www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2025-05-10T16:46:38+00:00 www.secnews.physaphae.fr Bleeping Computer - Magazine Américain FBI: routeurs de fin de vie piratés pour les réseaux de proxy cybercriminaux<br>FBI: End-of-life routers hacked for cybercrime proxy networks The FBI warns that threat actors are deploying malware on end-of-life (EoL) routers to convert them into proxies sold on the 5Socks and Anyproxy networks. [...]]]> 2025-05-08T18:15:39+00:00 https://www.bleepingcomputer.com/news/security/fbi-end-of-life-routers-hacked-for-cybercrime-proxy-networks/ www.secnews.physaphae.fr/article.php?IdArticle=8673429 False Malware,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Jouer au ransomware exploité Windows Logging Flaw en attaques zéro jour<br>Play ransomware exploited Windows logging flaw in zero-day attacks The Play ransomware gang has exploited a high-severity Windows Common Log File System flaw in zero-day attacks to gain SYSTEM privileges and deploy malware on compromised systems. [...]]]> 2025-05-07T10:45:19+00:00 https://www.bleepingcomputer.com/news/security/play-ransomware-exploited-windows-logging-flaw-in-zero-day-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8672809 False Ransomware,Malware,Vulnerability,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain NOUVEAU "Bring votre propre installateur" Bypass EDR utilisé dans Ransomware Attack<br>New "Bring Your Own Installer" EDR bypass used in ransomware attack A new "Bring Your Own Installer" EDR bypass technique is exploited in attacks to bypass SentinelOne\'s tamper protection feature, allowing threat actors to disable endpoint detection and response (EDR) agents to install the Babuk ransomware. [...]]]> 2025-05-05T16:28:34+00:00 https://www.bleepingcomputer.com/news/security/new-bring-your-own-installer-edr-bypass-used-in-ransomware-attack/ www.secnews.physaphae.fr/article.php?IdArticle=8671996 False Ransomware,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Les pirates abusent de la fonction de réseautage IPv6 pour détourner les mises à jour du logiciel<br>Hackers abuse IPv6 networking feature to hijack software updates A China-aligned APT threat actor named "TheWizards" abuses an IPv6 networking feature to launch adversary-in-the-middle (AitM) attacks that hijack software updates to install Windows malware. [...]]]> 2025-04-30T20:33:42+00:00 https://www.bleepingcomputer.com/news/security/hackers-abuse-ipv6-networking-feature-to-hijack-software-updates/ www.secnews.physaphae.fr/article.php?IdArticle=8670063 False Malware,Threat None 4.0000000000000000 Bleeping Computer - Magazine Américain Commvault affirme que les violations récentes n'ont pas eu d'impact sur les données de sauvegarde des clients<br>Commvault says recent breach didn\\'t impact customer backup data Commvault, a leading provider of data protection solutions, says a nation-state threat actor who breached its Azure environment didn\'t gain access to customer backup data. [...]]]> 2025-04-30T12:20:53+00:00 https://www.bleepingcomputer.com/news/security/commvault-says-recent-breach-didnt-impact-customer-backup-data/ www.secnews.physaphae.fr/article.php?IdArticle=8670007 False Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Google: 97 jours zéro exploités en 2024, plus de 50% dans les attaques de logiciels espions<br>Google: 97 zero-days exploited in 2024, over 50% in spyware attacks Google\'s Threat Intelligence Group (GTIG) says attackers exploited 75 zero-day vulnerabilities in the wild last year, over 50% of which were linked to spyware attacks. [...]]]> 2025-04-29T06:00:00+00:00 https://www.bleepingcomputer.com/news/security/google-97-zero-days-exploited-in-2024-over-50-percent-in-spyware-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8669519 False Vulnerability,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain La chaîne d'exploitation CMS RCE CRAFT utilisée dans les attaques zéro-jours pour voler des données<br>Craft CMS RCE exploit chain used in zero-day attacks to steal data Two vulnerabilities impacting Craft CMS were chained together in zero-day attacks to breach servers and steal data, with exploitation ongoing, according to CERT Orange Cyberdefense. [...]]]> 2025-04-25T15:44:35+00:00 https://www.bleepingcomputer.com/news/security/craft-cms-rce-exploit-chain-used-in-zero-day-attacks-to-steal-data/ www.secnews.physaphae.fr/article.php?IdArticle=8667814 False Vulnerability,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Les pirates de Lazarus violent six entreprises dans des attaques de trou d'eau<br>Lazarus hackers breach six companies in watering hole attacks In a recent espionage campaign, the infamous North Korean threat group Lazarus targeted multiple organizations in the software, IT, finance, and telecommunications sectors in South Korea. [...]]]> 2025-04-24T15:13:32+00:00 https://www.bleepingcomputer.com/news/security/lazarus-hackers-breach-six-companies-in-watering-hole-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8667329 False Threat APT 38 3.0000000000000000 Bleeping Computer - Magazine Américain La violation des données de santé de Yale New Haven affecte 5,5 millions de patients<br>Yale New Haven Health data breach affects 5.5 million patients Yale New Haven Health (YNHHS) is warning that threat actors stole the personal data of 5.5 million patients in a cyberattack earlier this month. [...]]]> 2025-04-24T10:12:24+00:00 https://www.bleepingcomputer.com/news/security/yale-new-haven-health-data-breach-affects-55-million-patients/ www.secnews.physaphae.fr/article.php?IdArticle=8667212 False Data Breach,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain La détection de phishing est brisée: pourquoi la plupart des attaques se sentent comme une journée nulle<br>Phishing detection is broken: Why most attacks feel like a zero day Phishing attacks now evade email filters, proxies, and MFA - making every attack feel like a zero-day. This article from Push Security breaks down why detection is failing and how real-time, in-browser analysis can help turn the tide. [...]]]> 2025-04-23T10:02:12+00:00 https://www.bleepingcomputer.com/news/security/phishing-detection-is-broken-why-most-attacks-feel-like-a-zero-day/ www.secnews.physaphae.fr/article.php?IdArticle=8666689 False Vulnerability,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain SK Telecom avertit les données USIM du client exposées dans l'attaque de logiciels malveillants<br>SK Telecom warns customer USIM data exposed in malware attack South Korea\'s largest mobile operator, SK Telecom, is warning that a malware infection allowed threat actors to access sensitive USIM-related information for customers. [...]]]> 2025-04-22T14:26:59+00:00 https://www.bleepingcomputer.com/news/security/sk-telecom-warns-customer-usim-data-exposed-in-malware-attack/ www.secnews.physaphae.fr/article.php?IdArticle=8666284 False Malware,Threat,Mobile None 2.0000000000000000 Bleeping Computer - Magazine Américain La bibliothèque XRP recommandée de Ripple \\ XRPL.js a piraté pour voler des portefeuilles<br>Ripple\\'s recommended XRP library xrpl.js hacked to steal wallets The recommended Ripple cryptocurrency NPM JavaScript library named "xrpl.js" was compromised to steal XRP wallet seeds and private keys and transfer them to an attacker-controlled server, allowing threat actors to steal all the funds stored in the wallets. [...]]]> 2025-04-22T12:45:04+00:00 https://www.bleepingcomputer.com/news/security/ripples-recommended-xrp-library-xrpljs-hacked-to-steal-wallets/ www.secnews.physaphae.fr/article.php?IdArticle=8666239 False Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Les pirates parrainés par l'État embrassent la tactique d'ingénierie sociale Clickfix<br>State-sponsored hackers embrace ClickFix social engineering tactic ClickFix attacks are being increasingly adopted by threat actors of all levels, with researchers now seeing multiple advanced persistent threat (APT) groups from North Korea, Iran, and Russia utilizing the tactic to breach networks. [...]]]> 2025-04-20T10:14:24+00:00 https://www.bleepingcomputer.com/news/security/state-sponsored-hackers-embrace-clickfix-social-engineering-tactic/ www.secnews.physaphae.fr/article.php?IdArticle=8665679 False Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain CISA met en garde contre l'augmentation des risques de violation après une fuite d'Oracle Cloud<br>CISA warns of increased breach risks following Oracle Cloud leak On Wednesday, CISA warned of heightened breach risks after the compromise of legacy Oracle Cloud servers earlier this year and highlighted the significant threat to enterprise networks. [...]]]> 2025-04-17T07:23:16+00:00 https://www.bleepingcomputer.com/news/security/cisa-warns-of-increased-breach-risks-following-oracle-cloud-leak/ www.secnews.physaphae.fr/article.php?IdArticle=8664015 False Threat,Cloud None 3.0000000000000000 Bleeping Computer - Magazine Américain Hertz confirme les informations sur les clients, les conducteurs \\ 'Licences volées en violation de données<br>Hertz confirms customer info, drivers\\' licenses stolen in data breach Car rental giant Hertz Corporation warns it suffered a data breach after customer data for its Hertz, Thrifty, and Dollar brands was stolen in the Cleo zero-day data theft attacks. [...]]]> 2025-04-14T19:16:03+00:00 https://www.bleepingcomputer.com/news/security/hertz-confirms-customer-info-drivers-licenses-stolen-in-data-breach/ www.secnews.physaphae.fr/article.php?IdArticle=8662867 False Data Breach,Vulnerability,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Amélioration de vos DevSecops avec Wazuh, la plate-forme XDR open source<br>Enhancing your DevSecOps with Wazuh, the open source XDR platform Security shouldn\'t wait until the end of development. Wazuh brings real-time threat detection, compliance, and vulnerability scanning into your DevOps pipeline-powering a stronger DevSecOps strategy from day one. Learn more about how Wazuh can help secure your development cycle. [...]]]> 2025-04-14T10:01:11+00:00 https://www.bleepingcomputer.com/news/security/enhancing-your-devsecops-with-wazuh-the-open-source-xdr-platform/ www.secnews.physaphae.fr/article.php?IdArticle=8662721 False Vulnerability,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Fortinet: les pirates conservent l'accès aux VPN FortiGate patch à l'aide de SymLinks<br>Fortinet: Hackers retain access to patched FortiGate VPNs using symlinks Fortinet warns that threat actors use a post-exploitation technique that helps them maintain read-only access to previously compromised FortiGate VPN devices even after the original attack vector was patched. [...]]]> 2025-04-11T12:08:54+00:00 https://www.bleepingcomputer.com/news/security/fortinet-hackers-retain-access-to-patched-fortigate-vpns-using-symlinks/ www.secnews.physaphae.fr/article.php?IdArticle=8661801 False Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Centrestack RCE exploité comme zéro-jour pour violer les serveurs de partage de fichiers<br>CentreStack RCE exploited as zero-day to breach file sharing servers Hackers exploited a vulnerability in Gladinet CentreStack\'s secure file-sharing software as a zero-day since March to breach storage servers [...]]]> 2025-04-09T11:38:30+00:00 https://www.bleepingcomputer.com/news/security/centrestack-rce-exploited-as-zero-day-to-breach-file-sharing-servers/ www.secnews.physaphae.fr/article.php?IdArticle=8661172 False Vulnerability,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Les faux outils complémentaires de faux Microsoft Office poussent les logiciels malveillants via Sourceforge<br>Fake Microsoft Office add-in tools push malware via SourceForge Threat actors are abusing SourceForge to distribute fake Microsoft add-ins that install malware on victims\' computers to both mine and steal cryptocurrency. [...]]]> 2025-04-08T16:53:33+00:00 https://www.bleepingcomputer.com/news/security/fake-microsoft-office-add-in-tools-push-malware-via-sourceforge/ www.secnews.physaphae.fr/article.php?IdArticle=8661012 False Malware,Tool,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Les correctifs Ivanti Connectent Secure Zero-Day exploité depuis la mi-mars<br>Ivanti patches Connect Secure zero-day exploited since mid-March Ivanti has released security updates to patch a critical Connect Secure remote code execution vulnerability exploited by a China-linked espionage actor to deploy malware since at least mid-March 2025. [...]]]> 2025-04-03T13:43:34+00:00 https://www.bleepingcomputer.com/news/security/ivanti-patches-connect-secure-zero-day-exploited-since-mid-march/ www.secnews.physaphae.fr/article.php?IdArticle=8660092 False Malware,Vulnerability,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Une récente attaque de la chaîne d'approvisionnement de Github a été tracée à un jeton divulgué<br>Recent GitHub supply chain attack traced to leaked SpotBugs token A cascading supply chain attack on GitHub that targeted Coinbase in March has now been traced back to a single token stolen from a SpotBugs workflow, which allowed a threat actor to compromise multiple GitHub projects. [...]]]> 2025-04-03T10:46:50+00:00 https://www.bleepingcomputer.com/news/security/recent-github-supply-chain-attack-traced-to-leaked-spotbugs-token/ www.secnews.physaphae.fr/article.php?IdArticle=8660058 False Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Royal Mail enquête sur les réclamations des fuites de données, aucun impact sur les opérations<br>Royal Mail investigates data leak claims, no impact on operations ​Royal Mail is investigating claims of a security breach after a threat actor leaked over 144GB of data allegedly stolen from the company\'s systems. [...]]]> 2025-04-02T12:34:08+00:00 https://www.bleepingcomputer.com/news/security/royal-mail-investigates-data-leak-claims-no-impact-on-operations/ www.secnews.physaphae.fr/article.php?IdArticle=8659876 False Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain La réalité derrière les échecs du contrôle de la sécurité et comment les empêcher<br>The Reality Behind Security Control Failures-And How to Prevent Them Most orgs only discover their security controls failed after a breach. With OnDefend\'s continuous validation, you can test, measure, and prove your defenses work-before attackers exploit blind spots. [...]]]> 2025-04-02T10:01:11+00:00 https://www.bleepingcomputer.com/news/security/the-reality-behind-security-control-failures-and-how-to-prevent-them/ www.secnews.physaphae.fr/article.php?IdArticle=8659856 False Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Les appareils Android contrefaits trouvés préchargés avec Triada Malware<br>Counterfeit Android devices found preloaded With Triada malware A new version of the Triada trojan has been discovered preinstalled on thousands of new Android devices, allowing threat actors to steal data as soon as they are set up. [...]]]> 2025-04-02T09:57:23+00:00 https://www.bleepingcomputer.com/news/security/counterfeit-android-devices-found-preloaded-with-triada-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8659836 False Malware,Threat,Mobile None 3.0000000000000000 Bleeping Computer - Magazine Américain Oracle Health Breach compromet les données des patients dans les hôpitaux américains<br>Oracle Health breach compromises patient data at US hospitals A breach at Oracle Health impacts multiple US healthcare organizations and hospitals after a threat actor stole patient data from legacy servers. [...]]]> 2025-03-28T10:13:58+00:00 https://www.bleepingcomputer.com/news/security/oracle-health-breach-compromises-patient-data-at-us-hospitals/ www.secnews.physaphae.fr/article.php?IdArticle=8658884 False Threat,Medical None 3.0000000000000000 Bleeping Computer - Magazine Américain Les clients d'Oracle confirment que les données volées dans une violation de cloud présumée sont valides<br>Oracle customers confirm data stolen in alleged cloud breach is valid Despite Oracle denying a breach of its Oracle Cloud federated SSO login servers and the theft of account data for 6 million people, BleepingComputer has confirmed with multiple companies that associated data samples shared by the threat actor are valid. [...]]]> 2025-03-26T16:20:57+00:00 https://www.bleepingcomputer.com/news/security/oracle-customers-confirm-data-stolen-in-alleged-cloud-breach-is-valid/ www.secnews.physaphae.fr/article.php?IdArticle=8658417 False Threat,Cloud None 4.0000000000000000 Bleeping Computer - Magazine Américain Les streamements révèlent la violation de données tierces après les données de fuite de pirate<br>StreamElements discloses third-party data breach after hacker leaks data Cloud-based streaming company StreamElements confirms it suffered a data breach at a third-party service provider after a threat actor leaked samples of stolen data on a hacking forum. [...]]]> 2025-03-26T14:42:51+00:00 https://www.bleepingcomputer.com/news/security/streamelements-discloses-third-party-data-breach-after-hacker-leaks-data/ www.secnews.physaphae.fr/article.php?IdArticle=8658394 False Data Breach,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Google fixe Chrome Zero-Day exploité dans la campagne d'espionnage<br>Google fixes Chrome zero-day exploited in espionage campaign ​Google has fixed a high-severity Chrome zero-day vulnerability exploited to escape the browser\'s sandbox and deploy malware in espionage attacks targeting Russian organizations. [...]]]> 2025-03-26T02:42:48+00:00 https://www.bleepingcomputer.com/news/security/google-fixes-chrome-zero-day-exploited-in-espionage-campaign/ www.secnews.physaphae.fr/article.php?IdArticle=8658255 False Malware,Vulnerability,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Les pirates de fourmis tisserand chinois ont espionné un réseau de télécommunications pendant 4 ans<br>Chinese Weaver Ant hackers spied on telco network for 4 years A China-linked advanced threat group named Weaver Ant spent more than four years in the network of a telecommunications services provider, hiding traffic and infrastructure with the help of compromised Zyxel CPE routers.  [...]]]> 2025-03-24T13:53:27+00:00 https://www.bleepingcomputer.com/news/security/chinese-weaver-ant-hackers-spied-on-telco-network-for-4-years/ www.secnews.physaphae.fr/article.php?IdArticle=8657882 False Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Menaces cachées: comment les sauvegardes Microsoft 365 stockent les risques pour les attaques futures<br>Hidden Threats: How Microsoft 365 Backups Store Risks for Future Attacks Acronis Threat Research found 2M+ malicious URLs & 5,000+ malware instances in Microsoft 365 backup data-demonstrating how built-in security isn\'t always enough. Don\'t let threats persist in your cloud data. Strengthen your defenses. [...]]]> 2025-03-24T10:01:11+00:00 https://www.bleepingcomputer.com/news/security/hidden-threats-how-microsoft-365-backups-store-risks-for-future-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8657861 False Malware,Threat,Cloud None 3.0000000000000000 Bleeping Computer - Magazine Américain Oracle nie la violation après que le pirate prétend le vol de 6 millions d'enregistrements de données<br>Oracle denies breach after hacker claims theft of 6 million data records Oracle denies it was breached after a threat actor claimed to be selling 6 million data records allegedly stolen from the company\'s Oracle Cloud federated SSO login servers [...]]]> 2025-03-21T16:43:51+00:00 https://www.bleepingcomputer.com/news/security/oracle-denies-data-breach-after-hacker-claims-theft-of-6-million-data-records/ www.secnews.physaphae.fr/article.php?IdArticle=8657271 False Threat,Cloud None 2.0000000000000000 Bleeping Computer - Magazine Américain Flaw en clic zéro-cliquet corrigé exploité dans des attaques de logiciels spy<br>WhatsApp patched zero-click flaw exploited in Paragon spyware attacks WhatsApp has patched a zero-click, zero-day vulnerability used to install Paragon\'s Graphite spyware following reports from security researchers at the University of Toronto\'s Citizen Lab. [...]]]> 2025-03-19T12:02:20+00:00 https://www.bleepingcomputer.com/news/security/whatsapp-patched-zero-day-flaw-used-in-paragon-spyware-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8656719 False Vulnerability,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Nouveau-jour Zero-Day exploité par 11 groupes de piratage d'État depuis 2017<br>New Windows zero-day exploited by 11 state hacking groups since 2017 At least 11 state-backed hacking groups from North Korea, Iran, Russia, and China have been exploiting a new Windows vulnerability in data theft and cyber espionage zero-day attacks since 2017. [...]]]> 2025-03-18T13:11:24+00:00 https://www.bleepingcomputer.com/news/security/new-windows-zero-day-exploited-by-11-state-hacking-groups-since-2017/ www.secnews.physaphae.fr/article.php?IdArticle=8656512 False Vulnerability,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Attaque de la chaîne d'approvisionnement contre l'action GitHub populaire expose les secrets CI / CD<br>Supply chain attack on popular GitHub Action exposes CI/CD secrets A supply chain attack on the widely used \'tj-actions/changed-files\' GitHub Action, used by 23,000 repositories, potentially allowed threat actors to steal CI/CD secrets from GitHub Actions build logs. [...]]]> 2025-03-17T11:24:46+00:00 https://www.bleepingcomputer.com/news/security/supply-chain-attack-on-popular-github-action-exposes-ci-cd-secrets/ www.secnews.physaphae.fr/article.php?IdArticle=8656264 False Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Le nouveau logiciel spyware Android nord-coréen se glisse sur Google Play<br>New North Korean Android spyware slips onto Google Play A new Android spyware named \'KoSpy\' is linked to North Korean threat actors who have infiltrated Google Play and third-party app store APKPure through at least five malicious apps. [...]]]> 2025-03-12T13:35:10+00:00 https://www.bleepingcomputer.com/news/security/new-north-korean-android-spyware-slips-onto-google-play/ www.secnews.physaphae.fr/article.php?IdArticle=8655346 False Threat,Mobile None 2.0000000000000000 Bleeping Computer - Magazine Américain La course AI: Dark Ai est en tête, mais la bonne AI rattrape son retard<br>The AI race: Dark AI is in the lead, but good AI is catching up Cybercriminals are using AI for help in planning and conducting cyberattacks-but cybersecurity vendors are fighting back. Learn from Acronis Threat Research Unit about how AI-powered security solutions are closing the gap in the battle against AI-driven cyber threats. [...]]]> 2025-03-11T10:05:33+00:00 https://www.bleepingcomputer.com/news/security/the-ai-race-dark-ai-is-in-the-lead-but-good-ai-is-catching-up/ www.secnews.physaphae.fr/article.php?IdArticle=8655010 False Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Les pirates de typhon de soie ciblent désormais les chaînes d'approvisionnement pour vioder les réseaux<br>Silk Typhoon hackers now target IT supply chains to breach networks Microsoft warns that Chinese cyber-espionage threat group \'Silk Typhoon\' has shifted its tactics, now targeting remote management tools and cloud services in supply chain attacks that give them access to downstream customers. [...]]]> 2025-03-05T13:18:39+00:00 https://www.bleepingcomputer.com/news/security/silk-typhoon-hackers-now-target-it-supply-chains-to-breach-networks/ www.secnews.physaphae.fr/article.php?IdArticle=8653942 False Tool,Threat,Cloud None 2.0000000000000000 Bleeping Computer - Magazine Américain Google fixe Android Zero-Day exploité par les autorités serbes<br>Google fixes Android zero-day exploited by Serbian authorities Google has released patches for 43 vulnerabilities in Android\'s March 2025 security update, including two zero-days. Serbian authorities have used one of the zero-days to unlock confiscated devices. [...]]]> 2025-03-04T06:38:22+00:00 https://www.bleepingcomputer.com/news/security/google-fixes-android-zero-days-exploited-in-targeted-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8653383 False Vulnerability,Threat,Mobile None 2.0000000000000000 Bleeping Computer - Magazine Américain La police serbe a utilisé le piratage de cellebrite zéro pour déverrouiller les téléphones Android<br>Serbian police used Cellebrite zero-day hack to unlock Android phones Serbian authorities have reportedly used an Android zero-day exploit chain developed by Cellebrite to unlock the device of a student activist in the country and attempt to install spyware. [...]]]> 2025-02-28T11:27:18+00:00 https://www.bleepingcomputer.com/news/security/serbian-police-used-cellebrite-zero-day-hack-to-unlock-android-phones/ www.secnews.physaphae.fr/article.php?IdArticle=8652025 False Hack,Vulnerability,Threat,Legislation,Mobile None 3.0000000000000000 Bleeping Computer - Magazine Américain PostgreSQL flaw exploited as zero-day in BeyondTrust breach ​Rapid7\'s vulnerability research team says attackers exploited a PostgreSQL security flaw as a zero-day to breach the network of privileged access management company BeyondTrust in December. [...]]]> 2025-02-14T09:15:47+00:00 https://www.bleepingcomputer.com/news/security/postgresql-flaw-exploited-as-zero-day-in-beyondtrust-breach/ www.secnews.physaphae.fr/article.php?IdArticle=8648500 False Vulnerability,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Chinese espionage tools deployed in RA World ransomware attack A China-based threat actor, tracked as Emperor Dragonfly and commonly associated with cybercriminal endeavors, has been observed using in a ransomware attack a toolset previously attributed to espionage actors. [...]]]> 2025-02-13T09:31:54+00:00 https://www.bleepingcomputer.com/news/security/chinese-espionage-tools-deployed-in-ra-world-ransomware-attack/ www.secnews.physaphae.fr/article.php?IdArticle=8648386 False Ransomware,Tool,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain zkLend loses $9.5M in crypto heist, asks hacker to return 90% Decentralized money lender zkLend suffered a breach where threat actors exploited a smart contract flaw to steal 3,600 Ethereum, worth $9.5 million at the time. [...]]]> 2025-02-12T18:08:09+00:00 https://www.bleepingcomputer.com/news/cryptocurrency/zklend-loses-95m-in-crypto-heist-asks-hacker-to-return-90-percent/ www.secnews.physaphae.fr/article.php?IdArticle=8648291 False Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Fortinet warns of new zero-day exploited to hijack firewalls Fortinet warned today that attackers are exploiting another authentication bypass zero-day bug in FortiOS and FortiProxy to hijack Fortinet firewalls and breach enterprise networks. [...]]]> 2025-02-11T13:56:13+00:00 https://www.bleepingcomputer.com/news/security/fortinet-warns-of-new-zero-day-exploited-to-hijack-firewalls/ www.secnews.physaphae.fr/article.php?IdArticle=8648107 False Vulnerability,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Hackers exploit Cityworks RCE bug to breach Microsoft IIS servers Software vendor Trimble is warning that hackers are exploiting a Cityworks deserialization vulnerability to remotely execute commands on IIS servers and deploy Cobalt Strike beacons for initial network access. [...]]]> 2025-02-07T13:42:44+00:00 https://www.bleepingcomputer.com/news/security/hackers-exploit-cityworks-rce-bug-to-breach-microsoft-iis-servers/ www.secnews.physaphae.fr/article.php?IdArticle=8647472 False Vulnerability,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Hackers exploit SimpleHelp RMM flaws to deploy Sliver malware Hackers are targeting vulnerable SimpleHelp RMM clients to create administrator accounts, drop backdoors, and potentially lay the groundwork for ransomware attacks. [...]]]> 2025-02-06T12:50:54+00:00 https://www.bleepingcomputer.com/news/security/hackers-exploit-simplehelp-rmm-flaws-to-deploy-sliver-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8647262 False Ransomware,Malware,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Google fixes Android kernel zero-day exploited in attacks The February 2025 Android security updates patch 48 vulnerabilities, including a zero-day kernel vulnerability that has been exploited in the wild. [...]]]> 2025-02-03T15:10:22+00:00 https://www.bleepingcomputer.com/news/security/google-fixes-android-kernel-zero-day-exploited-in-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8646654 False Vulnerability,Threat,Mobile None 2.0000000000000000 Bleeping Computer - Magazine Américain DeepSeek AI tools impersonated by infostealer malware on PyPI Threat actors are taking advantage of the rise in popularity of the DeepSeek to promote two malicious infostealer packages on the Python Package Index (PyPI), where they impersonated developer tools for the AI platform. [...]]]> 2025-02-03T11:33:23+00:00 https://www.bleepingcomputer.com/news/security/deepseek-ai-tools-impersonated-by-infostealer-malware-on-pypi/ www.secnews.physaphae.fr/article.php?IdArticle=8646596 False Malware,Tool,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Hackers steal $85 million worth of cryptocurrency from Phemex The Phemex crypto exchange suffered a massive security breach on Thursday where threat actors stole over $85 million worth of cryptocurrency. [...]]]> 2025-01-27T13:03:02+00:00 https://www.bleepingcomputer.com/news/security/hackers-steal-85-million-worth-of-cryptocurrency-from-phemex/ www.secnews.physaphae.fr/article.php?IdArticle=8643424 False Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Clone2Leak attacks exploit Git flaws to steal credentials A set of three distinct but related attacks, dubbed \'Clone2Leak,\' can leak credentials by exploiting how Git and its credential helpers handle authentication requests. [...]]]> 2025-01-27T11:36:38+00:00 https://www.bleepingcomputer.com/news/security/clone2leak-attacks-exploit-git-flaws-to-steal-credentials/ www.secnews.physaphae.fr/article.php?IdArticle=8643400 False Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain TalkTalk investigates breach after data for sale on hacking forum UK telecommunications company TalkTalk is investigating a third-party supplier data breach after a threat actor began selling alleged customer data on a hacking forum. [...]]]> 2025-01-25T16:23:24+00:00 https://www.bleepingcomputer.com/news/security/talktalk-investigates-breach-after-data-for-sale-on-hacking-forum/ www.secnews.physaphae.fr/article.php?IdArticle=8642650 False Data Breach,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Hacker infects 18,000 "script kiddies" with fake malware builder A threat actor targeted low-skilled hackers, known as "script kiddies," with a fake malware builder that secretly infected them with a backdoor to steal data and take over computers. [...]]]> 2025-01-24T11:34:40+00:00 https://www.bleepingcomputer.com/news/security/hacker-infects-18-000-script-kiddies-with-fake-malware-builder/ www.secnews.physaphae.fr/article.php?IdArticle=8642144 False Malware,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Telegram captcha tricks you into running malicious PowerShell scripts Threat actors on X are exploiting the news around Ross Ulbricht to direct unsuspecting users to a Telegram channel that tricks them into executing PowerShell code that infects them with malware. [...]]]> 2025-01-22T15:35:44+00:00 https://www.bleepingcomputer.com/news/security/telegram-captcha-tricks-you-into-running-malicious-powershell-scripts/ www.secnews.physaphae.fr/article.php?IdArticle=8641263 False Malware,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain HPE investigates breach as hacker claims to steal source code Hewlett Packard Enterprise (HPE) is investigating claims of a new breach after a threat actor said they stole documents from the company\'s developer environments. [...]]]> 2025-01-20T14:06:38+00:00 https://www.bleepingcomputer.com/news/security/hewlett-packard-enterprise-investigates-new-breach-claims/ www.secnews.physaphae.fr/article.php?IdArticle=8640251 False Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Otelier data breach exposes info, hotel reservations of millions Hotel management platform Otelier suffered a data breach after threat actors breached its Amazon S3 cloud storage to steal millions of guests\' personal information and reservations for well-known hotel brands like Marriott, Hilton, and Hyatt. [...]]]> 2025-01-17T15:17:22+00:00 https://www.bleepingcomputer.com/news/security/otelier-data-breach-exposes-info-hotel-reservations-of-millions/ www.secnews.physaphae.fr/article.php?IdArticle=8638916 False Data Breach,Threat,Cloud None 3.0000000000000000 Bleeping Computer - Magazine Américain US sanctions Chinese firm, hacker behind telecom and Treasury hacks The U.S. Department of the Treasury\'s Office of Foreign Assets Control (OFAC) has sanctioned Yin Kecheng, a Shanghai-based hacker for his role in the recent Treasury breach and a company associated with the Salt Typhoon threat group. [...]]]> 2025-01-17T11:57:01+00:00 https://www.bleepingcomputer.com/news/security/us-sanctions-chinese-firm-hacker-behind-telecom-and-treasury-hacks/ www.secnews.physaphae.fr/article.php?IdArticle=8638825 False Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Hackers use FastHTTP in new high-speed Microsoft 365 password attacks Threat actors are utilizing the FastHTTP Go library to launch high-speed brute-force password attacks targeting Microsoft 365 accounts globally. [...]]]> 2025-01-14T10:57:07+00:00 https://www.bleepingcomputer.com/news/security/hackers-use-fasthttp-in-new-high-speed-microsoft-365-password-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8637199 False Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Fortinet warns of auth bypass zero-day exploited to hijack firewalls ​Attackers are exploiting a new authentication bypass zero-day vulnerability in FortiOS and FortiProxy to hijack Fortinet firewalls and breach enterprise networks. [...]]]> 2025-01-14T10:24:27+00:00 https://www.bleepingcomputer.com/news/security/fortinet-warns-of-auth-bypass-zero-day-exploited-to-hijack-firewalls/ www.secnews.physaphae.fr/article.php?IdArticle=8637200 False Vulnerability,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Stolen Path of Exile 2 admin account used to hack player accounts Path of Exile 2 developers confirmed that a hacked admin account allowed a threat actor to change the password and access at least 66 accounts, finally explaining how PoE 2 accounts have been breached since November. [...]]]> 2025-01-13T15:33:46+00:00 https://www.bleepingcomputer.com/news/security/stolen-path-of-exile-2-admin-account-used-to-hack-player-accounts/ www.secnews.physaphae.fr/article.php?IdArticle=8636854 False Hack,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain UK domain registry Nominet confirms breach via Ivanti zero-day Nominet, the official .UK domain registry and one of the largest country code registries, has confirmed that its network was breached two weeks ago using an Ivanti VPN zero-day vulnerability. [...]]]> 2025-01-13T11:50:12+00:00 https://www.bleepingcomputer.com/news/security/uk-domain-registry-nominet-confirms-breach-via-ivanti-zero-day-vulnerability/ www.secnews.physaphae.fr/article.php?IdArticle=8636780 False Vulnerability,Threat None 4.0000000000000000 Bleeping Computer - Magazine Américain Fake LDAPNightmware exploit on GitHub spreads infostealer malware A deceptive proof-of-concept (PoC) exploit for CVE-2024-49113 (aka "LDAPNightmare") on GitHub infects users with infostealer malware that exfiltrates sensitive data to an external FTP server. [...]]]> 2025-01-11T10:21:31+00:00 https://www.bleepingcomputer.com/news/security/fake-ldapnightmware-exploit-on-github-spreads-infostealer-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8636035 False Malware,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain New Web3 attack exploits transaction simulations to steal crypto Threat actors are employing a new tactic called "transaction simulation spoofing" to steal crypto, with one attack successfully stealing 143.45 Ethereum, worth approximately $460,000. [...]]]> 2025-01-10T13:12:17+00:00 https://www.bleepingcomputer.com/news/security/new-web3-attack-exploits-transaction-simulations-to-steal-crypto/ www.secnews.physaphae.fr/article.php?IdArticle=8635730 False Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Google: Chinese hackers likely behind Ivanti VPN zero-day attacks Hackers exploiting the critical Ivanti Connect Secure zero-day vulnerability disclosed yesterday installed on compromised VPN appliances new malware called \'Dryhook\' and \'Phasejam\' that is not currently associated with any threat group. [...]]]> 2025-01-09T11:11:20+00:00 https://www.bleepingcomputer.com/news/security/google-chinese-hackers-likely-behind-ivanti-vpn-zero-day-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8635336 False Malware,Vulnerability,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Ivanti warns of new Connect Secure flaw used in zero-day attacks Ivanti is warning that a new Connect Secure remote code execution vulnerability tracked as CVE-2025-0282 was exploited in zero-day attacks to install malware on appliances. [...]]]> 2025-01-08T15:43:34+00:00 https://www.bleepingcomputer.com/news/security/ivanti-warns-of-new-connect-secure-flaw-used-in-zero-day-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8635045 False Malware,Vulnerability,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain UN aviation agency confirms recruitment database security breach ​The United Nations\' International Civil Aviation Organization (ICAO) has confirmed that a threat actor has stolen approximately 42,000 records after hacking into its recruitment database. [...]]]> 2025-01-08T08:30:46+00:00 https://www.bleepingcomputer.com/news/security/un-aviation-agency-confirms-recruitment-database-security-breach/ www.secnews.physaphae.fr/article.php?IdArticle=8634902 False Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain PowerSchool hack exposes student, teacher data from K-12 districts Education software giant PowerSchool has confirmed it suffered a cybersecurity incident that allowed a threat actor to steal the personal information of students and teachers from school districts using its PowerSchool SIS platform. [...]]]> 2025-01-07T23:26:09+00:00 https://www.bleepingcomputer.com/news/security/powerschool-hack-exposes-student-teacher-data-from-k-12-districts/ www.secnews.physaphae.fr/article.php?IdArticle=8634751 False Hack,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Malware botnets exploit outdated D-Link routers in recent attacks Two botnets tracked as \'Ficora\' and \'Capsaicin\' have recorded increased activity in targeting D-Link routers that have reached end of life or are running outdated firmware versions. [...]]]> 2024-12-29T10:09:28+00:00 https://www.bleepingcomputer.com/news/security/malware-botnets-exploit-outdated-d-link-routers-in-recent-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8631557 False Malware,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Hackers exploit DoS flaw to disable Palo Alto Networks firewalls Palo Alto Networks is warning that hackers are exploiting the CVE-2024-3393 denial of service vulnerability to disable firewall protections by forcing it to reboot. [...]]]> 2024-12-27T11:33:21+00:00 https://www.bleepingcomputer.com/news/security/hackers-exploit-dos-flaw-to-disable-palo-alto-networks-firewalls/ www.secnews.physaphae.fr/article.php?IdArticle=8630648 False Vulnerability,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Cybersecurity firm\\'s Chrome extension hijacked to steal users\\' data At least five Chrome extensions were compromised in a coordinated attack where a threat actor injected code that steals sensitive information from users. [...]]]> 2024-12-27T10:39:23+00:00 https://www.bleepingcomputer.com/news/security/cybersecurity-firms-chrome-extension-hijacked-to-steal-users-data/ www.secnews.physaphae.fr/article.php?IdArticle=8630631 False Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain New \\'OtterCookie\\' malware used to backdoor devs in fake job offers North Korean threat actors are using new malware called OtterCookie in the Contagious Interview campaign that is targeting software developers. [...]]]> 2024-12-26T11:53:10+00:00 https://www.bleepingcomputer.com/news/security/new-ottercookie-malware-used-to-backdoor-devs-in-fake-job-offers/ www.secnews.physaphae.fr/article.php?IdArticle=8630269 False Malware,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Malicious Rspack, Vant packages published using stolen NPM tokens Three popular npm packages, @rspack/core, @rspack/cli, and Vant, were compromised through stolen npm account tokens, allowing threat actors to publish malicious versions that installed cryptominers. [...]]]> 2024-12-20T12:47:54+00:00 https://www.bleepingcomputer.com/news/security/malicious-rspack-vant-packages-published-using-stolen-npm-tokens/ www.secnews.physaphae.fr/article.php?IdArticle=8628042 False Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain \\'Bitter\\' cyberspies target defense orgs with new MiyaRAT malware A cyberespionage threat group known as \'Bitter\' was observed targeting defense organizations in Turkey using a novel malware family named MiyaRAT. [...]]]> 2024-12-17T17:29:44+00:00 https://www.bleepingcomputer.com/news/security/bitter-cyberspies-target-defense-orgs-with-new-miyarat-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8626774 False Malware,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain New Android NoviSpy spyware linked to Qualcomm zero-day bugs The Serbian government exploited Qualcomm zero-days to unlock and infect Android devices with a new spyware named \'NoviSpy,\' used to spy on activists, journalists, and protestors. [...]]]> 2024-12-16T10:06:16+00:00 https://www.bleepingcomputer.com/news/security/new-android-novispy-spyware-linked-to-qualcomm-zero-day-bugs/ www.secnews.physaphae.fr/article.php?IdArticle=8626085 False Vulnerability,Threat,Mobile None 2.0000000000000000 Bleeping Computer - Magazine Américain Clop ransomware claims responsibility for Cleo data theft attacks The Clop ransomware gang has confirmed to BleepingComputer that they are behind the recent Cleo data-theft attacks, utilizing zero-day exploits to breach corporate networks and steal data. [...]]]> 2024-12-15T15:15:00+00:00 https://www.bleepingcomputer.com/news/security/clop-ransomware-claims-responsibility-for-cleo-data-theft-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8625694 False Ransomware,Vulnerability,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain 390,000 WordPress accounts stolen from hackers in supply chain attack A threat actor tracked as MUT-1244 has stolen over 390,000 WordPress credentials in a large-scale, year-long campaign targeting other threat actors using a trojanized WordPress credentials checker. [...]]]> 2024-12-14T10:17:27+00:00 https://www.bleepingcomputer.com/news/security/390-000-wordpress-accounts-stolen-from-hackers-in-supply-chain-attack/ www.secnews.physaphae.fr/article.php?IdArticle=8625209 False Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain New IOCONTROL malware used in critical infrastructure attacks Iranian threat actors are utilizing a new malware named IOCONTROL to compromise Internet of Things (IoT) devices and OT/SCADA systems used by critical infrastructure in Israel and the United States. [...]]]> 2024-12-12T15:46:32+00:00 https://www.bleepingcomputer.com/news/security/new-iocontrol-malware-used-in-critical-infrastructure-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8624213 False Malware,Threat,Industrial None 3.0000000000000000 Bleeping Computer - Magazine Américain Russian cyber spies hide behind other hackers to target Ukraine Russian cyber-espionage group Turla, aka "Secret Blizzard," is utilizing other threat actors\' infrastructure to target Ukrainian military devices connected via Starlink. [...]]]> 2024-12-11T12:00:00+00:00 https://www.bleepingcomputer.com/news/security/russian-cyber-spies-hide-behind-other-hackers-to-target-ukraine/ www.secnews.physaphae.fr/article.php?IdArticle=8623643 False Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain New Cleo zero-day RCE flaw exploited in data theft attacks Hackers are actively exploiting a zero-day vulnerability in Cleo managed file transfer software to breach corporate networks and conduct data theft attacks. [...]]]> 2024-12-10T10:09:52+00:00 https://www.bleepingcomputer.com/news/security/new-cleo-zero-day-rce-flaw-exploited-in-data-theft-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8622919 False Vulnerability,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Inside the incident: Uncovering an advanced phishing attack Recently, Varonis investigated a phishing campaign in which a malicious email enabled a threat actor to access the organization. This blog post will reveal the tactics used to avoid detection and share what was discovered during the investigation. [...]]]> 2024-12-10T10:01:11+00:00 https://www.bleepingcomputer.com/news/security/inside-the-incident-uncovering-an-advanced-phishing-attack/ www.secnews.physaphae.fr/article.php?IdArticle=8622920 False Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Russian hackers hijack Pakistani hackers\' servers for their own attacks The notorious Russian cyber-espionage group Turla is hacking other hackers, hijacking the Pakistani threat actor Storm-0156\'s infrastructure to launch their own covert attacks on already compromised networks. [...]]]> 2024-12-04T12:00:00+00:00 https://www.bleepingcomputer.com/news/security/russian-hackers-hijack-pakistani-hackers-servers-for-their-own-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8619938 False Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Russian hackers hijack Pakistani hackers\\' servers for their own attacks The notorious Russian cyber-espionage group Turla is hacking other hackers, hijacking the Pakistani threat actor Storm-0156\'s infrastructure to launch their own covert attacks on already compromised networks. [...]]]> 2024-12-04T12:00:00+00:00 https://www.bleepingcomputer.com/news/security/russian-turla-hackers-hijack-pakistani-apt-servers-for-cyber-espionage-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8619552 False Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Hackers exploit critical bug in Array Networks SSL VPN products America\'s Cyber Defense Agency has received evidence of hackers actively exploiting a remote code execution vulnerability in SSL VPN products Array Networks AG and vxAG ArrayOS. [...]]]> 2024-11-26T08:26:33+00:00 https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-bug-in-array-networks-ssl-vpn-products/ www.secnews.physaphae.fr/article.php?IdArticle=8617877 False Vulnerability,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Over 2,000 Palo Alto firewalls hacked using recently patched bugs Hackers have already compromised thousands of Palo Alto Networks firewalls in attacks exploiting two recently patched zero-day vulnerability vulnerabilities. [...]]]> 2024-11-21T14:46:48+00:00 https://www.bleepingcomputer.com/news/security/over-2-000-palo-alto-firewalls-hacked-using-recently-patched-bugs/ www.secnews.physaphae.fr/article.php?IdArticle=8615616 False Vulnerability,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Cyberattack at French hospital exposes health data of 750,000 patients A data breach at an unnamed French hospital exposed the medical records of 750,000 patients after a threat actor gained access to its electronic patient record system. [...]]]> 2024-11-20T21:20:19+00:00 https://www.bleepingcomputer.com/news/security/cyberattack-at-french-hospital-exposes-health-data-of-750-000-patients/ www.secnews.physaphae.fr/article.php?IdArticle=8615120 False Data Breach,Threat,Medical None 2.0000000000000000 Bleeping Computer - Magazine Américain Fintech giant Finastra investigates data breach after SFTP hack Finastra has confirmed it warned customers of a cybersecurity incident after a threat actor began selling allegedly stolen data on a hacking forum. [...]]]> 2024-11-20T15:56:59+00:00 https://www.bleepingcomputer.com/news/security/fintech-giant-finastra-investigates-data-breach-after-sftp-hack/ www.secnews.physaphae.fr/article.php?IdArticle=8614958 False Data Breach,Hack,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Ford rejects breach allegations, says customer data not impacted Ford is investigating allegations that it suffered a data breach after a threat actor claimed to leak 44,000 customer records on a hacking forum. [...]]]> 2024-11-19T15:09:14+00:00 https://www.bleepingcomputer.com/news/security/ford-rejects-breach-allegations-says-customer-data-not-impacted/ www.secnews.physaphae.fr/article.php?IdArticle=8615277 False Data Breach,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Microsoft launches Zero Day Quest hacking event with $4 million in rewards ​Microsoft announced today at its Ignite annual conference in Chicago, Illinois, that it\'s expanding its bug bounty programs with Zero Day Quest, a new hacking event focusing on cloud and AI products and platforms. [...]]]> 2024-11-19T08:30:00+00:00 https://www.bleepingcomputer.com/news/microsoft/microsoft-launches-zero-day-quest-hacking-event-with-4-million-in-rewards/ www.secnews.physaphae.fr/article.php?IdArticle=8614089 False Threat,Cloud,Conference None 2.0000000000000000 Bleeping Computer - Magazine Américain Phishing emails increasingly use SVG attachments to evade detection Threat actors increasingly use Scalable Vector Graphics (SVG) attachments to display phishing forms or deploy malware while evading detection. [...]]]> 2024-11-17T11:25:36+00:00 https://www.bleepingcomputer.com/news/security/phishing-emails-increasingly-use-svg-attachments-to-evade-detection/ www.secnews.physaphae.fr/article.php?IdArticle=8612953 False Malware,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain NSO Group used another WhatsApp zero-day after being sued, court docs say Israeli surveillance firm NSO Group reportedly used multiple zero-day exploits, including an unknown one named "Erised," that leveraged WhatsApp vulnerabilities to deploy Pegasus spyware in zero-click attacks, even after getting sued. [...]]]> 2024-11-15T17:04:18+00:00 https://www.bleepingcomputer.com/news/security/nso-group-used-another-whatsapp-zero-day-after-being-sued-court-docs-say/ www.secnews.physaphae.fr/article.php?IdArticle=8611942 False Vulnerability,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Botnet exploits GeoVision zero-day to install Mirai malware A malware botnet is exploiting a zero-day vulnerability in end-of-life GeoVision devices to compromise and recruit them for likely DDoS or cryptomining attacks. [...]]]> 2024-11-15T14:39:01+00:00 https://www.bleepingcomputer.com/news/security/botnet-exploits-geovision-zero-day-to-install-mirai-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8611890 False Malware,Vulnerability,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Les bogues Mazda Connect non corrigées Laissent les pirates d'installation de logiciels malveillants persistants<br>Unpatched Mazda Connect bugs let hackers install persistent malware Attackers could exploit several vulnerabilities in the Mazda Connect infotainment unit, present in multiple car models including Mazda 3 (2014-2021), to execute arbitrary code with root permission. [...]]]> 2024-11-08T12:48:19+00:00 https://www.bleepingcomputer.com/news/security/unpatched-mazda-connect-bugs-let-hackers-install-persistent-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8608212 False Malware,Vulnerability,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Les pirates nord-coréens utilisent de nouveaux logiciels malveillants de macOS contre les entreprises cryptographiques<br>North Korean hackers use new macOS malware against crypto firms North Korean threat actor BlueNoroff has been targeting crypto-related businesses with a new multi-stage malware for macOS systems. [...]]]> 2024-11-07T17:15:24+00:00 https://www.bleepingcomputer.com/news/security/north-korean-hackers-use-new-macos-malware-against-crypto-firms/ www.secnews.physaphae.fr/article.php?IdArticle=8607772 False Malware,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Google corrige deux jours zéro Android utilisés dans les attaques ciblées<br>Google fixes two Android zero-days used in targeted attacks Google fixed two actively exploited Android zero-day flaws as part of its November security updates, addressing a total of 51 vulnerabilities. [...]]]> 2024-11-05T09:30:58+00:00 https://www.bleepingcomputer.com/news/security/google-fixes-two-android-zero-days-used-in-targeted-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8606468 False Vulnerability,Threat,Mobile None 2.0000000000000000 Bleeping Computer - Magazine Américain Schneider Electric confirme la violation de la plate-forme de développement après le pirate vole des données<br>Schneider Electric confirms dev platform breach after hacker steals data Schneider Electric has confirmed a developer platform was breached after a threat actor claimed to steal 40GB of data from the company\'s JIRA server. [...]]]> 2024-11-04T14:22:36+00:00 https://www.bleepingcomputer.com/news/security/schneider-electric-confirms-dev-platform-breach-after-hacker-steals-data/ www.secnews.physaphae.fr/article.php?IdArticle=8606086 False Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain MALWARE MALWARE CUSTO CUSTOM "Utilisé dans Sophos Firewall Hack sur GOVT Network<br>Custom "Pygmy Goat" malware used in Sophos Firewall hack on govt network UK\'s National Cyber Security Centre (NCSC) has published an analysis of a Linux malware named "Pigmy Goat" created to backdoor Sophos XG firewall devices as part of recently disclosed attacks by Chinese threat actors. [...]]]> 2024-11-04T12:46:34+00:00 https://www.bleepingcomputer.com/news/security/custom-pygmy-goat-malware-used-in-sophos-firewall-hack-on-govt-network/ www.secnews.physaphae.fr/article.php?IdArticle=8606049 False Malware,Hack,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Cisco dit que la fuite du site Devhub a gagné \\ 'ne permette pas de futures violations<br>Cisco says DevHub site leak won\\'t enable future breaches ​Cisco says that non-public files recently downloaded by a threat actor from a misconfigured public-facing DevHub portal don\'t contain information that could be exploited in future breaches of the company\'s systems. [...]]]> 2024-11-04T04:14:37+00:00 https://www.bleepingcomputer.com/news/security/cisco-says-devhub-site-leak-wont-enable-future-breaches/ www.secnews.physaphae.fr/article.php?IdArticle=8605867 False Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Microsoft: les pirates chinois utilisent le botnet Quad7 pour voler des informations d'identification<br>Microsoft: Chinese hackers use Quad7 botnet to steal credentials Microsoft warns that Chinese threat actors use the Quad7 botnet, compromised of hacked SOHO routers, to steal credentials in password-spray attacks. [...]]]> 2024-10-31T16:03:43+00:00 https://www.bleepingcomputer.com/news/security/microsoft-chinese-hackers-use-quad7-botnet-to-steal-credentials/ www.secnews.physaphae.fr/article.php?IdArticle=8604329 False Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Interbank confirme la violation des données après l'extorsion échouée, fuite de données<br>Interbank confirms data breach following failed extortion, data leak ​Interbank, one of Peru\'s leading financial institutions, has confirmed a data breach after a threat actor who hacked into its systems leaked stolen data online. [...]]]> 2024-10-30T18:22:27+00:00 https://www.bleepingcomputer.com/news/security/interbank-confirms-data-breach-following-failed-extortion-data-leak/ www.secnews.physaphae.fr/article.php?IdArticle=8603927 False Data Breach,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain QNAP corrige le logiciel de sauvegarde NAS exploité à Pwn2own<br>QNAP fixes NAS backup software zero-day exploited at Pwn2Own QNAP has fixed a critical zero-day vulnerability exploited by security researchers on Thursday to hack a TS-464 NAS device during the Pwn2Own Ireland 2024 competition. [...]]]> 2024-10-29T13:35:13+00:00 https://www.bleepingcomputer.com/news/security/qnap-fixes-nas-backup-software-zero-day-exploited-at-pwn2own/ www.secnews.physaphae.fr/article.php?IdArticle=8603375 False Hack,Vulnerability,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain La Russie cible les conscrits ukrainiens avec Windows, Android Malware<br>Russia targets Ukrainian conscripts with Windows, Android malware A hybrid espionage/influence campaign conducted by the Russian threat group \'UNC5812\' has been uncovered, targeting Ukrainian military recruits with Windows and Android malware. [...]]]> 2024-10-28T14:36:32+00:00 https://www.bleepingcomputer.com/news/security/russia-targets-ukrainian-conscripts-with-windows-android-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8602938 False Malware,Threat,Mobile None 3.0000000000000000 Bleeping Computer - Magazine Américain Les nouvelles fonctionnalités Cisco ASA et FTD bloquent les attaques de mot de passe VPN Brute-Force<br>New Cisco ASA and FTD features block VPN brute-force password attacks Cisco has added new security features that significantly mitigate brute-force and password spray attacks on Cisco ASA and Firepower Threat Defense (FTD), helping protect the network from breaches and reducing resource utilization on devices. [...]]]> 2024-10-26T10:31:41+00:00 https://www.bleepingcomputer.com/news/security/new-cisco-asa-and-ftd-features-block-vpn-brute-force-password-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8602122 False Threat None 3.0000000000000000