www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2025-05-12T00:39:56+00:00 www.secnews.physaphae.fr InfoSecurity Mag - InfoSecurity Magazine La confusion règne alors que les acteurs de la menace exploitent Samsung Magicinfo Flaw<br>Confusion Reigns as Threat Actors Exploit Samsung MagicInfo Flaw Researchers spot in-the-wild exploits of Samsung MagicInfo despite recent patch]]> 2025-05-08T09:29:00+00:00 https://www.infosecurity-magazine.com/news/threat-actors-exploit-samsung/ www.secnews.physaphae.fr/article.php?IdArticle=8673149 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Hacker trouve une nouvelle technique pour contourner la solution EDR Sentinelone<br>Hacker Finds New Technique to Bypass SentinelOne EDR Solution Security researchers at Aon have discovered a threat actor who bypassed SentinelOne EDR protection to deploy Babuk ransomware]]> 2025-05-08T08:00:00+00:00 https://www.infosecurity-magazine.com/news/new-technique-bypass-sentinelone/ www.secnews.physaphae.fr/article.php?IdArticle=8673108 False Ransomware,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Le chiffre d'exploitation zéro-jours augmente de 19% en deux ans<br>Zero-Day Exploitation Figure Surges 19% in Two Years Google claims 19% more zero-day bugs were exploited in 2024 than 2022 as threat actors focus on security products]]> 2025-04-29T10:00:00+00:00 https://www.infosecurity-magazine.com/news/zeroday-exploitation-surges-19-two/ www.secnews.physaphae.fr/article.php?IdArticle=8669407 False Vulnerability,Threat None 4.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les chercheurs notent 16,7% d'augmentation de l'activité de numérisation automatisée<br>Researchers Note 16.7% Increase in Automated Scanning Activity According to the 2025 Global Threat Landscape Report from FortiGuard, threat actors are executing 36,000 scans per second]]> 2025-04-28T13:00:00+00:00 https://www.infosecurity-magazine.com/news/increase-automated-scanning/ www.secnews.physaphae.fr/article.php?IdArticle=8668986 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine ISACA met en évidence un manque critique de stratégies d'atténuation des menaces quantiques<br>ISACA Highlights Critical Lack of Quantum Threat Mitigation Strategies An ISACA survey found that just 5% of organizations have a defined strategy to defend against quantum-enabled threats]]> 2025-04-28T10:00:00+00:00 https://www.infosecurity-magazine.com/news/isaca-lack-quantum-threat/ www.secnews.physaphae.fr/article.php?IdArticle=8668902 False Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Le FBI demande de l'aide pour suivre les acteurs du typhon de sel chinois<br>FBI Asks for Help Tracking Chinese Salt Typhoon Actors The US authorities have asked the public to help them unmask China\'s Salt Typhoon threat actors]]> 2025-04-28T09:15:00+00:00 https://www.infosecurity-magazine.com/news/fbi-help-tracking-chinese-salt/ www.secnews.physaphae.fr/article.php?IdArticle=8668903 False Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine SAP corrige la vulnérabilité critique après des preuves d'exploitation<br>SAP Fixes Critical Vulnerability After Evidence of Exploitation A maximum severity flaw affecting SAP NetWeaver has been exploited by threat actors]]> 2025-04-25T15:30:00+00:00 https://www.infosecurity-magazine.com/news/sap-fixes-critical-vulnerability/ www.secnews.physaphae.fr/article.php?IdArticle=8667728 False Vulnerability,Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine NTLM Hash Exploit cible la Pologne et la Roumanie après le patch<br>NTLM Hash Exploit Targets Poland and Romania Days After Patch An NTLM hash disclosure spoofing vulnerability that leaks hashes with minimal user interaction has been observed being exploited in the wild]]> 2025-04-17T15:45:00+00:00 https://www.infosecurity-magazine.com/news/ntlm-hash-exploit-targets-poland/ www.secnews.physaphae.fr/article.php?IdArticle=8664113 False Vulnerability,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Microsoft contrecarre 4 milliards de dollars en tentatives de fraude<br>Microsoft Thwarts $4bn in Fraud Attempts Microsoft has blocked fraud worth $4bn as threat actors ramp up AI use]]> 2025-04-17T09:15:00+00:00 https://www.infosecurity-magazine.com/news/microsoft-thwarts-4bn-in-fraud/ www.secnews.physaphae.fr/article.php?IdArticle=8663976 False Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Hertz Data Breach expose les informations des clients dans l'attaque de Cleo Zero-Day<br>Hertz Data Breach Exposes Customer Information in Cleo Zero-Day Attack Hertz has confirmed a data breach exposing customer data after a zero-day attack targeting file transfer software from Cleo Communications]]> 2025-04-16T15:00:00+00:00 https://www.infosecurity-magazine.com/news/hertz-data-breach-exposes-customer/ www.secnews.physaphae.fr/article.php?IdArticle=8663591 False Data Breach,Vulnerability,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les pirates soutenus en Chine exploitent la porte dérobée de la briquette pour espionner les entreprises européennes<br>China-Backed Hackers Exploit BRICKSTORM Backdoor to Spy on European Businesses NVISO discovered new variants of the BRICKSTORM backdoor, initially designed for Linux, on Windows systems]]> 2025-04-16T14:00:00+00:00 https://www.infosecurity-magazine.com/news/china-hackers-brickstorm-backdoor/ www.secnews.physaphae.fr/article.php?IdArticle=8663559 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les pirates nord-coréens exploitent LinkedIn pour infecter les développeurs de cryptographie avec des infosteaux<br>North Korean Hackers Exploit LinkedIn to Infect Crypto Developers with Infostealers Posing as potential employers, Slow Pisces hackers conceal malware in coding challenges sent to cryptocurrency developers on LinkedIn]]> 2025-04-15T14:15:00+00:00 https://www.infosecurity-magazine.com/news/north-korea-hackers-linkedin/ www.secnews.physaphae.fr/article.php?IdArticle=8663119 False Malware,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Le trafic de bot dépasse l'activité humaine alors que les acteurs de la menace se tournent vers l'IA<br>Bot Traffic Overtakes Human Activity as Threat Actors Turn to AI Thales report reveals bots now account for 51% of all web traffic, surpassing human activity]]> 2025-04-15T10:30:00+00:00 https://www.infosecurity-magazine.com/news/bot-traffic-human-activity-threat/ www.secnews.physaphae.fr/article.php?IdArticle=8663040 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les hallucinations IA créent une menace de chaîne d'approvisionnement «slopsquatting»<br>AI Hallucinations Create “Slopsquatting” Supply Chain Threat Experts have warned that threat actors could hijack AI hallucinations in “slopsquatting” attacks]]> 2025-04-14T09:00:00+00:00 https://www.infosecurity-magazine.com/news/ai-hallucinations-slopsquatting/ www.secnews.physaphae.fr/article.php?IdArticle=8662603 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine WK Kellogg confirme la violation des données liée à l'exploit de logiciels CLEO<br>WK Kellogg Confirms Data Breach Tied to Cleo Software Exploit WK Kellogg breach exposed employee data after attackers exploited flaws in Cleo software]]> 2025-04-09T15:00:00+00:00 https://www.infosecurity-magazine.com/news/wk-kellogg-confirms-data-breach/ www.secnews.physaphae.fr/article.php?IdArticle=8661155 False Data Breach,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Microsoft corrige plus de 130 CVE en avril mardi<br>Microsoft Fixes Over 130 CVEs in April Patch Tuesday Microsoft has issued security updates to fix 130+ vulnerabilities this month, including one zero-day]]> 2025-04-09T09:45:00+00:00 https://www.infosecurity-magazine.com/news/microsoft-fixes-130-cves-april/ www.secnews.physaphae.fr/article.php?IdArticle=8661098 False Vulnerability,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine La moitié des entreprises calent des projets numériques au fur et à mesure que la cyber-guerre risque<br>Half of Firms Stall Digital Projects as Cyber Warfare Risk Surges Armis survey reveals that the growing threat of nation-state cyber-attacks is disrupting digital transformation]]> 2025-04-08T12:00:00+00:00 https://www.infosecurity-magazine.com/news/half-firms-stall-digital-projects/ www.secnews.physaphae.fr/article.php?IdArticle=8660925 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les cyber-agences avertissent les défenses du réseau de menace de flux rapide en contournant les défenses du réseau<br>Cyber Agencies Warn of Fast Flux Threat Bypassing Network Defenses A joint cybersecurity advisory warns organizations globally about the defense gap in detecting and blocking fast flux techniques, which are exploited for malicious activities]]> 2025-04-04T12:30:00+00:00 https://www.infosecurity-magazine.com/news/cyber-agencies-warn-of-fast-flux/ www.secnews.physaphae.fr/article.php?IdArticle=8660239 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Attaque de la chaîne d'approvisionnement des actions TJ-Action a été retracée à un seul compromis de jeton github<br>Tj-actions Supply Chain Attack Traced Back to Single GitHub Token Compromise The threat actors initially attempted to compromise projects associated with the Coinbase cryptocurrency exchange, said Palo Alto Networks]]> 2025-04-04T11:00:00+00:00 https://www.infosecurity-magazine.com/news/tj-actions-supply-chain-attack/ www.secnews.physaphae.fr/article.php?IdArticle=8660220 False Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Royal Mail enquête sur la violation des données affectant le fournisseur<br>Royal Mail Investigates Data Breach Affecting Supplier A cyber threat actor has claimed to have leaked 144GB of data from Royal Mail users]]> 2025-04-02T15:44:00+00:00 https://www.infosecurity-magazine.com/news/royal-mail-investigates-data/ www.secnews.physaphae.fr/article.php?IdArticle=8659867 False Data Breach,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Morphing meerkat phaas plateforme upoofs 100+ marques<br>Morphing Meerkat PhaaS Platform Spoofs 100+ Brands A PhaaS platform, dubbed \'Morphing Meerkat,\' uses DNS MX records to spoof over 100 brands and steal credentials, according to Infoblox Threat Intel]]> 2025-03-28T11:20:00+00:00 https://www.infosecurity-magazine.com/news/morphing-meerkat-phaas-platform/ www.secnews.physaphae.fr/article.php?IdArticle=8658846 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine NCA avertit des réseaux «com» ​​sadiques en ligne<br>NCA Warns of Sadistic Online “Com” Networks The UK\'s National Crime Agency is warning of a growing cyber and physical threat from homegrown teens]]> 2025-03-27T10:30:00+00:00 https://www.infosecurity-magazine.com/news/nca-warns-of-sadistic-online-com/ www.secnews.physaphae.fr/article.php?IdArticle=8658541 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les acteurs de la menace abusent de la confiance dans les plateformes de collaboration du cloud<br>Threat Actors Abuse Trust in Cloud Collaboration Platforms Threat actors are exploiting cloud platforms like Adobe and Dropbox to evade email gateways and steal credentials]]> 2025-03-26T14:15:00+00:00 https://www.infosecurity-magazine.com/news/threat-actors-abuse-cloud-platforms/ www.secnews.physaphae.fr/article.php?IdArticle=8658348 False Threat,Cloud None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Enisa sondage des menaces spatiales du paysage dans un nouveau rapport<br>ENISA Probes Space Threat Landscape in New Report EU security agency ENISA has released a new report outlining the threats and potential mitigations for the space sector]]> 2025-03-26T10:30:00+00:00 https://www.infosecurity-magazine.com/news/enisa-probes-space-threat/ www.secnews.physaphae.fr/article.php?IdArticle=8658296 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Des pirates de fourmis tisserands liés à la Chine exposés après une infiltration de télécommunications sur quatre ans<br>China-Linked Weaver Ant Hackers Exposed After Four-Year Telco Infiltration Sygnia has uncovered Weaver Ant, a Chinese threat actor that spied on telecommunications networks for years]]> 2025-03-25T12:45:00+00:00 https://www.infosecurity-magazine.com/news/china-weaver-ant-hackers-telco/ www.secnews.physaphae.fr/article.php?IdArticle=8658092 False Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les pirateurs de compte Google ciblent les victimes via des annonces Semrush<br>Google Account Hijackers Target Victims Via Semrush Ads Threat actors are looking to compromise Google accounts to further malvertising and data theft]]> 2025-03-24T09:30:00+00:00 https://www.infosecurity-magazine.com/news/google-hijackers-target-victims/ www.secnews.physaphae.fr/article.php?IdArticle=8657733 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les cybercriminels exploitent le point de contrôle du point de contrôle antivirus en campagne malveillante<br>Cybercriminals Exploit CheckPoint Antivirus Driver in Malicious Campaign A security researcher has observed threat actors exploiting vulnerabilities in a driver used by CheckPoint\'s ZoneAlarm antivirus to bypass Windows security measures]]> 2025-03-21T12:45:00+00:00 https://www.infosecurity-magazine.com/news/cybercriminals-exploit-checkpoint/ www.secnews.physaphae.fr/article.php?IdArticle=8657190 False Vulnerability,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Gartner avertit que l'agentique AI accélérera les prises de contrôle du compte<br>Gartner Warns Agentic AI Will Accelerate Account Takeovers Gartner has claimed that AI agents will reduce the time it takes to exploit exposed accounts]]> 2025-03-19T10:45:00+00:00 https://www.infosecurity-magazine.com/news/gartner-agentic-ai-accelerate/ www.secnews.physaphae.fr/article.php?IdArticle=8656658 False Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Europol met en garde contre «l'alliance Shadow» entre les États et les criminels<br>Europol Warns of “Shadow Alliance” Between States and Criminals Europol\'s annual report warns of a growing threat from aligned state and cybercrime groups, enabled by AI technologies]]> 2025-03-19T10:00:00+00:00 https://www.infosecurity-magazine.com/news/europol-warns-shadow-alliance/ www.secnews.physaphae.fr/article.php?IdArticle=8656648 False Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les chercheurs confirment Blacklock comme le changement de marque Eldorado<br>Researchers Confirm BlackLock as Eldorado Rebrand DarkAtlas researchers have uncovered a direct link between BlackLock and the Eldorado ransomware group, confirming a rebranded identity of the notorious threat actor]]> 2025-03-17T16:30:00+00:00 https://www.infosecurity-magazine.com/news/researchers-confirm-blacklock/ www.secnews.physaphae.fr/article.php?IdArticle=8656275 False Ransomware,Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les fraudeurs ont usuré les ransomwares de clope pour extorquer les entreprises<br>Fraudsters Impersonate Clop Ransomware to Extort Businesses Barracuda observed threat actors impersonating the Clop ransomware group via email to extort payments, claiming to have exfiltrated sensitive data]]> 2025-03-14T11:00:00+00:00 https://www.infosecurity-magazine.com/news/fraudsters-clop-ransomware-extort/ www.secnews.physaphae.fr/article.php?IdArticle=8655716 False Ransomware,Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les identités de la machine sont plus nombreuses que les humains augmentant le risque de sept fois<br>Machine Identities Outnumber Humans Increasing Risk Seven-Fold Surging machine identities, faster threat detection and fewer vulnerabilities are shaping cloud security according to a new report]]> 2025-03-12T14:30:00+00:00 https://www.infosecurity-magazine.com/news/machine-identities-outnumber/ www.secnews.physaphae.fr/article.php?IdArticle=8655310 False Vulnerability,Threat,Cloud None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Sim échangeant des surtensions de fraude au Moyen-Orient<br>SIM Swapping Fraud Surges in the Middle East SIM swapping fraud surges in the Middle East as cybercriminals exploit websites mimicking legitimate services to steal personal data]]> 2025-03-10T16:30:00+00:00 https://www.infosecurity-magazine.com/news/sim-swapping-fraud-surges-middle/ www.secnews.physaphae.fr/article.php?IdArticle=8654907 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine RECHERCHE DE L'IA UK sous la menace des pirates d'État-nation<br>UK AI Research Under Threat From Nation-State Hackers The Alan Turing institute urged government and academia to address systemic cultural and structural security barriers in UK AI research]]> 2025-03-10T12:30:00+00:00 https://www.infosecurity-magazine.com/news/uk-ai-research-nation-state/ www.secnews.physaphae.fr/article.php?IdArticle=8654865 False Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Le typhon de soie déplace des tactiques pour exploiter les solutions informatiques communes<br>Silk Typhoon Shifts Tactics to Exploit Common IT Solutions Chinese espionage group Silk Typhoon is increasingly exploiting common IT solutions to infiltrate networks and exfiltrate data]]> 2025-03-05T16:30:00+00:00 https://www.infosecurity-magazine.com/news/silk-typhoon-exploits-common/ www.secnews.physaphae.fr/article.php?IdArticle=8653901 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine VMware avertit les clients de corriger les vulnérabilités activement exploitées zéro-jours<br>VMware Warns Customers to Patch Actively Exploited Zero-Day Vulnerabilities Cloud software firm VMware has issued a critical security advisory, detailing three zero-day vulnerabilities being actively exploited in the wild]]> 2025-03-04T15:45:00+00:00 https://www.infosecurity-magazine.com/news/vmware-patch-exploited-zero-day/ www.secnews.physaphae.fr/article.php?IdArticle=8653451 False Vulnerability,Threat,Cloud None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine BYOVD ATTAQUES EXPLOITS ZERO-DAY dans Paragon Partition Manager<br>BYOVD Attacks Exploit Zero-Day in Paragon Partition Manager Threat actors are exploiting a zero-day bug in Paragon Partition Manager\'s BioNTdrv.sys driver during ransomware attacks]]> 2025-03-03T09:35:00+00:00 https://www.infosecurity-magazine.com/news/byovd-zero-day-paragon-partition/ www.secnews.physaphae.fr/article.php?IdArticle=8652921 False Ransomware,Vulnerability,Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Vieilles vulnérabilités parmi les plus exploitées<br>Old Vulnerabilities Among the Most Widely Exploited Four in ten flaws exploited by threat actors in 2024 were from 2020 or earlier, with some dating back to the 1990s, according to a GreyNoise report]]> 2025-02-28T11:00:00+00:00 https://www.infosecurity-magazine.com/news/old-vulnerabilities-widely/ www.secnews.physaphae.fr/article.php?IdArticle=8651928 False Vulnerability,Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Le cyber-espionnage chinois saute 150%, les trouvailles en crowdsstrike<br>Chinese Cyber Espionage Jumps 150%, CrowdStrike Finds In its 2025 Global Threat Report, CrowdStrike observed a significant escalation in Chinese cyber espionage activities]]> 2025-02-27T11:45:00+00:00 https://www.infosecurity-magazine.com/news/chinese-cyber-espionage-jumps-150/ www.secnews.physaphae.fr/article.php?IdArticle=8651584 False Threat None 4.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine 61% des pirates utilisent un nouveau code d'exploit dans les 48 heures suivant l'attaque<br>61% of Hackers Use New Exploit Code Within 48 Hours of Attack 61% of hackers use new exploit code within 48 hours, ransomware remains top threat in 2024]]> 2025-02-25T16:00:00+00:00 https://www.infosecurity-magazine.com/news/hackers-use-exploit-code-within-48/ www.secnews.physaphae.fr/article.php?IdArticle=8650892 False Ransomware,Threat None 4.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Salt Typhoon a exploité les appareils Cisco avec un outil personnalisé à espionner les télécommunications américaines<br>Salt Typhoon Exploited Cisco Devices With Custom Tool to Spy on US Telcos Chinese threat actor Salt Typhoon used JumbledPath, a custom-built utility, to gain access to a remote Cisco device, said the network provider]]> 2025-02-21T14:15:00+00:00 https://www.infosecurity-magazine.com/news/salt-typhoon-cisco-custom-tool/ www.secnews.physaphae.fr/article.php?IdArticle=8649607 False Tool,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine BlackBasta Ransomware Chatlogs Leaked Online 2025-02-21T11:15:00+00:00 https://www.infosecurity-magazine.com/news/blackbasta-ransomware-chatlogs/ www.secnews.physaphae.fr/article.php?IdArticle=8649556 False Ransomware,Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Microsoft\\'s Quantum Chip Breakthrough Accelerates Threat to Encryption Protocols Microsoft has developed the first ever quantum chip, shortening the timeframe for when quantum computers will break exiting encryption]]> 2025-02-21T09:30:00+00:00 https://www.infosecurity-magazine.com/news/microsoft-quantum-chip-encryption/ www.secnews.physaphae.fr/article.php?IdArticle=8649527 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Hackers Chain Exploits of Three Palo Alto Networks Firewall Flaws Palo Alto Networks has observed exploit attempts chaining three vulnerabilities in its PAN-OS firewall appliances]]> 2025-02-20T12:45:00+00:00 https://www.infosecurity-magazine.com/news/hackers-chain-exploits-three-palo/ www.secnews.physaphae.fr/article.php?IdArticle=8649229 False Vulnerability,Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine CISA and FBI Warn of Global Threat from Ghost Ransomware CISA and the FBI have released a joint advisory detailing the activity of China\'s Ghost ransomware]]> 2025-02-20T09:45:00+00:00 https://www.infosecurity-magazine.com/news/cisa-fbi-warn-global-threat-ghost/ www.secnews.physaphae.fr/article.php?IdArticle=8649177 False Ransomware,Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Spies Eye AUKUS Nuclear Submarine Secrets, Australia\\'s Intelligence Chief Warns The head of the Australian Security Intelligence Organisation gave his Annual Threat Assessment for the year ahead]]> 2025-02-19T13:30:00+00:00 https://www.infosecurity-magazine.com/news/spies-eye-aukus-nuclear-submarine/ www.secnews.physaphae.fr/article.php?IdArticle=8649002 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Proofpoint Uncovers FrigidStealer, A New MacOS Infostealer Proofpoint also identified two new threat actors operating components of web inject campaigns, TA2726 and TA2727]]> 2025-02-18T12:00:00+00:00 https://www.infosecurity-magazine.com/news/proofpoint-frigidstealer-new-mac/ www.secnews.physaphae.fr/article.php?IdArticle=8648845 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Zacks Investment Research Breach Hits 12 Million A threat actor claims to have hacked and published data on 12 million Zacks Investment Research accounts]]> 2025-02-18T10:00:00+00:00 https://www.infosecurity-magazine.com/news/zacks-investment-research-breach/ www.secnews.physaphae.fr/article.php?IdArticle=8648828 False Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Apple Mitigates “Extremely Sophisticated” Zero-Day Exploit Apple has patched a zero-day vulnerability being exploited in targeted attacks]]> 2025-02-11T10:30:00+00:00 https://www.infosecurity-magazine.com/news/apple-update-extremely/ www.secnews.physaphae.fr/article.php?IdArticle=8648021 False Vulnerability,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Europol Warns Financial Sector of “Imminent” Quantum Threat Europol has urged the financial sector to prioritize quantum-safe cryptography]]> 2025-02-10T09:45:00+00:00 https://www.infosecurity-magazine.com/news/europol-warns-financial-sector/ www.secnews.physaphae.fr/article.php?IdArticle=8647817 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Malicious AI Models on Hugging Face Exploit Novel Attack Technique The technique, called nullifAI, allows the models to bypass Hugging Face\'s protective measures against malicious AI models]]> 2025-02-07T14:00:00+00:00 https://www.infosecurity-magazine.com/news/malicious-ai-models-hugging-face/ www.secnews.physaphae.fr/article.php?IdArticle=8647428 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Threat Actors Target Public-Facing Apps for Initial Access Cisco Talos found that exploitation of public-facing applications made up 40% of incidents it observed in Q4 2024, marking a notable shift in initial access techniques]]> 2025-01-31T14:30:00+00:00 https://www.infosecurity-magazine.com/news/threat-actors-public-apps-initial/ www.secnews.physaphae.fr/article.php?IdArticle=8645285 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Threat Actors Exploit Government Websites for Phishing Cybercriminals exploit government websites using open redirects and phishing tactics, bypassing secure email gateway protections]]> 2025-01-29T14:00:00+00:00 https://www.infosecurity-magazine.com/news/threat-actors-exploit-gov-websites/ www.secnews.physaphae.fr/article.php?IdArticle=8644315 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Breakout Time Accelerates 22% as Cyber-Attacks Speed Up ReliaQuest warns threat actor innovation and infostealer activity helped to accelerate breakout time by 22% in 2024]]> 2025-01-29T10:30:00+00:00 https://www.infosecurity-magazine.com/news/breakout-time-accelerates-22/ www.secnews.physaphae.fr/article.php?IdArticle=8644268 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine ENGlobal Cyber-Attack Exposes Sensitive Data Energy contractor ENGlobal reported that sensitive personal data was stolen by threat actors, with the incident disrupting operations for six weeks]]> 2025-01-28T17:00:00+00:00 https://www.infosecurity-magazine.com/news/englobal-attack-sensitive-data/ www.secnews.physaphae.fr/article.php?IdArticle=8643897 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine SaaS Breaches Skyrocket 300% as Traditional Defenses Fall Short Obsidian found that threat actors are focusing on SaaS applications to steal sensitive data, with most organizations\' security measures not set up to deal with these attacks]]> 2025-01-27T14:00:00+00:00 https://www.infosecurity-magazine.com/news/saas-breaches-defenses-short/ www.secnews.physaphae.fr/article.php?IdArticle=8643336 False Threat,Cloud None 4.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Subaru Bug Enabled Remote Vehicle Tracking and Hijacking A now-patched vulnerability could have enabled threat actors to remotely control Subaru cars]]> 2025-01-27T11:00:00+00:00 https://www.infosecurity-magazine.com/news/subaru-bug-remote-vehicle-tracking/ www.secnews.physaphae.fr/article.php?IdArticle=8643259 False Vulnerability,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Russian Scammers Target Crypto Influencers with Infostealers Crazy Evil, a group of crypto scammers, exploit NFTs and cryptocurrencies with malware targeting influencers and tech professionals]]> 2025-01-24T12:15:00+00:00 https://www.infosecurity-magazine.com/news/crazy-evil-crypto-scam-influencers/ www.secnews.physaphae.fr/article.php?IdArticle=8642040 False Malware,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Chained Vulnerabilities Exploited in Ivanti Cloud Service Appliances Threat actors chained Ivanti CSA vulnerabilities for RCE, credential theft & webshell deployment]]> 2025-01-23T16:30:00+00:00 https://www.infosecurity-magazine.com/news/cisa-fbi-warn-chained-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8641656 False Vulnerability,Threat,Cloud None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Tycoon 2FA Phishing Kit Upgraded to Bypass Security Measures Threat researchers analyzed the updated Tycoon 2FA phishing kit, which bypasses MFA]]> 2025-01-22T15:45:00+00:00 https://www.infosecurity-magazine.com/news/tycoon-2fa-phishing-kit-upgraded/ www.secnews.physaphae.fr/article.php?IdArticle=8641171 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine New Mirai Malware Variant Targets AVTECH Cameras, Huawei Routers Murdoc_Botnet used Mirai malware to exploit IoT vulnerabilities, targeting devices globally]]> 2025-01-21T17:00:00+00:00 https://www.infosecurity-magazine.com/news/mirai-variant-targets-cameras/ www.secnews.physaphae.fr/article.php?IdArticle=8640694 False Malware,Vulnerability,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Middle Eastern Real Estate Fraud Grows with Online Listings Middle East real estate scams are surging as fraudsters exploit online listings and bypassed due diligence checks]]> 2025-01-16T17:45:00+00:00 https://www.infosecurity-magazine.com/news/middle-east-real-estate-fraud-grows/ www.secnews.physaphae.fr/article.php?IdArticle=8638393 False Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine New Hacking Group Leaks Configuration of 15,000 Fortinet Firewalls The leak likely comes from a zero-day exploit affecting Fortinet\'s products]]> 2025-01-16T12:50:00+00:00 https://www.infosecurity-magazine.com/news/hacking-group-leaks-config-15k/ www.secnews.physaphae.fr/article.php?IdArticle=8638262 False Vulnerability,Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine EU To Launch New Support Centre by 2026 to Boost Healthcare Cybersecurity A new EU action plan will be structured around four pillars: prevention, threat detection and identification, response to cyber-attacks and deterrence]]> 2025-01-16T08:30:00+00:00 https://www.infosecurity-magazine.com/news/eu-centre-defend-hospitals/ www.secnews.physaphae.fr/article.php?IdArticle=8638156 False Threat,Medical None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Illicit Crypto-Inflows Set to Top $51bn in a Year Chainalysis estimates threat actors made at least $51bn through crypto crime in 2024]]> 2025-01-15T13:00:00+00:00 https://www.infosecurity-magazine.com/news/illicit-cryptoinflows-top-51bn-year/ www.secnews.physaphae.fr/article.php?IdArticle=8637706 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Fortinet Confirms Critical Zero-Day Vulnerability in Firewalls The security provider published mitigation measures to prevent exploitation]]> 2025-01-15T12:00:00+00:00 https://www.infosecurity-magazine.com/news/fortinet-confirms-critical-zero-day/ www.secnews.physaphae.fr/article.php?IdArticle=8637679 False Vulnerability,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Secureworks Exposes North Korean Links to Fraudulent Crowdfunding Secureworks Counter Threat Unit (CTU) has identified links between North Korean IT workers and fraudulent crowdfunding activities, with the group known as Nickle Tapestry orchestrating scams to support North Korean interests]]> 2025-01-15T11:20:00+00:00 https://www.infosecurity-magazine.com/news/north-korean-links-fraudulent/ www.secnews.physaphae.fr/article.php?IdArticle=8637680 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine UK Registry Nominet Breached Via Ivanti Zero-Day The .uk registry Nominet has been breached by a recently disclosed zero-day vulnerability in Ivanti products]]> 2025-01-14T09:45:00+00:00 https://www.infosecurity-magazine.com/news/uk-registry-nominet-breached/ www.secnews.physaphae.fr/article.php?IdArticle=8637072 False Vulnerability,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Fake PoC Exploit Targets Security Researchers with Infostealer Trend Micro detailed how attackers are using a fake proof-of-concept for a critical Microsoft vulnerability, designed to steal sensitive data from security researchers]]> 2025-01-10T09:15:00+00:00 https://www.infosecurity-magazine.com/news/fake-poc-exploit-researchers/ www.secnews.physaphae.fr/article.php?IdArticle=8635572 False Vulnerability,Threat,Prediction None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Critical Ivanti Zero-Day Exploited in the Wild Ivanti customers are urged to patch two new bugs in the security vendor\'s products, one of which is being actively exploited]]> 2025-01-09T09:45:00+00:00 https://www.infosecurity-magazine.com/news/critical-ivanti-zeroday-exploited/ www.secnews.physaphae.fr/article.php?IdArticle=8635225 False Vulnerability,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Scammers Exploit Microsoft 365 to Target PayPal Users A new PayPal phishing scam used genuine money requests, bypassing security checks to deceive recipients]]> 2025-01-08T14:00:00+00:00 https://www.infosecurity-magazine.com/news/scammers-exploit-microsoft365/ www.secnews.physaphae.fr/article.php?IdArticle=8634906 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine New Infostealer Campaign Uses Discord Videogame Lure Threat actors are tricking victims into downloading malware with the promise of testing a new videogame]]> 2025-01-06T11:10:00+00:00 https://www.infosecurity-magazine.com/news/infostealer-campaign-discord/ www.secnews.physaphae.fr/article.php?IdArticle=8634096 False Malware,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Scammers Drain $500m from Crypto Wallets in a Year Scam Sniffer claims that threat actors used wallet drainers to steal $494m from victims in 2024]]> 2025-01-06T10:00:00+00:00 https://www.infosecurity-magazine.com/news/scammers-drain-500m-crypto-wallets/ www.secnews.physaphae.fr/article.php?IdArticle=8634054 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Vulnerability Exploit Assessment Tool EPSS Exposed to Adversarial Attack A Morphisec researcher showed how an attacker could manipulate FIRST\'s Exploit Prediction Scoring System (EPSS) using AI]]> 2024-12-19T10:30:00+00:00 https://www.infosecurity-magazine.com/news/epss-exposed-to-adversarial-attack/ www.secnews.physaphae.fr/article.php?IdArticle=8627462 False Tool,Vulnerability,Threat,Prediction None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine New Attacks Exploit VSCode Extensions and npm Packages Malicious campaigns targeting VSCode extensions have recently expanding to npm, risking software supply chains]]> 2024-12-18T14:00:00+00:00 https://www.infosecurity-magazine.com/news/threat-actors-exploit-vscode/ www.secnews.physaphae.fr/article.php?IdArticle=8627070 False Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Cybercriminals Exploit Google Calendar to Spread Malicious Links Check Point research reveals cybercriminals are using Google Calendar and Drawings to send malicious links, bypassing traditional email security]]> 2024-12-17T15:45:00+00:00 https://www.infosecurity-magazine.com/news/cybercriminals-exploit-google/ www.secnews.physaphae.fr/article.php?IdArticle=8626624 False Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Secret Blizzard Targets Ukrainian Military with Custom Malware Microsoft detailed how Russian espionage group Secret Blizzard is leveraging infrastructure of other threat actors to target the Ukrainian military with custom malware]]> 2024-12-11T17:00:00+00:00 https://www.infosecurity-magazine.com/news/secret-blizzard-ukrainian-military/ www.secnews.physaphae.fr/article.php?IdArticle=8623550 False Malware,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Microsoft Fixes 71 CVEs Including Actively Exploited Zero-Day Microsoft has patched dozens of vulnerabilities in December, including one zero-day being exploited in the wild]]> 2024-12-11T10:15:00+00:00 https://www.infosecurity-magazine.com/news/microsoft-71-cves-actively/ www.secnews.physaphae.fr/article.php?IdArticle=8623375 False Vulnerability,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Zero Day in Cleo File Transfer Software Exploited En Masse A zero-day vulnerability in Cleo file transfer software is being exploited in data theft attacks]]> 2024-12-11T09:30:00+00:00 https://www.infosecurity-magazine.com/news/zero-day-cleo-file-transfer/ www.secnews.physaphae.fr/article.php?IdArticle=8623344 False Vulnerability,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Hackers Exploit AWS Misconfigurations in Massive Data Breach Hackers exploited AWS misconfigurations, leaking 2TB of sensitive data, including customer information, credentials and proprietary source code]]> 2024-12-10T16:30:00+00:00 https://www.infosecurity-magazine.com/news/hackers-exploit-aws/ www.secnews.physaphae.fr/article.php?IdArticle=8622951 False Data Breach,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Compromised AI Library Delivers Cryptocurrency Miner via PyPI The compromised ultralytics AI library delivered XMRig miner via GitHub Actions exploit]]> 2024-12-09T16:30:00+00:00 https://www.infosecurity-magazine.com/news/ai-library-delivers-cryptocurrency/ www.secnews.physaphae.fr/article.php?IdArticle=8622367 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Unmasking Termite, the Ransomware Gang Claiming the Blue Yonder Attack This new ransomware group is likely a new variant of Babuk, said Cyble threat intelligence analysts]]> 2024-12-09T12:35:00+00:00 https://www.infosecurity-magazine.com/news/termite-ransomware-blue-yonder/ www.secnews.physaphae.fr/article.php?IdArticle=8622241 False Ransomware,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Russian Hackers Exploit Rival Attackers\\' Infrastructure for Espionage Microsoft has found that Russian APT Secret Blizzard piggybacks on other cybercriminals\' infr4asytructure to conduct cyber espionage]]> 2024-12-05T11:45:00+00:00 https://www.infosecurity-magazine.com/news/russia-hackers-exploit-rival/ www.secnews.physaphae.fr/article.php?IdArticle=8620020 False Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Chinese LIDAR Dominance a Cybersecurity Threat, Warns Think Tank The Foundation for Defense of Democracies has warned that Chinese-made LIDAR sensors could be weaponized for espionage]]> 2024-12-03T09:45:00+00:00 https://www.infosecurity-magazine.com/news/chinese-lidar-dominance/ www.secnews.physaphae.fr/article.php?IdArticle=8618923 False Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Malicious Actors Exploit ProjectSend Critical Vulnerability This vulnerability was patched in May 2024 but was only allocated a CVE in November after evidence of exploitation]]> 2024-11-28T13:00:00+00:00 https://www.infosecurity-magazine.com/news/exploit-projectsend-critical/ www.secnews.physaphae.fr/article.php?IdArticle=8618150 False Vulnerability,Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Russian RomCom APT Group Leverages Zero-Day Flaws in Firefox and Windows Russia-backed hackers, known as RomCom, have exploited critical zero-day vulnerabilities in Mozilla Firefox and Windows to launch targeted attacks]]> 2024-11-27T11:00:00+00:00 https://www.infosecurity-magazine.com/news/romcom-apt-zeroday-flaws-firefox/ www.secnews.physaphae.fr/article.php?IdArticle=8617997 False Vulnerability,Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Aggressive Chinese APT Group Targets Governments with New Backdoors A Trend Micro analysis of Earth Estries found that the Chinese threat actor is using new backdoors to avoid detection during espionage operations]]> 2024-11-26T13:00:00+00:00 https://www.infosecurity-magazine.com/news/chinese-apt-governments-backdoors/ www.secnews.physaphae.fr/article.php?IdArticle=8617871 False Threat,Prediction None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Google Deindexes Chinese Propaganda Network Google\'s threat intelligence team uncovered four Chinese PR firms operating networks of inauthentic news sites]]> 2024-11-25T12:30:00+00:00 https://www.infosecurity-magazine.com/news/google-deindexes-chinese/ www.secnews.physaphae.fr/article.php?IdArticle=8617553 False Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Five Ransomware Groups Responsible for 40% of Cyber-Attacks in 2024 Corvus Insurance highlighted the growing complexity and competition within the ransomware ecosystem, with the threat level remaining elevated]]> 2024-11-22T10:45:00+00:00 https://www.infosecurity-magazine.com/news/five-ransomware-groups-40-of/ www.secnews.physaphae.fr/article.php?IdArticle=8615960 False Ransomware,Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Lumma Stealer Proliferation Fueled by Telegram Activity Spreading malware via Telegram channels allows threat actors to bypass traditional detection mechanisms and reach a broad, unsuspecting audience]]> 2024-11-21T11:30:00+00:00 https://www.infosecurity-magazine.com/news/lumma-stealer-proliferation-fueled/ www.secnews.physaphae.fr/article.php?IdArticle=8615366 False Malware,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Hackers Hijack Jupyter Servers for Sport Stream Ripping Aqua Security has observed threat actors using compromised Jupyter servers in a bid to illegally stream sporting events]]> 2024-11-20T10:15:00+00:00 https://www.infosecurity-magazine.com/news/hijack-jupyter-servers-sport/ www.secnews.physaphae.fr/article.php?IdArticle=8614663 False Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Cybercriminals Exploit Weekend Lull to Launch Ransomware Attacks Ransomware groups are targeting weekends and holidays to exploit understaffed security teams in order to get the best chance of a pay day]]> 2024-11-20T08:45:00+00:00 https://www.infosecurity-magazine.com/news/cybercriminals-exploit-weekend/ www.secnews.physaphae.fr/article.php?IdArticle=8614589 False Ransomware,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Ransomware Gangs on Recruitment Drive for Pen Testers Ransomware groups are recruiting pen testers from the dark web to expand their operations, as revealed by Cato Network\'s Q3 2024 SASE Threat Report]]> 2024-11-19T13:35:00+00:00 https://www.infosecurity-magazine.com/news/ransomware-gangs-pen-testers/ www.secnews.physaphae.fr/article.php?IdArticle=8614092 False Ransomware,Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Palo Alto Networks Confirms New Zero-Day Being Exploited by Threat Actors The security provider has elevated its warning about a vulnerability affecting firewall management interfaces after observing active exploitation]]> 2024-11-15T15:30:00+00:00 https://www.infosecurity-magazine.com/news/palo-alto-confirms-new-0day/ www.secnews.physaphae.fr/article.php?IdArticle=8611788 False Vulnerability,Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine watchTowr Finds New Zero-Day Vulnerability in Fortinet Products The new vulnerability was named “FortiJump Higher” due to its similarity with the “FortiJump” vulnerability discovered in October]]> 2024-11-15T12:15:00+00:00 https://www.infosecurity-magazine.com/news/watchtowr-new-vulnerability/ www.secnews.physaphae.fr/article.php?IdArticle=8611700 False Vulnerability,Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine AI Threat to Escalate in 2025, Google Cloud Warns 2025 could see our biggest AI fears materialize, according to a Google Cloud forecast report]]> 2024-11-13T17:00:00+00:00 https://www.infosecurity-magazine.com/news/ai-threat-escalate-in-2025-google/ www.secnews.physaphae.fr/article.php?IdArticle=8610492 False Threat,Cloud None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Microsoft Fixes Four More Zero-Days in November Patch Tuesday Microsoft has addressed four zero-day vulnerabilities this month, two of which have been exploited]]> 2024-11-13T09:30:00+00:00 https://www.infosecurity-magazine.com/news/microsoft-four-zerodays-november/ www.secnews.physaphae.fr/article.php?IdArticle=8610300 False Vulnerability,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine New Citrix Zero-Day Vulnerability Allows Remote Code Execution watchTowr has found a flaw in Citrix\'s Session Recording Manager that can be exploited to enable unauthenticated RCE against Citrix Virtual Apps and Desktops]]> 2024-11-12T14:00:00+00:00 https://www.infosecurity-magazine.com/news/new-citrix-zeroday-vulnerability/ www.secnews.physaphae.fr/article.php?IdArticle=8609813 False Vulnerability,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine NCSC publie des conseils pour lutter contre la menace de malvertisation<br>NCSC Publishes Tips to Tackle Malvertising Threat The UK\'s National Cyber Security Centre has released malvertising guidance for brands and their ad partners]]> 2024-11-07T10:30:00+00:00 https://www.infosecurity-magazine.com/news/ncsc-publishes-tips-tackle/ www.secnews.physaphae.fr/article.php?IdArticle=8607487 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les cybercriminels exploitent les API documentaires pour envoyer de fausses factures<br>Cybercriminals Exploit DocuSign APIs to Send Fake Invoices Cybercriminals are exploiting DocuSign APIs to send fake invoices, bypassing security filters and mimicking well-known brands]]> 2024-11-04T16:30:00+00:00 https://www.infosecurity-magazine.com/news/cybercriminals-exploit-docusign/ www.secnews.physaphae.fr/article.php?IdArticle=8606032 False Threat None 3.0000000000000000