www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2025-05-12T00:01:25+00:00 www.secnews.physaphae.fr The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Chinese Hackers Exploit MAVInject.exe to Evade Detection in Targeted Cyber Attacks The Chinese state-sponsored threat actor known as Mustang Panda has been observed employing a novel technique to evade detection and maintain control over infected systems. This involves the use of a legitimate Microsoft Windows utility called Microsoft Application Virtualization Injector (MAVInject.exe) to inject the threat actor\'s malicious payload into an external process, waitfor.exe,]]> 2025-02-18T20:39:00+00:00 https://thehackernews.com/2025/02/chinese-hackers-exploit-mavinjectexe-to.html www.secnews.physaphae.fr/article.php?IdArticle=8648883 False Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) New FrigidStealer Malware Targets macOS Users via Fake Browser Updates Cybersecurity researchers are alerting to a new campaign that leverages web injects to deliver a new Apple macOS malware known as FrigidStealer. The activity has been attributed to a previously undocumented threat actor known as TA2727, with the information stealers for other platforms such as Windows (Lumma Stealer or DeerStealer) and Android (Marcher). TA2727 is a "threat actor that uses fake]]> 2025-02-18T18:30:00+00:00 https://thehackernews.com/2025/02/new-frigidstealer-malware-targets-macos.html www.secnews.physaphae.fr/article.php?IdArticle=8648864 False Malware,Threat,Mobile None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Juniper Session Smart Routers Vulnerability Could Let Attackers Bypass Authentication Juniper Networks has released security updates to address a critical security flaw impacting Session Smart Router, Session Smart Conductor, and WAN Assurance Router products that could be exploited to hijack control of susceptible devices. Tracked as CVE-2025-21589, the vulnerability carries a CVSS v3.1 score of 9.8 and a CVS v4 score of 9.3. "An Authentication Bypass Using an Alternate Path or]]> 2025-02-18T17:48:00+00:00 https://thehackernews.com/2025/02/juniper-session-smart-routers.html www.secnews.physaphae.fr/article.php?IdArticle=8648854 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Debunking the AI Hype: Inside Real Hacker Tactics Is AI really reshaping the cyber threat landscape, or is the constant drumbeat of hype drowning out actual, more tangible, real-world dangers? According to Picus Labs\' Red Report 2025 which analyzed over one million malware samples, there\'s been no significant surge, so far, in AI-driven attacks. Yes, adversaries are definitely continuing to innovate, and while AI will certainly start playing a]]> 2025-02-18T16:30:00+00:00 https://thehackernews.com/2025/02/debunking-ai-hype-inside-real-hacker.html www.secnews.physaphae.fr/article.php?IdArticle=8648843 False Malware,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Winnti APT41 Targets Japanese Firms in RevivalStone Cyber Espionage Campaign The China-linked threat actor known as Winnti has been attributed to a new campaign dubbed RevivalStone that targeted Japanese companies in the manufacturing, materials, and energy sectors in March 2024. The activity, detailed by Japanese cybersecurity company LAC, overlaps with a threat cluster tracked by Trend Micro as Earth Freybug, which has been assessed to be a subset within the APT41]]> 2025-02-18T15:22:00+00:00 https://thehackernews.com/2025/02/winnti-apt41-targets-japanese-firms-in.html www.secnews.physaphae.fr/article.php?IdArticle=8648844 False Threat,Prediction APT 41 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) New Xerox Printer Flaws Could Let Attackers Capture Windows Active Directory Credentials Security vulnerabilities have been disclosed in Xerox VersaLink C7025 Multifunction printers (MFPs) that could allow attackers to capture authentication credentials via pass-back attacks via Lightweight Directory Access Protocol (LDAP) and SMB/FTP services. "This pass-back style attack leverages a vulnerability that allows a malicious actor to alter the MFP\'s configuration and cause the MFP]]> 2025-02-18T12:34:00+00:00 https://thehackernews.com/2025/02/new-xerox-printer-flaws-could-let.html www.secnews.physaphae.fr/article.php?IdArticle=8648820 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Cybercriminals Exploit Onerror Event in Image Tags to Deploy Payment Skimmers Cybersecurity researchers have flagged a credit card stealing malware campaign that has been observed targeting e-commerce sites running Magento by disguising the malicious content within image tags in HTML code in order to stay under the radar. MageCart is the name given to a malware that\'s capable of stealing sensitive payment information from online shopping sites. The attacks are known to]]> 2025-02-18T10:56:00+00:00 https://thehackernews.com/2025/02/cybercriminals-exploit-onerror-event-in.html www.secnews.physaphae.fr/article.php?IdArticle=8648815 False Malware,Threat None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Microsoft Uncovers New XCSSET macOS Malware Variant with Advanced Obfuscation Tactics Microsoft said it has discovered a new variant of a known Apple macOS malware called XCSSET as part of limited attacks in the wild. "Its first known variant since 2022, this latest XCSSET malware features enhanced obfuscation methods, updated persistence mechanisms, and new infection strategies," the Microsoft Threat Intelligence team said in a post shared on X. "These enhanced features add to]]> 2025-02-17T22:00:00+00:00 https://thehackernews.com/2025/02/microsoft-uncovers-new-xcsset-macos.html www.secnews.physaphae.fr/article.php?IdArticle=8648781 False Malware,Threat None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) South Korea Suspends DeepSeek AI Downloads Over Privacy Violations South Korea has formally suspended new downloads of Chinese artificial intelligence (AI) chatbot DeepSeek in the country until the service makes changes to its mobile apps to comply with data protection regulations. Downloads have been paused as of February 15, 2025, 6:00 p.m. local time, the Personal Information Protection Commission (PIPC) said in a statement. The web service remains]]> 2025-02-17T17:06:00+00:00 https://thehackernews.com/2025/02/south-korea-suspends-deepseek-ai.html www.secnews.physaphae.fr/article.php?IdArticle=8648761 False Mobile None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) CISO\\'s Expert Guide To CTEM And Why It Matters Cyber threats evolve-has your defense strategy kept up? A new free guide available here explains why Continuous Threat Exposure Management (CTEM) is the smart approach for proactive cybersecurity. This concise report makes a clear business case for why CTEM\'s comprehensive approach is the best overall strategy for shoring up a business\'s cyber defenses in the face of evolving attacks. It also]]> 2025-02-17T16:30:00+00:00 https://thehackernews.com/2025/02/cisos-expert-guide-to-ctem-and-why-it.html www.secnews.physaphae.fr/article.php?IdArticle=8648747 False Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) ⚡ THN Weekly Recap: Google Secrets Stolen, Windows Hack, New Crypto Scams and More Welcome to this week\'s Cybersecurity News Recap. Discover how cyber attackers are using clever tricks like fake codes and sneaky emails to gain access to sensitive data. We cover everything from device code phishing to cloud exploits, breaking down the technical details into simple, easy-to-follow insights. ⚡ Threat of the Week Russian Threat Actors Leverage Device Code Phishing to Hack]]> 2025-02-17T14:49:00+00:00 https://thehackernews.com/2025/02/thn-weekly-recap-google-secrets-stolen.html www.secnews.physaphae.fr/article.php?IdArticle=8648690 False Hack,Threat,Cloud,Technical None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) New Golang-Based Backdoor Uses Telegram Bot API for Evasive C2 Operations Cybersecurity researchers have shed light on a new Golang-based backdoor that uses Telegram as a mechanism for command-and-control (C2) communications. Netskope Threat Labs, which detailed the functions of the malware, described it as possibly of Russian origin. "The malware is compiled in Golang and once executed it acts like a backdoor," security researcher Leandro Fróes said in an analysis]]> 2025-02-17T14:34:00+00:00 https://thehackernews.com/2025/02/new-golang-based-backdoor-uses-telegram.html www.secnews.physaphae.fr/article.php?IdArticle=8648691 False Malware,Threat None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Android\\'s New Feature Blocks Fraudsters from Sideloading Apps During Calls Google is working on a new security feature for Android that blocks device owners from changing sensitive settings when a phone call is in progress. Specifically, the in-call anti-scammer protections include preventing users from turning on settings to install apps from unknown sources and granting accessibility access. The development was first reported by Android Authority. Users who attempt]]> 2025-02-15T15:56:00+00:00 https://thehackernews.com/2025/02/androids-new-feature-blocks-fraudsters.html www.secnews.physaphae.fr/article.php?IdArticle=8648580 False Mobile None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution Cybersecurity researchers have disclosed a new type of name confusion attack called whoAMI that allows anyone who publishes an Amazon Machine Image (AMI) with a specific name to gain code execution within the Amazon Web Services (AWS) account. "If executed at scale, this attack could be used to gain access to thousands of accounts," Datadog Security Labs researcher Seth Art said in a report]]> 2025-02-15T00:12:00+00:00 https://thehackernews.com/2025/02/new-whoami-attack-exploits-aws-ami-name.html www.secnews.physaphae.fr/article.php?IdArticle=8648537 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Lazarus Group Deploys Marstech1 JavaScript Implant in Targeted Developer Attacks The North Korean threat actor known as the Lazarus Group has been linked to a previously undocumented JavaScript implant named Marstech1 as part of limited targeted attacks against developers. The active operation has been dubbed Marstech Mayhem by SecurityScorecard, with the malware delivered by means of an open-source repository hosted on GitHub that\'s associated with a profile named "]]> 2025-02-14T23:58:00+00:00 https://thehackernews.com/2025/02/lazarus-group-deploys-marstech1.html www.secnews.physaphae.fr/article.php?IdArticle=8648530 False Malware,Threat APT 38 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) AI-Powered Social Engineering: Ancillary Tools and Techniques Social engineering is advancing fast, at the speed of generative AI. This is offering bad actors multiple new tools and techniques for researching, scoping, and exploiting organizations. In a recent communication, the FBI pointed out: \'As technology continues to evolve, so do cybercriminals\' tactics.\' This article explores some of the impacts of this GenAI-fueled acceleration. And examines what]]> 2025-02-14T16:30:00+00:00 https://thehackernews.com/2025/02/ai-powered-social-engineering-ancillary.html www.secnews.physaphae.fr/article.php?IdArticle=8648468 False Tool None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Microsoft: Russian-Linked Hackers Using \\'Device Code Phishing\\' to Hijack Accounts Microsoft is calling attention to an emerging threat cluster it calls Storm-2372 that has been attributed to a new set of cyber attacks aimed at a variety of sectors since August 2024. The attacks have targeted government, non-governmental organizations (NGOs), information technology (IT) services and technology, defense, telecommunications, health, higher education, and energy/oil and gas]]> 2025-02-14T15:57:00+00:00 https://thehackernews.com/2025/02/microsoft-russian-linked-hackers-using.html www.secnews.physaphae.fr/article.php?IdArticle=8648469 False Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) RansomHub Becomes 2024\\'s Top Ransomware Group, Hitting 600+ Organizations Globally The threat actors behind the RansomHub ransomware-as-a-service (RaaS) scheme have been observed leveraging now-patched security flaws in Microsoft Active Directory and the Netlogon protocol to escalate privileges and gain unauthorized access to a victim network\'s domain controller as part of their post-compromise strategy. "RansomHub has targeted over 600 organizations globally, spanning sectors]]> 2025-02-14T15:47:00+00:00 https://thehackernews.com/2025/02/ransomhub-becomes-2024s-top-ransomware.html www.secnews.physaphae.fr/article.php?IdArticle=8648470 False Ransomware,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) PostgreSQL Vulnerability Exploited Alongside BeyondTrust Zero-Day in Targeted Attacks Threat actors who were behind the exploitation of a zero-day vulnerability in BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) products in December 2024 likely also exploited a previously unknown SQL injection flaw in PostgreSQL, according to findings from Rapid7. The vulnerability, tracked as CVE-2025-1094 (CVSS score: 8.1), affects the PostgreSQL interactive tool psql. "An]]> 2025-02-14T10:33:00+00:00 https://thehackernews.com/2025/02/postgresql-vulnerability-exploited.html www.secnews.physaphae.fr/article.php?IdArticle=8648448 False Tool,Vulnerability,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Hackers Use CAPTCHA Trick on Webflow CDN PDFs to Bypass Security Scanners A widespread phishing campaign has been observed leveraging bogus PDF documents hosted on the Webflow content delivery network (CDN) with an aim to steal credit card information and commit financial fraud. "The attacker targets victims searching for documents on search engines, resulting in access to malicious PDF that contains a CAPTCHA image embedded with a phishing link, leading them to]]> 2025-02-13T20:43:00+00:00 https://thehackernews.com/2025/02/hackers-use-captcha-trick-on-webflow.html www.secnews.physaphae.fr/article.php?IdArticle=8648393 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) North Korean APT43 Uses PowerShell and Dropbox in Targeted South Korea Cyberattacks A nation-state threat actor with ties to North Korea has been linked to an ongoing campaign targeting South Korean business, government, and cryptocurrency sectors. The attack campaign, dubbed DEEP#DRIVE by Securonix, has been attributed to a hacking group known as Kimsuky, which is also tracked under the names APT43, Black Banshee, Emerald Sleet, Sparkling Pisces, Springtail, TA427, and Velvet]]> 2025-02-13T19:56:00+00:00 https://thehackernews.com/2025/02/north-korean-apt43-uses-powershell-and.html www.secnews.physaphae.fr/article.php?IdArticle=8648389 False Threat APT 43 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Fast Deployments, Secure Code: Watch this Learn to Sync Dev and Sec Teams Ever felt like your team is stuck in a constant battle? Developers rush to add new features, while security folks worry about vulnerabilities. What if you could bring both sides together without sacrificing one for the other? We invite you to our upcoming webinar, "Opening the Fast Lane for Secure Deployments." This isn\'t another tech talk full of buzzwords-it\'s a down-to-earth session that]]> 2025-02-13T17:55:00+00:00 https://thehackernews.com/2025/02/fast-deployments-secure-code-watch-this.html www.secnews.physaphae.fr/article.php?IdArticle=8648367 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) RA World Ransomware Attack in South Asia Links to Chinese Espionage Toolset An RA World ransomware attack in November 2024 targeting an unnamed Asian software and services company involved the use of a malicious tool exclusively used by China-based cyber espionage groups, raising the possibility that the threat actor may be moonlighting as a ransomware player in an individual capacity. "During the attack in late 2024, the attacker deployed a distinct toolset that had]]> 2025-02-13T17:28:00+00:00 https://thehackernews.com/2025/02/hackers-exploited-pan-os-flaw-to-deploy.html www.secnews.physaphae.fr/article.php?IdArticle=8648368 False Ransomware,Tool,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) AI and Security - A New Puzzle to Figure Out AI is everywhere now, transforming how businesses operate and how users engage with apps, devices, and services. A lot of applications now have some Artificial Intelligence inside, whether supporting a chat interface, intelligently analyzing data or matching user preferences. No question AI benefits users, but it also brings new security challenges, especially Identity-related security]]> 2025-02-13T16:30:00+00:00 https://thehackernews.com/2025/02/ai-and-security-new-puzzle-to-figure-out.html www.secnews.physaphae.fr/article.php?IdArticle=8648369 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Palo Alto Networks Patches Authentication Bypass Exploit in PAN-OS Software Palo Alto Networks has addressed a high-severity security flaw in its PAN-OS software that could result in an authentication bypass. The vulnerability, tracked as CVE-2025-0108, carries a CVSS score of 7.8 out of 10.0. The score, however, drops to 5.1 if access to the management interface is restricted to a jump box. "An authentication bypass in the Palo Alto Networks PAN-OS software enables an]]> 2025-02-13T15:09:00+00:00 https://thehackernews.com/2025/02/palo-alto-networks-patches.html www.secnews.physaphae.fr/article.php?IdArticle=8648339 False Vulnerability,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) FINALDRAFT Malware Exploits Microsoft Graph API for Espionage on Windows and Linux Threat hunters have shed light on a new campaign targeting the foreign ministry of an unnamed South American nation with bespoke malware capable of granting remote access to infected hosts. The activity, detected in November 2024, has been attributed by Elastic Security Labs to a threat cluster it tracks as REF7707. Some of the other targets include a telecommunications entity and a university,]]> 2025-02-13T14:41:00+00:00 https://thehackernews.com/2025/02/finaldraft-malware-exploits-microsoft.html www.secnews.physaphae.fr/article.php?IdArticle=8648331 False Malware,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Microsoft Uncovers Sandworm Subgroup\\'s Global Cyber Attacks Spanning 15+ Countries A subgroup within the infamous Russian state-sponsored hacking group known as Sandworm has been attributed to a multi-year initial access operation dubbed BadPilot that stretched across the globe. "This subgroup has conducted globally diverse compromises of Internet-facing infrastructure to enable Seashell Blizzard to persist on high-value targets and support tailored network operations," the]]> 2025-02-12T22:32:00+00:00 https://thehackernews.com/2025/02/microsoft-uncovers-sandworm-subgroups.html www.secnews.physaphae.fr/article.php?IdArticle=8648239 False None APT 44 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Researchers Find New Exploit Bypassing Patched NVIDIA Container Toolkit Vulnerability Cybersecurity researchers have discovered a bypass for a now-patched security vulnerability in the NVIDIA Container Toolkit that could be exploited to break out of a container\'s isolation protections and gain complete access to the underlying host. The new vulnerability is being tracked as CVE-2025-23359 (CVSS score: 8.3). It affects the following versions - NVIDIA Container Toolkit (All]]> 2025-02-12T19:34:00+00:00 https://thehackernews.com/2025/02/researchers-find-new-exploit-bypassing.html www.secnews.physaphae.fr/article.php?IdArticle=8648210 False Vulnerability,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) How to Steer AI Adoption: A CISO Guide CISOs are finding themselves more involved in AI teams, often leading the cross-functional effort and AI strategy. But there aren\'t many resources to guide them on what their role should look like or what they should bring to these meetings.  We\'ve pulled together a framework for security leaders to help push AI teams and committees further in their AI adoption-providing them with the]]> 2025-02-12T16:50:00+00:00 https://thehackernews.com/2025/02/how-to-steer-ai-adoption-ciso-guide.html www.secnews.physaphae.fr/article.php?IdArticle=8648197 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) North Korean Hackers Exploit PowerShell Trick to Hijack Devices in New Cyberattack The North Korea-linked threat actor known as Kimsuky has been observed using a new tactic that involves deceiving targets into running PowerShell as an administrator and then instructing them to paste and run malicious code provided by them. "To execute this tactic, the threat actor masquerades as a South Korean government official and over time builds rapport with a target before sending a]]> 2025-02-12T16:13:00+00:00 https://thehackernews.com/2025/02/north-korean-hackers-exploit-powershell.html www.secnews.physaphae.fr/article.php?IdArticle=8648188 False Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Microsoft\\'s Patch Tuesday Fixes 63 Flaws, Including Two Under Active Exploitation Microsoft on Tuesday released fixes for 63 security flaws impacting its software products, including two vulnerabilities that it said has come under active exploitation in the wild. Of the 63 vulnerabilities, three are rated Critical, 57 are rated Important, one is rated Moderate, and two are rated Low in severity. This is aside from the 23 flaws Microsoft addressed in its Chromium-based Edge]]> 2025-02-12T15:08:00+00:00 https://thehackernews.com/2025/02/microsofts-patch-tuesday-fixes-63-flaws.html www.secnews.physaphae.fr/article.php?IdArticle=8648181 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Ivanti Patches Critical Flaws in Connect Secure and Policy Secure – Update Now Ivanti has released security updates to address multiple security flaws impacting Connect Secure (ICS), Policy Secure (IPS), and Cloud Services Application (CSA) that could be exploited to achieve arbitrary code execution. The list of vulnerabilities is below - CVE-2024-38657 (CVSS score: 9.1) - External control of a file name in Ivanti Connect Secure before version 22.7R2.4 and Ivanti Policy]]> 2025-02-12T11:27:00+00:00 https://thehackernews.com/2025/02/ivanti-patches-critical-flaws-in.html www.secnews.physaphae.fr/article.php?IdArticle=8648158 False Vulnerability,Cloud None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Google Confirms Android SafetyCore Enables AI-Powered On-Device Content Classification Google has stepped in to clarify that a newly introduced Android System SafetyCore app does not perform any client-side scanning of content. "Android provides many on-device protections that safeguard users against threats like malware, messaging spam and abuse protections, and phone scam protections, while preserving user privacy and keeping users in control of their data," a spokesperson for]]> 2025-02-11T20:43:00+00:00 https://thehackernews.com/2025/02/google-confirms-android-safetycore.html www.secnews.physaphae.fr/article.php?IdArticle=8648069 False Spam,Malware,Mobile None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) 4 Ways to Keep MFA From Becoming too Much of a Good Thing Multi-factor authentication (MFA) has quickly become the standard for securing business accounts. Once a niche security measure, adoption is on the rise across industries. But while it\'s undeniably effective at keeping bad actors out, the implementation of MFA solutions can be a tangled mess of competing designs and ideas. For businesses and employees, the reality is that MFA sometimes feels]]> 2025-02-11T19:00:00+00:00 https://thehackernews.com/2025/02/4-ways-to-keep-mfa-from-becoming-too.html www.secnews.physaphae.fr/article.php?IdArticle=8648047 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Progress Software Patches High-Severity LoadMaster Flaws Affecting Multiple Versions Progress Software has addressed multiple high-severity security flaws in its LoadMaster software that could be exploited by malicious actors to execute arbitrary system commands or download any file from the system. Kemp LoadMaster is a high-performance application delivery controller (ADC) and load balancer that provides availability, scalability, performance, and security for business-critical]]> 2025-02-11T17:22:00+00:00 https://thehackernews.com/2025/02/progress-software-patches-high-severity.html www.secnews.physaphae.fr/article.php?IdArticle=8648024 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Gcore DDoS Radar Reveals 56% YoY Increase in DDoS Attacks Gcore\'s latest DDoS Radar report analyzes attack data from Q3–Q4 2024, revealing a 56% YoY rise in the total number of DDoS attacks with the largest attack peaking at a record 2 Tbps. The financial services sector saw the most dramatic increase, with a 117% rise in attacks, while gaming remained the most-targeted industry. This period\'s findings emphasize the need for robust, adaptive DDoS]]> 2025-02-11T16:55:00+00:00 https://thehackernews.com/2025/02/gcore-ddos-radar-reveals-56-yoy.html www.secnews.physaphae.fr/article.php?IdArticle=8648025 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Protecting Your Software Supply Chain: Assessing the Risks Before Deployment Imagine you\'re considering a new car for your family. Before making a purchase, you evaluate its safety ratings, fuel efficiency, and reliability. You might even take it for a test drive to ensure it meets your needs. The same approach should be applied to software and hardware products before integrating them into an organization\'s environment. Just as you wouldn\'t buy a car without knowing its]]> 2025-02-11T15:37:00+00:00 https://thehackernews.com/2025/02/protecting-your-software-supply-chain.html www.secnews.physaphae.fr/article.php?IdArticle=8648012 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Threat Actors Exploit ClickFix to Deploy NetSupport RAT in Latest Cyber Attacks Threat actors have observed the increasingly common ClickFix technique to deliver a remote access trojan named NetSupport RAT since early January 2025. NetSupport RAT, typically propagated via bogus websites and fake browser updates, grants attackers full control over the victim\'s host, allowing them to monitor the device\'s screen in real-time, control the keyboard and mouse, upload and download]]> 2025-02-11T15:25:00+00:00 https://thehackernews.com/2025/02/threat-actors-exploit-clickfix-to.html www.secnews.physaphae.fr/article.php?IdArticle=8648013 False Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) 8Base Ransomware Data Leak Sites Seized in International Law Enforcement Operation Source: The Nation A coordinated law enforcement operation has taken down the dark web data leak and negotiation sites associated with the 8Base ransomware gang. Visitors to the data leak site are now greeted with a seizure banner that says: "This hidden site and the criminal content have been seized by the Bavarian State Criminal Police Office on behalf of the Office of the Public Prosecutor]]> 2025-02-11T12:33:00+00:00 https://thehackernews.com/2025/02/8base-ransomware-data-leak-sites-seized.html www.secnews.physaphae.fr/article.php?IdArticle=8647989 False Ransomware,Legislation None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Apple Patches Actively Exploited iOS Zero-Day CVE-2025-24200 in Emergency Update Apple on Monday released out-of-band security updates to address a security flaw in iOS and iPadOS that it said has been exploited in the wild. Assigned the CVE identifier CVE-2025-24200, the vulnerability has been described as an authorization issue that could make it possible for a malicious actor to disable USB Restricted Mode on a locked device as part of a cyber physical attack. This]]> 2025-02-11T10:02:00+00:00 https://thehackernews.com/2025/02/apple-patches-actively-exploited-ios.html www.secnews.physaphae.fr/article.php?IdArticle=8647977 False Vulnerability,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Hackers Exploit Google Tag Manager to Deploy Credit Card Skimmers on Magento Stores Threat actors have been observed leveraging Google Tag Manager (GTM) to deliver credit card skimmer malware targeting Magento-based e-commerce websites. Website security company Sucuri said the code, while appearing to be a typical GTM and Google Analytics script used for website analytics and advertising purposes, contains an obfuscated backdoor capable of providing attackers with persistent]]> 2025-02-10T20:46:00+00:00 https://thehackernews.com/2025/02/hackers-exploit-google-tag-manager-to.html www.secnews.physaphae.fr/article.php?IdArticle=8647894 False Malware,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) [10 February] In cybersecurity, the smallest crack can lead to the biggest breaches. A leaked encryption key, an unpatched software bug, or an abandoned cloud storage bucket-each one seems minor until it becomes the entry point for an attack. This week, we\'ve seen cybercriminals turn overlooked weaknesses into major security threats, proving once again that no system is too small to be targeted. The question]]> 2025-02-10T17:43:00+00:00 https://thehackernews.com/2025/02/thn-weekly-recap-top-cybersecurity_10.html www.secnews.physaphae.fr/article.php?IdArticle=8647855 False Tool,Cloud None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Don\\'t Overlook These 6 Critical Okta Security Configurations Given Okta\'s role as a critical part of identity infrastructure, strengthening Okta security is essential. This article covers six key Okta security settings that provide a strong starting point, along with recommendations for implementing continuous monitoring of your Okta security posture. With over 18,000 customers, Okta serves as the cornerstone of identity governance and security for]]> 2025-02-10T16:30:00+00:00 https://thehackernews.com/2025/02/dont-overlook-these-6-critical-okta.html www.secnews.physaphae.fr/article.php?IdArticle=8647846 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) DragonRank Exploits IIS Servers with BadIIS Malware for SEO Fraud and Gambling Redirects Threat actors have been observed targeting Internet Information Services (IIS) servers in Asia as part of a search engine optimization (SEO) manipulation campaign designed to install BadIIS malware. "It is likely that the campaign is financially motivated since redirecting users to illegal gambling websites shows that attackers deploy BadIIS for profit," Trend Micro researchers Ted Lee and]]> 2025-02-10T15:14:00+00:00 https://thehackernews.com/2025/02/dragonrank-exploits-iis-servers-with.html www.secnews.physaphae.fr/article.php?IdArticle=8647834 False Malware,Threat,Prediction None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Zimbra Releases Security Updates for SQL Injection, Stored XSS, and SSRF Vulnerabilities Zimbra has released software updates to address critical security flaws in its Collaboration software that, if successfully exploited, could result in information disclosure under certain conditions. The vulnerability, tracked as CVE-2025-25064, carries a CVSS score of 9.8 out of a maximum of 10.0. It has been described as an SQL injection bug in the ZimbraSync Service SOAP endpoint affecting]]> 2025-02-10T14:39:00+00:00 https://thehackernews.com/2025/02/zimbra-releases-security-updates-for.html www.secnews.physaphae.fr/article.php?IdArticle=8647826 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) XE Hacker Group Exploits VeraCore Zero-Day to Deploy Persistent Web Shells Threat actors have been observed exploiting multiple security flaws in various software products, including Progress Telerik UI for ASP.NET AJAX and Advantive VeraCore, to drop reverse shells and web shells, and maintain persistent remote access to compromised systems. The zero-day exploitation of security flaws in VeraCore has been attributed to a threat actor known as XE Group, a cybercrime]]> 2025-02-10T10:44:00+00:00 https://thehackernews.com/2025/02/xe-hacker-group-exploits-veracore-zero.html www.secnews.physaphae.fr/article.php?IdArticle=8647796 False Vulnerability,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Malicious ML Models on Hugging Face Leverage Broken Pickle Format to Evade Detection Cybersecurity researchers have uncovered two malicious machine learning (ML) models on Hugging Face that leveraged an unusual technique of "broken" pickle files to evade detection. "The pickle files extracted from the mentioned PyTorch archives revealed the malicious Python content at the beginning of the file," ReversingLabs researcher Karlo Zanki said in a report shared with The Hacker News. "]]> 2025-02-08T11:47:00+00:00 https://thehackernews.com/2025/02/malicious-ml-models-found-on-hugging.html www.secnews.physaphae.fr/article.php?IdArticle=8647546 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) DeepSeek App Transmits Sensitive User and Device Data Without Encryption A new audit of DeepSeek\'s mobile app for the Apple iOS operating system has found glaring security issues, the foremost being that it sends sensitive data over the internet sans any encryption, exposing it to interception and manipulation attacks. The assessment comes from NowSecure, which also found that the app fails to adhere to best security practices and that it collects extensive user and]]> 2025-02-07T20:28:00+00:00 https://thehackernews.com/2025/02/deepseek-app-transmits-sensitive-user.html www.secnews.physaphae.fr/article.php?IdArticle=8647447 False Mobile None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) CISA Warns of Active Exploitation in Trimble Cityworks Vulnerability Leading to IIS RCE The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned that a security flaw impacting Trimble Cityworks GIS-centric asset management software has come under active exploitation in the wild. The vulnerability in question is CVE-2025-0994 (CVSS v4 score: 8.6), a deserialization of untrusted data bug that could permit an attacker to conduct remote code execution. "This could]]> 2025-02-07T18:22:00+00:00 https://thehackernews.com/2025/02/cisa-warns-of-active-exploitation-in.html www.secnews.physaphae.fr/article.php?IdArticle=8647417 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) AI-Powered Social Engineering: Reinvented Threats The foundations for social engineering attacks – manipulating humans – might not have changed much over the years. It\'s the vectors – how these techniques are deployed – that are evolving. And like most industries these days, AI is accelerating its evolution.  This article explores how these changes are impacting business, and how cybersecurity leaders can respond. Impersonation attacks:]]> 2025-02-07T16:40:00+00:00 https://thehackernews.com/2025/02/ai-powered-social-engineering.html www.secnews.physaphae.fr/article.php?IdArticle=8647403 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Microsoft Identifies 3,000+ Publicly Disclosed ASP.NET Machine Keys Vulnerable to Code Injection Microsoft is warning of an insecure practice wherein software developers are incorporating publicly disclosed ASP.NET machine keys from publicly accessible resources, thereby putting their applications in attackers\' pathway. The tech giant\'s threat intelligence team said it observed limited activity in December 2024 that involved an unknown threat actor using a publicly available, static ASP.NET]]> 2025-02-07T16:31:00+00:00 https://thehackernews.com/2025/02/microsoft-identifies-3000-publicly.html www.secnews.physaphae.fr/article.php?IdArticle=8647404 False Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) India\\'s RBI Introduces Exclusive "bank.in" Domain to Combat Digital Banking Fraud India\'s central bank, the Reserve Bank of India (RBI), said it\'s introducing an exclusive "bank.in" internet domain for banks in the country to combat digital financial fraud. "This initiative aims to reduce cyber security threats and malicious activities like phishing; and, streamline secure financial services, thereby enhancing trust in digital banking and payment services," the RBI said in a]]> 2025-02-07T16:02:00+00:00 https://thehackernews.com/2025/02/indias-rbi-introduces-exclusive-bankin.html www.secnews.physaphae.fr/article.php?IdArticle=8647394 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Hackers Exploiting SimpleHelp RMM Flaws for Persistent Access and Ransomware Threat actors have been observed exploiting recently disclosed security flaws in SimpleHelp\'s Remote Monitoring and Management (RMM) software as a precursor for what appears to be a ransomware attack. The intrusion leveraged the now-patched vulnerabilities to gain initial access and maintain persistent remote access to an unspecified target network, cybersecurity company Field Effect said in a]]> 2025-02-07T10:49:00+00:00 https://thehackernews.com/2025/02/hackers-exploit-simplehelp-rmm-flaws.html www.secnews.physaphae.fr/article.php?IdArticle=8647359 False Ransomware,Vulnerability,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Fake Google Chrome Sites Distribute ValleyRAT Malware via DLL Hijacking Bogus websites advertising Google Chrome have been used to distribute malicious installers for a remote access trojan called ValleyRAT. The malware, first detected in 2023, is attributed to a threat actor tracked as Silver Fox, with prior attack campaigns primarily targeting Chinese-speaking regions like Hong Kong, Taiwan, and Mainland China. "This actor has increasingly targeted key roles]]> 2025-02-06T20:04:00+00:00 https://thehackernews.com/2025/02/fake-google-chrome-sites-distribute.html www.secnews.physaphae.fr/article.php?IdArticle=8647236 False Malware,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Ransomware Extortion Drops to $813.5M in 2024, Down from $1.25B in 2023 Ransomware attacks netted cybercrime groups a total of $813.5 million in 2024, a decline from $1.25 billion in 2023. The total amount extorted during the first half of 2024 stood at $459.8 million, blockchain intelligence firm Chainalysis said, adding payment activity slumped after July 2024 by about 3.94%. "The number of ransomware events increased into H2, but on-chain payments declined,]]> 2025-02-06T19:33:00+00:00 https://thehackernews.com/2025/02/ransomware-extortion-drops-to-8135m-in.html www.secnews.physaphae.fr/article.php?IdArticle=8647237 False Ransomware None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) SparkCat Malware Uses OCR to Extract Crypto Wallet Recovery Phrases from Images A new malware campaign dubbed SparkCat has leveraged a suit of bogus apps on both Apple\'s and Google\'s respective app stores to steal victims\' mnemonic phrases associated with cryptocurrency wallets.  The attacks leverage an optical character recognition (OCR) model to exfiltrate select images containing wallet recovery phrases from photo libraries to a command-and-control (C2) server,]]> 2025-02-06T17:02:00+00:00 https://thehackernews.com/2025/02/sparkcat-malware-uses-ocr-to-extract.html www.secnews.physaphae.fr/article.php?IdArticle=8647205 False Malware None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) The Evolving Role of PAM in Cybersecurity Leadership Agendas for 2025 Privileged Access Management (PAM) has emerged as a cornerstone of modern cybersecurity strategies, shifting from a technical necessity to a critical pillar in leadership agendas. With the PAM market projected to reach $42.96 billion by 2037 (according to Research Nester), organizations invest heavily in PAM solutions. Why is PAM climbing the ranks of leadership priorities? While Gartner]]> 2025-02-06T16:50:00+00:00 https://thehackernews.com/2025/02/the-evolving-role-of-pam-in.html www.secnews.physaphae.fr/article.php?IdArticle=8647206 False Technical None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) North Korean APT Kimsuky Uses forceCopy Malware to Steal Browser-Stored Credentials The North Korea-linked nation-state hacking group known as Kimsuky has been observed conducting spear-phishing attacks to deliver an information stealer malware named forceCopy, according to new findings from the AhnLab Security Intelligence Center (ASEC). The attacks commence with phishing emails containing a Windows shortcut (LNK) file that\'s disguised as a Microsoft Office or PDF document.]]> 2025-02-06T16:35:00+00:00 https://thehackernews.com/2025/02/north-korean-apt-kimsuky-uses-lnk-files.html www.secnews.physaphae.fr/article.php?IdArticle=8647207 False Malware None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Top 3 Ransomware Threats Active in 2025 You arrive at the office, power up your system, and panic sets in. Every file is locked, and every system is frozen. A ransom demand flashes on your screen: "Pay $2 million in Bitcoin within 48 hours or lose everything." And the worst part is that even after paying, there\'s no guarantee you\'ll get your data back. Many victims hand over the money, only to receive nothing in return, or worse, get]]> 2025-02-06T16:30:00+00:00 https://thehackernews.com/2025/02/top-3-ransomware-threats-active-in-2025.html www.secnews.physaphae.fr/article.php?IdArticle=8647187 False Ransomware None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Cisco Patches Critical ISE Vulnerabilities Enabling Root CmdExec and PrivEsc Cisco has released updates to address two critical security flaws Identity Services Engine (ISE) that could allow remote attackers to execute arbitrary commands and elevate privileges on susceptible devices. The vulnerabilities are listed below - CVE-2025-20124 (CVSS score: 9.9) - An insecure Java deserialization vulnerability in an API of Cisco ISE that could permit an authenticated, remote]]> 2025-02-06T13:10:00+00:00 https://thehackernews.com/2025/02/cisco-patches-critical-ise.html www.secnews.physaphae.fr/article.php?IdArticle=8647171 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Cross-Platform JavaScript Stealer Targets Crypto Wallets in New Lazarus Group Campaign The North Korea-linked Lazarus Group has been linked to an active campaign that leverages fake LinkedIn job offers in the cryptocurrency and travel sectors to deliver malware capable of infecting Windows, macOS, and Linux operating systems. According to cybersecurity company Bitdefender, the scam begins with a message sent on a professional social media network, enticing them with the promise of]]> 2025-02-05T20:25:00+00:00 https://thehackernews.com/2025/02/cross-platform-javascript-stealer.html www.secnews.physaphae.fr/article.php?IdArticle=8647065 False Malware APT 38 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Cybercriminals Use Go Resty and Node Fetch in 13 Million Password Spraying Attempts Cybercriminals are increasingly leveraging legitimate HTTP client tools to facilitate account takeover (ATO) attacks on Microsoft 365 environments. Enterprise security company Proofpoint said it observed campaigns using HTTP clients Axios and Node Fetch to send HTTP requests and receive HTTP responses from web servers with the goal of conducting ATO attacks. "Originally sourced from public]]> 2025-02-05T18:33:00+00:00 https://thehackernews.com/2025/02/cybercriminals-use-axios-and-node-fetch.html www.secnews.physaphae.fr/article.php?IdArticle=8647040 False Tool None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Silent Lynx Using PowerShell, Golang, and C++ Loaders in Multi-Stage Cyberattacks A previously undocumented threat actor known as Silent Lynx has been linked to cyber attacks targeting various entities in Kyrgyzstan and Turkmenistan. "This threat group has previously targeted entities around Eastern Europe and Central Asian government think tanks involved in economic decision making and banking sector," Seqrite Labs researcher Subhajeet Singha said in a technical report]]> 2025-02-05T18:16:00+00:00 https://thehackernews.com/2025/02/silent-lynx-using-powershell-golang-and.html www.secnews.physaphae.fr/article.php?IdArticle=8647041 False Threat,Technical None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) New Veeam Flaw Allows Arbitrary Code Execution via Man-in-the-Middle Attack Veeam has released patches to address a critical security flaw impacting its Backup software that could allow an attacker to execute arbitrary code on susceptible systems. The vulnerability, tracked as CVE-2025-23114, carries a CVSS score of 9.0 out of 10.0. "A vulnerability within the Veeam Updater component that allows an attacker to utilize a Man-in-the-Middle attack to execute arbitrary code]]> 2025-02-05T17:46:00+00:00 https://thehackernews.com/2025/02/new-veeam-flaw-allows-arbitrary-code.html www.secnews.physaphae.fr/article.php?IdArticle=8647027 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Navigating the Future: Key IT Vulnerability Management Trends As the cybersecurity landscape continues to evolve, proactive vulnerability management has become a critical priority for managed service providers (MSPs) and IT teams. Recent trends indicate that organizations increasingly prioritize more frequent IT security vulnerability assessments to identify and address potential security flaws. Staying informed on these trends can help MSPs and IT teams]]> 2025-02-05T16:30:00+00:00 https://thehackernews.com/2025/02/navigating-future-key-it-vulnerability.html www.secnews.physaphae.fr/article.php?IdArticle=8647011 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) AsyncRAT Campaign Uses Python Payloads and TryCloudflare Tunnels for Stealth Attacks A malware campaign has been observed delivering a remote access trojan (RAT) named AsyncRAT by making use of Python payloads and TryCloudflare tunnels. "AsyncRAT is a remote access trojan (RAT) that exploits the async/await pattern for efficient, asynchronous communication," Forcepoint X-Labs researcher Jyotika Singh said in an analysis. "It allows attackers to control infected systems]]> 2025-02-05T15:10:00+00:00 https://thehackernews.com/2025/02/asyncrat-campaign-uses-python-payloads.html www.secnews.physaphae.fr/article.php?IdArticle=8646996 False Malware None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) CISA Adds Four Actively Exploited Vulnerabilities to KEV Catalog, Urges Fixes by Feb 25 The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added four security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The list of vulnerabilities is as follows - CVE-2024-45195 (CVSS score: 7.5/9.8) - A forced browsing vulnerability in Apache OFBiz that allows a remote attacker to obtain unauthorized]]> 2025-02-05T10:35:00+00:00 https://thehackernews.com/2025/02/cisa-adds-four-actively-exploited.html www.secnews.physaphae.fr/article.php?IdArticle=8646955 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Malicious Go Package Exploits Module Mirror Caching for Persistent Remote Access Cybersecurity researchers have called attention to a software supply chain attack targeting the Go ecosystem that involves a malicious package capable of granting the adversary remote access to infected systems. The package, named github.com/boltdb-go/bolt, is a typosquat of the legitimate BoltDB database module (github.com/boltdb/bolt), per Socket. The malicious version (1.3.1) was published to]]> 2025-02-04T19:46:00+00:00 https://thehackernews.com/2025/02/malicious-go-package-exploits-module.html www.secnews.physaphae.fr/article.php?IdArticle=8646843 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Russian Cybercrime Groups Exploiting 7-Zip Flaw to Bypass Windows MotW Protections A recently patched security vulnerability in the 7-Zip archiver tool was exploited in the wild to deliver the SmokeLoader malware. The flaw, CVE-2025-0411 (CVSS score: 7.0), allows remote attackers to circumvent mark-of-the-web (MotW) protections and execute arbitrary code in the context of the current user. It was addressed by 7-Zip in November 2024 with version 24.09. "The vulnerability was]]> 2025-02-04T17:58:00+00:00 https://thehackernews.com/2025/02/russian-cybercrime-groups-exploiting-7.html www.secnews.physaphae.fr/article.php?IdArticle=8646815 False Malware,Tool,Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) North Korean Hackers Deploy FERRET Malware via Fake Job Interviews on macOS The North Korean threat actors behind the Contagious Interview campaign have been observed delivering a collection of Apple macOS malware strains dubbed FERRET as part of a supposed job interview process. "Targets are typically asked to communicate with an interviewer through a link that throws an error message and a request to install or update some required piece of software such as VCam or]]> 2025-02-04T17:41:00+00:00 https://thehackernews.com/2025/02/north-korean-hackers-deploy-ferret.html www.secnews.physaphae.fr/article.php?IdArticle=8646816 False Malware,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Watch Out For These 8 Cloud Security Shifts in 2025 As cloud security evolves in 2025 and beyond, organizations must adapt to both new and evolving realities, including the increasing reliance on cloud infrastructure for AI-driven workflows and the vast quantities of data being migrated to the cloud. But there are other developments that could impact your organizations and drive the need for an even more robust security strategy. Let\'s take a]]> 2025-02-04T16:30:00+00:00 https://thehackernews.com/2025/02/watch-out-for-these-8-cloud-security.html www.secnews.physaphae.fr/article.php?IdArticle=8646787 False Prediction,Cloud None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Taiwan Bans DeepSeek AI Over National Security Concerns, Citing Data Leakage Risks Taiwan has become the latest country to ban government agencies from using Chinese startup DeepSeek\'s Artificial Intelligence (AI) platform, citing security risks. "Government agencies and critical infrastructure should not use DeepSeek, because it endangers national information security," according to a statement released by Taiwan\'s Ministry of Digital Affairs, per Radio Free Asia. "DeepSeek]]> 2025-02-04T15:02:00+00:00 https://thehackernews.com/2025/02/taiwan-bans-deepseek-ai-over-national.html www.secnews.physaphae.fr/article.php?IdArticle=8646762 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) AMD SEV-SNP Vulnerability Allows Malicious Microcode Injection with Admin Access A security vulnerability has been disclosed in AMD\'s Secure Encrypted Virtualization (SEV) that could permit an attacker to load a malicious CPU microcode under specific conditions. The flaw, tracked as CVE-2024-56161, carries a CVSS score of 7.2 out of 10.0, indicating high severity. "Improper signature verification in AMD CPU ROM microcode patch loader may allow an attacker with local]]> 2025-02-04T14:28:00+00:00 https://thehackernews.com/2025/02/amd-sev-snp-vulnerability-allows.html www.secnews.physaphae.fr/article.php?IdArticle=8646763 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Microsoft Patches Critical Azure AI Face Service Vulnerability with CVSS 9.9 Score Microsoft has released patches to address two Critical-rated security flaws impacting Azure AI Face Service and Microsoft Account that could allow a malicious actor to escalate their privileges under certain conditions. The flaws are listed below - CVE-2025-21396 (CVSS score: 7.5) - Microsoft Account Elevation of Privilege Vulnerability CVE-2025-21415 (CVSS score: 9.9) - Azure AI Face Service]]> 2025-02-04T10:38:00+00:00 https://thehackernews.com/2025/02/microsoft-patches-critical-azure-ai.html www.secnews.physaphae.fr/article.php?IdArticle=8646731 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Google Patches 47 Android Security Flaws, Including Actively Exploited CVE-2024-53104 Google has shipped patches to address 47 security flaws in its Android operating system, including one it said has come under active exploitation in the wild. The vulnerability in question is CVE-2024-53104 (CVSS score: 7.8), which has been described as a case of privilege escalation in a kernel component known as the USB Video Class (UVC) driver. Successful exploitation of the flaw could lead]]> 2025-02-04T10:21:00+00:00 https://thehackernews.com/2025/02/google-patches-47-android-security.html www.secnews.physaphae.fr/article.php?IdArticle=8646732 False Vulnerability,Mobile None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Microsoft SharePoint Connector Flaw Could\\'ve Enabled Credential Theft Across Power Platform Cybersecurity researchers have disclosed details of a now-patched vulnerability impacting the Microsoft SharePoint connector on Power Platform that, if successfully exploited, could allow threat actors to harvest a user\'s credentials and stage follow-on attacks. This could manifest in the form of post-exploitation actions that allow the attacker to send requests to the SharePoint API on behalf]]> 2025-02-04T09:59:00+00:00 https://thehackernews.com/2025/02/microsoft-sharepoint-connector-flaw.html www.secnews.physaphae.fr/article.php?IdArticle=8646724 False Vulnerability,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) 768 CVEs Exploited in 2024, Reflecting a 20% Increase from 639 in 2023 As many as 768 vulnerabilities with designated CVE identifiers were reported as exploited in the wild in 2024, up from 639 CVEs in 2023, registering a 20% increase year-over-year. Describing 2024 as "another banner year for threat actors targeting the exploitation of vulnerabilities," VulnCheck said 23.6% of known exploited vulnerabilities (KEV) were known to be weaponized either on or before]]> 2025-02-03T19:27:00+00:00 https://thehackernews.com/2025/02/768-cves-exploited-in-2024-reflecting.html www.secnews.physaphae.fr/article.php?IdArticle=8646538 False Vulnerability,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) PyPI Introduces Archival Status to Alert Users About Unmaintained Python Packages The maintainers of the Python Package Index (PyPI) registry have announced a new feature that allows package developers to archive a project as part of efforts to improve supply chain security. "Maintainers can now archive a project to let users know that the project is not expected to receive any more updates," Facundo Tuesca, senior engineer at Trail of Bits, said. In doing so, the idea is to]]> 2025-02-03T18:00:00+00:00 https://thehackernews.com/2025/02/pypi-introduces-archival-status-to.html www.secnews.physaphae.fr/article.php?IdArticle=8646539 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) [27 February] This week, our news radar shows that every new tech idea comes with its own challenges. A hot AI tool is under close watch, law enforcement is shutting down online spots that help cybercriminals, and teams are busy fixing software bugs that could let attackers in. From better locks on our devices to stopping sneaky tricks online, simple steps are making a big difference.  Let\'s take a]]> 2025-02-03T17:29:00+00:00 https://thehackernews.com/2025/02/thn-weekly-recap-top-cybersecurity.html www.secnews.physaphae.fr/article.php?IdArticle=8646479 False Tool,Legislation None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Coyote Malware Expands Reach: Now Targets 1,030 Sites and 73 Financial Institutions Brazilian Windows users are the target of a campaign that delivers a banking malware known as Coyote. "Once deployed, the Coyote Banking Trojan can carry out various malicious activities, including keylogging, capturing screenshots, and displaying phishing overlays to steal sensitive credentials," Fortinet FortiGuard Labs researcher Cara Lin said in an analysis published last week. The]]> 2025-02-03T17:09:00+00:00 https://thehackernews.com/2025/02/coyote-malware-expands-reach-now.html www.secnews.physaphae.fr/article.php?IdArticle=8646480 False Malware None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) What Is Attack Surface Management? Attack surfaces are growing faster than security teams can keep up – to stay ahead, you need to know what\'s exposed and where attackers are most likely to strike. With cloud adoption dramatically increasing the ease of exposing new systems and services to the internet, prioritizing threats and managing your attack surface from an attacker\'s perspective has never been more important. In this]]> 2025-02-03T16:30:00+00:00 https://thehackernews.com/2025/02/what-is-attack-surface-management.html www.secnews.physaphae.fr/article.php?IdArticle=8646481 False Cloud None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Crazy Evil Gang Targets Crypto with StealC, AMOS, and Angel Drainer Malware A Russian-speaking cybercrime gang known as Crazy Evil has been linked to over 10 active social media scams that leverage a wide range of tailored lures to deceive victims and trick them into installing malware such as StealC, Atomic macOS Stealer (aka AMOS), and Angel Drainer. "Specializing in identity fraud, cryptocurrency theft, and information-stealing malware, Crazy Evil employs a]]> 2025-02-03T11:00:00+00:00 https://thehackernews.com/2025/02/crazy-evil-gang-targets-crypto-with.html www.secnews.physaphae.fr/article.php?IdArticle=8646348 False Malware None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) U.S. and Dutch Authorities Dismantle 39 Domains Linked to BEC Fraud Network U.S. and Dutch law enforcement agencies have announced that they have dismantled 39 domains and their associated servers as part of efforts to disrupt a network of online marketplaces originating from Pakistan. The action, which took place on January 29, 2025, has been codenamed Operation Heart Blocker. The vast array of sites in question peddled phishing toolkits and fraud-enabling tools and]]> 2025-02-01T13:44:00+00:00 https://thehackernews.com/2025/02/us-and-dutch-authorities-dismantle-39.html www.secnews.physaphae.fr/article.php?IdArticle=8645620 False Tool,Legislation None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) BeyondTrust Zero-Day Breach Exposes 17 SaaS Customers via Compromised API Key BeyondTrust has revealed it completed an investigation into a recent cybersecurity incident that targeted some of the company\'s Remote Support SaaS instances by making use of a compromised API key. The company said the breach involved 17 Remote Support SaaS customers and that the API key was used to enable unauthorized access by resetting local application passwords. The breach was first flagged]]> 2025-02-01T12:10:00+00:00 https://thehackernews.com/2025/02/beyondtrust-zero-day-breach-exposes-17.html www.secnews.physaphae.fr/article.php?IdArticle=8645584 False Vulnerability,Threat,Cloud None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Meta Confirms Zero-Click WhatsApp Spyware Attack Targeting 90 Journalists, Activists Meta-owned WhatsApp on Friday said it disrupted a campaign that involved the use of spyware to target journalists and civil society members. The campaign, which targeted around 90 members, involved the use of spyware from an Israeli company known as Paragon Solutions. The attackers were neutralized in December 2024. In a statement to The Guardian, the encrypted messaging app said it has reached]]> 2025-02-01T10:59:00+00:00 https://thehackernews.com/2025/02/meta-confirms-zero-click-whatsapp.html www.secnews.physaphae.fr/article.php?IdArticle=8645566 False None None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Malvertising Scam Uses Fake Google Ads to Hijack Microsoft Advertising Accounts Cybersecurity researchers have discovered a malvertising campaign that\'s targeting Microsoft advertisers with bogus Google ads that aim to take them to phishing pages that are capable of harvesting their credentials. "These malicious ads, appearing on Google Search, are designed to steal the login information of users trying to access Microsoft\'s advertising platform," Jérôme Segura, senior]]> 2025-02-01T08:52:00+00:00 https://thehackernews.com/2025/02/malvertising-scam-uses-fake-google-ads.html www.secnews.physaphae.fr/article.php?IdArticle=8645531 False None None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) CISA and FDA Warn of Critical Backdoor in Contec CMS8000 Patient Monitors The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Food and Drug Administration (FDA) have issued alerts about the presence of hidden functionality in Contec CMS8000 patient monitors and Epsimed MN-120 patient monitors. The vulnerability, tracked as CVE-2025-0626, carries a CVSS v4 score of 7.7 on a scale of 10.0. The flaw, alongside two other issues, was reported to CISA]]> 2025-01-31T18:40:00+00:00 https://thehackernews.com/2025/01/cisa-and-fda-warn-of-critical-backdoor.html www.secnews.physaphae.fr/article.php?IdArticle=8645284 False Vulnerability None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Top 5 AI-Powered Social Engineering Attacks Social engineering has long been an effective tactic because of how it focuses on human vulnerabilities. There\'s no brute-force \'spray and pray\' password guessing. No scouring systems for unpatched software. Instead, it simply relies on manipulating emotions such as trust, fear, and respect for authority, usually with the goal of gaining access to sensitive information or protected systems.]]> 2025-01-31T16:45:00+00:00 https://thehackernews.com/2025/01/top-5-ai-powered-social-engineering.html www.secnews.physaphae.fr/article.php?IdArticle=8645220 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Italy Bans Chinese DeepSeek AI Over Data Privacy and Ethical Concerns Italy\'s data protection watchdog has blocked Chinese artificial intelligence (AI) firm DeepSeek\'s service within the country, citing a lack of information on its use of users\' personal data. The development comes days after the authority, the Garante, sent a series of questions to DeepSeek, asking about its data handling practices and where it obtained its training data. In particular, it wanted]]> 2025-01-31T16:34:00+00:00 https://thehackernews.com/2025/01/italy-bans-chinese-deepseek-ai-over.html www.secnews.physaphae.fr/article.php?IdArticle=8645221 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Google Bans 158,000 Malicious Android App Developer Accounts in 2024 Google said it blocked over 2.36 million policy-violating Android apps from being published to the Google Play app marketplace in 2024 and banned more than 158,000 bad developer accounts that attempted to publish such harmful apps. The tech giant also noted it prevented 1.3 million apps from getting excessive or unnecessary access to sensitive user data during the time period by working with]]> 2025-01-31T16:15:00+00:00 https://thehackernews.com/2025/01/google-bans-158000-malicious-android.html www.secnews.physaphae.fr/article.php?IdArticle=8645222 False Mobile None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Broadcom Patches VMware Aria Flaws – Exploits May Lead to Credential Theft Broadcom has released security updates to patch five security flaws impacting VMware Aria Operations and Aria Operations for Logs, warning customers that attackers could exploit them to gain elevated access or obtain sensitive information. The list of identified flaws, which impact versions 8.x of the software, is below - CVE-2025-22218 (CVSS score: 8.5) - A malicious actor with View Only Admin]]> 2025-01-31T11:19:00+00:00 https://thehackernews.com/2025/01/broadcom-patches-vmware-aria-flaws.html www.secnews.physaphae.fr/article.php?IdArticle=8645120 False Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Google: Over 57 Nation-State Threat Groups Using AI for Cyber Operations Over 57 distinct threat actors with ties to China, Iran, North Korea, and Russia have been observed using artificial intelligence (AI) technology powered by Google to further enable their malicious cyber and information operations. "Threat actors are experimenting with Gemini to enable their operations, finding productivity gains but not yet developing novel capabilities," Google Threat]]> 2025-01-30T21:55:00+00:00 https://thehackernews.com/2025/01/google-over-57-nation-state-threat.html www.secnews.physaphae.fr/article.php?IdArticle=8644860 False Threat None 4.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Authorities Seize Domains of Popular Hacking Forums in Major Cybercrime Crackdown An international law enforcement operation has dismantled the domains associated with various online platforms linked to cybercrime such as Cracked, Nulled, Sellix, and StarkRDP. The effort has targeted the following domains - www.cracked.io www.nulled.to www.mysellix.io www.sellix.io www.starkrdp.io Visitors to these websites are now greeted by a seizure banner that says they were confiscated]]> 2025-01-30T18:45:00+00:00 https://thehackernews.com/2025/01/authorities-seize-domains-of-popular.html www.secnews.physaphae.fr/article.php?IdArticle=8644791 False Legislation None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Lightning AI Studio Vulnerability Allowed RCE via Hidden URL Parameter Cybersecurity researchers have disclosed a critical security flaw in the Lightning AI Studio development platform that, if successfully exploited, could allow for remote code execution. The vulnerability, rated a CVSS score of 9.4, enables "attackers to potentially execute arbitrary commands with root privileges" by exploiting a hidden URL parameter, application security firm Noma said in a]]> 2025-01-30T18:03:00+00:00 https://thehackernews.com/2025/01/lightning-ai-studio-vulnerability.html www.secnews.physaphae.fr/article.php?IdArticle=8644792 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) SOC Analysts - Reimagining Their Role Using AI The job of a SOC analyst has never been easy. Faced with an overwhelming flood of daily alerts, analysts (and sometimes IT teams who are doubling as SecOps) must try and triage thousands of security alerts-often false positives-just to identify a handful of real threats. This relentless, 24/7 work leads to alert fatigue, desensitization, and increased risk of missing critical security incidents.]]> 2025-01-30T16:00:00+00:00 https://thehackernews.com/2025/01/soc-analysts-reimagining-their-role.html www.secnews.physaphae.fr/article.php?IdArticle=8644739 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) DeepSeek AI Database Exposed: Over 1 Million Log Lines, Secret Keys Leaked Buzzy Chinese artificial intelligence (AI) startup DeepSeek, which has had a meteoric rise in popularity in recent days, left one of its databases exposed on the internet, which could have allowed malicious actors to gain access to sensitive data. The ClickHouse database "allows full control over database operations, including the ability to access internal data," Wiz security researcher Gal]]> 2025-01-30T15:39:00+00:00 https://thehackernews.com/2025/01/deepseek-ai-database-exposed-over-1.html www.secnews.physaphae.fr/article.php?IdArticle=8644740 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Unpatched PHP Voyager Flaws Leave Servers Open to One-Click RCE Exploits Three security flaws have been disclosed in the open-source PHP package Voyager that could be exploited by an attacker to achieve one-click remote code execution on affected instances. "When an authenticated Voyager user clicks on a malicious link, attackers can execute arbitrary code on the server," Sonar researcher Yaniv Nizry said in a write-up published earlier this week. The]]> 2025-01-30T12:51:00+00:00 https://thehackernews.com/2025/01/unpatched-php-voyager-flaws-leave.html www.secnews.physaphae.fr/article.php?IdArticle=8644649 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) New Aquabot Botnet Exploits CVE-2024-41710 in Mitel Phones for DDoS Attacks A Mirai botnet variant dubbed Aquabot has been observed actively attempting to exploit a medium-severity security flaw impacting Mitel phones in order to ensnare them into a network capable of mounting distributed denial-of-service (DDoS) attacks. The vulnerability in question is CVE-2024-41710 (CVSS score: 6.8), a case of command injection in the boot process that could allow a malicious actor]]> 2025-01-30T12:11:00+00:00 https://thehackernews.com/2025/01/new-aquabot-botnet-exploits-cve-2024.html www.secnews.physaphae.fr/article.php?IdArticle=8644650 False Vulnerability,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Lazarus Group Uses React-Based Admin Panel to Control Global Cyber Attacks The North Korean threat actor known as the Lazarus Group has been observed leveraging a "web-based administrative platform" to oversee its command-and-control (C2) infrastructure, giving the adversary the ability to centrally supervise all aspects of their campaigns. "Each C2 server hosted a web-based administrative platform, built with a React application and a Node.js API," SecurityScorecard\'s]]> 2025-01-29T22:26:00+00:00 https://thehackernews.com/2025/01/lazarus-group-uses-react-based-admin.html www.secnews.physaphae.fr/article.php?IdArticle=8644398 False Threat APT 38 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) AI in Cybersecurity: What\\'s Effective and What\\'s Not – Insights from 200 Experts Curious about the buzz around AI in cybersecurity? Wonder if it\'s just a shiny new toy in the tech world or a serious game changer? Let\'s unpack this together in a not-to-be-missed webinar that goes beyond the hype to explore the real impact of AI on cybersecurity. Join Ravid Circus, a seasoned pro in cybersecurity and AI, as we peel back the layers of AI in cybersecurity through a revealing]]> 2025-01-29T17:16:00+00:00 https://thehackernews.com/2025/01/ai-in-cybersecurity-whats-effective-and.html www.secnews.physaphae.fr/article.php?IdArticle=8644269 False None None 3.0000000000000000