www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2025-05-12T15:21:16+00:00 www.secnews.physaphae.fr HackRead - Chercher Cyber European Cyber Report 2025: 137% more DDoS attacks than last year – what companies need to know Frankfurt am Main, Germany, 17th March 2025, CyberNewsWire]]> 2025-03-17T09:30:07+00:00 https://hackread.com/european-cyber-report-2025-137-more-ddos-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8656211 False None None 3.0000000000000000 HackRead - Chercher Cyber Sécurité de démarrage 101: Comment protéger votre entreprise contre le risque de cybersécurité<br>Start-up Security 101: How to Protect Your Venture from Cybersecurity Risk Did you know that 43% of cyberattacks target small businesses, yet only 14% are prepared to defend themselves?…]]> 2025-03-16T21:57:32+00:00 https://hackread.com/start-up-security-protect-venture-cybersecurity-risk/ www.secnews.physaphae.fr/article.php?IdArticle=8656105 False None None 3.0000000000000000 HackRead - Chercher Cyber Développeur de verrouillage Rostislav Panev extradé d'Israël aux États-Unis<br>LockBit Developer Rostislav Panev Extradited from Israel to the US The US extradites LockBit ransomware developer, Rostislav Panev, from Israel. Learn how his arrest impacts the fight against…]]> 2025-03-16T10:10:58+00:00 https://hackread.com/lockbit-developer-rostislav-panev-extradited-israel-us/ www.secnews.physaphae.fr/article.php?IdArticle=8656034 False Ransomware None 2.0000000000000000 HackRead - Chercher Cyber Cybersecurity in Crypto: meilleures pratiques pour empêcher le vol et la fraude<br>Cybersecurity in Crypto: Best Practices to Prevent Theft and Fraud Cybersecurity tips to protect your cryptocurrency from hackers, scams, and fraud. Learn best practices for securing digital assets…]]> 2025-03-15T15:04:34+00:00 https://hackread.com/cybersecurity-crypto-practices-to-prevent-theft-fraud/ www.secnews.physaphae.fr/article.php?IdArticle=8655918 False None None 2.0000000000000000 HackRead - Chercher Cyber Symantec démontre l'agent opérateur d'Openai \\ dans l'attaque de phishing POC<br>Symantec Demonstrates OpenAI\\'s Operator Agent in PoC Phishing Attack Symantec demonstrates OpenAI\'s Operator Agent in PoC phishing attack, highlighting AI security risks and the need for proper cybersecurity.]]> 2025-03-14T18:36:58+00:00 https://hackread.com/symantec-openai-operator-agent-poc-phishing-attack/ www.secnews.physaphae.fr/article.php?IdArticle=8655789 False None None 3.0000000000000000 HackRead - Chercher Cyber Nouveau astuce d'escroquerie Microsoft 365 Phishing<br>New Microsoft 365 Phishing Scam Tricks Users Into Calling Fake Support New Microsoft 365 phishing scam exploits fake support numbers to steal credentials. Learn how attackers bypass security and how to stay protected.]]> 2025-03-14T13:22:50+00:00 https://hackread.com/new-microsoft-365-phishing-scam-calling-fake-support/ www.secnews.physaphae.fr/article.php?IdArticle=8655744 False None None 3.0000000000000000 HackRead - Chercher Cyber AI Chatbot Deepseek R1 peut être manipulé pour créer des logiciels malveillants<br>AI Chatbot DeepSeek R1 Can Be Manipulated to Create Malware Tenable Research reveals that AI chatbot DeepSeek R1 can be manipulated to generate keyloggers and ransomware code. While…]]> 2025-03-14T00:51:27+00:00 https://hackread.com/ai-chatbot-deepseek-r1-manipulated-to-create-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8655639 False Ransomware,Malware None 2.0000000000000000 HackRead - Chercher Cyber Le FBI et la CISA ont envie de permettre au 2FA de contrer les ransomwares de méduse<br>FBI and CISA Urge Enabling 2FA to Counter Medusa Ransomware FBI and CISA warn of Medusa ransomware attacks impacting critical infrastructure. Learn about Medusa’s tactics, prevention tips, and…]]> 2025-03-13T21:00:50+00:00 https://hackread.com/fbi-cisa-urge-enabling-2fa-counter-medusa-ransomware/ www.secnews.physaphae.fr/article.php?IdArticle=8655616 False Ransomware None 3.0000000000000000 HackRead - Chercher Cyber Ransomware atteint un record: 126% de surtension des attaques en février 2025<br>Ransomware Hits Record High: 126% Surge in Attacks in February 2025 February 2025 saw a record 126% surge in ransomware attacks, with Cl0p leading the charge. Hackers exploited file…]]> 2025-03-13T19:07:39+00:00 https://hackread.com/ransomware-attacks-hit-record-high-in-february-2025/ www.secnews.physaphae.fr/article.php?IdArticle=8655601 False Ransomware None 2.0000000000000000 HackRead - Chercher Cyber Base de données HealthTech a exposé 108 Go de dossiers médicaux et d'emploi<br>HealthTech Database Exposed 108GB Medical and Employment Records A misconfigured database exposed 108.8 GB of sensitive data, including information on over 86,000 healthcare workers affiliated with…]]> 2025-03-13T15:53:55+00:00 https://hackread.com/healthtech-database-exposed-medical-employment-records/ www.secnews.physaphae.fr/article.php?IdArticle=8655572 False Medical None 3.0000000000000000 HackRead - Chercher Cyber Nouveau obscure # MALWORES MALWORES cible les utilisateurs avec de faux captchas<br>New OBSCURE#BAT Malware Targets Users with Fake Captchas OBSCURE#BAT malware campaign exploits social engineering & fake software downloads to evade detection, steal data and persist on…]]> 2025-03-13T14:00:39+00:00 https://hackread.com/new-obscurebat-malware-targets-users-fake-captchas/ www.secnews.physaphae.fr/article.php?IdArticle=8655546 False Malware None 2.0000000000000000 HackRead - Chercher Cyber INE Security Alert: Utilisation de la formation de cybersécurité dirigée par l'IA pour contrer les menaces émergentes<br>INE Security Alert: Using AI-Driven Cybersecurity Training to Counter Emerging Threats Cary, North Carolina, 13th March 2025, CyberNewsWire]]> 2025-03-13T10:15:21+00:00 https://hackread.com/ine-security-alert-using-ai-driven-cybersecurity-training-to-counter-emerging-threats/ www.secnews.physaphae.fr/article.php?IdArticle=8655506 False None None 2.0000000000000000 HackRead - Chercher Cyber Modat lance Premier Product, Modat Magnify for Cybersecurity Professionals<br>Modat launches premier product, Modat Magnify for Cybersecurity Professionals The Hague, the Netherlands, 13th March 2025, CyberNewsWire]]> 2025-03-13T09:21:37+00:00 https://hackread.com/modat-launches-premier-product-modat-magnify-for-cybersecurity-professionals/ www.secnews.physaphae.fr/article.php?IdArticle=8655492 False None None 2.0000000000000000 HackRead - Chercher Cyber Les pirates de typhon de volt chinois ont infiltré l'utilité électrique américaine pendant près d'un an<br>Chinese Volt Typhoon Hackers Infiltrated US Electric Utility for Nearly a Year Dragos reveals Volt Typhoon hackers infiltrated a US electric utility for 300 days, collecting sensitive data. Learn how this cyberattack threatens infrastructure.]]> 2025-03-12T23:57:53+00:00 https://hackread.com/chinese-volt-typhoon-hackers-infiltrated-us-electric-grid/ www.secnews.physaphae.fr/article.php?IdArticle=8655408 False None Guam 4.0000000000000000 HackRead - Chercher Cyber Les vulnérabilités de picklescan pourraient permettre aux pirates de contourner les contrôles de sécurité AI<br>Picklescan Vulnerabilities Could Let Hackers Bypass AI Security Checks Sonatype researchers uncover critical vulnerabilities in picklescan. Learn how these flaws impact AI model security, Hugging Face, and…]]> 2025-03-12T17:54:29+00:00 https://hackread.com/picklescan-vulnerabilities-bypass-ai-security-checks/ www.secnews.physaphae.fr/article.php?IdArticle=8655350 False Vulnerability None 2.0000000000000000 HackRead - Chercher Cyber Groupe de cyber-espionnage chinois UNC3886 Routeurs de genévriers arrière<br>Chinese Cyber Espionage Group UNC3886 Backdoored Juniper Routers UNC3886 hackers target Juniper routers with custom backdoor malware, exploiting outdated systems for stealthy access and espionage. Learn how to stay protected.]]> 2025-03-12T16:21:07+00:00 https://hackread.com/chinese-group-unc3886-backdoor-juniper-routers/ www.secnews.physaphae.fr/article.php?IdArticle=8655335 False Malware None 2.0000000000000000 HackRead - Chercher Cyber La plate-forme MDR Cyrebro \\'s Ai-Native gagne de l'argent aux Globee Cybersecurity Awards 2025<br>CYREBRO\\'s AI-Native MDR Platform Earns Silver at the 2025 Globee Cybersecurity Awards Tel Aviv, Israel, 12th March 2025, CyberNewsWire]]> 2025-03-12T13:55:13+00:00 https://hackread.com/cyrebros-ai-native-mdr-platform-earns-silver-at-the-2025-globee-cybersecurity-awards/ www.secnews.physaphae.fr/article.php?IdArticle=8655300 False None None 2.0000000000000000 HackRead - Chercher Cyber Aptori maintenant sur Google Cloud Marketplace pour une sécurité alimentée par l'IA et une correction des risques automatisées<br>Aptori Now on Google Cloud Marketplace for AI-Powered Security and Automated Risk Remediation San Jose, United States / California, 12th March 2025, CyberNewsWire]]> 2025-03-12T13:00:20+00:00 https://hackread.com/aptori-now-on-google-cloud-marketplace-for-ai-powered-security-and-automated-risk-remediation/ www.secnews.physaphae.fr/article.php?IdArticle=8655285 False Cloud None 2.0000000000000000 HackRead - Chercher Cyber La menace croissante des attaques d'API: comment sécuriser vos API en 2025<br>The Rising Threat of API Attacks: How to Secure Your APIs in 2025 API attacks are constantly on the rise, with a recent alarming study showing that 59% of organizations give…]]> 2025-03-12T11:29:24+00:00 https://hackread.com/rising-threat-of-api-attacks-how-to-secure-apis-2025/ www.secnews.physaphae.fr/article.php?IdArticle=8655269 False Threat,Studies None 3.0000000000000000 HackRead - Chercher Cyber Mars 2025 Patch mardi: Microsoft corrige 57 vulnérabilités, 7 zéro jours<br>March 2025 Patch Tuesday: Microsoft Fixes 57 Vulnerabilities, 7 Zero-Days Microsoft\'s March 2025 Patch Tuesday fixes six actively exploited zero-day vulnerabilities, including critical RCE and privilege escalation flaws. Learn how these vulnerabilities impact Windows systems and why immediate patching is essential.]]> 2025-03-12T10:56:12+00:00 https://hackread.com/march-2025-patch-tuesday-microsoft-fixes-vulnerabilities-zero-days/ www.secnews.physaphae.fr/article.php?IdArticle=8655253 False Vulnerability,Threat,Patching None 3.0000000000000000 HackRead - Chercher Cyber Le groupe Lazare a caché la porte dérobée dans de faux packages NPM dans la dernière attaque<br>Lazarus Group Hid Backdoor in Fake npm Packages in Latest Attack Lazarus Group targets developers with malicious npm packages, stealing credentials, crypto, and installing backdoor. Stay alert to protect your projects.]]> 2025-03-12T00:15:21+00:00 https://hackread.com/lazarus-group-backdoor-fake-npm-packages-attack/ www.secnews.physaphae.fr/article.php?IdArticle=8655158 False None APT 38 2.0000000000000000 HackRead - Chercher Cyber Votre serveur d'applications cloud est-il sécurisé? Meilleures pratiques pour la protection des données<br>Is Your Cloud App Server Secure? Best Practices for Data Protection Almost every company nowadays depends on cloud computing since it is a necessary tool in the world of…]]> 2025-03-11T22:25:26+00:00 https://hackread.com/cloud-app-server-secure-data-protection-practices/ www.secnews.physaphae.fr/article.php?IdArticle=8655144 False Tool,Cloud None 2.0000000000000000 HackRead - Chercher Cyber Fake Binance Wallet E-mail promet Trump Coin, installe des logiciels malveillants<br>Fake Binance Wallet Email Promises TRUMP Coin, Installs Malware Scammers use fake Binance wallet emails to lure users with TRUMP Coin, but instead, they install malware that grants hackers full control over victims\' devices.]]> 2025-03-11T19:30:19+00:00 https://hackread.com/fake-binance-wallet-email-trump-coin-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8655110 False Malware None 2.0000000000000000 HackRead - Chercher Cyber Pourquoi les petites et moyennes entreprises adoptent des solutions de blockchain<br>Why Small and Medium Businesses Are Adopting Blockchain Solutions Blockchain technology is revolutionizing industries by enabling secure transactions, decentralization, and transparency. At the same time, Blockchain software…]]> 2025-03-11T18:29:40+00:00 https://hackread.com/why-small-medium-businesses-adopt-blockchain-solutions/ www.secnews.physaphae.fr/article.php?IdArticle=8655095 False None None 2.0000000000000000 HackRead - Chercher Cyber L'ex-employé sabotages Sabotages Systems, fait face à 10 ans<br>Ex-Employee Sabotages Company Systems, Faces Up to 10 Years Disgruntled ex-employee sabotages company systems with malicious code, causing major disruptions and financial losses.  Learn about the case…]]> 2025-03-11T16:34:28+00:00 https://hackread.com/ex-employee-sabotages-company-systems-10-years-prison/ www.secnews.physaphae.fr/article.php?IdArticle=8655064 False None None 2.0000000000000000 HackRead - Chercher Cyber SMS Scam utilise le nom d'Elon Musk \\ pour vendre de faux appareils d'énergie aux utilisateurs américains<br>SMS Scam Uses Elon Musk\\'s Name to Sell Fake Energy Devices to US Users Fake Elon Musk endorsements are used in SMS campaigns to sell bogus energy-saving devices. Learn how to spot…]]> 2025-03-11T13:18:04+00:00 https://hackread.com/sms-scam-elon-musks-sell-fake-energy-devices-usa/ www.secnews.physaphae.fr/article.php?IdArticle=8655013 False None None 3.0000000000000000 HackRead - Chercher Cyber Musk blâme la panne de X (Twitter) sur la cyberattaque, le relie à l'Ukraine<br>Musk Blames X (Twitter) Outage on Cyberattack, Links It to Ukraine Elon Musk has confirmed a massive cyberattack on his social media platform, X (once Twitter), causing widespread technical…]]> 2025-03-11T11:59:28+00:00 https://hackread.com/musk-x-twitter-cyberattack-ukraine-involvement/ www.secnews.physaphae.fr/article.php?IdArticle=8654993 False None None 2.0000000000000000 HackRead - Chercher Cyber Garantex Crypto Exchange saisi, deux inculpés dans le programme de blanchiment<br>Garantex Crypto Exchange Seized, Two Charged in Laundering Scheme International law enforcement disrupts Garantex, a multi-billion-dollar cryptocurrency exchange used for money laundering. Two individuals, Aleksej Besciokov and…]]> 2025-03-10T22:06:28+00:00 https://hackread.com/garantex-crypto-exchange-seized-2-charged-laundering/ www.secnews.physaphae.fr/article.php?IdArticle=8654928 False Legislation None 2.0000000000000000 HackRead - Chercher Cyber Cloud IMS: La confluence de l'innovation et de la sécurité dans les télécommunications modernes<br>Cloud IMS: The Confluence of Innovation and Security in Modern Telecommunications The telecom industry is at a major turning point. With 5G, IoT, and AI reshaping global connectivity, the…]]> 2025-03-10T21:50:46+00:00 https://hackread.com/cloud-ims-confluence-innovation-security-modern-telecommunications/ www.secnews.physaphae.fr/article.php?IdArticle=8654929 False Cloud None 2.0000000000000000 HackRead - Chercher Cyber Plus de 1000 forfaits malveillants ont trouvé l'exploitation des plates-formes open source<br>Over 1000 Malicious Packages Found Exploiting Open-Source Platforms Over 1,000 malicious packages found using low file counts, suspicious installs, and hidden APIs. Learn key detection methods…]]> 2025-03-10T16:48:41+00:00 https://hackread.com/malicious-packages-exploiting-open-source-platforms/ www.secnews.physaphae.fr/article.php?IdArticle=8654904 False None None 3.0000000000000000 HackRead - Chercher Cyber Que se passe-t-il lorsque les notifications push deviennent malveillantes?<br>What Happens When Push Notifications Go Malicious? A Storm of Scams Awaits!]]> 2025-03-08T13:15:33+00:00 https://hackread.com/what-happens-when-push-notifications-go-malicious/ www.secnews.physaphae.fr/article.php?IdArticle=8654694 False None None 2.0000000000000000 HackRead - Chercher Cyber Les échecs OPSEC de EncrypThub \\ exposent son fonctionnement malveillant<br>EncryptHub\\'s OPSEC Failures Expose Its Malware Operation Outpost24’s KrakenLabs reveals EncryptHub’s multi-stage malware campaign, exposing their infrastructure and tactics through critical OPSEC failures. Learn how…]]> 2025-03-07T21:15:02+00:00 https://hackread.com/encrypthub-opsec-failures-expose-malware-operation/ www.secnews.physaphae.fr/article.php?IdArticle=8654638 False Malware None 3.0000000000000000 HackRead - Chercher Cyber Navigation de crypto sans sacrifier votre vie privée<br>Navigating Crypto Without Sacrificing Your Privacy Cryptocurrency offers financial freedom, but it also comes with privacy challenges. Unlike traditional banking, where transactions remain relatively…]]> 2025-03-07T18:09:59+00:00 https://hackread.com/navigating-crypto-without-sacrificing-your-privacy/ www.secnews.physaphae.fr/article.php?IdArticle=8654573 False None None 2.0000000000000000 HackRead - Chercher Cyber Microsoft démantèle l'escroque<br>Microsoft Dismantles Malvertising Scam Using GitHub, Discord, Dropbox Microsoft Threat Intelligence exposes a malvertising campaign exploiting GitHub, Discord, and Dropbox. Discover the multi-stage attack chain, the…]]> 2025-03-07T13:19:56+00:00 https://hackread.com/microsoft-dismantle-malvertising-github-discord-dropbox/ www.secnews.physaphae.fr/article.php?IdArticle=8654528 False Threat None 3.0000000000000000 HackRead - Chercher Cyber L'avenir de l'IA dans la gestion du lieu de travail<br>The Future of AI in Workplace Management Discover how artificial intelligence is shaping the future of workplace management, from optimizing efficiency to enhancing employee experience.…]]> 2025-03-06T20:52:56+00:00 https://hackread.com/the-future-of-ai-in-workplace-management/ www.secnews.physaphae.fr/article.php?IdArticle=8654405 False None None 3.0000000000000000 HackRead - Chercher Cyber Bitcoin et cybersécurité: protéger les actifs numériques dans un monde décentralisé<br>Bitcoin and Cybersecurity: Protecting Digital Assets in a Decentralized World One of the many advancements in the financial system is the adoption of Bitcoin, which has shifted the…]]> 2025-03-06T19:44:27+00:00 https://hackread.com/bitcoin-cybersecurity-protect-decentralized-digital-assets/ www.secnews.physaphae.fr/article.php?IdArticle=8654393 False None None 3.0000000000000000 HackRead - Chercher Cyber Tata Technologies frappé par les ransomwares internationaux de chasseurs, 1,4 To de données à risque<br>Tata Technologies Hit by Hunters International Ransomware, 1.4TB Data at Risk Tata Technologies hit by Hunters International ransomware attack. The group threatened to leak 1.4TB of data. Learn about…]]> 2025-03-06T19:02:21+00:00 https://hackread.com/tata-technologies-hunters-international-ransomware-1tb-data/ www.secnews.physaphae.fr/article.php?IdArticle=8654384 False Ransomware None 3.0000000000000000 HackRead - Chercher Cyber Les logiciels malveillants infectent Linux et MacOS via des packages GO typosquatted<br>Malware Infects Linux and macOS via Typosquatted Go Packages Socket exposes a typosquatting campaign delivering malware to Linux and macOS systems via malicious Go packages. Discover the…]]> 2025-03-06T16:11:52+00:00 https://hackread.com/malware-infects-linux-macos-typosquatted-go-packages/ www.secnews.physaphae.fr/article.php?IdArticle=8654342 False Malware None 3.0000000000000000 HackRead - Chercher Cyber Squarex dévoile des extensions polymorphes qui transforment les infostelleurs en n'importe quelle extension du navigateur - gestionnaires de mots de passe, portefeuilles à risque<br>SquareX Unveils Polymorphic Extensions that Morph Infostealers into Any Browser Extension – Password Managers, Wallets at Risk Palo Alto, Singapore, 6th March 2025, CyberNewsWire]]> 2025-03-06T14:00:22+00:00 https://hackread.com/squarex-unveils-polymorphic-extensions-that-morph-infostealers-into-any-browser-extension-password-managers-wallets-at-risk/ www.secnews.physaphae.fr/article.php?IdArticle=8654280 False None None 4.0000000000000000 HackRead - Chercher Cyber US Charge 12 dans Chinese Hacker Network, offre une récompense de 10 millions de dollars<br>US Charges 12 in Chinese Hacker Network, Offers $10M Reward U.S. indicts 12 in Chinese Hacker-for-Hire Network tied to cyber attacks on governments & media. DOJ offers $10M reward for info on key suspects.]]> 2025-03-06T13:52:10+00:00 https://hackread.com/us-charges-12-in-chinese-hacker-network-10m-reward/ www.secnews.physaphae.fr/article.php?IdArticle=8654281 False None None 3.0000000000000000 HackRead - Chercher Cyber Les pirates déploient Ai Deepfake de YouTube PDG dans l'escroquerie de vol d'identification<br>Hackers Deploy AI Deepfake of YouTube CEO in Credential Theft Scam YouTube CEO Neal Mohan was impersonated in a deepfake phishing scam. Learn about the attack, how to spot…]]> 2025-03-06T12:12:36+00:00 https://hackread.com/hackers-ai-deepfake-youtube-ceo-credential-theft/ www.secnews.physaphae.fr/article.php?IdArticle=8654258 False None None 3.0000000000000000 HackRead - Chercher Cyber Le groupe de typhon de soie chinois cible les outils pour les violations de réseau<br>Chinese Silk Typhoon Group Targets IT Tools for Network Breaches Microsoft warns that Chinese espionage group Silk Typhoon now exploits IT tools like remote management apps and cloud services to breach networks.]]> 2025-03-05T17:25:21+00:00 https://hackread.com/chinese-silk-typhoon-group-it-tools-network-breaches/ www.secnews.physaphae.fr/article.php?IdArticle=8653919 False Tool,Cloud None 3.0000000000000000 HackRead - Chercher Cyber Alli Ai annonce le prochain lancement public de la plate-forme de création de contenu alimentée par l'IA<br>Alli AI Announces Upcoming Public Launch of AI-Powered Content Creation Platform London, United Kingdom, 5th March 2025, CyberNewsWire]]> 2025-03-05T14:56:47+00:00 https://hackread.com/alli-ai-announces-upcoming-public-launch-of-ai-powered-content-creation-platform/ www.secnews.physaphae.fr/article.php?IdArticle=8653856 False None None 2.0000000000000000 HackRead - Chercher Cyber Les pirates exploitent les erreurs de configuration du cloud pour répandre les logiciels malveillants<br>Hackers Exploit Cloud Misconfigurations to Spread Malware Veriti Research reveals 40% of networks allow ‘any/any’ cloud access, exposing critical vulnerabilities. Learn how malware like XWorm…]]> 2025-03-05T10:52:13+00:00 https://hackread.com/hackers-exploit-cloud-misconfigurations-spread-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8653780 False Malware,Vulnerability,Threat,Cloud None 3.0000000000000000 HackRead - Chercher Cyber Ascroquerie de phishing LinkedIn: faux messages inmail diffusant connectwise Trojan<br>LinkedIn Phishing Scam: Fake InMail Messages Spreading ConnectWise Trojan Cofense uncovers new LinkedIn phishing scam delivering ConnectWise RAT. Learn how attackers bypass security with fake InMail emails…]]> 2025-03-05T09:50:17+00:00 https://hackread.com/scammers-fake-linkedin-inmail-deliver-connectwise-trojan/ www.secnews.physaphae.fr/article.php?IdArticle=8653756 False None None 3.0000000000000000 HackRead - Chercher Cyber Des escrocs envoient des lettres de ransom<br>Scammers Mailing Ransom Letters While Posing as BianLian Ransomware Scammers are impersonating BianLian ransomware, and mailing fake ransom letters to businesses. Learn the red flags and how…]]> 2025-03-04T19:39:28+00:00 https://hackread.com/scammers-mailing-ransom-letters-bianlian-ransomware/ www.secnews.physaphae.fr/article.php?IdArticle=8653539 False Ransomware None 2.0000000000000000 HackRead - Chercher Cyber Javaghost utilise les autorisations d'Amazon IAM aux organisations phish<br>JavaGhost Uses Amazon IAM Permissions to Phish Organizations Unit 42 uncovers JavaGhost’s evolving AWS attacks. Learn how this threat actor uses phishing, IAM abuse, and advanced…]]> 2025-03-04T16:44:28+00:00 https://hackread.com/javaghost-uses-amazon-iam-permissions-to-phish/ www.secnews.physaphae.fr/article.php?IdArticle=8653472 False Threat None 2.0000000000000000 HackRead - Chercher Cyber Les chasseurs annoncent de nouvelles capacités d'IA avec Pathfinder IA pour l'automatisation SoC plus intelligente<br>Hunters Announces New AI Capabilities with Pathfinder AI for Smarter SOC Automation Boston and Tel Aviv, United States, 4th March 2025, CyberNewsWire]]> 2025-03-04T16:10:14+00:00 https://hackread.com/hunters-announces-new-ai-capabilities-with-pathfinder-ai-for-smarter-soc-automation/ www.secnews.physaphae.fr/article.php?IdArticle=8653473 False None None 3.0000000000000000 HackRead - Chercher Cyber Le nouveau voleur de zhong chinois infecte fintech via le support client<br>New Chinese Zhong Stealer Infects Fintech via Customer Support A new malware threat called Zhong Stealer has surfaced from China, and it\'s already slipping into businesses through…]]> 2025-03-04T12:06:26+00:00 https://hackread.com/chinese-zhong-stealer-infects-fintech-customer-support/ www.secnews.physaphae.fr/article.php?IdArticle=8653387 False Malware,Threat None 2.0000000000000000 HackRead - Chercher Cyber Services SEO alimentés par AI: révolutionner le marketing numérique<br>AI-powered SEO services: revolutionizing digital marketing Artificial Intelligence is a tool that is currently changing how businesses approach digital marketing and SEO. Explore how your business can transform with AI-powered SEO services here.]]> 2025-03-03T21:27:47+00:00 https://hackread.com/ai-powered-seo-services-revolutionizing-digital-marketing/ www.secnews.physaphae.fr/article.php?IdArticle=8653162 False Tool None 2.0000000000000000 HackRead - Chercher Cyber Bubba AI, Inc. lance Comp AI pour aider 100 000 startups à obtenir la conformité SOC 2 d'ici 2032.<br>Bubba AI, Inc. is launching Comp AI to help 100,000 startups get SOC 2 compliant by 2032. San Francisco, California, 3rd March 2025, CyberNewsWire]]> 2025-03-03T20:16:17+00:00 https://hackread.com/bubba-ai-inc-is-launching-comp-ai-to-help-100000-startups-get-soc-2-compliant-by-2032/ www.secnews.physaphae.fr/article.php?IdArticle=8653143 False None None 2.0000000000000000 HackRead - Chercher Cyber Faux de prise en charge informatique Trick Microsoft Teams Les utilisateurs dans l'installation des ransomwares<br>Fake IT Support Calls Trick Microsoft Teams Users into Installing Ransomware Cybercriminals pose as IT support, using fake calls and Microsoft Teams messages to trick users into installing ransomware through email floods and remote access.]]> 2025-03-03T19:23:00+00:00 https://hackread.com/fake-it-support-calls-microsoft-teams-users-install-ransomware/ www.secnews.physaphae.fr/article.php?IdArticle=8653111 False Ransomware None 3.0000000000000000 HackRead - Chercher Cyber Comment automatiser les questionnaires de sécurité et réduire le temps de réponse<br>How to Automate Security Questionnaires and Reduce Response Time Security questionnaires take a lot of time and repetitively answering the same questions manually chews up business time…]]> 2025-03-03T16:13:49+00:00 https://hackread.com/automate-security-questionnaires-reduce-response-time/ www.secnews.physaphae.fr/article.php?IdArticle=8653053 False None None 3.0000000000000000 HackRead - Chercher Cyber Une nouvelle campagne de logiciels malveillants exploite API Microsoft Graph pour infecter Windows<br>New Malware Campaign Exploits Microsoft Graph API to Infect Windows FortiGuard Labs discovers an advanced attack using modified Havoc Demon and SharePoint. Explore the attack\'s evasion techniques and security measures.]]> 2025-03-03T14:09:18+00:00 https://hackread.com/malware-exploits-microsoft-graph-api-infect-windows/ www.secnews.physaphae.fr/article.php?IdArticle=8653018 False Malware None 3.0000000000000000 HackRead - Chercher Cyber Mozilla modifie les termes Firefox après un tumulte sur les données d'utilisation du langage<br>Mozilla Tweaks Firefox Terms After Uproar Over Data Use Language Firefox’s new Terms of Use spark user backlash over data rights. Learn how Mozilla responded to concerns about…]]> 2025-03-03T13:05:10+00:00 https://hackread.com/mozilla-tweaks-firefox-terms-over-data-use-language/ www.secnews.physaphae.fr/article.php?IdArticle=8652978 False None None 3.0000000000000000 HackRead - Chercher Cyber La montée du phishing QR: comment les escrocs exploitent les codes QR et comment rester en sécurité<br>The Rise of QR Phishing: How Scammers Exploit QR Codes and How to Stay Safe QR phishing is on the rise, tricking users into scanning malicious QR codes. Learn how cybercriminals exploit QR codes and how to protect yourself.]]> 2025-03-02T20:30:00+00:00 https://hackread.com/rise-of-qr-phishing-how-scammers-exploit-qr-codes/ www.secnews.physaphae.fr/article.php?IdArticle=8652740 False Threat None 3.0000000000000000 HackRead - Chercher Cyber Microsoft perturbe la tempête-2139 pour LLMJacking et Azure Ai Exploitation<br>Microsoft Disrupts Storm-2139 for LLMjacking and Azure AI Exploitation Microsoft exposes Storm-2139, a cybercrime network exploiting Azure AI via LLMjacking. Learn how stolen API keys enabled harmful…]]> 2025-02-28T20:54:25+00:00 https://hackread.com/microsoft-storm-2139-llmjacking-azure-ai-exploitation/ www.secnews.physaphae.fr/article.php?IdArticle=8652086 False None None 2.0000000000000000 HackRead - Chercher Cyber Convertir l'audio en vidéo: comment transformer vos podcasts en vidéos incontournables<br>Convert Audio to Video: How to Transform Your Podcasts into Must-Watch Videos Not getting enough views or traffic to your podcasts? Try this stunning AI audio-to-video generator to transform your…]]> 2025-02-28T20:09:00+00:00 https://hackread.com/convert-audio-to-video-transform-podcasts-must-watch-videos/ www.secnews.physaphae.fr/article.php?IdArticle=8652130 False None None 3.0000000000000000 HackRead - Chercher Cyber Plus de 350 sites Web de haut niveau frappés par une attaque 360XSS<br>Over 350 High-Profile Websites Hit by 360XSS Attack 360XSS campaign exploits Krpano XSS to hijack search results & distribute spam ads on 350+ sites, including government,…]]> 2025-02-28T18:17:13+00:00 https://hackread.com/over-350-high-profile-websites-hit-by-360xss-attack/ www.secnews.physaphae.fr/article.php?IdArticle=8652053 False Spam None 3.0000000000000000 HackRead - Chercher Cyber Un homme emprisonné 24 ans pour la gestion des sites de csam Web Dark de Coffee Shop<br>Man Jailed 24 Years for Running Dark Web CSAM Sites from Coffee Shop Louis Donald Mendonsa, 62, was sentenced following a guilty plea for distributing child sexual abuse materials (CSAM) via…]]> 2025-02-28T11:31:22+00:00 https://hackread.com/man-jailed-ran-dark-web-csam-sites-from-coffee-shop/ www.secnews.physaphae.fr/article.php?IdArticle=8651946 False Legislation None 2.0000000000000000 HackRead - Chercher Cyber Hacker Ghostr lié à plus de 90 violations de données arrêtées<br>GHOSTR Hacker Linked to 90+ Data Breaches Arrested A hacker using the alias GHOSTR, linked to 90+ data breaches, was arrested in a joint effort by law enforcement in Thailand, Singapore, and cybersecurity firm Group-IB.]]> 2025-02-27T23:07:01+00:00 https://hackread.com/ghostr-hacker-linked-to-90-data-breaches-arrested/ www.secnews.physaphae.fr/article.php?IdArticle=8651775 False Legislation None 3.0000000000000000 HackRead - Chercher Cyber Conseils de service client de commerce client pour le support en ligne: les bases<br>eCommerce Customer Service Tips For Online Support: The Basics Strong eCommerce customer service builds trust, boosts loyalty, and drives sales. Learn key strategies, best practices, and tools to enhance online support.]]> 2025-02-27T21:50:49+00:00 https://hackread.com/ecommerce-customer-service-online-support-the-basics/ www.secnews.physaphae.fr/article.php?IdArticle=8651760 False Tool None 3.0000000000000000 HackRead - Chercher Cyber Comment utiliser Slack pour les affaires: Communication en milieu de travail<br>How to Use Slack for Business: Workplace Communication Do you want to have the best communication system at your workplace? Learn how to maximize the benefits…]]> 2025-02-27T20:25:25+00:00 https://hackread.com/how-to-use-slack-for-business-workplace-communication/ www.secnews.physaphae.fr/article.php?IdArticle=8651744 False None None 3.0000000000000000 HackRead - Chercher Cyber Nouveaux systèmes de linux en couleur auto-porte de porte dérobée aux États-Unis et en Asie<br>New Backdoor Auto-color Linux Targets Systems in US and Asia Auto-color: New Linux backdoor malware targeting the US and Asia. Learn about its advanced evasion, persistence, and detection…]]> 2025-02-27T19:43:42+00:00 https://hackread.com/new-backdoor-auto-color-linux-systems-us-asia/ www.secnews.physaphae.fr/article.php?IdArticle=8651729 False Malware None 2.0000000000000000 HackRead - Chercher Cyber Les pirates se font passer pour l'autorité fiscale de Taiwan \\ pour déployer Winos 4.0 MALWOWIQUE<br>Hackers Impersonate Taiwan\\'s Tax Authority to Deploy Winos 4.0 Malware FortiGuard Labs discovers Winos 4.0 malware targeting Taiwan via phishing. Learn how this advanced threat steals data and…]]> 2025-02-27T17:28:31+00:00 https://hackread.com/hackers-impersonate-taiwans-tax-authority-winos-4-0-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8651697 False Malware,Threat None 3.0000000000000000 HackRead - Chercher Cyber Angry likho apt refeurfaces avec Lummma Stealer Attacks contre la Russie<br>Angry Likho APT Resurfaces with Lumma Stealer Attacks Against Russia Angry Likho APT resurfaces, targeting Russian and Belarusian organizations with Lumma Stealer malware via phishing attacks, stealing credentials, banking data, and more.]]> 2025-02-27T13:39:04+00:00 https://hackread.com/angry-likho-apt-lumma-stealer-attacks-on-russia/ www.secnews.physaphae.fr/article.php?IdArticle=8651614 False Malware None 3.0000000000000000 HackRead - Chercher Cyber Ai-je été pwned ajoute des données de base extraterre<br>Have I Been Pwned Adds ALIEN TXTBASE Data 280M Emails & Passwords HaveIbeenPwned (HIBP) website has significantly expanded its database with hundreds of millions of newly compromised credentials extracted by hackers though infostealer logs.]]> 2025-02-26T14:43:20+00:00 https://hackread.com/have-i-been-pwned-alien-txtbase-data-emails-passwords/ www.secnews.physaphae.fr/article.php?IdArticle=8651244 False None None 3.0000000000000000 HackRead - Chercher Cyber Le signal menace de quitter la Suède sur la proposition de porte dérobée du gouvernement<br>Signal Threatens to Exit Sweden Over Government\\'s Backdoor Proposal Sweden\'s proposal to mandate encryption backdoors faces backlash from Signal, cybersecurity experts, and even its military over privacy and security risks.]]> 2025-02-26T12:19:32+00:00 https://hackread.com/signal-threatens-sweden-exit-over-government-backdoor/ www.secnews.physaphae.fr/article.php?IdArticle=8651201 False None None 3.0000000000000000 HackRead - Chercher Cyber La vérification des antécédents des États-Unis est la violation des données de l'entreprise expose les enregistrements de 3,3 millions<br>US Background Check Firm Data Breach Exposes 3.3M Records A data breach at DISA Global Solutions, a firm providing background checks, and drugs and alcohol testing services,…]]> 2025-02-26T10:25:35+00:00 https://hackread.com/us-background-check-firm-data-breach-exposes-records/ www.secnews.physaphae.fr/article.php?IdArticle=8651159 False Data Breach None 3.0000000000000000 HackRead - Chercher Cyber Crypto et cybersécurité: les menaces croissantes et pourquoi les portefeuilles fiables comptent<br>Crypto and Cybersecurity: The Rising Threats and Why Reliable Wallets Matter Cybersecurity threats in crypto are rising, from the Bybit hack to fake wallets stealing funds. Learn how to…]]> 2025-02-25T18:03:43+00:00 https://hackread.com/crypto-cybersecurity-rising-threats-reliable-wallets/ www.secnews.physaphae.fr/article.php?IdArticle=8650935 False Hack None 3.0000000000000000 HackRead - Chercher Cyber Les pirates exploitent de faux référentiels GitHub pour répandre les logiciels malveillants Gitvenom<br>Hackers Exploit Fake GitHub Repositories to Spread GitVenom Malware Kaspersky’s Securelist exposes the GitVenom campaign involving fake GitHub repositories to distribute malware. Targeting developers with seemingly legitimate…]]> 2025-02-25T16:40:13+00:00 https://hackread.com/hackers-exploit-fake-github-repositories-gitvenom-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8650913 False Malware,Threat None 3.0000000000000000 HackRead - Chercher Cyber Silver Fox Apt cache Valleyrat dans un logiciel d'imagerie médicale trojanisé<br>Silver Fox APT Hides ValleyRAT in Trojanized Medical Imaging Software Chinese Silver Fox APT exploits trojanized medical imaging software to spread ValleyRAT malware, posing a serious threat to…]]> 2025-02-25T13:12:23+00:00 https://hackread.com/silver-fox-apt-valleyrat-trojanized-medical-imaging-software/ www.secnews.physaphae.fr/article.php?IdArticle=8650858 False Malware,Threat,Medical None 3.0000000000000000 HackRead - Chercher Cyber INE sécurise le spot dans le classement des logiciels d'éducation de G2 \\'s 2025 de G2 \\<br>INE Secures Spot in G2\\'s 2025 Top 50 Education Software Rankings Cary, NC, 25th February 2025, CyberNewsWire]]> 2025-02-25T11:05:22+00:00 https://hackread.com/ine-secures-spot-in-g2s-2025-top-50-education-software-rankings/ www.secnews.physaphae.fr/article.php?IdArticle=8650811 False None None 3.0000000000000000 HackRead - Chercher Cyber Botnet de périphériques 130k cible Microsoft 365 dans une attaque de pulvérisation de mot de passe<br>Botnet of 130K Devices Targets Microsoft 365 in Password-Spraying Attack A botnet of 130,000 devices is launching a Password-Spraying attack on Microsoft 365, bypassing MFA and exploiting legacy authentication to access accounts.]]> 2025-02-24T19:12:14+00:00 https://hackread.com/botnet-devices-microsoft-365-password-spraying-attack/ www.secnews.physaphae.fr/article.php?IdArticle=8650607 False None None 3.0000000000000000 HackRead - Chercher Cyber Les pirates utilisent Google Docs et Steam pour répandre ACRSTEALER Infosteller<br>Hackers Use Google Docs and Steam to Spread ACRStealer Infostealer A new information-stealing malware, ACRStealer, is leveraging legitimate platforms like Google Docs and Steam to carry out its…]]> 2025-02-24T16:10:30+00:00 https://hackread.com/hackers-google-docs-steam-drop-acrstealer-infostealer/ www.secnews.physaphae.fr/article.php?IdArticle=8650560 False Malware None 2.0000000000000000 HackRead - Chercher Cyber Comment l'orchestration des paiements améliore l'efficacité des entreprises<br>How Payment Orchestration Enhances Business Efficiency Payment Orchestration Platforms streamline transactions by routing payments through multiple providers, reducing costs, boosting approval rates, and enhancing…]]> 2025-02-24T13:40:19+00:00 https://hackread.com/how-payment-orchestration-enhances-business-efficiency/ www.secnews.physaphae.fr/article.php?IdArticle=8650507 False None None 2.0000000000000000 HackRead - Chercher Cyber Comment utiliser VPN pour un travail sûr et des environnements de travail à distance<br>How to utilize VPN for safe work and remote work environments A VPN enhances online privacy, encrypts data, and secures devices. Essential for remote work, it protects against cyber threats and ensures safer internet use.]]> 2025-02-24T13:02:57+00:00 https://hackread.com/how-to-utilize-vpn-safe-work-remote-work-environments/ www.secnews.physaphae.fr/article.php?IdArticle=8650490 False None None 2.0000000000000000 HackRead - Chercher Cyber Portefes de crypto matérielle vs mobile vs bureau: lequel devez-vous choisir?<br>Hardware Crypto Wallets vs. Mobile vs. Desktop: Which Should You Choose? Crypto wallets are essential in keeping your cryptocurrency safe. There are different types of wallets available and choosing…]]> 2025-02-24T12:37:06+00:00 https://hackread.com/hardware-crypto-wallets-vs-mobile-vs-desktop/ www.secnews.physaphae.fr/article.php?IdArticle=8650491 False Mobile None 3.0000000000000000 HackRead - Chercher Cyber Les pirates détournent les chaînes YouTube pour cibler les fans de CS2 avec de faux cadeaux<br>Hackers Hijack YouTube Channels to Target CS2 Fans with Fake Giveaways Bitdefender warns CS2 fans of scams using hijacked YouTube channels, fake giveaways, and crypto fraud. Protect your Steam account and avoid phishing traps.]]> 2025-02-24T11:55:57+00:00 https://hackread.com/hackers-hijack-youtube-channels-cs2-fans-fake-giveaways/ www.secnews.physaphae.fr/article.php?IdArticle=8650470 False None None 3.0000000000000000 HackRead - Chercher Cyber Les enquêteurs relient 1,4 milliard de dollars de piratage par bybit au groupe de Lazarus de la Corée du Nord<br>Investigators Link $1.4B Bybit Hack to North Korea\\'s Lazarus Group Investigators link the $1.4B Bybit hack to North Korea\'s Lazarus Group, exposing a major crypto heist tied to state-backed cybercrime and money laundering.]]> 2025-02-23T20:13:39+00:00 https://hackread.com/investigators-link-bybit-hack-north-korea-lazarus-group/ www.secnews.physaphae.fr/article.php?IdArticle=8650283 False Hack APT 38 2.0000000000000000 HackRead - Chercher Cyber Hack Bybit: 1,4 milliard de dollars volés au 2e plus grand échange de crypto de World \\<br>Bybit Hack: $1.4B Stolen from World\\'s 2nd Largest Crypto Exchange In a major cybersecurity incident, Bybit, the world’s 2nd-largest crypto exchange suffered a $1.4 billion ETH hack from…]]> 2025-02-21T21:26:38+00:00 https://hackread.com/bybit-hack-billion-stolen-largest-crypto-exchange/ www.secnews.physaphae.fr/article.php?IdArticle=8649723 False Hack None 4.0000000000000000 HackRead - Chercher Cyber Les fichiers divulgués lient la société de cybersécurité chinoise à la censure du gouvernement<br>Leaked Files Tie Chinese Cybersecurity Firm to Government Censorship TopSec data leak: 7000+ documents expose potential Chinese government surveillance and censorship practices. Learn about the key findings…]]> 2025-02-21T20:14:20+00:00 https://hackread.com/leaked-files-chinese-cybersecurity-firm-govt-censorship/ www.secnews.physaphae.fr/article.php?IdArticle=8649707 False None None 3.0000000000000000 HackRead - Chercher Cyber How to Sue a Company Under GDPR for Data Misuse and Privacy Violations Learn how to sue companies under GDPR for data misuse. Understand your rights, file complaints, and claim compensation…]]> 2025-02-20T23:27:10+00:00 https://hackread.com/how-to-sue-company-gdpr-data-misuse-privacy-violations/ www.secnews.physaphae.fr/article.php?IdArticle=8649407 False None None 3.0000000000000000 HackRead - Chercher Cyber New FrigidStealer Malware Infects macOS via Fake Browser Updates Fake browser update scams now target Mac, Windows, and Android users, delivering malware like FrigidStealer, Lumma Stealer, and…]]> 2025-02-20T18:17:08+00:00 https://hackread.com/frigidstealer-malware-infect-macos-fake-browser-updates/ www.secnews.physaphae.fr/article.php?IdArticle=8649339 False Malware,Mobile None 2.0000000000000000 HackRead - Chercher Cyber Clinical Research Firm Exposes 1.6 Million US Medical Survey Records A Dallas, Texas-based clinical research firm had its database exposed, containing sensitive personal healthcare records of over 1.6…]]> 2025-02-20T15:30:01+00:00 https://hackread.com/clinical-research-firm-expose-us-medical-survey-records/ www.secnews.physaphae.fr/article.php?IdArticle=8649279 False Medical None 3.0000000000000000 HackRead - Chercher Cyber FBI and CISA Warn of Ghost Ransomware: A Threat to Firms Worldwide FBI and CISA warn of Ghost ransomware, a China-based cyber threat targeting businesses, schools, and healthcare worldwide by exploiting software vulnerabilities.]]> 2025-02-20T12:04:56+00:00 https://hackread.com/fbi-cisa-ghost-ransomware-threat-to-firms-worldwide/ www.secnews.physaphae.fr/article.php?IdArticle=8649212 False Ransomware,Vulnerability,Threat,Medical None 3.0000000000000000 HackRead - Chercher Cyber Hackers Tricking Users Into Linking Devices to Steal Signal Messages Is your Signal, WhatsApp, or Telegram account safe? Google warns of increasing attacks by Russian state-backed groups. Learn…]]> 2025-02-19T17:37:12+00:00 https://hackread.com/hackers-trick-users-link-device-steal-signal-messages/ www.secnews.physaphae.fr/article.php?IdArticle=8649035 False None None 2.0000000000000000 HackRead - Chercher Cyber INE Security\\'s Cybersecurity and IT Training Enhances Career Stability in Tech Cary, North Carolina, 19th February 2025, CyberNewsWire]]> 2025-02-19T15:01:55+00:00 https://hackread.com/ine-securitys-cybersecurity-and-it-training-enhances-career-stability-in-tech/ www.secnews.physaphae.fr/article.php?IdArticle=8649016 False None None 2.0000000000000000 HackRead - Chercher Cyber How Blockchain Games Ensure Transparency and Fairness The advancement of technology has also impacted sectors like gaming. Blockchain technology has surfaced as an asset that…]]> 2025-02-19T13:10:51+00:00 https://hackread.com/how-blockchain-games-ensure-transparency-fairness/ www.secnews.physaphae.fr/article.php?IdArticle=8649005 False None None 2.0000000000000000 HackRead - Chercher Cyber 10 Best LMS SaaS Platforms for Scalable Online Learning The education sector is changing quickly as it adopts digital tools for better learning experiences. These days, learning…]]> 2025-02-19T12:33:22+00:00 https://hackread.com/10-best-lms-saas-platforms-scalable-online-learning/ www.secnews.physaphae.fr/article.php?IdArticle=8648995 False Tool,Cloud None 2.0000000000000000 HackRead - Chercher Cyber Xerox Versalink Printers Vulnerabilities Could Let Hackers Steal Credentials Xerox Versalink printers are vulnerable to pass-back attacks. Rapid7 discovers LDAP & SMB flaws (CVE-2024-12510 & CVE-2024-12511). Update…]]> 2025-02-19T11:17:57+00:00 https://hackread.com/xerox-versalink-printers-vulnerabilities-hackers-steal-credentials/ www.secnews.physaphae.fr/article.php?IdArticle=8648983 False Vulnerability None 2.0000000000000000 HackRead - Chercher Cyber $10 Infostealers Are Breaching Critical US Security: Military and Even the FBI Hit A new report reveals how cheap Infostealer malware is exposing US military and defense data, putting national security at risk. Hackers exploit human error to gain access.]]> 2025-02-18T22:42:24+00:00 https://hackread.com/infostealers-breach-us-security-military-fbi-hit/ www.secnews.physaphae.fr/article.php?IdArticle=8648925 False Malware,Threat None 3.0000000000000000 HackRead - Chercher Cyber Critical OpenSSH Vulnerabilities Expose Users to MITM and DoS Attacks Two critical OpenSSH vulnerabilities discovered! Qualys TRU finds client and server flaws (CVE-2025-26465 & CVE-2025-26466) enabling MITM and…]]> 2025-02-18T18:05:07+00:00 https://hackread.com/critical-openssh-flaws-expose-users-mitm-dos-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8648896 False Vulnerability None 3.0000000000000000 HackRead - Chercher Cyber Snake Keylogger Variant Hits Windows, Steals Data via Telegram Bots The New Snake Keylogger variant targets Windows users via phishing emails, using AutoIt for stealth. Learn how it…]]> 2025-02-18T16:20:32+00:00 https://hackread.com/snake-keylogger-variant-windows-data-telegram-bots/ www.secnews.physaphae.fr/article.php?IdArticle=8648889 False None None 3.0000000000000000 HackRead - Chercher Cyber New XCSSET Malware Variant Targeting macOS Notes App and Wallets Microsoft warns Apple developers about a new XCSSET malware variant targeting macOS, posing security risks through stealthy infections…]]> 2025-02-18T14:45:57+00:00 https://hackread.com/xcsset-malware-variant-targets-macos-notes-wallets/ www.secnews.physaphae.fr/article.php?IdArticle=8648879 False Malware None 3.0000000000000000 HackRead - Chercher Cyber Intruder Enhances Free Vulnerability Intelligence Platform \\'Intel\\' with AI-Generated CVE Descriptions London, United Kingdom, 18th February 2025, CyberNewsWire]]> 2025-02-18T14:00:23+00:00 https://hackread.com/intruder-enhances-free-vulnerability-intelligence-platform-intel-with-ai-generated-cve-descriptions/ www.secnews.physaphae.fr/article.php?IdArticle=8648869 False Vulnerability None 3.0000000000000000 HackRead - Chercher Cyber Duo Wins $50K Bug Bounty for Supply Chain Flaw in Newly Acquired Firm Researchers earned a $50,500 Bug Bounty after uncovering a critical supply chain flaw in a newly acquired firm,…]]> 2025-02-17T23:28:05+00:00 https://hackread.com/duo-bug-bounty-supply-chain-flaw-newly-acquired-firm/ www.secnews.physaphae.fr/article.php?IdArticle=8648801 False None None 3.0000000000000000 HackRead - Chercher Cyber Holiverse Makes NASA\\'s Latest Achievements Accessible to Everyone People around the world learned about the latest advancements in the American space industry! This was made possible…]]> 2025-02-17T20:45:01+00:00 https://hackread.com/holiverse-nasa-latest-achievement-accessible-everyone/ www.secnews.physaphae.fr/article.php?IdArticle=8648794 False None None 2.0000000000000000 HackRead - Chercher Cyber Hackers Exploit Telegram API to Spread New Golang Backdoor The new Golang backdoor uses Telegram for command and control. Netskope discovers malware that exploits Telegram’s API for…]]> 2025-02-17T14:36:37+00:00 https://hackread.com/hackers-exploit-telegram-api-spread-golang-backdoor/ www.secnews.physaphae.fr/article.php?IdArticle=8648769 False Malware,Threat None 3.0000000000000000 HackRead - Chercher Cyber 10 Key SOC Challenges and How AI Addresses Them SOC challenges like alert fatigue, skill shortages and slow response impact cybersecurity. AI-driven solutions enhance SOC efficiency, automation…]]> 2025-02-17T13:42:13+00:00 https://hackread.com/10-key-soc-challenges-and-how-ai-addresses-them/ www.secnews.physaphae.fr/article.php?IdArticle=8648766 False None None 3.0000000000000000