Sheriff Malware Hit Russia and Ukraine with Stealth and Nation-Grade Tactics Russian companies have been targeted as part of a large-scale phishing campaign that\'s designed to deliver a known malware called DarkWatchman. Targets of the attacks include entities in the media, tourism, finance and insurance, manufacturing, retail, energy, telecom, transport, and biotechnology sectors, Russian cybersecurity company F6 said. The activity is assessed to be the work of a]]> 2025-05-01T14:57:00+00:00 https://thehackernews.com/2025/05/darkwatchman-sheriff-malware-hit-russia.html www.secnews.physaphae.fr/article.php?IdArticle=8670110 False Malware None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Commvault confirme que les pirates exploitent le CVE-2025-3928 comme zéro-jour en violation Azure<br>Commvault Confirms Hackers Exploited CVE-2025-3928 as Zero-Day in Azure Breach Enterprise data backup platform Commvault has revealed that an unknown nation-state threat actor breached its Microsoft Azure environment by exploiting CVE-2025-3928 but emphasized there is no evidence of unauthorized data access. "This activity has affected a small number of customers we have in common with Microsoft, and we are working with those customers to provide assistance," the company]]> 2025-05-01T13:41:00+00:00 https://thehackernews.com/2025/05/commvault-confirms-hackers-exploited.html www.secnews.physaphae.fr/article.php?IdArticle=8670098 False Vulnerability,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Sonicwall confirme l'exploitation active des défauts affectant plusieurs modèles d'appareils<br>SonicWall Confirms Active Exploitation of Flaws Affecting Multiple Appliance Models SonicWall has revealed that two now-patched security flaws impacting its SMA100 Secure Mobile Access (SMA) appliances have been exploited in the wild. The vulnerabilities in question are listed below - CVE-2023-44221 (CVSS score: 7.2) - Improper neutralization of special elements in the SMA100 SSL-VPN management interface allows a remote authenticated attacker with administrative privilege to]]> 2025-05-01T11:52:00+00:00 https://thehackernews.com/2025/05/sonicwall-confirms-active-exploitation.html www.secnews.physaphae.fr/article.php?IdArticle=8670082 False Vulnerability,Mobile None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les chercheurs montrent comment l'injection rapide de MCP peut être utilisée pour l'attaque et la défense<br>Researchers Demonstrate How MCP Prompt Injection Can Be Used for Both Attack and Defense As the field of artificial intelligence (AI) continues to evolve at a rapid pace, new research has found how techniques that render the Model Context Protocol (MCP) susceptible to prompt injection attacks could be used to develop security tooling or identify malicious tools, according to a new report from Tenable. MCP, launched by Anthropic in November 2024, is a framework designed to connect]]> 2025-04-30T21:29:00+00:00 https://thehackernews.com/2025/04/experts-uncover-critical-mcp-and-a2a.html www.secnews.physaphae.fr/article.php?IdArticle=8670009 False Tool None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) [Webinaire gratuit] Guide pour sécuriser l'ensemble de votre cycle de vie d'identité contre les menaces alimentées par l'IA<br>[Free Webinar] Guide to Securing Your Entire Identity Lifecycle Against AI-Powered Threats How Many Gaps Are Hiding in Your Identity System? It\'s not just about logins anymore. Today\'s attackers don\'t need to “hack” in-they can trick their way in. Deepfakes, impersonation scams, and AI-powered social engineering are helping them bypass traditional defenses and slip through unnoticed. Once inside, they can take over accounts, move laterally, and cause long-term damage-all without]]> 2025-04-30T16:56:00+00:00 https://thehackernews.com/2025/04/free-webinar-guide-to-securing-your.html www.secnews.physaphae.fr/article.php?IdArticle=8669957 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les pirates chinois abusent IPv6 SLAAC pour les attaques AITM via l'outil de mouvement latéral Spellbinder<br>Chinese Hackers Abuse IPv6 SLAAC for AitM Attacks via Spellbinder Lateral Movement Tool A China-aligned advanced persistent threat (APT) group called TheWizards has been linked to a lateral movement tool called Spellbinder that can facilitate adversary-in-the-middle (AitM) attacks. "Spellbinder enables adversary-in-the-middle (AitM) attacks, through IPv6 stateless address autoconfiguration (SLAAC) spoofing, to move laterally in the compromised network, intercepting packets and]]> 2025-04-30T16:35:00+00:00 https://thehackernews.com/2025/04/chinese-hackers-abuse-ipv6-slaac-for.html www.secnews.physaphae.fr/article.php?IdArticle=8669958 False Tool,Threat None 4.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Customer Account Takeovers: The Multi-Billion Dollar Problem You Don\\'t Know About Everyone has cybersecurity stories involving family members. Here\'s a relatively common one. The conversation usually goes something like this:  “The strangest thing happened to my streaming account. I got locked out of my account, so I had to change my password. When I logged back in, all my shows were gone. Everything was in Spanish and there were all these Spanish shows I\'ve never seen]]> 2025-04-30T15:54:00+00:00 https://thehackernews.com/2025/04/customer-account-takeovers-multi.html www.secnews.physaphae.fr/article.php?IdArticle=8669911 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Nebulous Mantis Targets NATO-Linked Entities with Multi-Stage Malware Attacks Cybersecurity researchers have shed light on a Russian-speaking cyber espionage group called Nebulous Mantis that has deployed a remote access trojan called RomCom RAT since mid-2022. RomCom "employs advanced evasion techniques, including living-off-the-land (LOTL) tactics and encrypted command and control (C2) communications, while continuously evolving its infrastructure – leveraging]]> 2025-04-30T15:50:00+00:00 https://thehackernews.com/2025/04/nebulous-mantis-targets-nato-linked.html www.secnews.physaphae.fr/article.php?IdArticle=8669983 False Malware None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) RansomHub est devenu sombre le 1er avril; Les affiliés ont fui à Qilin, Dragonforce a revendiqué le contrôle<br>RansomHub Went Dark April 1; Affiliates Fled to Qilin, DragonForce Claimed Control Cybersecurity researchers have revealed that RansomHub\'s online infrastructure has "inexplicably" gone offline as of April 1, 2025, prompting concerns among affiliates of the ransomware-as-a-service (RaaS) operation. Singaporean cybersecurity company Group-IB said that this may have caused affiliates to migrate to Qilin, given that "disclosures on its DLS [data leak site] have doubled since]]> 2025-04-30T15:45:00+00:00 https://thehackernews.com/2025/04/ransomhub-went-dark-april-1-affiliates.html www.secnews.physaphae.fr/article.php?IdArticle=8669912 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Meta lance le cadre de pare-feu lame pour arrêter les jailbreaks, les injections et le code d'insécurité<br>Meta Launches LlamaFirewall Framework to Stop AI Jailbreaks, Injections, and Insecure Code Meta on Tuesday announced LlamaFirewall, an open-source framework designed to secure artificial intelligence (AI) systems against emerging cyber risks such as prompt injection, jailbreaks, and insecure code, among others. The framework, the company said, incorporates three guardrails, including PromptGuard 2, Agent Alignment Checks, and CodeShield. PromptGuard 2 is designed to detect direct]]> 2025-04-30T12:38:00+00:00 https://thehackernews.com/2025/04/meta-launches-llamafirewall-framework.html www.secnews.physaphae.fr/article.php?IdArticle=8669833 False None None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Indian Cour ordonne une action pour bloquer le courrier des protons sur les allégations d'abus de profondeur de l'IA Deepfake<br>Indian Court Orders Action to Block Proton Mail Over AI Deepfake Abuse Allegations A high court in the Indian state of Karnataka has ordered the blocking of end-to-end encrypted email provider Proton Mail across the country. The High Court of Karnataka, on April 29, said the ruling was in response to a legal complaint filed by M Moser Design Associated India Pvt Ltd in January 2025. The complaint alleged its staff had received e-mails containing obscene, abusive]]> 2025-04-30T10:15:00+00:00 https://thehackernews.com/2025/04/indian-court-orders-action-to-block.html www.secnews.physaphae.fr/article.php?IdArticle=8669787 False None None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) WhatsApp lance un traitement privé pour activer les fonctionnalités de l'IA tout en protégeant la confidentialité des messages<br>WhatsApp Launches Private Processing to Enable AI Features While Protecting Message Privacy Popular messaging app WhatsApp on Tuesday unveiled a new technology called Private Processing to enable artificial intelligence (AI) capabilities in a privacy-preserving manner. "Private Processing will allow users to leverage powerful optional AI features – like summarizing unread messages or editing help – while preserving WhatsApp\'s core privacy promise," the Meta-owned service said in a]]> 2025-04-29T22:52:00+00:00 https://thehackernews.com/2025/04/whatsapp-launches-private-processing-to.html www.secnews.physaphae.fr/article.php?IdArticle=8669572 False None None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) De nouveaux rapports découvrent les jailbreaks, le code dangereux et les risques de vol de données dans les principaux systèmes d'IA<br>New Reports Uncover Jailbreaks, Unsafe Code, and Data Theft Risks in Leading AI Systems Various generative artificial intelligence (GenAI) services have been found vulnerable to two types of jailbreak attacks that make it possible to produce illicit or dangerous content. The first of the two techniques, codenamed Inception, instructs an AI tool to imagine a fictitious scenario, which can then be adapted into a second scenario within the first one where there exists no safety]]> 2025-04-29T21:48:00+00:00 https://thehackernews.com/2025/04/new-reports-uncover-jailbreaks-unsafe.html www.secnews.physaphae.fr/article.php?IdArticle=8669573 False Tool None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Sentinélone découvre la campagne d'espionnage chinois ciblant son infrastructure et ses clients<br>SentinelOne Uncovers Chinese Espionage Campaign Targeting Its Infrastructure and Clients Cybersecurity company SentinelOne has revealed that a China-nexus threat cluster dubbed PurpleHaze conducted reconnaissance attempts against its infrastructure and some of its high-value customers. "We first became aware of this threat cluster during a 2024 intrusion conducted against an organization previously providing hardware logistics services for SentinelOne employees," security]]> 2025-04-29T18:37:00+00:00 https://thehackernews.com/2025/04/sentinelone-uncovers-chinese-espionage.html www.secnews.physaphae.fr/article.php?IdArticle=8669502 False Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Procédure pas à pas de produit: sécurisation de Microsoft Copilot avec RECO<br>Product Walkthrough: Securing Microsoft Copilot with Reco Find out how Reco keeps Microsoft 365 Copilot safe by spotting risky prompts, protecting data, managing user access, and identifying threats - all while keeping productivity high. Microsoft 365 Copilot promises to boost productivity by turning natural language prompts into actions. Employees can generate reports, comb through data, or get instant answers just by asking Copilot.  However,]]> 2025-04-29T16:30:00+00:00 https://thehackernews.com/2025/04/product-walkthrough-securing-microsoft.html www.secnews.physaphae.fr/article.php?IdArticle=8669430 False None None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Google rapporte 75 jours zéro exploités en 2024 - 44% des produits de sécurité d'entreprise ciblés<br>Google Reports 75 Zero-Days Exploited in 2024 - 44% Targeted Enterprise Security Products Google has revealed that it observed 75 zero-day vulnerabilities exploited in the wild in 2024, down from 98 in 2023.  Of the 75 zero-days, 44% of them targeted enterprise products. As many as 20 flaws were identified in security software and appliances. "Zero-day exploitation of browsers and mobile devices fell drastically, decreasing by about a third for browsers and by about half for]]> 2025-04-29T15:41:00+00:00 https://thehackernews.com/2025/04/google-reports-75-zero-days-exploited.html www.secnews.physaphae.fr/article.php?IdArticle=8669431 False Vulnerability,Threat,Mobile None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les cibles d'attaque malveillante ciblent les dirigeants du congrès ouïghour du monde via l'outil Uyghudit ++ Trojanisé<br>Malware Attack Targets World Uyghur Congress Leaders via Trojanized UyghurEdit++ Tool In a new campaign detected in March 2025, senior members of the World Uyghur Congress (WUC) living in exile have been targeted by a Windows-based malware that\'s capable of conducting surveillance. The spear-phishing campaign involved the use of a trojanized version of a legitimate open-source word processing and spell check tool called UyghurEdit++ developed to support the use of the Uyghur]]> 2025-04-29T11:13:00+00:00 https://thehackernews.com/2025/04/malware-attack-targets-world-uyghur.html www.secnews.physaphae.fr/article.php?IdArticle=8669338 False Malware,Tool None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) La CISA ajoute des défauts Broadcom et Commvault activement exploités à la base de données KEV<br>CISA Adds Actively Exploited Broadcom and Commvault Flaws to KEV Database The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added two high-severity security flaws impacting Broadcom Brocade Fabric OS and Commvault Web Server to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The vulnerabilities in question are listed below - CVE-2025-1976 (CVSS score: 8.6) - A code injection flaw]]> 2025-04-29T09:51:00+00:00 https://thehackernews.com/2025/04/cisa-adds-actively-exploited-broadcom.html www.secnews.physaphae.fr/article.php?IdArticle=8669318 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) ⚡ Recaps hebdomadaire: Exploit SAP critique, phishing alimenté par l'IA, violations majeures, nouveaux CVE et plus<br>⚡ Weekly Recap: Critical SAP Exploit, AI-Powered Phishing, Major Breaches, New CVEs & More What happens when cybercriminals no longer need deep skills to breach your defenses? Today\'s attackers are armed with powerful tools that do the heavy lifting - from AI-powered phishing kits to large botnets ready to strike. And they\'re not just after big corporations. Anyone can be a target when fake identities, hijacked infrastructure, and insider tricks are used to slip past security]]> 2025-04-28T17:48:00+00:00 https://thehackernews.com/2025/04/weekly-recap-critical-sap-exploit-ai.html www.secnews.physaphae.fr/article.php?IdArticle=8669011 False Tool,Threat None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Comment les violations commencent: décomposer 5 vulnes réelles<br>How Breaches Start: Breaking Down 5 Real Vulns Not every security vulnerability is high risk on its own - but in the hands of an advanced attacker, even small weaknesses can escalate into major breaches. These five real vulnerabilities, uncovered by Intruder\'s bug-hunting team, reveal how attackers turn overlooked flaws into serious security incidents. 1. Stealing AWS Credentials with a Redirect Server-Side Request Forgery (SSRF) is a]]> 2025-04-28T16:30:00+00:00 https://thehackernews.com/2025/04/how-breaches-start-breaking-down-5-real.html www.secnews.physaphae.fr/article.php?IdArticle=8668950 False Vulnerability None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Earth Kurma cible l'Asie du Sud-Est avec des rootkits et des outils de vol de données basés sur le cloud<br>Earth Kurma Targets Southeast Asia With Rootkits and Cloud-Based Data Theft Tools Government and telecommunications sectors in Southeast Asia have become the target of a "sophisticated" campaign undertaken by a new advanced persistent threat (APT) group called Earth Kurma since June 2024. The attacks, per Trend Micro, have leveraged custom malware, rootkits, and cloud storage services for data exfiltration. The Philippines, Vietnam, Thailand, and Malaysia are among the]]> 2025-04-28T14:37:00+00:00 https://thehackernews.com/2025/04/earth-kurma-targets-southeast-asia-with.html www.secnews.physaphae.fr/article.php?IdArticle=8668906 False Malware,Tool,Threat,Prediction,Cloud None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Utilisateurs de WooCommerce ciblés par une fausse campagne de phishing de patch déploiement du site Barades<br>WooCommerce Users Targeted by Fake Patch Phishing Campaign Deploying Site Backdoors Cybersecurity researchers are warning about a large-scale phishing campaign targeting WooCommerce users with a fake security alert urging them to download a "critical patch" but deploy a backdoor instead. WordPress security company Patchstack described the activity as sophisticated and a variant of another campaign observed in December 2023 that employed a fake CVE ploy to breach sites running]]> 2025-04-28T13:36:00+00:00 https://thehackernews.com/2025/04/woocommerce-users-targeted-by-fake.html www.secnews.physaphae.fr/article.php?IdArticle=8668877 False None None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les pirates exploitent les défauts de CMS artisanaux critiques; Des centaines de serveurs probablement compromis<br>Hackers Exploit Critical Craft CMS Flaws; Hundreds of Servers Likely Compromised Threat actors have been observed exploiting two newly disclosed critical security flaws in Craft CMS in zero-day attacks to breach servers and gain unauthorized access. The attacks, first observed by Orange Cyberdefense SensePost on February 14, 2025, involve chaining the below vulnerabilities - CVE-2024-58136 (CVSS score: 9.0) - An improper protection of alternate path flaw in the Yii PHP]]> 2025-04-28T12:43:00+00:00 https://thehackernews.com/2025/04/hackers-exploit-critical-craft-cms.html www.secnews.physaphae.fr/article.php?IdArticle=8668855 False Vulnerability,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Storm-1977 frappe les nuages ​​d'éducation avec AzureChecker, déploie plus de 200 conteneurs d'extraction de crypto<br>Storm-1977 Hits Education Clouds with AzureChecker, Deploys 200+ Crypto Mining Containers Microsoft has revealed that a threat actor it tracks as Storm-1977 has conducted password spraying attacks against cloud tenants in the education sector over the past year. "The attack involves the use of AzureChecker.exe, a Command Line Interface (CLI) tool that is being used by a wide range of threat actors," the Microsoft Threat Intelligence team said in an analysis. The tech giant noted that]]> 2025-04-27T10:32:00+00:00 https://thehackernews.com/2025/04/storm-1977-hits-education-clouds-with.html www.secnews.physaphae.fr/article.php?IdArticle=8668420 False Tool,Threat,Cloud None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Tymaker utilise Lagtoy pour vendre l'accès aux gangs de ransomware de cactus pour une double extorsion<br>ToyMaker Uses LAGTOY to Sell Access to CACTUS Ransomware Gangs for Double Extortion Cybersecurity researchers have detailed the activities of an initial access broker (IAB) dubbed ToyMaker that has been observed handing over access to double extortion ransomware gangs like CACTUS. The IAB has been assessed with medium confidence to be a financially motivated threat actor, scanning for vulnerable systems and deploying a custom malware called LAGTOY (aka HOLERUN). "LAGTOY can be]]> 2025-04-26T16:08:00+00:00 https://thehackernews.com/2025/04/toymaker-uses-lagtoy-to-sell-access-to.html www.secnews.physaphae.fr/article.php?IdArticle=8668080 False Ransomware,Malware,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les pirates nord-coréens répartissent les logiciels malveillants via de fausses entreprises cryptographiques et des leurres d'entrevue d'emploi<br>North Korean Hackers Spread Malware via Fake Crypto Firms and Job Interview Lures North Korea-linked threat actors behind the Contagious Interview have set up front companies as a way to distribute malware during the fake hiring process. "In this new campaign, the threat actor group is using three front companies in the cryptocurrency consulting industry-BlockNovas LLC (blocknovas[.] com), Angeloper Agency (angeloper[.]com), and SoftGlide LLC (softglide[.]co)-to spread]]> 2025-04-25T19:35:00+00:00 https://thehackernews.com/2025/04/north-korean-hackers-spread-malware-via.html www.secnews.physaphae.fr/article.php?IdArticle=8667699 False Malware,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) SAP confirme le défaut critique de Netweaver au milieu d'une exploitation présumée de zéro-jours par des pirates<br>SAP Confirms Critical NetWeaver Flaw Amid Suspected Zero-Day Exploitation by Hackers Threat actors are likely exploiting a new vulnerability in SAP NetWeaver to upload JSP web shells with the goal of facilitating unauthorized file uploads and code execution.  "The exploitation is likely tied to either a previously disclosed vulnerability like CVE-2017-9844 or an unreported remote file inclusion (RFI) issue," ReliaQuest said in a report published this week. The cybersecurity]]> 2025-04-25T16:11:00+00:00 https://thehackernews.com/2025/04/sap-confirms-critical-netweaver-flaw.html www.secnews.physaphae.fr/article.php?IdArticle=8667608 False Vulnerability,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Pourquoi les nhis sont la sécurité les plus dangereux de la sécurité<br>Why NHIs Are Security\\'s Most Dangerous Blind Spot When we talk about identity in cybersecurity, most people think of usernames, passwords, and the occasional MFA prompt. But lurking beneath the surface is a growing threat that does not involve human credentials at all, as we witness the exponential growth of Non-Human Identities (NHIs).  At the top of mind when NHIs are mentioned, most security teams immediately think of Service Accounts.]]> 2025-04-25T16:00:00+00:00 https://thehackernews.com/2025/04/why-nhis-are-securitys-most-dangerous.html www.secnews.physaphae.fr/article.php?IdArticle=8667609 False Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les chercheurs identifient le rack :: vulnérabilité statique permettant des violations de données dans les serveurs Ruby<br>Researchers Identify Rack::Static Vulnerability Enabling Data Breaches in Ruby Servers Cybersecurity researchers have disclosed three security flaws in the Rack Ruby web server interface that, if successfully exploited, could enable attackers to gain unauthorized access to files, inject malicious data, and tamper with logs under certain conditions. The vulnerabilities, flagged by cybersecurity vendor OPSWAT, are listed below - CVE-2025-27610 (CVSS score: 7.5) - A path traversal]]> 2025-04-25T14:27:00+00:00 https://thehackernews.com/2025/04/researchers-identify-rackstatic.html www.secnews.physaphae.fr/article.php?IdArticle=8667585 False Vulnerability None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Dslogdrat malware déployé via Ivanti Ics Zero-Day CVE-2025-0282 au Japon Attaques<br>DslogdRAT Malware Deployed via Ivanti ICS Zero-Day CVE-2025-0282 in Japan Attacks Cybersecurity researchers are warning about a new malware called DslogdRAT that\'s installed following the exploitation of a now-patched security flaw in Ivanti Connect Secure (ICS). The malware, along with a web shell, were "installed by exploiting a zero-day vulnerability at that time, CVE-2025-0282, during attacks against organizations in Japan around December 2024," JPCERT/CC researcher Yuma]]> 2025-04-25T14:13:00+00:00 https://thehackernews.com/2025/04/dslogdrat-malware-deployed-via-ivanti.html www.secnews.physaphae.fr/article.php?IdArticle=8667586 False Malware,Vulnerability,Threat,Industrial None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Lazarus frappe 6 entreprises sud-coréennes via Cross Ex, Innix Zero-Day et ThreatNeedle malware<br>Lazarus Hits 6 South Korean Firms via Cross EX, Innorix Zero-Day and ThreatNeedle Malware At least six organizations in South Korea have been targeted by the prolific North Korea-linked Lazarus Group as part of a campaign dubbed Operation SyncHole. The activity targeted South Korea\'s software, IT, financial, semiconductor manufacturing, and telecommunications industries, according to a report from Kaspersky published today. The earliest evidence of compromise was first detected in]]> 2025-04-24T19:41:00+00:00 https://thehackernews.com/2025/04/lazarus-hits-6-south-korean-firms-via.html www.secnews.physaphae.fr/article.php?IdArticle=8667217 False Malware,Vulnerability,Threat APT 38 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) 159 CVES exploités au premier trimestre 2025 - 28,3% dans les 24 heures suivant la divulgation<br>159 CVEs Exploited in Q1 2025 - 28.3% Within 24 Hours of Disclosure As many as 159 CVE identifiers have been flagged as exploited in the wild in the first quarter of 2025, up from 151 in Q4 2024. "We continue to see vulnerabilities being exploited at a fast pace with 28.3% of vulnerabilities being exploited within 1-day of their CVE disclosure," VulnCheck said in a report shared with The Hacker News. This translates to 45 security flaws that have been weaponized]]> 2025-04-24T18:28:00+00:00 https://thehackernews.com/2025/04/159-cves-exploited-in-q1-2025-283.html www.secnews.physaphae.fr/article.php?IdArticle=8667187 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Linux IO_URING POC ROOTKIT contourne les outils de détection de menace basés sur les appels<br>Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools Cybersecurity researchers have demonstrated a proof-of-concept (PoC) rootkit dubbed Curing that leverages a Linux asynchronous I/O mechanism called io_uring to bypass traditional system call monitoring. This causes a "major blind spot in Linux runtime security tools," ARMO said. "This mechanism allows a user application to perform various actions without using system calls," the company said in]]> 2025-04-24T18:28:00+00:00 https://thehackernews.com/2025/04/linux-iouring-poc-rootkit-bypasses.html www.secnews.physaphae.fr/article.php?IdArticle=8667186 False Tool,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Darcula ajoute Genai à la boîte à outils de phishing, abaissant la barrière des cybercriminels<br>Darcula Adds GenAI to Phishing Toolkit, Lowering the Barrier for Cybercriminals The threat actors behind the Darcula phishing-as-a-service (PhaaS) platform have released new updates to their cybercrime suite with generative artificial intelligence (GenAI) capabilities. "This addition lowers the technical barrier for creating phishing pages, enabling less tech-savvy criminals to deploy customized scams in minutes," Netcraft said in a new report shared with The Hacker News. "]]> 2025-04-24T16:57:00+00:00 https://thehackernews.com/2025/04/darcula-adds-genai-to-phishing-toolkit.html www.secnews.physaphae.fr/article.php?IdArticle=8667153 False Threat,Technical None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Automatisation zéro confiance dans les soins de santé: de la notation des risques à l'application dynamique des politiques sans refonte du réseau<br>Automating Zero Trust in Healthcare: From Risk Scoring to Dynamic Policy Enforcement Without Network Redesign The Evolving Healthcare Cybersecurity Landscape  Healthcare organizations face unprecedented cybersecurity challenges in 2025. With operational technology (OT) environments increasingly targeted and the convergence of IT and medical systems creating an expanded attack surface, traditional security approaches are proving inadequate. According to recent statistics, the healthcare sector]]> 2025-04-24T16:00:00+00:00 https://thehackernews.com/2025/04/automating-zero-trust-in-healthcare.html www.secnews.physaphae.fr/article.php?IdArticle=8667102 False Legislation,Medical None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) La défaut de centre de commande CRITICAL COMMVAULT permet aux attaquants d'exécuter du code à distance<br>Critical Commvault Command Center Flaw Enables Attackers to Execute Code Remotely A critical security flaw has been disclosed in the Commvault Command Center that could allow arbitrary code execution on affected installations. The vulnerability, tracked as CVE-2025-34028, carries a CVSS score of 9.0 out of a maximum of 10.0. "A critical security vulnerability has been identified in the Command Center installation, allowing remote attackers to execute arbitrary code without]]> 2025-04-24T15:30:00+00:00 https://thehackernews.com/2025/04/critical-commvault-command-center-flaw.html www.secnews.physaphae.fr/article.php?IdArticle=8667103 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) WhatsApp ajoute une confidentialité de chat avancée pour bloquer les exportations de chat et les charges automatique<br>WhatsApp Adds Advanced Chat Privacy to Blocks Chat Exports and Auto-Downloads WhatsApp has introduced an extra layer of privacy called Advanced Chat Privacy that allows users to block participants from sharing the contents of a conversation in traditional chats and groups. "This new setting available in both chats and groups helps prevent others from taking content outside of WhatsApp for when you may want extra privacy," WhatsApp said in a statement. The optional feature]]> 2025-04-24T09:33:00+00:00 https://thehackernews.com/2025/04/whatsapp-adds-advanced-chat-privacy-to.html www.secnews.physaphae.fr/article.php?IdArticle=8666969 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les pirates de RPDC volent 137 millions de dollars aux utilisateurs de TRON dans une attaque de phishing en une journée<br>DPRK Hackers Steal $137M from TRON Users in Single-Day Phishing Attack Multiple threat activity clusters with ties to North Korea (aka Democratic People\'s Republic of Korea or DPRK) have been linked to attacks targeting organizations and individuals in the Web3 and cryptocurrency space. "The focus on Web3 and cryptocurrency appears to be primarily financially motivated due to the heavy sanctions that have been placed on North Korea," Google-owned Mandiant said in]]> 2025-04-23T22:39:00+00:00 https://thehackernews.com/2025/04/dprk-hackers-steal-137m-from-tron-users.html www.secnews.physaphae.fr/article.php?IdArticle=8666764 False Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les pirates liés à l'Iran ciblent Israël avec des logiciels malveillants Murkytour via une fausse campagne d'emploi<br>Iran-Linked Hackers Target Israel with MURKYTOUR Malware via Fake Job Campaign The Iran-nexus threat actor known as UNC2428 has been observed delivering a backdoor known as MURKYTOUR as part of a job-themed social engineering campaign aimed at Israel in October 2024. Google-owned Mandiant described UNC2428 as a threat actor aligned with Iran that engages in cyber espionage-related operations. The intrusion set is said to have distributed the malware through a "complex]]> 2025-04-23T18:38:00+00:00 https://thehackernews.com/2025/04/iran-linked-hackers-target-israel-with.html www.secnews.physaphae.fr/article.php?IdArticle=8666669 False Malware,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Android Spyware déguisé en application de quête alpine cible les appareils militaires russes<br>Android Spyware Disguised as Alpine Quest App Targets Russian Military Devices Cybersecurity researchers have revealed that Russian military personnel are the target of a new malicious campaign that distributes Android spyware under the guise of the Alpine Quest mapping software. "The attackers hide this trojan inside modified Alpine Quest mapping software and distribute it in various ways, including through one of the Russian Android app catalogs," Doctor Web said in an]]> 2025-04-23T17:52:00+00:00 https://thehackernews.com/2025/04/android-spyware-disguised-as-alpine.html www.secnews.physaphae.fr/article.php?IdArticle=8666646 False Mobile None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Trois raisons pour lesquelles le navigateur est le meilleur pour arrêter les attaques de phishing<br>Three Reasons Why the Browser is Best for Stopping Phishing Attacks Phishing attacks remain a huge challenge for organizations in 2025. In fact, with attackers increasingly leveraging identity-based techniques over software exploits, phishing arguably poses a bigger threat than ever before.  Attackers are increasingly leveraging identity-based techniques over software exploits, with phishing and stolen credentials (a byproduct of phishing) now the primary]]> 2025-04-23T16:30:00+00:00 https://thehackernews.com/2025/04/three-reasons-why-browser-is-best-for.html www.secnews.physaphae.fr/article.php?IdArticle=8666619 False Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les pirates russes exploitent Microsoft Oauth pour cibler les alliés ukrainiens via le signal et WhatsApp<br>Russian Hackers Exploit Microsoft OAuth to Target Ukraine Allies via Signal and WhatsApp Multiple suspected Russia-linked threat actors are "aggressively" targeting individuals and organizations with ties to Ukraine and human rights with an aim to gain unauthorized access to Microsoft 365 accounts since early March 2025. The highly targeted social engineering operations, per Volexity, are a shift from previously documented attacks that leveraged a technique known as device code]]> 2025-04-23T16:19:00+00:00 https://thehackernews.com/2025/04/russian-hackers-exploit-microsoft-oauth.html www.secnews.physaphae.fr/article.php?IdArticle=8666620 False Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Ronding \\'s xrpl.js NPM Package arrière pour voler des clés privées dans une principale attaque de chaîne d'approvisionnement<br>Ripple\\'s xrpl.js npm Package Backdoored to Steal Private Keys in Major Supply Chain Attack The Ripple cryptocurrency npm JavaScript library named xrpl.js has been compromised by unknown threat actors as part of a software supply chain attack designed to harvest and exfiltrate users\' private keys. The malicious activity has been found to affect five different versions of the package: 4.2.1, 4.2.2, 4.2.3, 4.2.4, and 2.14.2. The issue has been addressed in versions 4.2.5 and 2.14.3.]]> 2025-04-23T12:47:00+00:00 https://thehackernews.com/2025/04/ripples-xrpljs-npm-package-backdoored.html www.secnews.physaphae.fr/article.php?IdArticle=8666520 False Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Google Drops Cookie Invite in Chrome, ajoute une protection IP à Incognito<br>Google Drops Cookie Prompt in Chrome, Adds IP Protection to Incognito Google on Tuesday revealed that it will no longer offer a standalone prompt for third-party cookies in its Chrome browser as part of its Privacy Sandbox initiative. "We\'ve made the decision to maintain our current approach to offering users third-party cookie choice in Chrome, and will not be rolling out a new standalone prompt for third-party cookies," Anthony Chavez, vice president of Privacy]]> 2025-04-23T10:49:00+00:00 https://thehackernews.com/2025/04/google-drops-cookie-prompt-in-chrome.html www.secnews.physaphae.fr/article.php?IdArticle=8666477 False None None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Docker malware exploite le nœud Teneo web3 pour gagner la crypto via de faux signaux de battement de cœur<br>Docker Malware Exploits Teneo Web3 Node to Earn Crypto via Fake Heartbeat Signals Cybersecurity researchers have detailed a malware campaign that\'s targeting Docker environments with a previously undocumented technique to mine cryptocurrency. The activity cluster, per Darktrace and Cado Security, represents a shift from other cryptojacking campaigns that directly deploy miners like XMRig to illicitly profit off the compute resources. This involves deploying a malware strain]]> 2025-04-22T22:16:00+00:00 https://thehackernews.com/2025/04/docker-malware-exploits-teneo-web3-node.html www.secnews.physaphae.fr/article.php?IdArticle=8666262 False Malware None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Le bug du compositeur de cloud GCP Laisse les attaquants élever l'accès via des packages PYPI malveillants<br>GCP Cloud Composer Bug Let Attackers Elevate Access via Malicious PyPI Packages Cybersecurity researchers have detailed a now-patched vulnerability in Google Cloud Platform (GCP) that could have enabled an attacker to elevate their privileges in the Cloud Composer workflow orchestration service that\'s based on Apache Airflow. "This vulnerability lets attackers with edit permissions in Cloud Composer to escalate their access to the default Cloud Build service account, which]]> 2025-04-22T19:36:00+00:00 https://thehackernews.com/2025/04/gcp-cloud-composer-bug-let-attackers.html www.secnews.physaphae.fr/article.php?IdArticle=8666189 False Vulnerability,Cloud None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) 5 préoccupations majeures avec les employés utilisant le navigateur<br>5 Major Concerns With Employees Using The Browser As SaaS and cloud-native work reshape the enterprise, the web browser has emerged as the new endpoint. However, unlike endpoints, browsers remain mostly unmonitored, despite being responsible for more than 70% of modern malware attacks. Keep Aware\'s recent State of Browser Security report highlights major concerns security leaders face with employees using the web browser for most of their work.]]> 2025-04-22T16:30:00+00:00 https://thehackernews.com/2025/04/5-major-concerns-with-employees-using.html www.secnews.physaphae.fr/article.php?IdArticle=8666111 False Malware,Cloud None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Phishers exploite Google Sites et DKim Replay pour envoyer des e-mails signés, voler des informations d'identification<br>Phishers Exploit Google Sites and DKIM Replay to Send Signed Emails, Steal Credentials In what has been described as an "extremely sophisticated phishing attack," threat actors have leveraged an uncommon approach that allowed bogus emails to be sent via Google\'s infrastructure and redirect message recipients to fraudulent sites that harvest their credentials. "The first thing to note is that this is a valid, signed email – it really was sent from no-reply@google.com," Nick Johnson]]> 2025-04-22T16:20:00+00:00 https://thehackernews.com/2025/04/phishers-exploit-google-sites-and-dkim.html www.secnews.physaphae.fr/article.php?IdArticle=8666112 False Threat None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Microsoft sécurise la signature MSA avec Azure Confidential VMS après une brèche Storm-0558<br>Microsoft Secures MSA Signing with Azure Confidential VMs Following Storm-0558 Breach Microsoft on Monday announced that it has moved the Microsoft Account (MSA) signing service to Azure confidential virtual machines (VMs) and that it\'s also in the process of migrating the Entra ID signing service as well. The disclosure comes about seven months after the tech giant said it completed updates to Microsoft Entra ID and MS for both public and United States government clouds to]]> 2025-04-22T13:08:00+00:00 https://thehackernews.com/2025/04/microsoft-secures-msa-signing-with.html www.secnews.physaphae.fr/article.php?IdArticle=8666038 False None None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Lotus Panda Hacks SE Gouvernements asiatiques avec des voleurs de navigateur et des logiciels malveillants sur la touche<br>Lotus Panda Hacks SE Asian Governments With Browser Stealers and Sideloaded Malware The China-linked cyber espionage group tracked as Lotus Panda has been attributed to a campaign that compromised multiple organizations in an unnamed Southeast Asian country between August 2024 and February 2025. "Targets included a government ministry, an air traffic control organization, a telecoms operator, and a construction company," the Symantec Threat Hunter Team said in a new report]]> 2025-04-22T09:59:00+00:00 https://thehackernews.com/2025/04/lotus-panda-hacks-se-asian-governments.html www.secnews.physaphae.fr/article.php?IdArticle=8665974 False Malware,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Kimsuky exploite la vulnérabilité du RDP Bluekeed aux systèmes de violation en Corée du Sud et au Japon<br>Kimsuky Exploits BlueKeep RDP Vulnerability to Breach Systems in South Korea and Japan Cybersecurity researchers have flagged a new malicious campaign related to the North Korean state-sponsored threat actor known as Kimsuky that exploits a now-patched vulnerability impacting Microsoft Remote Desktop Services to gain initial access. The activity has been named Larva-24005 by the AhnLab Security Intelligence Center (ASEC). "In some systems, initial access was gained through]]> 2025-04-21T22:12:00+00:00 https://thehackernews.com/2025/04/kimsuky-exploits-bluekeep-rdp.html www.secnews.physaphae.fr/article.php?IdArticle=8665775 False Vulnerability,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Supercard X Android Malware permet une fraude ATM et POS sans contact via des attaques de relais NFC<br>SuperCard X Android Malware Enables Contactless ATM and PoS Fraud via NFC Relay Attacks A new Android malware-as-a-service (MaaS) platform named SuperCard X can facilitate near-field communication (NFC) relay attacks, enabling cybercriminals to conduct fraudulent cashouts. The active campaign is targeting customers of banking institutions and card issuers in Italy with an aim to compromise payment card data, fraud prevention firm Cleafy said in an analysis. There is evidence to]]> 2025-04-21T20:43:00+00:00 https://thehackernews.com/2025/04/supercard-x-android-malware-enables.html www.secnews.physaphae.fr/article.php?IdArticle=8665729 False Malware,Mobile None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) 5 raisons pour lesquelles la gestion des appareils n'est pas la confiance des appareils<br>5 Reasons Device Management Isn\\'t Device Trust​ The problem is simple: all breaches start with initial access, and initial access comes down to two primary attack vectors – credentials and devices. This is not news; every report you can find on the threat landscape depicts the same picture.  The solution is more complex. For this article, we\'ll focus on the device threat vector. The risk they pose is significant, which is why device]]> 2025-04-21T16:55:00+00:00 https://thehackernews.com/2025/04/5-reasons-device-management-isnt-device.html www.secnews.physaphae.fr/article.php?IdArticle=8665640 False Threat None 2.0000000000000000