www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2025-05-10T16:56:54+00:00 www.secnews.physaphae.fr Wired Threat Level - Security News Vous devez mettre à jour Apple iOS et Google Chrome dès que possible<br>You Should Update Apple iOS and Google Chrome ASAP Plus: Microsoft patches over 60 vulnerabilities, Mozilla fixes two Firefox zero-day bugs, Google patches 40 issues in Android, and more.]]> 2024-03-31T10:00:00+00:00 https://www.wired.com/story/apple-ios-google-chrome-critical-update-march/ www.secnews.physaphae.fr/article.php?IdArticle=8473483 False Vulnerability,Threat,Mobile None 2.0000000000000000 Bleeping Computer - Magazine Américain Les logiciels malveillants de Vultur Banking pour Android se présentent comme une application de sécurité McAfee<br>Vultur banking malware for Android poses as McAfee Security app Security researchers found a new version of the Vultur banking trojan for Android that includes more advanced remote control capabilities and an improved evasion mechanism. [...]]]> 2024-03-30T11:56:28+00:00 https://www.bleepingcomputer.com/news/security/vultur-banking-malware-for-android-poses-as-mcafee-security-app/ www.secnews.physaphae.fr/article.php?IdArticle=8473135 False Malware,Mobile None 2.0000000000000000 HackRead - Chercher Cyber Autorisation de paiement et mots de passe unique & # 8211;Jeton mobile<br>Payment authorization and one-time passwords – Mobile Token Par uzair amir n'est pas choquant que les gens utilisent toujours des mots de passe comme Qwerty12, 1234, ou des noms d'animaux pour leurs comptes en ligne? & # 8230; Ceci est un article de HackRead.com Lire la publication originale: Autorisation de paiement et mots de passe unique & # 8211;Jeton mobile
>By Uzair Amir Isn’t it shocking that people still use passwords like QWERTY12, 1234, or pet names for their online accounts?… This is a post from HackRead.com Read the original post: Payment authorization and one-time passwords – Mobile Token]]>
2024-03-29T14:18:29+00:00 https://www.hackread.com/payment-authorization-one-time-passwords-mobile-token/ www.secnews.physaphae.fr/article.php?IdArticle=8472612 False Mobile None 2.0000000000000000
Korben - Bloger francais RCS sur iPhone – Apple va enfin adopter le standard de messagerie universel ! 2024-03-29T10:29:34+00:00 https://korben.info/rcs-iphone-apple-adopte-standard-messagerie-universel.html www.secnews.physaphae.fr/article.php?IdArticle=8472560 False Mobile None 2.0000000000000000 RiskIQ - cyber risk firms (now microsoft) Android Malware Vultur étend son envergure<br>Android Malware Vultur Expands Its Wingspan #### Description The authors behind Android banking malware Vultur have been spotted adding new technical features, which allow the malware operator to further remotely interact with the victim\'s mobile device. Vultur has also started masquerading more of its malicious activity by encrypting its C2 communication, using multiple encrypted payloads that are decrypted on the fly, and using the guise of legitimate applications to carry out its malicious actions. #### Reference URL(s) 1. https://research.nccgroup.com/2024/03/28/android-malware-vultur-expands-its-wingspan/ #### Publication Date March 28, 2024 #### Author(s) Joshua Kamp ]]> 2024-03-28T19:11:03+00:00 https://community.riskiq.com/article/3f7c3599 www.secnews.physaphae.fr/article.php?IdArticle=8472213 False Malware,Mobile,Technical None 3.0000000000000000 GoogleSec - Firm Security Blog Adressez désinfectant pour le firmware à métal nu<br>Address Sanitizer for Bare-metal Firmware how we have been prioritizing firmware security, and how to apply mitigations in a firmware environment to mitigate unknown vulnerabilities. In this post we will show how the Kernel Address Sanitizer (KASan) can be used to proactively discover vulnerabilities earlier in the development lifecycle. Despite the narrow application implied by its name, KASan is applicable to a wide-range of firmware targets. Using KASan enabled builds during testing and/or fuzzing can help catch memory corruption vulnerabilities and stability issues before they land on user devices. We\'ve already used KASan in some firmware targets to proactively find and fix 40+ memory safety bugs and vulnerabilities, including some of critical severity. Along with this blog post we are releasing a small project which demonstrates an implementation of KASan for bare-metal targets leveraging the QEMU system emulator. Readers can refer to this implementation for technical details while following the blog post. Address Sanitizer (ASan) overview Address sanitizer is a compiler-based instrumentation tool used to identify invalid memory access operations during runtime. It is capable of detecting the following classes of temporal and spatial memory safety bugs: out-of-bounds memory access use-after-free double/invalid free use-after-return ASan relies on the compiler to instrument code with dynamic checks for virtual addresses used in load/store operations. A separate runtime library defines the instrumentation hooks for the heap memory and error reporting. For most user-space targets (such as aarch64-linux-android) ASan can be enabled as simply as using the -fsanitize=address compiler option for Clang due to existing support of this target both in the toolchain and in the libclang_rt runtime. However, the situation is rather different for bare-metal code which is frequently built with the none system targets, such as arm-none-eabi. Unlike traditional user-space programs, bare-metal code running inside an embedded system often doesn\'t have a common runtime implementation. As such, LLVM can\'t provide a default runtime for these environments. To provide custom implementations for the necessary runtime routines, the Clang toolchain exposes an interface for address sanitization through the -fsanitize=kernel-address compiler option. The KASan runtime routines implemented in the Linux kernel serve as a great example of how to define a KASan runtime for targets which aren\'t supported by default with -fsanitize=address. We\'ll demonstrate how to use the version of address sanitizer originally built for the kernel on other bare-metal targets. KASan 101 Let\'s take a look at the KASan major building blocks from a high-level perspective (a thorough explanation of how ASan works under-the-hood is provided in this whitepaper). The main idea behind KASan is that every memory access operation, such as load/store instructions and memory copy functions (for example, memm]]> 2024-03-28T18:16:18+00:00 http://security.googleblog.com/2024/03/address-sanitizer-for-bare-metal.html www.secnews.physaphae.fr/article.php?IdArticle=8477255 False Tool,Vulnerability,Mobile,Technical None 2.0000000000000000 Dark Reading - Informationweek Branch Les attaques de bombardements MFA suspectées ciblent les utilisateurs d'iPhone Apple<br>Suspected MFA Bombing Attacks Target Apple iPhone Users Several Apple device users have experienced recent incidents where they have received incessant password reset prompts and vishing calls from a number spoofing Apple\'s legitimate customer support line.]]> 2024-03-28T15:03:01+00:00 https://www.darkreading.com/cloud-security/mfa-bombing-attacks-target-apple-iphone-users www.secnews.physaphae.fr/article.php?IdArticle=8472070 False Mobile None 3.0000000000000000 Korben - Bloger francais La moitié des applis pour enfants sur Android récoltent leurs données Suite]]> 2024-03-28T08:33:12+00:00 https://korben.info/applis-android-incogni.html www.secnews.physaphae.fr/article.php?IdArticle=8471885 False Mobile None 3.0000000000000000 Bleeping Computer - Magazine Américain Nouveau service de phishing darcula cible les utilisateurs d'iPhone via iMessage<br>New Darcula phishing service targets iPhone users via iMessage A new phishing-as-a-service (PhaaS) named \'Darcula\' uses 20,000 domains to spoof brands and steal credentials from Android and iPhone users in more than 100 countries. [...]]]> 2024-03-27T18:12:20+00:00 https://www.bleepingcomputer.com/news/security/new-darcula-phishing-service-targets-iphone-users-via-imessage/ www.secnews.physaphae.fr/article.php?IdArticle=8471656 False Mobile None 4.0000000000000000 Ars Technica - Risk Assessment Security Hacktivism "MFA Fatigue" cible les propriétaires d'iPhone avec des invites de réinitialisation de mot de passe sans fin<br>“MFA Fatigue” attack targets iPhone owners with endless password reset prompts Rapid-fire prompts sometimes followed with spoofed calls from "Apple support."]]> 2024-03-27T18:10:10+00:00 https://arstechnica.com/?p=2012822 www.secnews.physaphae.fr/article.php?IdArticle=8471540 False Mobile None 4.0000000000000000 Global Security Mag - Site de news francais Reliaquest a annoncé de nouvelles fonctionnalités à son application mobile Greymatter<br>ReliaQuest announced new features to its GreyMatter Mobile App revues de produits
Cybersecurity mobile app bolsters organizations\' security while providing better quality of life for security leaders Hailed as a \'game-changer\' by customers, GreyMatter mobile app enables threats to be remediated in one click - Product Reviews]]>
2024-03-27T16:54:27+00:00 https://www.globalsecuritymag.fr/reliaquest-announced-new-features-to-its-greymatter-mobile-app.html www.secnews.physaphae.fr/article.php?IdArticle=8471498 False Mobile None 2.0000000000000000
SecurityWeek - Security News Les applications VPN sur Google Play transforment les appareils Android en proxies<br>VPN Apps on Google Play Turn Android Devices Into Proxies La sécurité humaine identifie 28 applications VPN pour Android et un SDK qui transforment les appareils en proxys.
>Human Security identifies 28 VPN applications for Android and an SDK that turn devices into proxies. ]]>
2024-03-27T13:19:18+00:00 https://www.securityweek.com/vpn-apps-on-google-play-turn-android-devices-into-proxies/ www.secnews.physaphae.fr/article.php?IdArticle=8471417 False Mobile None 3.0000000000000000
Korben - Bloger francais BlueDucky – Automatiser l\'exploitation d\'une faille Bluetooth pour exécuter du code à distance 2024-03-27T13:00:17+00:00 https://korben.info/blueducky-automatiser-exploitation-faille-bluetooth-execution-code-distance.html www.secnews.physaphae.fr/article.php?IdArticle=8471386 False Mobile None 3.0000000000000000 CyberScoop - scoopnewsgroup.com special Cyber Les logiciels espions et les exploits zéro-jours vont de plus en plus de pair, les chercheurs trouvent<br>Spyware and zero-day exploits increasingly go hand-in-hand, researchers find Les chercheurs ont trouvé 97 jours zéro exploités dans la nature en 2023;Près des deux tiers des défauts mobiles et du navigateur ont été utilisés par les entreprises spyware.
>Researchers found 97 zero-days exploited in the wild in 2023; nearly two thirds of mobile and browser flaws were used by spyware firms. ]]>
2024-03-27T13:00:00+00:00 https://cyberscoop.com/spyware-zero-days-2023/ www.secnews.physaphae.fr/article.php?IdArticle=8471356 False Vulnerability,Threat,Mobile None 2.0000000000000000
Korben - Bloger francais VLC dévoile les sombres dessous de la signature d\'apps Android 2024-03-27T08:21:15+00:00 https://korben.info/securite-android-vlc-devoile-dessous-signature-apps.html www.secnews.physaphae.fr/article.php?IdArticle=8471274 False Mobile None 5.0000000000000000 Mandiant - Blog Sécu de Mandiant Tendances les jours zéro exploités dans le monde en 2023<br>Trends on Zero-Days Exploited In-the-Wild in 2023   Combined data from Google\'s Threat Analysis Group (TAG) and Mandiant shows 97 zero-day vulnerabilities were exploited in 2023; a big increase over the 62 zero-day vulnerabilities identified in 2022, but still less than 2021\'s peak of 106 zero-days. This finding comes from the first-ever joint zero-day report by TAG and Mandiant. The report highlights 2023 zero-day trends, with focus on two main categories of vulnerabilities. The first is end user platforms and products such as mobile devices, operating systems, browsers, and other applications. The second is enterprise-focused technologies such as security software and appliances. Key zero-day findings from the report include: Vendors\' security investments are working, making certain attacks harder. Attacks increasingly target third-party components, affecting multiple products. Enterprise targeting is rising, with more focus on security software and appliances. Commercial surveillance vendors lead browser and mobile device exploits. People\'s Republic of China (PRC) remains the top state-backed exploiter of zero-days. Financially-motivated attacks proportionally decreased. Threat actors are increasingly leveraging zero-days, often for the purposes of evasion and persistence, and we don\'t expect this activity to decrease anytime soon. Progress is being made on all fronts, but zero-day vulnerabilities remain a major threat.  A Look Back - 2023 Zero-Day Activity at a Glance Barracuda ESG: CVE-2023-2868 Barracuda disclosed in May 2023 that a zero-day vulnerability (CVE-2023-2868) in their Email Security Gateway (ESG) had been actively exploited since as early as October 2022. Mandiant investigated and determined that UNC4841, a suspected Chinese cyber espionage actor, was conducting attacks across multiple regions and sectors as part of an espionage campaign in support of the PRC. Mandiant released a blog post with findings from the initial investigation, a follow-up post with more details as the investigation continued]]> 2024-03-26T22:00:00+00:00 https://cloud.google.com/blog/topics/threat-intelligence/2023-zero-day-trends/ www.secnews.physaphae.fr/article.php?IdArticle=8500401 False Vulnerability,Threat,Mobile,Cloud,Technical None 2.0000000000000000 Dark Reading - Informationweek Branch Apple Security Bug ouvre l'iPhone, iPad à RCE<br>Apple Security Bug Opens iPhone, iPad to RCE CVE-2024-1580 allows remote attackers to execute arbitrary code on affected devices.]]> 2024-03-26T20:42:26+00:00 https://www.darkreading.com/endpoint-security/apple-security-bug-opens-iphone-ipad-rce www.secnews.physaphae.fr/article.php?IdArticle=8470974 False Mobile None 3.0000000000000000 Zimperium - cyber risk firms for mobile Defending Your Mobile Workspace: Mitigating Risks of Sideloading Apps Dans le lieu de travail dirigée numérique d'aujourd'hui, les applications mobiles (applications) sont devenues des outils indispensables pour améliorer la productivité et fournir aux équipes une communication transparente.Alors que les employés recherchent des fonctionnalités et des fonctionnalités supplémentaires au-delà de ce que les magasins d'applications officiels offrent, ils se tournent souvent vers des magasins d'applications tiers.Alors que l'idée des magasins d'applications tierces peut sembler innocente, [& # 8230;]
>In today\'s digitally-driven workplace, mobile applications (apps) have become indispensable tools for enhancing productivity and providing teams with seamless communication. As employees seek additional functionality and features beyond what official app stores offer, they often turn to third-party app stores. While the idea of third-party app stores may seem innocent, […] ]]>
2024-03-26T13:00:00+00:00 https://zimpstage.wpengine.com/blog/defending-your-mobile-workspace-mitigating-risks-of-sideloading-apps/ www.secnews.physaphae.fr/article.php?IdArticle=8470943 False Tool,Mobile None 2.0000000000000000
Zimperium - cyber risk firms for mobile Défendre votre espace de travail mobile: les risques d'atténuation des applications de téléchargement de touche<br>Defending Your Mobile Workspace: Mitigating Risks of Sideloading Apps Dans le lieu de travail dirigée numérique d'aujourd'hui, les applications mobiles (applications) sont devenues des outils indispensables pour améliorer la productivité et fournir aux équipes une communication transparente.Alors que les employés recherchent des fonctionnalités et des fonctionnalités supplémentaires au-delà de ce que les magasins d'applications officiels offrent, ils se tournent souvent vers des magasins d'applications tiers.Alors que l'idée des magasins d'applications tierces peut sembler innocente, [& # 8230;]
>In today\'s digitally-driven workplace, mobile applications (apps) have become indispensable tools for enhancing productivity and providing teams with seamless communication. As employees seek additional functionality and features beyond what official app stores offer, they often turn to third-party app stores. While the idea of third-party app stores may seem innocent, […] ]]>
2024-03-26T13:00:00+00:00 https://www.zimperium.com/blog/defending-your-mobile-workspace-mitigating-risks-of-sideloading-apps/ www.secnews.physaphae.fr/article.php?IdArticle=8470733 False Tool,Mobile None 2.0000000000000000
Bleeping Computer - Magazine Américain Les applications VPN gratuites sur Google Play transforment les téléphones Android en proxies<br>Free VPN apps on Google Play turned Android phones into proxies Over 15 free VPN apps on Google Play were found using a malicious software development kit that turned Android devices into unwitting residential proxies, likely used for cybercrime and shopping bots. [...]]]> 2024-03-26T12:33:00+00:00 https://www.bleepingcomputer.com/news/security/free-vpn-apps-on-google-play-turned-android-phones-into-proxies/ www.secnews.physaphae.fr/article.php?IdArticle=8470852 False Mobile None 3.0000000000000000 Bleeping Computer - Magazine Américain Les nouveaux résultats de recherche sur l'IA de Google favorisent les sites poussant des logiciels malveillants, des escroqueries<br>Google\\'s new AI search results promotes sites pushing malware, scams Google\'s new AI-powered \'Search Generative Experience\' algorithms recommend scam sites that redirect visitors to unwanted Chrome extensions, fake iPhone giveaways, browser spam subscriptions, and tech support scams. [...]]]> 2024-03-25T07:32:16+00:00 https://www.bleepingcomputer.com/news/google/googles-new-ai-search-results-promotes-sites-pushing-malware-scams/ www.secnews.physaphae.fr/article.php?IdArticle=8470225 False Spam,Malware,Mobile None 2.0000000000000000 Techworm - News Les pirates peuvent débloquer 3 millions de portes hôtelières dans 131 pays<br>Hackers Can Unlock 3 million Hotel Doors In 131 Countries 2024-03-23T21:28:48+00:00 https://www.techworm.net/2024/03/hackers-unlock-3-million-hotel-doors.html www.secnews.physaphae.fr/article.php?IdArticle=8469128 False Tool,Vulnerability,Mobile,Technical None 2.0000000000000000 Bleeping Computer - Magazine Américain Opera voit un grand saut dans les utilisateurs de l'UE sur iOS, Android après la mise à jour DMA<br>Opera sees big jump in EU users on iOS, Android after DMA update Opera has reported a substantial 164% increase in new European Union users on iOS devices after Apple introduced a new feature to comply with the EU\'s Digital Markets Act (DMA). [...]]]> 2024-03-23T12:59:46+00:00 https://www.bleepingcomputer.com/news/technology/opera-sees-big-jump-in-eu-users-on-ios-android-after-dma-update/ www.secnews.physaphae.fr/article.php?IdArticle=8469140 False Mobile None 3.0000000000000000 Schneier on Security - Chercheur Cryptologue Américain Google paie 10 millions de dollars en primes de bogue en 2023<br>Google Pays $10M in Bug Bounties in 2023 Détails .Il est de 2 millions de dollars de moins qu'en 2022, mais il est encore beaucoup beaucoup. La récompense la plus élevée pour un rapport de vulnérabilité en 2023 était de 113 337 $, tandis que le décompte total depuis le lancement du programme en 2010 a atteint 59 millions de dollars. Pour Android, le système d'exploitation mobile le plus populaire et le plus largement utilisé, le programme a accordé plus de 3,4 millions de dollars. Google a également augmenté le montant maximal de récompense pour les vulnérabilités critiques concernant Android à 15 000 $, ce qui a augmenté les rapports communautaires. Au cours des conférences de sécurité comme ESCAL8 et Hardwea.io, Google a attribué 70 000 $ pour 20 découvertes critiques dans le système d'exploitation Android et Android Automotive et 116 000 $ pour 50 rapports concernant les problèmes dans Nest, Fitbit et Wearables ...
BleepingComputer has the
details. It’s $2M less than in 2022, but it’s still a lot. The highest reward for a vulnerability report in 2023 was $113,337, while the total tally since the program’s launch in 2010 has reached $59 million. For Android, the world’s most popular and widely used mobile operating system, the program awarded over $3.4 million. Google also increased the maximum reward amount for critical vulnerabilities concerning Android to $15,000, driving increased community reports. During security conferences like ESCAL8 and hardwea.io, Google awarded $70,000 for 20 critical discoveries in Wear OS and Android Automotive OS and another $116,000 for 50 reports concerning issues in Nest, Fitbit, and Wearables...]]> 2024-03-22T11:01:39+00:00 https://www.schneier.com/blog/archives/2024/03/google-pays-10m-in-bug-bounties-in-2023.html www.secnews.physaphae.fr/article.php?IdArticle=8468408 False Vulnerability,Studies,Mobile None 3.0000000000000000 Ars Technica - Risk Assessment Security Hacktivism Android 15 obtient la messagerie par satellite, commence la prise en charge de l'application de couverture pliable<br>Android 15 gets satellite messaging, starts foldable cover app support Google still isn\'t letting Play Store apps use RCS, though.]]> 2024-03-21T18:34:13+00:00 https://arstechnica.com/?p=2011931 www.secnews.physaphae.fr/article.php?IdArticle=8468050 False Mobile None 3.0000000000000000 Zimperium - cyber risk firms for mobile Securing Your React Native Apps: Top 6 Concerns to Address Dans le développement d'applications mobiles, il existe deux approches principales: les applications natives et les applications hybrides.Les applications natives sont développées pour des plates-formes spécifiques à l'aide de langages comme Swift pour iOS et Kotlin pour Android, offrant des performances rapides et une expérience utilisateur fluide.Les applications hybrides, en revanche, sont conçues avec des technologies Web [& # 8230;]
>In mobile app development, there are two primary approaches: native apps and hybrid apps. Native apps are developed for specific platforms using languages like Swift for iOS and Kotlin for Android, offering fast performance and a smooth user experience. Hybrid apps, on the other hand, are built with web technologies […] ]]>
2024-03-21T13:00:00+00:00 https://zimpstage.wpengine.com/blog/securing-your-react-native-apps-top-6-concerns-to-address/ www.secnews.physaphae.fr/article.php?IdArticle=8470944 False Mobile None 2.0000000000000000
Zimperium - cyber risk firms for mobile Sécuriser vos applications natives React: les 6 principales préoccupations à répondre<br>Securing Your React Native Apps: Top 6 Concerns to Address Dans le développement d'applications mobiles, il existe deux approches principales: les applications natives et les applications hybrides.Les applications natives sont développées pour des plates-formes spécifiques à l'aide de langages comme Swift pour iOS et Kotlin pour Android, offrant des performances rapides et une expérience utilisateur fluide.Les applications hybrides, en revanche, sont conçues avec des technologies Web [& # 8230;]
>In mobile app development, there are two primary approaches: native apps and hybrid apps. Native apps are developed for specific platforms using languages like Swift for iOS and Kotlin for Android, offering fast performance and a smooth user experience. Hybrid apps, on the other hand, are built with web technologies […] ]]>
2024-03-21T13:00:00+00:00 https://www.zimperium.com/blog/securing-your-react-native-apps-top-6-concerns-to-address/ www.secnews.physaphae.fr/article.php?IdArticle=8467885 False Mobile None 3.0000000000000000
Dark Reading - Informationweek Branch Kaspersky identifie trois nouvelles menaces de logiciels malveillants Android<br>Kaspersky Identifies Three New Android Malware Threats 2024-03-20T18:56:01+00:00 https://www.darkreading.com/endpoint-security/kaspersky-identifies-three-new-android-malware-threats www.secnews.physaphae.fr/article.php?IdArticle=8467470 False Malware,Mobile None 2.0000000000000000 Dark Reading - Informationweek Branch Les utilisateurs d'Android India \\ sont frappés par la campagne de logiciels malveillants en tant que service<br>India\\'s Android Users Hit by Malware-as-a-Service Campaign Hackers are seeking sensitive personal information on user devices, including banking data and SMS messages.]]> 2024-03-20T18:05:18+00:00 https://www.darkreading.com/cyberattacks-data-breaches/hackers-target-android-users-in-india-through-maas-campaign www.secnews.physaphae.fr/article.php?IdArticle=8467471 False Mobile None 3.0000000000000000 Kaspersky - Kaspersky Research blog Malware Android, logiciels malveillants Android et plus de logiciels malveillants Android<br>Android malware, Android malware and more Android malware In this report, we share our latest Android malware findings: the Tambir spyware, Dwphon downloader and Gigabud banking Trojan.]]> 2024-03-20T11:00:34+00:00 https://securelist.com/crimeware-report-android-malware/112121/ www.secnews.physaphae.fr/article.php?IdArticle=8467245 False Malware,Mobile None 2.0000000000000000 Korben - Bloger francais Attention aux liens sur X ! 2024-03-20T10:06:41+00:00 https://korben.info/attention-liens-trompeurs-x-ex-twitter-redirection.html www.secnews.physaphae.fr/article.php?IdArticle=8467253 False Mobile None 2.0000000000000000 The Register - Site journalistique Anglais Firefox 124 apporte plus de mouvements lisses pour Mac et Android<br>Firefox 124 brings more slick moves for Mac and Android And you now get keyboard navigation in the built-in PDF reader The latest version of Firefox improves in areas that should help it fit in better on several categories of hardware.…]]> 2024-03-19T16:15:13+00:00 https://go.theregister.com/feed/www.theregister.com/2024/03/19/firefox_124/ www.secnews.physaphae.fr/article.php?IdArticle=8466793 False Mobile None 2.0000000000000000 Silicon - Site de News Francais Apple discute avec Google pour intégrer Gemini dans les iPhone 2024-03-19T16:14:54+00:00 https://www.silicon.fr/apple-discute-avec-google-pour-integrer-gemini-dans-les-iphone-476968.html www.secnews.physaphae.fr/article.php?IdArticle=8466794 False Mobile None 2.0000000000000000 Zimperium - cyber risk firms for mobile Les risques croissants de fraude à disposition<br>The Growing Risks of On-Device Fraud L'image est douloureusement claire...Les organisations ne voient pas de ralentissement de la fraude financière ciblant les appareils mobiles.MasterCard a récemment partagé que leurs données montrent une tendance de 41 milliards de dollars de perte liée à la fraude en 2022, atteignant 48 milliards de dollars d'ici 2023. JuniperResearch met le nombre à 91 milliards de dollars d'ici 2028 et [& # 8230;]
>The picture is painfully clear . . . organizations are not seeing a slowdown in financial fraud targeting  mobile devices. Mastercard recently shared that their data shows a trend of $41billion in fraud-related loss in 2022, growing to $48billion by 2023.  JuniperResearch puts the number at $91billion by 2028 and […] ]]>
2024-03-19T13:00:00+00:00 https://www.zimperium.com/blog/the-growing-risks-of-on-device-fraud/ www.secnews.physaphae.fr/article.php?IdArticle=8466664 False Mobile,Prediction None 2.0000000000000000
Zimperium - cyber risk firms for mobile The Growing Risks of On-Device Fraud L'image est douloureusement claire...Les organisations ne voient pas de ralentissement de la fraude financière ciblant les appareils mobiles.MasterCard a récemment partagé que leurs données montrent une tendance de 41 milliards de dollars de perte liée à la fraude en 2022, atteignant 48 milliards de dollars d'ici 2023. JuniperResearch met le nombre à 91 milliards de dollars d'ici 2028 et [& # 8230;]
>The picture is painfully clear . . . organizations are not seeing a slowdown in financial fraud targeting  mobile devices. Mastercard recently shared that their data shows a trend of $41billion in fraud-related loss in 2022, growing to $48billion by 2023.  JuniperResearch puts the number at $91billion by 2028 and […] ]]>
2024-03-19T13:00:00+00:00 https://zimpstage.wpengine.com/blog/the-growing-risks-of-on-device-fraud/ www.secnews.physaphae.fr/article.php?IdArticle=8470945 False Studies,Mobile,Prediction None 4.0000000000000000
We Live Security - Editeur Logiciel Antivirus ESET Une prescription pour la protection de la confidentialité: exerce une prudence lors de l'utilisation d'une application de santé mobile<br>A prescription for privacy protection: Exercise caution when using a mobile health app Given the unhealthy data-collection habits of some mHealth apps, you\'re well advised to tread carefully when choosing with whom you share some of your most sensitive data]]> 2024-03-19T10:30:00+00:00 https://www.welivesecurity.com/en/privacy/prescription-privacy-protection-exercise-caution-mobile-health-app/ www.secnews.physaphae.fr/article.php?IdArticle=8467142 False Mobile None 2.0000000000000000 Korben - Bloger francais Top 50 des IA génératives à découvrir absolument en 2024 2024-03-16T07:00:00+00:00 https://korben.info/top-50-apps-ia-generatives-a-decouvrir-absolument-2024.html www.secnews.physaphae.fr/article.php?IdArticle=8464775 False Tool,Mobile None 3.0000000000000000 Korben - Bloger francais Adeus – L\'assistant IA DIY qui vous accompagne partout 2024-03-15T08:00:00+00:00 https://korben.info/adeus-ia-personnelle-open-source-respect-vie-privee.html www.secnews.physaphae.fr/article.php?IdArticle=8464252 False Mobile None 3.0000000000000000 The Register - Site journalistique Anglais Google Gooses Safe Protection avec une protection en temps réel qui ne fuit pas au géant publicitaire<br>Google gooses Safe Browsing with real-time protection that doesn\\'t leak to ad giant Rare occasion when you do want Big Tech to make a hash of it Google has enhanced its Safe Browsing service to enable real-time protection in Chrome for desktop, iOS, and soon Android against risky websites, without sending browsing history data to the ad biz.…]]> 2024-03-14T17:58:09+00:00 https://go.theregister.com/feed/www.theregister.com/2024/03/14/google_safe_browsing_update/ www.secnews.physaphae.fr/article.php?IdArticle=8463923 False Mobile None 3.0000000000000000 McAfee Labs - Editeur Logiciel Android Phishing Scam utilisant des logiciels malveillants en tant que service en Inde<br>Android Phishing Scam Using Malware-as-a-Service on the Rise in India Rédigé par Zepeng Chen et Wenfeng Yu McAfee Research Mobile Research a observé une campagne de logiciels malveillants à escroquerie active ciblant Android ...
> Authored by ZePeng Chen and Wenfeng Yu  McAfee Mobile Research Team has observed an active scam malware campaign targeting Android... ]]>
2024-03-14T16:42:32+00:00 https://www.mcafee.com/blogs/other-blogs/mcafee-labs/android-phishing-scam-using-malware-as-a-service-on-the-rise-in-india/ www.secnews.physaphae.fr/article.php?IdArticle=8463892 False Malware,Mobile None 3.0000000000000000
Global Security Mag - Site de news francais Proton Mail lance une application de bureau pour Windows et macOS Produits]]> 2024-03-14T13:12:07+00:00 https://www.globalsecuritymag.fr/proton-mail-lance-une-application-de-bureau-pour-windows-et-macos.html www.secnews.physaphae.fr/article.php?IdArticle=8463803 False Mobile None 2.0000000000000000 GoogleSec - Firm Security Blog Protection d'URL en temps réel et préservant la confidentialité<br>Real-time, privacy-preserving URL protection Standard protection mode of Safe Browsing in Chrome. Current landscape Chrome automatically protects you by flagging potentially dangerous sites and files, hand in hand with Safe Browsing which discovers thousands of unsafe sites every day and adds them to its lists of harmful sites and files. So far, for privacy and performance reasons, Chrome has first checked sites you visit against a locally-stored list of known unsafe sites which is updated every 30 to 60 minutes – this is done using hash-based checks. Hash-based check overview But unsafe sites have adapted - today, the majority of them exist for less than 10 minutes, meaning that by the time the locally-stored list of known unsafe sites is updated, many have slipped through and had the chance to do damage if users happened to visit them during this window of opportunity. Further, Safe Browsing\'s list of harmful websites continues to grow at a rapid pace. Not all devices have the resources necessary to maintain this growing list, nor are they always able to receive and apply updates to the list at the frequency necessary to benefit from full protection. Safe Browsing\'s Enhanced protection mode already stays ahead of such threats with technologies such as real-time list checks and AI-based classification of malicious URLs and web pages. We built this mode as an opt-in to give users the choice of sharing more security-related data in order to get stronger security. This mode has shown that checking lists in real time brings significant value, so we decided to bring that to the default Standard protection mode through a new API – one that doesn\'t share the URLs of sites you visit with Google. Introducing real-time, privacy-preserving Safe Browsing How it works In order to transition to real-time protection, checks now need to be performed against a list that is maintained on the Safe Browsing server. The server-side list can include unsafe sites as soon as they are discovered, so it is able to capture sites that switch quickly. It can also grow as large as needed because the]]> 2024-03-14T12:01:32+00:00 http://security.googleblog.com/2024/03/blog-post.html www.secnews.physaphae.fr/article.php?IdArticle=8469136 False Malware,Mobile,Cloud None 2.0000000000000000 AlienVault Lab Blog - AlienVault est un acteur de defense majeur dans les IOC Spyware commercial: la menace furtive<br>Commercial spyware: The stealthy threat https://www.scmagazine.com/news/spyware-behind-nearly-50-of-zeros-days-targeting-google-products). ]]> 2024-03-14T10:00:00+00:00 https://cybersecurity.att.com/blogs/security-essentials/commercial-spyware-the-stealthy-threat www.secnews.physaphae.fr/article.php?IdArticle=8463833 False Ransomware,Malware,Tool,Vulnerability,Threat,Legislation,Mobile,Commercial None 2.0000000000000000 AhnLab - Korean Security Firm Arnaque en ligne: fraude par téléphone<br>Online Scam: Fraud Through My Phone l'appareil numérique que nous utilisons le plus dans notre vie quotidienne est le téléphone portable.Il est utilisé dans un large éventail d'activités quotidiennes telles que la communication, la recherche, le shopping, la paiement, la vérification de l'identité et l'investissement.Certaines personnes ne possèdent pas d'ordinateurs personnels, mais presque tout le monde de nos jours a des téléphones portables.Les escrocs visent les téléphones mobiles car ils sont les appareils les plus répandus et les plus utilisés.Ils utilisent un subterfuge et des escroqueries pour voler notre argent, nos informations et nos autorisations.Contenu ce texte ...
The digital device that we use the most in our daily lives is mobile phone. It is used in a wide range of daily activities such as communication, searching, shopping, making payment, verifying identity, and investing. Some people do not own personal computers, but almost everyone these days have mobile phones. Scammers aim for mobile phones because they are the most widespread, most utilized devices. They use subterfuge and scams to steal our money, information, and permissions. Contents These Text... ]]>
2024-03-14T00:38:40+00:00 https://asec.ahnlab.com/en/63054/ www.secnews.physaphae.fr/article.php?IdArticle=8464202 False Mobile None 2.0000000000000000
The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Pixpirate Android Banking Trojan utilisant une nouvelle tactique d'évasion pour cibler les utilisateurs brésiliens<br>PixPirate Android Banking Trojan Using New Evasion Tactic to Target Brazilian Users The threat actors behind the PixPirate Android banking trojan are leveraging a new trick to evade detection on compromised devices and harvest sensitive information from users in Brazil. The approach allows it to hide the malicious app\'s icon from the home screen of the victim\'s device, IBM said in a technical report published today. “Thanks to this new technique, during PixPirate reconnaissance]]> 2024-03-13T19:25:00+00:00 https://thehackernews.com/2024/03/pixpirate-android-banking-trojan-using.html www.secnews.physaphae.fr/article.php?IdArticle=8463199 False Threat,Mobile,Technical None 2.0000000000000000 Data Security Breach - Site de news Francais Correctifs importants pour Android 2024-03-13T16:31:19+00:00 https://www.datasecuritybreach.fr/correctifs-importants-pour-android/ www.secnews.physaphae.fr/article.php?IdArticle=8463294 False Mobile None 2.0000000000000000 Bleeping Computer - Magazine Américain Pixpirate Android Malware utilise une nouvelle tactique pour se cacher sur les téléphones<br>PixPirate Android malware uses new tactic to hide on phones The latest version of the PixPirate banking trojan for Android employs a previously unseen method to hide from the victim while remaining active on the infected device even if its dropper app has been removed. [...]]]> 2024-03-13T14:13:05+00:00 https://www.bleepingcomputer.com/news/security/pixpirate-android-malware-uses-new-tactic-to-hide-on-phones/ www.secnews.physaphae.fr/article.php?IdArticle=8463340 False Malware,Mobile None 3.0000000000000000 Dark Reading - Informationweek Branch \\ 'pixpirate \\' rat déclenche invisiblement les transferts de câbles des appareils Android<br>\\'PixPirate\\' RAT Invisibly Triggers Wire Transfers From Android Devices A multitooled Trojan cuts apart Brazil\'s premier wire transfer app. Could similar malware do the same to Venmo, Zelle, or PayPal?]]> 2024-03-13T10:00:00+00:00 https://www.darkreading.com/application-security/pixpirate-rat-invisibly-triggers-wire-transfers-android-devices www.secnews.physaphae.fr/article.php?IdArticle=8463087 False Malware,Mobile None 3.0000000000000000 AlienVault Lab Blog - AlienVault est un acteur de defense majeur dans les IOC 25 conseils essentiels de cybersécurité et meilleures pratiques pour votre entreprise<br>25 Essential Cybersecurity tips and best practices for your business cyberattacks can be tough. But there are several cybersecurity tips that can help defend against attacks. We\'ve gathered a list of 25 most effective tips for you to adopt and share with others. Top 25 cybersecurity tips for your business 1.    Keep your software up to date To stay safe from cyber threats like ransomware, it\'s essential to regularly update your software, including your operating system and applications. Updates often contain crucial security patches that fix vulnerabilities exploited by hackers. Enable automatic updates for your device and web browser, and ensure plugins like Flash and Java are also kept up to date. ]]> 2024-03-13T10:00:00+00:00 https://cybersecurity.att.com/blogs/security-essentials/25-essential-cybersecurity-tips-and-best-practices-for-your-business www.secnews.physaphae.fr/article.php?IdArticle=8463764 False Ransomware,Malware,Tool,Vulnerability,Mobile,Cloud LastPass 2.0000000000000000 Zimperium - cyber risk firms for mobile Banque mobile et Bonnie et Clyde modernes: votre application est-elle sûre?<br>Mobile Banking and The Modern Day Bonnie and Clyde: Is Your App Safe? Nous vivons à une époque où nos vies sont liées à nos appareils.Avec la majorité des transactions bancaires passant des environnements physiques aux environnements numériques, la question de savoir à quel point ces forteresses financières sont impénétrables pour le numérique moderne Bonnie et Clyde sont plus urgents que jamais.Cyber-menaces sophistiquées, [& # 8230;]
>We live in an era where our lives are intertwined with our devices. With the majority of banking transactions moving from physical to digital environments, the question of just how impenetrable these financial fortresses are to the modern-day digital Bonnie and Clyde is more pressing than ever. Sophisticated cyber threats, […] ]]>
2024-03-12T12:00:00+00:00 https://www.zimperium.com/blog/mobile_banking_and_the_modern_day_bonnie_and_clyde_is_your_app-_safe/ www.secnews.physaphae.fr/article.php?IdArticle=8462701 False Mobile None 2.0000000000000000
GoogleSec - Firm Security Blog Programme de récompense de vulnérabilité: 2023 Année en revue<br>Vulnerability Reward Program: 2023 Year in Review Bonus Awards program, we now periodically offer time-limited, extra rewards for reports to specific VRP targets. We expanded our exploit reward program to Chrome and Cloud through the launch of v8CTF, a CTF focused on V8, the JavaScript engine that powers Chrome. We launched Mobile VRP which focuses on first-party Android applications. Our new Bughunters blog shared ways in which we make the internet, as a whole, safer, and what that journey entails. Take a look at our ever-growing repository of posts! To further our engagement with top security researchers, we also hosted our yearly security conference ESCAL8 in Tokyo. It included live hacking events and competitions, student training with our init.g workshops, and talks from researchers and Googlers. Stay tuned for details on ESCAL8 2024. As in past years, we are sharing our 2023 Year in Review statistics across all of our programs. We would like to give a special thank you to all of our dedicated researchers for their continued work with our programs - we look forward to more collaboration in the future! Android and Google Devices In 2023, the Android VRP achieved significant milestones, reflecting our dedication to securing the Android ecosystem. We awarded over $3.4 million in rewards to researchers who uncovered remarkable vulnerabilities within Android]]> 2024-03-12T11:59:14+00:00 http://security.googleblog.com/2024/03/vulnerability-reward-program-2023-year.html www.secnews.physaphae.fr/article.php?IdArticle=8469137 False Vulnerability,Threat,Mobile,Cloud,Conference None 3.0000000000000000 Korben - Bloger francais WhatsApp améliore la confidentialité avec une maj inédite 2024-03-11T13:38:01+00:00 https://korben.info/whatsapp-beta-android-conversations-chiffrees-de-bout-en-bout.html www.secnews.physaphae.fr/article.php?IdArticle=8462168 False Mobile None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les rats se propagent via Fake Skype, Zoom, Google Meet Sites<br>RATs Spread Via Fake Skype, Zoom, Google Meet Sites Zscaler\'s ThreatLabz discovered malware spreading SpyNote RAT to Android and NjRAT/DCRat to Windows]]> 2024-03-07T17:00:00+00:00 https://www.infosecurity-magazine.com/news/rats-fake-skype-zoom-google-meet/ www.secnews.physaphae.fr/article.php?IdArticle=8460406 False Malware,Mobile None 2.0000000000000000 Zimperium - cyber risk firms for mobile Fraude bancaire mobile par rapport aux escroqueries bancaires mobiles: les risques et les répercussions<br>Mobile Banking Fraud vs. Mobile Banking Scams: The Risks and Repercussions Pour les professionnels de la finance et de la sécurité, la compréhension des nuances entre la fraude et les escroqueries dans le secteur bancaire mobile est essentielle pour protéger les actifs des clients et protéger l'intégrité institutionnelle.
>For finance and security professionals, understanding the nuances between fraud and scams in the mobile banking sector is critical for protecting customer assets and safeguarding institutional integrity. ]]>
2024-03-07T12:00:00+00:00 https://www.zimperium.com/blog/mobile_banking_fraud_vs_mobile_banking_scams_risks_and_repercussions/ www.secnews.physaphae.fr/article.php?IdArticle=8460281 False Mobile None 3.0000000000000000
The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Attention au zoom usurpé, skype, google rencontre des sites offrant des logiciels malveillants<br>Watch Out for Spoofed Zoom, Skype, Google Meet Sites Delivering Malware Threat actors have been leveraging fake websites advertising popular video conferencing software such as Google Meet, Skype, and Zoom to deliver a variety of malware targeting both Android and Windows users since December 2023. “The threat actor is distributing Remote Access Trojans (RATs) including SpyNote RAT for Android platforms, and NjRAT and DCRat for Windows]]> 2024-03-07T11:41:00+00:00 https://thehackernews.com/2024/03/watch-out-for-spoofed-zoom-skype-google.html www.secnews.physaphae.fr/article.php?IdArticle=8460180 False Malware,Threat,Mobile None 2.0000000000000000 AlienVault Lab Blog - AlienVault est un acteur de defense majeur dans les IOC Sécuriser l'IA<br>Securing AI AI governance  framework model like the NIST AI RMF to enable business innovation and manage risk is just as important as adopting guidelines to secure AI. Responsible AI starts with securing AI by design and securing AI with Zero Trust architecture principles. Vulnerabilities in ChatGPT A recent discovered vulnerability found in version gpt-3.5-turbo exposed identifiable information. The vulnerability was reported in the news late November 2023. By repeating a particular word continuously to the chatbot it triggered the vulnerability. A group of security researchers with Google DeepMind, Cornell University, CMU, UC Berkeley, ETH Zurich, and the University of Washington studied the “extractable memorization” of training data that an adversary can extract by querying a ML model without prior knowledge of the training dataset. The researchers’ report show an adversary can extract gigabytes of training data from open-source language models. In the vulnerability testing, a new developed divergence attack on the aligned ChatGPT caused the model to emit training data 150 times higher. Findings show larger and more capable LLMs are more vulnerable to data extraction attacks, emitting more memorized training data as the volume gets larger. While similar attacks have been documented with unaligned models, the new ChatGPT vulnerability exposed a successful attack on LLM models typically built with strict guardrails found in aligned models. This raises questions about best practices and methods in how AI systems could better secure LLM models, build training data that is reliable and trustworthy, and protect privacy. U.S. and UK’s Bilateral cybersecurity effort on securing AI The US Cybersecurity Infrastructure and Security Agency (CISA) and UK’s National Cyber Security Center (NCSC) in cooperation with 21 agencies and ministries from 18 other countries are supporting the first global guidelines for AI security. The new UK-led guidelines for securing AI as part of the U.S. and UK’s bilateral cybersecurity effort was announced at the end of November 2023. The pledge is an acknowledgement of AI risk by nation leaders and government agencies worldwide and is the beginning of international collaboration to ensure the safety and security of AI by design. The Department of Homeland Security (DHS) CISA and UK NCSC joint guidelines for Secure AI system Development aims to ensure cybersecurity decisions are embedded at every stage of the AI development lifecycle from the start and throughout, and not as an afterthought. Securing AI by design Securing AI by design is a key approach to mitigate cybersecurity risks and other vulnerabilities in AI systems. Ensuring the entire AI system development lifecycle process is secure from design to development, deployment, and operations and maintenance is critical to an organization realizing its full benefits. The guidelines documented in the Guidelines for Secure AI System Development aligns closely to software development life cycle practices defined in the NSCS’s Secure development and deployment guidance and the National Institute of Standards and Technology (NIST) Secure Software Development Framework (SSDF). The 4 pillars that embody the Guidelines for Secure AI System Development offers guidance for AI providers of any systems whether newly created from the ground up or built on top of tools and services provided from]]> 2024-03-07T11:00:00+00:00 https://cybersecurity.att.com/blogs/security-essentials/securing-ai www.secnews.physaphae.fr/article.php?IdArticle=8460259 False Tool,Vulnerability,Threat,Mobile,Medical,Cloud,Technical ChatGPT 2.0000000000000000 Dark Reading - Informationweek Branch Patch maintenant: Apple Zero-Day Exploits contourner la sécurité du noyau<br>Patch Now: Apple Zero-Day Exploits Bypass Kernel Security A pair of critical bugs could open the door to complete system compromise, including access to location information, iPhone camera and mic, and messages. Rootkitted attackers could theoretically perform lateral movement to corporate networks, too.]]> 2024-03-06T19:15:07+00:00 https://www.darkreading.com/ics-ot-security/patch-now-apple-zero-day-exploits-bypass-kernel-security www.secnews.physaphae.fr/article.php?IdArticle=8459979 False Vulnerability,Threat,Mobile None 3.0000000000000000 Dark Reading - Informationweek Branch Spoofed Zoom, Google &Les réunions Skype répartissent les rats d'entreprise<br>Spoofed Zoom, Google & Skype Meetings Spread Corporate RATs A Russian-language campaign aims to compromise corporate users on both Windows and Android devices by mimicking popular online collaboration applications.]]> 2024-03-06T18:25:34+00:00 https://www.darkreading.com/cyberattacks-data-breaches/spoofed-zoom-google-skype-meetings-spread-corporate-rats www.secnews.physaphae.fr/article.php?IdArticle=8459959 False Mobile None 2.0000000000000000 Mandiant - Blog Sécu de Mandiant Placer dans Dalvik: un aperçu des fichiers dex<br>Delving into Dalvik: A Look Into DEX Files jeb décompulier qui permettent une identification et un correctif rapides du code dans les applications Android, mais nous avons constaté que la possibilité de faire de même avec la statique gratuite
During the analysis of a banking trojan sample targeting Android smartphones, Mandiant identified the repeated use of a string obfuscation mechanism throughout the application code. To fully analyze and understand the application\'s functionality, one possibility is to manually decode the strings in each obfuscated method encountered, which can be a time-consuming and repetitive process. Another possibility is to use paid tools such as JEB decompiler that allow quick identification and patching of code in Android applications, but we found that the ability to do the same with free static]]>
2024-03-06T17:30:00+00:00 https://www.mandiant.com/resources/blog/dalvik-look-into-dex-files www.secnews.physaphae.fr/article.php?IdArticle=8460144 False Tool,Patching,Mobile None 2.0000000000000000
Silicon - Site de News Francais Android sur Windows : Microsoft recule à nouveau 2024-03-06T15:15:47+00:00 https://www.silicon.fr/android-windows-microsoft-recule-476589.html www.secnews.physaphae.fr/article.php?IdArticle=8459912 False Mobile None 3.0000000000000000 RiskIQ - cyber risk firms (now microsoft) Cryptochameleon: de nouvelles tactiques de phishing exposées dans l'attaque ciblée par la FCC<br>CryptoChameleon: New Phishing Tactics Exhibited in FCC-Targeted Attack #### Description Security researchers from Lookout recently uncovered a sophisticated phishing kit, known as CryptoChameleon, utilizing novel techniques to steal sensitive data from cryptocurrency platforms and the Federal Communications Commission (FCC). This kit employs custom single sign-on (SSO) pages and phone/SMS lures to extract login credentials, multi-factor tokens, and photo IDs from victims, primarily on mobile devices. Notably, the kit includes an administrative console to monitor phishing attempts and offers customized redirections based on victims\' responses, with an emphasis on mimicking authentic MFA processes. Attacks have successfully compromised hundreds of victims, primarily in the United States. While tactics resemble previous actors like [Scattered Spider AKA Octo Tempest](https://ti.defender.microsoft.com/intel-profiles/205381037ed05d275251862061dd923309ac9ecdc2a9951d7c344d890a61101a), infrastructure differences suggest a distinctly different threat group. #### Reference URL(s) 1. https://www.lookout.com/threat-intelligence/article/cryptochameleon-fcc-phishing-kit #### Publication Date February 29, 2024 #### Author(s) David Richardson Savio Lau]]> 2024-03-06T14:38:08+00:00 https://community.riskiq.com/article/9227be0c www.secnews.physaphae.fr/article.php?IdArticle=8459878 False Threat,Mobile None 3.0000000000000000 SecurityWeek - Security News CISA avertit l'exploitation de la vulnérabilité des téléphones pixels<br>CISA Warns of Pixel Phone Vulnerability Exploitation CISA ajoute un téléphone Android Pixel (CVE-2023-21237) et Sunhillo Sureline (CVE-2021-36380) définitivement à son catalogue de vulnérabilités exploitées connues.
>CISA adds Pixel Android phone (CVE-2023-21237) and Sunhillo SureLine (CVE-2021-36380) flaws to its known exploited vulnerabilities catalog.  ]]>
2024-03-06T11:00:00+00:00 https://www.securityweek.com/cisa-warns-of-pixel-phone-vulnerability-exploitation/ www.secnews.physaphae.fr/article.php?IdArticle=8459791 False Vulnerability,Mobile None 2.0000000000000000
Global Security Mag - Site de news francais DMA : 8 Français sur 10 sont prêts à essayer un nouveau navigateur, selon une étude d\'Opera Investigations]]> 2024-03-06T10:13:12+00:00 https://www.globalsecuritymag.fr/dma-8-francais-sur-10-sont-prets-a-essayer-un-nouveau-navigateur-selon-une.html www.secnews.physaphae.fr/article.php?IdArticle=8459771 False Mobile None 2.0000000000000000 Korben - Bloger francais 2FAS – L\'app 2FA open source pour sécuriser vos comptes en ligne 2024-03-06T08:00:00+00:00 https://korben.info/2fas-app-authentification-double-facteur-open-source-secure-comptes-en-ligne.html www.secnews.physaphae.fr/article.php?IdArticle=8459744 False Mobile None 3.0000000000000000 Team Cymru - Equipe de Threat Intelligence Coper / Octo - Un chef d'orchestre pour le chaos mobile… avec huit membres?<br>Coper / Octo - A Conductor for Mobile Mayhem… With Eight Limbs? Analysis of an Android Malware-as-a-Service Operation Coper, a descendant of the Exobot malware family, was first observed in the wild in...]]> 2024-03-05T22:22:24+00:00 https://www.team-cymru.com/post/coper-octo-a-conductor-for-mobile-mayhem-with-eight-limbs www.secnews.physaphae.fr/article.php?IdArticle=8459788 False Mobile None 3.0000000000000000 The Register - Site journalistique Anglais Microsoft tue le sous-système Windows pour Android<br>Microsoft kills off Windows Subsystem for Android 2024-03-05T21:44:01+00:00 https://go.theregister.com/feed/www.theregister.com/2024/03/05/windows_subsystem_android/ www.secnews.physaphae.fr/article.php?IdArticle=8459519 False Mobile None 3.0000000000000000 TroyHunt - Blog Security Rip au sous-système Windows pour Android, qui disparaît en 2025<br>RIP to the Windows Subsystem for Android, which goes away in 2025 Amazon\'s inferior selection of Android apps meant WSA was never very useful.]]> 2024-03-05T20:51:49+00:00 https://arstechnica.com/?p=2007968 www.secnews.physaphae.fr/article.php?IdArticle=8459517 False Mobile None 3.0000000000000000 Bleeping Computer - Magazine Américain Microsoft tue les applications Android dans la fonction Windows 11<br>Microsoft is killing off the Android apps in Windows 11 feature Microsoft has unexpectedly announced they are ending support for the Windows Subsystem for Android next year on March 5th. [...]]]> 2024-03-05T14:23:44+00:00 https://www.bleepingcomputer.com/news/microsoft/microsoft-is-killing-off-the-android-apps-in-windows-11-feature/ www.secnews.physaphae.fr/article.php?IdArticle=8459474 False Mobile None 3.0000000000000000 Wired Threat Level - Security News Rien du téléphone (2A) Revue: la nouvelle norme budgétaire<br>Nothing Phone (2a) Review: The New Budget Standard I had zero problems covering a major mobile trade show with this $350 Android smartphone from Nothing.]]> 2024-03-05T12:30:00+00:00 https://www.wired.com/review/nothing-phone-2a/ www.secnews.physaphae.fr/article.php?IdArticle=8459298 False Mobile None 2.0000000000000000 Ars Technica - Risk Assessment Security Hacktivism Android Auto commence à signaler des applications «stationnées» plus puissantes sur l'écran d'accueil<br>Android Auto starts flagging more powerful “parked” apps on the home screen Parked apps include browsers, games, and video apps.]]> 2024-03-04T19:15:50+00:00 https://arstechnica.com/?p=2007579 www.secnews.physaphae.fr/article.php?IdArticle=8458969 False Mobile None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Predator Spyware ciblait des téléphones mobiles dans de nouveaux pays<br>Predator Spyware Targeted Mobile Phones in New Countries Despite being exposed to human rights violations, the Predator spyware continues to be used across the world – including in new countries]]> 2024-03-04T15:30:00+00:00 https://www.infosecurity-magazine.com/news/predator-spyware-targeted-new/ www.secnews.physaphae.fr/article.php?IdArticle=8458891 False Mobile,Mobile None 3.0000000000000000 Global Security Mag - Site de news francais ManageEngine s'associe avec un point de contrôle pour lutter contre l'augmentation des menaces mobiles<br>ManageEngine Joins Forces with Check Point to Tackle Rising Mobile Threats nouvelles commerciales
ManageEngine Joins Forces with Check Point to Tackle Rising Mobile Threats Integration Bolsters ManageEngine\'s Endpoint Protection Platform, Enhancing Overall Cybersecurity Posture - Business News]]>
2024-03-04T14:32:46+00:00 https://www.globalsecuritymag.fr/manageengine-joins-forces-with-check-point-to-tackle-rising-mobile-threats.html www.secnews.physaphae.fr/article.php?IdArticle=8459211 False Mobile None 2.0000000000000000
GoogleSec - Firm Security Blog Sécurisé par conception: la perspective de Google \\ sur la sécurité de la mémoire<br>Secure by Design: Google\\'s Perspective on Memory Safety reports that memory safety vulnerabilities-security defects caused by subtle coding errors related to how a program accesses memory-have been "the standard for attacking software for the last few decades and it\'s still how attackers are having success". Their analysis shows two thirds of 0-day exploits detected in the wild used memory corruption vulnerabilities. Despite substantial investments to improve memory-unsafe languages, those vulnerabilities continue to top the most commonly exploited vulnerability classes.In this post, we share our perspective on memory safety in a comprehensive whitepaper. This paper delves into the data, challenges of tackling memory unsafety, and discusses possible approaches for achieving memory safety and their tradeoffs. We\'ll also highlight our commitments towards implementing several of the solutions outlined in the whitepaper, most recently with a $1,000,000 grant to the Rust Foundation, thereby advancing the development of a robust memory-safe ecosystem.Why we\'re publishing this now2022 marked the 50th anniversary of memory safety vulnerabilities. Since then, memo]]> 2024-03-04T14:00:38+00:00 http://security.googleblog.com/2024/03/secure-by-design-googles-perspective-on.html www.secnews.physaphae.fr/article.php?IdArticle=8458966 False Vulnerability,Mobile None 2.0000000000000000 Bleeping Computer - Magazine Américain GTPDOOR LINUX MALWOREAL cible les réseaux d'opérateur mobile<br>Stealthy GTPDOOR Linux malware targets mobile operator networks Security researcher HaxRob discovered a previously unknown Linux backdoor named GTPDOOR, designed for covert operations within mobile carrier networks. [...]]]> 2024-03-03T10:16:08+00:00 https://www.bleepingcomputer.com/news/security/stealthy-gtpdoor-linux-malware-targets-mobile-operator-networks/ www.secnews.physaphae.fr/article.php?IdArticle=8458698 False Malware,Mobile None 2.0000000000000000 Wired Threat Level - Security News Le danger de la vie privée se cache dans les notifications push<br>The Privacy Danger Lurking in Push Notifications Plus: Apple warns about sideloading apps, a court orders NSO group to turn over the code of its Pegasus spyware, and an investigation finds widely available security cams are wildly insecure.]]> 2024-03-02T14:00:00+00:00 https://www.wired.com/story/push-notification-privacy-security-roundup/ www.secnews.physaphae.fr/article.php?IdArticle=8457968 False General Information,Mobile None 3.0000000000000000 RiskIQ - cyber risk firms (now microsoft) Les opérateurs de logiciels espions prédateurs reconstruisent l'infrastructure à plusieurs niveaux pour cibler les appareils mobiles<br>Predator Spyware Operators Rebuild Multi-Tier Infrastructure to Target Mobile Devices #### Description Recorded Future\'s Insikt Group has discovered new infrastructure related to the operators of Predator, a mercenary mobile spyware. The infrastructure is believed to be in use in at least eleven countries, including Angola, Armenia, Botswana, Egypt, Indonesia, Kazakhstan, Mongolia, Oman, the Philippines, Saudi Arabia, and Trinidad and Tobago. Despite being marketed for counterterrorism and law enforcement, Predator is often used against civil society, targeting journalists, politicians, and activists. The use of spyware like Predator poses significant risks to privacy, legality, and physical safety, especially when used outside serious crime and counterterrorism contexts. The Insikt Group\'s research identified a new multi-tiered Predator delivery infrastructure, with evidence from domain analysis and network intelligence data. Despite public disclosures in September 2023, Predator\'s operators have continued their operations with minimal changes. Predator, alongside NSO Group\'s Pegasus, remains a leading provider of mercenary spyware, with consistent tactics, techniques, and procedures over time. As the mercenary spyware market expands, the risks extend beyond civil society to anyone of interest to entities with access to these tools. Innovations in this field are likely to lead to more stealthy and comprehensive spyware capabilities. #### Reference URL(s) 1. https://www.recordedfuture.com/predator-spyware-operators-rebuild-multi-tier-infrastructure-target-mobile-devices #### Publication Date March 1, 2024 #### Author(s) Insikt Group]]> 2024-03-01T20:49:50+00:00 https://community.riskiq.com/article/7287eb1b www.secnews.physaphae.fr/article.php?IdArticle=8457691 False Tool,Mobile,Technical None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Un nouveau kit de phishing exploite les SMS, les appels vocaux pour cibler les utilisateurs de crypto-monnaie<br>New Phishing Kit Leverages SMS, Voice Calls to Target Cryptocurrency Users A novel phishing kit has been observed impersonating the login pages of well-known cryptocurrency services as part of an attack cluster designed to primarily target mobile devices. “This kit enables attackers to build carbon copies of single sign-on (SSO) pages, then use a combination of email, SMS, and voice phishing to trick the target into sharing usernames, passwords, password reset URLs,]]> 2024-03-01T19:02:00+00:00 https://thehackernews.com/2024/03/new-phishing-kit-leverages-sms-voice.html www.secnews.physaphae.fr/article.php?IdArticle=8457530 False Mobile None 3.0000000000000000 HackRead - Chercher Cyber Android Money Transfer Xhelper App exposé comme réseau de blanchiment d'argent<br>Android Money Transfer XHelper App Exposed as Money Laundering Network Par deeba ahmed ne confond pas l'application Xhelper avec le malware du malhelper, qui cible les appareils Android et est notoirement difficile à supprimer. Ceci est un article de HackRead.com Lire le post original: Android Money Transfer Xhelper App exposé comme réseau de blanchiment d'argent
>By Deeba Ahmed Don\'t confuse the XHelper app with the notorious XHelper malware, which targets Android devices and is notoriously difficult to remove. This is a post from HackRead.com Read the original post: Android Money Transfer XHelper App Exposed as Money Laundering Network]]>
2024-02-29T19:41:02+00:00 https://www.hackread.com/android-money-transfer-xhelper-money-laundering/ www.secnews.physaphae.fr/article.php?IdArticle=8457136 False Malware,Tool,Mobile None 3.0000000000000000
Bleeping Computer - Magazine Américain Brave Browser lance l'assistant AI axé sur la confidentialité sur Android<br>Brave browser launches privacy-focused AI assistant on Android Brave Software is the next company to jump into AI, announcing a new privacy-preserving AI assistant called "Leo" is rolling out on the Android version of its browser through the latest release, version 1.63. [...]]]> 2024-02-29T15:42:01+00:00 https://www.bleepingcomputer.com/news/security/brave-browser-launches-privacy-focused-ai-assistant-on-android/ www.secnews.physaphae.fr/article.php?IdArticle=8457158 False Mobile None 2.0000000000000000 Dark Reading - Informationweek Branch Rencontrer \\ 'xhelper, \\' l'application Android tout-en-un pour le blanchiment d'argent mondial<br>Meet \\'XHelper,\\' the All-in-One Android App for Global Money Laundering User-friendly apps allow anybody to serve as traffickers for cybercrime syndicates.]]> 2024-02-29T13:30:00+00:00 https://www.darkreading.com/threat-intelligence/xhelper-all-in-one-android-app-global-money-laundering www.secnews.physaphae.fr/article.php?IdArticle=8456672 False Mobile None 3.0000000000000000 McAfee Labs - Editeur Logiciel De l'enfant militaire au marketing de produit: mon voyage McAfee<br>From Military Kid to Product Marketing: My McAfee Journey Spotlight des employés: Rencontrez Jovohn!Des débuts militaires au champion de la sécurité mobile, rencontrez Jovohn, notre marketing de produit passionné et président du MAHC ....
> Employee Spotlight: Meet Jovohn! From military beginnings to mobile security champion, meet Jovohn, our passionate Product Marketer and MAHC President.... ]]>
2024-02-28T08:37:47+00:00 https://www.mcafee.com/blogs/other-blogs/life-at-mcafee/from-military-kid-to-product-marketing-my-mcafee-journey/ www.secnews.physaphae.fr/article.php?IdArticle=8459194 False Mobile TYPEFRAME 2.0000000000000000
Dark Reading - Informationweek Branch Kaspersky trouve que les attaques contre les appareils mobiles ont considérablement augmenté en 2023<br>Kaspersky Finds Attacks on Mobile Devices Significantly Increased in 2023 2024-02-27T22:55:46+00:00 https://www.darkreading.com/endpoint-security/kaspersky-finds-attacks-on-mobile-devices-significantly-increased-in-2023 www.secnews.physaphae.fr/article.php?IdArticle=8456103 False Mobile None 3.0000000000000000 Wired Threat Level - Security News 5 meilleurs services VPN (2024): pour les routeurs, PC, iPhone, Android, et plus encore<br>5 Best VPN Services (2024): For Routers, PC, iPhone, Android, and More It won\'t solve all of your privacy problems, but a virtual private network can make you a less tempting target for hackers.]]> 2024-02-27T14:00:00+00:00 https://www.wired.com/story/best-vpn/ www.secnews.physaphae.fr/article.php?IdArticle=8455880 False Mobile None 2.0000000000000000 Global Security Mag - Site de news francais Le coût humain des pannes mobiles révélés comme 80% en face de la vie critique, des impacts financiers ou de sécurité en raison de la perte de connectivité<br>Human cost of mobile outages revealed as 80% face life critical, financial or security impacts due to lost connectivity rapports spéciaux
Human cost of mobile outages revealed as 80% face life critical, financial or security impacts due to lost connectivity Almost 1 in 2 (43%) of businesses globally say connectivity problems have caused “life affecting changes” to either staff or the users of their products A quarter of all businesses (25%) say they have been hacked due to connectivity issues 82% of business leaders in the UK have experienced connectivity issues with 97% of those stating some form of outage every month Among the UK businesses leaders who\'ve suffered connectivity issues, 90% say they have lost sales or customers as a direct result Two thirds of all businesses say IoT data connectivity has become more critical in the last two years, with 32% saying they would develop new services or products with better resilience - Special Reports]]>
2024-02-27T11:39:55+00:00 https://www.globalsecuritymag.fr/human-cost-of-mobile-outages-revealed-as-80-face-life-critical-financial-or.html www.secnews.physaphae.fr/article.php?IdArticle=8455831 False Mobile None 3.0000000000000000
AlienVault Lab Blog - AlienVault est un acteur de defense majeur dans les IOC L'évolution du point de terminaison - passant des critères de terminaison traditionnels aux charges de travail cloud ou conteneurisées et les solutions de sécurité pour les protéger<br>The endpoint evolution - Evolving from traditional endpoints to cloud or containerized workloads and the security solutions to protect them Virtualization is achieved using a hypervisor, which splits CPU, RAM, and storage resources between multiple virtual machines (VMs). Each VM behaves like a separate computer that gets a guest operating system and each VM is independent of each other. This allows organizations to run multiple OS instances on a single server. Containerization, on the other hand, runs a single host OS instance and uses a container engine to help package applications into container images that can be easily deployed and re-used. By splitting each individual application function or microservice into containers they can operate independently to improve enterprise resilience and scalability. Kubernetes then manages the orchestration of multiple containers. VMs and containers present very different security challenges so let’s look at the evolution of endpoint security and the solutions that meet the needs of complex customer environments. Securing endpoints For decades, organizations have heavily relied on antivirus (AV) software to secure endpoints. However, traditional antivirus worked by matching known malicious signatures in a database and can no longer protect against today’s sophisticated threats. Modern endpoint security solutions are less signature-based and much more behavior-based. Endpoint protection platforms (EPP) offer cloud native architectures that provide a layered defense against fileless attacks using machine learning and behavioral AI to protect against malicious activity. Endpoint detection and response (EDR) solutions went beyond protection by recording and storing endpoint-system level behaviors to detect malicious threats.  EDR solutions use data analytics combined with threat intelligence feeds to provide incident responders with the forensic data for completing investigations and threat hunting. In addi]]> 2024-02-27T11:00:00+00:00 https://cybersecurity.att.com/blogs/security-essentials/the-endpoint-evolution www.secnews.physaphae.fr/article.php?IdArticle=8455968 False Malware,Tool,Vulnerability,Threat,Mobile,Cloud None 2.0000000000000000 The Register - Site journalistique Anglais Google pour ramener le modèle Gemini en ligne dans quelques semaines après avoir réglé les étalonnages des couleurs historiques<br>Google to bring Gemini model back online in a few weeks after adjusting historical color calibrations While you wait, Android devices will start to use gen AI to do stuff like summarize group chats Google hopes to reinstate Gemini\'s AI image-generating abilities in the next couple of weeks as it races to fix an issue that prevented the model\'s text-to-image service from depicting White people.…]]> 2024-02-27T01:54:13+00:00 https://go.theregister.com/feed/www.theregister.com/2024/02/27/google_gemini_return/ www.secnews.physaphae.fr/article.php?IdArticle=8455652 False Mobile None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Expert avertit une activité de logiciels malveillants en pleine croissance<br>Expert Warns of Growing Android Malware Activity Kaspersky said that in 2023, the number of mobile attacks soared to nearly 33.8 million]]> 2024-02-26T16:30:00+00:00 https://www.infosecurity-magazine.com/news/expert-warns-growing-android/ www.secnews.physaphae.fr/article.php?IdArticle=8455469 False Malware,Mobile None 2.0000000000000000 The Register - Site journalistique Anglais Qualcomm inserte Genai dans les smartphones de la méga-salon de l'industrie \\<br>Qualcomm inserts GenAI into smartphones at industry\\'s mega tradeshow Just what Android fans were missing, amirite? A 7 billion parameter LLM that accepts image and voice prompts? MWC  Qualcomm is going big on AI at MWC, where it\'s showing off a 7 billion parameter large language model running on an Android phone, along with an online hub to help mobile devs blend models into their apps, and AI infused into its latest 5G modem and Wi-Fi 7 silicon.…]]> 2024-02-26T14:10:38+00:00 https://go.theregister.com/feed/www.theregister.com/2024/02/26/qualcomm_puts_genai_into_smartphones/ www.secnews.physaphae.fr/article.php?IdArticle=8455423 False Mobile None 2.0000000000000000 Wired Threat Level - Security News L'ID polaire est le rival de l'identification du visage pour les téléphones Android, et pourrait même battre Apple<br>Polar ID Is the Face ID Rival for Android Phones, and Could Even Beat Apple Metalenz\'s biometric tech is poised to finally give Android owners a more secure form of facial recognition-and in time could even check skin for cancerous growths or measure air quality.]]> 2024-02-26T13:27:39+00:00 https://www.wired.com/story/metalenz-polar-id-first-look/ www.secnews.physaphae.fr/article.php?IdArticle=8455399 False Mobile None 2.0000000000000000 Global Security Mag - Site de news francais Thales et Google Scale ESIM à travers l'écosystème Android<br>Thales and Google scale eSIM across Android Ecosystem revues de produits
Thales and Google scale eSIM across Android Ecosystem Thales eSIM Discovery solution will run Google Discovery Service for seamless activation of Android devices. With 300+ eSIM platforms deployed worldwide, Thales actively contributes to making the world not just more connected, but also cyber-secured from the edge to the core. ​ ​ ​ ​ ​ The collaboration takes user convenience to the next level, as it simplifies and speeds up devices activation and users\' profile provisioning. - Product Reviews]]>
2024-02-26T08:55:56+00:00 https://www.globalsecuritymag.fr/thales-and-google-scale-esim-across-android-ecosystem.html www.secnews.physaphae.fr/article.php?IdArticle=8455290 False Mobile None 2.0000000000000000
Global Security Mag - Site de news francais Thales et Google valorisent l\'eSIM pour l\'ensemble de l\'écosystème Android Produits]]> 2024-02-26T08:54:43+00:00 https://www.globalsecuritymag.fr/thales-et-google-valorisent-l-esim-pour-l-ensemble-de-l-ecosysteme-android.html www.secnews.physaphae.fr/article.php?IdArticle=8455291 False Mobile None 3.0000000000000000 Kaspersky - Kaspersky Research blog Le paysage des menaces de logiciels malveillants mobiles en 2023<br>The mobile malware threat landscape in 2023 This report details statistics and key trends associated with mobile malware: Google Play Trojans, malicious messaging app mods, and others.]]> 2024-02-26T08:00:20+00:00 https://securelist.com/mobile-malware-report-2023/111964/ www.secnews.physaphae.fr/article.php?IdArticle=8455272 False Malware,Threat,Studies,Mobile None 4.0000000000000000 Wired Threat Level - Security News Xiaomi 14 Revue: solide mais sans intérêt<br>Xiaomi 14 Review: Solid but Uninspiring The compact and refined Xiaomi 14 is a very good Android phone, but it fails to stand out among other similarly priced handsets.]]> 2024-02-25T15:00:00+00:00 https://www.wired.com/review/xiaomi-14/ www.secnews.physaphae.fr/article.php?IdArticle=8454997 False Mobile None 2.0000000000000000 AlienVault Lab Blog - AlienVault est un acteur de defense majeur dans les IOC Détection des connexions anormales O365 et des techniques d'évasion<br>Detecting anomalous O365 logins and evasion techniques 2024-02-23T11:00:00+00:00 https://cybersecurity.att.com/blogs/security-essentials/detecting-anomalous-o365-logins-and-evasion-techniques www.secnews.physaphae.fr/article.php?IdArticle=8454066 False Tool,Threat,Mobile,Cloud None 3.0000000000000000 Recorded Future - FLux Recorded Future La Russie arrête trois membres présumés de ransomwares de blocs de suceur<br>Russia arrests three alleged SugarLocker ransomware members Les autorités russes ont identifié et arrêté trois membres présumés d'un gang de ransomware local appelé Sugarlocker.Le groupe opère sous le couvert d'une entreprise technologique légitime appelée Shtazi-it, offrant des services pour le développement de pages de destination, d'applications mobiles et de magasins en ligne, selon a report by F.A.C.C.T., a Russia-based company that was involved in
Russian authorities have identified and arrested three alleged members of a local ransomware gang called SugarLocker. The group operates under the guise of a legitimate tech company called Shtazi-IT, offering services for the development of landing pages, mobile apps, and online stores, according to a report by F.A.C.C.T., a Russia-based company that was involved in]]>
2024-02-22T16:20:43+00:00 https://therecord.media/russia-arrests-sugarlocker-ransomware-members www.secnews.physaphae.fr/article.php?IdArticle=8453756 False Ransomware,Mobile None 3.0000000000000000
The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les nouvelles vulnérabilités Wi-Fi exposent les appareils Android et Linux aux pirates<br>New Wi-Fi Vulnerabilities Expose Android and Linux Devices to Hackers Cybersecurity researchers have identified two authentication bypass flaws in open-source Wi-Fi software found in Android, Linux, and ChromeOS devices that could trick users into joining a malicious clone of a legitimate network or allow an attacker to join a trusted network without a password. The vulnerabilities, tracked as CVE-2023-52160 and CVE-2023-52161, have been discovered following a]]> 2024-02-21T21:46:00+00:00 https://thehackernews.com/2024/02/new-wi-fi-vulnerabilities-expose.html www.secnews.physaphae.fr/article.php?IdArticle=8453299 False Vulnerability,Mobile None 2.0000000000000000 SecurityWeek - Security News Diversifier les défenses: Fjordphantom Malware montre l'importance d'une approche à plusieurs volets<br>Diversifying Defenses: FjordPhantom Malware Shows Importance of a Multi-Pronged Approach Les équipes de sécurité doivent combiner les angles de détection côté client et côté serveur afin d'avoir les meilleures chances d'atténuer le risque de malware mobile avancé.
>Security teams need to combine the angles of client-side and server-side detection in order to have the best chance of mitigating the risk of advanced mobile malware. ]]>
2024-02-21T12:44:40+00:00 https://www.securityweek.com/diversifying-defenses-fjordphantom-malware-shows-importance-of-a-multi-pronged-approach/ www.secnews.physaphae.fr/article.php?IdArticle=8453231 False Malware,Mobile None 2.0000000000000000
Dark Reading - Informationweek Branch New Wave of \\ 'anatsa \\' Banking Trojans cible les utilisateurs d'Android en Europe<br>New Wave of \\'Anatsa\\' Banking Trojans Targets Android Users in Europe Users have already downloaded droppers for the malware from Google\'s official Play store more than 100,000 times since last November.]]> 2024-02-20T22:48:25+00:00 https://www.darkreading.com/mobile-security/new-wave-of-anatsa-banking-trojan-attacks-targets-android-users-in-europe www.secnews.physaphae.fr/article.php?IdArticle=8452912 False Malware,Mobile None 2.0000000000000000 UnderNews - Site de news "pirate" francais Sécuriser le monde numérique d\'aujourd\'hui et demain : Kaspersky présente son écosystème cyber étendu au MWC 2024 Kaspersky annonce sa participation au Mobile World Congress (MWC) de Barcelone, en Espagne, qui se tiendra du 26 au 29 février 2024. A cette occasion, la société présentera un écosystème avancé et évolutif des produits de cybersécurité les plus éprouvés pour les entreprises, y compris certains n'ayant jamais été exposés au MWC, ainsi que des […] The post Sécuriser le monde numérique d'aujourd'hui et demain : Kaspersky présente son écosystème cyber étendu au MWC 2024 first appeared on UnderNews.]]> 2024-02-20T16:37:07+00:00 https://www.undernews.fr/reseau-securite/securiser-le-monde-numerique-daujourdhui-et-demain-kaspersky-presente-son-ecosysteme-cyber-etendu-au-mwc-2024.html www.secnews.physaphae.fr/article.php?IdArticle=8452793 False Mobile None 3.0000000000000000 SecurityWeek - Security News Anatsa Android Banking Trojan continue de se propager via Google Play<br>Anatsa Android Banking Trojan Continues to Spread via Google Play Les récentes attaques de chevaux de Troie d'Android Anatsa sont devenues plus ciblées, montrant une évolution des tactiques.
>Recent Anatsa Android banking trojan attacks have become more targeted, showing an evolution in tactics. ]]>
2024-02-20T11:34:54+00:00 https://www.securityweek.com/anatsa-android-banking-trojan-continues-to-spread-via-google-play/ www.secnews.physaphae.fr/article.php?IdArticle=8452698 False Mobile None 2.0000000000000000