www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2025-05-10T16:26:55+00:00 www.secnews.physaphae.fr The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Vos scores de risque se trouvent: la validation de l'exposition contradictoire expose les menaces réelles<br>Your Risk Scores Are Lying: Adversarial Exposure Validation Exposes Real Threats In cybersecurity, confidence is a double-edged sword. Organizations often operate under a false sense of security, believing that patched vulnerabilities, up-to-date tools, polished dashboards, and glowing risk scores guarantee safety. The reality is a bit of a different story. In the real world, checking the right boxes doesn\'t equal being secure. As Sun Tzu warned, “Strategy without tactics is]]> 2025-03-11T16:55:00+00:00 https://thehackernews.com/2025/03/your-risk-scores-are-lying-adversarial.html www.secnews.physaphae.fr/article.php?IdArticle=8655000 False Tool,Vulnerability None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Steganography a expliqué: comment Xworm se cache à l'intérieur des images<br>Steganography Explained: How XWorm Hides Inside Images Inside the most innocent-looking image, a breathtaking landscape, or a funny meme, something dangerous could be hiding, waiting for its moment to strike. No strange file names. No antivirus warnings. Just a harmless picture, secretly concealing a payload that can steal data, execute malware, and take over your system without a trace. This is steganography, a cybercriminal\'s secret weapon for]]> 2025-03-11T16:00:00+00:00 https://thehackernews.com/2025/03/steganography-explained-how-xworm-hides.html www.secnews.physaphae.fr/article.php?IdArticle=8654987 False Malware None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Sidewinder APT cible les secteurs maritime, nucléaire et informatique à travers l'Asie, le Moyen-Orient et l'Afrique<br>SideWinder APT Targets Maritime, Nuclear, and IT Sectors Across Asia, Middle East, and Africa Maritime and logistics companies in South and Southeast Asia, the Middle East, and Africa have become the target of an advanced persistent threat (APT) group dubbed SideWinder. The attacks, observed by Kaspersky in 2024, spread across Bangladesh, Cambodia, Djibouti, Egypt, the United Arab Emirates, and Vietnam. Other targets of interest include nuclear power plants and nuclear energy]]> 2025-03-11T12:30:00+00:00 https://thehackernews.com/2025/03/sidewinder-apt-targets-maritime-nuclear.html www.secnews.physaphae.fr/article.php?IdArticle=8654953 False Threat APT-C-17 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) MOXA PROBLÈMES Correction pour la vulnérabilité de contournement de l'authentification critique dans les commutateurs PT<br>Moxa Issues Fix for Critical Authentication Bypass Vulnerability in PT Switches Taiwanese company Moxa has released a security update to address a critical security flaw impacting its PT switches that could permit an attacker to bypass authentication guarantees. The vulnerability, tracked as CVE-2024-12297, has been assigned a CVSS v4 score of 9.2 out of a maximum of 10.0. "Multiple Moxa PT switches are vulnerable to an authentication bypass because of flaws in their]]> 2025-03-11T12:15:00+00:00 https://thehackernews.com/2025/03/moxa-issues-fix-for-critical.html www.secnews.physaphae.fr/article.php?IdArticle=8654954 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) La CISA ajoute cinq vulnérabilités activement exploitées dans la liste Advantive Veracore et Ivanti EPM à KEV<br>CISA Adds Five Actively Exploited Vulnerabilities in Advantive VeraCore and Ivanti EPM to KEV List The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added five security flaws impacting Advantive VeraCore and Ivanti Endpoint Manager (EPM) to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation in the wild. The list of vulnerabilities is as follows - CVE-2024-57968 - An unrestricted file upload vulnerability in Advantive VeraCore]]> 2025-03-11T09:28:00+00:00 https://thehackernews.com/2025/03/cisa-adds-five-actively-exploited.html www.secnews.physaphae.fr/article.php?IdArticle=8654945 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les chercheurs exposent une nouvelle attaque polymorphe qui clones les extensions du navigateur pour voler des informations d'identification<br>Researchers Expose New Polymorphic Attack That Clones Browser Extensions to Steal Credentials Cybersecurity researchers have demonstrated a novel technique that allows a malicious web browser extension to impersonate any installed add-on. "The polymorphic extensions create a pixel perfect replica of the target\'s icon, HTML popup, workflows and even temporarily disables the legitimate extension, making it extremely convincing for victims to believe that they are providing credentials to]]> 2025-03-10T20:17:00+00:00 https://thehackernews.com/2025/03/researchers-expose-new-polymorphic.html www.secnews.physaphae.fr/article.php?IdArticle=8654896 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Desert Dexter cible 900 victimes à l'aide de publicités Facebook et de liens de logiciels malveillants télégrammes<br>Desert Dexter Targets 900 Victims Using Facebook Ads and Telegram Malware Links The Middle East and North Africa have become the target of a new campaign that delivers a modified version of a known malware called AsyncRAT since September 2024. "The campaign, which leverages social media to distribute malware, is tied to the region\'s current geopolitical climate," Positive Technologies researchers Klimentiy Galkin and Stanislav Pyzhov said in an analysis published last week.]]> 2025-03-10T18:20:00+00:00 https://thehackernews.com/2025/03/desert-dexter-targets-900-victims-using.html www.secnews.physaphae.fr/article.php?IdArticle=8654867 False Malware None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Pourquoi l'espace de travail Google moderne a besoin d'une sécurité unifiée<br>Why The Modern Google Workspace Needs Unified Security The Need For Unified Security Google Workspace is where teams collaborate, share ideas, and get work done. But while it makes work easier, it also creates new security challenges. Cybercriminals are constantly evolving, finding ways to exploit misconfigurations, steal sensitive data, and hijack user accounts. Many organizations try to secure their environment by piecing together different]]> 2025-03-10T16:30:00+00:00 https://thehackernews.com/2025/03/why-modern-google-workspace-needs.html www.secnews.physaphae.fr/article.php?IdArticle=8654859 False Threat None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) ⚡ Recaps hebdomadaire thn: nouvelles attaques, anciens astuces, plus grand impact<br>⚡ THN Weekly Recap: New Attacks, Old Tricks, Bigger Impact Cyber threats today don\'t just evolve-they mutate rapidly, testing the resilience of everything from global financial systems to critical infrastructure. As cybersecurity confronts new battlegrounds-ranging from nation-state espionage and ransomware to manipulated AI chatbots-the landscape becomes increasingly complex, prompting vital questions: How secure are our cloud environments? Can our]]> 2025-03-10T15:16:00+00:00 https://thehackernews.com/2025/03/thn-weekly-recap-new-attacks-old-tricks.html www.secnews.physaphae.fr/article.php?IdArticle=8654845 False Ransomware,Cloud None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Silentcryptominer infecte 2 000 utilisateurs russes via les faux VPN et les outils de contournement DPI<br>SilentCryptoMiner Infects 2,000 Russian Users via Fake VPN and DPI Bypass Tools A new mass malware campaign is infecting users with a cryptocurrency miner named SilentCryptoMiner by masquerading it as a tool designed to circumvent internet blocks and restrictions around online services. Russian cybersecurity company Kaspersky said the activity is part of a larger trend where cybercriminals are increasingly leveraging Windows Packet Divert (WPD) tools to distribute malware]]> 2025-03-10T09:42:00+00:00 https://thehackernews.com/2025/03/silentcryptominer-infects-2000-russian.html www.secnews.physaphae.fr/article.php?IdArticle=8654818 False Malware,Tool,Prediction None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Fin7, Fin8 et d'autres utilisent le chargeur Ragnar pour des opérations d'accès persistant et de ransomware<br>FIN7, FIN8, and Others Use Ragnar Loader for Persistent Access and Ransomware Operations Threat hunters have shed light on a "sophisticated and evolving malware toolkit" called Ragnar Loader that\'s used by various cybercrime and ransomware groups like Ragnar Locker (aka Monstrous Mantis), FIN7, FIN8, and Ruthless Mantis (ex-REvil). "Ragnar Loader plays a key role in keeping access to compromised systems, helping attackers stay in networks for long-term operations," Swiss]]> 2025-03-07T19:45:00+00:00 https://thehackernews.com/2025/03/fin7-fin8-and-others-use-ragnar-loader.html www.secnews.physaphae.fr/article.php?IdArticle=8654548 False Ransomware,Malware,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Microsoft met en garde contre la campagne de malvertisation infectant plus d'un million d'appareils dans le monde<br>Microsoft Warns of Malvertising Campaign Infecting Over 1 Million Devices Worldwide Microsoft has disclosed details of a large-scale malvertising campaign that\'s estimated to have impacted over one million devices globally as part of what it said is an opportunistic attack designed to steal sensitive information. The tech giant, which detected the activity in early December 2024, is tracking it under the broader umbrella Storm-0408, a moniker used for a set of threat actors]]> 2025-03-07T18:35:00+00:00 https://thehackernews.com/2025/03/microsoft-warns-of-malvertising.html www.secnews.physaphae.fr/article.php?IdArticle=8654532 False Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Webinaire: découvrez comment ASPM transforme la sécurité des applications de réactif à proactif<br>Webinar: Learn How ASPM Transforms Application Security from Reactive to Proactive Are you tired of dealing with outdated security tools that never seem to give you the full picture? You\'re not alone. Many organizations struggle with piecing together scattered information, leaving your apps vulnerable to modern threats. That\'s why we\'re excited to introduce a smarter, unified approach: Application Security Posture Management (ASPM). ASPM brings together the best of both]]> 2025-03-07T17:05:00+00:00 https://thehackernews.com/2025/03/webinar-learn-how-aspm-transforms.html www.secnews.physaphae.fr/article.php?IdArticle=8654514 False Tool None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Ce que PCI DSS V4 signifie vraiment - les leçons de A&F Compliance Journey<br>What PCI DSS v4 Really Means – Lessons from A&F Compliance Journey Access on-demand webinar here Avoid a $100,000/month Compliance Disaster March 31, 2025: The Clock is Ticking. What if a single overlooked script could cost your business $100,000 per month in non-compliance fines? PCI DSS v4 is coming, and businesses handling payment card data must be prepared. Beyond fines, non-compliance exposes businesses to web skimming, third-party script attacks, and]]> 2025-03-07T16:30:00+00:00 https://thehackernews.com/2025/03/what-pci-dss-v4-really-means-lessons.html www.secnews.physaphae.fr/article.php?IdArticle=8654503 False None None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Ce package PYPI malveillant a volé des touches privées Ethereum via des transactions RPC polygonales<br>This Malicious PyPI Package Stole Ethereum Private Keys via Polygon RPC Transactions Cybersecurity researchers have discovered a malicious Python package on the Python Package Index (PyPI) repository that\'s equipped to steal a victim\'s Ethereum private keys by impersonating popular libraries. The package in question is set-utils, which has received 1,077 downloads to date. It\'s no longer available for download from the official registry. "Disguised as a simple utility for Python]]> 2025-03-07T15:21:00+00:00 https://thehackernews.com/2025/03/this-malicious-pypi-package-stole.html www.secnews.physaphae.fr/article.php?IdArticle=8654492 False None None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les services secrets américains saisissent le site Web de l'échange de crypto russe Garantex<br>U.S. Secret Service Seizes Russian Garantex Crypto Exchange Website A coalition of international law enforcement agencies has seized the website associated with the cryptocurrency exchange Garantex ("garantex[.]org"), nearly three years after the service was sanctioned by the U.S. Treasury Department in April 2022. "The domain for Garantex has been seized by the United States Secret Service pursuant to a seizure warrant obtained by the United States Attorney\'s]]> 2025-03-07T14:53:00+00:00 https://thehackernews.com/2025/03/us-secret-service-seizes-russian.html www.secnews.physaphae.fr/article.php?IdArticle=8654493 False Legislation None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Safe {Wallet} confirme les pirates nord-coréens de TraderTraitor<br>Safe{Wallet} Confirms North Korean TraderTraitor Hackers Stole $1.5 Billion in Bybit Heist Safe{Wallet} has revealed that the cybersecurity incident that led to the Bybit $1.5 billion crypto heist is a "highly sophisticated, state-sponsored attack," stating the North Korean threat actors behind the hack took steps to erase traces of the malicious activity in an effort to hamper investigation efforts. The multi-signature (multisig) platform, which has roped in Google Cloud Mandiant to]]> 2025-03-07T11:10:00+00:00 https://thehackernews.com/2025/03/safewallet-confirms-north-korean.html www.secnews.physaphae.fr/article.php?IdArticle=8654464 False Hack,Threat,Cloud None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) PHP-CGI RCE Flaw exploité dans les attaques contre les secteurs de la technologie, des télécommunications et du commerce électronique du Japon \\<br>PHP-CGI RCE Flaw Exploited in Attacks on Japan\\'s Tech, Telecom, and E-Commerce Sectors Threat actors of unknown provenance have been attributed to a malicious campaign predominantly targeting organizations in Japan since January 2025. "The attacker has exploited the vulnerability CVE-2024-4577, a remote code execution (RCE) flaw in the PHP-CGI implementation of PHP on Windows, to gain initial access to victim machines," Cisco Talos researcher Chetan Raghuprasad said in a technical]]> 2025-03-07T10:12:00+00:00 https://thehackernews.com/2025/03/php-cgi-rce-flaw-exploited-in-attacks.html www.secnews.physaphae.fr/article.php?IdArticle=8654456 False Vulnerability,Threat,Technical None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Reliminaires élastiques Correction urgente pour la vulnérabilité critique du kibana permettant l'exécution du code distant<br>Elastic Releases Urgent Fix for Critical Kibana Vulnerability Enabling Remote Code Execution Elastic has rolled out security updates to address a critical security flaw impacting the Kibana data visualization dashboard software for Elasticsearch that could result in arbitrary code execution. The vulnerability, tracked as CVE-2025-25012, carries a CVSS score of 9.9 out of a maximum of 10.0. It has been described as a case of prototype pollution. "Prototype pollution in Kibana leads to]]> 2025-03-06T18:03:00+00:00 https://thehackernews.com/2025/03/elastic-releases-urgent-fix-for.html www.secnews.physaphae.fr/article.php?IdArticle=8654260 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) EncrypThub déploie des ransomwares et du voleur via des applications trojanisées, des services PPI et un phishing<br>EncryptHub Deploys Ransomware and Stealer via Trojanized Apps, PPI Services, and Phishing The financially motivated threat actor known as EncryptHub has been observed orchestrating sophisticated phishing campaigns to deploy information stealers and ransomware, while also working on a new product called EncryptRAT. "EncryptHub has been observed targeting users of popular applications, by distributing trojanized versions," Outpost24 KrakenLabs said in a new report shared with The]]> 2025-03-06T17:45:00+00:00 https://thehackernews.com/2025/03/encrypthub-deploys-ransomware-and.html www.secnews.physaphae.fr/article.php?IdArticle=8654261 False Ransomware,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) MEDUSA Ransomware frappe plus de 40 victimes en 2025, exige une rançon de 100 000 $ à 15 millions de dollars<br>Medusa Ransomware Hits 40+ Victims in 2025, Demands $100K–$15M Ransom The threat actors behind the Medusa ransomware have claimed nearly 400 victims since it first emerged in January 2023, with the financially motivated attacks witnessing a 42% increase between 2023 and 2024. In the first two months of 2025 alone, the group has claimed over 40 attacks, according to data from the Symantec Threat Hunter Team said in a report shared with The Hacker News. The]]> 2025-03-06T17:31:00+00:00 https://thehackernews.com/2025/03/medusa-ransomware-hits-40-victims-in.html www.secnews.physaphae.fr/article.php?IdArticle=8654262 False Ransomware,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Déjouer les cyber-menaces avec des graphiques d'attaque<br>Outsmarting Cyber Threats with Attack Graphs Cyber threats are growing more sophisticated, and traditional security approaches struggle to keep up. Organizations can no longer rely on periodic assessments or static vulnerability lists to stay secure. Instead, they need a dynamic approach that provides real-time insights into how attackers move through their environment. This is where attack graphs come in. By mapping potential attack paths]]> 2025-03-06T16:30:00+00:00 https://thehackernews.com/2025/03/outsmarting-cyber-threats-with-attack.html www.secnews.physaphae.fr/article.php?IdArticle=8654235 False Vulnerability None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Plus de 1 000 sites WordPress infectés par des bornes JavaScript permettant un accès à l'attaquant persistant<br>Over 1,000 WordPress Sites Infected with JavaScript Backdoors Enabling Persistent Attacker Access Over 1,000 websites powered by WordPress have been infected with a third-party JavaScript code that injects four separate backdoors. "Creating four backdoors facilitates the attackers having multiple points of re-entry should one be detected and removed," c/side researcher Himanshu Anand said in a Wednesday analysis. The malicious JavaScript code has been found to be served via cdn.csyndication[]]> 2025-03-06T15:27:00+00:00 https://thehackernews.com/2025/03/over-1000-wordpress-sites-infected-with.html www.secnews.physaphae.fr/article.php?IdArticle=8654214 False None None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les États-Unis facturent 12 ressortissants chinois dans les opérations de piratage soutenues par l'État<br>U.S. Charges 12 Chinese Nationals in State-Backed Hacking Operations The U.S. Department of Justice (DoJ) has announced charges against 12 Chinese nationals for their alleged participation in a wide-ranging scheme designed to steal data and suppress free speech and dissent globally. The individuals include two officers of the People\'s Republic of China\'s (PRC) Ministry of Public Security (MPS), eight employees of an ostensibly private PRC company, Anxun]]> 2025-03-06T12:10:00+00:00 https://thehackernews.com/2025/03/us-charges-12-chinese-nationals-in.html www.secnews.physaphae.fr/article.php?IdArticle=8654137 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Le typhon de soie lié à la Chine étend les cyberattaques des chaînes d'approvisionnement pour l'accès initial<br>China-Linked Silk Typhoon Expands Cyber Attacks to IT Supply Chains for Initial Access The China-lined threat actor behind the zero-day exploitation of security flaws in Microsoft Exchange servers in January 2021 has shifted its tactics to target the information technology (IT) supply chain as a means to obtain initial access to corporate networks. That\'s according to new findings from the Microsoft Threat Intelligence team, which said the Silk Typhoon (formerly Hafnium) hacking]]> 2025-03-05T21:14:00+00:00 https://thehackernews.com/2025/03/china-linked-silk-typhoon-expands-cyber.html www.secnews.physaphae.fr/article.php?IdArticle=8653883 False Vulnerability,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Défendre contre les attaques USB Drive avec Wazuh<br>Defending against USB drive attacks with Wazuh USB drive attacks constitute a significant cybersecurity risk, taking advantage of the everyday use of USB devices to deliver malware and circumvent traditional network security measures. These attacks lead to data breaches, financial losses, and operational disruptions, with lasting impacts on an organization\'s reputation. An example is the Stuxnet worm discovered in 2010, a malware designed to]]> 2025-03-05T19:38:00+00:00 https://thehackernews.com/2025/03/defending-against-usb-drive-attacks.html www.secnews.physaphae.fr/article.php?IdArticle=8653857 False Malware None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Dark Caracal utilise Poco Rat pour cibler les entreprises hispanophones en Amérique latine<br>Dark Caracal Uses Poco RAT to Target Spanish-Speaking Enterprises in Latin America The threat actor known as Dark Caracal has been attributed to a campaign that deployed a remote access trojan called Poco RAT in attacks targeting Spanish-speaking targets in Latin America in 2024. The findings come from Russian cybersecurity company Positive Technologies, which described the malware as loaded with a "full suite of espionage features." "It could upload files, capture screenshots]]> 2025-03-05T19:07:00+00:00 https://thehackernews.com/2025/03/dark-caracal-uses-poco-rat-to-target.html www.secnews.physaphae.fr/article.php?IdArticle=8653858 False Malware,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Google déploie la détection de l'ARC pour Android pour lutter contre la fraude conversationnelle<br>Google Rolls Out AI Scam Detection for Android to Combat Conversational Fraud Google has announced the rollout of artificial intelligence (AI)-powered scam detection features to secure Android device users and their personal information. "These features specifically target conversational scams, which can often appear initially harmless before evolving into harmful situations," Google said. "And more phone calling scammers are using spoofing techniques to hide their real]]> 2025-03-05T18:50:00+00:00 https://thehackernews.com/2025/03/google-rolls-out-ai-scam-detection-for.html www.secnews.physaphae.fr/article.php?IdArticle=8653859 False Mobile None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Chinois Apt Lotus Panda cible les gouvernements avec de nouvelles variantes de porte dérobée Sagerunex<br>Chinese APT Lotus Panda Targets Governments With New Sagerunex Backdoor Variants The threat actor known as Lotus Panda has been observed targeting government, manufacturing, telecommunications, and media sectors in the Philippines, Vietnam, Hong Kong, and Taiwan with updated versions of a known backdoor called Sagerunex. "Lotus Blossom has been using the Sagerunex backdoor since at least 2016 and is increasingly employing long-term persistence command shells and developing]]> 2025-03-05T16:33:00+00:00 https://thehackernews.com/2025/03/chinese-apt-lotus-panda-targets.html www.secnews.physaphae.fr/article.php?IdArticle=8653815 False Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Identité: le nouveau champ de bataille de cybersécurité<br>Identity: The New Cybersecurity Battleground The rapid adoption of cloud services, SaaS applications, and the shift to remote work have fundamentally reshaped how enterprises operate. These technological advances have created a world of opportunity but also brought about complexities that pose significant security threats. At the core of these vulnerabilities lies Identity-the gateway to enterprise security and the number one attack vector]]> 2025-03-05T16:30:00+00:00 https://thehackernews.com/2025/03/identity-new-cybersecurity-battleground.html www.secnews.physaphae.fr/article.php?IdArticle=8653816 False Vulnerability,Cloud None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Sept forfaits go malveillants trouvés en déploiement de logiciels malveillants sur les systèmes Linux et MacOS<br>Seven Malicious Go Packages Found Deploying Malware on Linux and macOS Systems Cybersecurity researchers are alerting of an ongoing malicious campaign targeting the Go ecosystem with typosquatted modules that are designed to deploy loader malware on Linux and Apple macOS systems. "The threat actor has published at least seven packages impersonating widely used Go libraries, including one (github[.]com/shallowmulti/hypert) that appears to target financial-sector developers]]> 2025-03-05T12:37:00+00:00 https://thehackernews.com/2025/03/seven-malicious-go-packages-found.html www.secnews.physaphae.fr/article.php?IdArticle=8653718 False Malware,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les chercheurs relient les tactiques du ransomware du cactus aux anciens affiliés de Black Basta<br>Researchers Link CACTUS Ransomware Tactics to Former Black Basta Affiliates Threat actors deploying the Black Basta and CACTUS ransomware families have been found to rely on the same BackConnect (BC) module for maintaining persistent control over infected hosts, a sign that affiliates previously associated with Black Basta may have transitioned to CACTUS. "Once infiltrated, it grants attackers a wide range of remote control capabilities, allowing them to execute]]> 2025-03-04T21:51:00+00:00 https://thehackernews.com/2025/03/researchers-link-cactus-ransomware.html www.secnews.physaphae.fr/article.php?IdArticle=8653495 False Ransomware,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) VMware Security Flaws exploite dans le Wild-BroadCom publie des patchs urgents<br>VMware Security Flaws Exploited in the Wild-Broadcom Releases Urgent Patches Broadcom has released security updates to address three actively exploited security flaws in VMware ESXi, Workstation, and Fusion products that could lead to code execution and information disclosure. The list of vulnerabilities is as follows - CVE-2025-22224 (CVSS score: 9.3) - A Time-of-Check Time-of-Use (TOCTOU) vulnerability that leads to an out-of-bounds write, which a malicious actor with]]> 2025-03-04T19:43:00+00:00 https://thehackernews.com/2025/03/vmware-security-flaws-exploited-in.html www.secnews.physaphae.fr/article.php?IdArticle=8653450 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Comment les nouveaux agents de l'IA transformeront les attaques de rembourrage des diplômes<br>How New AI Agents Will Transform Credential Stuffing Attacks Credential stuffing attacks had a huge impact in 2024, fueled by a vicious circle of infostealer infections and data breaches. But things could be about to get worse still with Computer-Using Agents, a new kind of AI agent that enables low-cost, low-effort automation of common web tasks - including those frequently performed by attackers. Stolen credentials: The cyber criminal\'s weapon of choice]]> 2025-03-04T16:30:00+00:00 https://thehackernews.com/2025/03/how-new-ai-agents-will-transform.html www.secnews.physaphae.fr/article.php?IdArticle=8653370 False None None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les pirates iraniens présumés ont utilisé le courrier électronique de la société indienne compromis à cibler U.A.E. Secteur de l'aviation<br>Suspected Iranian Hackers Used Compromised Indian Firm\\'s Email to Target U.A.E. Aviation Sector Threat hunters are calling attention to a new highly-targeted phishing campaign that singled out "fewer than five" entities in the United Arab Emirates (U.A.E.) to deliver a previously undocumented Golang backdoor dubbed Sosano. The malicious activity was specifically directed against aviation and satellite communications organizations, according to Proofpoint, which detected it in late October]]> 2025-03-04T15:28:00+00:00 https://thehackernews.com/2025/03/suspected-iranian-hackers-used.html www.secnews.physaphae.fr/article.php?IdArticle=8653348 False Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Plus de 4 000 IPS IPS ciblés dans des attaques brutes pour déployer des voleurs d'informations et des cryptomineurs<br>Over 4,000 ISP IPs Targeted in Brute-Force Attacks to Deploy Info Stealers and Cryptominers Internet service providers (ISPs) in China and the West Coast of the United States have become the target of a mass exploitation campaign that deploys information stealers and cryptocurrency miners on compromised hosts. The findings come from the Splunk Threat Research Team, which said the activity also led to the delivery of various binaries that facilitate data exfiltration as well as offer]]> 2025-03-04T14:31:00+00:00 https://thehackernews.com/2025/03/over-4000-isp-networks-targeted-in.html www.secnews.physaphae.fr/article.php?IdArticle=8653349 False Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Cisco, Hitachi, Microsoft et Progress Flaws Exploited-Cisa Sonds Alarme<br>Cisco, Hitachi, Microsoft, and Progress Flaws Actively Exploited-CISA Sounds Alarm The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added five security flaws impacting software from Cisco, Hitachi Vantara, Microsoft Windows, and Progress WhatsUp Gold to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The list of vulnerabilities is as follows - CVE-2023-20118 (CVSS score: 6.5) - A command injection]]> 2025-03-04T10:09:00+00:00 https://thehackernews.com/2025/03/cisco-hitachi-microsoft-and-progress.html www.secnews.physaphae.fr/article.php?IdArticle=8653273 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) La mise à jour Android Security de Google \\ est en mars 2025 Correction de deux vulnérabilités activement exploitées<br>Google\\'s March 2025 Android Security Update Fixes Two Actively Exploited Vulnerabilities Google has released its monthly Android Security Bulletin for March 2025 to address a total of 44 vulnerabilities, including two that it said have come under active exploitation in the wild. The two high-severity vulnerabilities are listed below - CVE-2024-43093 - A privilege escalation flaw in the Framework component that could result in unauthorized access to "Android/data," "Android/obb,"]]> 2025-03-04T09:37:00+00:00 https://thehackernews.com/2025/03/googles-march-2025-android-security.html www.secnews.physaphae.fr/article.php?IdArticle=8653258 False Vulnerability,Mobile None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les pirates exploitent AWS erronés pour lancer des attaques de phishing via SES et Workmail<br>Hackers Exploit AWS Misconfigurations to Launch Phishing Attacks via SES and WorkMail Threat actors are targeting Amazon Web Services (AWS) environments to push out phishing campaigns to unsuspecting targets, according to findings from Palo Alto Networks Unit 42. The cybersecurity company is tracking the activity cluster under the name TGR-UNK-0011 (short for a threat group with unknown motivation), which it said overlaps with a group known as JavaGhost. TGR-UNK-0011 is known to]]> 2025-03-03T22:56:00+00:00 https://thehackernews.com/2025/03/hackers-exploit-aws-misconfigurations.html www.secnews.physaphae.fr/article.php?IdArticle=8653100 False Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les pirates utilisent Clickfix Trick pour déployer Havoc C2 basé sur PowerShell via des sites SharePoint<br>Hackers Use ClickFix Trick to Deploy PowerShell-Based Havoc C2 via SharePoint Sites Cybersecurity researchers are calling attention to a new phishing campaign that employs the ClickFix technique to deliver an open-source command-and-control (C2) framework called Havoc. "The threat actor hides each malware stage behind a SharePoint site and uses a modified version of Havoc Demon in conjunction with the Microsoft Graph API to obscure C2 communications within trusted, well-known]]> 2025-03-03T19:30:00+00:00 https://thehackernews.com/2025/03/hackers-use-clickfix-trick-to-deploy.html www.secnews.physaphae.fr/article.php?IdArticle=8653008 False Malware,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) L'ICO du Royaume-Uni enquête sur Tiktok, Reddit et Imgur sur les pratiques de protection des données des enfants<br>U.K. ICO Investigates TikTok, Reddit, and Imgur Over Children\\'s Data Protection Practices The U.K.\'s Information Commissioner\'s Office (ICO) has opened an investigation into online platforms TikTok, Reddit, and Imgur to assess the steps they are taking to protect children between the ages of 13 and 17 in the country. To that end, the watchdog said it\'s probing how the ByteDance-owned video-sharing service uses the personal data of children in the age range to surface recommendations]]> 2025-03-03T19:26:00+00:00 https://thehackernews.com/2025/03/uk-ico-investigates-tiktok-reddit-and.html www.secnews.physaphae.fr/article.php?IdArticle=8653010 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les pirates exploitent la vulnérabilité du pilote du gestionnaire de partition de paragon dans les attaques de ransomwares<br>Hackers Exploit Paragon Partition Manager Driver Vulnerability in Ransomware Attacks Threat actors have been exploiting a security vulnerability in Paragon Partition Manager\'s BioNTdrv.sys driver in ransomware attacks to escalate privileges and execute arbitrary code. The zero-day flaw (CVE-2025-0289) is part of a set of five vulnerabilities that was discovered by Microsoft, according to the CERT Coordination Center (CERT/CC). "These include arbitrary kernel memory mapping and]]> 2025-03-03T19:26:00+00:00 https://thehackernews.com/2025/03/hackers-exploit-paragon-partition.html www.secnews.physaphae.fr/article.php?IdArticle=8653009 False Ransomware,Vulnerability,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Recap hebdomadaire thn: Alertes sur les exploits zéro-jours, les violations de l'IA et les cambriolages crypto<br>⚡ THN Weekly Recap: Alerts on Zero-Day Exploits, AI Breaches, and Crypto Heists This week, a 23-year-old Serbian activist found themselves at the crossroads of digital danger when a sneaky zero-day exploit turned their Android device into a target. Meanwhile, Microsoft pulled back the curtain on a scheme where cybercriminals used AI tools for harmful pranks, and a massive trove of live secrets was discovered, reminding us that even the tools we rely on can hide risky]]> 2025-03-03T17:28:00+00:00 https://thehackernews.com/2025/03/thn-weekly-recap-alerts-on-zero-day.html www.secnews.physaphae.fr/article.php?IdArticle=8652990 False Tool,Vulnerability,Threat,Mobile None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les nouveaux groupes de ransomwares se tremblent 2025<br>The New Ransomware Groups Shaking Up 2025 In 2024, global ransomware attacks hit 5,414, an 11% increase from 2023.  After a slow start, attacks spiked in Q2 and surged in Q4, with 1,827 incidents (33% of the year\'s total). Law enforcement actions against major groups like LockBit caused fragmentation, leading to more competition and a rise in smaller gangs. The number of active ransomware groups jumped 40%, from 68 in 2023 to 95]]> 2025-03-03T16:30:00+00:00 https://thehackernews.com/2025/03/the-new-ransomware-groups-shaking-up.html www.secnews.physaphae.fr/article.php?IdArticle=8652967 False Ransomware,Legislation None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Le pic de Vo1d Botnet \\ dépasse 1,59 m Android Infected TVS, couvrant 226 pays<br>Vo1d Botnet\\'s Peak Surpasses 1.59M Infected Android TVs, Spanning 226 Countries Brazil, South Africa, Indonesia, Argentina, and Thailand have become the targets of a campaign that has infected Android TV devices with a botnet malware dubbed Vo1d. The improved variant of Vo1d has been found to encompass 800,000 daily active IP addresses, with the botnet scaling a peak of 1,590,299 on January 19, 2025, spanning 226 countries. As of February 25, 2025, India has experienced a]]> 2025-03-03T10:47:00+00:00 https://thehackernews.com/2025/03/vo1d-botnets-peak-surpasses-159m.html www.secnews.physaphae.fr/article.php?IdArticle=8652857 False Malware,Mobile None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Mozilla met à jour les termes de Firefox après le contrecoup sur un langage de licence de données large<br>Mozilla Updates Firefox Terms Again After Backlash Over Broad Data License Language Firefox browser maker Mozilla on Friday updated its Terms of Use a second time within a week following criticism overbroad language that appeared to give the company the rights to all information uploaded by users. The revised Terms of Use now states - You give Mozilla the rights necessary to operate Firefox. This includes processing your data as we describe in the Firefox Privacy Notice. It]]> 2025-03-01T13:30:00+00:00 https://thehackernews.com/2025/03/mozilla-updates-firefox-terms-again.html www.secnews.physaphae.fr/article.php?IdArticle=8652250 False None None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Amnesty trouve le jour zéro de Cellebrite \\ pour déverrouiller le téléphone Android de l'activiste serbe \\<br>Amnesty Finds Cellebrite\\'s Zero-Day Used to Unlock Serbian Activist\\'s Android Phone A 23-year-old Serbian youth activist had their Android phone targeted by a zero-day exploit developed by Cellebrite to unlock the device, according to a new report from Amnesty International. "The Android phone of one student protester was exploited and unlocked by a sophisticated zero-day exploit chain targeting Android USB drivers, developed by Cellebrite," the international non-governmental]]> 2025-02-28T22:18:00+00:00 https://thehackernews.com/2025/02/amnesty-finds-cellebrites-zero-day.html www.secnews.physaphae.fr/article.php?IdArticle=8652039 False Vulnerability,Threat,Mobile None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) RDP: une épée à double tranchant pour les équipes informatiques - essentiel mais exploitable<br>RDP: a Double-Edged Sword for IT Teams – Essential Yet Exploitable Remote Desktop Protocol (RDP) is an amazing technology developed by Microsoft that lets you access and control another computer over a network. It\'s like having your office computer with you wherever you go. For businesses, this means IT staff can manage systems remotely, and employees can work from home or anywhere, making RDP a true game-changer in today\'s work environment. But here\'s the]]> 2025-02-28T19:53:00+00:00 https://thehackernews.com/2025/02/rdp-double-edged-sword-for-it-teams.html www.secnews.physaphae.fr/article.php?IdArticle=8651993 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) 5 000 PDF de phishing sur 260 domaines distribuent le voleur de Lumma via de faux captchas<br>5,000 Phishing PDFs on 260 Domains Distribute Lumma Stealer via Fake CAPTCHAs Cybersecurity researchers have uncovered a widespread phishing campaign that uses fake CAPTCHA images shared via PDF documents hosted on Webflow\'s content delivery network (CDN) to deliver the Lumma stealer malware. Netskope Threat Labs said it discovered 260 unique domains hosting 5,000 phishing PDF files that redirect victims to malicious websites. "The attacker uses SEO to trick victims into]]> 2025-02-28T19:19:00+00:00 https://thehackernews.com/2025/02/5000-phishing-pdfs-on-260-domains.html www.secnews.physaphae.fr/article.php?IdArticle=8651994 False Malware,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Microsoft expose les cybercriminels llmjacking derrière le système d'abus Azure AI<br>Microsoft Exposes LLMjacking Cybercriminals Behind Azure AI Abuse Scheme Microsoft on Thursday unmasked four of the individuals that it said were behind an Azure Abuse Enterprise scheme that involves leveraging unauthorized access to generative artificial intelligence (GenAI) services in order to produce offensive and harmful content. The campaign, called LLMjacking, has targeted various AI offerings, including Microsoft\'s Azure OpenAI Service. The tech giant is]]> 2025-02-28T16:03:00+00:00 https://thehackernews.com/2025/02/microsoft-exposes-llmjacking.html www.secnews.physaphae.fr/article.php?IdArticle=8651947 False None None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) 12 000+ clés API et mots de passe trouvés dans les ensembles de données publiques utilisés pour la formation LLM<br>12,000+ API Keys and Passwords Found in Public Datasets Used for LLM Training A dataset used to train large language models (LLMs) has been found to contain nearly 12,000 live secrets, which allow for successful authentication. The findings once again highlight how hard-coded credentials pose a severe security risk to users and organizations alike, not to mention compounding the problem when LLMs end up suggesting insecure coding practices to their users. Truffle]]> 2025-02-28T15:54:00+00:00 https://thehackernews.com/2025/02/12000-api-keys-and-passwords-found-in.html www.secnews.physaphae.fr/article.php?IdArticle=8651924 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Le loup-garou collant utilise un implant sans papiers pour déployer le voleur de Lumma en Russie et en Biélorussie<br>Sticky Werewolf Uses Undocumented Implant to Deploy Lumma Stealer in Russia and Belarus The threat actor known as Sticky Werewolf has been linked to targeted attacks primarily in Russia and Belarus with the aim of delivering the Lumma Stealer malware by means of a previously undocumented implant. Cybersecurity company Kaspersky is tracking the activity under the name Angry Likho, which it said bears a "strong resemblance" to Awaken Likho (aka Core Werewolf, GamaCopy, and]]> 2025-02-28T15:06:00+00:00 https://thehackernews.com/2025/02/sticky-werewolf-uses-undocumented.html www.secnews.physaphae.fr/article.php?IdArticle=8651925 False Malware,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Silver Fox Apt utilise des logiciels malveillants WinOS 4.0 dans les cyberattaques contre les organisations taïwanaises<br>Silver Fox APT Uses Winos 4.0 Malware in Cyber Attacks Against Taiwanese Organizations A new campaign is targeting companies in Taiwan with malware known as Winos 4.0 as part of phishing emails masquerading as the country\'s National Taxation Bureau. The campaign, detected last month by Fortinet FortiGuard Labs, marks a departure from previous attack chains that have leveraged malicious game-related applications. "The sender claimed that the malicious file attached was a list of]]> 2025-02-27T21:06:00+00:00 https://thehackernews.com/2025/02/silver-fox-apt-uses-winos-40-malware-in.html www.secnews.physaphae.fr/article.php?IdArticle=8651662 False Malware None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les pirates spatiaux ciblent les entreprises informatiques russes avec un agent malveillant New Luckystrike<br>Space Pirates Targets Russian IT Firms With New LuckyStrike Agent Malware The threat actor known as Space Pirates has been linked to a malicious campaign targeting Russian information technology (IT) organizations with a previously undocumented malware called LuckyStrike Agent. The activity was detected in November 2024 by Solar, the cybersecurity arm of Russian state-owned telecom company Rostelecom. It\'s tracking the activity under the name Erudite Mogwai. The]]> 2025-02-27T19:20:00+00:00 https://thehackernews.com/2025/02/space-pirates-targets-russian-it-firms.html www.secnews.physaphae.fr/article.php?IdArticle=8651618 False Malware,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) 89% de l'utilisation de l'entreprise Genai est invisible aux organisations exposant les risques de sécurité critiques, révèle un nouveau rapport<br>89% of Enterprise GenAI Usage Is Invisible to Organizations Exposing Critical Security Risks, New Report Reveals Organizations are either already adopting GenAI solutions, evaluating strategies for integrating these tools into their business plans, or both. To drive informed decision-making and effective planning, the availability of hard data is essential—yet such data remains surprisingly scarce. The “Enterprise GenAI Data Security Report 2025” by LayerX delivers unprecedented insights]]> 2025-02-27T18:35:00+00:00 https://thehackernews.com/2025/02/89-of-enterprise-genai-usage-is.html www.secnews.physaphae.fr/article.php?IdArticle=8651619 False Tool None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) La nouvelle variante de Troie bancaire tgtoxique évolue avec des mises à niveau anti-analyse<br>New TgToxic Banking Trojan Variant Evolves with Anti-Analysis Upgrades Cybersecurity researchers have discovered an updated version of an Android malware called TgToxic (aka ToxicPanda), indicating that the threat actors behind it are continuously making changes in response to public reporting. "The modifications seen in the TgToxic payloads reflect the actors\' ongoing surveillance of open source intelligence and demonstrate their commitment to enhancing the]]> 2025-02-27T18:34:00+00:00 https://thehackernews.com/2025/02/new-tgtoxic-banking-trojan-variant.html www.secnews.physaphae.fr/article.php?IdArticle=8651620 False Malware,Threat,Mobile None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Polaredge Botnet exploite Cisco et d'autres défauts pour détourner les dispositifs ASUS, QNAP et Synology<br>PolarEdge Botnet Exploits Cisco and Other Flaws to Hijack ASUS, QNAP, and Synology Devices A new malware campaign has been observed targeting edge devices from Cisco, ASUS, QNAP, and Synology to rope them into a botnet named PolarEdge since at least the end of 2023. French cybersecurity company Sekoia said it observed the unknown threat actors leveraging CVE-2023-20118 (CVSS score: 6.5), a critical security flaw impacting Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and]]> 2025-02-27T14:50:00+00:00 https://thehackernews.com/2025/02/polaredge-botnet-exploits-cisco-and.html www.secnews.physaphae.fr/article.php?IdArticle=8651547 False Malware,Threat None 4.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Bybit Hack Traced to Safe {Wallet} Attaque de la chaîne d'approvisionnement exploitée par des pirates nord-coréens<br>Bybit Hack Traced to Safe{Wallet} Supply Chain Attack Exploited by North Korean Hackers The U.S. Federal Bureau of Investigation (FBI) formally linked the record-breaking $1.5 billion Bybit hack to North Korean threat actors, as the company\'s CEO Ben Zhou declared a "war against Lazarus." The agency said the Democratic People\'s Republic of Korea (North Korea) was responsible for the theft of the virtual assets from the cryptocurrency exchange, attributing it to a specific cluster]]> 2025-02-27T12:45:00+00:00 https://thehackernews.com/2025/02/bybit-hack-traced-to-safewallet-supply.html www.secnews.physaphae.fr/article.php?IdArticle=8651510 False Hack,Threat APT 38 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les pirates ont exploité le framework Krpano pour injecter des publicités de spam sur plus de 350 sites Web<br>Hackers Exploited Krpano Framework Flaw to Inject Spam Ads on 350+ Websites A cross-site scripting (XSS) vulnerability in a virtual tour framework has been weaponized by malicious actors to inject malicious scripts across hundreds of websites with the goal of manipulating search results and fueling a spam ads campaign at scale. Security researcher Oleg Zaytsev, in a report shared with The Hacker News, said the campaign – dubbed 360XSS – affected over 350 websites,]]> 2025-02-26T22:49:00+00:00 https://thehackernews.com/2025/02/hackers-exploited-krpano-framework-flaw.html www.secnews.physaphae.fr/article.php?IdArticle=8651299 False Spam,Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les journaux de chat Black Basta divulgués révèlent des gains de rançon de 107 millions de dollars et des luttes de puissance interne<br>Leaked Black Basta Chat Logs Reveal $107M Ransom Earnings and Internal Power Struggles More than a year\'s worth of internal chat logs from a ransomware gang known as Black Basta have been published online in a leak that provides unprecedented visibility into their tactics and internal conflicts among its members. The Russian-language chats on the Matrix messaging platform between September 18, 2023, and September 28, 2024, were initially leaked on February 11, 2025, by an]]> 2025-02-26T19:24:00+00:00 https://thehackernews.com/2025/02/leaked-black-basta-chat-logs-reveal.html www.secnews.physaphae.fr/article.php?IdArticle=8651223 False Ransomware None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) SOC 3.0 - L'évolution du SOC et comment l'IA stimule les talents humains<br>SOC 3.0 - The Evolution of the SOC and How AI is Empowering Human Talent Organizations today face relentless cyber attacks, with high-profile breaches hitting the headlines almost daily. Reflecting on a long journey in the security field, it\'s clear this isn\'t just a human problem-it\'s a math problem. There are simply too many threats and security tasks for any SOC to manually handle in a reasonable timeframe. Yet, there is a solution. Many refer to it as SOC 3.0-an]]> 2025-02-26T16:58:00+00:00 https://thehackernews.com/2025/02/soc-30-evolution-of-soc-and-how-ai-is.html www.secnews.physaphae.fr/article.php?IdArticle=8651179 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) New Linux Malware \\ 'Auto-Color \\' accorde des pirates à distance accès à distance aux systèmes compromis<br>New Linux Malware \\'Auto-Color\\' Grants Hackers Full Remote Access to Compromised Systems Universities and government organizations in North America and Asia have been targeted by a previously undocumented Linux malware called Auto-Color between November and December 2024, according to new findings from Palo Alto Networks Unit 42. "Once installed, Auto-color allows threat actors full remote access to compromised machines, making it very difficult to remove without specialized]]> 2025-02-26T16:34:00+00:00 https://thehackernews.com/2025/02/new-linux-malware-auto-color-grants.html www.secnews.physaphae.fr/article.php?IdArticle=8651180 False Malware,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Trois techniques de fissuration de mot de passe et comment se défendre contre eux<br>Three Password Cracking Techniques and How to Defend Against Them Passwords are rarely appreciated until a security breach occurs; suffice to say, the importance of a strong password becomes clear only when faced with the consequences of a weak one. However, most end users are unaware of just how vulnerable their passwords are to the most common password-cracking methods. The following are the three common techniques for cracking passwords and how to]]> 2025-02-26T16:26:00+00:00 https://thehackernews.com/2025/02/three-password-cracking-techniques-and.html www.secnews.physaphae.fr/article.php?IdArticle=8651181 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) CERT-UA avertit les attaques UAC-0173 déploiement du DCRAT pour compromettre les notaires ukrainiens<br>CERT-UA Warns of UAC-0173 Attacks Deploying DCRat to Compromise Ukrainian Notaries The Computer Emergency Response Team of Ukraine (CERT-UA) on Tuesday warned of renewed activity from an organized criminal group it tracks as UAC-0173 that involves infecting computers with a remote access trojan named DCRat (aka DarkCrystal RAT). The Ukrainian cybersecurity authority said it observed the latest attack wave starting in mid-January 2025. The activity is designed to target the]]> 2025-02-26T16:23:00+00:00 https://thehackernews.com/2025/02/cert-ua-warns-of-uac-0173-attacks.html www.secnews.physaphae.fr/article.php?IdArticle=8651182 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Le package PYPI malveillant "Automslc" permet les téléchargements de musique deezer 104k + non autorisés<br>Malicious PyPI Package "automslc" Enables 104K+ Unauthorized Deezer Music Downloads Cybersecurity researchers have flagged a malicious Python library on the Python Package Index (PyPI) repository that facilitates unauthorized music downloads from music streaming service Deezer. The package in question is automslc, which has been downloaded over 104,000 times to date. First published in May 2019, it remains available on PyPI as of writing. "Although automslc, which has been]]> 2025-02-26T16:10:00+00:00 https://thehackernews.com/2025/02/malicious-pypi-package-automslc-enables.html www.secnews.physaphae.fr/article.php?IdArticle=8651183 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) CISA ajoute des défauts de Microsoft et Zimbra au catalogue KEV au milieu de l'exploitation active<br>CISA Adds Microsoft and Zimbra Flaws to KEV Catalog Amid Active Exploitation The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday placed two security flaws impacting Microsoft Partner Center and Synacor Zimbra Collaboration Suite (ZCS) to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerabilities in question are as follows - CVE-2024-49035 (CVSS score: 8.7) - An improper access control]]> 2025-02-26T10:03:00+00:00 https://thehackernews.com/2025/02/cisa-adds-microsoft-and-zimbra-flaws-to.html www.secnews.physaphae.fr/article.php?IdArticle=8651088 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) LightSpy s'étend à plus de 100 commandes, augmentant le contrôle sur Windows, MacOS, Linux et Mobile<br>LightSpy Expands to 100+ Commands, Increasing Control Over Windows, macOS, Linux, and Mobile Cybersecurity researchers have flagged an updated version of the LightSpy implant that comes equipped with an expanded set of data collection features to extract information from social media platforms like Facebook and Instagram. LightSpy is the name given to a modular spyware that\'s capable of infecting both Windows and Apple systems with an aim to harvest data. It was first documented in]]> 2025-02-25T21:37:00+00:00 https://thehackernews.com/2025/02/lightspy-expands-to-100-commands.html www.secnews.physaphae.fr/article.php?IdArticle=8650931 False Mobile None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Ghostwriter lié à la Bélarus utilise des macros Excel obfiscus par macropack pour déployer des logiciels malveillants<br>Belarus-Linked Ghostwriter Uses Macropack-Obfuscated Excel Macros to Deploy Malware Opposition activists in Belarus as well as Ukrainian military and government organizations are the target of a new campaign that employs malware-laced Microsoft Excel documents as lures to deliver a new variant of PicassoLoader.  The threat cluster has been assessed to be an extension of a long-running campaign mounted by a Belarus-aligned threat actor dubbed Ghostwriter (aka Moonscape,]]> 2025-02-25T21:24:00+00:00 https://thehackernews.com/2025/02/belarus-linked-ghostwriter-uses.html www.secnews.physaphae.fr/article.php?IdArticle=8650932 False Malware,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) 5 campagnes de logiciels malveillants actifs au premier trimestre 2025<br>5 Active Malware Campaigns in Q1 2025 The first quarter of 2025 has been a battlefield in the world of cybersecurity. Cybercriminals continued launching aggressive new campaigns and refining their attack methods. Below is an overview of five notable malware families, accompanied by analyses conducted in controlled environments. NetSupport RAT Exploiting the ClickFix Technique In early 2025, threat actors began exploiting a technique]]> 2025-02-25T16:30:00+00:00 https://thehackernews.com/2025/02/5-active-malware-campaigns-in-q1-2025.html www.secnews.physaphae.fr/article.php?IdArticle=8650818 False Malware,Threat None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) 2 500+ variantes de pilote Truesight.sys exploitées pour contourner EDR et déployer Hiddengh0st Rat<br>2,500+ Truesight.sys Driver Variants Exploited to Bypass EDR and Deploy HiddenGh0st RAT A large-scale malware campaign has been found leveraging a vulnerable Windows driver associated with Adlice\'s product suite to sidestep detection efforts and deliver the Gh0st RAT malware. "To further evade detection, the attackers deliberately generated multiple variants (with different hashes) of the 2.0.2 driver by modifying specific PE parts while keeping the signature valid," Check Point]]> 2025-02-25T15:52:00+00:00 https://thehackernews.com/2025/02/2500-truesightsys-driver-variants.html www.secnews.physaphae.fr/article.php?IdArticle=8650819 False Malware None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Gitvenom Malware vole 456 000 $ en Bitcoin en utilisant de faux projets GitHub pour détourner les portefeuilles<br>GitVenom Malware Steals $456K in Bitcoin Using Fake GitHub Projects to Hijack Wallets Cybersecurity researchers are calling attention to an ongoing campaign that\'s targeting gamers and cryptocurrency investors under the guise of open-source projects hosted on GitHub. The campaign, which spans hundreds of repositories, has been dubbed GitVenom by Kaspersky. "The infected projects include an automation instrument for interacting with Instagram accounts, a Telegram bot that enables]]> 2025-02-25T15:43:00+00:00 https://thehackernews.com/2025/02/gitvenom-malware-steals-456k-in-bitcoin.html www.secnews.physaphae.fr/article.php?IdArticle=8650820 False Malware None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les attaques de phishing fatalrat ciblent les industries APAC en utilisant des services de cloud chinois<br>FatalRAT Phishing Attacks Target APAC Industries Using Chinese Cloud Services Various industrial organizations in the Asia-Pacific (APAC) region have been targeted as part of phishing attacks designed to deliver a known malware called FatalRAT. "The threat was orchestrated by attackers using legitimate Chinese cloud content delivery network (CDN) myqcloud and the Youdao Cloud Notes service as part of their attack infrastructure," Kaspersky ICS CERT said in a Monday]]> 2025-02-25T11:21:00+00:00 https://thehackernews.com/2025/02/fatalrat-phishing-attacks-target-apac.html www.secnews.physaphae.fr/article.php?IdArticle=8650740 False Malware,Threat,Industrial,Cloud None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Deux défauts de sécurité activement exploités dans Adobe et Oracle Products signalés par CISA<br>Two Actively Exploited Security Flaws in Adobe and Oracle Products Flagged by CISA The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two security flaws impacting Adobe ColdFusion and Oracle Agile Product Lifecycle Management (PLM) to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerabilities in question are listed below - CVE-2017-3066 (CVSS score: 9.8) - A deserialization vulnerability impacting]]> 2025-02-25T09:40:00+00:00 https://thehackernews.com/2025/02/two-actively-exploited-security-flaws.html www.secnews.physaphae.fr/article.php?IdArticle=8650726 False Vulnerability None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Une nouvelle campagne de logiciels malveillants utilise un logiciel Cracked pour répandre Lumma et ACR Stealer<br>New Malware Campaign Uses Cracked Software to Spread Lumma and ACR Stealer Cybersecurity researchers are warning of a new campaign that leverages cracked versions of software as a lure to distribute information stealers like Lumma and ACR Stealer. The AhnLab Security Intelligence Center (ASEC) said it has observed a spike in the distribution volume of ACR Stealer since January 2025. A notable aspect of the stealer malware is the use of a technique called dead drop]]> 2025-02-24T22:28:00+00:00 https://thehackernews.com/2025/02/new-malware-campaign-uses-cracked.html www.secnews.physaphae.fr/article.php?IdArticle=8650577 False Malware None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) ⚡ Recaps hebdomadaire thn: à partir de 1,5 milliard de dollars de la crypto au dilemme des données AI Misuse et Apple \\<br>⚡ THN Weekly Recap: From $1.5B Crypto Heist to AI Misuse & Apple\\'s Data Dilemma Welcome to your weekly roundup of cyber news, where every headline gives you a peek into the world of online battles. This week, we look at a huge crypto theft, reveal some sneaky AI scam tricks, and discuss big changes in data protection. Let these stories spark your interest and help you understand the changing threats in our digital world. ⚡ Threat of the Week Lazarus Group Linked to]]> 2025-02-24T16:50:00+00:00 https://thehackernews.com/2025/02/thn-weekly-recap-from-15b-crypto-heist.html www.secnews.physaphae.fr/article.php?IdArticle=8650471 False Threat None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Devenir à des ransomwares prêts: pourquoi la validation continue est votre meilleure défense<br>Becoming Ransomware Ready: Why Continuous Validation Is Your Best Defense Ransomware doesn\'t hit all at once-it slowly floods your defenses in stages. Like a ship subsumed with water, the attack starts quietly, below the surface, with subtle warning signs that are easy to miss. By the time encryption starts, it\'s too late to stop the flood.  Each stage of a ransomware attack offers a small window to detect and stop the threat before it\'s too late. The problem is]]> 2025-02-24T16:47:00+00:00 https://thehackernews.com/2025/02/becoming-ransomware-ready-why.html www.secnews.physaphae.fr/article.php?IdArticle=8650472 False Ransomware,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Google Cloud KMS ajoute des signatures numériques à sécurité quantique pour se défendre contre les menaces futures<br>Google Cloud KMS Adds Quantum-Safe Digital Signatures to Defend Against Future Threats Google Cloud has announced quantum-safe digital signatures in Google Cloud Key Management Service (Cloud KMS) for software-based keys as a way to bulletproof encryption systems against the threat posed by cryptographically-relevant quantum computers. The feature, currently in preview, coexists with the National Institute of Standards and Technology\'s (NIST) post-quantum cryptography (PQC)]]> 2025-02-24T16:47:00+00:00 https://thehackernews.com/2025/02/google-cloud-kms-adds-quantum-safe.html www.secnews.physaphae.fr/article.php?IdArticle=8650473 False Threat,Cloud None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) L'Australie interdit les logiciels Kaspersky sur les problèmes de sécurité nationale et d'espionnage<br>Australia Bans Kaspersky Software Over National Security and Espionage Concerns Australia has become the latest country to ban the installation of security software from Russian company Kaspersky, citing national security concerns. "After considering threat and risk analysis, I have determined that the use of Kaspersky Lab, Inc. products and web services by Australian Government entities poses an unacceptable security risk to Australian Government, networks and data,]]> 2025-02-24T15:27:00+00:00 https://thehackernews.com/2025/02/australia-bans-kaspersky-software-over.html www.secnews.physaphae.fr/article.php?IdArticle=8650452 False Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Bybit confirme le bilan de crypto record de 1,46 milliard de dollars dans une attaque sophistiquée de portefeuille froid<br>Bybit Confirms Record-Breaking $1.46 Billion Crypto Heist in Sophisticated Cold Wallet Attack Cryptocurrency exchange Bybit on Friday revealed that a "sophisticated" attack led to the theft of over $1.46 billion worth of cryptocurrency from one of its Ethereum cold (offline) wallets, making it the largest ever single crypto heist in history. "The incident occurred when our ETH multisig cold wallet executed a transfer to our warm wallet. Unfortunately, this transaction was manipulated]]> 2025-02-22T12:29:00+00:00 https://thehackernews.com/2025/02/bybit-confirms-record-breaking-146.html www.secnews.physaphae.fr/article.php?IdArticle=8649836 False None None 4.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Openai interdit les comptes abusant le chatppt pour les campagnes de surveillance et d'influence<br>OpenAI Bans Accounts Misusing ChatGPT for Surveillance and Influence Campaigns OpenAI on Friday revealed that it banned a set of accounts that used its ChatGPT tool to develop a suspected artificial intelligence (AI)-powered surveillance tool. The social media listening tool is said to likely originate from China and is powered by one of Meta\'s Llama models, with the accounts in question using the AI company\'s models to generate detailed descriptions and analyze documents]]> 2025-02-22T10:47:00+00:00 https://thehackernews.com/2025/02/openai-bans-accounts-misusing-chatgpt.html www.secnews.physaphae.fr/article.php?IdArticle=8649811 False Tool ChatGPT 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Apple abandonne la protection avancée des données d'Icloud \\ au Royaume-Uni au milieu des demandes de porte dérobée du cryptage<br>Apple Drops iCloud\\'s Advanced Data Protection in the U.K. Amid Encryption Backdoor Demands Apple is removing its Advanced Data Protection (ADP) feature for iCloud from the United Kingdom with immediate effect following government demands for backdoor access to encrypted user data. The development was first reported by Bloomberg. ADP for iCloud is an optional setting that ensures that users\' trusted devices retain sole access to the encryption keys used to unlock data stored in its]]> 2025-02-21T21:45:00+00:00 https://thehackernews.com/2025/02/apple-drops-iclouds-advanced-data.html www.secnews.physaphae.fr/article.php?IdArticle=8649644 False None None 4.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) La fuite de données expose le rôle de TopSec \\ dans les opérations de censure de la Chine en tant que service<br>Data Leak Exposes TopSec\\'s Role in China\\'s Censorship-as-a-Service Operations An analysis of a data leak from a Chinese cybersecurity company TopSec has revealed that it likely offers censorship-as-a-service solutions to prospective customers, including a state-owned enterprise in the country. Founded in 1995, TopSec ostensibly offers services such as Endpoint Detection and Response (EDR) and vulnerability scanning. But it\'s also providing "boutique" solutions in order]]> 2025-02-21T21:36:00+00:00 https://thehackernews.com/2025/02/data-leak-exposes-topsecs-role-in.html www.secnews.physaphae.fr/article.php?IdArticle=8649645 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les cybercriminels peuvent désormais cloner n'importe quel site de la marque en quelques minutes en utilisant Darcula Phaas V3<br>Cybercriminals Can Now Clone Any Brand\\'s Site in Minutes Using Darcula PhaaS v3 The threat actors behind the Darcula phishing-as-a-service (PhaaS) platform appear to be readying a new version that allows prospective customers and cyber crooks to clone any brand\'s legitimate website and create a phishing version, further bringing down the technical expertise required to pull off phishing attacks at scale. The latest iteration of the phishing suite "represents a significant]]> 2025-02-21T18:33:00+00:00 https://thehackernews.com/2025/02/cybercriminals-can-now-clone-any-brands.html www.secnews.physaphae.fr/article.php?IdArticle=8649590 False Threat,Technical None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Webinaire: Apprenez à identifier les lacunes à haut risque d'identité et la dette de sécurité en 2025<br>Webinar: Learn How to Identify High-Risk Identity Gaps and Slash Security Debt in 2025 In today\'s rapidly evolving digital landscape, weak identity security isn\'t just a flaw-it\'s a major risk that can expose your business to breaches and costly downtime. Many organizations are overwhelmed by an excess of user identities and aging systems, making them vulnerable to attacks. Without a strategic plan, these security gaps can quickly turn into expensive liabilities. Join us for "]]> 2025-02-21T17:10:00+00:00 https://thehackernews.com/2025/02/webinar-learn-how-to-identify-high-risk.html www.secnews.physaphae.fr/article.php?IdArticle=8649572 False None None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) AI-Powered Deception is a Menace to Our Societies 2025-02-21T16:30:00+00:00 https://thehackernews.com/2025/02/ai-powered-deception-is-menace-to-our.html www.secnews.physaphae.fr/article.php?IdArticle=8649555 False None None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Cisco Confirms Salt Typhoon Exploited CVE-2018-0171 to Target U.S. Telecom Networks Cisco has confirmed that a Chinese threat actor known as Salt Typhoon gained access by likely abusing a known security flaw tracked as CVE-2018-0171, and by obtaining legitimate victim login credentials as part of a targeted campaign aimed at major U.S. telecommunications companies. "The threat actor then demonstrated their ability to persist in target environments across equipment from multiple]]> 2025-02-21T13:08:00+00:00 https://thehackernews.com/2025/02/cisco-confirms-salt-typhoon-exploited.html www.secnews.physaphae.fr/article.php?IdArticle=8649510 False Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) CISA Flags Craft CMS Vulnerability CVE-2025-23209 Amid Active Attacks A high-severity security flaw impacting the Craft content management system (CMS) has been added by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability in question is CVE-2025-23209 (CVSS score: 8.1), which impacts Craft CMS versions 4 and 5. It was addressed by the]]> 2025-02-21T12:56:00+00:00 https://thehackernews.com/2025/02/cisa-flags-craft-cms-vulnerability-cve.html www.secnews.physaphae.fr/article.php?IdArticle=8649511 False Vulnerability None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) North Korean Hackers Target Freelance Developers in Job Scam to Deploy Malware Freelance software developers are the target of an ongoing campaign that leverages job interview-themed lures to deliver cross-platform malware families known as BeaverTail and InvisibleFerret. The activity, linked to North Korea, has been codenamed DeceptiveDevelopment, which overlaps with clusters tracked under the names Contagious Interview (aka CL-STA-0240), DEV#POPPER, Famous Chollima,]]> 2025-02-20T19:07:00+00:00 https://thehackernews.com/2025/02/north-korean-hackers-target-freelance.html www.secnews.physaphae.fr/article.php?IdArticle=8649260 False Malware None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Chinese-Linked Attackers Exploit Check Point Flaw to Deploy ShadowPad and Ransomware A previously unknown threat activity cluster targeted European organizations, particularly those in the healthcare sector, to deploy PlugX and its successor, ShadowPad, with the intrusions ultimately leading to deployment of a ransomware called NailaoLocker in some cases. The campaign, codenamed Green Nailao by Orange Cyberdefense CERT, involved the exploitation of a new-patched security flaw]]> 2025-02-20T16:51:00+00:00 https://thehackernews.com/2025/02/chinese-linked-attackers-exploit-check.html www.secnews.physaphae.fr/article.php?IdArticle=8649214 False Ransomware,Threat,Medical None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) PCI DSS 4.0 Mandates DMARC By 31st March 2025 The payment card industry has set a critical deadline for businesses handling cardholder data or processing payments- by March 31, 2025, DMARC implementation will be mandatory! This requirement highlights the importance of preventative measures against email fraud, domain spoofing, and phishing in the financial space. This is not an optional requirement as non-compliance may result in monetary]]> 2025-02-20T16:51:00+00:00 https://thehackernews.com/2025/02/pci-dss-40-mandates-dmarc-by-31st-march.html www.secnews.physaphae.fr/article.php?IdArticle=8649213 False None None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Cybercriminals Use Eclipse Jarsigner to Deploy XLoader Malware via ZIP Archives A malware campaign distributing the XLoader malware has been observed using the DLL side-loading technique by making use of a legitimate application associated with the Eclipse Foundation. "The legitimate application used in the attack, jarsigner, is a file created during the installation of the IDE package distributed by the Eclipse Foundation," the AhnLab SEcurity Intelligence Center (ASEC)]]> 2025-02-20T16:42:00+00:00 https://thehackernews.com/2025/02/cybercriminals-use-eclipse-jarsigner-to.html www.secnews.physaphae.fr/article.php?IdArticle=8649215 False Malware None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Microsoft\\'s End of Support for Exchange 2016 and 2019: What IT Teams Must Do Now For decades, Microsoft Exchange has been the backbone of business communications, powering emailing, scheduling and collaboration for organizations worldwide. Whether deployed on-premises or in hybrid environments, companies of all sizes rely on Exchange for seamless internal and external communication, often integrating it deeply with their workflows, compliance policies and security frameworks]]> 2025-02-20T15:30:00+00:00 https://thehackernews.com/2025/02/microsoft-end-of-support-for-exchange-2016-and-exchange-2019.html www.secnews.physaphae.fr/article.php?IdArticle=8649196 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Citrix Releases Security Fix for NetScaler Console Privilege Escalation Vulnerability Citrix has released security updates for a high-severity security flaw impacting NetScaler Console (formerly NetScaler ADM) and NetScaler Agent that could lead to privilege escalation under certain conditions. The vulnerability, tracked as CVE-2024-12284, has been given a CVSS v4 score of 8.8 out of a maximum of 10.0 It has been described as a case of improper privilege management that could]]> 2025-02-20T10:06:00+00:00 https://thehackernews.com/2025/02/citrix-releases-security-fix-for.html www.secnews.physaphae.fr/article.php?IdArticle=8649116 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Microsoft Patches Actively Exploited Power Pages Privilege Escalation Vulnerability Microsoft has released security updates to address two Critical-rated flaws impacting Bing and Power Pages, including one that has come under active exploitation in the wild. The vulnerabilities are listed below - CVE-2025-21355 (CVSS score: 8.6) - Microsoft Bing Remote Code Execution Vulnerability CVE-2025-24989 (CVSS score: 8.2) - Microsoft Power Pages Elevation of Privilege Vulnerability "]]> 2025-02-20T09:59:00+00:00 https://thehackernews.com/2025/02/microsoft-patches-actively-exploited.html www.secnews.physaphae.fr/article.php?IdArticle=8649117 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Hackers Exploit Signal\\'s Linked Devices Feature to Hijack Accounts via Malicious QR Codes Multiple Russia-aligned threat actors have been observed targeting individuals of interest via the privacy-focused messaging app Signal to gain unauthorized access to their accounts. "The most novel and widely used technique underpinning Russian-aligned attempts to compromise Signal accounts is the abuse of the app\'s legitimate \'linked devices\' feature that enables Signal to be used on multiple]]> 2025-02-19T22:29:00+00:00 https://thehackernews.com/2025/02/hackers-exploit-signals-linked-devices.html www.secnews.physaphae.fr/article.php?IdArticle=8649034 False Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) New Snake Keylogger Variant Leverages AutoIt Scripting to Evade Detection A new variant of the Snake Keylogger malware is being used to actively target Windows users located in China, Turkey, Indonesia, Taiwan, and Spain. Fortinet FortiGuard Labs said the new version of the malware has been behind over 280 million blocked infection attempts worldwide since the start of the year. "Typically delivered through phishing emails containing malicious attachments or links,]]> 2025-02-19T18:15:00+00:00 https://thehackernews.com/2025/02/new-snake-keylogger-variant-leverages.html www.secnews.physaphae.fr/article.php?IdArticle=8648992 False Malware None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) The Ultimate MSP Guide to Structuring and Selling vCISO Services The growing demand for cybersecurity and compliance services presents a great opportunity for Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) to offer virtual Chief Information Security Officer (vCISO) services-delivering high-level cybersecurity leadership without the cost of a full-time hire. However, transitioning to vCISO services is not without its challenges]]> 2025-02-19T16:30:00+00:00 https://thehackernews.com/2025/02/the-ultimate-msp-guide-to-structuring.html www.secnews.physaphae.fr/article.php?IdArticle=8648993 False None None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Trojanized Game Installers Deploy Cryptocurrency Miner in Large-Scale StaryDobry Attack Users who are on the lookout for popular games were lured into downloading trojanized installers that led to the deployment of a cryptocurrency miner on compromised Windows hosts. The large-scale activity has been codenamed StaryDobry by Russian cybersecurity company Kaspersky, which first detected it on December 31, 2024. It lasted for a month. Targets of the campaign include individuals and]]> 2025-02-19T15:05:00+00:00 https://thehackernews.com/2025/02/trojanized-game-installers-deploy.html www.secnews.physaphae.fr/article.php?IdArticle=8648975 False None None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) CISA Adds Palo Alto Networks and SonicWall Flaws to Exploited Vulnerabilities List The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting Palo Alto Networks PAN-OS and SonicWall SonicOS SSLVPN to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The flaws are listed below - CVE-2025-0108 (CVSS score: 7.8) - An authentication bypass vulnerability in the Palo Alto Networks PAN-OS]]> 2025-02-19T10:18:00+00:00 https://thehackernews.com/2025/02/cisa-adds-palo-alto-networks-and.html www.secnews.physaphae.fr/article.php?IdArticle=8648948 False Vulnerability None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) New OpenSSH Flaws Enable Man-in-the-Middle and DoS Attacks - Patch Now Two security vulnerabilities have been discovered in the OpenSSH secure networking utility suite that, if successfully exploited, could result in an active machine-in-the-middle (MitM) and a denial-of-service (DoS) attack, respectively, under certain conditions. The vulnerabilities, detailed by the Qualys Threat Research Unit (TRU), are listed below - CVE-2025-26465 - The OpenSSH client]]> 2025-02-18T21:04:00+00:00 https://thehackernews.com/2025/02/new-openssh-flaws-enable-man-in-middle.html www.secnews.physaphae.fr/article.php?IdArticle=8648895 False Vulnerability,Threat None 3.0000000000000000