www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-20T13:18:54+00:00 www.secnews.physaphae.fr InfoSecurity Mag - InfoSecurity Magazine L'exploitation PDF cible les utilisateurs du lecteur Foxit<br>PDF Exploitation Targets Foxit Reader Users CPR said exploit builders in .NET and Python have been employed to deploy this malware]]> 2024-05-15T15:30:00+00:00 https://www.infosecurity-magazine.com/news/pdf-exploitation-targets-foxit/ www.secnews.physaphae.fr/article.php?IdArticle=8500330 False Malware,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les pirates utilisent le tunneling DNS pour scanner et suivre les victimes<br>Hackers Use DNS Tunneling to Scan and Track Victims Palo Alto Networks warns threat actors are using DNS tunneling techniques to probe for network vulnerabilities]]> 2024-05-14T09:15:00+00:00 https://www.infosecurity-magazine.com/news/dns-tunneling-scan-track-victims/ www.secnews.physaphae.fr/article.php?IdArticle=8499448 False Vulnerability,Threat None 4.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine FCC Noms and Shames First Robocall Menace Actor<br>FCC Names and Shames First Robocall Threat Actor In a first, the FCC has designated “Royal Tiger” as a malicious robocall threat group]]> 2024-05-14T08:30:00+00:00 https://www.infosecurity-magazine.com/news/fcc-names-shames-first-robocall/ www.secnews.physaphae.fr/article.php?IdArticle=8499416 False Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine L'acteur de menace prétend la grande violation des données d'Europol<br>Threat Actor Claims Major Europol Data Breach A threat actor known as IntelBroker claims to be selling confidential Europol data after a May breach]]> 2024-05-13T08:45:00+00:00 https://www.infosecurity-magazine.com/news/threat-actor-europol-data-breach/ www.secnews.physaphae.fr/article.php?IdArticle=8498791 False Data Breach,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine RSAC: Les experts mettent en évidence de nouvelles cyber-menaces et tactiques<br>RSAC: Experts Highlight Novel Cyber Threats and Tactics Well-funded cybercriminals are adopting more sophisticated techniques, creating a need for defenders to stay informed about the evolving threat landscape]]> 2024-05-10T11:10:00+00:00 https://www.infosecurity-magazine.com/news/experts-highlight-novel-cyber/ www.secnews.physaphae.fr/article.php?IdArticle=8497167 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine #RSAC: log4j toujours parmi les meilleurs vulnérabilités exploitées, Cato trouve<br>#RSAC: Log4J Still Among Top Exploited Vulnerabilities, Cato Finds A new report by Cato Networks found that exploiting old vulnerabilities in unpatched systems is one of threat actors\' favorite initial access vectors]]> 2024-05-07T16:22:00+00:00 https://www.infosecurity-magazine.com/news/log4j-top-exploited-vulnerabilities/ www.secnews.physaphae.fr/article.php?IdArticle=8495353 False Vulnerability,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine #RSAC: les acteurs de la menace armé le hacktivisme pour un gain financier<br>#RSAC: Threat Actors Weaponizing Hacktivism for Financial Gain Recorded Future\'s Alexander Leslie highlights the increasingly blurred lines between hacktivism, financial cybercrime and nation-state activities during the RSA Conference 2024]]> 2024-05-06T22:55:00+00:00 https://www.infosecurity-magazine.com/news/hacktivism-financial-gain-threat/ www.secnews.physaphae.fr/article.php?IdArticle=8494850 False Threat,Conference None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine DragonForce Ransomware Group utilise le constructeur divulgué de Lockbit \\<br>DragonForce Ransomware Group Uses LockBit\\'s Leaked Builder Cyber threat intelligence provider Cyble found that DragonForce was using a ransomware binary based on LockBit Black\'s builder]]> 2024-04-25T11:00:00+00:00 https://www.infosecurity-magazine.com/news/dragonforce-ransomware-lockbit/ www.secnews.physaphae.fr/article.php?IdArticle=8488484 False Ransomware,Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Fraudsters Exploit Telegram\\'s Popularity For Toncoin Scam The scheme was uncovered by Kaspersky and has been operational since November 2023]]> 2024-04-22T15:30:00+00:00 https://www.infosecurity-magazine.com/news/telegram-exploited-toncoin-scam/ www.secnews.physaphae.fr/article.php?IdArticle=8486889 False Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Vulnérabilité de confusion de dépendance trouvée dans le projet Apache<br>Dependency Confusion Vulnerability Found in Apache Project This occurs when a private package fetches a similar public one, leading to exploit due to misconfigurations in package managers]]> 2024-04-22T13:30:00+00:00 https://www.infosecurity-magazine.com/news/dependency-confusion-flaw-found/ www.secnews.physaphae.fr/article.php?IdArticle=8486835 False Vulnerability,Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Dispose alarmante dans les offres d'emploi de cybersécurité aux États-Unis<br>Alarming Decline in Cybersecurity Job Postings in the US This drop represents a direct threat to US national cybersecurity infrastructure, said CyberSN representatives in their report]]> 2024-04-19T13:00:00+00:00 https://www.infosecurity-magazine.com/news/alarming-decline-cyber-jobs-us/ www.secnews.physaphae.fr/article.php?IdArticle=8485280 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Variante de ransomware Linux Cerber Exploite les serveurs atlassiens<br>Linux Cerber Ransomware Variant Exploits Atlassian Servers The attacks exploit CVE-2023-22518, a critical flaw in Atlassian Confluence Data Center and Server]]> 2024-04-17T16:00:00+00:00 https://www.infosecurity-magazine.com/news/linux-cerber-ransomware-exploits/ www.secnews.physaphae.fr/article.php?IdArticle=8484215 False Ransomware,Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Russie et Ukraine Top Inaugural World Cybercrime Index<br>Russia and Ukraine Top Inaugural World Cybercrime Index An international team of researchers published the first-ever index ranking countries by cybercrime threat level]]> 2024-04-15T16:15:00+00:00 https://www.infosecurity-magazine.com/news/russia-ukraine-world-cybercrime/ www.secnews.physaphae.fr/article.php?IdArticle=8482848 False Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Palo Alto Networks Flaw Zero-Day exploité dans des attaques ciblées<br>Palo Alto Networks Zero-Day Flaw Exploited in Targeted Attacks Designated CVE-2024-3400 and with a CVSS score of 10.0, the flaw enables unauthorized actors to execute arbitrary code on affected firewalls]]> 2024-04-15T14:30:00+00:00 https://www.infosecurity-magazine.com/news/palo-alto-networks-zero-day-flaw/ www.secnews.physaphae.fr/article.php?IdArticle=8482784 False Vulnerability,Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Palo Alto Networks met en garde contre le zéro-jour critique dans Pan-OS<br>Palo Alto Networks Warns About Critical Zero-Day in PAN-OS A fix for CVE-2024-3400 is scheduled on April 4, Palo Alto Networks announced]]> 2024-04-12T11:15:00+00:00 https://www.infosecurity-magazine.com/news/palo-alto-critical-zero-day/ www.secnews.physaphae.fr/article.php?IdArticle=8480679 False Vulnerability,Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Game des acteurs de menace Recherche github pour répandre les logiciels malveillants<br>Threat Actors Game GitHub Search to Spread Malware Checkmarx warns of GitHub search result manipulation designed to promote malicious repositories]]> 2024-04-11T09:40:00+00:00 https://www.infosecurity-magazine.com/news/threat-actors-game-github-search/ www.secnews.physaphae.fr/article.php?IdArticle=8479900 False Malware,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les logiciels malveillants de Rhadamanthys déployés par TA547 contre les cibles allemandes<br>Rhadamanthys Malware Deployed By TA547 Against German Targets Proofpoint said this is the first time the threat actor has been seen using LLM-generated PowerShell scripts]]> 2024-04-10T16:00:00+00:00 https://www.infosecurity-magazine.com/news/rhadamanthys-deployed-ta547-german/ www.secnews.physaphae.fr/article.php?IdArticle=8479408 False Malware,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Plus de 90 000 appareils Nas en D-Link sont attaqués<br>Over 90,000 D-Link NAS Devices Are Under Attack Threat actors are targeting a high severity vulnerability in close to 100,000 legacy D-Link devices]]> 2024-04-09T09:05:00+00:00 https://www.infosecurity-magazine.com/news/over-90000-dlink-nas-devices-attack/ www.secnews.physaphae.fr/article.php?IdArticle=8478565 False Vulnerability,Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Hôpital It Helpdesks ciblé par des fraudeurs vocaux, avertit HHS<br>Hospital IT Helpdesks Targeted By Voice Fraudsters, Warns HHS Threat actors are socially engineering healthcare IT helpdesk staff to steal money, the government has warned]]> 2024-04-08T09:00:00+00:00 https://www.infosecurity-magazine.com/news/hospital-it-helpdesks-voice/ www.secnews.physaphae.fr/article.php?IdArticle=8477999 False Threat,Medical None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les acteurs de la menace chinoise déploient de nouveaux TTP pour exploiter les vulnérabilités ivanti<br>Chinese Threat Actors Deploy New TTPs to Exploit Ivanti Vulnerabilities Mandiant research details how Chinese espionage groups are deploying new tools post-exploitation of recently patched Ivanti vulnerabilities]]> 2024-04-05T14:00:00+00:00 https://www.infosecurity-magazine.com/news/chinese-threat-ttps-ivanti/ www.secnews.physaphae.fr/article.php?IdArticle=8476514 False Tool,Vulnerability,Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les affirmations de l'acteur de menace ont classé cinq yeux Vol de données<br>Threat Actor Claims Classified Five Eyes Data Theft Threat actor IntelBroker claims to have classified intelligence stolen from US government tech supplier Acuity]]> 2024-04-04T09:30:00+00:00 https://www.infosecurity-magazine.com/news/threat-actor-classified-five-eyes/ www.secnews.physaphae.fr/article.php?IdArticle=8475782 False Threat None 4.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Rapport du comité d'examen de la cyber-sécurité Slams Microsoft Security Échecs dans la violation par e-mail du gouvernement<br>Cyber Safety Review Board Report Slams Microsoft Security Failures in Government Email Breach A report has highlighted multiple security failings by Microsoft that allowed Chinese threat actors to access US government officials\' email accounts in the Summer of 2023]]> 2024-04-03T16:30:00+00:00 https://www.infosecurity-magazine.com/news/microsoft-security-failures/ www.secnews.physaphae.fr/article.php?IdArticle=8475336 False Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Appels à la réponse à la réponse aux incidents Double en un an<br>Calls to Incident Response Helpline Double in a Year A rising volume of calls to the Scottish Cyber and Fraud Centre highlights surging threat levels]]> 2024-03-28T09:30:00+00:00 https://www.infosecurity-magazine.com/news/calls-incident-response-helpline/ www.secnews.physaphae.fr/article.php?IdArticle=8471914 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les vulnérabilités zéro-jour ont bondi par plus de 50% par an, explique Google<br>Zero-Day Vulnerabilities Surged by Over 50% Annually, Says Google Google detected nearly 100 zero-day vulnerabilities exploited in the wild in 2023]]> 2024-03-27T13:01:00+00:00 https://www.infosecurity-magazine.com/news/zeroday-surged-50-annually-google/ www.secnews.physaphae.fr/article.php?IdArticle=8471362 False Vulnerability,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les dirigeants de la sécurité reconnaissent les lacunes de sécurité de l'API malgré une menace imminente<br>Security Leaders Acknowledge API Security Gaps Despite Looming Threat Most decision-makers have experienced API security problems over the past year, yet many haven\'t invested in a robust API security strategy, Fastly reveals]]> 2024-03-21T13:30:00+00:00 https://www.infosecurity-magazine.com/news/fastly-survey-api-security-looming/ www.secnews.physaphae.fr/article.php?IdArticle=8467926 False Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les chercheurs en sécurité gagnent deuxième Tesla à PWN2OWN<br>Security Researchers Win Second Tesla At Pwn2Own The Synacktiv team won its second Tesla car for finding one of 19 zero-day bugs on the first day of Pwn2Own Vancouver]]> 2024-03-21T09:30:00+00:00 https://www.infosecurity-magazine.com/news/security-researchers-win-second/ www.secnews.physaphae.fr/article.php?IdArticle=8467806 False Vulnerability,Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine CISA avertit les chefs d'infrastructure critiques de Volt Typhoon<br>CISA Warns Critical Infrastructure Leaders of Volt Typhoon The agency has issued a fact sheet about the threat actor, emphasizing the importance of cyber-risk as a core business concern]]> 2024-03-20T17:00:00+00:00 https://www.infosecurity-magazine.com/news/cisa-warns-critical-infrastructure/ www.secnews.physaphae.fr/article.php?IdArticle=8467425 False Threat Guam 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine La campagne de menace chinoise prolifique cible plus de 100 victimes<br>Prolific Chinese Threat Campaign Targets 100+ Victims Trend Micro uncovers Chinese cyber-espionage campaign Earth Krahang]]> 2024-03-19T09:30:00+00:00 https://www.infosecurity-magazine.com/news/chinese-campaign-targets-100/ www.secnews.physaphae.fr/article.php?IdArticle=8466578 False Threat,Prediction None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les attaques de compte nuage ont augmenté de 16 fois en 2023<br>Cloud Account Attacks Surged 16-Fold in 2023 Red Canary said cloud account compromise detections rose 16-fold in 2023, becoming the fourth most prevalent technique used by threat actors]]> 2024-03-13T14:01:00+00:00 https://www.infosecurity-magazine.com/news/cloud-account-attacks-surged-2023/ www.secnews.physaphae.fr/article.php?IdArticle=8463205 False Threat,Studies,Cloud None 4.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Fonctionnalités de bogue RCE unique parmi 60 cves en mars mardi<br>Single RCE Bug Features Among 60 CVEs in March Patch Tuesday No zero-day vulnerabilities to fix in this month\'s Microsoft Patch Tuesday]]> 2024-03-13T10:15:00+00:00 https://www.infosecurity-magazine.com/news/rce-bug-60-cves-patch-tuesday/ www.secnews.physaphae.fr/article.php?IdArticle=8463119 False Vulnerability,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine L'intelligence américaine prédit les cyber-menaces à venir pour 2024<br>US Intelligence Predicts Upcoming Cyber Threats for 2024 The Office of the Director of National Intelligence (ODNI) has unveiled an unclassified version of its Annual Threat Assessment of the US Intelligence Community]]> 2024-03-12T17:00:00+00:00 https://www.infosecurity-magazine.com/news/us-intelligence-predicts-cyber/ www.secnews.physaphae.fr/article.php?IdArticle=8462731 False Threat,Studies None 4.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Magnet Goblin exploite les vulnérabilités ivanti<br>Magnet Goblin Exploits Ivanti Vulnerabilities The threat actor uses custom Linux malware to pursue financial gain, according to Check Point Research]]> 2024-03-11T17:00:00+00:00 https://www.infosecurity-magazine.com/news/magnet-goblin-exploits-ivanti-flaws/ www.secnews.physaphae.fr/article.php?IdArticle=8462213 False Malware,Vulnerability,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine L'acteur de la menace bianlienne change de concentration sur les tactiques d'extorsion uniquement<br>BianLian Threat Actor Shifts Focus to Extortion-Only Tactics GuidePoint said the threat actor gained initial access via vulnerabilities in a TeamCity server]]> 2024-03-11T16:15:00+00:00 https://www.infosecurity-magazine.com/news/bianlian-shifts-focus-extortion/ www.secnews.physaphae.fr/article.php?IdArticle=8462214 False Vulnerability,Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine La blizzard minuit de la Russie accède au code source Microsoft<br>Russia\\'s Midnight Blizzard Accesses Microsoft Source Code Threat group APT29 is using secrets stolen in an earlier attack to compromise Microsoft\'s internal systems]]> 2024-03-11T09:30:00+00:00 https://www.infosecurity-magazine.com/news/russias-midnight-blizzard/ www.secnews.physaphae.fr/article.php?IdArticle=8462049 False Threat APT 29 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Skype, Google Meet et Zoom utilisés dans une nouvelle campagne d'escroquerie de Troie<br>Skype, Google Meet, and Zoom Used in New Trojan Scam Campaign A new threat actor has been observed by Zscaler distributing remote access Trojans (RATs) via online meeting lures]]> 2024-03-06T11:00:00+00:00 https://www.infosecurity-magazine.com/news/skype-google-meet-zoom-trojan-scam/ www.secnews.physaphae.fr/article.php?IdArticle=8459769 False Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Le gouvernement américain avertit les soins de santé est la plus grande cible pour les affiliés BlackCat<br>US Government Warns Healthcare is Biggest Target for BlackCat Affiliates The US government advisory warns healthcare organizations are being targeted by BlackCat amid an ongoing cyber-incident affecting Change Healthcare]]> 2024-02-29T13:00:00+00:00 https://www.infosecurity-magazine.com/news/healthcare-biggest-target-blackcat/ www.secnews.physaphae.fr/article.php?IdArticle=8456954 False Threat,Medical None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Annonces pour les ventes d'exploitation zéro-jours surfait 70% par an<br>Ads for Zero-Day Exploit Sales Surge 70% Annually Group-IB research warns of rising use of zero-day threats in targeted attacks]]> 2024-02-28T09:45:00+00:00 https://www.infosecurity-magazine.com/news/ads-zeroday-exploit-sales-surge-70/ www.secnews.physaphae.fr/article.php?IdArticle=8456339 False Vulnerability,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Cyber-Espionage industriel France \\'s Menace avant 2024 Olympiques de Paris<br>Industrial Cyber Espionage France\\'s Top Threat Ahead of 2024 Paris Olympics Ransomware and destabilization attacks rose in 2023, yet France\'s National Cybersecurity Agency is most concerned about a diversification of cyber espionage campaigns]]> 2024-02-27T18:00:00+00:00 https://www.infosecurity-magazine.com/news/cyber-espionage-france-2024/ www.secnews.physaphae.fr/article.php?IdArticle=8455989 False Ransomware,Threat,Industrial None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine 78% des organisations subissent des attaques de ransomwares répétées après avoir payé<br>78% of Organizations Suffer Repeat Ransomware Attacks After Paying Cybereason found that 78% of organizations who paid a ransom demand were hit by a second ransomware attack, often by the same threat actor]]> 2024-02-23T10:52:00+00:00 https://www.infosecurity-magazine.com/news/orgs-repeat-ransomware-paying/ www.secnews.physaphae.fr/article.php?IdArticle=8454074 False Ransomware,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les pirates russes lancent des campagnes par e-mail pour démoraliser les Ukrainiens<br>Russian Hackers Launch Email Campaigns to Demoralize Ukrainians ESET researchers reveal a Russian threat actor has targeted Ukrainian citizens with PYSOPs messages warning of impacts such as food and medicine shortages from the war]]> 2024-02-21T12:00:00+00:00 https://www.infosecurity-magazine.com/news/russian-hackers-email-ukrainians/ www.secnews.physaphae.fr/article.php?IdArticle=8453162 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Le temps de rupture de l'attaquant tombe à seulement une heure<br>Attacker Breakout Time Falls to Just One Hour It now takes threat actors on average just 62 minutes to move laterally from initial access, Crowdstrike claims]]> 2024-02-21T09:30:00+00:00 https://www.infosecurity-magazine.com/news/attacker-breakout-time-falls-one/ www.secnews.physaphae.fr/article.php?IdArticle=8453115 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Nouvelles tactiques de typosquat et de repo-flèche découvertes sur PYPI<br>New Typosquatting and Repojacking Tactics Uncovered on PyPI ReversingLabs uncovered two suspicious packages on PyPI: NP6HelperHttptest and NP6HelperHttper]]> 2024-02-20T17:45:00+00:00 https://www.infosecurity-magazine.com/news/typosquatting-repojacking-tactics/ www.secnews.physaphae.fr/article.php?IdArticle=8452819 False Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les faux jetons exploitent le battage médiatique de l'investissement<br>Fake Tokens Exploit BRICS Investment Hype Resecurity said bad actors exploited geopolitical narratives, spreading misinformation]]> 2024-02-19T16:30:00+00:00 https://www.infosecurity-magazine.com/news/fake-tokens-exploit-brics-hype/ www.secnews.physaphae.fr/article.php?IdArticle=8452359 False Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les pirates exploitent l'agenda de l'UE dans les campagnes de phishing de lance<br>Hackers Exploit EU Agenda in Spear Phishing Campaigns Adversaries targeting EU-based victims increasingly leverage EU affairs in spear phishing attacks, CERT-EU found]]> 2024-02-16T12:30:00+00:00 https://www.infosecurity-magazine.com/news/hackers-exploit-eu-agenda-spear/ www.secnews.physaphae.fr/article.php?IdArticle=8450904 False Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine La chaîne d'attaque zéro-jour de Water Hydra \\ cible les commerçants financiers<br>Water Hydra\\'s Zero-Day Attack Chain Targets Financial Traders CVE-2024-21412 was used to evade Microsoft Defender SmartScreen and implant victims with DarkMe]]> 2024-02-14T17:15:00+00:00 https://www.infosecurity-magazine.com/news/water-hydras-zero-day-financial/ www.secnews.physaphae.fr/article.php?IdArticle=8450088 False Vulnerability,Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Microsoft corrige deux jours zéro en février mardi<br>Microsoft Fixes Two Zero-Days in February Patch Tuesday Two zero-day bugs actively exploited in the wild now have official Microsoft patches]]> 2024-02-14T10:30:00+00:00 https://www.infosecurity-magazine.com/news/microsoft-two-zerodays-february/ www.secnews.physaphae.fr/article.php?IdArticle=8449940 False Vulnerability,Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les États-Unis, le Royaume-Uni et l'Inde parmi les pays le plus à risque d'interférence des élections<br>US, UK and India Among the Countries Most At Risk of Election Cyber Interference Threat intelligence provider Tidal Cyber found that 64 countries holding elections in 2024 could face cyber interference threats]]> 2024-02-13T15:00:00+00:00 https://www.infosecurity-magazine.com/news/us-uk-india-election-cyber/ www.secnews.physaphae.fr/article.php?IdArticle=8449594 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Malware-as-a-service maintenant la principale menace pour les organisations<br>Malware-as-a-Service Now the Top Threat to Organizations The Darktrace report observed an increasing cross-functional adaption of many MaaS strains in 2023]]> 2024-02-06T15:40:00+00:00 https://www.infosecurity-magazine.com/news/malware-service-top-threat/ www.secnews.physaphae.fr/article.php?IdArticle=8447322 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Dernier Ivanti Zero Day exploité par des dizaines d'IPS<br>Latest Ivanti Zero Day Exploited By Scores of IPs Shadowserver Foundation spots 170 distinct IP addresses trying to exploit Ivanti zero-day CVE-2024-21893]]> 2024-02-06T11:00:00+00:00 https://www.infosecurity-magazine.com/news/latest-ivanti-zero-day-exploited/ www.secnews.physaphae.fr/article.php?IdArticle=8447231 False Vulnerability,Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Bazel de Google \\ exposé à la menace d'injection de commandement<br>Google\\'s Bazel Exposed to Command Injection Threat Cycode stressed securing software supply chains amid complex dependencies and third-party actions]]> 2024-02-01T14:30:00+00:00 https://www.infosecurity-magazine.com/news/googles-bazel-command-injection/ www.secnews.physaphae.fr/article.php?IdArticle=8445594 False Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Ivanti libère des correctifs zéro jour et révèle deux nouveaux bugs<br>Ivanti Releases Zero-Day Patches and Reveals Two New Bugs Ivanti has finally released updates to fix two zero-day bugs and two new high-severity vulnerabilities]]> 2024-02-01T09:30:00+00:00 https://www.infosecurity-magazine.com/news/ivanti-zeroday-patches-two-new-bugs/ www.secnews.physaphae.fr/article.php?IdArticle=8445492 False Vulnerability,Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Corée du Nord Hacks Crypto: plus de cibles, des gains inférieurs<br>North Korea Hacks Crypto: More Targets, Lower Gains A global drop in DeFi hacking gains prompted North Korean threat actors to diversify and extend their victim portfolio, Chainalysis found]]> 2024-01-25T14:00:00+00:00 https://www.infosecurity-magazine.com/news/north-korea-hacks-crypto-more/ www.secnews.physaphae.fr/article.php?IdArticle=8442988 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Concours PWN2OWN Unarths dizaines de vulnérabilités zéro jour<br>Pwn2Own Contest Unearths Dozens of Zero-Day Vulnerabilities The Zero Day Initiative\'s first Pwn2Own Automotive competition has handed out over $1m for 24 zero-days]]> 2024-01-25T10:15:00+00:00 https://www.infosecurity-magazine.com/news/pwn2own-unearths-dozens-zeroday/ www.secnews.physaphae.fr/article.php?IdArticle=8442921 False Vulnerability,Threat None 5.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Code d'exploitation publié pour le bogue critique de Fortra Goanywhere<br>Exploit Code Released For Critical Fortra GoAnywhere Bug Researchers have released exploit code for a critical bug in managed file transfer software Fortra GoAnywhere]]> 2024-01-24T10:15:00+00:00 https://www.infosecurity-magazine.com/news/exploit-code-critical-fortra/ www.secnews.physaphae.fr/article.php?IdArticle=8442493 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine L'IA est définie sur la menace des ransomwares suralimente, explique NCSC<br>AI Set to Supercharge Ransomware Threat, Says NCSC The National Cyber Security Centre claims in a new report that AI will increase volume and impact of ransomware attacks]]> 2024-01-24T09:30:00+00:00 https://www.infosecurity-magazine.com/news/ai-set-to-supercharge-ransomware/ www.secnews.physaphae.fr/article.php?IdArticle=8442470 False Ransomware,Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine La directive d'urgence de la CISA exige une action sur Ivanti Zero-Days<br>CISA Emergency Directive Demands Action on Ivanti Zero-Days US security agency CISA orders all civilian federal agencies to take immediate steps to mitigate two Ivanti zero-day flaws]]> 2024-01-22T10:15:00+00:00 https://www.infosecurity-magazine.com/news/cisa-emergency-directive-action/ www.secnews.physaphae.fr/article.php?IdArticle=8441611 False Vulnerability,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine NCSC construit une nouvelle communauté de suivi des menaces «Cyber League»<br>NCSC Builds New “Cyber League” Threat Tracking Community The UK\'s National Cyber Security Centre has launched a Cyber League to monitor emerging cyber-threats]]> 2024-01-18T09:30:00+00:00 https://www.infosecurity-magazine.com/news/ncsc-cyber-league-threat-tracking/ www.secnews.physaphae.fr/article.php?IdArticle=8440210 False Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Le gouvernement américain exhorte l'action à atténuer la menace de malware AndroxGH0st<br>US Government Urges Action to Mitigate Androxgh0st Malware Threat An advisory from the FBI and CISA says threat actors are deploying the Androxgh0st malware for victim identification and exploitation in target networks]]> 2024-01-17T11:05:00+00:00 https://www.infosecurity-magazine.com/news/us-government-androxgh0st-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8439833 False Malware,Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Cyber-insécurité et désinformation TOP WEF Global Risk List<br>Cyber Insecurity and Misinformation Top WEF Global Risk List Cyber-attacks and misinformation top WEF\'s list of global risks, with cybercrime poised to exploit tech advancements and AI dominance raising concerns about vulnerability]]> 2024-01-10T14:45:00+00:00 https://www.infosecurity-magazine.com/news/top-wef-global-risk-list-2024-cyber/ www.secnews.physaphae.fr/article.php?IdArticle=8437536 False Vulnerability,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Utilisation de mots de passe plus forts parmi les top 2024 Résolutions numériques<br>Using Stronger Passwords Among Top 2024 Digital Resolutions Security measures top Kaspersky\'s annual digital resolutions survey]]> 2024-01-04T15:00:00+00:00 https://www.infosecurity-magazine.com/news/stronger-passwords-top-2024/ www.secnews.physaphae.fr/article.php?IdArticle=8434458 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Faux et volés comptes d'or inonde le web sombre<br>Fake and Stolen X Gold Accounts Flood Dark Web CloudSEK explored some of the techniques threat actors have been using to forge or steal X Gold accounts since Elon Musk\'s firm introduced its new verified accounts program]]> 2024-01-03T14:00:00+00:00 https://www.infosecurity-magazine.com/news/fake-stolen-x-gold-accounts-flood/ www.secnews.physaphae.fr/article.php?IdArticle=8433683 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine La seconde moitié du paysage des menaces de 2023 dominé par l'IA et les logiciels espions Android<br>Second Half of 2023 Threat Landscape Dominated by AI and Android Spyware The MOVEit hack, OpenAI service targeting and Android spyware top the threat landscape in H2 2023, according to ESET]]> 2023-12-27T10:00:00+00:00 https://www.infosecurity-magazine.com/news/2023-threat-dominated-ai-android/ www.secnews.physaphae.fr/article.php?IdArticle=8429718 False Hack,Threat,Mobile None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Secrétaire de la justice en avertissement d'élections générales de Deepfake<br>Justice Secretary in Deepfake General Election Warning Justice secretary Robert Buckland has warned that deepfakes could be used to spread election disinformation]]> 2023-12-22T10:00:00+00:00 https://www.infosecurity-magazine.com/news/justice-secretary-deepfake/ www.secnews.physaphae.fr/article.php?IdArticle=8427288 False Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Smishing Triad cible les résidents des EAU dans la campagne de vol d'identité<br>Smishing Triad Targets UAE Residents in Identity Theft Campaign The Resecurity team discovered the threat and promptly notified UAE law enforcement agencies]]> 2023-12-19T16:30:00+00:00 https://www.infosecurity-magazine.com/news/smishing-triad-targets-uae/ www.secnews.physaphae.fr/article.php?IdArticle=8425557 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine 2023 Cyber Madenats: 26 000+ Vulnérabilités, 97 au-delà de la liste des CISA<br>2023 Cyber Threats: 26,000+ Vulnerabilities, 97 Beyond CISA List The Qualys report also showed over 7000 vulnerabilities had proof-of-concept exploit code]]> 2023-12-19T15:00:00+00:00 https://www.infosecurity-magazine.com/news/2023-26000-vulnerabilities-97/ www.secnews.physaphae.fr/article.php?IdArticle=8425496 False Vulnerability,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les États-Unis et l'Australie mettent en garde contre la menace des ransomwares de jeu<br>US and Australia Warn of Play Ransomware Threat A joint advisory by US and Australian government agencies urges organizations to protect themselves against Play group\'s tactics]]> 2023-12-19T14:00:00+00:00 https://www.infosecurity-magazine.com/news/us-australia-ransomware-threat/ www.secnews.physaphae.fr/article.php?IdArticle=8425460 False Ransomware,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine GambleForce Group cible les sites Web avec injection SQL<br>GambleForce Group Targets Websites With SQL Injection Group-IB warns of new threat actor GambleForce, which uses SQL injection attacks to steal data from websites]]> 2023-12-14T10:00:00+00:00 https://www.infosecurity-magazine.com/news/gambleforce-websites-sql-injection/ www.secnews.physaphae.fr/article.php?IdArticle=8422526 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Microsoft cible Prolific Outlook Frauder Storm-1152<br>Microsoft Targets Prolific Outlook Fraudster Storm-1152 Microsoft disrupts Vietnam based threat group Storm-1152, which has sold 750 million fake accounts]]> 2023-12-14T09:30:00+00:00 https://www.infosecurity-magazine.com/news/microsoft-prolific-outlook/ www.secnews.physaphae.fr/article.php?IdArticle=8422527 False Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Mitre lance le cadre du modèle de menace d'infrastructure critique<br>MITRE Launches Critical Infrastructure Threat Model Framework MITRE\'s EMB3D provides industrial manufacturers with a shared understanding to mitigate cyber threats]]> 2023-12-13T15:30:00+00:00 https://www.infosecurity-magazine.com/news/mitre-critical-infrastructure/ www.secnews.physaphae.fr/article.php?IdArticle=8422135 False Threat,Industrial None 4.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Microsoft corrige 34 CVE et un jour zéro en décembre mardi<br>Microsoft Fixes 34 CVEs and One Zero-Day in December Patch Tuesday Microsoft has released updates for dozens of vulnerabilities including one zero-day flaw]]> 2023-12-13T10:30:00+00:00 https://www.infosecurity-magazine.com/news/microsoft-fixes-34-cves-one-zero/ www.secnews.physaphae.fr/article.php?IdArticle=8422010 False Vulnerability,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine L'acteur de menace cible les recruteurs avec des logiciels malveillants<br>Threat Actor Targets Recruiters With Malware Recruiters are urged to educate staff about a surge in phishing attacks from threat group TA4557]]> 2023-12-12T10:30:00+00:00 https://www.infosecurity-magazine.com/news/threat-actor-targets-recruiters/ www.secnews.physaphae.fr/article.php?IdArticle=8421468 False Malware,Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Géopolitique à blâmer pour la surtension DOS en Europe, dit Enisa<br>Geopolitics to Blame For DoS Surge in Europe, Says ENISA European security agency claims “novel and massive” DDoS threat is driven by political motivation]]> 2023-12-08T10:00:00+00:00 https://www.infosecurity-magazine.com/news/geopolitics-blame-dos-surge-europe/ www.secnews.physaphae.fr/article.php?IdArticle=8420152 False Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Le gouvernement britannique met en garde contre les cyber campagnes russes contre la démocratie<br>UK Government Warns of Russian Cyber Campaigns Against Democracy The NCSC identified the threat group responsible as Star Blizzard, linked to Russia\'s FSB Center 18]]> 2023-12-07T15:30:00+00:00 https://www.infosecurity-magazine.com/news/russian-cyber-campaigns-against/ www.secnews.physaphae.fr/article.php?IdArticle=8419927 False Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine La menace de Troie-Proxy se développe à travers MacOS, Android et Windows<br>Trojan-Proxy Threat Expands Across macOS, Android and Windows Kaspersky found multiple variants, but none are being marked as malicious by anti-malware vendors]]> 2023-12-06T16:30:00+00:00 https://www.infosecurity-magazine.com/news/trojan-proxy-expands-macos/ www.secnews.physaphae.fr/article.php?IdArticle=8419612 False Threat,Mobile None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Lockbit reste une menace de ransomware mondiale supérieure<br>LockBit Remains Top Global Ransomware Threat The strain was responsible for over a quarter of global ransomware attacks between January 2022 and September 2023]]> 2023-12-06T11:30:00+00:00 https://www.infosecurity-magazine.com/news/lockbit-top-ransomware-threat/ www.secnews.physaphae.fr/article.php?IdArticle=8419536 False Ransomware,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine GOTITAN BOTNET et PRCTRL Rat Exploit Apache Vulnérabilité<br>GoTitan Botnet and PrCtrl RAT Exploit Apache Vulnerability Fortiguard Labs identified multiple threat actors leveraging CVE-2023-46604]]> 2023-11-29T17:00:00+00:00 https://www.infosecurity-magazine.com/news/gotitan-botnet-prctrl-rat-exploit/ www.secnews.physaphae.fr/article.php?IdArticle=8417837 False Vulnerability,Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les pirates exploitent la vulnérabilité critique dans Owncloud<br>Hackers Exploit Critical Vulnerability in ownCloud Zero-day bug could allow remote control of servers]]> 2023-11-29T10:00:00+00:00 https://www.infosecurity-magazine.com/news/hackers-exploit-critical/ www.secnews.physaphae.fr/article.php?IdArticle=8417741 False Vulnerability,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine DeepFake Digital Identity Fraud est décuplé, SumSub Report est constaté<br>Deepfake Digital Identity Fraud Surges Tenfold, Sumsub Report Finds AI-powered tools are among the top fraud techniques used by threat actors in 2023, according to Sumsub\'s third annual Identity Fraud Report]]> 2023-11-28T15:15:00+00:00 https://www.infosecurity-magazine.com/news/deepfake-identity-fraud-surges/ www.secnews.physaphae.fr/article.php?IdArticle=8417545 False Tool,Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les cybercriminels hésitent à utiliser l'IA génératrice<br>Cybercriminals Hesitant About Using Generative AI An analysis of dark web forums revealed many threat actors are skeptical about using tools like ChatGPT to launch attacks]]> 2023-11-28T11:40:00+00:00 https://www.infosecurity-magazine.com/news/cyber-criminals-hesitant/ www.secnews.physaphae.fr/article.php?IdArticle=8417485 False Tool,Threat ChatGPT,ChatGPT 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Sysjoker malware: la menace liée au Hamas se développe avec la variante de la rouille<br>SysJoker Malware: Hamas-Related Threat Expands With Rust Variant CPR said the malware now uses OneDrive instead of Google Drive for storing dynamic C2 server URLs]]> 2023-11-27T16:30:00+00:00 https://www.infosecurity-magazine.com/news/sysjoker-malware-rust-variant/ www.secnews.physaphae.fr/article.php?IdArticle=8417260 False Malware,Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les affiliés de Lockbit exploitent Citrix Said, avertissent les agences gouvernementales<br>LockBit Affiliates are Exploiting Citrix Bleed, Government Agencies Warn Multiple threat actor groups including Lockbit affiliates are found to be exploiting a vulnerability in Citrix NetScaler gateway appliances, government agencies have warned]]> 2023-11-22T11:45:00+00:00 https://www.infosecurity-magazine.com/news/lockbit-affiliates-exploit-citrix/ www.secnews.physaphae.fr/article.php?IdArticle=8415869 False Vulnerability,Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine La campagne Konni déploie un rat avancé avec des capacités de contournement UAC<br>Konni Campaign Deploys Advanced RAT With UAC Bypass Capabilities Fortinet researchers have detected a malicious Word document displaying Russian text]]> 2023-11-21T16:30:00+00:00 https://www.infosecurity-magazine.com/news/konni-deploys-advanced-rat-with/ www.secnews.physaphae.fr/article.php?IdArticle=8415475 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Darkgate et Pikabot Activity Surge à la suite du démontage de Qakbot<br>DarkGate and PikaBot Activity Surge in the Wake of QakBot Takedown Threat actors have shifted to other malware loaders following QakBot FBI takedown]]> 2023-11-21T15:30:00+00:00 https://www.infosecurity-magazine.com/news/darkgate-pikabot-surge-qakbot/ www.secnews.physaphae.fr/article.php?IdArticle=8415443 False Malware,Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine L'APT29 de la Russie cible les ambassades avec Ngrok et Winrar Exploit<br>Russia\\'s APT29 Targets Embassies With Ngrok and WinRAR Exploit Threat group may be looking for intel on Azerbaijan]]> 2023-11-20T10:00:00+00:00 https://www.infosecurity-magazine.com/news/russias-apt29-embassies-ngrok/ www.secnews.physaphae.fr/article.php?IdArticle=8414772 False Threat APT 29,APT 29 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Black Friday: les escrocs exploitent les marques de luxe pour attirer les victimes<br>Black Friday: Scammers Exploit Luxury Brands to Lure Victims Check Point Research say these latest luxury brand scams are a wake-up call for shoppers to stay vigilant online]]> 2023-11-17T11:00:00+00:00 https://www.infosecurity-magazine.com/news/cammers-exploit-luxury-brands-to/ www.secnews.physaphae.fr/article.php?IdArticle=8413335 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Le FBI soulève le couvercle sur un groupe d'araignée dispersé notoire<br>FBI Lifts the Lid on Notorious Scattered Spider Group Security advisory details TTPs of prolific threat actors]]> 2023-11-17T10:30:00+00:00 https://www.infosecurity-magazine.com/news/fbi-notorious-scattered-spider/ www.secnews.physaphae.fr/article.php?IdArticle=8413336 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les cybercriminels exploitent la crise de Gaza avec une fausse charité<br>Cyber-Criminals Exploit Gaza Crisis With Fake Charity Attackers sought crypto donations of $100-$5000 using Bitcoin, Litecoin and Ethereum addresses]]> 2023-11-16T16:30:00+00:00 https://www.infosecurity-magazine.com/news/criminals-gaza-crisis-fake-charity/ www.secnews.physaphae.fr/article.php?IdArticle=8412960 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Black Friday: MalwareBytes met en garde contre la surtension de l'écrémage des cartes de crédit<br>Black Friday: Malwarebytes Warns of Credit Card Skimming Surge Skimming threat actors ramp up their activity just in time for the holiday season]]> 2023-11-16T12:30:00+00:00 https://www.infosecurity-magazine.com/news/black-friday-malwarebytes-credit/ www.secnews.physaphae.fr/article.php?IdArticle=8412859 False Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Python Malware pose une menace DDOS via la mauvaise configuration de l'API Docker<br>Python Malware Poses DDoS Threat Via Docker API Misconfiguration Cado Security Labs said the bot agent exhibited various methods for conducting DDoS attacks]]> 2023-11-13T16:30:00+00:00 https://www.infosecurity-magazine.com/news/python-malware-ddos-threat-docker/ www.secnews.physaphae.fr/article.php?IdArticle=8411135 False Malware,Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Des cibles de groupe affiliées à l'Iran ciblent les entreprises israéliennes au milieu du conflit d'Israël-Hamas<br>Iran-Affiliated Group Targets Israeli Firms Amid Israel-Hamas Conflict CrowdStrike has attributed recent attacks on Israeli organizations in the transportation, logistics, and technology sectors to Iran-affiliated threat actor Imperial Kitten]]> 2023-11-09T13:45:00+00:00 https://www.infosecurity-magazine.com/news/iran-group-israel-hamas-conflict/ www.secnews.physaphae.fr/article.php?IdArticle=8408506 False Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine L'acteur de menace Farnetwork lié à cinq schémas de ransomwares<br>Threat Actor Farnetwork Linked to Five Ransomware Schemes Group-IB lifts the lid on prolific cyber-criminal]]> 2023-11-08T09:30:00+00:00 https://www.infosecurity-magazine.com/news/threat-actor-farnetwork-five/ www.secnews.physaphae.fr/article.php?IdArticle=8407757 False Ransomware,Threat None 1.00000000000000000000 InfoSecurity Mag - InfoSecurity Magazine Nouvelle variante de logiciels malveillants Bluenoroff cible des échanges de crypto-monnaie<br>New BlueNoroff Malware Variant Targets Cryptocurrency Exchanges Jamf Threat Labs found a Mach-O universal binary communicating with an identified malicious domain]]> 2023-11-07T15:00:00+00:00 https://www.infosecurity-magazine.com/news/bluenoroff-malware-targets/ www.secnews.physaphae.fr/article.php?IdArticle=8407290 False Malware,Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Atlassian trouve un exploit public pour un bug critique<br>Atlassian Finds Public Exploit for Critical Bug Attacks in the wild a near certainty as customers urged to patch]]> 2023-11-03T10:25:00+00:00 https://www.infosecurity-magazine.com/news/atlassian-public-exploit-critical/ www.secnews.physaphae.fr/article.php?IdArticle=8405214 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Données chiffrées dans 75% des attaques de ransomwares contre les organisations de soins de santé<br>Data Encrypted in 75% of Ransomware Attacks on Healthcare Organizations Sophos researchers said the increased success rates was partly due to threat actors speeding up their attack timelines]]> 2023-11-01T16:00:00+00:00 https://www.infosecurity-magazine.com/news/data-encrypted-ransomware/ www.secnews.physaphae.fr/article.php?IdArticle=8404159 False Ransomware,Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Winter Vivern: Exploit XSS Zero-Day cible les serveurs Roundcube<br>Winter Vivern: Zero-Day XSS Exploit Targets Roundcube Servers ESET Research reported the vulnerability to the Roundcube team on October 12]]> 2023-10-25T16:00:00+00:00 https://www.infosecurity-magazine.com/news/winter-vivern-zero-day-targets/ www.secnews.physaphae.fr/article.php?IdArticle=8400183 False Vulnerability,Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Nouvelle variante de logiciels malveillants Grandoreiro cible l'Espagne<br>New Grandoreiro Malware Variant Targets Spain Proofpoint said this variant is attributed to the threat actor TA2725]]> 2023-10-23T16:00:00+00:00 https://www.infosecurity-magazine.com/news/grandoreiro-targets-spain/ www.secnews.physaphae.fr/article.php?IdArticle=8399612 False Malware,Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Okta révèle une violation via des titres de compétence volés<br>Okta Reveals Breach Via Stolen Credential Threat actor accessed case management system]]> 2023-10-23T09:00:00+00:00 https://www.infosecurity-magazine.com/news/okta-reveals-breach-via-stolen/ www.secnews.physaphae.fr/article.php?IdArticle=8399216 False Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine La valve améliore la sécurité de la vapeur avec la vérification SMS<br>Valve Enhances Steam Security With SMS Verification The move comes after threat actors compromised developers\' accounts]]> 2023-10-19T15:30:00+00:00 https://www.infosecurity-magazine.com/news/valve-steam-security-sms/ www.secnews.physaphae.fr/article.php?IdArticle=8397768 False Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Attaquants nord-coréens exploitant la vulnérabilité critique CI / CD<br>North Korean Attackers Exploiting Critical CI/CD Vulnerability Microsoft has warned organizations using JetBrains TeamCity server to take immediate steps to mitigate this threat]]> 2023-10-19T10:15:00+00:00 https://www.infosecurity-magazine.com/news/north-korean-exploiting-critical/ www.secnews.physaphae.fr/article.php?IdArticle=8397653 False Vulnerability,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Fausses mises à jour du navigateur utilisées dans la distribution de logiciels malveillants<br>Fake Browser Updates Used in Malware Distribution Proofpoint have identified at least four distinct threat clusters]]> 2023-10-17T15:30:00+00:00 https://www.infosecurity-magazine.com/news/fake-browser-updates-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8396781 False Malware,Threat None 2.0000000000000000