www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-08T03:46:52+00:00 www.secnews.physaphae.fr Dark Reading - Informationweek Branch Le bogue Gitlab Critical sous Exploit permet la prise de contrôle du compte, avertit CISA<br>Critical GitLab Bug Under Exploit Enables Account Takeover, CISA Warns Patch now: Cyberattackers are exploiting CVE-2023-7028 (CVSS 10) to take over and lock users out of GitLab accounts, steal source code, and more.]]> 2024-05-03T16:19:34+00:00 https://www.darkreading.com/application-security/critical-gitlab-bug-exploit-account-takeover-cisa www.secnews.physaphae.fr/article.php?IdArticle=8493077 False Threat None None Dark Reading - Informationweek Branch Dropbox Breach expose les informations d'identification des clients, les données d'authentification<br>Dropbox Breach Exposes Customer Credentials, Authentication Data Threat actor dropped in to Dropbox Sign production environment and accessed emails, passwords, and other PII, along with APIs, OAuth, and MFA info.]]> 2024-05-02T18:05:03+00:00 https://www.darkreading.com/application-security/dropbox-breach-exposes-customer-credentials-authentication-data www.secnews.physaphae.fr/article.php?IdArticle=8492545 False Threat None 2.0000000000000000 Dark Reading - Informationweek Branch MANUEL DE TANK MILITAINE, ancrage zéro-jour 2017 Dernières cyberattaques ukrainiennes<br>Military Tank Manual, 2017 Zero-Day Anchor Latest Ukraine Cyberattack The targeted operation utilized CVE-2017-8570 as the initial vector and employed a notable custom loader for Cobalt Strike, yet attribution to any known threat actor remains elusive.]]> 2024-04-26T13:45:02+00:00 https://www.darkreading.com/cyberattacks-data-breaches/military-tank-manual-zero-day-ukraine-cyberattack www.secnews.physaphae.fr/article.php?IdArticle=8489087 False Vulnerability,Threat None 3.0000000000000000 Dark Reading - Informationweek Branch La plus grande menace des élections de 2024: chaînes d'attaque de la cuisine<br>The Biggest 2024 Elections Threat: Kitchen-Sink Attack Chains Hackers can influence voters with media and breach campaigns, or try tampering with votes. Or they can combine these tactics to even greater effect.]]> 2024-04-25T21:00:21+00:00 https://www.darkreading.com/threat-intelligence/biggest-threat-2024-elections-kitchen-sink-attack-chains www.secnews.physaphae.fr/article.php?IdArticle=8488713 False Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Cisco Zero-Days Anchor \\ 'Arcaneroor \\' Campagne de cyber-espionnage<br>Cisco Zero-Days Anchor \\'ArcaneDoor\\' Cyber Espionage Campaign Attacks by a previously unknown threat actor leveraged two bugs in firewall devices to install custom backdoors on several government networks globally.]]> 2024-04-25T15:59:45+00:00 https://www.darkreading.com/endpoint-security/cisco-zero-days-arcanedoor-cyberespionage-campaign www.secnews.physaphae.fr/article.php?IdArticle=8488601 False Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Patch maintenant: Exploit de nuages de nuages Crushftp Zero-Day cible les orgs américains<br>Patch Now: CrushFTP Zero-Day Cloud Exploit Targets US Orgs An exploit for the vulnerability allows unauthenticated attackers to escape a virtual file system sandbox to download system files and potentially achieve RCE.]]> 2024-04-24T13:24:44+00:00 https://www.darkreading.com/cloud-security/patch-crushftp-zero-day-cloud-exploit-targets-us-orgs www.secnews.physaphae.fr/article.php?IdArticle=8488006 False Vulnerability,Threat,Cloud None 2.0000000000000000 Dark Reading - Informationweek Branch Russie \\'s Fancy Bear Pummels Windows Print Spooler Bogue<br>Russia\\'s Fancy Bear Pummels Windows Print Spooler Bug The infamous Russian threat actor has created a custom tool called GooseEgg to exploit CVE-2022-38028 in cyber-espionage attacks against targets in Ukraine, Western Europe, and North America.]]> 2024-04-23T13:21:39+00:00 https://www.darkreading.com/endpoint-security/russia-fancy-bear-pummels-windows-print-spooler-bug www.secnews.physaphae.fr/article.php?IdArticle=8487418 False Tool,Threat APT 28 3.0000000000000000 Dark Reading - Informationweek Branch Toddycat apt vole des données sur \\ 'échelle industrielle \\'<br>ToddyCat APT Is Stealing Data on \\'Industrial Scale\\' The threat actor is deploying multiple connections into victim environments to maintain persistence and steal data.]]> 2024-04-22T21:15:51+00:00 https://www.darkreading.com/cyber-risk/-toddycat-apt-is-stealing-data-on-an-industrial-scale- www.secnews.physaphae.fr/article.php?IdArticle=8487034 False Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Mitre att & cked: le nom le plus fiable d'Infosec \\ tombe aux bogues ivanti<br>MITRE ATT&CKED: InfoSec\\'s Most Trusted Name Falls to Ivanti Bugs The irony is lost on few, as a Chinese threat actor used eight MITRE techniques to breach MITRE itself - including exploiting the Ivanti bugs that attackers have been swarming on for months.]]> 2024-04-22T19:11:27+00:00 https://www.darkreading.com/endpoint-security/mitre-attacked-infosecs-most-trusted-name-falls-to-ivanti-bugs www.secnews.physaphae.fr/article.php?IdArticle=8486987 False Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Le directeur du FBI, Wray, émet un avertissement désastreux sur la menace de cybersécurité de la Chine<br>FBI Director Wray Issues Dire Warning on China\\'s Cybersecurity Threat Chinese actors are ready and poised to do "devastating" damage to key US infrastructure services if needed, he said.]]> 2024-04-19T19:54:12+00:00 https://www.darkreading.com/ics-ot-security/fbi-director-wray-issues-dire-warning-on-chinas-cybersecurity-threat www.secnews.physaphae.fr/article.php?IdArticle=8485476 False Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Les contrôleurs de réseau ICS ouverts à l'exploit à distance, aucun correctif disponible<br>ICS Network Controllers Open to Remote Exploit, No Patches Available CISA advisory warns of critical ICS device flaws, but a lack of available fixes leaves network administrators on defense to prevent exploits.]]> 2024-04-18T20:25:50+00:00 https://www.darkreading.com/ics-ot-security/ics-network-controllers-open-to-remote-exploit-no-patches-available www.secnews.physaphae.fr/article.php?IdArticle=8484930 False Threat,Industrial None 3.0000000000000000 Dark Reading - Informationweek Branch GPT-4 peut exploiter la plupart des vulnes simplement en lisant les avis de menace<br>GPT-4 Can Exploit Most Vulns Just by Reading Threat Advisories Existing AI technology can allow hackers to automate exploits for public vulnerabilities in minutes flat. Very soon, diligent patching will no longer be optional.]]> 2024-04-18T20:23:46+00:00 https://www.darkreading.com/threat-intelligence/gpt-4-can-exploit-most-vulns-just-by-reading-threat-advisories www.secnews.physaphae.fr/article.php?IdArticle=8484931 False Vulnerability,Threat,Patching None 2.0000000000000000 Dark Reading - Informationweek Branch Break Security Burnout: combiner le leadership avec les neurosciences<br>Break Security Burnout: Combining Leadership With Neuroscience Industry leaders aim to solve the threat to both the mental health of workers and security of organizations with solutions that recognize the enormous pressures facing cybersecurity professionals.]]> 2024-04-18T13:50:52+00:00 https://www.darkreading.com/cybersecurity-operations/break-security-burnout-combining-leadership-neuroscience www.secnews.physaphae.fr/article.php?IdArticle=8484752 False Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Le groupe \\ 'Sandworm \\' est la principale unité de cyberattaque de la Russie en Ukraine<br>\\'Sandworm\\' Group Is Russia\\'s Primary Cyberattack Unit in Ukraine But even with that focus, the sophisticated threat group has continued operations against targets globally, including the US, says Google\'s Mandiant.]]> 2024-04-17T10:00:00+00:00 https://www.darkreading.com/ics-ot-security/-sandworm-group-is-russia-s-primary-cyber-attack-unit-in-ukraine www.secnews.physaphae.fr/article.php?IdArticle=8484020 False Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Comment les planches peuvent se préparer aux ordinateurs quantiques<br>How Boards Can Prepare for Quantum Computers Quantum computing on the level that poses a threat to current cybersecurity measures is still years off. Here\'s what enterprises can do now to avoid future disruptions.]]> 2024-04-16T22:00:00+00:00 https://www.darkreading.com/cyber-risk/how-boards-prepare-quantum-computers www.secnews.physaphae.fr/article.php?IdArticle=8484118 False Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Le duo cybercriminal mondial est en cas d'emprisonnement après le programme de rats Hive<br>Global Cybercriminal Duo Face Imprisonment After Hive RAT Scheme The two allegedly sold the Trojan on Hack Forums, allowing other threat actors to gain unauthorized control, disable programs, browse files, record keystrokes, and steal credentials.]]> 2024-04-16T18:08:40+00:00 https://www.darkreading.com/cybersecurity-operations/global-cybercriminal-duo-face-imprisonment-after-hive-rat-scheme www.secnews.physaphae.fr/article.php?IdArticle=8483622 False Hack,Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Palo Alto Network émet des chaussettes pour un bug zéro-jour dans son pare-feu OS<br>Palo Alto Network Issues Hotfixes for Zero-Day Bug in Its Firewall OS A sophisticated threat actor is leveraging the bug to deploy a Python backdoor for stealing data and executing other malicious actions.]]> 2024-04-15T19:28:57+00:00 https://www.darkreading.com/cyberattacks-data-breaches/palo-alto-network-issues-hot-fixes-for-zero-day-bug-in-its-firewall-os www.secnews.physaphae.fr/article.php?IdArticle=8482930 False Vulnerability,Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Des pirates soutenus par l'Iran font exploser des textes menaçants aux Israéliens<br>Iran-Backed Hackers Blast Out Threatening Texts to Israelis Handala threat group claims to have hacked radar systems in Israel as tensions rise between the two nations.]]> 2024-04-15T16:07:11+00:00 https://www.darkreading.com/endpoint-security/iran-backed-hackers-blast-out-threatening-texts-to-israelis www.secnews.physaphae.fr/article.php?IdArticle=8482844 False Threat None 3.0000000000000000 Dark Reading - Informationweek Branch La plate-forme d'analyse des logiciels malveillants de CISA \\ pourrait favoriser une meilleure menace Intel<br>CISA\\'s Malware Analysis Platform Could Foster Better Threat Intel But just how the government differentiates its platform from similar private-sector options remains to be seen.]]> 2024-04-12T20:50:01+00:00 https://www.darkreading.com/vulnerabilities-threats/cisa-s-new-malware-analysis-platform-could-enable-better-threat-intelligence www.secnews.physaphae.fr/article.php?IdArticle=8480964 False Malware,Threat None 2.0000000000000000 Dark Reading - Informationweek Branch La faille de rouille critique pose une menace d'exploitation dans des cas d'utilisation de fenêtres spécifiques<br>Critical Rust Flaw Poses Exploit Threat in Specific Windows Use Cases Project behind the Rust programming language asserted that any calls to a specific API would be made safe, even with unsafe inputs, but researchers found ways to circumvent the protections.]]> 2024-04-11T20:08:48+00:00 https://www.darkreading.com/application-security/critical-rust-flaw-poses-exploit-threat-in-specific-windows-use-cases www.secnews.physaphae.fr/article.php?IdArticle=8480247 False Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Apple avertit les utilisateurs dans 150 pays d'attaques de logiciels spymétriques mercenaires<br>Apple Warns Users in 150 Countries of Mercenary Spyware Attacks In new threat notification information, Apple singled out Pegasus vendor NSO Group as a culprit in mercenary spyware attacks.]]> 2024-04-11T18:19:43+00:00 https://www.darkreading.com/vulnerabilities-threats/apple-warns-users-targeted-by-mercenary-spyware www.secnews.physaphae.fr/article.php?IdArticle=8480188 False Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Japon, Philippines, &US FORGE CYBER MENONAGE ALLIANCE INTEL-SORARGE<br>Japan, Philippines, & US Forge Cyber Threat Intel-Sharing Alliance Following the Volt Typhoon attacks on critical infrastructure in the region by China, the US reportedly will share cybersecurity threat information with both countries.]]> 2024-04-10T23:00:00+00:00 https://www.darkreading.com/cybersecurity-operations/japan-philippines-us-forge-cyber-threat-intelligence-sharing-alliance www.secnews.physaphae.fr/article.php?IdArticle=8479615 False Threat Guam 2.0000000000000000 Dark Reading - Informationweek Branch TA547 utilise un compte-gouttes généré par LLM pour infecter les orgs allemands<br>TA547 Uses an LLM-Generated Dropper to Infect German Orgs It\'s finally happening: Rather than just for productivity and research, threat actors are using LLMs to write malware. But companies need not worry just yet.]]> 2024-04-10T18:48:47+00:00 https://www.darkreading.com/threat-intelligence/ta547-uses-llm-generated-dropper-infect-german-orgs www.secnews.physaphae.fr/article.php?IdArticle=8479529 False Malware,Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Dispositifs NAS D-Link 92K ouverts au bogue d'injection de commande critique<br>92K D-Link NAS Devices Open to Critical Command-Injection Bug The company is asking users to retire several network-attached storage (NAS) models to avoid compromise through a publicly available exploit that results in backdooring.]]> 2024-04-09T16:32:06+00:00 https://www.darkreading.com/cloud-security/92k-dlink-nas-critical-command-injection-bug www.secnews.physaphae.fr/article.php?IdArticle=8478800 False Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Comment la Coupe du monde du football en 2022 au Qatar a été presque piratée<br>How Soccer\\'s 2022 World Cup in Qatar Was Nearly Hacked A China-linked threat actor had access to a router configuration database that could have completely disrupted coverage, a security vendor says.]]> 2024-04-03T20:40:20+00:00 https://www.darkreading.com/cyber-risk/how-the-2022-qatar-world-cup-soccer-was-nearly-hacked www.secnews.physaphae.fr/article.php?IdArticle=8475453 False Threat None 4.0000000000000000 Dark Reading - Informationweek Branch L'acteur de menace lié à la Chine Taps \\ 'Peculiar \\' malware pour échapper à la détection<br>China-Linked Threat Actor Taps \\'Peculiar\\' Malware to Evade Detection UNAPIMON works by meticulously disabling hooks in Windows APIs for detecting malicious processes.]]> 2024-04-02T23:05:39+00:00 https://www.darkreading.com/cyberattacks-data-breaches/china-linked-threat-actor-using-peculiar-malware-to-hide-malicious-activities www.secnews.physaphae.fr/article.php?IdArticle=8474873 False Malware,Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Les cybercriminels pèsent les options pour l'utilisation de LLMS: acheter, construire ou casser?<br>Cybercriminals Weigh Options for Using LLMs: Buy, Build, or Break? While some cybercriminals have bypassed guardrails to force legitimate AI models to turn bad, building their own malicious chatbot platforms and making use of open source models are a greater threat.]]> 2024-04-01T20:52:40+00:00 https://www.darkreading.com/threat-intelligence/cybercriminals-options-lms-buy-build-break www.secnews.physaphae.fr/article.php?IdArticle=8474223 False Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Coin Ciso: escroquerie cyber-pro;Nouveaux visages de risque;Cyber stimule l'évaluation<br>CISO Corner: Cyber-Pro Swindle; New Faces of Risk; Cyber Boosts Valuation Our collection of the most relevant reporting and industry perspectives for those guiding cybersecurity strategies and focused on SecOps. Also included: Australia gets its cyber-groove back, and 2023\'s zero-day field day.]]> 2024-03-29T20:51:51+00:00 https://www.darkreading.com/cloud-security/ciso-corner-cyber-pro-swindle-risk-valuation www.secnews.physaphae.fr/article.php?IdArticle=8472757 False Vulnerability,Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Les opérations d'influence cyber-cyber-activés de l'Iran \\ pour soutenir le Hamas<br>Iran\\'s Evolving Cyber-Enabled Influence Operations to Support Hamas Understanding Iran\'s techniques, coupled with comprehensive threat intel, can give organizations an edge in identifying and defending against these attacks.]]> 2024-03-29T12:00:00+00:00 https://www.darkreading.com/cybersecurity-operations/iran-s-evolving-cyber-enabled-influence-operations-to-support-hamas www.secnews.physaphae.fr/article.php?IdArticle=8472532 False Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Iran\'s Evolving Cyber-Enabled Influence Operations to Support Hamas Understanding Iran\'s techniques, coupled with comprehensive threat intel, can give organizations an edge in identifying and defending against these attacks.]]> 2024-03-29T12:00:00+00:00 https://www.darkreading.com/threat-intelligence/iran-s-evolving-cyber-enabled-influence-operations-to-support-hamas www.secnews.physaphae.fr/article.php?IdArticle=8474823 False Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Arabie saoudite, la liste supérieure des Émirats arabes unis des nations ciblées au Moyen-Orient<br>Saudi Arabia, UAE Top List of APT-Targeted Nations in the Middle East Government, manufacturing, and the energy industry are the top targets of advanced, persistent threat actors, with phishing attacks and remote exploits the most common vectors.]]> 2024-03-28T06:00:00+00:00 https://www.darkreading.com/vulnerabilities-threats/saudi-arabia-uae-top-list-of-apt-targeted-nations-in-middle-east www.secnews.physaphae.fr/article.php?IdArticle=8471815 False Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Flare acquiert la préclusion pour accélérer la croissance de la gestion de l'exposition aux menaces<br>Flare Acquires Foretrace to Accelerate Threat Exposure Management Growth 2024-03-27T20:56:32+00:00 https://www.darkreading.com/cyberattacks-data-breaches/flare-acquires-foretrace-to-accelerate-threat-exposure-management-growth www.secnews.physaphae.fr/article.php?IdArticle=8471596 False Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Des millions de chambres d'hôtel dans le monde vulnérables à l'exploitation de verrouillage de porte<br>Millions of Hotel Rooms Worldwide Vulnerable to Door Lock Exploit Hotel locks have been vulnerable to cyber compromise for decades and are extending their run into the digital age.]]> 2024-03-27T20:10:46+00:00 https://www.darkreading.com/vulnerabilities-threats/millions-hotel-rooms-worldwide-vulnerable-door-lock-exploit www.secnews.physaphae.fr/article.php?IdArticle=8471600 False Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Rapport de menace: examiner l'utilisation de l'IA dans les techniques d'attaque<br>Threat Report: Examining the Use of AI in Attack Techniques More than ever, it\'s critical for organizations to understand the nature of AI-based threats and how they can blunt the advantage that AI conveys to bad actors.]]> 2024-03-27T19:56:09+00:00 https://www.darkreading.com/cyberattacks-data-breaches/threat-report-examining-the-use-of-ai-in-attack-techniques www.secnews.physaphae.fr/article.php?IdArticle=8471602 False Threat None 3.0000000000000000 Dark Reading - Informationweek Branch \\ 'Tycoon \\' Kit malware contourne Microsoft, Google MFA<br>\\'Tycoon\\' Malware Kit Bypasses Microsoft, Google MFA Threat actors are widely adopting the fast-growing, low-cost phishing-as-a-service (PhaaS) platform, which is sold via Telegram.]]> 2024-03-27T16:57:55+00:00 https://www.darkreading.com/application-security/tycoon-malware-kit-bypasses-microsoft-google-mfa www.secnews.physaphae.fr/article.php?IdArticle=8471483 False Malware,Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Le bonanza zéro-jour conduit plus d'exploits contre les entreprises<br>Zero-Day Bonanza Drives More Exploits Against Enterprises Advanced adversaries are increasingly focused on enterprise technologies and their vendors, while end-user platforms are having success stifling zero-day exploits with cybersecurity investments, according to Google.]]> 2024-03-27T15:27:37+00:00 https://www.darkreading.com/threat-intelligence/zero-day-bonanza-exploits-enterprises www.secnews.physaphae.fr/article.php?IdArticle=8471451 False Vulnerability,Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Patch maintenant: bug critique de Fortinet RCE sous attaque active<br>Patch Now: Critical Fortinet RCE Bug Under Active Attack A proof-of-concept exploit released last week has spurred attacks on the vulnerability, which the CISA has flagged as an urgent patch priority.]]> 2024-03-26T15:13:15+00:00 https://www.darkreading.com/cloud-security/patch-critical-fortinet-rce-bug-active-attack www.secnews.physaphae.fr/article.php?IdArticle=8470826 False Vulnerability,Threat None 2.0000000000000000 Dark Reading - Informationweek Branch L'Afrique aborde les campagnes de désinformation en ligne au cours de l'année électorale majeure<br>Africa Tackles Online Disinformation Campaigns During Major Election Year Cyber-disinformation campaigns targeting Africa have taken off in 2024, as 18 nations prepare to hold elections, and cybersecurity efforts are key to taming the threat.]]> 2024-03-26T07:00:00+00:00 https://www.darkreading.com/cyberattacks-data-breaches/africa-tackles-online-disinformation-campaigns-during-major-election-year www.secnews.physaphae.fr/article.php?IdArticle=8470581 False Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Des pirates chinois parrainés par l'État chargés, des sanctions perçues par nous<br>Chinese State-Sponsored Hackers Charged, Sanctions Levied by US The US and the UK charge seven Chinese nationals for operating as part of threat group APT31.]]> 2024-03-25T21:20:40+00:00 https://www.darkreading.com/cyber-risk/chinese-state-hackers-slapped-with-us-charges-sanctions www.secnews.physaphae.fr/article.php?IdArticle=8470383 False Threat APT 31 3.0000000000000000 Dark Reading - Informationweek Branch L'équipe Tesla Hack gagne 200 000 $ et une nouvelle voiture<br>Tesla Hack Team Wins $200K and a New Car Zero Day Initiative awarded a total of $732,000 to researchers who found 19 unique cybersecurity vulnerabilities during the first day of Pwn2Own.]]> 2024-03-21T22:32:49+00:00 https://www.darkreading.com/threat-intelligence/team-s-tesla-hack-wins-them-200k-and-a-new-car www.secnews.physaphae.fr/article.php?IdArticle=8468149 False Hack,Vulnerability,Threat None 2.0000000000000000 Dark Reading - Informationweek Branch \\ 'Wolf duvel<br>\\'Fluffy Wolf\\' Spreads Meta Stealer in Corporate Phishing Campaign Unsophisticated threat actor is targeting Russian companies with both readily available malware and authentic software.]]> 2024-03-20T14:29:10+00:00 https://www.darkreading.com/threat-intelligence/fluffy-wolf-spreads-meta-stealer-in-corporate-phishing-campaign www.secnews.physaphae.fr/article.php?IdArticle=8467372 False Malware,Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Détecter les menaces de nuage avec CloudGrappler<br>Detecting Cloud Threats With CloudGrappler The open-source tool from Permiso can help security teams identify threat actors lurking within their AWS and Azure environments.]]> 2024-03-20T12:49:56+00:00 https://www.darkreading.com/cloud-security/detecting-cloud-threats-with-cloudgrappler www.secnews.physaphae.fr/article.php?IdArticle=8467317 False Tool,Threat,Cloud None 2.0000000000000000 Dark Reading - Informationweek Branch Les pirates se faisant passer pour des cabinets d'avocats Phish Global Orgs en plusieurs langues<br>Hackers Posing as Law Firms Phish Global Orgs in Multiple Languages Companies trust lawyers with the most sensitive information they\'ve got. Attackers are aiming to exploit that bond to deliver malware.]]> 2024-03-20T12:00:00+00:00 https://www.darkreading.com/cyberattacks-data-breaches/hackers-posing-law-firms-phish-global-orgs-multiple-languages www.secnews.physaphae.fr/article.php?IdArticle=8467283 False Malware,Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Triating Hack Harts Apex Legends Esports tournoi<br>Cheating Hack Halts Apex Legends E-Sports Tourney Electronic Arts is trying to track down the RCE exploit that allowed hackers to inject cheats into games during the recent Apex Legends Global Series.]]> 2024-03-19T21:10:11+00:00 https://www.darkreading.com/cyber-risk/apex-legends-tourney-spoiled-by-hackers www.secnews.physaphae.fr/article.php?IdArticle=8466939 False Hack,Threat None 2.0000000000000000 Dark Reading - Informationweek Branch \\ 'Conversation déborde \\' cyberattaques contourner la sécurité de l'IA pour cibler les dirigeants<br>\\'Conversation Overflow\\' Cyberattacks Bypass AI Security to Target Execs Credential-stealing emails are getting past artificial intelligence\'s "known good" email security controls by cloaking malicious payloads within seemingly benign emails. The tactic poses a significant threat to enterprise networks.]]> 2024-03-19T12:00:00+00:00 https://www.darkreading.com/cloud-security/conversation-overflow-cyberattacks-bypass-ai-security www.secnews.physaphae.fr/article.php?IdArticle=8466639 False Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Référentiels du modèle ML: la prochaine grande cible d'attaque de la chaîne d'approvisionnement<br>ML Model Repositories: The Next Big Supply Chain Attack Target Machine-learning model platforms like Hugging Face are suspectible to the same kind of attacks that threat actors have executed successfully for years via npm, PyPI, and other open source repos.]]> 2024-03-18T22:07:48+00:00 https://www.darkreading.com/cloud-security/ml-model-repositories-next-big-supply-chain-attack-target www.secnews.physaphae.fr/article.php?IdArticle=8466301 False Threat None 2.0000000000000000 Dark Reading - Informationweek Branch \\ 'ghostrace \\' L'attaque d'exécution spéculative a un impact<br>\\'GhostRace\\' Speculative Execution Attack Impacts All CPU, OS Vendors Like Spectre, the new GhostRace exploit could give attackers a way to access sensitive information from system memory and take other malicious actions.]]> 2024-03-15T21:09:49+00:00 https://www.darkreading.com/cyber-risk/ghostrace-speculative-execution-attack-cpu-os-vendors www.secnews.physaphae.fr/article.php?IdArticle=8464559 False Vulnerability,Threat None 4.0000000000000000 Dark Reading - Informationweek Branch How to Identify a Cyber Adversary: What to Look For There are many factors involved in attributing a cyber incident to a specific threat actor.]]> 2024-03-14T14:00:00+00:00 https://www.darkreading.com/cyberattacks-data-breaches/how-to-identify-cyber-adversary-what-to-look-for www.secnews.physaphae.fr/article.php?IdArticle=8463799 False Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Comment identifier un cyber adversaire: que rechercher<br>How to Identify a Cyber Adversary: What to Look For There are many factors involved in attributing a cyber incident to a specific threat actor.]]> 2024-03-14T14:00:00+00:00 https://www.darkreading.com/cyberattacks-data-breaches/how-to-identify-a-cyber-adversary-what-to-look-for www.secnews.physaphae.fr/article.php?IdArticle=8463345 False Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Claroty lance une détection avancée des menaces d'anomalie pour Medigate<br>Claroty Launches Advanced Anomaly Threat Detection for Medigate 2024-03-13T22:52:13+00:00 https://www.darkreading.com/ics-ot-security/claroty-launches-advanced-anomaly-threat-detection-for-medigate www.secnews.physaphae.fr/article.php?IdArticle=8463439 False Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Les vulnérabilités du plugin Critical Chatgpt exposent des données sensibles<br>Critical ChatGPT Plugin Vulnerabilities Expose Sensitive Data The vulnerabilities found in ChatGPT plugins - since remediated - heighten the risk of proprietary information being stolen and the threat of account takeover attacks.]]> 2024-03-13T12:00:00+00:00 https://www.darkreading.com/vulnerabilities-threats/critical-chatgpt-plugin-vulnerabilities-expose-sensitive-data www.secnews.physaphae.fr/article.php?IdArticle=8463142 False Vulnerability,Threat ChatGPT 2.0000000000000000 Dark Reading - Informationweek Branch \\ 'aimant gobelin \\' exploite Ivanti Bug 1 jour en quelques heures<br>\\'Magnet Goblin\\' Exploits Ivanti 1-Day Bug in Mere Hours A prolific but previously hidden threat actor turns public vulnerabilities into working exploits before companies have time to patch.]]> 2024-03-12T20:00:35+00:00 https://www.darkreading.com/threat-intelligence/magnet-goblin-exploits-ivanti-1-day-bug-mere-hours www.secnews.physaphae.fr/article.php?IdArticle=8462802 False Vulnerability,Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Patch maintenant: Apple Zero-Day Exploits contourner la sécurité du noyau<br>Patch Now: Apple Zero-Day Exploits Bypass Kernel Security A pair of critical bugs could open the door to complete system compromise, including access to location information, iPhone camera and mic, and messages. Rootkitted attackers could theoretically perform lateral movement to corporate networks, too.]]> 2024-03-06T19:15:07+00:00 https://www.darkreading.com/ics-ot-security/patch-now-apple-zero-day-exploits-bypass-kernel-security www.secnews.physaphae.fr/article.php?IdArticle=8459979 False Vulnerability,Threat,Mobile None 3.0000000000000000 Dark Reading - Informationweek Branch La montée de la fraude de l'ingénierie sociale dans le compromis des e-mails commerciaux<br>The Rise of Social Engineering Fraud in Business Email Compromise By examining common social engineering tactics and four of the most devious threat groups, organizations can better defend themselves.]]> 2024-03-06T14:24:33+00:00 https://www.darkreading.com/cyberattacks-data-breaches/the-rise-of-social-engineering-fraud-in-business-email-compromise www.secnews.physaphae.fr/article.php?IdArticle=8459862 False Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Le groupe de ransomware RA à croissance rapide devient global<br>Fast-Growing RA Ransomware Group Goes Global The rapidly evolving threat group uses high-impact tactics that include manipulating group policy to deploy payloads across environments.]]> 2024-03-05T18:04:52+00:00 https://www.darkreading.com/ics-ot-security/fast-growing-ra-ransomware-group-goes-global www.secnews.physaphae.fr/article.php?IdArticle=8459433 False Ransomware,Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Critical TeamCity Bugs met en danger la chaîne d'approvisionnement des logiciels<br>Critical TeamCity Bugs Endanger Software Supply Chain Customers should immediately patch critical vulnerabilities in on-prem deployments of the CI/CD pipeline tool JetBrains TeamCity that could allow threat actors to gain admin control over servers.]]> 2024-03-04T23:05:43+00:00 https://www.darkreading.com/application-security/critical-teamcity-bugs-endanger-software-supply-chain www.secnews.physaphae.fr/article.php?IdArticle=8459026 False Tool,Vulnerability,Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Les attaquants de Cryptochameleon ciblent Apple, les utilisateurs d'Okta avec support technologique GAMBIT<br>CryptoChameleon Attackers Target Apple, Okta Users With Tech Support Gambit A sophisticated threat actor using an MO similar to Scattered Spider is camouflaging itself with convincing impersonation techniques in targeted attacks.]]> 2024-03-01T18:27:49+00:00 https://www.darkreading.com/application-security/cryptochameleon-attackers-target-apple-okta-users-tech-support-gambit www.secnews.physaphae.fr/article.php?IdArticle=8457638 False Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Microsoft Zero Day utilisé par Lazarus dans Rootkit Attack<br>Microsoft Zero Day Used by Lazarus in Rootkit Attack North Korean state actors Lazarus Group used a Windows AppLocker zero day, along with a new and improved rootkit, in a recent cyberattack, researchers report.]]> 2024-03-01T00:17:13+00:00 https://www.darkreading.com/vulnerabilities-threats/microsoft-zero-day-used-by-lazarus-in-rootkit-attack www.secnews.physaphae.fr/article.php?IdArticle=8457255 False Threat APT 38 3.0000000000000000 Dark Reading - Informationweek Branch FBI, CISA Release IOCs for Phobos Ransomware Threat actors using the malware have infected systems within government, healthcare, and other critical infrastructure organizations since at least 2019.]]> 2024-02-29T22:49:41+00:00 https://www.darkreading.com/cyberattacks-data-breaches/fbi-cisa-release-iocs-for-phobos-ransomware www.secnews.physaphae.fr/article.php?IdArticle=8457209 False Ransomware,Malware,Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Exploits de développement chinois pour vaincre les utilisateurs d'Ivanti déjà corrigés<br>Chinese APT Developing Exploits to Defeat Already Patched Ivanti Users More bad news for Ivanti customers: soon, even if you\'ve patched, you still might not be safe from relentless attacks from high-level Chinese threat actors.]]> 2024-02-29T22:36:31+00:00 https://www.darkreading.com/endpoint-security/chinese-apt-exploits-defeat-patched-ivanti-users www.secnews.physaphae.fr/article.php?IdArticle=8457210 False Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Plateforme AI face étreinte criblée de 100 modèles de code de code malveillant<br>Hugging Face AI Platform Riddled With 100 Malicious Code-Execution Models The finding underscores the growing risk of weaponizing publicly available AI models and the need for better security to combat the looming threat.]]> 2024-02-29T15:58:35+00:00 https://www.darkreading.com/application-security/hugging-face-ai-platform-100-malicious-code-execution-models www.secnews.physaphae.fr/article.php?IdArticle=8457064 False Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Les cyberattaques attirent les diplomates de l'UE avec des offres de dégustation de vin<br>Cyberattackers Lure EU Diplomats With Wine-Tasting Offers A targeted attack aiming to exploit geopolitical relations between India and Europe delivers previously undocumented, uniquely evasive backdoor malware.]]> 2024-02-28T18:07:30+00:00 https://www.darkreading.com/cyberattacks-data-breaches/cyberattackers-lure-eu-diplomats-wine-tasting-offers www.secnews.physaphae.fr/article.php?IdArticle=8456566 False Malware,Threat None 4.0000000000000000 Dark Reading - Informationweek Branch Russie \\ 'S \\' Midnight Blizzard \\ 'cible les comptes de service pour l'accès au cloud initial<br>Russia\\'s \\'Midnight Blizzard\\' Targets Service Accounts for Initial Cloud Access CISA and its counterparts in the UK and other countries this week offered new guidance on how to deal with the threat actor\'s recent shift to cloud attacks.]]> 2024-02-27T21:49:18+00:00 https://www.darkreading.com/cloud-security/russia-s-midnight-blizzard-targeting-service-accounts-for-initial-cloud-access www.secnews.physaphae.fr/article.php?IdArticle=8456078 False Threat,Cloud None 2.0000000000000000 Dark Reading - Informationweek Branch Les sites eBay, VMware, McAfee ont détourné des opérations de phishing tentaculaire<br>eBay, VMware, McAfee Sites Hijacked in Sprawling Phishing Operation Trusted brands like The Economist are also among the 8,000 entities compromised by Operation SubdoMailing, which is at the heart of a larger operation of a single threat actor.]]> 2024-02-27T17:04:55+00:00 https://www.darkreading.com/application-security/ebay-vmware-mcafee-sites-hijacked-sprawling-phishing-operation www.secnews.physaphae.fr/article.php?IdArticle=8455991 False Threat None 2.0000000000000000 Dark Reading - Informationweek Branch La Maison Blanche exhorte le passage aux langues sûres de la mémoire<br>White House Urges Switching to Memory Safe Languages The Office of the National Cyber Director technical report focuses on reducing memory-safety vulnerabilities in applications and making it harder for malicious actors to exploit them.]]> 2024-02-27T00:12:58+00:00 https://www.darkreading.com/application-security/white-house-switch-memory-safe-languages www.secnews.physaphae.fr/article.php?IdArticle=8455963 False Vulnerability,Threat,Technical None 2.0000000000000000 Dark Reading - Informationweek Branch Repeindre le réseau pour repousser les tactiques de vie<br>Redesigning the Network to Fend Off Living-Off-the-Land Tactics The growing threat of living-off-the-land tactics requires a rethink of network traffic visibility to prevent these types of attacks]]> 2024-02-23T19:20:39+00:00 https://www.darkreading.com/identity-access-management-security/redesigning-the-network-to-fend-off-living-off-the-land-tactics www.secnews.physaphae.fr/article.php?IdArticle=8454254 False Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Le département de l'immigration du Malawi interrompre les services de passeport au milieu de la cyberattaque<br>Malawi Immigration Dept. Halts Passport Services Amid Cyberattack President of Malawi vows not to pay ransom to "appease criminals."]]> 2024-02-23T16:11:24+00:00 https://www.darkreading.com/cyberattacks-data-breaches/malawi-immigration-department-halts-services-amid-cyberattack www.secnews.physaphae.fr/article.php?IdArticle=8454197 False Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Favoriser la collaboration pour une enquête sur les menaces standardisée & amp;Réponse<br>Fostering Collaboration for Standardized Threat Investigation & Response Working together can bring much-needed trust to the industry and help safeguard people, organizations, and government - now and in the future.]]> 2024-02-23T15:00:00+00:00 https://www.darkreading.com/cybersecurity-operations/fostering-collaboration-standardized-threat-investigation-response www.secnews.physaphae.fr/article.php?IdArticle=8454148 False Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Les retards de pharmacie aux États-Unis sont imputés aux pirates d'État-nation<br>Pharmacy Delays Across US Blamed on Nation-State Hackers Healthcare tech provider Change Healthcare says a suspected nation-state threat actor breached its systems, causing pharmacy transaction delays nationwide.]]> 2024-02-22T23:49:35+00:00 https://www.darkreading.com/cyberattacks-data-breaches/pharmacy-delays-across-us-blamed-on-nation-state-hackers www.secnews.physaphae.fr/article.php?IdArticle=8453886 False Threat None 4.0000000000000000 Dark Reading - Informationweek Branch Dot, la Maison Blanche s'attaque à la menace chinoise pour la sécurité portuaire américaine<br>DoT, White House Tackle the Chinese Threat to US Port Security New investments and Coast Guard authority aim to curb the alleged threat that Chinese vendors pose to American maritime security.]]> 2024-02-21T20:24:47+00:00 https://www.darkreading.com/ics-ot-security/dot-white-house-tackle-chinese-threat-us-port-security www.secnews.physaphae.fr/article.php?IdArticle=8453360 False Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Comment les Cisos équilibrent la croissance des entreprises, la sécurité dans le paysage cyber-menace<br>How CISOs Balance Business Growth, Security in Cyber-Threat Landscape Collaboration, care, and proactive planning need to be part of CISO toolboxes as worsening threat environments become the new normal. CISOs need to adjust processes so business innovation can continue.]]> 2024-02-21T15:00:00+00:00 https://www.darkreading.com/vulnerabilities-threats/how-cisos-balance-business-growth-security-cyber-threat-landscape www.secnews.physaphae.fr/article.php?IdArticle=8453233 False Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Meta perturbe 8 entreprises spyware, 3 faux réseaux de nouvelles<br>Meta Disrupts 8 Spyware Firms, 3 Fake News Networks While furiously trying to put out one fire - fake news - the social media giant is dealing with another growing threat: spies for hire.]]> 2024-02-20T21:38:32+00:00 https://www.darkreading.com/threat-intelligence/meta-disrupts-8-spyware-firms-3-fake-news-networks www.secnews.physaphae.fr/article.php?IdArticle=8452891 False Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Les applications Salesforce personnalisées à tort erronées exposent les données de l'entreprise<br>Misconfigured Custom Salesforce Apps Expose Corporate Data Enterprises typically use the Java-like programming language to customize their Salesforce instances, but attackers are hunting for vulnerabilities in the apps.]]> 2024-02-20T14:00:00+00:00 https://www.darkreading.com/cloud-security/misconfigurated-custom-salesforce-apps-expose-corporate-data www.secnews.physaphae.fr/article.php?IdArticle=8452725 False Vulnerability,Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Russe APT \\ 'Winter Vivern \\' cible le gouvernement européen, militaire<br>Russian APT \\'Winter Vivern\\' Targets European Government, Military TAG-70\'s sophisticated espionage campaign targeted a range of geopolitical targets, suggesting a highly capable and well-funded state-backed threat actor.]]> 2024-02-17T08:00:00+00:00 https://www.darkreading.com/cyberattacks-data-breaches/russian-apt-winter-vivern-targets-european-government-military www.secnews.physaphae.fr/article.php?IdArticle=8451314 False Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Flaw Microsoft Exchange Server exploité comme un bogue zéro jour<br>Microsoft Exchange Server Flaw Exploited as a Zero-Day Bug Microsoft has observed signs of active exploits targeting CVE-2024-2140.]]> 2024-02-15T21:30:32+00:00 https://www.darkreading.com/cyberattacks-data-breaches/microsoft-exchange-server-flaw-exploited-zero-day-bug www.secnews.physaphae.fr/article.php?IdArticle=8450580 False Vulnerability,Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Shift transformateur de la cybersécurité \\<br>Cybersecurity\\'s Transformative Shift The industry is evolving from one of conventional threat detection toward a strategy that emphasizes context and preempts user behavior.]]> 2024-02-15T15:00:00+00:00 https://www.darkreading.com/cybersecurity-operations/cybersecuritys-transformative-shift www.secnews.physaphae.fr/article.php?IdArticle=8450442 False Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Épidémie de ransomwares dans les hôpitaux roumains liés à l'application de soins de santé<br>Ransomware Epidemic at Romanian Hospitals Tied to Healthcare App Threat actors first infected the Hipocrate Information System with a variant of the Phobos ransomware family - and then it spread across the nation\'s healthcare organizations.]]> 2024-02-14T18:30:51+00:00 https://www.darkreading.com/application-security/ransomware-epidemic-romanian-hospitals-tied-healthcare-app www.secnews.physaphae.fr/article.php?IdArticle=8450106 False Ransomware,Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Le malware de Bumblebee bourdonne sur la scène après une interruption de 4 mois<br>BumbleBee Malware Buzzes Back on the Scene After 4-Month Hiatus Cyberattacks targeting thousands of US organizations wields a new attack vector to deliver the versatile initial-access loader - and is a harbinger of a surge in threat activity.]]> 2024-02-14T16:43:26+00:00 https://www.darkreading.com/cyberattacks-data-breaches/bumblebee-malware-buzzes-back-4-month-hiatus www.secnews.physaphae.fr/article.php?IdArticle=8450070 False Malware,Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Les cyberattaques du Hamas ont cessé après l'attaque terroriste du 7 octobre.Mais pourquoi?<br>Hamas Cyberattacks Ceased After the Oct. 7 Terror Attack. But Why? Hamas-linked threat actors have defied norms, with no discernible uptick in cyber operations prior to the group\'s attack in Israel - and a complete abandonment of them thereafter.]]> 2024-02-14T00:01:00+00:00 https://www.darkreading.com/threat-intelligence/hamas-cyberattacks-ceased-after-october-7-attack-but-why www.secnews.physaphae.fr/article.php?IdArticle=8449774 False Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Les attaquants exploitent Microsoft Security-Bypass Zero-Day Bogs<br>Attackers Exploit Microsoft Security-Bypass Zero-Day Bugs The Water Hydra cyberattacker group is one adversary using the zero-days to get past built-in Windows protections.]]> 2024-02-13T22:26:26+00:00 https://www.darkreading.com/vulnerabilities-threats/attackers-exploit-microsoft-security-bypass-zero-day-bugs www.secnews.physaphae.fr/article.php?IdArticle=8449759 False Vulnerability,Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Le Kenya a détecté plus de cyber-menaces 1B au quatrième trimestre<br>Kenya Detected Over 1B Cyber Threats in Q4 Officials attribute the massive volume to the nation\'s enhanced cyber threat monitoring capabilities.]]> 2024-02-09T16:04:01+00:00 https://www.darkreading.com/cyberattacks-data-breaches/kenya-detected-over-one-billion-cyber-threats-in-q4 www.secnews.physaphae.fr/article.php?IdArticle=8448413 False Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Super Bowl Lviii présente une vaste surface d'attaque pour les acteurs de la menace<br>Super Bowl LVIII Presents a Vast Attack Surface for Threat Actors The NFL\'s digitization of almost all aspects of the event means it has a lot more turf to protect for itself, and for the game\'s tens of millions of fans.]]> 2024-02-08T17:22:40+00:00 https://www.darkreading.com/ics-ot-security/super-bowl-lviii-vast-attack-surface-threat-actors www.secnews.physaphae.fr/article.php?IdArticle=8448105 False Threat None 2.0000000000000000 Dark Reading - Informationweek Branch \Ret<br>\\'Ov3r_Stealer\\' Malware Spreads Through Facebook to Steal Crates of Info A tangled web of attackers use various social media tactics to propagate the novel threat, which has several execution methods and exfiltrates data to Telegram.]]> 2024-02-08T16:34:52+00:00 https://www.darkreading.com/endpoint-security/novel-ov3r_stealer-spreads-facebook-steal-info www.secnews.physaphae.fr/article.php?IdArticle=8448084 False Malware,Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Le nouveau rapport de Flare met en évidence la menace omniprésente des courtiers d'accès initial dans les pays de l'OTAN<br>New Report From Flare Highlights Pervasive Threat of Initial Access Brokers in NATO Countries 2024-02-07T21:10:24+00:00 https://www.darkreading.com/threat-intelligence/new-report-from-flare-highlights-pervasive-threat-of-initial-access-brokers-in-nato-countries www.secnews.physaphae.fr/article.php?IdArticle=8447799 False Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Patch maintenant: le bogue Critical TeamCity permet les prises de contrôle du serveur<br>Patch Now: Critical TeamCity Bug Allows for Server Takeovers Cyberattackers can exploit a vulnerability in JetBrain\'s continuous integration and delivery (CI/CD) server (a popular APT target) to gain administrative control.]]> 2024-02-07T18:17:02+00:00 https://www.darkreading.com/vulnerabilities-threats/patch-critical-teamcity-bug-server-takeover www.secnews.physaphae.fr/article.php?IdArticle=8447759 False Vulnerability,Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Données des employés de Verizon exposés dans l'incident de la menace d'initié<br>Verizon Employee Data Exposed in Insider Threat Incident Tens of thousands of workers are effected by a fellow employee dipping into files that include everything from SSNs and names to union status and compensation data.]]> 2024-02-06T22:36:10+00:00 https://www.darkreading.com/remote-workforce/verizon-employee-data-exposed-insider-threat-incident www.secnews.physaphae.fr/article.php?IdArticle=8447444 False Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Ionix termine 42 millions de dollars de financement pour étendre la gestion de l'exposition aux menaces sur toute la surface d'attaque<br>IONIX ​​Completes $42M Financing Round to Expand Threat Exposure Management Across the Entire Attack Surface 2024-02-06T22:26:27+00:00 https://www.darkreading.com/cyber-risk/ionix-completes-42m-financing-round-to-expand-threat-exposure-management-across-the-entire-attack-surface www.secnews.physaphae.fr/article.php?IdArticle=8447445 False Threat None 1.00000000000000000000 Dark Reading - Informationweek Branch Google: les gouvernements stimulent une forte croissance des logiciels espions commerciaux<br>Google: Govs Drive Sharp Growth of Commercial Spyware Cos Private spyware vendors were behind nearly half of all zero-day exploits in Google products since 2014.]]> 2024-02-06T10:00:00+00:00 https://www.darkreading.com/threat-intelligence/govts-are-driving-sharp-growth-in-commercial-spyware-industry-google-warns www.secnews.physaphae.fr/article.php?IdArticle=8447205 False Vulnerability,Threat,Commercial None 2.0000000000000000 Dark Reading - Informationweek Branch La campagne MacOS malveillers présente une nouvelle technique de livraison<br>macOS Malware Campaign Showcases Novel Delivery Technique Threat actor behind the Activator macOS backdoor is using pirated apps to distribute the malware in what could be a botnet-building operation.]]> 2024-02-02T20:03:22+00:00 https://www.darkreading.com/cyberattacks-data-breaches/macos-malware-campaign-showcases-novel-delivery-technique www.secnews.physaphae.fr/article.php?IdArticle=8446099 False Malware,Threat None 3.0000000000000000 Dark Reading - Informationweek Branch \\ 'Commando Cat \\' est la deuxième campagne de l'année ciblant Docker<br>\\'Commando Cat\\' Is Second Campaign of the Year Targeting Docker The threat actor behind the campaign is still unknown, but it shares some similarities with other cyptojacking groups.]]> 2024-02-01T22:20:00+00:00 https://www.darkreading.com/cyberattacks-data-breaches/commando-cat-campaign-is-second-this-year-to-target-docker www.secnews.physaphae.fr/article.php?IdArticle=8445746 False Threat None 3.0000000000000000 Dark Reading - Informationweek Branch La Chine s'infiltre les infrastructures critiques américaines en accélération au conflit<br>China Infiltrates US Critical Infrastructure in Ramp-up to Conflict Threat actors linked to the People\'s Republic of China, such as Volt Typhoon, continue to "pre-position" themselves in the critical infrastructure of the United States, according to military and law enforcement officials.]]> 2024-02-01T20:30:00+00:00 https://www.darkreading.com/cyberattacks-data-breaches/china-infiltrates-us-critical-infrastructure-ramp-up-conflict www.secnews.physaphae.fr/article.php?IdArticle=8445711 False Threat Guam 3.0000000000000000 Dark Reading - Informationweek Branch Le comté de Fulton subit des pannes de courant alors que la cyberattaque se poursuit<br>Fulton County Suffers Power Outages as Cyberattack Continues County services have come to a halt and are not expected to resume until next week; no threat actor has yet been identified.]]> 2024-01-31T22:36:00+00:00 https://www.darkreading.com/cyberattacks-data-breaches/fulton-county-suffers-power-outages-cyberattack www.secnews.physaphae.fr/article.php?IdArticle=8445346 False Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Rapport de menace Microsoft: comment la guerre de la Russie contre l'Ukraine a un impact sur la communauté mondiale de la cybersécurité<br>Microsoft Threat Report: How Russia\\'s War on Ukraine Is Impacting the Global Cybersecurity Community The Russians are engaged in widespread influence operations designed to erode trust, increase polarization, and threaten democratic processes around the globe.]]> 2024-01-31T10:30:00+00:00 https://www.darkreading.com/threat-intelligence/microsoft-threat-report-how-russia-s-war-on-ukraine-is-impacting-the-global-cybersecurity-community www.secnews.physaphae.fr/article.php?IdArticle=8445348 False Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Les correctifs Ivanti Zero-Day sont retardés comme \\ 'Krustyloader \\' Attacks Mount<br>Ivanti Zero-Day Patches Delayed as \\'KrustyLoader\\' Attacks Mount The RCE/auth bypass bugs in Connect Secure VPNs have gone unpatched for 20 days as state-sponsored groups continue to backdoor Ivanti gear.]]> 2024-01-30T23:22:00+00:00 https://www.darkreading.com/endpoint-security/ivanti-zero-day-patches-delayed-krustyloader-attacks-mount www.secnews.physaphae.fr/article.php?IdArticle=8444979 False Vulnerability,Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Feds essaierait de perturber l'infrastructure d'attaque de Typhoon Volt \\ '<br>Feds Reportedly Try to Disrupt \\'Volt Typhoon\\' Attack Infrastructure The China-linked threat actor\'s attacks on US critical infrastructure organizations have alarmed American intelligence officials, Reuters says.]]> 2024-01-30T20:25:00+00:00 https://www.darkreading.com/cybersecurity-operations/us-govt-reportedly-trying-to-disrupt-volt-typhoon-attack-infrastructure www.secnews.physaphae.fr/article.php?IdArticle=8444927 False Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Nouvellement id \\ 'ed chinois apt cache la porte dérobée dans les mises à jour logicielles<br>Newly ID\\'ed Chinese APT Hides Backdoor in Software Updates The threat actor went more than half a decade before being discovered - thanks to a remarkable backdoor delivered in invisible adversary-in-the-middle attacks.]]> 2024-01-26T21:00:00+00:00 https://www.darkreading.com/application-security/chinese-apt-hides-backdoor-in-software-updates www.secnews.physaphae.fr/article.php?IdArticle=8443534 False Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Microsoft partage de nouveaux conseils dans le sillage de \\ 'Midnight Blizzard \\' Cyberattack<br>Microsoft Shares New Guidance in Wake of \\'Midnight Blizzard\\' Cyberattack Threat actors created and abused OAuth apps to access Microsoft\'s corporate email environment and remain there for weeks.]]> 2024-01-26T20:37:00+00:00 https://www.darkreading.com/cyberattacks-data-breaches/microsoft-shares-new-guidance-in-wake-of-midnight-blizzard-cyberattack www.secnews.physaphae.fr/article.php?IdArticle=8443535 False Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Fortra révèle le contournement de l'automne critique Vuln à Goanywhere MFT<br>Fortra Discloses Critical Auth Bypass Vuln in GoAnywhere MFT PoC exploit code for flaw is publicly available, heightening breach risks for users of the managed file-transfer technology.]]> 2024-01-24T19:55:00+00:00 https://www.darkreading.com/cyberattacks-data-breaches/fortra-discloses-critical-auth-bypass-vuln-in-goanywhere-mft www.secnews.physaphae.fr/article.php?IdArticle=8442665 False Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Les chercheurs mappent le paysage des menaces de l'IA, les risques<br>Researchers Map AI Threat Landscape, Risks With the rush to adopt large language models, companies have not thought through all of the security implications to their businesses. Two groups of researchers tackle the questions.]]> 2024-01-24T14:00:00+00:00 https://www.darkreading.com/cyber-risk/researchers-map-ai-threat-landscape-risks www.secnews.physaphae.fr/article.php?IdArticle=8442552 False Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Quelques jours après Google, Apple révèle que le moteur du navigateur a exploité le moteur de navigateur<br>Days After Google, Apple Reveals Exploited Zero-Day in Browser Engine The new bug is Apple\'s 12th WebKit zero-day in the last year, highlighting the increasing enterprise exposure to browser-borne threats.]]> 2024-01-23T23:30:00+00:00 https://www.darkreading.com/cyberattacks-data-breaches/days-after-google-apple-discloses-actively-exploited-0-day-in-its-browser-engine www.secnews.physaphae.fr/article.php?IdArticle=8442318 False Vulnerability,Threat None 3.0000000000000000