www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2025-05-12T00:21:08+00:00 www.secnews.physaphae.fr The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) New SLAP & FLOP Attacks Expose Apple M-Series Chips to Speculative Execution Exploits A team of security researchers from Georgia Institute of Technology and Ruhr University Bochum has demonstrated two new side-channel attacks targeting Apple silicon that could be exploited to leak sensitive information from web browsers like Safari and Google Chrome. The attacks have been codenamed Data Speculation Attacks via Load Address Prediction on Apple Silicon (SLAP) and Breaking the]]> 2025-01-29T16:19:00+00:00 https://thehackernews.com/2025/01/new-slap-flop-attacks-expose-apple-m.html www.secnews.physaphae.fr/article.php?IdArticle=8644270 False Prediction None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) How Interlock Ransomware Infects Healthcare Organizations Ransomware attacks have reached an unprecedented scale in the healthcare sector, exposing vulnerabilities that put millions at risk. Recently, UnitedHealth revealed that 190 million Americans had their personal and healthcare data stolen during the Change Healthcare ransomware attack, a figure that nearly doubles the previously disclosed total.  This breach shows just how deeply ransomware]]> 2025-01-29T16:00:00+00:00 https://thehackernews.com/2025/01/how-interlock-ransomware-infects.html www.secnews.physaphae.fr/article.php?IdArticle=8644246 False Ransomware,Vulnerability,Medical None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Critical Cacti Security Flaw (CVE-2025-22604) Enables Remote Code Execution A critical security flaw has been disclosed in the Cacti open-source network monitoring and fault management framework that could allow an authenticated attacker to achieve remote code execution on susceptible instances. The flaw, tracked as CVE-2025-22604, carries a CVSS score of 9.1 out of a maximum of 10.0. "Due to a flaw in the multi-line SNMP result parser, authenticated users can inject]]> 2025-01-29T15:51:00+00:00 https://thehackernews.com/2025/01/critical-cacti-security-flaw-cve-2025.html www.secnews.physaphae.fr/article.php?IdArticle=8644247 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) UAC-0063 Expands Cyber Attacks to European Embassies Using Stolen Documents The advanced persistent threat (APT) group known as UAC-0063 has been observed leveraging legitimate documents obtained by infiltrating one victim to attack another target with the goal of delivering a known malware dubbed HATVIBE. "This research focuses on completing the picture of UAC-0063\'s operations, particularly documenting their expansion beyond their initial focus on Central Asia,]]> 2025-01-29T11:22:00+00:00 https://thehackernews.com/2025/01/uac-0063-expands-cyber-attacks-to.html www.secnews.physaphae.fr/article.php?IdArticle=8644142 False Malware,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Broadcom Warns of High-Severity SQL Injection Flaw in VMware Avi Load Balancer Broadcom has alerted of a high-severity security flaw in VMware Avi Load Balancer that could be weaponized by malicious actors to gain entrenched database access. The vulnerability, tracked as CVE-2025-22217 (CVSS score: 8.6), has been described as an unauthenticated blind SQL injection. "A malicious user with network access may be able to use specially crafted SQL queries to gain database]]> 2025-01-29T10:59:00+00:00 https://thehackernews.com/2025/01/broadcom-warns-of-high-severity-sql.html www.secnews.physaphae.fr/article.php?IdArticle=8644143 False Vulnerability None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Zyxel CPE Devices Face Active Exploitation Due to Unpatched CVE-2024-40891 Vulnerability Cybersecurity researchers are warning that a critical zero-day vulnerability impacting Zyxel CPE Series devices is seeing active exploitation attempts in the wild. "Attackers can leverage this vulnerability to execute arbitrary commands on affected devices, leading to complete system compromise, data exfiltration, or network infiltration," GreyNoise researcher Glenn Thorpe said in an alert]]> 2025-01-29T10:41:00+00:00 https://thehackernews.com/2025/01/zyxel-cpe-devices-face-active.html www.secnews.physaphae.fr/article.php?IdArticle=8644144 False Vulnerability,Threat None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) PureCrypter Deploys Agent Tesla and New TorNet Backdoor in Ongoing Cyberattacks A financially motivated threat actor has been linked to an ongoing phishing email campaign that has been ongoing since at least July 2024 specifically targeting users in Poland and Germany. The attacks have led to the deployment of various payloads, such as Agent Tesla, Snake Keylogger, and a previously undocumented backdoor dubbed TorNet that\'s delivered by means of PureCrypter. TorNet is so]]> 2025-01-28T22:04:00+00:00 https://thehackernews.com/2025/01/purecrypter-deploys-agent-tesla-and-new.html www.secnews.physaphae.fr/article.php?IdArticle=8643919 False Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) OAuth Redirect Flaw in Airline Travel Integration Exposes Millions to Account Hijacking Cybersecurity researchers have disclosed details of a now-patched account takeover vulnerability affecting a popular online travel service for hotel and car rentals. "By exploiting this flaw, attackers can gain unauthorized access to any user’s account within the system, effectively allowing them to impersonate the victim and perform an array of actions on their behalf – including]]> 2025-01-28T19:32:00+00:00 https://thehackernews.com/2025/01/oauth-redirect-flaw-in-airline-travel.html www.secnews.physaphae.fr/article.php?IdArticle=8643852 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) AI SOC Analysts: Propelling SecOps into the future Triaging and investigating alerts is central to security operations. As SOC teams strive to keep up with ever-increasing alert volumes and complexity, modernizing SOC automation strategies with AI has emerged as a critical solution. This blog explores how an AI SOC Analyst transforms alert management, addressing key SOC challenges while enabling faster investigations and responses. Security]]> 2025-01-28T16:50:00+00:00 https://thehackernews.com/2025/01/ai-soc-analysts-propelling-secops-into.html www.secnews.physaphae.fr/article.php?IdArticle=8643804 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Ransomware Targets ESXi Systems via Stealthy SSH Tunnels for C2 Operations Cybersecurity researchers have found that ransomware attacks targeting ESXi systems are also leveraging the access to repurpose the appliances as a conduit to tunnel traffic to command-and-control (C2) infrastructure and stay under the radar. "ESXi appliances, which are unmonitored, are increasingly exploited as a persistence mechanism and gateway to access corporate networks widely," Sygnia]]> 2025-01-28T16:31:00+00:00 https://thehackernews.com/2025/01/ransomware-targets-esxi-systems-via.html www.secnews.physaphae.fr/article.php?IdArticle=8643757 False Ransomware None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) How Long Does It Take Hackers to Crack Modern Hashing Algorithms? While passwords remain the first line of defense for protecting user accounts against unauthorized access, the methods for creating strong passwords and protecting them are continually evolving. For example, NIST password recommendations are now prioritizing password length over complexity. Hashing, however, remains a non-negotiable. Even long secure passphrases should be hashed to prevent them]]> 2025-01-28T16:00:00+00:00 https://thehackernews.com/2025/01/how-long-does-it-take-hackers-to-crack.html www.secnews.physaphae.fr/article.php?IdArticle=8643758 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) E.U. Sanctions 3 Russian Nationals for Cyber Attacks Targeting Estonia\\'s Key Ministries The Council of the European Union has sanctioned three individuals for allegedly carrying out "malicious cyber activities" against Estonia. The three Russian nationals – Nikolay Alexandrovich Korchagin, Vitaly Shevchenko, and Yuriy Fedorovich Denisov – are officers of the General Staff of the Armed Forces of the Russian Federation (GRU) Unit 29155, it said. Per the council decision, all the]]> 2025-01-28T15:46:00+00:00 https://thehackernews.com/2025/01/eu-sanctions-3-russian-nationals-for.html www.secnews.physaphae.fr/article.php?IdArticle=8643759 False None None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Top-Rated Chinese AI App DeepSeek Limits Registrations Amid Cyberattacks DeepSeek, the Chinese AI startup that has captured much of the artificial intelligence (AI) buzz in recent days, said it\'s restricting registrations on the service, citing malicious attacks. "Due to large-scale malicious attacks on DeepSeek\'s services, we are temporarily limiting registrations to ensure continued service," the company said in an incident report page. "Existing users can log in]]> 2025-01-28T11:19:00+00:00 https://thehackernews.com/2025/01/top-rated-chinese-ai-app-deepseek.html www.secnews.physaphae.fr/article.php?IdArticle=8643678 False None None 4.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Apple Patches Actively Exploited Zero-Day Affecting iPhones, Macs, and More Apple has released software updates to address several security flaws across its portfolio, including a zero-day vulnerability that it said has been exploited in the wild. The vulnerability, tracked as CVE-2025-24085, has been described as a use-after-free bug in the Core Media component that could permit a malicious application already installed on a device to elevate privileges. "Apple is]]> 2025-01-28T08:53:00+00:00 https://thehackernews.com/2025/01/apple-patches-actively-exploited-zero.html www.secnews.physaphae.fr/article.php?IdArticle=8643656 False Vulnerability,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) GitHub Desktop Vulnerability Risks Credential Leaks via Malicious Remote URLs Multiple security vulnerabilities have been disclosed in GitHub Desktop as well as other Git-related projects that, if successfully exploited, could permit an attacker to gain unauthorized access to a user\'s Git credentials. "Git implements a protocol called Git Credential Protocol to retrieve credentials from the credential helper," GMO Flatt Security researcher Ry0taK, who discovered the flaws]]> 2025-01-27T19:47:00+00:00 https://thehackernews.com/2025/01/github-desktop-vulnerability-risks.html www.secnews.physaphae.fr/article.php?IdArticle=8643386 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) [27 January] Welcome to your weekly cybersecurity scoop! Ever thought about how the same AI meant to protect our hospitals could also compromise them? This week, we\'re breaking down the sophisticated world of AI-driven threats, key updates in regulations, and some urgent vulnerabilities in healthcare tech that need our attention. As we unpack these complex topics, we\'ll equip you with sharp insights to]]> 2025-01-27T18:09:00+00:00 https://thehackernews.com/2025/01/thn-weekly-recap-top-cybersecurity_27.html www.secnews.physaphae.fr/article.php?IdArticle=8643343 False Tool,Vulnerability,Medical None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Do We Really Need The OWASP NHI Top 10? The Open Web Application Security Project has recently introduced a new Top 10 project - the Non-Human Identity (NHI) Top 10. For years, OWASP has provided security professionals and developers with essential guidance and actionable frameworks through its Top 10 projects, including the widely used API and Web Application security lists.  Non-human identity security represents an emerging]]> 2025-01-27T16:50:00+00:00 https://thehackernews.com/2025/01/do-we-really-need-owasp-nhi-top-10.html www.secnews.physaphae.fr/article.php?IdArticle=8643301 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) GamaCopy Mimics Gamaredon Tactics in Cyber Espionage Targeting Russian Entities A previously unknown threat actor has been observed copying the tradecraft associated with the Kremlin-aligned Gamaredon hacking group in its cyber attacks targeting Russian-speaking entities. The campaign has been attributed to a threat cluster dubbed GamaCopy, which is assessed to share overlaps with another hacking group named Core Werewolf, also tracked as Awaken Likho and PseudoGamaredon.]]> 2025-01-27T13:29:00+00:00 https://thehackernews.com/2025/01/gamacopy-mimics-gamaredon-tactics-in.html www.secnews.physaphae.fr/article.php?IdArticle=8643220 False Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) MintsLoader Delivers StealC Malware and BOINC in Targeted Cyber Attacks Threat hunters have detailed an ongoing campaign that leverages a malware loader called MintsLoader to distribute secondary payloads such as the StealC information stealer and a legitimate open-source network computing platform called BOINC. "MintsLoader is a PowerShell based malware loader that has been seen delivered via spam emails with a link to Kongtuke/ClickFix pages or a JScript file,"]]> 2025-01-27T12:46:00+00:00 https://thehackernews.com/2025/01/mintsloader-delivers-stealc-malware-and.html www.secnews.physaphae.fr/article.php?IdArticle=8643202 False Spam,Malware,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Meta\\'s Llama Framework Flaw Exposes AI Systems to Remote Code Execution Risks A high-severity security flaw has been disclosed in Meta\'s Llama large language model (LLM) framework that, if successfully exploited, could allow an attacker to execute arbitrary code on the llama-stack inference server.  The vulnerability, tracked as CVE-2024-50050, has been assigned a CVSS score of 6.3 out of 10.0. Supply chain security firm Snyk, on the other hand, has assigned it a]]> 2025-01-26T15:45:00+00:00 https://thehackernews.com/2025/01/metas-llama-framework-flaw-exposes-ai.html www.secnews.physaphae.fr/article.php?IdArticle=8642857 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) RANsacked: Over 100 Security Flaws Found in LTE and 5G Network Implementations A group of academics has disclosed details of over 100 security vulnerabilities impacting LTE and 5G implementations that could be exploited by an attacker to disrupt access to service and even gain a foothold into the cellular core network. The 119 vulnerabilities, assigned 97 unique CVE identifiers, span seven LTE implementations – Open5GS, Magma, OpenAirInterface, Athonet, SD-Core, NextEPC,]]> 2025-01-24T18:28:00+00:00 https://thehackernews.com/2025/01/ransacked-over-100-security-flaws-found.html www.secnews.physaphae.fr/article.php?IdArticle=8642063 False Vulnerability None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) 2025 State of SaaS Backup and Recovery Report The modern workplace has undergone a seismic transformation over recent years, with hybrid work becoming the norm and businesses rapidly adopting cloud-based Software-as-a-Service (SaaS) applications to facilitate it. SaaS applications like Microsoft 365 and Google Workspace have now become the backbone of business operations, enabling seamless collaboration and productivity. However, this]]> 2025-01-24T16:30:00+00:00 https://thehackernews.com/2025/01/insights-from-2025-saas-backup-and-recovery-report.html www.secnews.physaphae.fr/article.php?IdArticle=8642019 False Cloud None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) DoJ Indicts 5 Individuals for $866K North Korean IT Worker Scheme Violations The U.S. Department of Justice (DoJ) on Thursday indicted two North Korean nationals, a Mexican national, and two of its own citizens for their alleged involvement in the ongoing fraudulent information technology (IT) worker scheme that seeks to generate revenue for the Democratic People\'s Republic of Korea (DPRK) in violation of international sanctions. The action targets Jin Sung-Il (진성일), Pak]]> 2025-01-24T15:23:00+00:00 https://thehackernews.com/2025/01/doj-indicts-5-individuals-for-866k.html www.secnews.physaphae.fr/article.php?IdArticle=8642000 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Android\\'s New Identity Check Feature Locks Device Settings Outside Trusted Locations Google has launched a new feature called Identity Check for supported Android devices that locks sensitive settings behind biometric authentication when outside of trusted locations. "When you turn on Identity Check, your device will require explicit biometric authentication to access certain sensitive resources when you\'re outside of trusted locations," Google said in a post announcing the]]> 2025-01-24T12:50:00+00:00 https://thehackernews.com/2025/01/androids-new-identity-check-feature.html www.secnews.physaphae.fr/article.php?IdArticle=8641940 False Mobile None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) CISA Adds Five-Year-Old jQuery XSS Flaw to Exploited Vulnerabilities List The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday placed a now-patched security flaw impacting the popular jQuery JavaScript library to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The medium-severity vulnerability is CVE-2020-11023 (CVSS score: 6.1/6.9), a nearly five-year-old cross-site scripting (XSS) bug that could be]]> 2025-01-24T11:09:00+00:00 https://thehackernews.com/2025/01/cisa-adds-five-year-old-jquery-xss-flaw.html www.secnews.physaphae.fr/article.php?IdArticle=8641904 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Palo Alto Firewalls Found Vulnerable to Secure Boot Bypass and Firmware Exploits An exhaustive evaluation of three firewall models from Palo Alto Networks has uncovered a host of known security flaws impacting the devices\' firmware as well as misconfigured security features. "These weren\'t obscure, corner-case vulnerabilities," security vendor Eclypsium said in a report shared with The Hacker News. "Instead these were very well-known issues that we wouldn\'t expect to see]]> 2025-01-23T20:43:00+00:00 https://thehackernews.com/2025/01/palo-alto-firewalls-found-vulnerable-to.html www.secnews.physaphae.fr/article.php?IdArticle=8641631 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Beware: Fake CAPTCHA Campaign Spreads Lumma Stealer in Multi-Industry Attacks Cybersecurity researchers are calling attention to a new malware campaign that leverages fake CAPTCHA verification checks to deliver the infamous Lumma information stealer. "The campaign is global, with Netskope Threat Labs tracking victims targeted in Argentina, Colombia, the United States, the Philippines, and other countries around the world," Leandro Fróes, senior threat research engineer at]]> 2025-01-23T20:30:00+00:00 https://thehackernews.com/2025/01/beware-fake-captcha-campaign-spreads.html www.secnews.physaphae.fr/article.php?IdArticle=8641632 False Malware,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Custom Backdoor Exploiting Magic Packet Vulnerability in Juniper Routers Enterprise-grade Juniper Networks routers have become the target of a custom backdoor as part of a campaign dubbed J-magic. According to the Black Lotus Labs team at Lumen Technologies, the activity is so named for the fact that the backdoor continuously monitors for a "magic packet" sent by the threat actor in TCP traffic.  "J-magic campaign marks the rare occasion of malware designed]]> 2025-01-23T20:25:00+00:00 https://thehackernews.com/2025/01/custom-backdoor-exploiting-magic-packet.html www.secnews.physaphae.fr/article.php?IdArticle=8641678 False Malware,Vulnerability,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Experts Find Shared Codebase Linking Morpheus and HellCat Ransomware Payloads An analysis of HellCat and Morpheus ransomware operations has revealed that affiliates associated with the respective cybercrime entities are using identical code for their ransomware payloads. The findings come from SentinelOne, which analyzed artifacts uploaded to the VirusTotal malware scanning platform by the same submitter towards the end of December 2024. "These two payload samples are]]> 2025-01-23T19:30:00+00:00 https://thehackernews.com/2025/01/experts-find-shared-codebase-linking.html www.secnews.physaphae.fr/article.php?IdArticle=8641605 False Ransomware,Malware None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) How to Eliminate Identity-Based Threats Despite significant investments in advanced technologies and employee training programs, credential and user-based attacks remain alarmingly prevalent, accounting for 50-80% of enterprise breaches[1],[2]. While identity-based attacks continue to dominate as the leading cause of security incidents, the common approach to identity security threats is still threat reduction, implementing layers of]]> 2025-01-23T16:50:00+00:00 https://thehackernews.com/2025/01/eliminate-identity-based-threats.html www.secnews.physaphae.fr/article.php?IdArticle=8641528 False Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) SonicWall Urges Immediate Patch for Critical CVE-2025-23006 Flaw Amid Likely Exploitation SonicWall is alerting customers of a critical security flaw impacting its Secure Mobile Access (SMA) 1000 Series appliances that it said has been likely exploited in the wild as a zero-day. The vulnerability, tracked as CVE-2025-23006, is rated 9.8 out of a maximum of 10.0 on the CVSS scoring system. "Pre-authentication deserialization of untrusted data vulnerability has been identified in the]]> 2025-01-23T15:54:00+00:00 https://thehackernews.com/2025/01/sonicwall-urges-immediate-patch-for.html www.secnews.physaphae.fr/article.php?IdArticle=8641529 False Vulnerability,Threat,Mobile None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) New Research: The State of Web Exposure 2025 Are your websites leaking sensitive data? New research reveals that 45% of third-party apps access user info without proper authorization, and 53% of risk exposures in Retail are due to the excessive use of tracking tools. Learn how to uncover and mitigate these hidden threats and risks-download the full report here. New research by web exposure management specialist Reflectiz reveals several]]> 2025-01-23T15:45:00+00:00 https://thehackernews.com/2025/01/new-research-state-of-web-exposure-2025.html www.secnews.physaphae.fr/article.php?IdArticle=8641530 False Tool None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) QakBot-Linked BC Malware Adds Enhanced DNS Tunneling and Remote Access Features Cybersecurity researchers have disclosed details of a new BackConnect (BC) malware that has been developed by threat actors linked to the infamous QakBot loader. "BackConnect is a common feature or module utilized by threat actors to maintain persistence and perform tasks," Walmart\'s Cyber Intelligence team told The Hacker News. "The BackConnect(s) in use were \'DarkVNC\' alongside the IcedID]]> 2025-01-23T15:13:00+00:00 https://thehackernews.com/2025/01/qakbot-linked-bc-malware-adds-enhanced.html www.secnews.physaphae.fr/article.php?IdArticle=8641507 False Malware,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Cisco Fixes Critical Privilege Escalation Flaw in Meeting Management (CVSS 9.9) Cisco has released software updates to address a critical security flaw impacting Meeting Management that could permit a remote, authenticated attacker to gain administrator privileges on susceptible instances. The vulnerability, tracked as CVE-2025-20156, carries a CVSS score of 9.9 out 10.0. It has been described as a privilege escalation flaw in the REST API of Cisco Meeting Management. "This]]> 2025-01-23T11:51:00+00:00 https://thehackernews.com/2025/01/cisco-fixes-critical-privilege.html www.secnews.physaphae.fr/article.php?IdArticle=8641448 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) TRIPLESTRENGTH Hits Cloud for Cryptojacking, On-Premises Systems for Ransomware Google on Wednesday shed light on a financially motivated threat actor named TRIPLESTRENGTH for its opportunistic targeting of cloud environments for cryptojacking and on-premise ransomware attacks. "This actor engaged in a variety of threat activity, including cryptocurrency mining operations on hijacked cloud resources and ransomware activity," the tech giant\'s cloud division said in its 11th]]> 2025-01-23T11:05:00+00:00 https://thehackernews.com/2025/01/triplestrength-targets-cloud-platforms.html www.secnews.physaphae.fr/article.php?IdArticle=8641413 False Ransomware,Threat,Cloud None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Trump Terminates DHS Advisory Committee Memberships, Disrupting Cybersecurity Review The new Trump administration has terminated all memberships of advisory committees that report to the Department of Homeland Security (DHS).  "In alignment with the Department of Homeland Security\'s (DHS) commitment to eliminating the misuse of resources and ensuring that DHS activities prioritize our national security, I am directing the termination of all current memberships on advisory]]> 2025-01-22T21:47:00+00:00 https://thehackernews.com/2025/01/trump-terminates-dhs-advisory-committee.html www.secnews.physaphae.fr/article.php?IdArticle=8641169 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Hackers Exploit Zero-Day in cnPilot Routers to Deploy AIRASHI DDoS Botnet Threat actors are exploiting an unspecified zero-day vulnerability in Cambium Networks cnPilot routers to deploy a variant of the AISURU botnet called AIRASHI to carry out distributed denial-of-service (DDoS) attacks. According to QiAnXin XLab, the attacks have leveraged the security flaw since June 2024. Additional details about the shortcomings have been withheld to prevent further abuse. Some]]> 2025-01-22T19:23:00+00:00 https://thehackernews.com/2025/01/hackers-exploit-zero-day-in-cnpilot.html www.secnews.physaphae.fr/article.php?IdArticle=8641098 False Vulnerability,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Discover Hidden Browsing Threats: Free Risk Assessment for GenAI, Identity, Web, and SaaS Risks As GenAI tools and SaaS platforms become a staple component in the employee toolkit, the risks associated with data exposure, identity vulnerabilities, and unmonitored browsing behavior have skyrocketed. Forward-thinking security teams are looking for security controls and strategies to address these risks, but they do not always know which risks to prioritize. In some cases, they might have]]> 2025-01-22T16:01:00+00:00 https://thehackernews.com/2025/01/discover-hidden-browsing-threats-free.html www.secnews.physaphae.fr/article.php?IdArticle=8641026 False Tool,Vulnerability,Cloud None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) President Trump Pardons Silk Road Creator Ross Ulbricht After 11 Years in Prison U.S. President Donald Trump on Tuesday granted a "full and unconditional pardon" to Ross Ulbricht, the creator of the infamous Silk Road drug marketplace, after spending 11 years behind bars. "I just called the mother of Ross William Ulbricht to let her know that in honor of her and the Libertarian Movement, which supported me so strongly, it was my pleasure to have just signed a full and]]> 2025-01-22T16:00:00+00:00 https://thehackernews.com/2025/01/president-trump-pardons-silk-road.html www.secnews.physaphae.fr/article.php?IdArticle=8641027 False Legislation None 4.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) PlushDaemon APT Targets South Korean VPN Provider in Supply Chain Attack A previously undocumented China-aligned advanced persistent threat (APT) group named PlushDaemon has been linked to a supply chain attack targeting a South Korean virtual private network (VPN) provider in 2023, according to new findings from ESET. "The attackers replaced the legitimate installer with one that also deployed the group\'s signature implant that we have named SlowStepper – a]]> 2025-01-22T14:19:00+00:00 https://thehackernews.com/2025/01/plushdaemon-apt-targets-south-korean.html www.secnews.physaphae.fr/article.php?IdArticle=8641004 False Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Oracle Releases January 2025 Patch to Address 318 Flaws Across Major Products Oracle is urging customers to apply its January 2025 Critical Patch Update (CPU) to address 318 new security vulnerabilities spanning its products and services. The most severe of the flaws is a bug in the Oracle Agile Product Lifecycle Management (PLM) Framework (CVE-2025-21556, CVSS score: 9.9) that could allow an attacker to seize control of susceptible instances. "Easily exploitable]]> 2025-01-22T12:55:00+00:00 https://thehackernews.com/2025/01/oracle-releases-january-2025-patch-to.html www.secnews.physaphae.fr/article.php?IdArticle=8640957 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Mirai Botnet Launches Record 5.6 Tbps DDoS Attack with 13,000+ IoT Device Web infrastructure and security company Cloudflare on Tuesday said it detected and blocked a 5.6 Terabit per second (Tbps) distributed denial-of-service (DDoS) attack, the largest ever attack to be reported to date. The UDP protocol-based attack took place on October 29, 2024, targeting one of its customers, an unnamed internet service provider (ISP) from Eastern Asia. The activity originated]]> 2025-01-22T11:49:00+00:00 https://thehackernews.com/2025/01/mirai-botnet-launches-record-56-tbps.html www.secnews.physaphae.fr/article.php?IdArticle=8640935 False None None 4.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Mirai Variant Murdoc_Botnet Exploits AVTECH IP Cameras and Huawei Routers Cybersecurity researchers have warned of a new large-scale campaign that exploits security flaws in AVTECH IP cameras and Huawei HG532 routers to rope the devices into a Mirai botnet variant dubbed Murdoc_Botnet. The ongoing activity "demonstrates enhanced capabilities, exploiting vulnerabilities to compromise devices and establish expansive botnet networks," Qualys security researcher Shilpesh]]> 2025-01-21T19:30:00+00:00 https://thehackernews.com/2025/01/murdocbotnet-found-exploiting-avtech-ip.html www.secnews.physaphae.fr/article.php?IdArticle=8640629 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) 13,000 MikroTik Routers Hijacked by Botnet for Malspam and Cyberattacks A global network of about 13,000 hijacked Mikrotik routers has been employed as a botnet to propagate malware via spam campaigns, the latest addition to a list of botnets powered by MikroTik devices. The activity "take[s] advantage of misconfigured DNS records to pass email protection techniques," Infoblox security researcher David Brunsdon said in a technical report published last week. "This]]> 2025-01-21T18:16:00+00:00 https://thehackernews.com/2025/01/13000-mikrotik-routers-hijacked-by.html www.secnews.physaphae.fr/article.php?IdArticle=8640630 False Spam,Malware,Technical None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Ex-CIA Analyst Pleads Guilty to Sharing Top-Secret Data with Unauthorized Parties A former analyst working for the U.S. Central Intelligence Agency (CIA) pleaded guilty to transmitting top secret National Defense Information (NDI) to individuals who did not have the necessary authorization to receive it and attempted to cover up the activity. Asif William Rahman, 34, of Vienna, was an employee of the CIA since 2016 and had a Top Secret security clearance with access to]]> 2025-01-21T16:22:00+00:00 https://thehackernews.com/2025/01/ex-cia-analyst-pleads-guilty-to-sharing.html www.secnews.physaphae.fr/article.php?IdArticle=8640584 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) HackGATE: Setting New Standards for Visibility and Control in Penetration Testing Projects Imagine receiving a penetration test report that leaves you with more questions than answers. Questions like, "Were all functionalities of the web app tested?" or " Were there any security issues that could have been identified during testing?" often go unresolved, raising concerns about the thoroughness of the security testing. This frustration is common among many security teams. Pentest]]> 2025-01-21T16:00:00+00:00 https://thehackernews.com/2025/01/hackgate-setting-new-standards-for.html www.secnews.physaphae.fr/article.php?IdArticle=8640555 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) PNGPlug Loader Delivers ValleyRAT Malware Through Fake Software Installers Cybersecurity researchers are calling attention to a series of cyber attacks that have targeted Chinese-speaking regions like Hong Kong, Taiwan, and Mainland China with a known malware called ValleyRAT. The attacks leverage a multi-stage loader dubbed PNGPlug to deliver the ValleyRAT payload, Intezer said in a technical report published last week. The infection chain commences with a phishing]]> 2025-01-21T11:15:00+00:00 https://thehackernews.com/2025/01/pngplug-loader-delivers-valleyrat.html www.secnews.physaphae.fr/article.php?IdArticle=8640485 False Malware,Technical None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) CERT-UA Warns of Cyber Scams Using Fake AnyDesk Requests for Fraudulent Security Audits The Computer Emergency Response Team of Ukraine (CERT-UA) is warning of ongoing attempts by unknown threat actors to impersonate the cybersecurity agency by sending AnyDesk connection requests. The AnyDesk requests claim to be for conducting an audit to assess the "level of security," CERT-UA added, cautioning organizations to be on the lookout for such social engineering attempts that seek to]]> 2025-01-21T10:57:00+00:00 https://thehackernews.com/2025/01/cert-ua-warns-of-cyber-scams-using-fake.html www.secnews.physaphae.fr/article.php?IdArticle=8640465 False Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Unsecured Tunneling Protocols Expose 4.2 Million Hosts, Including VPNs and Routers New research has uncovered security vulnerabilities in multiple tunneling protocols that could allow attackers to perform a wide range of attacks. "Internet hosts that accept tunneling packets without verifying the sender\'s identity can be hijacked to perform anonymous attacks and provide access to their networks," Top10VPN said in a study, as part of a collaboration with KU Leuven professor]]> 2025-01-20T20:38:00+00:00 https://thehackernews.com/2025/01/unsecured-tunneling-protocols-expose-42.html www.secnews.physaphae.fr/article.php?IdArticle=8640189 False Vulnerability,Studies None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) DoNot Team Linked to New Tanzeem Android Malware Targeting Intelligence Collection The Threat actor known as DoNot Team has been linked to a new Android malware as part of highly targeted cyber attacks. The artifacts in question, named Tanzeem (meaning "organization" in Urdu) and Tanzeem Update, were spotted in October and December 2024 by cybersecurity company Cyfirma. The apps in question have been found to incorporate identical functions, barring minor modifications to the]]> 2025-01-20T20:23:00+00:00 https://thehackernews.com/2025/01/donot-team-linked-to-new-tanzeem.html www.secnews.physaphae.fr/article.php?IdArticle=8640190 False Malware,Threat,Mobile None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) [20 January] As the digital world becomes more complicated, the lines between national security and cybersecurity are starting to fade. Recent cyber sanctions and intelligence moves show a reality where malware and fake news are used as tools in global politics. Every cyberattack now seems to have deeper political consequences. Governments are facing new, unpredictable threats that can\'t be fought with]]> 2025-01-20T17:32:00+00:00 https://thehackernews.com/2025/01/thn-weekly-recap-top-cybersecurity_20.html www.secnews.physaphae.fr/article.php?IdArticle=8640121 False Malware,Tool None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Product Walkthrough: How Satori Secures Sensitive Data From Production to AI Every week seems to bring news of another data breach, and it\'s no surprise why: securing sensitive data has become harder than ever. And it\'s not just because companies are dealing with orders of magnitude more data. Data flows and user roles are constantly shifting, and data is stored across multiple technologies and cloud environments. Not to mention, compliance requirements are only getting]]> 2025-01-20T16:40:00+00:00 https://thehackernews.com/2025/01/product-walkthrough-how-satori.html www.secnews.physaphae.fr/article.php?IdArticle=8640122 False Data Breach,Cloud Satori 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Hackers Deploy Malicious npm Packages to Steal Solana Wallet Keys via Gmail SMTP Cybersecurity researchers have identified three sets of malicious packages across the npm and Python Package Index (PyPI) repository that come with capabilities to steal data and even delete sensitive data from infected systems. The list of identified packages is below - @async-mutex/mutex, a typosquat of async-mute (npm) dexscreener, which masquerades as a library for accessing liquidity pool]]> 2025-01-20T11:15:00+00:00 https://thehackernews.com/2025/01/hackers-deploy-malicious-npm-packages.html www.secnews.physaphae.fr/article.php?IdArticle=8639965 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) TikTok Goes Dark in the U.S. as Federal Ban Takes Effect January 19, 2025 Popular video-sharing social network TikTok has officially gone dark in the United States, 2025, as a federal ban on the app comes into effect on January 19, 2025. "We regret that a U.S. law banning TikTok will take effect on January 19 and force us to make our services temporarily unavailable," the company said in a pop-up message. "We\'re working to restore our service in the U.S. as soon as]]> 2025-01-19T10:54:00+00:00 https://thehackernews.com/2025/01/tiktok-goes-dark-in-us-as-federal-ban.html www.secnews.physaphae.fr/article.php?IdArticle=8639517 False None None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) U.S. Sanctions Chinese Cybersecurity Firm Over Treasury Hack Tied to Silk Typhoon The U.S. Treasury Department\'s Office of Foreign Assets Control (OFAC) has imposed sanctions against a Chinese cybersecurity company and a Shanghai-based cyber actor for their alleged links to the Salt Typhoon group and the recent compromise of the federal agency. "People\'s Republic of China-linked (PRC) malicious cyber actors continue to target U.S. government systems, including the recent]]> 2025-01-18T11:36:00+00:00 https://thehackernews.com/2025/01/us-sanctions-chinese-cybersecurity-firm.html www.secnews.physaphae.fr/article.php?IdArticle=8639095 False Hack None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Critical Flaws in WGS-804HPT Switches Enable RCE and Network Exploitation Cybersecurity researchers have disclosed three security flaws in Planet Technology\'s WGS-804HPT industrial switches that could be chained to achieve pre-authentication remote code execution on susceptible devices. "These switches are widely used in building and home automation systems for a variety of networking applications," Claroty\'s Tomer Goldschmidt said in a Thursday report. "An attacker]]> 2025-01-17T19:38:00+00:00 https://thehackernews.com/2025/01/critical-flaws-in-wgs-804hpt-switches.html www.secnews.physaphae.fr/article.php?IdArticle=8638800 False Industrial None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Python-Based Bots Exploiting PHP Servers Fuel Gambling Platform Proliferation Cybersecurity researchers have exposed a new campaign that targets web servers running PHP-based applications to promote gambling platforms in Indonesia. "Over the past two months, a significant volume of attacks from Python-based bots has been observed, suggesting a coordinated effort to exploit thousands of web apps," Imperva researcher Daniel Johnston said in an analysis. "These attacks]]> 2025-01-17T18:36:00+00:00 https://thehackernews.com/2025/01/python-based-bots-exploiting-php.html www.secnews.physaphae.fr/article.php?IdArticle=8638790 False Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) How to Bring Zero Trust to Wi-Fi Security with a Cloud-based Captive Portal? Recent data breaches have highlighted the critical need to improve guest Wi-Fi infrastructure security in modern business environments. Organizations face increasing pressure to protect their networks while providing convenient access to visitors, contractors, temporary staff, and employees with BYOD. Implementing secure guest Wi-Fi infrastructure has become essential for authenticating access,]]> 2025-01-17T15:51:00+00:00 https://thehackernews.com/2025/01/how-to-bring-zero-trust-to-wi-fi.html www.secnews.physaphae.fr/article.php?IdArticle=8638740 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) New \\'Sneaky 2FA\\' Phishing Kit Targets Microsoft 365 Accounts with 2FA Code Bypass Cybersecurity researchers have detailed a new adversary-in-the-middle (AitM) phishing kit that\'s capable of Microsoft 365 accounts with an aim to steal credentials and two-factor authentication (2FA) codes since at least October 2024. The nascent phishing kit has been dubbed Sneaky 2FA by French cybersecurity company Sekoia, which detected it in the wild in December. Nearly 100 domains hosting]]> 2025-01-17T15:37:00+00:00 https://thehackernews.com/2025/01/new-sneaky-2fa-phishing-kit-targets.html www.secnews.physaphae.fr/article.php?IdArticle=8638741 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) U.S. Sanctions North Korean IT Worker Network Supporting WMD Programs The U.S. Treasury Department\'s Office of Foreign Assets Control (OFAC) sanctioned two individuals and four entities for their alleged involvement in illicit revenue generation schemes for the Democratic People\'s Republic of Korea (DPRK) by dispatching IT workers around the world to obtain employment and draw a steady source of income for the regime in violation of international sanctions. "These]]> 2025-01-17T15:37:00+00:00 https://thehackernews.com/2025/01/us-sanctions-north-korean-it-worker.html www.secnews.physaphae.fr/article.php?IdArticle=8638742 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) European Privacy Group Sues TikTok and AliExpress for Illicit Data Transfers to China Austrian privacy non-profit None of Your Business (noyb) has filed complaints accusing companies like TikTok, AliExpress, SHEIN, Temu, WeChat, and Xiaomi of violating data protection regulations in the European Union by unlawfully transferring users\' data to China. The advocacy group is seeking an immediate suspension of such transfers, stating the companies in question cannot shield user data]]> 2025-01-17T09:44:00+00:00 https://thehackernews.com/2025/01/european-privacy-group-sues-tiktok-and.html www.secnews.physaphae.fr/article.php?IdArticle=8638592 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Russian Star Blizzard Shifts Tactics to Exploit WhatsApp QR Codes for Credential Harvesting The Russian threat actor known as Star Blizzard has been linked to a new spear-phishing campaign that targets victims\' WhatsApp accounts, signaling a departure from its longstanding tradecraft in a likely attempt to evade detection. "Star Blizzard\'s targets are most commonly related to government or diplomacy (both incumbent and former position holders), defense policy or international relations]]> 2025-01-16T23:42:00+00:00 https://thehackernews.com/2025/01/russian-star-blizzard-shifts-tactics-to.html www.secnews.physaphae.fr/article.php?IdArticle=8638414 False Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Ready to Simplify Trust Management? Join Free Webinar to See DigiCert ONE in Action The digital world is exploding. IoT devices are multiplying like rabbits, certificates are piling up faster than you can count, and compliance requirements are tightening by the day. Keeping up with it all can feel like trying to juggle chainsaws while riding a unicycle. Traditional trust management? Forget it. It\'s simply not built for today\'s fast-paced, hybrid environments. You need a]]> 2025-01-16T17:55:00+00:00 https://thehackernews.com/2025/01/ready-to-simplify-trust-management-join.html www.secnews.physaphae.fr/article.php?IdArticle=8638291 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) The $10 Cyber Threat Responsible for the Biggest Breaches of 2024 You can tell the story of the current state of stolen credential-based attacks in three numbers: Stolen credentials were the #1 attacker action in 2023/24, and the breach vector for 80% of web app attacks. (Source: Verizon). Cybersecurity budgets grew again in 2024, with organizations now spending almost $1,100 per user (Source: Forrester).  Stolen credentials on criminal forums cost as]]> 2025-01-16T17:00:00+00:00 https://thehackernews.com/2025/01/the-10-cyber-threat-responsible-for.html www.secnews.physaphae.fr/article.php?IdArticle=8638258 False Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) New UEFI Secure Boot Vulnerability Could Allow Attackers to Load Malicious Bootkits Details have emerged about a now-patched security vulnerability that could allow a bypass of the Secure Boot mechanism in Unified Extensible Firmware Interface (UEFI) systems. The vulnerability, assigned the CVE identifier CVE-2024-7344 (CVSS score: 6.7), resides in a UEFI application signed by Microsoft\'s "Microsoft Corporation UEFI CA 2011" third-party UEFI certificate, according to a new]]> 2025-01-16T16:53:00+00:00 https://thehackernews.com/2025/01/new-uefi-secure-boot-vulnerability.html www.secnews.physaphae.fr/article.php?IdArticle=8638259 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Researchers Find Exploit Allowing NTLMv1 Despite Active Directory Restrictions Cybersecurity researchers have found that the Microsoft Active Directory Group Policy that\'s designed to disable NT LAN Manager (NTLM) v1 can be trivially bypassed by a misconfiguration. "A simple misconfiguration in on-premise applications can override the Group Policy, effectively negating the Group Policy designed to stop NTLMv1 authentications," Silverfort researcher Dor Segal said in a]]> 2025-01-16T16:50:00+00:00 https://thehackernews.com/2025/01/researchers-find-exploit-allowing.html www.secnews.physaphae.fr/article.php?IdArticle=8638260 False Threat None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Hackers Hide Malware in Images to Deploy VIP Keylogger and 0bj3ctivity Stealer Threat actors have been observed concealing malicious code in images to deliver malware such as VIP Keylogger and 0bj3ctivity Stealer as part of separate campaigns. "In both campaigns, attackers hid malicious code in images they uploaded to archive[.]org, a file-hosting website, and used the same .NET loader to install their final payloads," HP Wolf Security said in its Threat Insights Report]]> 2025-01-16T16:45:00+00:00 https://thehackernews.com/2025/01/hackers-hide-malware-in-images-to.html www.secnews.physaphae.fr/article.php?IdArticle=8638261 False Malware,Threat None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Python-Based Malware Powers RansomHub Ransomware to Exploit Network Flaws Cybersecurity researchers have detailed an attack that involved a threat actor utilizing a Python-based backdoor to maintain persistent access to compromised endpoints and then leveraged this access to deploy the RansomHub ransomware throughout the target network. According to GuidePoint Security, initial access is said to have been facilitated by means of a JavaScript malware downloaded named]]> 2025-01-16T12:15:00+00:00 https://thehackernews.com/2025/01/python-based-malware-powers-ransomhub.html www.secnews.physaphae.fr/article.php?IdArticle=8638133 False Ransomware,Malware,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Researcher Uncovers Critical Flaws in Multiple Versions of Ivanti Endpoint Manager Ivanti has rolled out security updates to address several security flaws impacting Avalanche, Application Control Engine, and Endpoint Manager (EPM), including four critical bugs that could lead to information disclosure. All the four critical security flaws, rated 9.8 out of 10.0 on the CVSS scale, are rooted in EPM, and concern absolute path traversal flaws that allow a remote unauthenticated]]> 2025-01-16T12:09:00+00:00 https://thehackernews.com/2025/01/researcher-uncovers-critical-flaws-in.html www.secnews.physaphae.fr/article.php?IdArticle=8638134 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Google Ads Users Targeted in Malvertising Scam Stealing Credentials and 2FA Codes Cybersecurity researchers have alerted to a new malvertising campaign that\'s targeting individuals and businesses advertising via Google Ads by attempting to phish for their credentials via fraudulent ads on Google. "The scheme consists of stealing as many advertiser accounts as possible by impersonating Google Ads and redirecting victims to fake login pages," Jérôme Segura, senior director of]]> 2025-01-15T21:18:00+00:00 https://thehackernews.com/2025/01/google-ads-users-targeted-in.html www.secnews.physaphae.fr/article.php?IdArticle=8637829 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Lazarus Group Targets Web3 Developers with Fake LinkedIn Profiles in Operation 99 The North Korea-linked Lazarus Group has been attributed to a new cyber attack campaign dubbed Operation 99 that targeted software developers looking for freelance Web3 and cryptocurrency work to deliver malware. "The campaign begins with fake recruiters, posing on platforms like LinkedIn, luring developers with project tests and code reviews," Ryan Sherstobitoff, senior vice president of Threat]]> 2025-01-15T21:07:00+00:00 https://thehackernews.com/2025/01/lazarus-group-targets-web3-developers.html www.secnews.physaphae.fr/article.php?IdArticle=8637830 False Malware,Threat APT 38 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) North Korean IT Worker Fraud Linked to 2016 Crowdfunding Scam and Fake Domains Cybersecurity researchers have identified infrastructure links between the North Korean threat actors behind the fraudulent IT worker schemes and a 2016 crowdfunding scam. The new evidence suggests that Pyongyang-based threamoret groups may have pulled off illicit money-making scams that predate the use of IT workers, SecureWorks Counter Threat Unit (CTU) said in a report shared with The Hacker]]> 2025-01-15T19:02:00+00:00 https://thehackernews.com/2025/01/north-korean-it-worker-fraud-linked-to.html www.secnews.physaphae.fr/article.php?IdArticle=8637735 False Threat None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Google Cloud Researchers Uncover Flaws in Rsync File Synchronization Tool As many as six security vulnerabilities have been disclosed in the popular Rsync file-synchronizing tool for Unix systems, some of which could be exploited to execute arbitrary code on a client. "Attackers can take control of a malicious server and read/write arbitrary files of any connected client," the CERT Coordination Center (CERT/CC) said in an advisory. "Sensitive data, such as SSH keys,]]> 2025-01-15T17:56:00+00:00 https://thehackernews.com/2025/01/google-cloud-researchers-uncover-flaws.html www.secnews.physaphae.fr/article.php?IdArticle=8637703 False Tool,Vulnerability,Cloud None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) The High-Stakes Disconnect For ICS/OT Security Why does ICS/OT need specific controls and its own cybersecurity budget today? Because treating ICS/OT security with an IT security playbook isn\'t just ineffective-it\'s high risk. In the rapidly evolving domain of cybersecurity, the specific challenges and needs for Industrial Control Systems (ICS) and Operational Technology (OT) security distinctly stand out from traditional IT security. ICS/OT]]> 2025-01-15T17:00:00+00:00 https://thehackernews.com/2025/01/the-high-stakes-disconnect-for-icsot.html www.secnews.physaphae.fr/article.php?IdArticle=8637704 False Industrial None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) FBI Deletes PlugX Malware from 4,250 Hacked Computers in Multi-Month Operation The U.S. Department of Justice (DoJ) on Tuesday disclosed that a court-authorized operation allowed the Federal Bureau of Investigation (FBI) to delete PlugX malware from over 4,250 infected computers as part of a "multi-month law enforcement operation." PlugX, also known as Korplug, is a remote access trojan (RAT) widely used by threat actors associated with the People\'s Republic of China (PRC]]> 2025-01-15T11:44:00+00:00 https://thehackernews.com/2025/01/fbi-deletes-plugx-malware-from-4250.html www.secnews.physaphae.fr/article.php?IdArticle=8637567 False Malware,Threat,Legislation None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) 3 Actively Exploited Zero-Day Flaws Patched in Microsoft\\'s Latest Security Update Microsoft kicked off 2025 with a new set of patches for a total of 161 security vulnerabilities across its software portfolio, including three zero-days that have been actively exploited in attacks. Of the 161 flaws, 11 are rated Critical, and 149 are rated Important in severity. One other flaw, a non-Microsoft CVE related to a Windows Secure Boot bypass (CVE-2024-7344), has not been assigned]]> 2025-01-15T10:45:00+00:00 https://thehackernews.com/2025/01/3-actively-exploited-zero-day-flaws.html www.secnews.physaphae.fr/article.php?IdArticle=8637520 False Vulnerability,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Critical SimpleHelp Flaws Allow File Theft, Privilege Escalation, and RCE Attacks Cybersecurity researchers have disclosed multiple security flaws in SimpleHelp remote access software that could lead to information disclosure, privilege escalation, and remote code execution. Horizon3.ai researcher Naveen Sunkavally, in a technical report detailing the findings, said the "vulnerabilities are trivial to reverse and exploit." The list of identified flaws is as follows -]]> 2025-01-15T10:40:00+00:00 https://thehackernews.com/2025/01/critical-simplehelp-flaws-allow-file.html www.secnews.physaphae.fr/article.php?IdArticle=8637521 False Threat,Technical None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Microsoft Uncovers macOS Vulnerability CVE-2024-44243 Allowing Rootkit Installation Microsoft has shed light on a now-patched security flaw impacting Apple macOS that, if successfully exploited, could have allowed an attacker running as "root" to bypass the operating system\'s System Integrity Protection (SIP) and install malicious kernel drivers by loading third-party kernel extensions. The vulnerability in question is CVE-2024-44243 (CVSS score: 5.5), a medium-severity bug]]> 2025-01-14T22:23:00+00:00 https://thehackernews.com/2025/01/microsoft-uncovers-macos-vulnerability.html www.secnews.physaphae.fr/article.php?IdArticle=8637254 False Vulnerability None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Google OAuth Vulnerability Exposes Millions via Failed Startup Domains New research has pulled back the curtain on a "deficiency" in Google\'s "Sign in with Google" authentication flow that exploits a quirk in domain ownership to gain access to sensitive data. "Google\'s OAuth login doesn\'t protect against someone purchasing a failed startup\'s domain and using it to re-create email accounts for former employees," Truffle Security co-founder and CEO Dylan Ayrey said]]> 2025-01-14T22:08:00+00:00 https://thehackernews.com/2025/01/google-oauth-vulnerability-exposes.html www.secnews.physaphae.fr/article.php?IdArticle=8637255 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) 4 Reasons Your SaaS Attack Surface Can No Longer be Ignored What do identity risks, data security risks and third-party risks all have in common? They are all made much worse by SaaS sprawl. Every new SaaS account adds a new identity to secure, a new place where sensitive data can end up, and a new source of third party risk. Learn how you can protect this sprawling attack surface in 2025. What do identity risks, data security risks and third-party]]> 2025-01-14T15:38:00+00:00 https://thehackernews.com/2025/01/4-reasons-your-saas-attack-surface-can.html www.secnews.physaphae.fr/article.php?IdArticle=8637075 False Cloud None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Illicit HuiOne Telegram Market Surpasses Hydra, Hits $24 Billion in Crypto Transactions The Telegram-based online marketplace known as HuiOne Guarantee and its vendors have cumulatively received at least $24 billion in cryptocurrency, dwarfing the now-defunct Hydra to become the largest online illicit marketplace to have ever operated. The figures, released by blockchain analytics firm Elliptic, show that monthly inflows have increased by 51% since July 2024. Huione Guarantee, part]]> 2025-01-14T14:59:00+00:00 https://thehackernews.com/2025/01/illicit-huione-telegram-market.html www.secnews.physaphae.fr/article.php?IdArticle=8637054 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Zero-Day Vulnerability Suspected in Attacks on Fortinet Firewalls with Exposed Interfaces Threat hunters are calling attention to a new campaign that has targeted Fortinet FortiGate firewall devices with management interfaces exposed on the public internet. "The campaign involved unauthorized administrative logins on management interfaces of firewalls, creation of new accounts, SSL VPN authentication through those accounts, and various other configuration changes," cybersecurity firm]]> 2025-01-14T14:43:00+00:00 https://thehackernews.com/2025/01/zero-day-vulnerability-suspected-in.html www.secnews.physaphae.fr/article.php?IdArticle=8637055 False Vulnerability,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Russian-Linked Hackers Target Kazakhstan in Espionage Campaign with HATVIBE Malware Russia-linked threat actors have been attributed to an ongoing cyber espionage campaign targeting Kazakhstan as part of the Kremlin\'s efforts to gather economic and political intelligence in Central Asia. The campaign has been assessed to be the work of an intrusion set dubbed UAC-0063, which likely shares overlap with APT28, a nation-state group affiliated with Russia\'s General Staff Main]]> 2025-01-14T14:40:00+00:00 https://thehackernews.com/2025/01/russian-linked-hackers-target.html www.secnews.physaphae.fr/article.php?IdArticle=8637076 False Malware,Threat APT 28 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) CISA Adds Second BeyondTrust Flaw to KEV Catalog Amid Active Attacks The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a second security flaw impacting BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) products to the Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The vulnerability in question is CVE-2024-12686 (CVSS score: 6.6), a medium-severity bug that could]]> 2025-01-14T08:51:00+00:00 https://thehackernews.com/2025/01/cisa-adds-new-beyondtrust-flaw-to-kev.html www.secnews.physaphae.fr/article.php?IdArticle=8636973 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Hackers Exploit Aviatrix Controller Vulnerability to Deploy Backdoors and Crypto Miners A recently disclosed critical security flaw impacting the Aviatrix Controller cloud networking platform has come under active exploitation in the wild to deploy backdoors and cryptocurrency miners. Cloud security firm Wiz said it\'s currently responding to "multiple incidents" involving the weaponization of CVE-2024-50603 (CVSS score: 10.0), a maximum severity bug that could result in]]> 2025-01-13T19:03:00+00:00 https://thehackernews.com/2025/01/hackers-exploit-aviatrix-controller.html www.secnews.physaphae.fr/article.php?IdArticle=8636752 False Vulnerability,Threat,Cloud None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) [13 January] The cyber world’s been buzzing this week, and it’s all about staying ahead of the bad guys. From sneaky software bugs to advanced hacking tricks, the risks are real, but so are the ways to protect yourself. In this recap, we’ll break down what’s happening, why it matters, and what you can do to stay secure. Let’s turn awareness into action and keep one step ahead]]> 2025-01-13T17:35:00+00:00 https://thehackernews.com/2025/01/thn-weekly-recap-top-cybersecurity_01424177917.html www.secnews.physaphae.fr/article.php?IdArticle=8636713 False Tool None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Ransomware on ESXi: The mechanization of virtualized attacks In 2024, ransomware attacks targeting VMware ESXi servers reached alarming levels, with the average ransom demand skyrocketing to $5 million. With approximately 8,000 ESXi hosts exposed directly to the internet (according to Shodan), the operational and business impact of these attacks is profound. Most of the Ransomware strands that are attacking ESXi servers nowadays, are variants of the]]> 2025-01-13T17:00:00+00:00 https://thehackernews.com/2025/01/ransomware-on-esxi-mechanization-of.html www.secnews.physaphae.fr/article.php?IdArticle=8636714 False Ransomware None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) WordPress Skimmers Evade Detection by Injecting Themselves into Database Tables Cybersecurity researchers are warning of a new stealthy credit card skimmer campaign that targets WordPress e-commerce checkout pages by inserting malicious JavaScript code into a database table associated with the content management system (CMS). "This credit card skimmer malware targeting WordPress websites silently injects malicious JavaScript into database entries to steal sensitive payment]]> 2025-01-13T12:10:00+00:00 https://thehackernews.com/2025/01/wordpress-skimmers-evade-detection-by.html www.secnews.physaphae.fr/article.php?IdArticle=8636594 False Malware None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Expired Domains Allowed Control Over 4,000 Backdoors on Compromised Systems No less than 4,000 unique web backdoors previously deployed by various threat actors have been hijacked by taking control of abandoned and expired infrastructure for as little as $20 per domain. Cybersecurity company watchTowr Labs said it pulled off the operation by registering over 40 domain names that the backdoors had been designed to use for command-and-control (C2). In partnership with the]]> 2025-01-13T11:31:00+00:00 https://thehackernews.com/2025/01/expired-domains-allowed-control-over.html www.secnews.physaphae.fr/article.php?IdArticle=8636595 False Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Microsoft Sues Hacking Group Exploiting Azure AI for Harmful Content Creation Microsoft has revealed that it\'s pursuing legal action against a "foreign-based threat–actor group" for operating a hacking-as-a-service infrastructure to intentionally get around the safety controls of its generative artificial intelligence (AI) services and produce offensive and harmful content. The tech giant\'s Digital Crimes Unit (DCU) said it has observed the threat actors "develop]]> 2025-01-11T13:24:00+00:00 https://thehackernews.com/2025/01/microsoft-sues-hacking-group-exploiting.html www.secnews.physaphae.fr/article.php?IdArticle=8635930 False Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) DoJ Indicts Three Russians for Operating Crypto Mixers Used in Cybercrime Laundering The U.S. Department of Justice (DoJ) on Friday indicted three Russian nationals for their alleged involvement in operating the cryptocurrency mixing services Blender.io and Sinbad.io. Roman Vitalyevich Ostapenko and Alexander Evgenievich Oleynik were arrested on December 1, 2024, in coordination with the Netherlands\' Financial Intelligence and Investigative Service, Finland\'s National Bureau of]]> 2025-01-11T12:15:00+00:00 https://thehackernews.com/2025/01/doj-indicts-three-russians-for.html www.secnews.physaphae.fr/article.php?IdArticle=8635913 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Taking the Pain Out of Cybersecurity Reporting: A Practical Guide for MSPs Cybersecurity reporting is a critical yet often overlooked opportunity for service providers managing cybersecurity for their clients, and specifically for virtual Chief Information Security Officers (vCISOs). While reporting is seen as a requirement for tracking cybersecurity progress, it often becomes bogged down with technical jargon, complex data, and disconnected spreadsheets that fail to]]> 2025-01-10T17:29:00+00:00 https://thehackernews.com/2025/01/taking-pain-out-of-cybersecurity.html www.secnews.physaphae.fr/article.php?IdArticle=8635622 False Technical None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) AI-Driven Ransomware FunkSec Targets 85 Victims Using Double Extortion Tactics Cybersecurity researchers have shed light on a nascent artificial intelligence (AI) assisted ransomware family called FunkSec that sprang forth in late 2024, and has claimed more than 85 victims to date. "The group uses double extortion tactics, combining data theft with encryption to pressure victims into paying ransoms," Check Point Research said in a new report shared with The Hacker News. "]]> 2025-01-10T17:28:00+00:00 https://thehackernews.com/2025/01/ai-driven-ransomware-funksec-targets-85.html www.secnews.physaphae.fr/article.php?IdArticle=8635623 False Ransomware None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Hands-On Walkthrough: Microsegmentation For all Users, Workloads and Devices by Elisity Network segmentation remains a critical security requirement, yet organizations struggle with traditional approaches that demand extensive hardware investments, complex policy management, and disruptive network changes. Healthcare and manufacturing sectors face particular challenges as they integrate diverse endpoints – from legacy medical devices to IoT sensors – onto their production networks.]]> 2025-01-10T15:52:00+00:00 https://thehackernews.com/2025/01/hands-on-walkthrough-microsegmentation.html www.secnews.physaphae.fr/article.php?IdArticle=8635587 False Medical None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Google Project Zero Researcher Uncovers Zero-Click Exploit Targeting Samsung Devices Cybersecurity researchers have detailed a now-patched security flaw impacting Monkey\'s Audio (APE) decoder on Samsung smartphones that could lead to code execution. The high-severity vulnerability, tracked as CVE-2024-49415 (CVSS score: 8.1), affects Samsung devices running Android versions 12, 13, and 14. "Out-of-bounds write in libsaped.so prior to SMR Dec-2024 Release 1 allows remote]]> 2025-01-10T15:17:00+00:00 https://thehackernews.com/2025/01/google-project-zero-researcher-uncovers.html www.secnews.physaphae.fr/article.php?IdArticle=8635588 False Vulnerability,Threat,Mobile None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) RedDelta Deploys PlugX Malware to Target Mongolia and Taiwan in Espionage Campaigns Mongolia, Taiwan, Myanmar, Vietnam, and Cambodia have been targeted by the China-nexus RedDelta threat actor to deliver a customized version of the PlugX backdoor between July 2023 and December 2024. "The group used lure documents themed around the 2024 Taiwanese presidential candidate Terry Gou, the Vietnamese National Holiday, flood protection in Mongolia, and meeting invitations, including an]]> 2025-01-10T15:01:00+00:00 https://thehackernews.com/2025/01/reddelta-deploys-plugx-malware-to.html www.secnews.physaphae.fr/article.php?IdArticle=8635589 False Malware,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) CrowdStrike Warns of Phishing Scam Targeting Job Seekers with XMRig Cryptominer Cybersecurity company CrowdStrike is alerting of a phishing campaign that exploits its own branding to distribute a cryptocurrency miner that\'s disguised as an employee CRM application as part of a supposed recruitment process. "The attack begins with a phishing email impersonating CrowdStrike recruitment, directing recipients to a malicious website," the company said. "Victims are prompted to]]> 2025-01-10T14:39:00+00:00 https://thehackernews.com/2025/01/crowdstrike-warns-of-phishing-scam.html www.secnews.physaphae.fr/article.php?IdArticle=8635590 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Major Vulnerabilities Patched in SonicWall, Palo Alto Expedition, and Aviatrix Controllers Palo Alto Networks has released software patches to address several security flaws in its Expedition migration tool, including a high-severity bug that an authenticated attacker could exploit to access sensitive data. "Multiple vulnerabilities in the Palo Alto Networks Expedition migration tool enable an attacker to read Expedition database contents and arbitrary files, as well as create and]]> 2025-01-09T22:59:00+00:00 https://thehackernews.com/2025/01/major-vulnerabilities-patched-in.html www.secnews.physaphae.fr/article.php?IdArticle=8635352 False Tool,Vulnerability,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) New Banshee Stealer Variant Bypasses Antivirus with Apple\\'s XProtect-Inspired Encryption Cybersecurity researchers have uncovered a new, stealthier version of a macOS-focused information-stealing malware called Banshee Stealer. "Once thought dormant after its source code leak in late 2024, this new iteration introduces advanced string encryption inspired by Apple\'s XProtect," Check Point Research said in a new analysis shared with The Hacker News. "This development allows it to]]> 2025-01-09T19:10:00+00:00 https://thehackernews.com/2025/01/new-banshee-stealer-variant-bypasses.html www.secnews.physaphae.fr/article.php?IdArticle=8635304 False Malware None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Product Review: How Reco Discovers Shadow AI in SaaS As SaaS providers race to integrate AI into their product offerings to stay competitive and relevant, a new challenge has emerged in the world of AI: shadow AI.  Shadow AI refers to the unauthorized use of AI tools and copilots at organizations. For example, a developer using ChatGPT to assist with writing code, a salesperson downloading an AI-powered meeting transcription tool, or a]]> 2025-01-09T17:25:00+00:00 https://thehackernews.com/2025/01/product-review-how-reco-discovers.html www.secnews.physaphae.fr/article.php?IdArticle=8635275 False Tool,Cloud ChatGPT 3.0000000000000000