www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2025-05-10T16:37:40+00:00 www.secnews.physaphae.fr InfoSecurity Mag - InfoSecurity Magazine Le trafic de bot dépasse l'activité humaine alors que les acteurs de la menace se tournent vers l'IA<br>Bot Traffic Overtakes Human Activity as Threat Actors Turn to AI Thales report reveals bots now account for 51% of all web traffic, surpassing human activity]]> 2025-04-15T10:30:00+00:00 https://www.infosecurity-magazine.com/news/bot-traffic-human-activity-threat/ www.secnews.physaphae.fr/article.php?IdArticle=8663040 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les organisations ne abordent que 21% des vulnérabilités liées au Genai<br>Organizations Found to Address Only 21% of GenAI-Related Vulnerabilities Pentesting firm Cobalt has found that organizations fix less than half of exploited vulnerabilities, with just 21% of generative AI flaws addressed]]> 2025-04-15T10:15:00+00:00 https://www.infosecurity-magazine.com/news/organizations-fix-half/ www.secnews.physaphae.fr/article.php?IdArticle=8663041 False Vulnerability None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Mastermind de phishing de Labhost condamné à 8,5 ans<br>LabHost Phishing Mastermind Sentenced to 8.5 Years A UK man has been sentenced to over eight years for masterminding £100m phishing platform LabHost]]> 2025-04-15T09:30:00+00:00 https://www.infosecurity-magazine.com/news/labhost-phishing-mastermind/ www.secnews.physaphae.fr/article.php?IdArticle=8663022 False None None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Major WordPress Plugin Flaw exploité en moins de 4 heures<br>Major WordPress Plugin Flaw Exploited in Under 4 Hours Flaw in SureTriggers plugin allows unauthenticated users to create admin accounts on WordPress sites]]> 2025-04-14T15:00:00+00:00 https://www.infosecurity-magazine.com/news/wordpress-plugin-flaw-exploited-4/ www.secnews.physaphae.fr/article.php?IdArticle=8662728 False None None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Prodaft propose un accord "sans jugement" pour acheter des comptes Web sombres auprès des utilisateurs du Forum Cybercrime<br>Prodaft Offers "No Judgment" Deal to Buy Dark Web Accounts from Cybercrime Forum Users Through the SYS Initiative, Prodaft is offering a secure, anonymous channel for individuals to share information about ongoing cybercrime activities]]> 2025-04-14T13:43:00+00:00 https://www.infosecurity-magazine.com/news/prodaft-buy-dark-web-cybercrime/ www.secnews.physaphae.fr/article.php?IdArticle=8662705 False None None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Nouveau malware Resolverrat cible les secteurs des soins de santé et de la pharmacie<br>New Malware ResolverRAT Targets Healthcare and Pharma Sectors ResolverRAT targets healthcare organizations using advanced evasion techniques and social engineering]]> 2025-04-14T13:00:00+00:00 https://www.infosecurity-magazine.com/news/malware-resolverrat-targets/ www.secnews.physaphae.fr/article.php?IdArticle=8662676 False Malware,Medical None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les États-Unis bloquent les gouvernements étrangers de l'acquisition de données citoyennes<br>US Blocks Foreign Governments from Acquiring Citizen Data The US government has implemented a program that applies export controls on data transactions to certain countries of concern, including China and Russia]]> 2025-04-14T11:30:00+00:00 https://www.infosecurity-magazine.com/news/us-foreign-governments-acquiring/ www.secnews.physaphae.fr/article.php?IdArticle=8662660 False None None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine La durée de vie du certificat numérique est tombée à 47 jours d'ici 2029<br>Digital Certificate Lifespans to Fall to 47 Days by 2029 CA/Browser Forum members have voted in favor of shortening TLS/SSL certificate lifespans to 47 days]]> 2025-04-14T09:45:00+00:00 https://www.infosecurity-magazine.com/news/digital-certificate-lifespans-fall/ www.secnews.physaphae.fr/article.php?IdArticle=8662640 False None None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les hallucinations IA créent une menace de chaîne d'approvisionnement «slopsquatting»<br>AI Hallucinations Create “Slopsquatting” Supply Chain Threat Experts have warned that threat actors could hijack AI hallucinations in “slopsquatting” attacks]]> 2025-04-14T09:00:00+00:00 https://www.infosecurity-magazine.com/news/ai-hallucinations-slopsquatting/ www.secnews.physaphae.fr/article.php?IdArticle=8662603 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine NVD réorganise les opérations au fur et à mesure que le rapport de vulnérabilité augmente<br>NVD Revamps Operations as Vulnerability Reporting Surges The NVD program manager has announced undergoing process improvements to catch up with its growing vulnerability backlog]]> 2025-04-11T15:05:00+00:00 https://www.infosecurity-magazine.com/news/nvd-revamps-operations-cve-surge/ www.secnews.physaphae.fr/article.php?IdArticle=8661769 False Vulnerability None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Google Cloud: les 5 principales priorités pour les leaders de la cybersécurité aujourd'hui<br>Google Cloud: Top 5 Priorities for Cybersecurity Leaders Today Experts at the Google Cloud Next event set out how security teams need to adapt their focuses in the wake of trends such as rising cyber-attacks and advances in AI]]> 2025-04-11T11:05:00+00:00 https://www.infosecurity-magazine.com/news/top-5-priorities-for-cybersecurity/ www.secnews.physaphae.fr/article.php?IdArticle=8661678 False Cloud None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Cyble exhorte les correctifs de vulnérabilité critique affectant les systèmes industriels<br>Cyble Urges Critical Vulnerability Fixes Affecting Industrial Systems Rockwell Automation, Hitachi Energy and Inaba Denki Sangyo have products affected by critical vulnerabilities carrying severity ratings as high as 9.9]]> 2025-04-11T08:00:00+00:00 https://www.infosecurity-magazine.com/news/cyble-urges-critical-vulnerability/ www.secnews.physaphae.fr/article.php?IdArticle=8661629 False Vulnerability,Industrial None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Google Cloud: la Chine atteint le statut de «cyber-superpuissance»<br>Google Cloud: China Achieves “Cyber Superpower” Status Google Cloud\'s Sandra Joyce said that Chinese state actors\' advanced techniques and ability to stay undetected pose huge challenges]]> 2025-04-10T15:15:00+00:00 https://www.infosecurity-magazine.com/news/google-cloud-china-cyber/ www.secnews.physaphae.fr/article.php?IdArticle=8661425 False Cloud None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Google Cloud: les CISOS demandent des outils de sécurité simplifiés dans un contexte de complexité technologique croissante<br>Google Cloud: CISOs Demand Simplified Security Tools Amid Growing Tech Complexity Google Cloud announced a number of security products designed to reduce complexity for security leaders]]> 2025-04-10T14:30:00+00:00 https://www.infosecurity-magazine.com/news/google-cloud-cisos-demand/ www.secnews.physaphae.fr/article.php?IdArticle=8661409 False Tool,Cloud None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Plus de 40% des entreprises britanniques ont été confrontées à des violations de cybersécurité en 2024<br>Over 40% of UK Businesses Faced Cybersecurity Breaches in 2024 The Cyber Security Breaches Survey 2025 has been released by the UK Home Office and DSIT today, reporting a slight decline in incidents compared to 2024 report]]> 2025-04-10T13:45:00+00:00 https://www.infosecurity-magazine.com/news/40-uk-businesses-face-breaches/ www.secnews.physaphae.fr/article.php?IdArticle=8661394 False None None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Spynote malware cible les utilisateurs d'Android avec de fausses pages de lecture Google<br>SpyNote Malware Targets Android Users with Fake Google Play Pages A new Android malware campaign uses fake Google Play pages to distribute the SpyNote Trojan]]> 2025-04-10T13:00:00+00:00 https://www.infosecurity-magazine.com/news/spynote-malware-targets-android/ www.secnews.physaphae.fr/article.php?IdArticle=8661375 False Malware,Mobile None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Akirabot propulsé par l'AI échappe au captcha pour spam 80 000 sites Web<br>AI-Powered AkiraBot Evades CAPTCHA to Spam 80,000 Websites A new AI-powered framework dubbed “AkiraBot” has successfully spammed 80,000 websites since September 2024]]> 2025-04-10T09:15:00+00:00 https://www.infosecurity-magazine.com/news/aipowered-akirabot-captcha-spam/ www.secnews.physaphae.fr/article.php?IdArticle=8661337 False Spam None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Opération Endgame se poursuit avec les arrestations de clients SmokeLoader<br>Operation Endgame Continues with Smokeloader Customer Arrests Police have made more arrests in the ongoing Operation Endgame, cracking down on malware customers]]> 2025-04-10T08:30:00+00:00 https://www.infosecurity-magazine.com/news/operation-endgame-smokeloader/ www.secnews.physaphae.fr/article.php?IdArticle=8661326 False Malware,Legislation None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine WK Kellogg confirme la violation des données liée à l'exploit de logiciels CLEO<br>WK Kellogg Confirms Data Breach Tied to Cleo Software Exploit WK Kellogg breach exposed employee data after attackers exploited flaws in Cleo software]]> 2025-04-09T15:00:00+00:00 https://www.infosecurity-magazine.com/news/wk-kellogg-confirms-data-breach/ www.secnews.physaphae.fr/article.php?IdArticle=8661155 False Data Breach,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Le phishing validé par précision élève les risques de vol d'identification<br>Precision-Validated Phishing Elevates Credential Theft Risks New phishing method targets high-value accounts using real-time email validation]]> 2025-04-09T14:00:00+00:00 https://www.infosecurity-magazine.com/news/precision-validated-phishing/ www.secnews.physaphae.fr/article.php?IdArticle=8661156 False None None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les attaques de ransomwares atteignent un niveau record alors que les gains diminuent<br>Ransomware Attacks Hit All-Time High as Payoffs Dwindle While ransomware attack claims are at an all-time high, financial losses from actual attacks may be reducing]]> 2025-04-09T13:00:00+00:00 https://www.infosecurity-magazine.com/news/ransomware-attacks-record-payoffs/ www.secnews.physaphae.fr/article.php?IdArticle=8661139 False Ransomware None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les trois quarts des dirigeants informatiques craignent les cyber-menaces de l'IA de l'État-nation<br>Three-Quarters of IT Leaders Fear Nation-State AI Cyber Threats 73% of respondents in an Armis survey said they worried about nation-state actors using AI for cyber-attacks]]> 2025-04-09T10:45:00+00:00 https://www.infosecurity-magazine.com/news/it-leaders-fear-nation-state-ai/ www.secnews.physaphae.fr/article.php?IdArticle=8661107 False None None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Microsoft corrige plus de 130 CVE en avril mardi<br>Microsoft Fixes Over 130 CVEs in April Patch Tuesday Microsoft has issued security updates to fix 130+ vulnerabilities this month, including one zero-day]]> 2025-04-09T09:45:00+00:00 https://www.infosecurity-magazine.com/news/microsoft-fixes-130-cves-april/ www.secnews.physaphae.fr/article.php?IdArticle=8661098 False Vulnerability,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine NCSC met en garde contre les logiciels espions ciblant la diaspora chinoise et taïwanaise<br>NCSC Warns of Spyware Targeting Chinese and Taiwanese Diaspora The UK and allies have warned of new mobile spyware targeting Uyghur, Tibetan and Taiwanese communities]]> 2025-04-09T09:00:00+00:00 https://www.infosecurity-magazine.com/news/ncsc-spyware-chinese-taiwanese/ www.secnews.physaphae.fr/article.php?IdArticle=8661089 False Mobile None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Google publie une mise à jour Android avril pour aborder deux jours zéro<br>Google Releases April Android Update to Address Two Zero-Days Google\'s latest Android update fixes 62 flaws, including two zero-days previously used in limited targeted attacks]]> 2025-04-08T15:45:00+00:00 https://www.infosecurity-magazine.com/news/android-update-address-two-zero/ www.secnews.physaphae.fr/article.php?IdArticle=8660971 False Mobile None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine NIST déprime les CVE avant le 2018 pour s'attaquer à un arriéré de vulnérabilité croissante<br>NIST Defers Pre-2018 CVEs to Tackle Growing Vulnerability Backlog NIST marks CVEs pre-2018 as “Deferred” in the NVD as agency focus shifts to managing emerging threats]]> 2025-04-08T15:00:00+00:00 https://www.infosecurity-magazine.com/news/nist-defers-pre-2018-cves/ www.secnews.physaphae.fr/article.php?IdArticle=8660954 False Vulnerability None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine La moitié des entreprises calent des projets numériques au fur et à mesure que la cyber-guerre risque<br>Half of Firms Stall Digital Projects as Cyber Warfare Risk Surges Armis survey reveals that the growing threat of nation-state cyber-attacks is disrupting digital transformation]]> 2025-04-08T12:00:00+00:00 https://www.infosecurity-magazine.com/news/half-firms-stall-digital-projects/ www.secnews.physaphae.fr/article.php?IdArticle=8660925 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine CISA avertit l'exploitation de la vulnérabilité de Crushftp dans la nature<br>CISA Warns of CrushFTP Vulnerability Exploitation in the Wild The US Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2025-31161 to its Known Exploited Vulnerabilities (KEV) catalog]]> 2025-04-08T11:20:00+00:00 https://www.infosecurity-magazine.com/news/crushftp-vulnerability-cisa-kev/ www.secnews.physaphae.fr/article.php?IdArticle=8660926 False Vulnerability None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les conseils ont demandé à suivre un nouveau cyber-code de pratique<br>Boards Urged to Follow New Cyber Code of Practice The British government has launched a new code of practice designed to boost corporate cyber governance]]> 2025-04-08T09:15:00+00:00 https://www.infosecurity-magazine.com/news/bords-urged-follow-new-cyber-code/ www.secnews.physaphae.fr/article.php?IdArticle=8660908 False None None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine MALICIEUX Microsoft vs Extensions de code utilisées dans la campagne de cryptojacking<br>Malicious Microsoft VS Code Extensions Used in Cryptojacking Campaign Security researchers from ExtensionTotal have found nine malicious extensions in Visual Studio Code, Microsoft\'s lightweight source-code editor]]> 2025-04-07T15:01:00+00:00 https://www.infosecurity-magazine.com/news/microsoft-vs-code-cryptojacking/ www.secnews.physaphae.fr/article.php?IdArticle=8660751 False None None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Smishing Triad Fuels Forge in Toll Payment Scams aux États-Unis, Royaume-Uni<br>Smishing Triad Fuels Surge in Toll Payment Scams in US, UK A rise in smishing campaigns impersonating toll service providers has been linked to China\'s Smishing Triad]]> 2025-04-07T14:20:00+00:00 https://www.infosecurity-magazine.com/news/smishing-triad-toll-payment-scams/ www.secnews.physaphae.fr/article.php?IdArticle=8660752 False None None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Xanthorox AI de Darknet \\ propose des outils personnalisables pour les pirates<br>Darknet\\'s Xanthorox AI Offers Customizable Tools for Hackers Xanthorox AI, a self-contained system for offensive cyber operations, has emerged on darknet forums]]> 2025-04-07T13:00:00+00:00 https://www.infosecurity-magazine.com/news/darknets-xanthorox-ai-hackers-tools/ www.secnews.physaphae.fr/article.php?IdArticle=8660728 False Tool None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Vodafone exhorte les réformes des politiques de cybersécurité au Royaume-Uni alors que les coûts de cyber-attaque PME atteignent 3,4 milliards de livres sterling<br>Vodafone Urges UK Cybersecurity Policy Reforms as SME Cyber-Attack Costs Reach £3.4bn Vodafone Business has urged the UK government to implement policy changes, including improvements to the Cyber Essentials scheme and tax incentives for cybersecurity]]> 2025-04-07T10:15:00+00:00 https://www.infosecurity-magazine.com/news/vodafone-urges-uk-cybersecurity/ www.secnews.physaphae.fr/article.php?IdArticle=8660705 False None None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Le gouvernement soutient le premier Fonds de cyber-semences de la Grande-Bretagne, d'une valeur de 50 millions de livres sterling<br>Government Backs Britain\\'s First Cyber Seed Fund, Worth £50m Osney Capital\'s new fund is the first to focus exclusively on early-stage UK cybersecurity]]> 2025-04-07T09:45:00+00:00 https://www.infosecurity-magazine.com/news/government-britains-first-cyber/ www.secnews.physaphae.fr/article.php?IdArticle=8660690 False None None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les sauveteurs de pensions australiens frappent avec une vague d'attaques de farcisse des informations d'identification<br>Aussie Pension Savers Hit with Wave of Credential Stuffing Attacks Cyber-attacks on Australian superannuation funds leave some savers out of pocket]]> 2025-04-07T09:00:00+00:00 https://www.infosecurity-magazine.com/news/aussie-pension-savers-hit/ www.secnews.physaphae.fr/article.php?IdArticle=8660679 False None None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les cyber-agences avertissent les défenses du réseau de menace de flux rapide en contournant les défenses du réseau<br>Cyber Agencies Warn of Fast Flux Threat Bypassing Network Defenses A joint cybersecurity advisory warns organizations globally about the defense gap in detecting and blocking fast flux techniques, which are exploited for malicious activities]]> 2025-04-04T12:30:00+00:00 https://www.infosecurity-magazine.com/news/cyber-agencies-warn-of-fast-flux/ www.secnews.physaphae.fr/article.php?IdArticle=8660239 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Attaque de la chaîne d'approvisionnement des actions TJ-Action a été retracée à un seul compromis de jeton github<br>Tj-actions Supply Chain Attack Traced Back to Single GitHub Token Compromise The threat actors initially attempted to compromise projects associated with the Coinbase cryptocurrency exchange, said Palo Alto Networks]]> 2025-04-04T11:00:00+00:00 https://www.infosecurity-magazine.com/news/tj-actions-supply-chain-attack/ www.secnews.physaphae.fr/article.php?IdArticle=8660220 False Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Des pirates d'État chinois exploitant une faille Ivanti nouvellement divulguée<br>Chinese State Hackers Exploiting Newly Disclosed Ivanti Flaw Mandiant warned that Chinese espionage actor UNC5221 is actively exploiting a critical Ivanti vulnerability, which can lead to remote code execution]]> 2025-04-04T10:04:00+00:00 https://www.infosecurity-magazine.com/news/chinese-state-hackers-ivanti-flaw/ www.secnews.physaphae.fr/article.php?IdArticle=8660207 False Vulnerability None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Plateforme en ligne majeure pour l'exploitation des enfants démantelée<br>Major Online Platform for Child Exploitation Dismantled An international law enforcement operation has shut down Kidflix, a platform for child sexual exploitation with 1.8m registered users]]> 2025-04-03T15:45:00+00:00 https://www.infosecurity-magazine.com/news/online-platform-child-exploitation/ www.secnews.physaphae.fr/article.php?IdArticle=8660076 False Legislation None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Vulnérabilité Crushftp exploitée à la suite des problèmes de divulgation<br>CrushFTP Vulnerability Exploited Following Disclosure Issues A critical authentication bypass flaw in CrushFTP is under active exploitation following a mishandled disclosure process]]> 2025-04-03T15:00:00+00:00 https://www.infosecurity-magazine.com/news/crushftp-flaw-exploited-disclosure/ www.secnews.physaphae.fr/article.php?IdArticle=8660062 False Vulnerability None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Le piratage amateur exploite le serveur d'hébergement russe à l'épreuve des balles pour répandre les logiciels malveillants<br>Amateur Hacker Leverages Russian Bulletproof Hosting Server to Spread Malware The cybercriminal uses the service of Proton66, an infamous Russian-based bulletproof hosting provider, to deploy malware]]> 2025-04-03T13:00:00+00:00 https://www.infosecurity-magazine.com/news/coquettte-hacker-malware-bph/ www.secnews.physaphae.fr/article.php?IdArticle=8660038 False Malware None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Données sensibles violées dans l'incident du ransomware des écoles Highline Schools<br>Sensitive Data Breached in Highline Schools Ransomware Incident Highline Public Schools revealed that sensitive personal, financial and medical data was accessed by ransomware attackers during the September 2024 incident]]> 2025-04-03T10:30:00+00:00 https://www.infosecurity-magazine.com/news/sensitive-data-highline-ransomware/ www.secnews.physaphae.fr/article.php?IdArticle=8660015 False Ransomware,Medical None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Plus de la moitié des attaques contre l'électricité et les sociétés d'eau sont destructrices<br>Over Half of Attacks on Electricity and Water Firms Are Destructive Semperis claims 62% of water and electricity providers were hit by cyber-attacks in the past year]]> 2025-04-03T09:05:00+00:00 https://www.infosecurity-magazine.com/news/half-attacks-electricity-water/ www.secnews.physaphae.fr/article.php?IdArticle=8659996 False None None 4.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Près de 600 domaines de phishing émergent après un braquage<br>Nearly 600 Phishing Domains Emerge Following Bybit Heist BforeAI researchers discover 596 suspicious Bybit-themed domains designed to defraud visitors]]> 2025-04-03T08:45:00+00:00 https://www.infosecurity-magazine.com/news/over-500-phishing-domains-bybit/ www.secnews.physaphae.fr/article.php?IdArticle=8659997 False None None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine La campagne d'écrémage de l'API Stripe dévoile de nouvelles techniques de vol<br>Stripe API Skimming Campaign Unveils New Techniques for Theft A novel skimming attack has been observed by Jscramber, using the Stripe API to steal payment information by injecting malicious scripts into pages]]> 2025-04-02T16:30:00+00:00 https://www.infosecurity-magazine.com/news/stripe-api-skimming-campaign-new/ www.secnews.physaphae.fr/article.php?IdArticle=8659877 False None None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Royal Mail enquête sur la violation des données affectant le fournisseur<br>Royal Mail Investigates Data Breach Affecting Supplier A cyber threat actor has claimed to have leaked 144GB of data from Royal Mail users]]> 2025-04-02T15:44:00+00:00 https://www.infosecurity-magazine.com/news/royal-mail-investigates-data/ www.secnews.physaphae.fr/article.php?IdArticle=8659867 False Data Breach,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les bots gris poussent à mesure que l'activité génératrice du grattoir AI augmente<br>Gray Bots Surge as Generative AI Scraper Activity Increases Gray bots surge as generative AI scraper activity increases, impacting web applications with millions of requests daily]]> 2025-04-02T15:00:00+00:00 https://www.infosecurity-magazine.com/news/gray-bots-generative-ai-scraper/ www.secnews.physaphae.fr/article.php?IdArticle=8659859 False None None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Bybit Wheist Fuels Enregistrer la surtension de la crypto-vol, dit certik<br>Bybit Heist Fuels Record Crypto-Theft Surge, Says CertiK Hackers stole $1.67bn of cryptocurrencies in the first quarter of 2025, a 303% increase]]> 2025-04-02T13:45:00+00:00 https://www.infosecurity-magazine.com/news/record-crypto-theft-certik-bybit/ www.secnews.physaphae.fr/article.php?IdArticle=8659840 False None None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Le faux schéma de travailleurs informatiques de la Corée du Nord jette des viseurs sur l'Europe<br>North Korea\\'s Fake IT Worker Scheme Sets Sights on Europe Google has found a significant increase in North Korean actors attempting to gain employment as IT workers in European companies, leading to data theft and extortion]]> 2025-04-02T11:00:00+00:00 https://www.infosecurity-magazine.com/news/north-korea-fake-it-worker-europe/ www.secnews.physaphae.fr/article.php?IdArticle=8659810 False None None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine La vapeur augmente en haut de la liste des marques usurpées au premier trimestre<br>Steam Surges to Top of Most Spoofed Brands List in Q1 Gaming community Steam appeared most often in phishing emails and texts detected by Guardio in Q1 2025]]> 2025-04-02T09:30:00+00:00 https://www.infosecurity-magazine.com/news/steam-surges-top-most-spoofed/ www.secnews.physaphae.fr/article.php?IdArticle=8659790 False None None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine ICO s'excuse après la réponse à la protection des données SNAFU<br>ICO Apologizes After Data Protection Response Snafu The UK\'s data protection regulator says it is overwhelmed with complaints from the public]]> 2025-04-02T09:00:00+00:00 https://www.infosecurity-magazine.com/news/ico-apologizes-data-protection/ www.secnews.physaphae.fr/article.php?IdArticle=8659778 False None None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine WP Ultimate CSV Importer Flaws Expose 20 000 sites Web aux attaques<br>WP Ultimate CSV Importer Flaws Expose 20,000 Websites to Attacks WP Ultimate CSV Importer flaws expose 20,000 websites to attacks enabling attackers to achieve full site compromise]]> 2025-04-01T15:30:00+00:00 https://www.infosecurity-magazine.com/news/wp-ultimate-csv-importer-flaws/ www.secnews.physaphae.fr/article.php?IdArticle=8659645 False None None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine L'Ukraine reproche à la Russie pour le piratage ferroviaire, l'étiquette "acte de terrorisme"<br>Ukraine Blames Russia for Railway Hack, Labels It "Act of Terrorism" The CERT-UA investigation concluded that the attack\'s techniques were “characteristic of Russian intelligence services”]]> 2025-04-01T14:00:00+00:00 https://www.infosecurity-magazine.com/news/ukraine-russia-railway-hack/ www.secnews.physaphae.fr/article.php?IdArticle=8659646 False Hack None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Une nouvelle attaque de phishing combine des techniques de téléchargement de touche et de DLL<br>New Phishing Attack Combines Vishing and DLL Sideloading Techniques A new attack targeting Microsoft Teams users used vishing, remote access tools and DLL sideloading to deploy a JavaScript backdoor]]> 2025-04-01T13:30:00+00:00 https://www.infosecurity-magazine.com/news/phishing-attack-combines-vishing/ www.secnews.physaphae.fr/article.php?IdArticle=8659616 False Tool None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Google pour activer E2EE pour tous les utilisateurs de Gmail<br>Google to Switch on E2EE for All Gmail Users Google is set to roll out end-to-end encryption for all Gmail users, boosting security, compliance and data sovereignty efforts]]> 2025-04-01T13:00:00+00:00 https://www.infosecurity-magazine.com/news/google-switch-e2ee-all-gmail-users/ www.secnews.physaphae.fr/article.php?IdArticle=8659605 False None None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les cybercriminels étendent l'utilisation des domaines de lookalike dans les attaques par e-mail<br>Cybercriminals Expand Use of Lookalike Domains in Email Attacks BlueVoyant found that the use of lookalike domains in email-based attacks is allowing actors to extend the types of individuals and organizations being targeted]]> 2025-04-01T11:05:00+00:00 https://www.infosecurity-magazine.com/news/criminals-lookalike-domains-email/ www.secnews.physaphae.fr/article.php?IdArticle=8659580 False None None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine La facture de cybersécurité et de résilience s'appliquera à 1000 entreprises britanniques<br>Cyber Security and Resilience Bill Will Apply to 1000 UK Firms A thousand UK service providers will be expected to comply with the forthcoming Cyber Security and Resilience Bill]]> 2025-04-01T08:45:00+00:00 https://www.infosecurity-magazine.com/news/cyber-security-resilience-bill/ www.secnews.physaphae.fr/article.php?IdArticle=8659565 False None None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Nouvelle variante malware Resurge exploite ivanti vulnérabilité<br>New Malware Variant RESURGE Exploits Ivanti Vulnerability CISA recommends immediate action to address malware variant RESURGE exploiting Ivanti vulnerability CVE-2025-0282]]> 2025-03-31T15:45:00+00:00 https://www.infosecurity-magazine.com/news/malware-resurge-exploits-ivanti/ www.secnews.physaphae.fr/article.php?IdArticle=8659429 False Malware,Vulnerability None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Campagne d'interview de Clickfake par Lazarus cible les demandeurs d'emploi cryptographiques<br>ClickFake Interview Campaign by Lazarus Targets Crypto Job Seekers New “ClickFake Interview” campaign attributed to the Lazarus Group targets crypto professionals with fake job offers]]> 2025-03-31T15:00:00+00:00 https://www.infosecurity-magazine.com/news/clickfake-interview-campaign/ www.secnews.physaphae.fr/article.php?IdArticle=8659410 False None APT 38 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Commission de l'UE pour investir 1,3 milliard d'euros dans la cybersécurité et l'IA<br>EU Commission to Invest €1.3bn in Cybersecurity and AI The funding will go to several projects within the Digital Europe Programme (DIGITAL) work program for 2025 to 2027]]> 2025-03-31T10:15:00+00:00 https://www.infosecurity-magazine.com/news/eu-commission-funding/ www.secnews.physaphae.fr/article.php?IdArticle=8659372 False None None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine NCSC exhorte les utilisateurs à patcher suivant.js Flaw immédiatement<br>NCSC Urges Users to Patch Next.js Flaw Immediately The UK\'s National Cyber Security Agency has called on Next.js users to patch CVE-2025-29927]]> 2025-03-31T09:15:00+00:00 https://www.infosecurity-magazine.com/news/ncsc-urges-patch-nextjs-flaw/ www.secnews.physaphae.fr/article.php?IdArticle=8659356 False None None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les États-Unis saisissent 8,2 millions de dollars des escrocs d'appâtage romantique<br>US Seizes $8.2m from Romance Baiting Scammers The DoJ has managed to recoup over $8m from scammers, stolen in romance baiting schemes]]> 2025-03-31T08:30:00+00:00 https://www.infosecurity-magazine.com/news/us-seizes-82m-from-romance-baiting/ www.secnews.physaphae.fr/article.php?IdArticle=8659357 False None None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les vulnérabilités du système d'énergie solaire pourraient entraîner des pannes<br>Solar Power System Vulnerabilities Could Result in Blackouts Forescout researchers found multiple vulnerabilities in leading solar power system manufacturers, which could be exploited to cause emergencies and blackouts]]> 2025-03-28T15:30:00+00:00 https://www.infosecurity-magazine.com/news/solar-power-vulnerabilities/ www.secnews.physaphae.fr/article.php?IdArticle=8658900 False Vulnerability None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Neuf organisations de santé sur dix utilisent les appareils IoT les plus vulnérables<br>Nine in Ten Healthcare Organizations Use the Most Vulnerable IoT Devices Claroty revealed that 89% of healthcare organizations use the top 1% of riskiest Internet-of-Medical-Things (IoMT) devices]]> 2025-03-28T14:50:00+00:00 https://www.infosecurity-magazine.com/news/healthcare-vulnerable-iot-devices/ www.secnews.physaphae.fr/article.php?IdArticle=8658901 False Medical None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les coupes Trump Cisa menacent l'intégrité des élections américaines, avertissent les experts<br>Trump CISA Cuts Threaten US Election Integrity, Experts Warn Expert speakers discussed the impact of reported cutbacks to CISA on the ability of local officials to protect against surging cyber-attacks on US election infrastructure]]> 2025-03-28T12:00:00+00:00 https://www.infosecurity-magazine.com/news/trump-cisa-cuts-us-election/ www.secnews.physaphae.fr/article.php?IdArticle=8658845 False None None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Morphing meerkat phaas plateforme upoofs 100+ marques<br>Morphing Meerkat PhaaS Platform Spoofs 100+ Brands A PhaaS platform, dubbed \'Morphing Meerkat,\' uses DNS MX records to spoof over 100 brands and steal credentials, according to Infoblox Threat Intel]]> 2025-03-28T11:20:00+00:00 https://www.infosecurity-magazine.com/news/morphing-meerkat-phaas-platform/ www.secnews.physaphae.fr/article.php?IdArticle=8658846 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Coodeloder Maleware Loader lié aux opérations de smokeloader<br>CoffeeLoader Malware Loader Linked to SmokeLoader Operations Newly identified CoffeeLoader uses multiple evasion techniques and persistence mechanisms to deploy payloads and bypass endpoint security]]> 2025-03-27T16:45:00+00:00 https://www.infosecurity-magazine.com/news/coffeeloader-linked-smokeloader/ www.secnews.physaphae.fr/article.php?IdArticle=8658643 False Malware None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Pjobrat malware cible les utilisateurs de Taiwan via de fausses applications<br>PJobRAT Malware Targets Users in Taiwan via Fake Apps PJobRAT malware targets Taiwan Android users, stealing data through fake messaging platforms]]> 2025-03-27T16:00:00+00:00 https://www.infosecurity-magazine.com/news/pjobrat-malware-targets-taiwan-via/ www.secnews.physaphae.fr/article.php?IdArticle=8658617 False Malware,Mobile None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Pas de MFA? Attendez-vous à de lourdes amendes, les avertissements ICO de UK \\<br>No MFA? Expect Hefty Fines, UK\\'s ICO Warns The ICO\'s Deputy Commissioner told Infosecurity that organizations that fail to implement MFA and suffer a breach can expect heavy penalties]]> 2025-03-27T12:45:00+00:00 https://www.infosecurity-magazine.com/news/mfa-expect-hefty-fines-uk-ico/ www.secnews.physaphae.fr/article.php?IdArticle=8658569 False None None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Group d'espion chinois Famous Sparrow avec une vengeance, nous cible<br>Chinese Spy Group FamousSparrow Back with a Vengeance, Targets US Once considered inactive, the Chinese cyber espionage group FamousSparrow has reemerged, targeting organizations across the US, Mexico and Honduras]]> 2025-03-27T11:30:00+00:00 https://www.infosecurity-magazine.com/news/chin-famoussparrow-targets-us/ www.secnews.physaphae.fr/article.php?IdArticle=8658556 False None None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine NCA avertit des réseaux «com» ​​sadiques en ligne<br>NCA Warns of Sadistic Online “Com” Networks The UK\'s National Crime Agency is warning of a growing cyber and physical threat from homegrown teens]]> 2025-03-27T10:30:00+00:00 https://www.infosecurity-magazine.com/news/nca-warns-of-sadistic-online-com/ www.secnews.physaphae.fr/article.php?IdArticle=8658541 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Le NCSC exhorte les registraires du domaine à améliorer la sécurité<br>NCSC Urges Domain Registrars to Improve Security The UK\'s National Cyber Security Centre has released new guidance to help domain registrars enhance security]]> 2025-03-27T09:45:00+00:00 https://www.infosecurity-magazine.com/news/ncsc-urges-domain-registrars/ www.secnews.physaphae.fr/article.php?IdArticle=8658522 False None None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine SecurityScoreCard observe une augmentation des violations tierces<br>SecurityScorecard Observes Surge in Third-Party Breaches In its 2025 Global Third-Party Breach Report, SecurityScorecard has found that 35.5% of all cyber breaches in 2024 were third-party related, up from 29% in 2023]]> 2025-03-26T16:30:00+00:00 https://www.infosecurity-magazine.com/news/securityscorecard-surge-third/ www.secnews.physaphae.fr/article.php?IdArticle=8658371 False None None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les acteurs de la menace abusent de la confiance dans les plateformes de collaboration du cloud<br>Threat Actors Abuse Trust in Cloud Collaboration Platforms Threat actors are exploiting cloud platforms like Adobe and Dropbox to evade email gateways and steal credentials]]> 2025-03-26T14:15:00+00:00 https://www.infosecurity-magazine.com/news/threat-actors-abuse-cloud-platforms/ www.secnews.physaphae.fr/article.php?IdArticle=8658348 False Threat,Cloud None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les packages NPM malveillants offrent des coquilles inverses sophistiquées<br>Malicious npm Packages Deliver Sophisticated Reverse Shells A newly discovered malware campaign uses malicious npm packages to deploy reverse shells, compromising development environments]]> 2025-03-26T13:30:00+00:00 https://www.infosecurity-magazine.com/news/malicious-npm-packages-deliver/ www.secnews.physaphae.fr/article.php?IdArticle=8658333 False Malware None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine ETSI publie de nouvelles normes de chiffrement en sécurité quantique<br>ETSI Publishes New Quantum-Safe Encryption Standards Standards body ETSI has defined a scheme for key encapsulation mechanisms with access control (KEMAC), enabling quantum-secure encryption]]> 2025-03-26T11:30:00+00:00 https://www.infosecurity-magazine.com/news/etsi-quantum-safe-encryption/ www.secnews.physaphae.fr/article.php?IdArticle=8658308 False None None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Enisa sondage des menaces spatiales du paysage dans un nouveau rapport<br>ENISA Probes Space Threat Landscape in New Report EU security agency ENISA has released a new report outlining the threats and potential mitigations for the space sector]]> 2025-03-26T10:30:00+00:00 https://www.infosecurity-magazine.com/news/enisa-probes-space-threat/ www.secnews.physaphae.fr/article.php?IdArticle=8658296 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine La nouvelle stratégie de fraude du gouvernement britannique pour se concentrer sur les menaces de technologie<br>UK Government\\'s New Fraud Strategy to Focus on Tech-Enabled Threats The UK government\'s new fraud minister will today announce plans for a newly expanded fraud strategy]]> 2025-03-26T09:30:00+00:00 https://www.infosecurity-magazine.com/news/governments-fraud-strategy/ www.secnews.physaphae.fr/article.php?IdArticle=8658281 False None None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Un nouveau malware Android utilise .net Maui pour échapper à la détection<br>New Android Malware Uses .NET MAUI to Evade Detection McAfee researchers have identified a new wave of Android malware campaigns leveraging .NET MAUI to steal sensitive user information through fake apps]]> 2025-03-25T17:15:00+00:00 https://www.infosecurity-magazine.com/news/android-malware-uses-net-maui/ www.secnews.physaphae.fr/article.php?IdArticle=8658152 False Malware,Mobile None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les cybercriminels utilisent Atlantis AIO pour cibler plus de 140 plateformes<br>Cybercriminals Use Atlantis AIO to Target 140+ Platforms Cybercriminals are increasingly leveraging Atlantis AIO, which automates credential stuffing attacks across more than 140 platforms]]> 2025-03-25T16:30:00+00:00 https://www.infosecurity-magazine.com/news/cyber-criminals-atlantis-aio-140/ www.secnews.physaphae.fr/article.php?IdArticle=8658139 False None None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine NIST met en garde contre les limitations importantes des atténuations de sécurité AI / ML<br>NIST Warns of Significant Limitations in AI/ML Security Mitigations NIST has urged more research and emphasis on developing mitigations for attacks on AI and ML systems]]> 2025-03-25T14:00:00+00:00 https://www.infosecurity-magazine.com/news/nist-limitations-ai-ml-security/ www.secnews.physaphae.fr/article.php?IdArticle=8658108 False None None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Des pirates de fourmis tisserands liés à la Chine exposés après une infiltration de télécommunications sur quatre ans<br>China-Linked Weaver Ant Hackers Exposed After Four-Year Telco Infiltration Sygnia has uncovered Weaver Ant, a Chinese threat actor that spied on telecommunications networks for years]]> 2025-03-25T12:45:00+00:00 https://www.infosecurity-magazine.com/news/china-weaver-ant-hackers-telco/ www.secnews.physaphae.fr/article.php?IdArticle=8658092 False Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Dark Web mentions d'outils d'IA malveillants augmente 200%<br>Dark Web Mentions of Malicious AI Tools Spike 200% Kela researchers detect a 200%+ increase in dark web chatter about malicious AI tools]]> 2025-03-25T12:00:00+00:00 https://www.infosecurity-magazine.com/news/dark-web-mentions-malicious-ai/ www.secnews.physaphae.fr/article.php?IdArticle=8658077 False Tool None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine IngressnightMare: quatre bogues critiques trouvés dans 40% des systèmes cloud<br>IngressNightmare: Four Critical Bugs Found in 40% of Cloud Systems Wiz Security finds four critical RCE vulnerabilities in the Ingress NGINX Controller for Kubernetes]]> 2025-03-25T09:30:00+00:00 https://www.infosecurity-magazine.com/news/ingressnightmare-critical-bugs-40/ www.secnews.physaphae.fr/article.php?IdArticle=8658057 False Vulnerability,Cloud None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Vanhelsingraas se développe rapidement sur le marché de la cybercriminalité<br>VanHelsingRaaS Expands Rapidly in Cybercrime Market VanHelsingRaaS, a new ransomware-as-a-service program, infected three victims within two weeks of release, demanding ransoms of $500,000]]> 2025-03-24T17:15:00+00:00 https://www.infosecurity-magazine.com/news/vanhelsing-raas-expands-rapidly/ www.secnews.physaphae.fr/article.php?IdArticle=8657878 False None None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Systèmes de chemin de fer ukraine frappé par une cyberattaque ciblée<br>Ukraine Railway Systems Hit by Targeted Cyber-Attack Ukraine\'s national railway company has suffered a “large-scale” cyber-attack, disrupting online services and operations]]> 2025-03-24T16:30:00+00:00 https://www.infosecurity-magazine.com/news/ukraine-railway-systems-targeted/ www.secnews.physaphae.fr/article.php?IdArticle=8657858 False None None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les autorités saisissent 1842 dispositifs dans la répression de la cybercriminalité d'Afrique \\<br>Authorities Seize 1842 Devices in Africa\\'s Cybercrime Crackdown Authorities in seven African countries have arrested 306 suspects and seized 1842 devices in Operation Red Card]]> 2025-03-24T15:30:00+00:00 https://www.infosecurity-magazine.com/news/interpol-seize-1842-devices-africa/ www.secnews.physaphae.fr/article.php?IdArticle=8657833 False None None 4.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine California AG rappelle aux clients 23andMe des droits de suppression des données au milieu du dépôt de faillite<br>California AG Reminds 23andMe Customers of Data Deletion Rights Amid Bankruptcy Filing Two years after a data breach that compromised almost seven million customers, 23andMe\'s CEO has resigned as the company files for bankruptcy]]> 2025-03-24T11:30:00+00:00 https://www.infosecurity-magazine.com/news/california-23andme-data-rights/ www.secnews.physaphae.fr/article.php?IdArticle=8657759 False Data Breach None 4.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les adolescents à risque de sextorsion car 74% manquent de sensibilisation de base<br>Teen Boys at Risk of Sextortion as 74% Lack Basic Awareness The UK\'s National Crime Agency has launched a new campaign designed to raise awareness of sextortion among teenage boys]]> 2025-03-24T10:15:00+00:00 https://www.infosecurity-magazine.com/news/teen-boys-risk-sextortion-74-lack/ www.secnews.physaphae.fr/article.php?IdArticle=8657745 False None None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les pirateurs de compte Google ciblent les victimes via des annonces Semrush<br>Google Account Hijackers Target Victims Via Semrush Ads Threat actors are looking to compromise Google accounts to further malvertising and data theft]]> 2025-03-24T09:30:00+00:00 https://www.infosecurity-magazine.com/news/google-hijackers-target-victims/ www.secnews.physaphae.fr/article.php?IdArticle=8657733 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Le ransomware Albabat évolue pour cibler Linux et MacOS<br>Albabat Ransomware Evolves to Target Linux and macOS Trend Micro observed a continuous development of Albabat ransomware, designed to expand attacks and streamline operations]]> 2025-03-21T14:30:00+00:00 https://www.infosecurity-magazine.com/news/albabat-ransomware-linux-macos/ www.secnews.physaphae.fr/article.php?IdArticle=8657232 False Ransomware,Prediction None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les cybercriminels exploitent le point de contrôle du point de contrôle antivirus en campagne malveillante<br>Cybercriminals Exploit CheckPoint Antivirus Driver in Malicious Campaign A security researcher has observed threat actors exploiting vulnerabilities in a driver used by CheckPoint\'s ZoneAlarm antivirus to bypass Windows security measures]]> 2025-03-21T12:45:00+00:00 https://www.infosecurity-magazine.com/news/cybercriminals-exploit-checkpoint/ www.secnews.physaphae.fr/article.php?IdArticle=8657190 False Vulnerability,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les attaquants utilisent de faux captchas pour déployer Lummma Steal Rat<br>Attackers Use Fake CAPTCHAs to Deploy Lumma Stealer RAT Attackers are exploiting user familiarity with CAPTCHAs to distribute the Lumma Stealer RAT via malicious PowerShell commands, according to HP]]> 2025-03-21T11:40:00+00:00 https://www.infosecurity-magazine.com/news/attackers-fake-captchas-lumma/ www.secnews.physaphae.fr/article.php?IdArticle=8657172 False None None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Groupe Fishmonger apt lié à I-Soon dans les campagnes d'espionnage<br>FishMonger APT Group Linked to I-SOON in Espionage Campaigns The FishMonger APT Group has been linked with I-SOON, targeting governments, NGOs and think tanks in cyber-espionage campaigns]]> 2025-03-20T16:30:00+00:00 https://www.infosecurity-magazine.com/news/fishmonger-apt-group-linked-isoon/ www.secnews.physaphae.fr/article.php?IdArticle=8656996 False None None 4.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Dispositifs enracinés 250 fois plus vulnérables aux compromis<br>Rooted Devices 250 Times More Vulnerable to Compromise Rooted devices are 250 times more vulnerable to security incidents, Zimperium warned]]> 2025-03-20T14:00:00+00:00 https://www.infosecurity-magazine.com/news/rooted-devices-250x-vulnerable/ www.secnews.physaphae.fr/article.php?IdArticle=8656945 False None None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine UK CNI Les dirigeants de la sécurité expriment la confiance dans la cybersécurité, malgré le taux de violation à 95%<br>UK CNI Security Leaders Express Confidence in Cybersecurity, Despite 95% Breach Rate Bridewell has released its annual report on critical infrastructure security leaders\' perceived cybersecurity maturity and threats]]> 2025-03-20T12:00:00+00:00 https://www.infosecurity-magazine.com/news/uk-cni-survey-bridewell-cyber/ www.secnews.physaphae.fr/article.php?IdArticle=8656909 False None None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine L'arrêt de la police britannique 422 dans une répression de fraude majeure<br>UK Police Arrest 422 in Major Fraud Crackdown February\'s Operation Henhouse resulted in hundreds of arrests and the seizure of £7.5m]]> 2025-03-20T10:30:00+00:00 https://www.infosecurity-magazine.com/news/uk-police-arrest-422-major-fraud/ www.secnews.physaphae.fr/article.php?IdArticle=8656896 False Legislation None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Plus d'un demi-million de personnes atteintes par la violation du syndicat des écoles de Pennsylvanie<br>Over Half a Million Hit by Pennsylvania Schools Union Breach The Pennsylvania State Education Association (PSEA) has sent breach notifications to over 500,000 current and former members]]> 2025-03-20T09:45:00+00:00 https://www.infosecurity-magazine.com/news/half-million-hit-pennsylvania/ www.secnews.physaphae.fr/article.php?IdArticle=8656884 False None None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine NCSC sets 2035 Date limite pour la migration de cryptographie post-quantum<br>NCSC Sets 2035 Deadline for Post-Quantum Cryptography Migration New NCSC guidance sets out a three-phase migration to post-quantum cryptography, designed to ensure all systems are protected from quantum attacks by 2035]]> 2025-03-20T08:30:00+00:00 https://www.infosecurity-magazine.com/news/ncsc-post-quantum-cryptography/ www.secnews.physaphae.fr/article.php?IdArticle=8656869 False None None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Fauteur de raccourci Windows exploité par 11 groupes parrainés par l'État<br>Windows Shortcut Flaw Exploited by 11 State-Sponsored Groups Newly discovered vulnerability ZDI-CAN-25373 takes advantage of Windows shortcuts has been exploited by 11 state-sponsored groups since 2017]]> 2025-03-19T16:30:00+00:00 https://www.infosecurity-magazine.com/news/zdican25373-exploited-state/ www.secnews.physaphae.fr/article.php?IdArticle=8656731 False Vulnerability None 3.0000000000000000