www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2025-05-12T11:23:08+00:00 www.secnews.physaphae.fr SecurityWeek - Security News Cyperspies iraniennes exploitant la vulnérabilité récente du noyau Windows<br>Iranian Cyberspies Exploiting Recent Windows Kernel Vulnerability Le pétrole APT lié à l'Iran a intensifié les cyber-opérations contre les Émirats arabes unis et la région du Golfe plus large.
>The Iran-linked APT OilRig has intensified cyber operations against the United Arab Emirates and the broader Gulf region. ]]>
2024-10-14T11:20:49+00:00 https://www.securityweek.com/iranian-cyberspies-exploiting-recent-windows-kernel-vulnerability/ www.secnews.physaphae.fr/article.php?IdArticle=8597613 False Vulnerability APT 34 2.0000000000000000
SecurityWeek - Security News Les pirates iraniens se sont cachées pendant 8 mois dans le réseau gouvernemental<br>Iranian Hackers Lurked for 8 Months in Government Network Le groupe de piratage lié à l'Iran, Crambus, a passé huit mois dans un réseau compromis d'un gouvernement du Moyen-Orient, les rapports de l'unité de cybersécurité de Broadcom \\ de Broadcom.
>Iran-linked hacking group Crambus spent eight months inside a compromised network of a Middle Eastern government, Broadcom\'s Symantec cybersecurity unit reports. ]]>
2023-10-20T12:29:53+00:00 https://www.securityweek.com/iranian-hackers-lurked-for-8-months-in-government-network/ www.secnews.physaphae.fr/article.php?IdArticle=8398261 False None APT 34 2.0000000000000000
SecurityWeek - Security News Iran-Linked OilRig APT Caught Using New Backdoor 2022-05-13T15:51:38+00:00 https://www.securityweek.com/iran-linked-oilrig-apt-caught-using-new-backdoor www.secnews.physaphae.fr/article.php?IdArticle=4591823 False None APT 34 None SecurityWeek - Security News Iranian Hackers Use New Malware in Recent Attacks 2019-07-19T17:46:01+00:00 https://www.securityweek.com/iranian-hackers-use-new-malware-recent-attacks www.secnews.physaphae.fr/article.php?IdArticle=1215568 False Malware APT 34 3.0000000000000000 SecurityWeek - Security News Russia-Linked Hackers Hijack Infrastructure of Iranian Threat Group 2019-06-20T18:11:01+00:00 https://www.securityweek.com/russia-linked-hackers-hijack-infrastructure-iranian-threat-group www.secnews.physaphae.fr/article.php?IdArticle=1166425 False Threat APT 34 None SecurityWeek - Security News Iran-Linked Hackers Use Just-in-Time Creation of Weaponized Attack Docs 2018-11-19T14:26:03+00:00 https://www.securityweek.com/iran-linked-hackers-use-just-time-creation-weaponized-attack-docs www.secnews.physaphae.fr/article.php?IdArticle=909427 False None APT 34 None SecurityWeek - Security News Iranian Hackers Improve Recently Used Cyber Weapon 2018-09-05T14:16:03+00:00 https://www.securityweek.com/iranian-hackers-improve-recently-used-cyber-weapon www.secnews.physaphae.fr/article.php?IdArticle=796423 False None APT 34 None SecurityWeek - Security News Breaches Increasingly Discovered Internally: Mandiant Organizations are getting increasingly better at discovering data breaches on their own, with more than 60% of intrusions in 2017 detected internally, according to FireEye-owned Mandiant. The company's M-Trends report for 2018 shows that the global median time for internal detection dropped to 57.5 days in 2017, compared to 80 days in the previous year. Of the total number of breaches investigated by Mandiant last year, 62% were discovered internally, up from 53% in 2016. On the other hand, it still took roughly the same amount of time for organizations to learn that their systems had been compromised. The global median dwell time in 2017 – the median time from the first evidence of a hack to detection – was 101 days, compared to 99 days in 2016. Companies in the Americas had the shortest median dwell time (75.5 days), while organizations in the APAC region had the longest dwell time (nearly 500 days). Dwell time data from Mandiant Data collected by Mandiant in 2013 showed that more than one-third of organizations had been attacked again after the initial incident had been remediated. More recent data, specifically from the past 19 months, showed that 56% of Mandiant customers were targeted again by either the same group or one with similar motivation. In cases where investigators discovered at least one type of significant activity (e.g. compromised accounts, data theft, lateral movement), the targeted organization was successfully attacked again within one year. Organizations that experienced more than one type of significant activity were attacked by more than one threat actor. Again, the highest percentage of companies attacked multiple times and by multiple threat groups was in the APAC region – more than double compared to the Americas and the EMEA region. When it comes to the most targeted industries, companies in the financial and high-tech sectors recorded the highest number of significant attacks, while the high-tech, telecommunications and education sectors were hit by the highest number of different hacker groups. Last year, FireEye assigned names to four state-sponsored threat groups, including the Vietnam-linked APT32 (OceanLotus), and the Iran-linked APT33, APT34 (OilRig), and APT35 (NewsBeef, Newscaster and Charming Kitten). ]]> 2018-04-04T14:00:03+00:00 https://www.securityweek.com/breaches-increasingly-discovered-internally-mandiant www.secnews.physaphae.fr/article.php?IdArticle=565681 False Conference APT33,APT 35,APT 33,APT 32,APT 34 None SecurityWeek - Security News Iran-linked Hackers Adopt New Data Exfiltration Methods multiple tools and adopting new exploits fast, as well as switching to new Trojans in ]]> 2018-03-22T15:30:01+00:00 http://feedproxy.google.com/~r/Securityweek/~3/zBrgd5dQwlE/iran-linked-hackers-adopt-new-data-exfiltration-methods www.secnews.physaphae.fr/article.php?IdArticle=535286 True Guideline APT 34 None SecurityWeek - Security News Iranian Hackers Use New Trojan in Recent Attacks 2018-02-23T18:38:01+00:00 http://feedproxy.google.com/~r/Securityweek/~3/17ITyN_B24s/iranian-hackers-use-new-trojan-recent-attacks www.secnews.physaphae.fr/article.php?IdArticle=489793 False None APT 34 None SecurityWeek - Security News Iranian Hackers Target IIS Web Servers With New Backdoor ]]> 2018-01-26T12:35:16+00:00 http://feedproxy.google.com/~r/Securityweek/~3/Gn1YoBZlv54/iranian-hackers-target-iis-web-servers-new-backdoor www.secnews.physaphae.fr/article.php?IdArticle=460582 False None APT 34 None SecurityWeek - Security News Iranian Cyberspy Groups Share Malware Code 2017-07-27T14:57:39+00:00 http://feedproxy.google.com/~r/Securityweek/~3/g4Fzgx6tzRM/iranian-cyberspy-groups-share-malware-code www.secnews.physaphae.fr/article.php?IdArticle=389831 False None APT 34 None SecurityWeek - Security News Iranian Group Delivers Malware via Fake Oxford University Sites 2017-01-06T14:49:11+00:00 http://feedproxy.google.com/~r/Securityweek/~3/c5geNB9jXs0/iranian-group-delivers-malware-fake-oxford-university-sites www.secnews.physaphae.fr/article.php?IdArticle=287214 False None APT 34 None