www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2025-05-12T18:19:51+00:00 www.secnews.physaphae.fr HackRead - Chercher Cyber Clickfix Scam: Comment protéger votre entreprise contre cette menace en évolution<br>ClickFix Scam: How to Protect Your Business Against This Evolving Threat Cybercriminals aren\'t always loud and obvious. Sometimes, they play it quiet and smart. One of the tricks of…]]> 2025-05-06T18:49:33+00:00 https://hackread.com/clickfix-scam-how-to-protect-business-againt-threat/ www.secnews.physaphae.fr/article.php?IdArticle=8672413 False Threat None 3.0000000000000000 HackRead - Chercher Cyber Pays le plus ciblé en Allemagne au premier trimestre 2025 DDOS ATTAQUES<br>Germany Most Targeted Country in Q1 2025 DDoS Attacks Cloudflare\'s Q1 2025 DDoS Threat Report: DDoS attacks surged 358% YoY to 20.5M. Germany hit hardest; gaming and…]]> 2025-05-05T11:36:41+00:00 https://hackread.com/germany-most-targeted-country-q1-2025-ddos-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8671803 False Threat None 3.0000000000000000 HackRead - Chercher Cyber MALWORED SNAYY WORDPRESS DÉGISÉ EN PLANG ANTI-Malware<br>Sneaky WordPress Malware Disguised as Anti-Malware Plugin WordPress sites are under threat from a deceptive anti-malware plugin. Learn how this malware grants backdoor access, hides…]]> 2025-04-30T16:02:26+00:00 https://hackread.com/wordpress-malware-disguised-as-anti-malware-plugin/ www.secnews.physaphae.fr/article.php?IdArticle=8670000 False Malware,Threat None 2.0000000000000000 HackRead - Chercher Cyber Le géant du commerce de détail britannique Co-Op ferme les systèmes informatiques après la tentative de cyberattaque<br>UK Retail Giant Co-op Shuts Down IT Systems After Cyberattack Attempt Retailer Acts Swiftly to Limit Threat as UK Retail Sector Faces Growing Digital Risks]]> 2025-04-30T13:23:58+00:00 https://hackread.com/uk-retail-co-op-shuts-down-it-systems-cyberattack/ www.secnews.physaphae.fr/article.php?IdArticle=8669977 False Threat None 2.0000000000000000 HackRead - Chercher Cyber Google introduit une IA d'agence pour lutter contre les menaces de cybersécurité<br>Google Introduces Agentic AI to Combat Cybersecurity Threats Google enhances cybersecurity with Agentic AI, launching Unified Security to fight zero-day exploits, enterprise threats, and credential-based attacks.…]]> 2025-04-30T12:17:41+00:00 https://hackread.com/google-agentic-ai-combat-cybersecurity-threats/ www.secnews.physaphae.fr/article.php?IdArticle=8669964 False Vulnerability,Threat None 2.0000000000000000 HackRead - Chercher Cyber SECAI fait ses débuts à RSA 2025, redéfinissant l'enquête sur les menaces avec l'IA<br>SecAI Debuts at RSA 2025, Redefining Threat Investigation with AI San Francisco, United States, 29th April 2025, CyberNewsWire]]> 2025-04-29T16:01:19+00:00 https://hackread.com/secai-debuts-at-rsa-2025-redefining-threat-investigation-with-ai/ www.secnews.physaphae.fr/article.php?IdArticle=8669542 False Threat None 2.0000000000000000 HackRead - Chercher Cyber BreachForums affiche un message sur l'arrêt, cite MyBB 0day Flaw<br>BreachForums Displays Message About Shutdown, Cites MyBB 0day Flaw BreachForums posts a PGP-signed message explaining the sudden April 2025 shutdown. Admins cite MyBB 0day vulnerability impacting the…]]> 2025-04-28T17:47:14+00:00 https://hackread.com/breachforums-displays-message-shutdown-mybb-0day-flaw/ www.secnews.physaphae.fr/article.php?IdArticle=8669101 False Vulnerability,Threat None 3.0000000000000000 HackRead - Chercher Cyber Attaque de COMET insaisissable: les pirates utilisent le Zoom à télécommande pour voler la crypto<br>Elusive Comet Attack: Hackers Use Zoom Remote-Control to Steal Crypto Hackers in the Elusive Comet campaign exploit Zoom’s remote-control feature to steal cryptocurrency, and over $100K lost in…]]> 2025-04-24T10:45:54+00:00 https://hackread.com/elusive-comet-hackers-zoom-remote-control-steal-crypto/ www.secnews.physaphae.fr/article.php?IdArticle=8667100 False Threat None 2.0000000000000000 HackRead - Chercher Cyber IP criminel pour présenter une intelligence avancée des menaces à RSAC ™ 2025<br>Criminal IP to Showcase Advanced Threat Intelligence at RSAC™ 2025 Terrance, United States / California, 22nd April 2025, CyberNewsWire]]> 2025-04-22T14:00:39+00:00 https://hackread.com/criminal-ip-to-showcase-advanced-threat-intelligence-at-rsac-2025/ www.secnews.physaphae.fr/article.php?IdArticle=8666180 False Threat None 2.0000000000000000 HackRead - Chercher Cyber Hôte russe Proton66 lié au superblack et au ransomware de weaxor<br>Russian Host Proton66 Tied to SuperBlack and WeaXor Ransomware Threat actors are exploiting bulletproof hosting service Proton66 for malicious activities, including campaigns from SuperBlack ransomware operators, Android…]]> 2025-04-22T12:24:33+00:00 https://hackread.com/russian-host-proton66-superblack-weaxor-ransomware/ www.secnews.physaphae.fr/article.php?IdArticle=8666155 False Ransomware,Threat None 2.0000000000000000 HackRead - Chercher Cyber Langue maternelle Le phishing répartit le résolverrat aux soins de santé<br>Native Language Phishing Spreads ResolverRAT to Healthcare Morphisec discovers a new malware threat ResolverRAT, that combines advanced methods for running code directly in computer memory,…]]> 2025-04-21T15:06:50+00:00 https://hackread.com/native-language-phishing-resolverrat-healthcare/ www.secnews.physaphae.fr/article.php?IdArticle=8665702 False Malware,Threat,Medical None 3.0000000000000000 HackRead - Chercher Cyber La nouvelle menace de «slopsquat» émerge des hallucinations du code générées par l'AI-AI<br>New “Slopsquatting” Threat Emerges from AI-Generated Code Hallucinations AI code tools often hallucinate fake packages, creating a new threat called slopsquatting that attackers can exploit in…]]> 2025-04-15T12:17:56+00:00 https://hackread.com/slopsquatting-threat-ai-generated-code-hallucinations/ www.secnews.physaphae.fr/article.php?IdArticle=8663090 False Tool,Threat None 3.0000000000000000 HackRead - Chercher Cyber Patch incomplet laisse les utilisateurs de Nvidia et Docker à risque<br>Incomplete Patch Leaves NVIDIA and Docker Users at Risk NVIIA\'s incomplete security patch, combined with a Docker vulnerability, creates a serious threat for organizations using containerized environments. This article explains the risks and mitigation strategies.]]> 2025-04-14T20:54:10+00:00 https://hackread.com/incomplete-patch-leaves-nvidia-docker-users-at-risk/ www.secnews.physaphae.fr/article.php?IdArticle=8662836 False Vulnerability,Threat None 3.0000000000000000 HackRead - Chercher Cyber Les problèmes de Fortinet corrigent après que les attaquants contournent les correctifs pour maintenir l'accès<br>Fortinet Issues Fixes After Attackers Bypass Patches to Maintain Access Hackers exploit Fortinet flaws to plant stealth backdoors on FortiGate devices, maintaining access even after patches. Update to…]]> 2025-04-14T08:53:26+00:00 https://hackread.com/fortinet-fixe-attackers-bypass-patches-maintain-access/ www.secnews.physaphae.fr/article.php?IdArticle=8662605 False Threat None 3.0000000000000000 HackRead - Chercher Cyber La NSA et les alliés mondiaux déclarent un flux rapide une menace de sécurité nationale<br>NSA and Global Allies Declare Fast Flux a National Security Threat NSA and global cybersecurity agencies warn fast flux DNS tactic is a growing national security threat used in phishing, botnets, and ransomware.]]> 2025-04-04T11:36:49+00:00 https://hackread.com/nsa-allies-fast-flux-a-national-security-threat/ www.secnews.physaphae.fr/article.php?IdArticle=8660227 False Ransomware,Threat None 3.0000000000000000 HackRead - Chercher Cyber Les pirates exploitent API Stripe pour le vol de carte d'écrémage Web dans les magasins en ligne<br>Hackers Exploit Stripe API for Web Skimming Card Theft on Online Stores Cybersecurity researchers at Jscamblers have uncovered a sophisticated web-skimming campaign targeting online retailers. The campaign utilizes a legacy…]]> 2025-04-03T15:41:27+00:00 https://hackread.com/hackers-exploit-stripe-api-web-skimming-card-theft/ www.secnews.physaphae.fr/article.php?IdArticle=8660077 False Threat None 3.0000000000000000 HackRead - Chercher Cyber Aura ou LifeLock: Qui offre une meilleure protection de l'identité en 2025?<br>Aura or LifeLock: Who Offers Better Identity Protection in 2025? The Growing Threat of Digital Identity Theft Identity theft is a continuous online threat that lurks behind every…]]> 2025-04-02T22:52:38+00:00 https://hackread.com/aura-or-lifelock-who-offers-identity-protection-2025/ www.secnews.physaphae.fr/article.php?IdArticle=8659928 False Threat None 3.0000000000000000 HackRead - Chercher Cyber Next.js Middleware Flaw permet aux attaquants de contourner l'autorisation<br>Next.js Middleware Flaw Lets Attackers Bypass Authorization Researchers have uncovered a critical vulnerability (CVE-2025-29927) in Next.js middleware, allowing authorization bypass. Learn about the exploit and fixes.]]> 2025-03-26T16:40:56+00:00 https://hackread.com/next-js-middleware-flaw-bypass-authorization/ www.secnews.physaphae.fr/article.php?IdArticle=8658367 False Vulnerability,Threat None 3.0000000000000000 HackRead - Chercher Cyber Systèmes de navigation par satellite face à l'augmentation des attaques de brouillage et d'usurpation<br>Satellite Navigation Systems Facing Rising Jamming and Spoofing Attacks Satellite navigation systems are under rising threat from jamming and spoofing attacks, risking aviation, maritime, and telecom safety worldwide, warn global agencies.]]> 2025-03-25T19:47:17+00:00 https://hackread.com/satellite-navigation-systems-jamming-spoofing-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8658173 False Threat None 2.0000000000000000 HackRead - Chercher Cyber MEDUSA Ransomware désactive les outils anti-malware avec des certificats volés<br>Medusa Ransomware Disables Anti-Malware Tools with Stolen Certificates Cybercriminals exploit AbyssWorker driver to disable EDR systems, deploying MEDUSA ransomware with revoked certificates for stealthy attacks.]]> 2025-03-25T11:56:24+00:00 https://hackread.com/medusa-ransomware-anti-malware-tools-stolen-certificates/ www.secnews.physaphae.fr/article.php?IdArticle=8658075 False Ransomware,Tool,Threat None 2.0000000000000000 HackRead - Chercher Cyber Comment les cybercriminels exploitent les canaux de notification<br>How Cybercriminals Exploit Notification Channels Cybercriminals are always looking for new ways to take advantage of people. One effective method they use is…]]> 2025-03-22T23:57:34+00:00 https://hackread.com/how-cybercriminals-exploit-notification-channels/ www.secnews.physaphae.fr/article.php?IdArticle=8657471 False Threat None 2.0000000000000000 HackRead - Chercher Cyber Comment les cybercriminels exploitent les informations publiques pour les attaques: comprendre les risques et la prévention<br>How Cybercriminals Exploit Public Info for Attacks: Understanding Risks and Prevention Cybercriminals are skilled at using public information to their advantage. Knowing how they gather this data can help…]]> 2025-03-22T19:05:47+00:00 https://hackread.com/how-cybercriminals-exploit-public-info-attacks-risks-prevention/ www.secnews.physaphae.fr/article.php?IdArticle=8657434 False Threat None 2.0000000000000000 HackRead - Chercher Cyber Oracle nie la violation au milieu de la revendication d'accès de Hacker \\ à 6 millions d'enregistrements<br>Oracle Denies Breach Amid Hacker\\'s Claim of Access to 6 Million Records Oracle denies breach claims as hacker alleges access to 6 million cloud records. CloudSEK reports a potential zero-day exploit affecting 140,000 tenants.]]> 2025-03-22T13:29:00+00:00 https://hackread.com/oracle-denies-breach-hacker-access-6-million-records/ www.secnews.physaphae.fr/article.php?IdArticle=8657397 False Vulnerability,Threat,Cloud None 3.0000000000000000 HackRead - Chercher Cyber De nouvelles attaques exploitent des défauts de ServiceNow, âgés d'un an - Israël a frappé le plus durement<br>New Attacks Exploit Year-Old ServiceNow Flaws – Israel Hit Hardest ServiceNow vulnerability alert: Hackers are actively exploiting year-old flaws (CVE-2024-4879, CVE-2024-5217, CVE-2024-5178) for database access. Learn how to…]]> 2025-03-21T12:19:08+00:00 https://hackread.com/attacks-exploit-servicenow-flaws-israel-hit-hardest/ www.secnews.physaphae.fr/article.php?IdArticle=8657188 False Vulnerability,Threat None 3.0000000000000000 HackRead - Chercher Cyber Le graphite spyware israélien ciblé WhatsApp avec exploit de 0 clic<br>Israeli Spyware Graphite Targeted WhatsApp with 0-Click Exploit Citizen Lab\'s investigation reveals sophisticated spyware attacks exploiting WhatsApp vulnerabilities, implicating Paragon Solutions. Learn how their research exposed these threats and the implications for digital privacy.]]> 2025-03-20T17:33:43+00:00 https://hackread.com/israeli-spyware-graphite-hit-whatsapp-0-click-exploit/ www.secnews.physaphae.fr/article.php?IdArticle=8657010 False Vulnerability,Threat None 4.0000000000000000 HackRead - Chercher Cyber 11 hackers de l'État-nation exploitent une faille Windows non corrigée depuis 2017<br>11 Nation-State Hackers Exploit Unpatched Windows Flaw Since 2017 Microsoft refuses to patch serious Windows shortcut vulnerability abused in global espionage campaigns!]]> 2025-03-19T20:00:30+00:00 https://hackread.com/nation-state-hackers-exploit-windows-unpatched-flaw-2017/ www.secnews.physaphae.fr/article.php?IdArticle=8656765 False Vulnerability,Threat None 3.0000000000000000 HackRead - Chercher Cyber Faux installateurs de l'IA profonde, sites Web et applications diffusant des logiciels malveillants<br>Fake DeepSeek AI Installers, Websites, and Apps Spreading Malware Cybercriminals exploit AI hype with SEO poisoning, tricking users into downloading malware disguised as DeepSeek software, warns McAfee Labs in a new report.]]> 2025-03-18T13:16:45+00:00 https://hackread.com/fake-deepseek-ai-installers-websites-apps-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8656459 False Malware,Threat None 3.0000000000000000 HackRead - Chercher Cyber Les pirates exploitent Chatgpt avec CVE-2024-27564, plus de 10 000 attaques en une semaine<br>Hackers Exploit ChatGPT with CVE-2024-27564, 10,000+ Attacks in a Week In its latest research report, cybersecurity firm Veriti has spotted active exploitation of a vulnerability within OpenAI’s ChatGPT…]]> 2025-03-17T21:26:03+00:00 https://hackread.com/hackers-exploit-chatgpt-cve-2024-27564-10000-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8656335 False Vulnerability,Threat ChatGPT 3.0000000000000000 HackRead - Chercher Cyber La menace croissante des attaques d'API: comment sécuriser vos API en 2025<br>The Rising Threat of API Attacks: How to Secure Your APIs in 2025 API attacks are constantly on the rise, with a recent alarming study showing that 59% of organizations give…]]> 2025-03-12T11:29:24+00:00 https://hackread.com/rising-threat-of-api-attacks-how-to-secure-apis-2025/ www.secnews.physaphae.fr/article.php?IdArticle=8655269 False Threat,Studies None 3.0000000000000000 HackRead - Chercher Cyber Mars 2025 Patch mardi: Microsoft corrige 57 vulnérabilités, 7 zéro jours<br>March 2025 Patch Tuesday: Microsoft Fixes 57 Vulnerabilities, 7 Zero-Days Microsoft\'s March 2025 Patch Tuesday fixes six actively exploited zero-day vulnerabilities, including critical RCE and privilege escalation flaws. Learn how these vulnerabilities impact Windows systems and why immediate patching is essential.]]> 2025-03-12T10:56:12+00:00 https://hackread.com/march-2025-patch-tuesday-microsoft-fixes-vulnerabilities-zero-days/ www.secnews.physaphae.fr/article.php?IdArticle=8655253 False Vulnerability,Threat,Patching None 3.0000000000000000 HackRead - Chercher Cyber Microsoft démantèle l'escroque<br>Microsoft Dismantles Malvertising Scam Using GitHub, Discord, Dropbox Microsoft Threat Intelligence exposes a malvertising campaign exploiting GitHub, Discord, and Dropbox. Discover the multi-stage attack chain, the…]]> 2025-03-07T13:19:56+00:00 https://hackread.com/microsoft-dismantle-malvertising-github-discord-dropbox/ www.secnews.physaphae.fr/article.php?IdArticle=8654528 False Threat None 3.0000000000000000 HackRead - Chercher Cyber Les pirates exploitent les erreurs de configuration du cloud pour répandre les logiciels malveillants<br>Hackers Exploit Cloud Misconfigurations to Spread Malware Veriti Research reveals 40% of networks allow ‘any/any’ cloud access, exposing critical vulnerabilities. Learn how malware like XWorm…]]> 2025-03-05T10:52:13+00:00 https://hackread.com/hackers-exploit-cloud-misconfigurations-spread-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8653780 False Malware,Vulnerability,Threat,Cloud None 3.0000000000000000 HackRead - Chercher Cyber Javaghost utilise les autorisations d'Amazon IAM aux organisations phish<br>JavaGhost Uses Amazon IAM Permissions to Phish Organizations Unit 42 uncovers JavaGhost’s evolving AWS attacks. Learn how this threat actor uses phishing, IAM abuse, and advanced…]]> 2025-03-04T16:44:28+00:00 https://hackread.com/javaghost-uses-amazon-iam-permissions-to-phish/ www.secnews.physaphae.fr/article.php?IdArticle=8653472 False Threat None 2.0000000000000000 HackRead - Chercher Cyber Le nouveau voleur de zhong chinois infecte fintech via le support client<br>New Chinese Zhong Stealer Infects Fintech via Customer Support A new malware threat called Zhong Stealer has surfaced from China, and it\'s already slipping into businesses through…]]> 2025-03-04T12:06:26+00:00 https://hackread.com/chinese-zhong-stealer-infects-fintech-customer-support/ www.secnews.physaphae.fr/article.php?IdArticle=8653387 False Malware,Threat None 2.0000000000000000 HackRead - Chercher Cyber La montée du phishing QR: comment les escrocs exploitent les codes QR et comment rester en sécurité<br>The Rise of QR Phishing: How Scammers Exploit QR Codes and How to Stay Safe QR phishing is on the rise, tricking users into scanning malicious QR codes. Learn how cybercriminals exploit QR codes and how to protect yourself.]]> 2025-03-02T20:30:00+00:00 https://hackread.com/rise-of-qr-phishing-how-scammers-exploit-qr-codes/ www.secnews.physaphae.fr/article.php?IdArticle=8652740 False Threat None 3.0000000000000000 HackRead - Chercher Cyber Les pirates se font passer pour l'autorité fiscale de Taiwan \\ pour déployer Winos 4.0 MALWOWIQUE<br>Hackers Impersonate Taiwan\\'s Tax Authority to Deploy Winos 4.0 Malware FortiGuard Labs discovers Winos 4.0 malware targeting Taiwan via phishing. Learn how this advanced threat steals data and…]]> 2025-02-27T17:28:31+00:00 https://hackread.com/hackers-impersonate-taiwans-tax-authority-winos-4-0-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8651697 False Malware,Threat None 3.0000000000000000 HackRead - Chercher Cyber Les pirates exploitent de faux référentiels GitHub pour répandre les logiciels malveillants Gitvenom<br>Hackers Exploit Fake GitHub Repositories to Spread GitVenom Malware Kaspersky’s Securelist exposes the GitVenom campaign involving fake GitHub repositories to distribute malware. Targeting developers with seemingly legitimate…]]> 2025-02-25T16:40:13+00:00 https://hackread.com/hackers-exploit-fake-github-repositories-gitvenom-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8650913 False Malware,Threat None 3.0000000000000000 HackRead - Chercher Cyber Silver Fox Apt cache Valleyrat dans un logiciel d'imagerie médicale trojanisé<br>Silver Fox APT Hides ValleyRAT in Trojanized Medical Imaging Software Chinese Silver Fox APT exploits trojanized medical imaging software to spread ValleyRAT malware, posing a serious threat to…]]> 2025-02-25T13:12:23+00:00 https://hackread.com/silver-fox-apt-valleyrat-trojanized-medical-imaging-software/ www.secnews.physaphae.fr/article.php?IdArticle=8650858 False Malware,Threat,Medical None 3.0000000000000000 HackRead - Chercher Cyber FBI and CISA Warn of Ghost Ransomware: A Threat to Firms Worldwide FBI and CISA warn of Ghost ransomware, a China-based cyber threat targeting businesses, schools, and healthcare worldwide by exploiting software vulnerabilities.]]> 2025-02-20T12:04:56+00:00 https://hackread.com/fbi-cisa-ghost-ransomware-threat-to-firms-worldwide/ www.secnews.physaphae.fr/article.php?IdArticle=8649212 False Ransomware,Vulnerability,Threat,Medical None 3.0000000000000000 HackRead - Chercher Cyber $10 Infostealers Are Breaching Critical US Security: Military and Even the FBI Hit A new report reveals how cheap Infostealer malware is exposing US military and defense data, putting national security at risk. Hackers exploit human error to gain access.]]> 2025-02-18T22:42:24+00:00 https://hackread.com/infostealers-breach-us-security-military-fbi-hit/ www.secnews.physaphae.fr/article.php?IdArticle=8648925 False Malware,Threat None 3.0000000000000000 HackRead - Chercher Cyber Hackers Exploit Telegram API to Spread New Golang Backdoor The new Golang backdoor uses Telegram for command and control. Netskope discovers malware that exploits Telegram’s API for…]]> 2025-02-17T14:36:37+00:00 https://hackread.com/hackers-exploit-telegram-api-spread-golang-backdoor/ www.secnews.physaphae.fr/article.php?IdArticle=8648769 False Malware,Threat None 3.0000000000000000 HackRead - Chercher Cyber RansomHub: The New King of Ransomware? Targeted 600 Firms in 2024 RansomHub emerges as a major ransomware threat in 2024, targeting 600 organizations after ALPHV and LockBit disruptions. Group-IB…]]> 2025-02-14T21:34:07+00:00 https://hackread.com/ransomhub-king-of-ransomware-600-firms-2024/ www.secnews.physaphae.fr/article.php?IdArticle=8648545 False Ransomware,Threat None 2.0000000000000000 HackRead - Chercher Cyber Scammers Exploit JFK Files Release with Malware and Phishing Veriti Research reported a developing cyber threat campaign centred around the declassification and release of the RFK, MLK…]]> 2025-02-14T16:59:45+00:00 https://hackread.com/scammers-exploit-jfk-files-release-malware-phishing/ www.secnews.physaphae.fr/article.php?IdArticle=8648514 False Malware,Threat None 2.0000000000000000 HackRead - Chercher Cyber Microsoft Uncovers \\'BadPilot\\' Campaign as Seashell Blizzard Targets US and UK Russian GRU-linked hackers exploit known software flaws to breach critical networks worldwide, targeting the United States and the…]]> 2025-02-13T21:27:54+00:00 https://hackread.com/microsoft-badpilot-campaign-seashell-blizzard-usa-uk/ www.secnews.physaphae.fr/article.php?IdArticle=8648424 False Threat APT 44 3.0000000000000000 HackRead - Chercher Cyber Apple Confirms \\'Extremely Sophisticated\\' Exploit Threatening iOS Security Apple fixes the USB Restricted Mode flaw in iOS 18.3.1 and iPadOS 18.3.1.  Vulnerability exploited in targeted attacks.…]]> 2025-02-12T13:45:35+00:00 https://hackread.com/apple-extremely-sophisticated-exploit-ios-security/ www.secnews.physaphae.fr/article.php?IdArticle=8648202 False Vulnerability,Threat None 3.0000000000000000 HackRead - Chercher Cyber Ukraine\\'s largest bank PrivatBank Targeted with SmokeLoader malware UAC-0006, a financially motivated threat actor, targets PrivatBank customers with advanced phishing attacks. CloudSEK’s research reveals malicious emails…]]> 2025-02-06T13:14:40+00:00 https://hackread.com/ukraine-largest-bank-privatbank-smokeloader-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8647214 False Malware,Threat None 3.0000000000000000 HackRead - Chercher Cyber SpyCloud Pioneers the Shift to Holistic Identity Threat Protection Austin, TX, USA, 4th February 2025, CyberNewsWire]]> 2025-02-04T13:00:26+00:00 https://hackread.com/spycloud-pioneers-the-shift-to-holistic-identity-threat-protection/ www.secnews.physaphae.fr/article.php?IdArticle=8646802 False Threat None 3.0000000000000000 HackRead - Chercher Cyber FUNNULL Unmasked: AWS, Azure Abused for Global Cybercrime Operations Discover how cybercriminals use \'Infrastructure Laundering\' to exploit AWS and Azure for scams, phishing, and money laundering. Learn about FUNNULL CDN\'s tactics and their global impact on businesses and cybersecurity.]]> 2025-01-31T16:06:38+00:00 https://hackread.com/funnull-aws-azure-abused-global-cybercrime-operations/ www.secnews.physaphae.fr/article.php?IdArticle=8645303 False Threat None 3.0000000000000000 HackRead - Chercher Cyber Russian UAC-0063 Targets Europe and Central Asia with Advanced Malware UAC-0063: A Russian-linked threat actor targeting Central Asia and Europe with sophisticated cyberespionage campaigns, including weaponized documents, data…]]> 2025-01-29T22:14:04+00:00 https://hackread.com/russian-uac-0063-europe-central-asia-advanced-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8644502 False Malware,Threat None 3.0000000000000000 HackRead - Chercher Cyber SonicWall SMA Appliances Exploited in Zero-Day Attacks Critical security flaw in SonicWall SMA 1000 appliances (CVE-2025-23006) exploited as a zero-day. Rated CVSS 9.8, patch immediately…]]> 2025-01-27T11:11:34+00:00 https://hackread.com/sonicwall-sma-appliances-exploited-zero-day-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8643289 False Vulnerability,Threat None 2.0000000000000000 HackRead - Chercher Cyber Hackers Use XWorm RAT to Exploit Script Kiddies, Pwning 18,000 Devices Crooks pwning crooks – Hackers exploit script kiddies with XWorm RAT, compromising 18,000+ devices globally and stealing sensitive…]]> 2025-01-24T16:19:52+00:00 https://hackread.com/hackers-script-kiddes-xworm-rat-compromise-devices/ www.secnews.physaphae.fr/article.php?IdArticle=8642145 False Threat None 2.0000000000000000 HackRead - Chercher Cyber Zendesk\\'s Subdomain Registration Exposed to Phishing, Pig Butchering Scams CloudSEK uncovers a Zendesk vulnerability allowing cybercriminals to exploit subdomains for phishing and investment scams. Learn about the…]]> 2025-01-22T20:35:23+00:00 https://hackread.com/zendesk-subdomain-registration-abused-phishing-scams/ www.secnews.physaphae.fr/article.php?IdArticle=8641264 False Vulnerability,Threat None 2.0000000000000000 HackRead - Chercher Cyber Cloudflare Mitigates Massive 5.6 Tbps Mirai-Variant DDoS Attack Cloudflare mitigates a record-breaking 5.6 Tbps DDoS attack, highlighting the growing threat of hyper-volumetric assaults. Learn about the…]]> 2025-01-22T18:07:54+00:00 https://hackread.com/cloudflare-mitigates-5-6-tbps-mirai-ddos-attack/ www.secnews.physaphae.fr/article.php?IdArticle=8641193 False Threat None 4.0000000000000000 HackRead - Chercher Cyber Scammers Exploit California Wildfires, Posing as Fire Relief Services Cybercriminals are exploiting the California wildfires by launching phishing scams. Learn how hackers are targeting victims with fake domains and deceptive tactics, and how to protect yourself from these cyber threats.]]> 2025-01-16T09:18:02+00:00 https://hackread.com/scammers-exploit-california-wildfires-fire-relief-services/ www.secnews.physaphae.fr/article.php?IdArticle=8638181 False Threat None 3.0000000000000000 HackRead - Chercher Cyber Hackers Using Fake YouTube Links to Steal Login Credentials Cybercriminals exploit fake YouTube links to redirect users to phishing pages, stealing login credentials via URI manipulation and…]]> 2025-01-14T13:03:02+00:00 https://hackread.com/hackers-fake-youtube-links-steal-login-credentials/ www.secnews.physaphae.fr/article.php?IdArticle=8637136 False Threat None 3.0000000000000000 HackRead - Chercher Cyber Hackers Breach Telefonica Network, Leak 2.3 GB of Data Online Telefónica faces a data breach impacting its internal systems, linked to hackers using compromised credentials. Learn more about this alarming cyber threat.]]> 2025-01-13T11:22:47+00:00 https://hackread.com/hackers-breach-telefonica-network-leak-data-online/ www.secnews.physaphae.fr/article.php?IdArticle=8636692 False Data Breach,Threat None 3.0000000000000000 HackRead - Chercher Cyber Fake PoC Exploit Targets Cybersecurity Researchers with Malware A fake proof-of-concept (PoC) exploit designed to lure cybersecurity researchers into downloading malicious software. This deceptive tactic leverages a recently patched critical vulnerability in Microsoft\'s Windows LDAP service (CVE-2024-49113), which can cause denial-of-service attacks.]]> 2025-01-11T13:47:03+00:00 https://hackread.com/fake-poc-exploit-hit-cybersecurity-researchers-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8636003 False Malware,Vulnerability,Threat None 3.0000000000000000 HackRead - Chercher Cyber Harnessing AI for Proactive Threat Intelligence and Advanced Cyber Defense Discover how AI revolutionizes cybersecurity with real-time threat detection, adaptive protection, and advanced data protection to combat evolving…]]> 2025-01-09T18:16:49+00:00 https://hackread.com/harnessing-ai-proactive-threat-intelligence-cyber-defense/ www.secnews.physaphae.fr/article.php?IdArticle=8635368 False Threat None 3.0000000000000000 HackRead - Chercher Cyber Fake 7-Zip Exploit Code Traced to AI-Generated Misinterpretation A recent claim that a critical zero-day vulnerability existed in the popular open-source file archiver 7-Zip has been met with skepticism from the software\'s creator and other security researchers.]]> 2025-01-02T18:39:30+00:00 https://hackread.com/fake-7-zip-exploit-code-ai-generated-misinterpretation/ www.secnews.physaphae.fr/article.php?IdArticle=8632825 False Vulnerability,Threat None 3.0000000000000000 HackRead - Chercher Cyber FICORA, CAPSAICIN Botnets Exploit Old D-Link Router Flaws for DDoS Attacks Mirai and Keksec botnet variants are exploiting critical vulnerabilities in D-Link routers. Learn about the impact, affected devices, and how to protect yourself from these attacks.]]> 2024-12-28T15:52:01+00:00 https://hackread.com/ficora-capsaicin-botnet-d-link-router-flaws-ddos-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8630986 False Vulnerability,Threat None 2.0000000000000000 HackRead - Chercher Cyber Researchers Uncover Dark Web Operation Entirely Focused on KYC Bypass iProov uncovers a major Dark Web operation selling stolen identities with matching biometrics, posing a serious threat to KYC verification systems]]> 2024-12-26T10:58:01+00:00 https://hackread.com/dark-web-operation-entirely-focused-on-kyc-bypass/ www.secnews.physaphae.fr/article.php?IdArticle=8630176 False Threat None 2.0000000000000000 HackRead - Chercher Cyber SEO Poisoning: How Cybercriminals Are Turning Search Engines into Traps Stay protected from SEO poisoning, a cyber threat exploiting search engine rankings to spread malware and phishing scams.…]]> 2024-12-25T22:24:39+00:00 https://hackread.com/seo-poisoning-how-scammers-search-engines-traps/ www.secnews.physaphae.fr/article.php?IdArticle=8630000 False Malware,Threat None 2.0000000000000000 HackRead - Chercher Cyber Lazarus Group Targets Nuclear Industry with CookiePlus Malware KEY SUMMARY POINTS Securelist by Kaspersky has published its latest threat intelligence report focused on the activities of…]]> 2024-12-23T20:06:03+00:00 https://hackread.com/lazarus-group-nuclear-industry-cookieplus-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8629231 False Malware,Threat APT 38 4.0000000000000000 HackRead - Chercher Cyber Hackers Use Fake PoCs on GitHub to Steal WordPress Credentials, AWS Keys SUMMARY Datadog Security Labs\' cybersecurity researchers have discovered a new, malicious year-long campaign from a threat actor identified…]]> 2024-12-17T14:12:35+00:00 https://hackread.com/hackers-fake-pocs-github-wordpress-credentials-aws-keys/ www.secnews.physaphae.fr/article.php?IdArticle=8626604 False Threat None 2.0000000000000000 HackRead - Chercher Cyber US Sanctions Chinese Cybersecurity Firm for Firewall Exploit, Ransomware Attacks SUMMARY The United States has taken strong action against a Chinese cybersecurity company, Sichuan Silence Information Technology, for…]]> 2024-12-12T19:33:38+00:00 https://hackread.com/us-sanctions-chinese-cybersecurityfirm-firewall-ransomware/ www.secnews.physaphae.fr/article.php?IdArticle=8624190 False Ransomware,Threat None 3.0000000000000000 HackRead - Chercher Cyber Scammers Exploit Fake Domains in Dubai Police Phishing Scams BforeAI has discovered a surge in phishing attacks targeting the Dubai Police, a government-run entity. Learn how cybercriminals are exploiting the Dubai Police name to steal personal information and money.]]> 2024-12-12T13:10:09+00:00 https://hackread.com/scammers-fake-domains-dubai-police-phishing-scams/ www.secnews.physaphae.fr/article.php?IdArticle=8624046 False Threat,Legislation None 3.0000000000000000 HackRead - Chercher Cyber Hackers Target Job Seekers with AppLite Trojan Using Fake Job Emails SUMMARY AppLite banking trojan is a newly discovered stealthy mobile malware threat targeting mobile devices. Learn about its…]]> 2024-12-10T14:57:28+00:00 https://hackread.com/hackers-job-seekers-banking-trojan-fake-job-emails/ www.secnews.physaphae.fr/article.php?IdArticle=8622892 False Malware,Threat,Mobile None 3.0000000000000000 HackRead - Chercher Cyber Critical Windows Zero-Day Alert: No Patch Available Yet for Users Protect your systems with automated patching and server hardening strategies to defend against vulnerabilities like the NTLM zero-day.…]]> 2024-12-09T21:36:14+00:00 https://hackread.com/windows-zero-day-alert-no-patch-available-for-users/ www.secnews.physaphae.fr/article.php?IdArticle=8622470 False Vulnerability,Threat,Patching None 4.0000000000000000 HackRead - Chercher Cyber “aiocpa” Python Package Exposed as Cryptocurrency Infostealer SUMMARY The machine learning-based threat-hunting system of leading threat intelligence and cybersecurity firm ReversingLabs (RL) recently detected malicious…]]> 2024-12-05T13:46:51+00:00 https://hackread.com/aiocpa-python-package-cryptocurrency-infostealer/ www.secnews.physaphae.fr/article.php?IdArticle=8620070 False Threat None 2.0000000000000000 HackRead - Chercher Cyber How Attackers Use Corrupted Files to Slip Past Security New zero-day attack bypasses antivirus, sandboxes, and spam filters using corrupted files. Learn how ANY.RUN\'s sandbox detects and…]]> 2024-12-03T01:03:36+00:00 https://hackread.com/how-attackers-use-corrupted-files-slip-past-security/ www.secnews.physaphae.fr/article.php?IdArticle=8618856 False Spam,Vulnerability,Threat None 2.0000000000000000 HackRead - Chercher Cyber Russian Hackers Exploit Firefox and Windows 0-Days to Deploy Backdoor Watch out for the Russian hackers from the infamous RomRom group, also known as Storm-0978, Tropical Scorpius, or UNC2596, and their use of a custom backdoor.]]> 2024-11-27T16:15:07+00:00 https://hackread.com/russian-hackers-firefox-windows-0-days-backdoor/ www.secnews.physaphae.fr/article.php?IdArticle=8618061 False Threat None 2.0000000000000000 HackRead - Chercher Cyber Operation Lunar Peek: More Than 2,000 Palo Alto Network Firewalls Hacked The Shadowserver Foundation reports over 2,000 Palo Alto Networks firewalls have been hacked via two zero-day vulnerabilities: CVE-2024-0012…]]> 2024-11-22T18:31:26+00:00 https://hackread.com/operation-lunar-peek-palo-alto-firewalls-hacked/ www.secnews.physaphae.fr/article.php?IdArticle=8616159 False Vulnerability,Threat None 3.0000000000000000 HackRead - Chercher Cyber Hackers Exploit Misconfigured Jupyter Servers for Illegal Sports Streaming Aqua Nautilus\' research reveals hackers are leveraging vulnerable and misconfigured Jupyter Notebook servers to steal live sports streams.…]]> 2024-11-20T14:44:14+00:00 https://hackread.com/hackers-exploit-misconfigured-jupyter-servers-sports-streaming/ www.secnews.physaphae.fr/article.php?IdArticle=8614786 False Threat None 2.0000000000000000 HackRead - Chercher Cyber Microsoft\\'s November Patch Tuesday Fixes 91 Vulnerabilities, 4 Zero-Days Microsoft\'s November 2024 Patch Tuesday update fixes 91 security vulnerabilities, including four zero-day vulnerabilities. Critical fixes address actively…]]> 2024-11-12T22:00:14+00:00 https://hackread.com/microsofts-november-patch-tuesday-fix-91-vulnerabilities/ www.secnews.physaphae.fr/article.php?IdArticle=8610025 False Vulnerability,Threat None 2.0000000000000000 HackRead - Chercher Cyber L\\\\\\\\\\\'importance d\\\\\\\\\\\'une réponse efficace sur les incidents [L\\\\\\\\\\\'importance d\\\\\\\\\\\'une réponse efficace sur les incidents ] With cybersecurity threats continuously evolving, having a strong incident response (IR) plan is crucial for businesses of all…]]> 2024-11-11T00:02:57+00:00 https://hackread.com/the-importance-of-effective-incident-response/ www.secnews.physaphae.fr/article.php?IdArticle=8609091 False Threat None 3.0000000000000000 HackRead - Chercher Cyber Les pirates peuvent accéder aux commandes de véhicules Mazda via les vulnérabilités du système<br>Hackers Can Access Mazda Vehicle Controls Via System Vulnerabilities Hackers can exploit critical vulnerabilities in Mazda\'s infotainment system, including one that enables code execution via USB, compromising…]]> 2024-11-08T17:13:26+00:00 https://hackread.com/hackers-mazda-vehicle-controls-system-vulnerabilities/ www.secnews.physaphae.fr/article.php?IdArticle=8608211 False Vulnerability,Threat None 3.0000000000000000 HackRead - Chercher Cyber Un guide étape par étape sur le fonctionnement de la chasse aux menaces<br>A Step-by-Step Guide to How Threat Hunting Works Stay ahead of cybercrime with proactive threat hunting. Learn how threat hunters identify hidden threats, protect critical systems,…]]> 2024-11-01T00:32:10+00:00 https://hackread.com/a-step-by-step-guide-to-how-threat-hunting-works/ www.secnews.physaphae.fr/article.php?IdArticle=8604414 False Threat None 3.0000000000000000 HackRead - Chercher Cyber Une nouvelle attaque permet aux pirates de rétrograder Windows pour exploiter les défauts corrigés<br>New Attack Lets Hackers Downgrade Windows to Exploit Patched Flaws SafeBreach Labs unveils ‘Windows Downdate,’ a new attack method which compromises Windows 11 by downgrading system components, and…]]> 2024-10-26T12:00:38+00:00 https://hackread.com/hackers-downgrade-windows-exploit-patched-flaws/ www.secnews.physaphae.fr/article.php?IdArticle=8602029 False Threat None 2.0000000000000000 HackRead - Chercher Cyber UNC5820 exploite la vulnérabilité de Fortimanager (CVE-2024-47575)<br>UNC5820 Exploits FortiManager Zero-Day Vulnerability (CVE-2024-47575) Fortinet and Mandiant investigated the mass exploitation of FortiManager devices via CVE-2024-47575, impacting 50+ systems across industries. Threat…]]> 2024-10-25T12:03:48+00:00 https://hackread.com/unc5820-exploits-fortimanager-zero-day-vulnerability/ www.secnews.physaphae.fr/article.php?IdArticle=8601677 False Vulnerability,Threat None 2.0000000000000000 HackRead - Chercher Cyber Le groupe Lazarus exploite Chrome 0-Day pour la crypto avec un faux jeu NFT<br>Lazarus Group Exploits Chrome 0-Day for Crypto with Fake NFT Game North Korean hackers from Lazarus Group exploited a zero-day vulnerability in Google Chrome to target cryptocurrency investors with…]]> 2024-10-24T17:38:25+00:00 https://hackread.com/north-korean-hackers-crypto-deceptive-game-zero-day-exploit/ www.secnews.physaphae.fr/article.php?IdArticle=8601586 False Vulnerability,Threat APT 38 2.0000000000000000 HackRead - Chercher Cyber Les défauts zéro-jours ont exposé des chargeurs EV aux arrêts et vols de données<br>Zero-day Flaws Exposed EV Chargers to Shutdowns and Data Theft NCC Group experts share details of how they exploited critical zero-day vulnerabilities in Phoenix Contact EV chargers (electric…]]> 2024-10-14T13:25:10+00:00 https://hackread.com/zero-day-flaws-ev-chargers-to-shutdowns-data-theft/ www.secnews.physaphae.fr/article.php?IdArticle=8597642 False Vulnerability,Threat None 2.0000000000000000 HackRead - Chercher Cyber Les escrocs ont frappé les victimes d'ouragans de Floride avec de fausses réclamations FEMA, fichiers malveillants<br>Scammers Hit Florida Hurricane Victims with Fake FEMA Claims, Malware Files Cybercriminals exploit disaster relief efforts to target vulnerable individuals and organizations in Florida, compromising the integrity of relief…]]> 2024-10-09T10:18:42+00:00 https://hackread.com/scammers-florida-hurricane-victim-fake-fema-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8594769 False Malware,Threat None 2.0000000000000000 HackRead - Chercher Cyber Lua malware ciblant les joueurs d'étudiants via de faux tricheurs de jeu<br>Lua Malware Targeting Student Gamers via Fake Game Cheats Morphisec Threat Labs uncovers sophisticated Lua malware targeting student gamers and educational institutions. Learn how these attacks work…]]> 2024-10-08T15:38:16+00:00 https://hackread.com/lua-malware-hit-student-gamers-fake-game-cheats/ www.secnews.physaphae.fr/article.php?IdArticle=8594349 False Malware,Threat None 3.0000000000000000 HackRead - Chercher Cyber L'acteur de menace de la tempête-1575 déploie de nouveaux panneaux de connexion pour les infrastructures de phishing<br>Storm-1575 Threat Actor Deploys New Login Panels for Phishing Infrastructure The Storm-1575 group is known for frequently rebranding its phishing infrastructure. Recently, ANY.RUN analysts identified the deployment of…]]> 2024-10-08T11:24:51+00:00 https://hackread.com/storm-1575-threat-actor-new-login-panels-phishing-infrastructure/ www.secnews.physaphae.fr/article.php?IdArticle=8594217 False Threat None 3.0000000000000000 HackRead - Chercher Cyber Any.run améliore l'intelligence des menaces pour identifier les menaces émergentes<br>ANY.RUN Upgrades Threat Intelligence to Identify Emerging Threats Dubai Silicon Oasis, United Arab Emirates, 3rd October 2024, CyberNewsWire]]> 2024-10-03T18:45:04+00:00 https://hackread.com/any-run-upgrades-threat-intelligence-to-identify-emerging-threats/ www.secnews.physaphae.fr/article.php?IdArticle=8591459 False Threat None 3.0000000000000000 HackRead - Chercher Cyber DragonForce Ransomware étend Raas, cible les entreprises du monde entier<br>DragonForce Ransomware Expands RaaS, Targets Firms Worldwide DragonForce ransomware is expanding its RaaS operation and becoming a global cybersecurity threat against businesses worldwide. Companies must…]]> 2024-09-25T14:53:59+00:00 https://hackread.com/dragonforce-ransomware-expands-raas-targets-firms/ www.secnews.physaphae.fr/article.php?IdArticle=8584806 False Ransomware,Threat None 2.0000000000000000 HackRead - Chercher Cyber US Sanctions Intellexa Spyware Network sur la menace de sécurité nationale<br>US Sanctions Intellexa Spyware Network Over Threat to National Security The U.S. Treasury sanctions the Intellexa Consortium and key figures for distributing Predator spyware, a serious national security…]]> 2024-09-19T13:14:21+00:00 https://hackread.com/us-sanctions-intellexa-spyware-national-security/ www.secnews.physaphae.fr/article.php?IdArticle=8579591 False Threat None 3.0000000000000000 HackRead - Chercher Cyber Les pirates de dragon chinois exploitent les serveurs Windows mondiaux dans la fraude du référencement<br>Chinese DragonRank Hackers Exploit Global Windows Servers in SEO Fraud DragonRank, a Chinese-speaking hacking group, has compromised 30+ Windows servers globally. They exploit IIS vulnerabilities to manipulate SEO…]]> 2024-09-11T18:38:02+00:00 https://hackread.com/chinese-dragonrank-hackers-windows-servers-seo-fraud/ www.secnews.physaphae.fr/article.php?IdArticle=8574758 False Vulnerability,Threat None 3.0000000000000000 HackRead - Chercher Cyber APT29 russe à l'aide d'exploits de style groupe NSO dans les attaques, Google<br>Russian APT29 Using NSO Group-Style Exploits in Attacks, Google Google\'s Threat Analysis Group (TAG) has exposed a new campaign by Russian state-backed APT29, also known as Cozy…]]> 2024-08-30T13:26:41+00:00 https://hackread.com/google-russian-apt29-nso-group-exploits-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8566880 False Threat APT 29 2.0000000000000000 HackRead - Chercher Cyber Broisée de données TDECU: plus de 500 000 membres affectés par Moveit Exploit<br>TDECU Data Breach: 500,000+ Members Affected by MOVEit Exploit TDECU reports a data breach affecting over 500,000 members due to a MOVEit vulnerability. Compromised data includes Social…]]> 2024-08-27T11:37:11+00:00 https://hackread.com/tdecu-data-breach-by-moveit-exploit/ www.secnews.physaphae.fr/article.php?IdArticle=8564656 False Data Breach,Vulnerability,Threat None 3.0000000000000000 HackRead - Chercher Cyber De nouvelles attaques de phishing ciblent les utilisateurs de la Banque d'Europe de l'Est sur iOS et Android<br>New Phishing Attacks Target Eastern European Bank Users on iOS and Android Cybercriminals exploit Progressive Web Apps (PWAs) in the latest phishing scam, targeting mobile users in Czechia, Hungary, and…]]> 2024-08-20T22:49:25+00:00 https://hackread.com/phishing-attacks-eastern-europe-bank-ios-android/ www.secnews.physaphae.fr/article.php?IdArticle=8561072 False Threat,Mobile None 3.0000000000000000 HackRead - Chercher Cyber Todoswift Malware cible MacOS, déguisé en application Bitcoin PDF<br>TodoSwift Malware Targets macOS, Disguised as Bitcoin PDF App Meet TodoSwift, a malicious application that masquerades as a PDF downloader. Crafted by the BlueNoroff threat group, TodoSwift leverages…]]> 2024-08-20T16:25:16+00:00 https://hackread.com/todoswift-malware-macos-disguised-bitcoin-pdf-app/ www.secnews.physaphae.fr/article.php?IdArticle=8560924 False Malware,Threat None 3.0000000000000000 HackRead - Chercher Cyber Les pirates pourraient exploiter les équipes Microsoft sur MacOS pour voler des données<br>Hackers Could Exploit Microsoft Teams on macOS to Steal Data Cisco Talos reveals 8 vulnerabilities in Microsoft’s macOS apps, exploiting TCC framework weaknesses. Hackers can bypass security, inject…]]> 2024-08-20T12:34:38+00:00 https://hackread.com/hackers-exploit-microsoft-teams-macos-steal-data/ www.secnews.physaphae.fr/article.php?IdArticle=8560824 False Vulnerability,Threat None 3.0000000000000000 HackRead - Chercher Cyber La Criminal IP et Maltego collaborent pour élargir la recherche de données de renseignement sur les menaces<br>Criminal IP and Maltego Collaborate to Broaden Threat Intelligence Data Search Torrance, United States / California, 12th August 2024, CyberNewsWire]]> 2024-08-12T14:01:09+00:00 https://hackread.com/criminal-ip-and-maltego-collaborate-to-broaden-threat-intelligence-data-search/ www.secnews.physaphae.fr/article.php?IdArticle=8556388 False Threat None 2.0000000000000000 HackRead - Chercher Cyber Black Hat USA 2024: Chip Flaw \\ 'Ghostwrite \\' vole les données de la mémoire du processeur<br>Black Hat USA 2024: Chip Flaw \\'GhostWrite\\' Steals Data from CPU Memory Black Hat USA 2024: Critical RISC-V CPU vulnerability discovered. Dubbed GhostWrite; attackers can exploit this flaw to steal…]]> 2024-08-08T17:37:13+00:00 https://hackread.com/black-hat-usa-2024-chip-flaw-ghostwrite-data-cpu-memory/ www.secnews.physaphae.fr/article.php?IdArticle=8554213 False Vulnerability,Threat None 3.0000000000000000 HackRead - Chercher Cyber Protocole Nexera Defi piraté: 1,8 million de dollars volés dans les principaux contrats intelligents Exploit<br>Nexera DeFi Protocol Hacked: $1.8M Stolen in Major Smart Contract Exploit Learn how a smart contract vulnerability led to the theft of $1.8 million from Nexera, a DeFi protocol.…]]> 2024-08-07T21:26:22+00:00 https://hackread.com/nexera-defi-protocol-hacked-smart-contract-exploit/ www.secnews.physaphae.fr/article.php?IdArticle=8553672 False Vulnerability,Threat None 3.0000000000000000 HackRead - Chercher Cyber Les nouveaux cahiers Jupyter DDOS Panamorfi exploits<br>New Panamorfi DDoS Attack Exploits Misconfigured Jupyter Notebooks “Panamorfi,” a new DDoS attack, exploits Discord, Minecraft, and Jupyter Notebooks. Cybersecurity researchers warn of this threat targeting…]]> 2024-08-02T16:47:03+00:00 https://hackread.com/panamorfi-ddos-attack-misconfigured-jupyter-notebooks/ www.secnews.physaphae.fr/article.php?IdArticle=8549908 False Threat None 3.0000000000000000 HackRead - Chercher Cyber Hacker Stracches et publie la liste IOC de 100 000 lignes<br>Hacker Scrapes and Publishes 100,000-Line CrowdStrike IoC List USDoD hacker scrapes and leaks a 100,000-line Indicator of Compromise (IoC) list from CrowdStrike, revealing detailed threat intelligence…]]> 2024-07-30T00:24:10+00:00 https://hackread.com/hacker-scrapes-publishes-crowdstrike-ioc-list/ www.secnews.physaphae.fr/article.php?IdArticle=8546940 False Threat None 2.0000000000000000 HackRead - Chercher Cyber Les chercheurs mettent en garde contre l'augmentation de l'activité de cyberterrorisme ciblant les Jeux olympiques de Paris<br>Researchers Warn of Increased Cyberterrorism Activity Targeting Paris Olympics Cyberterrorism is on the rise, posing a significant threat to global events like the Paris Olympics and elections,…]]> 2024-07-26T17:22:17+00:00 https://hackread.com/increased-cyberterrorism-activity-paris-olympics-warn/ www.secnews.physaphae.fr/article.php?IdArticle=8544905 False Threat None 3.0000000000000000 HackRead - Chercher Cyber Télégramme Android Vulnérabilité «Evilvideo» envoie des logiciels malveillants sous forme de vidéos<br>Telegram Android Vulnerability “EvilVideo” Sends Malware as Videos EvilVideo exploit in Telegram for Android lets attackers send malware disguised as videos. ESET discovered this zero-day vulnerability,…]]> 2024-07-22T17:57:53+00:00 https://hackread.com/telegram-android-vulnerability-evilvideo-malware-videos/ www.secnews.physaphae.fr/article.php?IdArticle=8542175 False Malware,Vulnerability,Threat,Mobile None 3.0000000000000000