www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2025-05-10T21:05:28+00:00 www.secnews.physaphae.fr Bleeping Computer - Magazine Américain Plateforme d'achat Pandabuy La fuite des données a un impact de 1,3 million d'utilisateurs<br>Shopping platform PandaBuy data leak impacts 1.3 million users Data belonging to more than 1.3 million customers of the PandaBuy online shopping platform has been leaked, allegedly after two threat actors exploited multiple vulnerabilities to breach systems. [...]]]> 2024-04-01T11:00:28+00:00 https://www.bleepingcomputer.com/news/security/shopping-platform-pandabuy-data-leak-impacts-13-million-users/ www.secnews.physaphae.fr/article.php?IdArticle=8474071 False Vulnerability,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Google: les fournisseurs de logiciels espions derrière 50% des jours zéro exploités en 2023<br>Google: Spyware vendors behind 50% of zero-days exploited in 2023 Google\'s Threat Analysis Group (TAG) and Google subsidiary Mandiant said they\'ve observed a significant increase in the number of zero-day vulnerabilities exploited in attacks in 2023, many of them linked to spyware vendors and their clients. [...]]]> 2024-03-27T09:00:00+00:00 https://www.bleepingcomputer.com/news/security/google-spyware-vendors-behind-50-percent-of-zero-days-exploited-in-2023/ www.secnews.physaphae.fr/article.php?IdArticle=8471385 False Vulnerability,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Les pirates exploitent le framework Ray Flaw pour violer les serveurs, les ressources de détournement<br>Hackers exploit Ray framework flaw to breach servers, hijack resources A new hacking campaign dubbed "ShadowRay" targets an unpatched vulnerability in Ray, a popular open-source AI framework, to hijack computing power and leak sensitive data from thousands of companies. [...]]]> 2024-03-26T14:51:32+00:00 https://www.bleepingcomputer.com/news/security/hackers-exploit-ray-framework-flaw-to-breach-servers-hijack-resources/ www.secnews.physaphae.fr/article.php?IdArticle=8470917 False Vulnerability,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Les pirates de krahang de la terre chinoise violent 70 organisations dans 23 pays<br>Chinese Earth Krahang hackers breach 70 orgs in 23 countries A sophisticated hacking campaign attributed to a Chinese Advanced Persistent Threat (APT) group known as \'Earth Krahang\' has breached 70 organizations and targeted at least 116 across 45 countries. [...]]]> 2024-03-18T16:49:17+00:00 https://www.bleepingcomputer.com/news/security/chinese-earth-krahang-hackers-breach-70-orgs-in-23-countries/ www.secnews.physaphae.fr/article.php?IdArticle=8466271 False Threat None 4.0000000000000000 Bleeping Computer - Magazine Américain L'agence de chômage française La violation des données a un impact sur 43 millions de personnes<br>French unemployment agency data breach impacts 43 million people France Travail, formerly known as Pôle Emploi, is warning that hackers breached its systems and may leak or exploit personal details of an estimated 43 million individuals. [...]]]> 2024-03-14T09:32:09+00:00 https://www.bleepingcomputer.com/news/security/french-unemployment-agency-data-breach-impacts-43-million-people/ www.secnews.physaphae.fr/article.php?IdArticle=8463798 False Data Breach,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Les pirates exploitent Windows SmartScreen Flaw pour déposer Darkgate Malware<br>Hackers exploit Windows SmartScreen flaw to drop DarkGate malware A new wave of attacks by the DarkGate malware operation exploits a now-fixed Windows Defender SmartScreen vulnerability to bypass security checks and automatically install fake software installers. [...]]]> 2024-03-13T17:26:41+00:00 https://www.bleepingcomputer.com/news/security/hackers-exploit-windows-smartscreen-flaw-to-drop-darkgate-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8463461 False Malware,Vulnerability,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Acer confirme les données des employés des Philippines divulguées sur le forum de piratage<br>Acer confirms Philippines employee data leaked on hacking forum Acer Philippines confirmed that employee data was stolen in an attack on a third-party vendor who manages the company\'s employee attendance data after a threat actor leaked the data on a hacking forum. [...]]]> 2024-03-12T15:31:04+00:00 https://www.bleepingcomputer.com/news/security/acer-confirms-philippines-employee-data-leaked-on-hacking-forum/ www.secnews.physaphae.fr/article.php?IdArticle=8462804 False Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Les pirates exploitent le plugin wordpress défaut pour infecter 3 300 sites avec malware<br>Hackers exploit WordPress plugin flaw to infect 3,300 sites with malware Hackers are breaching WordPress sites by exploiting a vulnerability in outdated versions of the Popup Builder plugin, infecting over 3,300 websites with malicious code. [...]]]> 2024-03-10T11:38:34+00:00 https://www.bleepingcomputer.com/news/security/hackers-exploit-wordpress-plugin-flaw-to-infect-3-300-sites-with-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8461729 False Malware,Vulnerability,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Les nouveaux logiciels malveillants SSH-Sake volent les clés SSH pour se propager sur le réseau<br>New SSH-Snake malware steals SSH keys to spread across the network A threat actor is using an open-source network mapping tool named SSH-Snake to look for private keys undetected and move laterally on the victim infrastructure. [...]]]> 2024-02-21T14:03:25+00:00 https://www.bleepingcomputer.com/news/security/new-ssh-snake-malware-steals-ssh-keys-to-spread-across-the-network/ www.secnews.physaphae.fr/article.php?IdArticle=8453361 False Malware,Tool,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Screenconnect Critical Bug maintenant attaqué à mesure que le code d'exploit émerge<br>ScreenConnect critical bug now under attack as exploit code emerges Both technical details and proof-of-concept exploits are available for the two vulnerabilities ConnectWise disclosed earlier this week for ScreenConnect, its remote desktop and access software. [...]]]> 2024-02-21T12:18:14+00:00 https://www.bleepingcomputer.com/news/security/screenconnect-critical-bug-now-under-attack-as-exploit-code-emerges/ www.secnews.physaphae.fr/article.php?IdArticle=8453302 False Vulnerability,Threat,Technical None 3.0000000000000000 Bleeping Computer - Magazine Américain Les pirates ont utilisé le nouveau défenseur Windows Zero-Day pour déposer des logiciels malveillants Darkme<br>Hackers used new Windows Defender zero-day to drop DarkMe malware Microsoft has patched today a Windows Defender SmartScreen zero-day exploited in the wild by a financially motivated threat group to deploy the DarkMe remote access trojan (RAT). [...]]]> 2024-02-13T15:52:54+00:00 https://www.bleepingcomputer.com/news/security/hackers-used-new-windows-defender-zero-day-to-drop-darkme-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8449717 False Malware,Vulnerability,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Hyundai Motor Europe frappé par Black Basta Ransomware Attack<br>Hyundai Motor Europe hit by Black Basta ransomware attack Car maker Hyundai Motor Europe suffered a Black Basta ransomware attack, with the threat actors claiming to have stolen three terabytes of corporate data. [...]]]> 2024-02-08T15:16:15+00:00 https://www.bleepingcomputer.com/news/security/hyundai-motor-europe-hit-by-black-basta-ransomware-attack/ www.secnews.physaphae.fr/article.php?IdArticle=8448147 False Ransomware,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Google dit que les fournisseurs de logiciels espions derrière la plupart des zéro-jours qu'il découvre<br>Google says spyware vendors behind most zero-days it discovers Commercial spyware vendors (CSV) were behind 80% of the zero-day vulnerabilities Google\'s Threat Analysis Group (TAG) discovered in 2023 and used to spy on devices worldwide. [...]]]> 2024-02-06T12:27:54+00:00 https://www.bleepingcomputer.com/news/security/google-says-spyware-vendors-behind-most-zero-days-it-discovers/ www.secnews.physaphae.fr/article.php?IdArticle=8447360 False Vulnerability,Threat,Commercial None 4.0000000000000000 Bleeping Computer - Magazine Américain Criminal IP ASM: une nouvelle liste de cybersécurité sur Microsoft Azure<br>Criminal IP ASM: A new cybersecurity listing on Microsoft Azure AI SPERA, a leader in Cyber Threat Intelligence (CTI)-based solutions, today announced that Criminal IP ASM (Attack Surface Management) is now available on the Microsoft Azure Marketplace. [...]]]> 2024-02-06T10:02:04+00:00 https://www.bleepingcomputer.com/news/security/criminal-ip-asm-a-new-cybersecurity-listing-on-microsoft-azure/ www.secnews.physaphae.fr/article.php?IdArticle=8447320 False Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain HPE enquête sur une nouvelle violation après les données à vendre sur le forum de piratage<br>HPE investigates new breach after data for sale on hacking forum Hewlett Packard Enterprise (HPE) is investigating a potential new breach after a threat actor put allegedly stolen data up for sale on a hacking forum, claiming it contains HPE credentials and other sensitive information. [...]]]> 2024-02-05T13:33:51+00:00 https://www.bleepingcomputer.com/news/security/hpe-investigates-new-breach-after-data-for-sale-on-hacking-forum/ www.secnews.physaphae.fr/article.php?IdArticle=8447009 False Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Les pirates poussent les charges utiles de logiciels malveillants USB via les nouvelles, les sites d'hébergement des médias<br>Hackers push USB malware payloads via news, media hosting sites A financially motivated threat actor using USB devices for initial infection has been found abusing legitimate online platforms, including GitHub, Vimeo, and Ars Technica, to host encoded payloads embedded in seemingly benign content. [...]]]> 2024-01-31T17:31:43+00:00 https://www.bleepingcomputer.com/news/security/hackers-push-usb-malware-payloads-via-news-media-hosting-sites/ www.secnews.physaphae.fr/article.php?IdArticle=8445342 False Malware,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Europcar nie la violation de données de 50 millions d'utilisateurs, affirme que les données sont fausses<br>Europcar denies data breach of 50 million users, says data is fake Car rental company Europcar says it has not suffered a data breach and that shared customer data is fake after a threat actor claimed to be selling the personal info of 50 million customers. [...]]]> 2024-01-31T14:25:10+00:00 https://www.bleepingcomputer.com/news/security/europcar-denies-data-breach-of-50-million-users-says-data-is-fake/ www.secnews.physaphae.fr/article.php?IdArticle=8445294 False Data Breach,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Exploit publié pour une faille d'élévation locale Android impactant 7 OEM<br>Exploit released for Android local elevation flaw impacting 7 OEMs A proof-of-concept (PoC) exploit for a local privilege elevation flaw impacting at least seven Android original equipment manufacturers (OEMs) is now publicly available on GitHub. However, as the exploit requires local access, its release will mostly be helpful to researchers. [...]]]> 2024-01-31T14:15:23+00:00 https://www.bleepingcomputer.com/news/security/exploit-released-for-android-local-elevation-flaw-impacting-7-oems/ www.secnews.physaphae.fr/article.php?IdArticle=8445295 False Threat,Mobile None 3.0000000000000000 Bleeping Computer - Magazine Américain Blackwood Hackers Hijack WPS Office Mise à jour pour installer des logiciels malveillants<br>Blackwood hackers hijack WPS Office update to install malware A previously unknown advanced threat actor tracked  as \'Blackwood\' is using sophisticated malware called NSPX30 in cyberespionage attacks against companies and individuals. [...]]]> 2024-01-25T15:30:26+00:00 https://www.bleepingcomputer.com/news/security/blackwood-hackers-hijack-wps-office-update-to-install-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8443124 False Malware,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Le Royaume-Uni dit que l'IA autonomisera les ransomwares au cours des deux prochaines années<br>UK says AI will empower ransomware over the next two years The United Kingdom\'s National Cyber Security Centre (NCSC) warns that artificial intelligence (AI) tools will have an adverse near-term impact on cybersecurity, helping escalate the threat of ransomware. [...]]]> 2024-01-24T11:56:13+00:00 https://www.bleepingcomputer.com/news/security/uk-says-ai-will-empower-ransomware-over-the-next-two-years/ www.secnews.physaphae.fr/article.php?IdArticle=8442614 False Ransomware,Tool,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain FBI: AndroxGH0st malware botnet vole AWS, Microsoft<br>FBI: Androxgh0st malware botnet steals AWS, Microsoft credentials CISA and the FBI warned today that threat actors using Androxgh0st malware are building a botnet focused on cloud credential theft and using the stolen information to deliver additional malicious payloads. [...]]]> 2024-01-16T12:34:28+00:00 https://www.bleepingcomputer.com/news/security/fbi-androxgh0st-malware-botnet-steals-aws-microsoft-credentials/ www.secnews.physaphae.fr/article.php?IdArticle=8439618 False Malware,Threat,Cloud None 3.0000000000000000 Bleeping Computer - Magazine Américain Graphène: Android Android Auto-Recouots Bloquer les exploits du micrologiciel<br>GrapheneOS: Frequent Android auto-reboots block firmware exploits GrapheneOS, a privacy and security-focused Android-based operating system, has posted a series of tweets on X suggesting that Android should introduce frequent auto-reboots to make it harder for forensic software vendors to exploit firmware flaws and spy on the users. [...]]]> 2024-01-14T10:32:54+00:00 https://www.bleepingcomputer.com/news/security/grapheneos-frequent-android-auto-reboots-block-firmware-exploits/ www.secnews.physaphae.fr/article.php?IdArticle=8438993 False Threat,Mobile None 3.0000000000000000 Bleeping Computer - Magazine Américain Ivanti Connect Secure Zero-Days exploité pour déployer des logiciels malveillants personnalisés<br>Ivanti Connect Secure zero-days exploited to deploy custom malware Hackers have been exploiting the two zero-day vulnerabilities in Ivanti Connect Secure disclosed this week since early December to deploy multiple families of custom malware for espionage purposes. [...]]]> 2024-01-12T10:30:18+00:00 https://www.bleepingcomputer.com/news/security/ivanti-connect-secure-zero-days-exploited-to-deploy-custom-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8438313 False Malware,Vulnerability,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Victimes de ransomwares ciblées par de fausses offres de hack-back<br>Ransomware victims targeted by fake hack-back offers Some organizations victimized by the Royal and Akira ransomware gangs have been targeted by a threat actor posing as a security researcher who promised to hack back the original attacker and delete stolen victim data. [...]]]> 2024-01-09T16:09:01+00:00 https://www.bleepingcomputer.com/news/security/ransomware-victims-targeted-by-fake-hack-back-offers/ www.secnews.physaphae.fr/article.php?IdArticle=8437300 False Ransomware,Hack,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain IP criminel et partenaire tenable pour la détection de vulnérabilité rapide<br>Criminal IP and Tenable Partner for Swift Vulnerability Detection Cyber Threat Intelligence (CTI) search engine Criminal IP has established a technical partnership with Tenable. Learn more from Criminal IP about how this partnership can assist in real-time vulnerability and maliciousness scans. [...]]]> 2024-01-09T10:02:04+00:00 https://www.bleepingcomputer.com/news/security/criminal-ip-and-tenable-partner-for-swift-vulnerability-detection/ www.secnews.physaphae.fr/article.php?IdArticle=8437214 False Vulnerability,Threat,Technical None 2.0000000000000000 Bleeping Computer - Magazine Américain Microsoft désactive le gestionnaire de protocole MSIX abusé des attaques de logiciels malveillants<br>Microsoft disables MSIX protocol handler abused in malware attacks Microsoft has again disabled the MSIX ms-appinstaller protocol handler after multiple financially motivated threat groups abused it to infect Windows users with malware. [...]]]> 2023-12-28T14:04:48+00:00 https://www.bleepingcomputer.com/news/microsoft/microsoft-disables-msix-protocol-handler-abused-in-malware-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8430406 False Malware,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Les pirates militaires russes ciblent l'Ukraine avec de nouveaux logiciels malveillants Masepie<br>Russian military hackers target Ukraine with new MASEPIE malware Ukraine\'s Computer Emergency Response Team (CERT) is warning of a new phishing campaign that allowed Russia-linked hackers to deploy previously unseen malware on a network in under one hour. [...]]]> 2023-12-28T12:43:18+00:00 https://www.bleepingcomputer.com/news/security/russian-military-hackers-target-ukraine-with-new-masepie-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8430384 False Malware,Tool,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Lockbit Ransomware perturbe les soins d'urgence dans les hôpitaux allemands<br>Lockbit ransomware disrupts emergency care at German hospitals German hospital network Katholische Hospitalvereinigung Ostwestfalen (KHO) has confirmed that recent service disruptions were caused by a Lockbit ransomware attack where the threat actors gained access to IT systems and encrypted devices on the network. [...]]]> 2023-12-27T16:05:26+00:00 https://www.bleepingcomputer.com/news/security/lockbit-ransomware-disrupts-emergency-care-at-german-hospitals/ www.secnews.physaphae.fr/article.php?IdArticle=8429969 False Ransomware,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Le code source GTA 5 aurait divulgué en ligne un an après Rockstar Hack<br>GTA 5 source code reportedly leaked online a year after RockStar hack ​The source code for Grand Theft Auto 5 was reportedly leaked on Christmas Eve, a little over a year after the Lapsus$ threat actors hacked Rockstar games and stole corporate data. [...]]]> 2023-12-25T13:27:56+00:00 https://www.bleepingcomputer.com/news/security/gta-5-source-code-reportedly-leaked-online-a-year-after-rockstar-hack/ www.secnews.physaphae.fr/article.php?IdArticle=8428924 False Hack,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Lapsus $ pirate derrière GTA 6 La fuite obtient une peine hospitalière indéfinie<br>Lapsus$ hacker behind GTA 6 leak gets indefinite hospital sentence Lapsus$ cybercrime and extortion group member, Arion Kurtaj has been sentenced to life in a \'secure hospital\' by a UK judge. Kurtaj who is 18 years of age and autistic is among the primary Lapsus$ threat actors, and was involved in the leak of assets associated with the video game, Grand Theft Auto VI. [...]]]> 2023-12-21T15:42:55+00:00 https://www.bleepingcomputer.com/news/security/lapsus-hacker-behind-gta-6-leak-gets-indefinite-hospital-sentence/ www.secnews.physaphae.fr/article.php?IdArticle=8426985 False Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Fake F5 Big-ip Zero-Day Avertissement Emails<br>Fake F5 BIG-IP zero-day warning emails push data wipers The Israel National Cyber Directorate warns of phishing emails pretending to be F5 BIG-IP zero-day security updates that deploy Windows and Linux data wipers. [...]]]> 2023-12-20T16:52:42+00:00 https://www.bleepingcomputer.com/news/security/fake-f5-big-ip-zero-day-warning-emails-push-data-wipers/ www.secnews.physaphae.fr/article.php?IdArticle=8426358 False Vulnerability,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Nouveaux abus de logiciels malveillants Nkabuse NKN Blockchain pour les communications furtives<br>New NKAbuse malware abuses NKN blockchain for stealthy comms A new Go-based multi-platform malware identified as \'NKAbuse\' is the first malware abusing NKN (New Kind of Network) technology for data exchange, making it a stealthy threat. [...]]]> 2023-12-14T17:15:12+00:00 https://www.bleepingcomputer.com/news/security/new-nkabuse-malware-abuses-nkn-blockchain-for-stealthy-comms/ www.secnews.physaphae.fr/article.php?IdArticle=8422887 False Malware,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain KV-Botnet détourné les routeurs SoHo et les appareils VPN<br>Stealthy KV-botnet hijacks SOHO routers and VPN devices The Chinese state-sponsored APT hacking group known as Volt Typhoon (Bronze Silhouette) has been linked to a sophisticated botnet named \'KV-botnet\' since at least 2022 to attack SOHO routers in high-value targets. [...]]]> 2023-12-13T17:47:20+00:00 https://www.bleepingcomputer.com/news/security/stealthy-kv-botnet-hijacks-soho-routers-and-vpn-devices/ www.secnews.physaphae.fr/article.php?IdArticle=8422307 False Threat Guam 3.0000000000000000 Bleeping Computer - Magazine Américain Les pirates de Lazarus déposent de nouveaux logiciels malveillants de rat en utilisant un bug Log4J de 2 ans<br>Lazarus hackers drop new RAT malware using 2-year-old Log4j bug The notorious North Korean hacking group known as Lazarus continues to exploit CVE-2021-44228, aka "Log4Shell," this time to deploy three previously unseen malware families written in DLang. [...]]]> 2023-12-11T16:25:32+00:00 https://www.bleepingcomputer.com/news/security/lazarus-hackers-drop-new-rat-malware-using-2-year-old-log4j-bug/ www.secnews.physaphae.fr/article.php?IdArticle=8421215 False Malware,Threat APT 38 2.0000000000000000 Bleeping Computer - Magazine Américain Les pirates nous frappent les agences Govt à l'aide d'Adobe Coldfusion Exploit<br>Hackers breach US govt agencies using Adobe ColdFusion exploit The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is warning about hackers actively exploiting a critical vulnerability in Adobe ColdFusion identified as CVE-2023-26360 to gain initial access to government servers. [...]]]> 2023-12-05T12:07:17+00:00 https://www.bleepingcomputer.com/news/security/hackers-breach-us-govt-agencies-using-adobe-coldfusion-exploit/ www.secnews.physaphae.fr/article.php?IdArticle=8419323 False Vulnerability,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Les pirates influencent les installations d'eau américaines via un Unitronics PLC exposé<br>Hackers breach US water facility via exposed Unitronics PLCs CISA (Cybersecurity & Infrastructure Security Agency) is warning that threat actors breached a U.S. water facility by hacking into Unitronics programmable logic controllers (PLCs) exposed online. [...]]]> 2023-11-29T13:07:18+00:00 https://www.bleepingcomputer.com/news/security/hackers-breach-us-water-facility-via-exposed-unitronics-plcs/ www.secnews.physaphae.fr/article.php?IdArticle=8417852 False Threat,Industrial None 3.0000000000000000 Bleeping Computer - Magazine Américain Les pirates russes utilisent la fonctionnalité Ngrok et l'exploit Winrar pour attaquer les ambassades<br>Russian hackers use Ngrok feature and WinRAR exploit to attack embassies After Sandworm and APT28 (known as Fancy Bear), another state-sponsored Russian hacker group, APT29, is leveraging the CVE-2023-38831 vulnerability in WinRAR for cyberattacks. [...]]]> 2023-11-19T11:14:25+00:00 https://www.bleepingcomputer.com/news/security/russian-hackers-use-ngrok-feature-and-winrar-exploit-to-attack-embassies/ www.secnews.physaphae.fr/article.php?IdArticle=8414888 False Vulnerability,Threat APT 29,APT 28 3.0000000000000000 Bleeping Computer - Magazine Américain La semaine en ransomware - 17 novembre 2023 - Citrix dans la réticule<br>The Week in Ransomware - November 17th 2023 - Citrix in the Crosshairs Ransomware gangs target exposed Citrix Netscaler devices using a publicly available exploit to breach large organizations, steal data, and encrypt files. [...]]]> 2023-11-17T18:26:29+00:00 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-november-17th-2023-citrix-in-the-crosshairs/ www.secnews.physaphae.fr/article.php?IdArticle=8413639 False Ransomware,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain La nouvelle attaque Cachewarp AMD CPU permet aux pirates de gagner de la racine dans les machines virtuelles Linux<br>New CacheWarp AMD CPU attack lets hackers gain root in Linux VMs A new software-based fault injection attack, CacheWarp, can let threat actors hack into AMD SEV-protected virtual machines by targeting memory writes to escalate privileges and gain remote code execution. [...]]]> 2023-11-14T15:34:15+00:00 https://www.bleepingcomputer.com/news/security/new-cachewarp-amd-cpu-attack-lets-hackers-gain-root-in-linux-vms/ www.secnews.physaphae.fr/article.php?IdArticle=8412075 False Hack,Vulnerability,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Fournisseur de pharmacie TruePill La violation de données atteint 2,3 millions de clients<br>Pharmacy provider Truepill data breach hits 2.3 million customers Postmeds, doing business as \'Truepill,\' is sending notifications of a data breach informing recipients that threat actors accessed their sensitive personal information. [...]]]> 2023-11-14T12:36:32+00:00 https://www.bleepingcomputer.com/news/security/pharmacy-provider-truepill-data-breach-hits-23-million-customers/ www.secnews.physaphae.fr/article.php?IdArticle=8411979 False Data Breach,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Criminal IP & Cisco SecureX / XDR: Amélioration de l'analyse des cyber-menaces<br>Criminal IP & Cisco SecureX/XDR: Enhanced Cyber Threat Analysis The Criminal IP threat intelligence search engine by AI SPERA has recently integrated with Cisco SecureX/XDR, empowering organizations to stay ahead of malicious actors. Learn more about this integration from Criminal IP in this article. [...]]]> 2023-11-13T10:02:01+00:00 https://www.bleepingcomputer.com/news/security/criminal-ip-and-cisco-securex-xdr-enhanced-cyber-threat-analysis/ www.secnews.physaphae.fr/article.php?IdArticle=8411133 False Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Maine Govt informe 1,3 million de personnes de violation de données Moveit<br>Maine govt notifies 1.3 million people of MOVEit data breach The State of Maine has announced that its systems were breached after threat actors exploited a vulnerability in the MOVEit file transfer tool and accessed personal information of about 1.3 million, which is close to the state\'s entire population. [...]]]> 2023-11-10T11:21:23+00:00 https://www.bleepingcomputer.com/news/security/maine-govt-notifies-13-million-people-of-moveit-data-breach/ www.secnews.physaphae.fr/article.php?IdArticle=8409199 False Data Breach,Vulnerability,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Google Ads Poussez l'application MALICIEUX CPU-Z à partir du faux site d'information Windows<br>Google ads push malicious CPU-Z app from fake Windows news site A threat actor has been abusing Google Ads to distribute a trojanized version of the CPU-Z tool to deliver the Redline info-stealing malware. [...]]]> 2023-11-09T11:09:38+00:00 https://www.bleepingcomputer.com/news/security/google-ads-push-malicious-cpu-z-app-from-fake-windows-news-site/ www.secnews.physaphae.fr/article.php?IdArticle=8408601 False Malware,Tool,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain FBI: Ransomware Gangs Hack Casinos via des vendeurs de jeux tiers<br>FBI: Ransomware gangs hack casinos via 3rd party gaming vendors The Federal Bureau of Investigation is warning that ransomware threat actors are targeting casino servers and use legitimate system management tools to increase their permissions on the network. [...]]]> 2023-11-08T11:44:35+00:00 https://www.bleepingcomputer.com/news/security/fbi-ransomware-gangs-hack-casinos-via-3rd-party-gaming-vendors/ www.secnews.physaphae.fr/article.php?IdArticle=8407960 False Ransomware,Hack,Tool,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain L'acteur de menace russe "Farnetwork" lié à 5 gangs de ransomwares<br>Russian-speaking threat actor "farnetwork" linked to 5 ransomware gangs The operator of the Nokoyawa ransomware-as-a-service (RaaS), a threat actor known as \'farnetwork\', built experience over the years by helping the JSWORM, Nefilim, Karma, and Nemty affiliate programs with malware development and operation management. [...]]]> 2023-11-08T04:32:39+00:00 https://www.bleepingcomputer.com/news/security/russian-speaking-threat-actor-farnetwork-linked-to-5-ransomware-gangs/ www.secnews.physaphae.fr/article.php?IdArticle=8407758 False Ransomware,Malware,Threat None 4.0000000000000000 Bleeping Computer - Magazine Américain Bluenoroff Hackers Backdoor Mac avec de nouveaux logiciels malveillants Objcshellz<br>BlueNoroff hackers backdoor Macs with new ObjCShellz malware The North Korean-backed BlueNorOff threat group targets Apple customers with new macOS malware tracked as ObjCShellz that can open remote shells on compromised devices. [...]]]> 2023-11-07T15:26:39+00:00 https://www.bleepingcomputer.com/news/security/bluenoroff-hackers-backdoor-macs-with-new-objcshellz-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8407462 False Malware,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Les pirates exploitent Looney Tunables Bug Linux, volez les crédits de cloud<br>Hackers exploit Looney Tunables Linux bug, steal cloud creds The operators of the Kinsing malware are targeting cloud environments with systems vulnerable to "Looney Tunables," a Linux security issue identified as CVE-2023-4911 that allows a local attacker to gain root privileges on the system. [...]]]> 2023-11-06T15:26:17+00:00 https://www.bleepingcomputer.com/news/security/hackers-exploit-looney-tunables-linux-bug-steal-cloud-creds/ www.secnews.physaphae.fr/article.php?IdArticle=8406806 False Malware,Threat,Cloud None 2.0000000000000000 Bleeping Computer - Magazine Américain Exploit publié pour Critical Cisco iOS XE Flaw, de nombreux hôtes sont toujours piratés<br>Exploit released for critical Cisco IOS XE flaw, many hosts still hacked Public exploit code is now available for the critical Cisco IOS XE vulnerability tracked as CVE-2023-20198 that was leveraged as a zero-day to hack tens of thousands of devices. [...]]]> 2023-10-30T23:09:43+00:00 https://www.bleepingcomputer.com/news/security/exploit-released-for-critical-cisco-ios-xe-flaw-many-hosts-still-hacked/ www.secnews.physaphae.fr/article.php?IdArticle=8403268 False Hack,Vulnerability,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Les nouveaux pirates de Tetrisphantom volent les données des lecteurs USB sécurisés sur les systèmes Govt<br>New TetrisPhantom hackers steal data from secure USB drives on govt systems A new sophisticated threat tracked as \'TetrisPhantom\' has been using compromised secure USB drives to target government systems in the Asia-Pacific region. [...]]]> 2023-10-22T11:18:36+00:00 https://www.bleepingcomputer.com/news/security/new-tetrisphantom-hackers-steal-data-from-secure-usb-drives-on-govt-systems/ www.secnews.physaphae.fr/article.php?IdArticle=8398998 False Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Fausses offres de travail Corsair sur LinkedIn Push Darkgate Malware<br>Fake Corsair job offers on LinkedIn push DarkGate malware A threat actor is using fake LinkedIn posts and direct messages about a Facebook Ads specialist position at hardware maker Corsair to lure people into downloading info-stealing malware like DarkGate and RedLine. [...]]]> 2023-10-20T08:48:20+00:00 https://www.bleepingcomputer.com/news/security/fake-corsair-job-offers-on-linkedin-push-darkgate-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8398245 False Malware,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Le faux site Keepass utilise Google Ads et Punycode pour pousser les logiciels malveillants<br>Fake KeePass site uses Google Ads and Punycode to push malware A Google Ads campaign was found pushing a fake KeePass download site that used Punycode to appear as the official domain of the KeePass password manager to distribute malware. [...]]]> 2023-10-19T14:17:19+00:00 https://www.bleepingcomputer.com/news/security/fake-keepass-site-uses-google-ads-and-punycode-to-push-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8397827 False Malware,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Discord toujours un foyer d'activité malveillante - maintenant les aptes rejoignent le plaisir<br>Discord still a hotbed of malware activity - Now APTs join the fun Discord continues to be a breeding ground for malicious activity by hackers and now APT groups, with it commonly used to distribute malware, exfiltrate data, and targeted by threat actors to steal authentication tokens. [...]]]> 2023-10-16T17:29:48+00:00 https://www.bleepingcomputer.com/news/security/discord-still-a-hotbed-of-malware-activity-now-apts-join-the-fun/ www.secnews.physaphae.fr/article.php?IdArticle=8396381 False Malware,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Shadow PC met en garde contre la violation de données alors que le pirate essaie de vendre des joueurs \\ '<br>Shadow PC warns of data breach as hacker tries to sell gamers\\' info Shadow PC, a provider of high-end cloud computing services, is warning customers of a data breach that exposed customers\' private information, as a threat actor claims to be selling the stolen data for over 500,000 customers. [...]]]> 2023-10-12T08:13:11+00:00 https://www.bleepingcomputer.com/news/security/shadow-pc-warns-of-data-breach-as-hacker-tries-to-sell-gamers-info/ www.secnews.physaphae.fr/article.php?IdArticle=8394721 False Data Breach,Threat,Cloud None 2.0000000000000000 Bleeping Computer - Magazine Américain New WordPress Backdoor crée des sites Web d'administrateur voyou pour détourner<br>New WordPress backdoor creates rogue admin to hijack websites A new malware has been posing as a legitimate caching plugin to target WordPress sites, allowing threat actors to create an administrator account and control the site\'s activity. [...]]]> 2023-10-11T17:23:36+00:00 https://www.bleepingcomputer.com/news/security/new-wordpress-backdoor-creates-rogue-admin-to-hijack-websites/ www.secnews.physaphae.fr/article.php?IdArticle=8394487 False Malware,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain D.C. Board of Elections Confirme les données des électeurs volées dans le piratage du site<br>D.C. Board of Elections confirms voter data stolen in site hack The District of Columbia Board of Elections (DCBOE) is currently probing a data leak involving an unknown number of voter records following breach claims from a threat actor known as RansomedVC. [...]]]> 2023-10-06T19:07:50+00:00 https://www.bleepingcomputer.com/news/security/dc-board-of-elections-confirms-voter-data-stolen-in-site-hack/ www.secnews.physaphae.fr/article.php?IdArticle=8392423 False Hack,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain CloudFlare DDOS Protections ironiquement contournée à l'aide de CloudFlare<br>Cloudflare DDoS protections ironically bypassed using Cloudflare Cloudflare\'s Firewall and DDoS prevention can be bypassed through a specific attack process that leverages logic flaws in cross-tenant security controls. [...]]]> 2023-09-30T10:16:08+00:00 https://www.bleepingcomputer.com/news/security/cloudflare-ddos-protections-ironically-bypassed-using-cloudflare/ www.secnews.physaphae.fr/article.php?IdArticle=8390128 False Threat None 4.0000000000000000 Bleeping Computer - Magazine Américain Les États-Unis et le Japon mettent en garde contre les routeurs de Cisco en arrière-plan des pirates chinois<br>US and Japan warn of Chinese hackers backdooring Cisco routers A joint cybersecurity advisory by the FBI, NSA, CISA, and the Japanese NISC (cybersecurity) and NPA (police) sheds light on the techniques the Chinese threat actors known as BlackTech use to attack Japanese and U.S. organizations. [...]]]> 2023-09-27T11:51:00+00:00 https://www.bleepingcomputer.com/news/security/us-and-japan-warn-of-chinese-hackers-backdooring-cisco-routers/ www.secnews.physaphae.fr/article.php?IdArticle=8388437 False Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Des pirates d'évasive Gelesium repérés en attaque contre le gouvernement asiatique<br>Evasive Gelsemium hackers spotted in attack against Asian govt A stealthy advanced persistent threat (APT) tracked as Gelsemium was observed in attacks targeting a Southeast Asian government that spanned six months between 2022 and 2023. [...]]]> 2023-09-23T11:09:18+00:00 https://www.bleepingcomputer.com/news/security/evasive-gelsemium-hackers-spotted-in-attack-against-asian-govt/ www.secnews.physaphae.fr/article.php?IdArticle=8387112 False Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Apple récemment corrigé, Chrome Zero-Days exploité dans des attaques de logiciels espions<br>Recently patched Apple, Chrome zero-days exploited in spyware attacks Security researchers with The Citizen Lab and Google\'s Threat Analysis Group (TAG) revealed today that three zero-days patched by Apple on Thursday were abused as part of an exploit chain to install Cytrox\'s Predator spyware. [...]]]> 2023-09-22T14:16:52+00:00 https://www.bleepingcomputer.com/news/security/recently-patched-apple-chrome-zero-days-exploited-in-spyware-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8386842 False Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain T-Mobile nie de nouvelles rumeurs de violation de données, indique le détaillant autorisé<br>T-Mobile denies new data breach rumors, points to authorized retailer T-Mobile has denied suffering another data breach following Thursday night reports that a threat actor leaked a large database allegedly containing T-Mobile employees\' data. [...]]]> 2023-09-22T11:05:02+00:00 https://www.bleepingcomputer.com/news/security/t-mobile-denies-new-data-breach-rumors-points-to-authorized-retailer/ www.secnews.physaphae.fr/article.php?IdArticle=8386776 False Data Breach,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain \\ 'Sandman \\' Hackers Telcos de porte dérobée avec de nouveaux logiciels malveillants Luadream<br>\\'Sandman\\' hackers backdoor telcos with new LuaDream malware A previously unknown threat actor dubbed \'Sandman\' targets telecommunication service providers in the Middle East, Western Europe, and South Asia, using a modular info-stealing malware named \'LuaDream.\' [...]]]> 2023-09-21T15:50:00+00:00 https://www.bleepingcomputer.com/news/security/sandman-hackers-backdoor-telcos-with-new-luadream-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8386438 False Malware,Threat None 1.00000000000000000000 Bleeping Computer - Magazine Américain TransUnion nie qu'il a été piraté, les liens ont divulgué des données à la tierce partie<br>TransUnion denies it was hacked, links leaked data to 3rd party Credit reporting firm TransUnion has denied claims of a security breach after a threat actor known as USDoD leaked data allegedly stolen from the company\'s network. [...]]]> 2023-09-20T15:34:05+00:00 https://www.bleepingcomputer.com/news/security/transunion-denies-it-was-hacked-links-leaked-data-to-3rd-party/ www.secnews.physaphae.fr/article.php?IdArticle=8385987 False Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Fake Winrar Proof-of-Concept Exploit Drops Venomrat malware A hacker is spreading a fake proof-of-concept (PoC) exploit for a recently fixed WinRAR vulnerability on GitHub, attempting to infect downloaders with the VenomRAT malware. [...]]]> 2023-09-20T10:49:34+00:00 https://www.bleepingcomputer.com/news/security/fake-winrar-proof-of-concept-exploit-drops-venomrat-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8385859 False Malware,Vulnerability,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Hackers Backdoor Telecom Providers avec de nouveaux logiciels malveillants HTTPSNoop<br>Hackers backdoor telecom providers with new HTTPSnoop malware New malware named HTTPSnoop and PipeSnoop are used in cyberattacks on telecommunication service providers in the Middle East, allowing threat actors to remotely execute commands on infected devices. [...]]]> 2023-09-19T11:14:35+00:00 https://www.bleepingcomputer.com/news/security/hackers-backdoor-telecom-providers-with-new-httpsnoop-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8385369 False Malware,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Les pirates iraniens enfreignent les orgs de défense dans les attaques de spray de mot de passe<br>Iranian hackers breach defense orgs in password spray attacks Microsoft says an Iranian-backed threat group has targeted thousands of organizations in the U.S. and worldwide in password spray attacks since February 2023. [...]]]> 2023-09-14T12:30:00+00:00 https://www.bleepingcomputer.com/news/security/iranian-hackers-breach-defense-orgs-in-password-spray-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8382726 False Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain IP criminel élève la sécurité des paiements avec la certification PCI DSS Level 1<br>Criminal IP Elevates Payment Security with PCI DSS Level 1 Certification Criminal IP, a cyber threat intelligence search engine, has achieved PCI DSS Level 1 certification. Learn more from Criminal IP about their cyber threat intelligence search engine. [...]]]> 2023-09-14T10:02:01+00:00 https://www.bleepingcomputer.com/news/security/criminal-ip-elevates-payment-security-with-pci-dss-level-1-certification/ www.secnews.physaphae.fr/article.php?IdArticle=8382707 False Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Fake Cisco Webex Google Ads Modèles de suivi des abus pour pousser les logiciels malveillants<br>Fake Cisco Webex Google Ads abuse tracking templates to push malware Threat actors use Google Ads tracking templates as a loophole to create convincing Webex software search ads that redirect users to websites that distribute the BatLoader malware. [...]]]> 2023-09-14T09:47:16+00:00 https://www.bleepingcomputer.com/news/security/fake-cisco-webex-google-ads-abuse-tracking-templates-to-push-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8382664 False Malware,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Les pirates utilisent de nouveaux ransomwares de 3 heures pour enregistrer l'attaque de verrouillage défaillante<br>Hackers use new 3AM ransomware to save failed LockBit attack A new ransomware strain called 3AM has been uncovered after a threat actor used it in an attack that failed to deploy LockBit ransomware on a target network. [...]]]> 2023-09-13T08:29:40+00:00 https://www.bleepingcomputer.com/news/security/hackers-use-new-3am-ransomware-to-save-failed-lockbit-attack/ www.secnews.physaphae.fr/article.php?IdArticle=8382291 False Ransomware,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Iranian Hackers Backdoor 34 Orgs avec un nouveau sponsor malware<br>Iranian hackers backdoor 34 orgs with new Sponsor malware A nation-state threat actor known as \'Charming Kitten\' (Phosphorus, TA453, APT35/42) has been observed deploying a previously unknown backdoor malware named \'Sponsor\' against 34 companies around the globe. [...]]]> 2023-09-11T12:19:26+00:00 https://www.bleepingcomputer.com/news/security/iranian-hackers-backdoor-34-orgs-with-new-sponsor-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8381418 False Malware,Threat APT 35 2.0000000000000000 Bleeping Computer - Magazine Américain Google: les pirates d'État attaquent les chercheurs en sécurité avec un nouveau zéro-jour<br>Google: State hackers attack security researchers with new zero-day Google\'s Threat Analysis Group (TAG) says North Korean state hackers are again targeting security researchers in attacks using at least one zero-day in an undisclosed popular software. [...]]]> 2023-09-07T12:48:03+00:00 https://www.bleepingcomputer.com/news/security/google-state-hackers-attack-security-researchers-with-new-zero-day/ www.secnews.physaphae.fr/article.php?IdArticle=8380150 False Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain W3ll Phishing Kit détourne des milliers de comptes Microsoft 365, contourne MFA<br>W3LL phishing kit hijacks thousands of Microsoft 365 accounts, bypasses MFA A threat actor known as W3LL developed a phishing kit that can bypass multi-factor authentication along with other tools that compromised more than 8,000 Microsoft 365 corporate accounts. [...]]]> 2023-09-06T06:33:54+00:00 https://www.bleepingcomputer.com/news/security/w3ll-phishing-kit-hijacks-thousands-of-microsoft-365-accounts-bypasses-mfa/ www.secnews.physaphae.fr/article.php?IdArticle=8379573 False Tool,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Fausse arnaque d'extorsion Youporn menace de divulguer votre sex tape<br>Fake YouPorn extortion scam threatens to leak your sex tape A new sextortion scam is making the rounds that pretends to be an email from the adult site YouPorn, warning that a sexually explicit video of you was uploaded to the site and suggesting you pay to have it taken down. [...]]]> 2023-09-02T10:12:06+00:00 https://www.bleepingcomputer.com/news/security/fake-youporn-extortion-scam-threatens-to-leak-your-sex-tape/ www.secnews.physaphae.fr/article.php?IdArticle=8378202 False Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Quatre erreurs de mot de passe courantes que les pirates adorent exploiter<br>Four common password mistakes hackers love to exploit Threat actors take advantage of common password mistakes to breach corporate networks. Learn more from Specops Software on the four most common mistakes and how to strengthen your Active Directory against these risks. [...]]]> 2023-08-28T10:02:01+00:00 https://www.bleepingcomputer.com/news/security/four-common-password-mistakes-hackers-love-to-exploit/ www.secnews.physaphae.fr/article.php?IdArticle=8375713 False Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Les pirates de ransomware résident du temps à 5 jours, le RDP toujours largement utilisé<br>Ransomware hackers dwell time drops to 5 days, RDP still widely used Ransomware threat actors are spending less time on compromised networks before security solutions sound the alarm. In the first half of the year the hackers\' median dwell time dropped to five days from nine in 2022 [...]]]> 2023-08-24T14:18:04+00:00 https://www.bleepingcomputer.com/news/security/ransomware-hackers-dwell-time-drops-to-5-days-rdp-still-widely-used/ www.secnews.physaphae.fr/article.php?IdArticle=8374177 False Ransomware,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Nouvelles attaques de logiciels malveillants Hiatusrat cibler le département de la Défense américaine<br>New HiatusRAT malware attacks target US Defense Department In a new HiatusRAT malware campaign, threat actors have targeted a server belonging to the U.S. Department of Defense in what researchers described as a reconnaissance attack. [...]]]> 2023-08-22T12:47:21+00:00 https://www.bleepingcomputer.com/news/security/new-hiatusrat-malware-attacks-target-us-defense-department/ www.secnews.physaphae.fr/article.php?IdArticle=8373169 False Malware,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Des milliers d'Android APK utilisent une astuce de compression pour contrecarrer l'analyse<br>Thousands of Android APKs use compression trick to thwart analysis Threat actors increasingly distribute malicious Android APKs (packaged app installers) that resist decompilation using unsupported, unknown, or heavily tweaked compression algorithms. [...]]]> 2023-08-17T10:51:12+00:00 https://www.bleepingcomputer.com/news/security/thousands-of-android-apks-use-compression-trick-to-thwart-analysis/ www.secnews.physaphae.fr/article.php?IdArticle=8371282 False Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Près de 2 000 serveurs Citrix Netscaler dans une campagne de piratage<br>Almost 2,000 Citrix NetScaler servers backdoored in hacking campaign A threat actor has compromised close to 2,000 thousand Citrix NetScaler servers in a massive campaign exploiting the critical-severity remote code execution tracked as CVE-2023-3519. [...]]]> 2023-08-15T15:41:38+00:00 https://www.bleepingcomputer.com/news/security/almost-2-000-citrix-netscaler-servers-backdoored-in-hacking-campaign/ www.secnews.physaphae.fr/article.php?IdArticle=8370374 False Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Lapsus $ pirates ont pris des attaques d'échange de simulation au niveau supérieur<br>Lapsus$ hackers took SIM-swapping attacks to the next level The U.S. government released a report after analyzing simple techniques, e.g. SIM swapping, used by the Lapsus$ extortion group to breach dozens of organizations with a strong security posture. [...]]]> 2023-08-11T02:23:46+00:00 https://www.bleepingcomputer.com/news/security/lapsus-hackers-took-sim-swapping-attacks-to-the-next-level/ www.secnews.physaphae.fr/article.php?IdArticle=8368919 False Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Médecine préventive pour la sécurisation de la technologie IoT dans les organisations de soins de santé<br>Preventative medicine for securing IoT tech in healthcare organizations Healthcare organizations are increasingly at risk from threat actors targeting Internet of Medical Things. Learn more from Outpost24 on how attack surface management can secure the IoMT devices. [...]]]> 2023-08-09T10:02:04+00:00 https://www.bleepingcomputer.com/news/security/preventative-medicine-for-securing-iot-tech-in-healthcare-organizations/ www.secnews.physaphae.fr/article.php?IdArticle=8367933 False Threat,Medical None 2.0000000000000000 Bleeping Computer - Magazine Américain La mise à jour de Microsoft Office se casse à la chaîne d'attaque RCE exploitée activement<br>Microsoft Office update breaks actively exploited RCE attack chain Microsoft today released a defense-in-depth update for Microsoft Office that prevents exploitation of a remote code execution (RCE) vulnerability tracked as CVE-2023-36884 that threat actors have already leveraged in attacks. [...]]]> 2023-08-08T16:15:31+00:00 https://www.bleepingcomputer.com/news/security/microsoft-office-update-breaks-actively-exploited-rce-attack-chain/ www.secnews.physaphae.fr/article.php?IdArticle=8367470 False Vulnerability,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain La nouvelle fonctionnalité Microsoft Azure AD CTS peut être abusée pour un mouvement latéral<br>New Microsoft Azure AD CTS feature can be abused for lateral movement Microsoft\'s new Azure Active Directory Cross-Tenant Synchronization (CTS) feature, introduced in June 2023, has created a new potential attack surface that might allow threat actors to more easily spread laterally to other Azure tenants. [...]]]> 2023-08-03T18:55:44+00:00 https://www.bleepingcomputer.com/news/security/new-microsoft-azure-ad-cts-feature-can-be-abused-for-lateral-movement/ www.secnews.physaphae.fr/article.php?IdArticle=8365439 False Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain P2Pinfect Server Spreads Botnet à l'aide de la fonction de réplication Redis<br>P2PInfect server botnet spreads using Redis replication feature Threat actors are actively targeting exposed instances of the Redis open-source data store with a peer-to-peer self-replicating worm with versions for both Windows and Linux that the malware authors named P2Pinfect. [...]]]> 2023-07-31T11:31:42+00:00 https://www.bleepingcomputer.com/news/security/p2pinfect-server-botnet-spreads-using-redis-replication-feature/ www.secnews.physaphae.fr/article.php?IdArticle=8363909 False Malware,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Le plus grand site Web de raffinerie d'huile d'Israel \\ est hors ligne après l'attaque du DDOS<br>Israel\\'s largest oil refinery website offline after DDoS attack Website of Israel\'s largest oil refinery operator, BAZAN Group is inaccessible from most parts of the world as threat actors claim to have hacked the Group\'s cyber systems. [...]]]> 2023-07-30T05:40:03+00:00 https://www.bleepingcomputer.com/news/security/israels-largest-oil-refinery-website-offline-after-ddos-attack/ www.secnews.physaphae.fr/article.php?IdArticle=8363584 False Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Comment le Web sombre réagit-il à la révolution de l'IA?<br>How is the Dark Web Reacting to the AI Revolution? Cybercriminals are already utilizing and creating malicious tools based on open source AI language models for phishing and malware development. Learn more from Flare about how threat actors are beginning to use AI. [...]]]> 2023-07-24T10:01:02+00:00 https://www.bleepingcomputer.com/news/security/how-is-the-dark-web-reacting-to-the-ai-revolution/ www.secnews.physaphae.fr/article.php?IdArticle=8360814 False Malware,Tool,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain NetScaler ADC Bug exploité pour nous briser l'organisation d'infrastructure critique<br>Netscaler ADC bug exploited to breach US critical infrastructure org The US government is warning that threat actors breached the network of a U.S. organization in the critical infrastructure sector after exploiting a zero-day RCE vulnerability currently identified as CVE-2023-3519, a critical-severity issue in NetScaler ADC and Gateway that Citrix patched this week. [...]]]> 2023-07-21T08:51:36+00:00 https://www.bleepingcomputer.com/news/security/netscaler-adc-bug-exploited-to-breach-us-critical-infrastructure-org/ www.secnews.physaphae.fr/article.php?IdArticle=8359803 False Vulnerability,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Les acteurs de la menace ciblent vos applications Web & # 8211;Ici \\ est comment les protéger<br>Threat Actors are Targeting Your Web Applications – Here\\'s How To Protect Them Orgs must take proactive measures to safeguard their web applications and eliminate weak points. Learn more from Outpost24 on these threats, attack strategies, and the steps you can take to protect your web applications. [...]]]> 2023-07-20T10:02:04+00:00 https://www.bleepingcomputer.com/news/security/threat-actors-are-targeting-your-web-applications-heres-how-to-protect-them/ www.secnews.physaphae.fr/article.php?IdArticle=8359313 False Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Microsoft: les pirates transforment les serveurs d'échange en centres de contrôle des logiciels malveillants<br>Microsoft: Hackers turn Exchange servers into malware control centers Microsoft and the Ukraine CERT warn of new attacks by the Russian state-sponsored Turla hacking group, targeting the defense industry and Microsoft Exchange servers with a new \'DeliveryCheck\' malware backdoor. [...]]]> 2023-07-19T15:06:38+00:00 https://www.bleepingcomputer.com/news/security/microsoft-hackers-turn-exchange-servers-into-malware-control-centers/ www.secnews.physaphae.fr/article.php?IdArticle=8358945 False Malware,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain L'IP et les dents criminelles forge une puissante alliance technologique<br>Criminal IP and Tines Forge Powerful Tech Alliance Criminal IP, a leading Cyber Threat Intelligence search engine, has formed a powerful alliance with Tines, a renowned provider of no-code automation solutions. [...]]]> 2023-07-14T10:01:02+00:00 https://www.bleepingcomputer.com/news/security/criminal-ip-and-tines-forge-powerful-tech-alliance/ www.secnews.physaphae.fr/article.php?IdArticle=8356547 False Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Fake Linux Vulnérabilité Exploit Drops Data Stabord Male<br>Fake Linux vulnerability exploit drops data-stealing malware ​Cybersecurity researchers and threat actors are targeted by a fake proof of concept (PoC) CVE-2023-35829 exploit that installs a Linux password-stealing malware. [...]]]> 2023-07-13T14:28:48+00:00 https://www.bleepingcomputer.com/news/security/fake-linux-vulnerability-exploit-drops-data-stealing-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8356143 False Malware,Vulnerability,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain HCA confirme la violation après le pirate vole les données de 11 millions de patients<br>HCA confirms breach after hacker steals data of 11 million patients HCA Healthcare disclosed a data breach impacting an estimated 11 million patients who received care at one of its hospitals and clinics after a threat actor posted samples of stolen data on a hacking forum. [...]]]> 2023-07-11T10:59:20+00:00 https://www.bleepingcomputer.com/news/security/hca-confirms-breach-after-hacker-steals-data-of-11-million-patients/ www.secnews.physaphae.fr/article.php?IdArticle=8354408 False Data Breach,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain La nouvelle technique d'injection de processus moqueurs échappe à la détection d'EDR<br>New Mockingjay process injection technique evades EDR detection A new process injection technique named \'Mockingjay\' could allow threat actors to bypass EDR (Endpoint Detection and Response) and other security products to stealthily execute malicious code on compromised systems. [...]]]> 2023-06-27T09:00:00+00:00 https://www.bleepingcomputer.com/news/security/new-mockingjay-process-injection-technique-evades-edr-detection/ www.secnews.physaphae.fr/article.php?IdArticle=8349729 False Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Les pirates APT37 déploient de nouveaux logiciels malveillants FadesESEaler<br>APT37 hackers deploy new FadeStealer eavesdropping malware The North Korean APT37 hacking group uses a new \'FadeStealer\' information-stealing malware containing a \'wiretapping\' feature, allowing the threat actor to snoop and record from victims\' microphones. [...]]]> 2023-06-21T16:16:11+00:00 https://www.bleepingcomputer.com/news/security/apt37-hackers-deploy-new-fadestealer-eavesdropping-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8347834 False Malware,Threat APT 37,APT 37 2.0000000000000000 Bleeping Computer - Magazine Américain Les pirates infectent les serveurs SSH Linux avec des logiciels malveillants en tsunami botnet<br>Hackers infect Linux SSH servers with Tsunami botnet malware An unknown threat actor is brute-forcing Linux SSH servers to install a wide range of malware, including the Tsunami DDoS (distributed denial of service) bot, ShellBot, log cleaners, privilege escalation tools, and an XMRig (Monero) coin miner. [...]]]> 2023-06-20T13:50:59+00:00 https://www.bleepingcomputer.com/news/security/hackers-infect-linux-ssh-servers-with-tsunami-botnet-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8347429 False Malware,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Les pirates russes APT28 violer les serveurs de courriels gouvernementaux ukrainiens<br>Russian APT28 hackers breach Ukrainian govt email servers A threat group tracked as APT28 and linked to Russia\'s General Staff Main Intelligence Directorate (GRU) has breached Roundcube email servers belonging to multiple Ukrainian organizations, including government entities. [...]]]> 2023-06-20T09:00:00+00:00 https://www.bleepingcomputer.com/news/security/russian-apt28-hackers-breach-ukrainian-govt-email-servers/ www.secnews.physaphae.fr/article.php?IdArticle=8347329 False Threat APT 28 2.0000000000000000 Bleeping Computer - Magazine Américain Les pirates utilisent de fausses photos uniquement de Fans pour laisser tomber les logiciels malveillants de vol d'informations<br>Hackers use fake OnlyFans pics to drop info-stealing malware A malware campaign is using fake OnlyFans content and adult lures to install a remote access trojan known as \'DcRAT,\' allowing threat actors to steal data and credentials or deploy ransomware on the infected device. [...]]]> 2023-06-19T13:14:23+00:00 https://www.bleepingcomputer.com/news/security/hackers-use-fake-onlyfans-pics-to-drop-info-stealing-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8347066 False Ransomware,Malware,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Android Spyware camouflé comme VPN, Applications de chat sur Google Play<br>Android spyware camouflaged as VPN, chat apps on Google Play Three Android apps on Google Play were used by state-sponsored threat actors to collect intelligence from targeted devices, such as location data and contact lists. [...]]]> 2023-06-19T11:22:50+00:00 https://www.bleepingcomputer.com/news/security/android-spyware-camouflaged-as-vpn-chat-apps-on-google-play/ www.secnews.physaphae.fr/article.php?IdArticle=8347034 False Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Les pirates de Reddit menacent de divulguer des données volées en février<br>Reddit hackers threaten to leak data stolen in February breach The BlackCat (ALPHV) ransomware gang is behind a February cyberattack on Reddit, where the threat actors claim to have stolen 80GB of data from the company. [...]]]> 2023-06-18T12:01:03+00:00 https://www.bleepingcomputer.com/news/security/reddit-hackers-threaten-to-leak-data-stolen-in-february-breach/ www.secnews.physaphae.fr/article.php?IdArticle=8346738 False Ransomware,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Les pirates chinois utilisent DNS-sur-HTTPS pour la communication de logiciels malveillants Linux<br>Chinese hackers use DNS-over-HTTPS for Linux malware communication The Chinese threat group \'ChamelGang\' infects Linux devices with a previously unknown implant named \'ChamelDoH,\' allowing DNS-over-HTTPS communications with attackers\' servers. [...]]]> 2023-06-14T13:01:08+00:00 https://www.bleepingcomputer.com/news/security/chinese-hackers-use-dns-over-https-for-linux-malware-communication/ www.secnews.physaphae.fr/article.php?IdArticle=8345382 False Malware,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Dissection de la chaîne d'approvisionnement Web sombre: les journaux du voleur en contexte<br>Dissecting the Dark Web Supply Chain: Stealer Logs in Context Stealer logs represent one of the primary threat vectors for modern companies. This Flare explainer article will delve into the lifecycle of stealer malware and provide tips for detection and remediation. [...]]]> 2023-06-06T10:04:08+00:00 https://www.bleepingcomputer.com/news/security/dissecting-the-dark-web-supply-chain-stealer-logs-in-context/ www.secnews.physaphae.fr/article.php?IdArticle=8342626 False Malware,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Vendeurs en ligne ciblés par une nouvelle campagne de logiciels malveillants de vol d'information<br>Online sellers targeted by new information-stealing malware campaign Online sellers are targeted in a new campaign to push the Vidar information-stealing malware, allowing threat actors to steal credentials for more damaging attacks. [...]]]> 2023-06-03T11:52:24+00:00 https://www.bleepingcomputer.com/news/security/online-sellers-targeted-by-new-information-stealing-malware-campaign/ www.secnews.physaphae.fr/article.php?IdArticle=8341797 False Malware,Threat None 2.0000000000000000