www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-04-26T13:42:03+00:00 www.secnews.physaphae.fr InfoSecurity Mag - InfoSecurity Magazine Leicester Council confirme les documents confidentiels divulgués dans l'attaque des ransomwares<br>Leicester Council Confirms Confidential Documents Leaked in Ransomware Attack Leicester City Council confirmed around 25 sensitive documents have been leaked online, including personal ID information, following claims by the Inc Ransom gang]]> 2024-04-04T12:00:00+00:00 https://www.infosecurity-magazine.com/news/leicester-council-documents-leaked/ www.secnews.physaphae.fr/article.php?IdArticle=8475841 False Ransomware None 2.0000000000000000 Recorded Future - FLux Recorded Future Le conseil municipal de Leicester confirme l'attaque des ransomwares après la fuite de documents confidentiels<br>Leicester City Council confirms ransomware attack after confidential documents leaked Le conseil municipal de Leicester en Angleterre a confirmé que le cyber-incident du mois dernier était une attaque de ransomware après avoir été informé que les criminels derrière l'incident avaient téléchargé des documents volés sur leur site d'extorsion Web sombre.Inc Ransom avait affirmé être à l'origine de l'attaque plus tôt cette semaine, ce qui a incité le directeur stratégique de Leicester \\, Richard Sword,
Leicester City Council in England has confirmed that last month\'s cyber incident was a ransomware attack after being made aware that the criminals behind the incident had uploaded stolen documents to their dark web extortion site. INC Ransom had claimed to be behind the attack earlier this week, prompting Leicester\'s strategic director, Richard Sword,]]>
2024-04-04T11:56:12+00:00 https://therecord.media/leicester-city-council-ransomware-data-breach www.secnews.physaphae.fr/article.php?IdArticle=8475838 False Ransomware None 2.0000000000000000
Team Cymru - Equipe de Threat Intelligence Latrodectus: This Spider Bytes Like Ice For this research, we partnered with Proofpoint\'s Threat Research team in a collaborative effort to provide a comprehensive overview of...]]> 2024-04-04T11:56:00+00:00 https://www.team-cymru.com/post/latrodectus-this-spider-bytes-like-ice www.secnews.physaphae.fr/article.php?IdArticle=8475832 False Threat None 4.0000000000000000 ProofPoint - Cyber Firms Latrodectus: ces octets d'araignée comme la glace<br>Latrodectus: This Spider Bytes Like Ice 2024-04-04T11:47:34+00:00 https://www.proofpoint.com/us/blog/threat-insight/latrodectus-spider-bytes-ice www.secnews.physaphae.fr/article.php?IdArticle=8475749 False Ransomware,Malware,Tool,Threat,Prediction None 3.0000000000000000 Bleeping Computer - Magazine Américain La nouvelle attaque DOS HTTP / 2 peut écraser les serveurs Web avec une seule connexion<br>New HTTP/2 DoS attack can crash web servers with a single connection Newly discovered HTTP/2 protocol vulnerabilities called "CONTINUATION Flood" can lead to denial of service (DoS) attacks, crashing web servers with a single TCP connection in some implementations. [...]]]> 2024-04-04T11:28:55+00:00 https://www.bleepingcomputer.com/news/security/new-http-2-dos-attack-can-crash-web-servers-with-a-single-connection/ www.secnews.physaphae.fr/article.php?IdArticle=8475966 False Vulnerability None 3.0000000000000000 TechRepublic - Security News US 5 meilleurs gestionnaires de mot de passe pour Android en 2024<br>5 Best Password Managers for Android in 2024 Explore the best password managers for Android devices that offer secure storage and easy access to your passwords. Find out which one suits your needs best.]]> 2024-04-04T11:28:13+00:00 https://www.techrepublic.com/article/best-android-password-manager/ www.secnews.physaphae.fr/article.php?IdArticle=8475834 False Mobile None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Henry Ajder de Deepfake à Keynote InfoSecurity Europe 2024 sur les défis de l'IA<br>Deepfake Expert Henry Ajder to Keynote Infosecurity Europe 2024 on AI Challenges Infosecurity Europe 2024 will feature a keynote presentation by deepfake expert Henry Ajder, exploring the implications of generative AI on cybersecurity]]> 2024-04-04T11:15:00+00:00 https://www.infosecurity-magazine.com/news/henry-ajder-keynote-infosecurity/ www.secnews.physaphae.fr/article.php?IdArticle=8475842 False None None 2.0000000000000000 Schneier on Security - Chercheur Cryptologue Américain Surveillance par la nouvelle application Microsoft Outlook<br>Surveillance by the New Microsoft Outlook App conduiteSurveillance étendue sur ses utilisateurs.Il partage des données avec les annonceurs, beaucoup de données: La fenêtre informe les utilisateurs que Microsoft et ces 801 tiers utilisent leurs données à plusieurs fins, y compris pour: Store et / ou accéder aux informations sur l'appareil de l'utilisateur Développer et améliorer les produits Personnaliser les annonces et le contenu Mesurer les annonces et le contenu dériver les idées du public Obtenir des données de géolocalisation précises Identifier les utilisateurs via la numérisation des périphériques Commentaire . ...
The ProtonMail people are accusing Microsoft’s new Outlook for Windows app of conducting extensive surveillance on its users. It shares data with advertisers, a lot of data: The window informs users that Microsoft and those 801 third parties use their data for a number of purposes, including to: Store and/or access information on the user’s device Develop and improve products Personalize ads and content Measure ads and content Derive audience insights Obtain precise geolocation data Identify users through device scanning Commentary. ...]]>
2024-04-04T11:07:39+00:00 https://www.schneier.com/blog/archives/2024/04/surveillance-by-the-new-microsoft-outlook-app.html www.secnews.physaphae.fr/article.php?IdArticle=8475835 False None None 3.0000000000000000
SecurityWeek - Security News Nouvelle attaque HTTP / 2 DOS potentiellement plus grave que la réinitialisation rapide record<br>New HTTP/2 DoS Attack Potentially More Severe Than Record-Breaking Rapid Reset La nouvelle méthode DOS HTTP / 2 nommée inondation de continuation peut présenter un risque plus élevé que la réinitialisation rapide, qui a été utilisée pour les attaques records.
>New HTTP/2 DoS method named Continuation Flood can pose a greater risk than Rapid Reset, which has been used for record-breaking attacks. ]]>
2024-04-04T10:50:58+00:00 https://www.securityweek.com/new-http-2-dos-attack-potentially-more-severe-than-record-breaking-rapid-reset/ www.secnews.physaphae.fr/article.php?IdArticle=8475843 False None None 3.0000000000000000
The Register - Site journalistique Anglais Ransomware Gang <em> a fait </em> voler les résidents \\ 'Données confidentielles, le conseil municipal britannique admet<br>Ransomware gang <em>did</em> steal residents\\' confidential data, UK city council admits INC Ransom emerges as a growing threat as some ex-LockBit/ALPHV affiliates get new gigs Leicester City Council is finally admitting its "cyber incident" was carried out by a ransomware gang and that data was stolen, hours after the criminals forced its hand.…]]> 2024-04-04T10:49:40+00:00 https://go.theregister.com/feed/www.theregister.com/2024/04/04/ransomware_gang_did_in_fact/ www.secnews.physaphae.fr/article.php?IdArticle=8475808 False Ransomware,Threat None 2.0000000000000000 Silicon - Site de News Francais Le Congrès américain s\'interdit d\'utiliser Microsoft AI Copilot 2024-04-04T10:38:22+00:00 https://www.silicon.fr/le-congres-americain-sinterdit-dutiliser-microsoft-ai-copilot-477445.html www.secnews.physaphae.fr/article.php?IdArticle=8475809 False None None 5.0000000000000000 Korben - Bloger francais FFmpeg vs Microsoft – Le choc 2024-04-04T10:22:44+00:00 https://korben.info/ffmpeg-microsoft-choc-titans-multimedia-open-source.html www.secnews.physaphae.fr/article.php?IdArticle=8475810 False None None 4.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Ivanti se précipite des correctifs pour 4 nouveaux défauts dans Connect Secure and Policy Secure<br>Ivanti Rushes Patches for 4 New Flaw in Connect Secure and Policy Secure Ivanti has released security updates to address four security flaws impacting Connect Secure and Policy Secure Gateways that could result in code execution and denial-of-service (DoS). The list of flaws is as follows - CVE-2024-21894 (CVSS score: 8.2) - A heap overflow vulnerability in the IPSec component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure allows an]]> 2024-04-04T10:15:00+00:00 https://thehackernews.com/2024/04/ivanti-rushes-patches-for-4-new-flaw-in.html www.secnews.physaphae.fr/article.php?IdArticle=8475654 False Vulnerability None 3.0000000000000000 Bleeping Computer - Magazine Américain Les plus gros plats à emporter des attaques de logiciels malveillants récentes<br>The Biggest Takeaways from Recent Malware Attacks Recent high-profile malware attacks teach us lessons on limiting malware risks at organizations. Learn more from Blink Ops about what these attacks taught us. [...]]]> 2024-04-04T10:01:02+00:00 https://www.bleepingcomputer.com/news/security/the-biggest-takeaways-from-recent-malware-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8475967 False Malware None 3.0000000000000000 SecurityWeek - Security News Zoom a payé 10 millions de dollars via Bug Bounty Program depuis 2019<br>Zoom Paid Out $10 Million via Bug Bounty Program Since 2019 Le géant de vidéoconférence Zoom a versé 10 millions de dollars grâce à son programme de primes de bug depuis son lancement en 2019.
>Video conferencing giant Zoom has paid out $10 million through its bug bounty program since it was launched in 2019. ]]>
2024-04-04T10:00:00+00:00 https://www.securityweek.com/zoom-paid-out-10-million-via-bug-bounty-program-since-2019/ www.secnews.physaphae.fr/article.php?IdArticle=8475807 False None None 3.0000000000000000
SecurityWeek - Security News Les poulets de sécurité de Microsoft \\ sont rentrés à la maison pour percher<br>Microsoft\\'s Security Chickens Have Come Home to Roost News analysis:  SecurityWeek editor-at-large Ryan Naraine reads the CSRB report on China\'s audacious Microsoft\'s Exchange Online hack and isn\'t at all surprised by the findings. ]]> 2024-04-04T10:00:00+00:00 https://www.securityweek.com/microsofts-security-chickens-have-come-home-to-roost/ www.secnews.physaphae.fr/article.php?IdArticle=8475806 False Hack None 3.0000000000000000 The State of Security - Magazine Américain Google patchs Pixel Téléphone zéro-jours après l'exploitation par "les sociétés médico-légales"<br>Google Patches Pixel Phone Zero-days After Exploitation by "Forensic Companies" Google has issued a security advisory to owners of its Android Pixel smartphones, warning that it has discovered someone has been targeting some devices to bypass their built-in security . What makes the reported attacks particularly interesting is that traditional cybercriminals may not be behind them, but rather "forensic companies" exploiting two vulnerabilities to extract information and prevent remote wiping. That\'s the opinion of researchers at GrapheneOS, who tweeted a thread about their findings on the vulnerabilities known as CVE-2024-29745 and CVE-2024-29748. The team at GrapheneOS...]]> 2024-04-04T09:49:51+00:00 https://www.tripwire.com/state-of-security/google-patches-pixel-phone-zero-days-after-exploitation-forensic-companies www.secnews.physaphae.fr/article.php?IdArticle=8475934 False Vulnerability,Mobile None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les affirmations de l'acteur de menace ont classé cinq yeux Vol de données<br>Threat Actor Claims Classified Five Eyes Data Theft Threat actor IntelBroker claims to have classified intelligence stolen from US government tech supplier Acuity]]> 2024-04-04T09:30:00+00:00 https://www.infosecurity-magazine.com/news/threat-actor-classified-five-eyes/ www.secnews.physaphae.fr/article.php?IdArticle=8475782 False Threat None 4.0000000000000000 IT Security Guru - Blog Sécurité # MIWIC2024: Stephanie Luangraj, PDG et fondatrice de Women Whosecure<br>#MIWIC2024: Stephanie Luangraj, CEO and Founder of WomenWhoSecure # miwic2024: Stephanie Luangraj,Le PDG et fondateur de WomenWhosecure est apparu pour la première fois sur gourou de la sécurité informatique .
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024\'s Top 20 women selected by an esteemed panel of judges. Presented in a Q&A format, the nominee\'s answers are […] The post #MIWIC2024: Stephanie Luangraj, CEO and Founder of WomenWhoSecure first appeared on IT Security Guru. ]]>
2024-04-04T09:15:17+00:00 https://www.itsecurityguru.org/2024/04/04/miwic2024-stephanie-luangraj-ceo-and-founder-of-womenwhosecure/?utm_source=rss&utm_medium=rss&utm_campaign=miwic2024-stephanie-luangraj-ceo-and-founder-of-womenwhosecure www.secnews.physaphae.fr/article.php?IdArticle=8476695 False None None 2.0000000000000000
Global Security Mag - Site de news francais Les empreintes digitales tapent Freevolt S-Key pour renforcer la sécurité de son siège de Gothenburg<br>Fingerprints taps Freevolt S-Key to bolster the security of its Gothenburg HQ actualités du marché
Fingerprints taps Freevolt S-Key to bolster the security of its Gothenburg HQ - Market News]]>
2024-04-04T08:51:15+00:00 https://www.globalsecuritymag.fr/fingerprints-taps-freevolt-s-key-to-bolster-the-security-of-its-gothenburg-hq.html www.secnews.physaphae.fr/article.php?IdArticle=8475754 False None None 2.0000000000000000
InfoSecurity Mag - InfoSecurity Magazine Les entreprises doivent travailler plus dur pour protéger la vie privée des enfants, explique le Royaume-Uni ICO<br>Firms Must Work Harder to Guard Children\\'s Privacy, Says UK ICO UK privacy regulator, the ICO, urges social media and video sharing firms to do more to protect children\'s data]]> 2024-04-04T08:50:00+00:00 https://www.infosecurity-magazine.com/news/ico-singles-out-social-media-video/ www.secnews.physaphae.fr/article.php?IdArticle=8475752 False None None 3.0000000000000000 Global Security Mag - Site de news francais Plus de la moitié des utilisateurs de smartphones britanniques sont devenus vulnérables aux cyberattaques<br>Over Half of UK Smartphone Users Left Vulnerable to Cyber Attacks rapports spéciaux / /
Over Half of UK Smartphone Users Left Vulnerable to Cyber Attacks by Bitdefende has uncovered a stark reality: more than half of smartphone users are gambling with their digital safety. - Special Reports / ]]>
2024-04-04T08:46:30+00:00 https://www.globalsecuritymag.fr/over-half-of-uk-smartphone-users-left-vulnerable-to-cyber-attacks.html www.secnews.physaphae.fr/article.php?IdArticle=8475755 False Studies None 3.0000000000000000
Global Security Mag - Site de news francais Ransomwares : se préparer à surmonter l\'inévitable Points de Vue]]> 2024-04-04T08:28:14+00:00 https://www.globalsecuritymag.fr/ransomwares-se-preparer-a-surmonter-l-inevitable.html www.secnews.physaphae.fr/article.php?IdArticle=8475756 False None None 2.0000000000000000 Global Security Mag - Site de news francais Sophos s'associe à Tenable pour lancer de nouveaux services de risque gérés Sophos<br>Sophos Partners with Tenable to Launch New Sophos Managed Risk Service revues de produits
Sophos Partners with Tenable to Launch New Sophos Managed Risk Service New Fully Managed Solution Provides Visibility, Risk Monitoring, Prioritization, Investigation, and Proactive Notification to Prevent Cyberattacks - Product Reviews]]>
2024-04-04T08:25:05+00:00 https://www.globalsecuritymag.fr/sophos-partners-with-tenable-to-launch-new-sophos-managed-risk-service.html www.secnews.physaphae.fr/article.php?IdArticle=8475757 True None None 2.0000000000000000
IndustrialCyber - cyber risk firms for industrial E-ISAC publie un rapport sur l'exercice GRIDEX VII, mettant en évidence les recommandations pour la sécurité et la résilience du réseau<br>E-ISAC releases report on GridEx VII exercise, highlighting recommendations for grid security and resilience Le Centre de partage et d'analyse des informations électriques (E-ISAC), une division de la North American Electric Reliability Corporation (NERC), ...
>The Electricity Information Sharing and Analysis Center (E-ISAC), a division of the North American Electric Reliability Corporation (NERC),... ]]>
2024-04-04T07:40:43+00:00 https://industrialcyber.co/reports/e-isac-releases-report-on-gridex-vii-exercise-highlighting-recommendations-for-grid-security-and-resilience/ www.secnews.physaphae.fr/article.php?IdArticle=8475724 False None None 4.0000000000000000
Silicon - Site de News Francais Navigateurs : les LLM locaux expérimentés sur Opera One 2024-04-04T07:19:44+00:00 https://www.silicon.fr/opera-one-llm-locaux-477435.html www.secnews.physaphae.fr/article.php?IdArticle=8475725 False None None 2.0000000000000000 Korben - Bloger francais Embrouillez les sites qui vous trackent avec l\'extension User-Agent Switcher 2024-04-04T07:00:00+00:00 https://korben.info/user-agent-switcher-extension-firefox-proteger-vie-privee-bloquer-tracking.html www.secnews.physaphae.fr/article.php?IdArticle=8475753 False None None 3.0000000000000000 The State of Security - Magazine Américain Sécurité vs conformité: quelle est la différence?<br>Security vs. Compliance: What\\'s the Difference? Security and compliance – a phrase often uttered in the same breath as if they are two sides of the same coin, two members of the same team, or two great tastes that go great together. As much as I would like to see auditors, developers, and security analysts living in harmony like a delicious Reese\'s cup, a recent gap analysis that I was part of reminded me that too often, the peanut butter and chocolate sit alone on their own separate shelves. We reviewed a SaaS service with an eye toward compliance. The developers operate according to DevOps principles, which often bump into some of the...]]> 2024-04-04T03:28:53+00:00 https://www.tripwire.com/state-of-security/security-compliance-difference www.secnews.physaphae.fr/article.php?IdArticle=8475748 False Cloud None 2.0000000000000000 AhnLab - Korean Security Firm Rhadamanthys Malware déguisé en programme d'installation de groupware (détecté par MDS)<br>Rhadamanthys Malware Disguised as Groupware Installer (Detected by MDS) Récemment, Ahnlab Security Intelligence Center (ASEC) a découvert la distribution de Rhadamanthygroupware.L'acteur de menace a créé un faux site Web pour ressembler au site Web d'origine et exposé le site aux utilisateurs en utilisant la fonctionnalité publicitaire dans les moteurs de recherche.Le blog ASEC a précédemment couvert les logiciels malveillants distribués via ces fonctionnalités publicitaires des moteurs de recherche dans l'article intitulé & # 8220; Hé, ce n'est pas le bon site! & # 8221;Distribution des logiciels malveillants exploitant Google ADS Suivi [1].Le malware dans ...
Recently, AhnLab SEcurity intelligence Center (ASEC) discovered the distribution of Rhadamanthys under the guise of an installer for groupware. The threat actor created a fake website to resemble the original website and exposed the site to the users using the ad feature in search engines. ASEC Blog has previously covered malware distributed through such ad features of search engines in the article titled “Hey, This Isn’t the Right Site!” Distribution of Malware Exploiting Google Ads Tracking [1]. The malware in... ]]>
2024-04-04T01:13:01+00:00 https://asec.ahnlab.com/en/63864/ www.secnews.physaphae.fr/article.php?IdArticle=8475597 False Malware,Threat None 2.0000000000000000
Dark Reading - Informationweek Branch Singapour établit une barre haute dans la préparation à la cybersécurité<br>Singapore Sets High Bar in Cybersecurity Preparedness While Singaporean organizations have adopted the majority of their government\'s cybersecurity recommendations, they aren\'t immune: More than eight in 10 experienced a cybersecurity incident over the course of the year.]]> 2024-04-04T01:00:00+00:00 https://www.darkreading.com/cybersecurity-analytics/singapore-sets-high-bar-in-cybersecurity-preparedness www.secnews.physaphae.fr/article.php?IdArticle=8475560 False None None 3.0000000000000000 The Intercept - Site journalistique Anglais Les autres joueurs qui ont aidé (presque) à faire le plus grand piratage de la porte dérobée du monde \\<br>The Other Players Who Helped (Almost) Make the World\\'s Biggest Backdoor Hack Un chiffre ténébreux a passé des années à se confier à un développeur, puis a injecté une porte dérobée qui aurait pu reprendre des millions d'ordinateurs.
>A shadowy figure spent years ingratiating themself to a developer, then injected a backdoor that could have taken over millions of computers. ]]>
2024-04-03T23:05:38+00:00 https://theintercept.com/2024/04/03/linux-hack-xz-utils-backdoor/ www.secnews.physaphae.fr/article.php?IdArticle=8475509 False Hack None 3.0000000000000000
Global Security Mag - Site de news francais Guillaume Alliel, Phinasoft : La gouvernance est la clé de voute de toutes les activités de cybersécurité Interviews / , ]]> 2024-04-03T23:00:00+00:00 https://www.globalsecuritymag.fr/guillaume-alliel-phinasoft-la-gouvernance-est-la-cle-de-voute-de-toutes-les.html www.secnews.physaphae.fr/article.php?IdArticle=8475075 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Lockbit Ransomware Takedown frappe profondément dans la viabilité de la marque \\<br>LockBit Ransomware Takedown Strikes Deep Into Brand\\'s Viability Nearly three months after Operation Cronos, it\'s clear the gang is not bouncing back from the innovative law-enforcement action. RaaS operators are on notice, and businesses should pay attention.]]> 2024-04-03T22:11:10+00:00 https://www.darkreading.com/threat-intelligence/lockbit-ransomware-takedown-strikes-brand-viability www.secnews.physaphae.fr/article.php?IdArticle=8475513 False Ransomware None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Google Warns: Android Zero-Day Flaws in Pixel Phones exploité par des sociétés médico-légales<br>Google Warns: Android Zero-Day Flaws in Pixel Phones Exploited by Forensic Companies Google has disclosed that two Android security flaws impacting its Pixel smartphones have been exploited in the wild by forensic companies. The high-severity zero-day vulnerabilities are as follows - CVE-2024-29745 - An information disclosure flaw in the bootloader component CVE-2024-29748 - A privilege escalation flaw in the firmware component "There are indications that the []]> 2024-04-03T21:40:00+00:00 https://thehackernews.com/2024/04/google-warns-android-zero-day-flaws-in.html www.secnews.physaphae.fr/article.php?IdArticle=8475338 False Vulnerability,Threat,Mobile None 3.0000000000000000 Vuln GCP - FLux Vuln GoogleCloudPlatform GCP-2024-022 Bulletin de sécurité gke GKE sur le bulletin de sécurité VMware gke sur le bulletin de sécurité AWS gke sur le bulletin de sécurité azur GKE sur le bulletin de sécurité Bare Metal High CVE-2023-45288
Published: 2024-04-03Description Description Severity Notes A Denial-of-Service (DoS) vulnerability (CVE-2023-45288) was recently discovered in multiple implementations of the HTTP/2 protocol, including the golang HTTP server used by Kubernetes. The vulnerability could lead to a DoS of the Google Kubernetes Engine (GKE) control plane. For instructions and more details, see the following bulletins: GKE security bulletin GKE on VMware security bulletin GKE on AWS security bulletin GKE on Azure security bulletin GKE on Bare Metal security bulletin High CVE-2023-45288 ]]>
2024-04-03T21:22:02+00:00 https://cloud.google.com/support/bulletins/index#gcp-2024-022 www.secnews.physaphae.fr/article.php?IdArticle=8475489 False Vulnerability,Cloud None None
Dark Reading - Informationweek Branch Plus de la moitié des organisations prévoient d'adopter des solutions d'IA au cours de l'année à venir, rapporte Cloud Security Alliance et Google Cloud<br>More Than Half of Organizations Plan to Adopt AI Solutions in Coming Year, Reports Cloud Security Alliance and Google Cloud 2024-04-03T21:21:03+00:00 https://www.darkreading.com/cloud-security/more-than-half-of-organizations-plan-to-adopt-ai-solutions-in-coming-year-according-to-cloud-security-alliance-and-google-cloud-report www.secnews.physaphae.fr/article.php?IdArticle=8475484 False Cloud None 2.0000000000000000 Dark Reading - Informationweek Branch Cyberratings.org annonce les résultats des tests pour le pare-feu du réseau cloud<br>CyberRatings.org Announces Test Results for Cloud Network Firewall 2024-04-03T21:16:19+00:00 https://www.darkreading.com/cloud-security/cyberratings-org-announces-test-results-for-cloud-network-firewall www.secnews.physaphae.fr/article.php?IdArticle=8475485 False Cloud None 2.0000000000000000 Dark Reading - Informationweek Branch Le rapport de balise révèle que la sauvegarde des points de terminaison est essentielle pour améliorer la résilience des données<br>TAG Report Reveals Endpoint Backup Is Essential to Improving Data Resiliency 2024-04-03T21:06:43+00:00 https://www.darkreading.com/endpoint-security/tag-report-reveals-endpoint-backup-is-essential-to-improving-data-resiliency www.secnews.physaphae.fr/article.php?IdArticle=8475486 False None None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Le conseil d'administration des cyber-sécuritéurs américains claque Microsoft sur les violations par des pirates basées en Chine<br>U.S. Cyber Safety Board Slams Microsoft Over Breach by China-Based Hackers The U.S. Cyber Safety Review Board (CSRB) has criticized Microsoft for a series of security lapses that led to the breach of nearly two dozen companies across Europe and the U.S. by a China-based nation-state group called Storm-0558 last year. The findings, released by the Department of Homeland Security (DHS) on Tuesday, found that the intrusion was preventable, and that it became successful]]> 2024-04-03T21:02:00+00:00 https://thehackernews.com/2024/04/us-cyber-safety-board-slams-microsoft.html www.secnews.physaphae.fr/article.php?IdArticle=8475304 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Trucentive améliore la vie privée avec la dés-identification des informations personnelles conformes à la HIPAA<br>TruCentive Enhances Privacy With HIPAA Compliant Personal Information De-identification 2024-04-03T20:53:31+00:00 https://www.darkreading.com/cyber-risk/trucentive-enhances-privacy-with-hipaa-compliant-personal-information-de-identification www.secnews.physaphae.fr/article.php?IdArticle=8475452 False None None 2.0000000000000000 RiskIQ - cyber risk firms (now microsoft) Earth Freybug Uses UNAPIMON for Unhooking Critical APIs #### Description Trend Micro analyzed a cyberespionage attack the company has attributed to Earth Freybug, a subset of APT41 (tracked by Microsoft as [Brass Typhoon](https://sip.security.microsoft.com/intel-profiles/f0aaa62bfbaf3739bb92106688e6a00fc05eafc0d4158b0e389b4078112d37c6?)). According to Trend Micro, Earth Freybug has been active since at least 2012 and the Chinese-linked group has been active in espionage and financially motivated attacks. Earth Freybug employs diverse tools like LOLBins and custom malware, targeting organizations globally. The attack used techniques like dynamic link library (DLL) hijacking and API unhooking to avoid monitoring for a new malware called UNAPIMON. UNAPIMON evades detection by preventing child processes from being monitored. The attack flow involved creating remote scheduled tasks and executing reconnaissance commands to gather system information. Subsequently, a backdoor was launched using DLL side-loading via a service called SessionEnv, which loads a malicious DLL. UNAPIMON, the injected DLL, uses API hooking to evade monitoring and execute malicious commands undetected, showcasing the attackers\' sophistication. [Check out Microsoft\'s write-up on dynamic-link library (DLL) hijacking here.](https://sip.security.microsoft.com/intel-explorer/articles/91be20e8?) #### Reference URL(s) 1. https://www.trendmicro.com/en_us/research/24/d/earth-freybug.html #### Publication Date April 2, 2024 #### Author(s) Christopher So]]> 2024-04-03T20:46:53+00:00 https://community.riskiq.com/article/327771c8 www.secnews.physaphae.fr/article.php?IdArticle=8475473 False Malware,Tool,Prediction APT 41 2.0000000000000000 Korben - Bloger francais Jpegli – La lib JPEG nouvelle génération de Google 2024-04-03T20:44:20+00:00 https://korben.info/jpegli-bibliotheque-codage-jpeg-nouvelle-generation-google.html www.secnews.physaphae.fr/article.php?IdArticle=8475483 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Comment la Coupe du monde du football en 2022 au Qatar a été presque piratée<br>How Soccer\\'s 2022 World Cup in Qatar Was Nearly Hacked A China-linked threat actor had access to a router configuration database that could have completely disrupted coverage, a security vendor says.]]> 2024-04-03T20:40:20+00:00 https://www.darkreading.com/cyber-risk/how-the-2022-qatar-world-cup-soccer-was-nearly-hacked www.secnews.physaphae.fr/article.php?IdArticle=8475453 False Threat None 4.0000000000000000 Ars Technica - Risk Assessment Security Hacktivism Comment pirater les Jaguars de Jacksonville \\ 'Jumbotron (et se retrouver en prison pendant 220 ans)<br>How to hack the Jacksonville Jaguars\\' jumbotron (and end up in jail for 220 years) The story that just keeps getting worse.]]> 2024-04-03T20:26:58+00:00 https://arstechnica.com/?p=2014671 www.secnews.physaphae.fr/article.php?IdArticle=8475448 False Hack None 3.0000000000000000 Bleeping Computer - Magazine Américain Microsoft ne sait toujours pas comment les pirates ont volé la clé MSA en 2023 Attaque d'échange<br>Microsoft still unsure how hackers stole MSA key in 2023 Exchange attack The U.S. Department of Homeland Security\'s Cyber Safety Review Board (CSRB) has released a scathing report on how Microsoft handled its 2023 Exchange Online attack, warning that the company needs to do better at securing data and be more truthful about how threat actors stole an Azure signing key. [...]]]> 2024-04-03T20:21:10+00:00 https://www.bleepingcomputer.com/news/security/microsoft-still-unsure-how-hackers-stole-msa-key-in-2023-exchange-attack/ www.secnews.physaphae.fr/article.php?IdArticle=8475559 False Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Huile et ampli;Le secteur du gaz tombe pour un faux accident de voiture accident de phishing e-mails<br>Oil & Gas Sector Falls for Fake Car Accident Phishing Emails Effective Rhadamanthys phishing campaign spoofs nonexistent "Federal Bureau of Transportation" to compromise recipients, analysts discover.]]> 2024-04-03T20:16:16+00:00 https://www.darkreading.com/cyberattacks-data-breaches/oil-gas-sector-falling-for-fake-vehicle-incident-email-lure www.secnews.physaphae.fr/article.php?IdArticle=8475454 False None None 4.0000000000000000 Recorded Future - FLux Recorded Future Département d'État enquêtant sur les rapports sur le vol de données impliquant un cabinet fédéral de conseil en technologie<br>State Department investigating reports of data theft allegedly involving federal tech consulting firm Le département d'État américain a déclaré qu'il enquêtait sur les allégations selon lesquelles un pirate a volé les données du gouvernement à un entrepreneur.Mardi, un pirate connu sous le nom de «Intelbroker» a affirmé avoir volé des données liées à plusieurs agences américaines, notamment le Département d'État, le Département de la défense et la National Security Agency.Le pirate a dit qu'ils avaient violé l'acuité - une Virginie
The U.S. State Department said it is investigating claims that a hacker stole government data from a contractor. On Tuesday, a hacker known as “IntelBroker” claimed to have stolen data related to multiple U.S. agencies including the State Department, Defense Department and National Security Agency. The hacker said they breached Acuity - a Virginia-based]]>
2024-04-03T20:14:51+00:00 https://therecord.media/state-department-investigating-reports-of-data-breach-contractor www.secnews.physaphae.fr/article.php?IdArticle=8475456 False None None 2.0000000000000000
Hacking Articles - Blog de Raj Chandel Meilleure alternative de l'auditeur Netcat<br>Best Alternative of Netcat Listener Pentesters rely on a variety of tools to establish connections and maintain access during security assessments. One critical component of their toolkit is the listener-a]]> 2024-04-03T20:12:31+00:00 https://www.hackingarticles.in/best-alternative-of-netcat-listener/ www.secnews.physaphae.fr/article.php?IdArticle=8475446 False Tool None 3.0000000000000000 Recorded Future - FLux Recorded Future Ivanti promet une refonte de sécurité après plusieurs violations du gouvernement<br>Ivanti pledges security overhaul after multiple government breaches Ivanti a annoncé des modifications en gros dans la façon dont elle aborde la cybersécurité après que plusieurs gouvernements ont apporté des violations récentes aux vulnérabilités des produits de la société. & NBSP;Le PDG d'Ivanti, Jeff Abbott, a publié une lettre ouverte et une vidéo de 6 minutes aux clients promettant de réviser la façon dont la société de gestion technologique construit ses produits et comment elle communique avec les clients sur les vulnérabilités.«Événements dans
Ivanti announced wholesale changes to how it approaches cybersecurity after multiple governments sourced recent breaches back to vulnerabilities in the company\'s products.  Ivanti CEO Jeff Abbott published an open letter and 6-minute video to customers pledging overhaul how the technology-management company builds its products and how it communicates with customers about vulnerabilities. “Events in]]>
2024-04-03T20:00:43+00:00 https://therecord.media/ivanti-security-overhaul-ceo-jeff-abbott www.secnews.physaphae.fr/article.php?IdArticle=8475423 False Vulnerability None 4.0000000000000000
Dark Reading - Informationweek Branch Comment apprivoiser l'injection SQL<br>How to Tame SQL injection As part of its Secure by Design initiative, the Cybersecurity and Infrastructure Security Agency urged companies to redouble efforts to quash SQL injection vulnerabilities. Here\'s how.]]> 2024-04-03T19:58:52+00:00 https://www.darkreading.com/application-security/tools-and-techniques-to-tame-sql-injection www.secnews.physaphae.fr/article.php?IdArticle=8475869 False Vulnerability None 2.0000000000000000 CyberScoop - scoopnewsgroup.com special Cyber Prise de décision basée sur les données: la puissance de la journalisation des événements améliorés<br>Data-driven decision-making: The power of enhanced event logging Explorez la pointe de la cybersécurité fédérale avec l'approche innovante de Microsoft \\ pour l'exploitation forestière des événements et découvrez comment ces solutions façonnent l'avenir de la sécurité numérique.
>Explore the forefront of federal cybersecurity with Microsoft\'s innovative approach to event logging and learn how those solutions are shaping the future of digital security. ]]>
2024-04-03T19:30:00+00:00 https://cyberscoop.com/data-driven-decision-making-the-power-of-enhanced-event-logging/ www.secnews.physaphae.fr/article.php?IdArticle=8475421 False None None 2.0000000000000000
Korben - Bloger francais En route vers des modèles IA moins énergivores mais tout aussi efficaces 2024-04-03T19:25:30+00:00 https://korben.info/ia-eco-responsable-modeles-efficaces-moins-energivores.html www.secnews.physaphae.fr/article.php?IdArticle=8475422 False None None 2.0000000000000000 Recorded Future - FLux Recorded Future Le tribunal confirme le droit de la FCC à interdire la technologie des sociétés de télécommunications appartenant à des chinois<br>Court upholds FCC right to ban tech from Chinese-owned telecom companies The Federal Communications Commission (FCC) acted within its authority when it banned video surveillance products made by two Chinese-owned companies, a federal appeals court said in a Tuesday decision. The agency\'s ban on products made by Hikvision and Dahua is appropriate under a 2021 law, the Secure Equipment Act (SEA), which is meant to
The Federal Communications Commission (FCC) acted within its authority when it banned video surveillance products made by two Chinese-owned companies, a federal appeals court said in a Tuesday decision. The agency\'s ban on products made by Hikvision and Dahua is appropriate under a 2021 law, the Secure Equipment Act (SEA), which is meant to]]>
2024-04-03T19:14:40+00:00 https://therecord.media/court-upholds-fcc-ban-on-hikvision-dahua-products www.secnews.physaphae.fr/article.php?IdArticle=8475424 False None None 3.0000000000000000
TroyHunt - Blog Security Microsoft blâmé pour «une cascade de défaillances de sécurité» dans le rapport d'échange de violation<br>Microsoft blamed for “a cascade of security failures” in Exchange breach report Summer 2023 intrusion pinned to corporate culture, "avoidable errors."]]> 2024-04-03T18:51:54+00:00 https://arstechnica.com/?p=2014535 www.secnews.physaphae.fr/article.php?IdArticle=8475418 False None None 4.0000000000000000 Dark Reading - Informationweek Branch Omni Hotel IT IT Outage perturbe les réservations, les systèmes de clés numériques<br>Omni Hotel IT Outage Disrupts Reservations, Digital Key Systems Guests affected by the companywide disruption vented their frustrations on social media.]]> 2024-04-03T18:44:58+00:00 https://www.darkreading.com/cybersecurity-operations/omni-hotel-it-outage-causes-operational-disruptions www.secnews.physaphae.fr/article.php?IdArticle=8475394 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Google Chrome Beta teste une nouvelle protection DBSC contre les attaques de vol de biscuits<br>Google Chrome Beta Tests New DBSC Protection Against Cookie-Stealing Attacks Google on Tuesday said it\'s piloting a new feature in Chrome called Device Bound Session Credentials (DBSC) to help protect users against session cookie theft by malware. The prototype – currently tested against "some" Google Account users running Chrome Beta – is built with an aim to make it an open web standard, the tech giant\'s Chromium team said. "By binding authentication sessions to the]]> 2024-04-03T18:37:00+00:00 https://thehackernews.com/2024/04/google-chrome-beta-tests-new-dbsc.html www.secnews.physaphae.fr/article.php?IdArticle=8475272 False Malware None 3.0000000000000000 Bleeping Computer - Magazine Américain La violation de données sur le surveylama expose des informations de 4,4 millions d'utilisateurs<br>SurveyLama data breach exposes info of 4.4 million users Data breach alerting service Have I Been Pwned (HIBP) warns that SurveyLama suffered a data breach in February 2024, which exposed the sensitive data of 4.4 million users. [...]]]> 2024-04-03T18:28:08+00:00 https://www.bleepingcomputer.com/news/security/surveylama-data-breach-exposes-info-of-44-million-users/ www.secnews.physaphae.fr/article.php?IdArticle=8475512 False Data Breach None 2.0000000000000000 Fortinet - Fabricant Materiel Securite 2023 Gagnant des prix du partenaire de l'année Fortinet<br>2023 Fortinet Partner of the Year Award Winners Fortinet 2023 Partner of the Year Awards recognize exceptional cybersecurity sales and achievements across our global partner community. Read more.]]> 2024-04-03T18:00:00+00:00 https://www.fortinet.com/blog/partners/fortinet-partner-of-the-year-award-winners www.secnews.physaphae.fr/article.php?IdArticle=8475393 False None None 2.0000000000000000 Recorded Future - FLux Recorded Future Les constructeurs automobiles et la FCC s'affrontent sur des réglementations potentielles pour les voitures connectées<br>Automakers and FCC square off over potential regulations for connected cars Les constructeurs automobiles et la Federal Communications Commission (FCC) se préparent pour une lutte potentielle quant à savoir si les voitures connectées devraient être réglementées comme de petits morceaux d'infrastructure de télécommunications - une décision qui aurait de grandes implications sur la façon dont les véhicules gèrent les données des consommateurs.Dans les lettres récentes obtenues par les futures nouvelles enregistrées, les sociétés automobiles ont repoussé
Car manufacturers and the Federal Communications Commission (FCC) are gearing up for a potential fight over whether connected cars should be regulated as small pieces of telecom infrastructure - a decision that would have vast implications for how vehicles handle consumer data. In recent letters obtained by Recorded Future News, automotive companies pushed back]]>
2024-04-03T17:25:24+00:00 https://therecord.media/fcc-automakers-connected-cars-regulation-mvnos www.secnews.physaphae.fr/article.php?IdArticle=8475368 False None None 2.0000000000000000
Bleeping Computer - Magazine Américain Comté de Jackson en état d'urgence après une attaque de ransomware<br>Jackson County in state of emergency after ransomware attack Jackson County, Missouri, is in a state of emergency after a ransomware attack took down some county services on Tuesday. [...]]]> 2024-04-03T17:10:56+00:00 https://www.bleepingcomputer.com/news/security/jackson-county-in-state-of-emergency-after-ransomware-attack/ www.secnews.physaphae.fr/article.php?IdArticle=8475455 False Ransomware None 2.0000000000000000 Dark Reading - Informationweek Branch La plus grosse erreur que les équipes de sécurité font lors de l'achat d'outils<br>The Biggest Mistake Security Teams Make When Buying Tools Security teams often confuse tool purchasing with program management. They should focus on what a security program means to them, and what they are trying to accomplish.]]> 2024-04-03T17:00:00+00:00 https://www.darkreading.com/cybersecurity-operations/biggest-mistake-security-teams-make-when-buying-tools www.secnews.physaphae.fr/article.php?IdArticle=8475337 False Tool None 2.0000000000000000 Recorded Future - FLux Recorded Future DHS blâme \\ 'Cascade of Security défaillance de Microsoft \\' pour le piratage en Chine sur le gouvernement américain<br>DHS blames \\'cascade of security failures at Microsoft\\' for China hack on US government Microsoft n'a toujours pas une compréhension complète de la façon dont les pirates de gouvernement chinois présumés ont violé ses systèmes et accédé aux e-mails des hauts dirigeants américains, selon un examen du Department of Homeland Security. & NBSP;Dans un rapport de 34 pages réalisé par le Cyber Sécurité Review Board (CSRB), les responsables américains ont conclu que les pirates chinois,
Microsoft still does not have a full understanding of how alleged Chinese government hackers breached its systems and accessed the emails of senior U.S. government leaders, according to a review by the Department of Homeland Security.  In a 34-page report conducted by the Cyber Safety Review Board (CSRB), U.S. officials concluded that Chinese hackers,]]>
2024-04-03T16:59:08+00:00 https://therecord.media/dhs-cascade-of-security-failures-microsoft-china-hack www.secnews.physaphae.fr/article.php?IdArticle=8475334 False Hack None 2.0000000000000000
HackRead - Chercher Cyber Victoria VR devient le premier développeur de réalité virtuelle pour intégrer OpenAI<br>Victoria VR Becomes First Virtual Reality Developer to Integrate OpenAI Par owais sultan Le développeur de la réalité virtuelle Victoria VR a annoncé qu'elle intégrait Openai dans son constructeur.Cette décision fait & # 8230; Ceci est un article de HackRead.com Lire la publication originale: Victoria VR devient le premier développeur de réalité virtuelle pour intégrer Openai
>By Owais Sultan Virtual reality developer Victoria VR has announced that it is integrating OpenAI into its builder. The move makes… This is a post from HackRead.com Read the original post: Victoria VR Becomes First Virtual Reality Developer to Integrate OpenAI]]>
2024-04-03T16:54:12+00:00 https://www.hackread.com/victoria-vr-virtual-reality-developer-integrate-openai/ www.secnews.physaphae.fr/article.php?IdArticle=8475339 False None None 2.0000000000000000
Global Security Mag - Site de news francais La sécurité du sel lance du poivre<br>Salt Security Launches Pepper revues de produits
Salt Security Launches Pepper, First AI-Powered Knowledge-Based Assistant for API Security Embracing the value of generative AI, Salt Security has streamlined customer knowledge-based query resolution with technology that will reduce the time to get answers by 91% - Product Reviews]]>
2024-04-03T16:52:30+00:00 https://www.globalsecuritymag.fr/salt-security-launches-pepper.html www.secnews.physaphae.fr/article.php?IdArticle=8475341 False None None 2.0000000000000000
Vuln GCP - FLux Vuln GoogleCloudPlatform GCP-2024-021 CVE-2024-3094 , qui affecte les versions 5.6.0 et 5.6.1 du package XZ-Utils dans la bibliothèque Liblzma, et pourrait conduire au compromis de l'utilitaire OpenSSH. Pour plus de détails, voir le ]]> 2024-04-03T16:47:44+00:00 https://cloud.google.com/support/bulletins/index#gcp-2024-021 www.secnews.physaphae.fr/article.php?IdArticle=8475344 False Cloud None None The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Gestion de la surface d'attaque vs gestion de la vulnérabilité<br>Attack Surface Management vs. Vulnerability Management Attack surface management (ASM) and vulnerability management (VM) are often confused, and while they overlap, they\'re not the same. The main difference between attack surface management and vulnerability management is in their scope: vulnerability management checks a list of known assets, while attack surface management assumes you have unknown assets and so begins with discovery. Let\'s look at]]> 2024-04-03T16:42:00+00:00 https://thehackernews.com/2024/04/attack-surface-management-vs.html www.secnews.physaphae.fr/article.php?IdArticle=8475180 False Vulnerability None 3.0000000000000000 knowbe4 - cybersecurity services Les applications malveillantes usurpèrent McAfee pour distribuer des logiciels malveillants par SMS et les appels téléphoniques<br>Malicious App Impersonates McAfee to Distribute Malware Via Text and Phone Calls L'application malveillante imite McAfee pour distribuer des logiciels malveillants Une version trojanisée de l'application McAfee Security installe le Trojan Android Banking «Vultur», selon les chercheurs de Fox-It.Les attaquants diffusent des liens vers l'application malveillante via des SMS et des appels téléphoniques.
Malicious App Impersonates McAfee to Distribute Malware A trojanized version of the McAfee Security app is installing the Android banking Trojan “Vultur,” according to researchers at Fox-IT. The attackers are spreading links to the malicious app via text messages and phone calls.]]>
2024-04-03T16:36:29+00:00 https://blog.knowbe4.com/malicious-app-impersonates-mcafee-to-distribute-malware www.secnews.physaphae.fr/article.php?IdArticle=8475327 False Malware,Mobile None 2.0000000000000000
knowbe4 - cybersecurity services Le nouveau rapport montre que les liens de phishing et les attachements malveillants sont les principaux points d'entrée des cyberattaques<br>New Report Shows Phishing Links and Malicious Attachments Are The Top Entry Points of Cyber Attacks phishing et les utilisateurs Liste en tant que CyberAttack Initial Access Activers Les nouvelles données d'attaque TTP couvrant 2023 mettent en lumière les acteurs de la menace et les actions des utilisateurs qui mettent les organisations les plus à risque.
Phishing and Users Top List as Cyberattack Initial Access Enablers New TTP attack data covering 2023 sheds much needed light on the threat actor and user actions that are putting organizations at the most risk.]]>
2024-04-03T16:36:17+00:00 https://blog.knowbe4.com/phishing-and-users-top-list-as-cyberattack-initial-access-enablers www.secnews.physaphae.fr/article.php?IdArticle=8475328 False Threat,Studies None 3.0000000000000000
InfoSecurity Mag - InfoSecurity Magazine Rapport du comité d'examen de la cyber-sécurité Slams Microsoft Security Échecs dans la violation par e-mail du gouvernement<br>Cyber Safety Review Board Report Slams Microsoft Security Failures in Government Email Breach A report has highlighted multiple security failings by Microsoft that allowed Chinese threat actors to access US government officials\' email accounts in the Summer of 2023]]> 2024-04-03T16:30:00+00:00 https://www.infosecurity-magazine.com/news/microsoft-security-failures/ www.secnews.physaphae.fr/article.php?IdArticle=8475336 False Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Prudential financier informe 36 000 personnes de violation de données<br>Prudential Financial Notifies 36,000 Individuals of Data Breach The compromised data includes names or other identifying information in combination with driver\'s license numbers]]> 2024-04-03T16:00:00+00:00 https://www.infosecurity-magazine.com/news/prudential-financial-notifies/ www.secnews.physaphae.fr/article.php?IdArticle=8475300 False Data Breach None 2.0000000000000000 IT Security Guru - Blog Sécurité Les botnets et les infosteaux IoT ciblent fréquemment le secteur de la vente au détail<br>IoT Botnets and Infostealers Frequently Target Retail Sector 2024-04-03T15:54:22+00:00 https://www.itsecurityguru.org/2024/04/03/iot-botnets-and-infostealers-frequently-target-retail-sector/?utm_source=rss&utm_medium=rss&utm_campaign=iot-botnets-and-infostealers-frequently-target-retail-sector www.secnews.physaphae.fr/article.php?IdArticle=8475297 False Malware,Tool,Threat None 2.0000000000000000 ComputerWeekly - Computer Magazine Le RDP a abusé de plus de 90% des cyberattaques, Sophos trouve<br>RDP abused in over 90% of cyber attacks, Sophos finds 2024-04-03T15:51:00+00:00 https://www.computerweekly.com/news/366578657/RDP-abused-in-over-90-of-cyber-attacks-Sophos-finds www.secnews.physaphae.fr/article.php?IdArticle=8475417 False Studies None 4.0000000000000000 CyberScoop - scoopnewsgroup.com special Cyber Opérationnaliser zéro confiance: un guide pratique pour les agences fédérales modernes<br>Operationalizing zero trust: A practical guide for modern federal agencies 2024-04-03T15:38:46+00:00 https://cyberscoop.com/operationalizing-zero-trust-tines-whitepaper/ www.secnews.physaphae.fr/article.php?IdArticle=8475303 False None None 3.0000000000000000 HackRead - Chercher Cyber Sophos révèle que les attaques de ransomwares visent désormais des sauvegardes<br>Sophos Reveals Ransomware Attacks Are Now Targeting Backups Par waqas Le stockage d'une sauvegarde de vos données est une décision judicieuse, mais avez-vous envisagé de garder une sauvegarde de votre sauvegarde? Ceci est un article de HackRead.com Lire le post original: Sophos révèleLes attaques de ransomware ciblent désormais les sauvegardes
>By Waqas Storing a backup of your data is a wise decision, but have you considered keeping a backup of your backup? This is a post from HackRead.com Read the original post: Sophos Reveals Ransomware Attacks Are Now Targeting Backups]]>
2024-04-03T15:32:17+00:00 https://www.hackread.com/sophos-ransomware-attacks-target-backups/ www.secnews.physaphae.fr/article.php?IdArticle=8475305 False Ransomware None 2.0000000000000000
Fortinet - Fabricant Materiel Securite Construire votre entreprise avec le programme partenaire Fortinet Engage<br>Building Your Business with the Fortinet Engage Partner Program Fortinet\'s Engage Partner Program empowers partners through a robust portfolio of integrated solutions built on the market\'s most mature unified platform. Learn more.]]> 2024-04-03T15:30:00+00:00 https://www.fortinet.com/blog/partners/building-your-business-with-fortinet-engage-partner-program www.secnews.physaphae.fr/article.php?IdArticle=8475329 False None None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Infostolers prévalent dans les tendances de la cybercriminalité du secteur de la vente au détail<br>Infostealers Prevalent in Retail Sector Cybercrime Trends The findings from Netskope also show a shift in the retail sector\'s use of cloud applications]]> 2024-04-03T15:30:00+00:00 https://www.infosecurity-magazine.com/news/infostealers-prevalent-retail/ www.secnews.physaphae.fr/article.php?IdArticle=8475301 False Cloud None 3.0000000000000000 Dark Reading - Informationweek Branch Feds à Microsoft: Nettoyez votre acte de sécurité cloud maintenant<br>Feds to Microsoft: Clean Up Your Cloud Security Act Now A federal review board demanded that the tech giant prioritize its "inadequate" security posture, putting the blame solely on the company for last year\'s Microsoft 365 breach that allowed China\'s Storm-0558 to hack the email accounts of key government officials.]]> 2024-04-03T15:29:31+00:00 https://www.darkreading.com/cloud-security/feds-microsoft-clean-up-cloud-security-act www.secnews.physaphae.fr/article.php?IdArticle=8475302 False Hack,Cloud None 2.0000000000000000 Korben - Bloger francais Stable Audio 2.0 – L\'IA qui ne remplacera pas les musiciens 2024-04-03T15:15:36+00:00 https://korben.info/stable-audio-2-0-ia-revolutionne-creation-musicale.html www.secnews.physaphae.fr/article.php?IdArticle=8475331 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Mispadu Trojan cible l'Europe, des milliers d'identification compromises<br>Mispadu Trojan Targets Europe, Thousands of Credentials Compromised The banking trojan known as Mispadu has expanded its focus beyond Latin America (LATAM) and Spanish-speaking individuals to target users in Italy, Poland, and Sweden. Targets of the ongoing campaign include entities spanning finance, services, motor vehicle manufacturing, law firms, and commercial facilities, according to Morphisec. "Despite the geographic expansion, Mexico remains the]]> 2024-04-03T15:02:00+00:00 https://thehackernews.com/2024/04/mispadu-trojan-targets-europe-thousands.html www.secnews.physaphae.fr/article.php?IdArticle=8475127 False Commercial None 2.0000000000000000 Palo Alto Network - Site Constructeur Palo Alto Networks 2023 Rapport ESG - Sécurisation de notre avenir numérique<br>Palo Alto Networks 2023 ESG Report - Securing Our Digital Future Palo Alto Networks a publié notre rapport sur l'exercice 2023 Environmental, Social and Governance (ESG) pour partager les progrès que nous avons réalisés l'année dernière.
>Palo Alto Networks released our fiscal 2023 Environmental, Social and Governance (ESG) Report to share the progress we\'ve made in the last year. ]]>
2024-04-03T15:00:20+00:00 https://www.paloaltonetworks.com/blog/2024/04/2023-esg-report-securing-our-digital-future/ www.secnews.physaphae.fr/article.php?IdArticle=8475268 False None None 3.0000000000000000
Intigrity - Blog Construire un cas pour les programmes de primes de bogues: répondre aux préoccupations des entreprises<br>Building a case for bug bounty programs: Addressing corporate concerns Les programmes de primes de bogues sont devenus un outil puissant dans l'arsenal de cybersécurité, ce qui permet aux organisations de pouvoir identifier et résoudre de manière proactive les vulnérabilités avant de pouvoir être exploitées.Malgré cela, les préoccupations internes concernant les implications financières, les complexités juridiques, les risques de sécurité des données et les barrières culturelles peuvent entraver l'adoption de ces programmes. & # 160; & # 160;Les entreprises ont besoin & # 8217; n'ont pas peur d'entrer dans [& # 8230;]
>Bug bounty programs have emerged as a powerful tool in the cybersecurity arsenal, empowering organizations to proactively identify and resolve vulnerabilities before they can be exploited. Despite this, internal concerns around financial implications, legal complexities, data security risks, and cultural barriers can hinder the adoption of these programs.   Companies needn’t be afraid to step into […] ]]>
2024-04-03T14:57:27+00:00 https://blog.intigriti.com/2024/04/03/building-a-case-for-bug-bounty-programs-addressing-corporate-concerns/ www.secnews.physaphae.fr/article.php?IdArticle=8475276 False Tool,Vulnerability None 3.0000000000000000
Bleeping Computer - Magazine Américain Le département d'État américain enquête sur un vol présumé de données gouvernementales<br>US State Department investigates alleged theft of government data The U.S. Department of State is investigating claims of a cyber incident after a threat actor leaked documents allegedly stolen from a government contractor. [...]]]> 2024-04-03T14:55:21+00:00 https://www.bleepingcomputer.com/news/security/us-state-department-investigates-alleged-theft-of-government-data/ www.secnews.physaphae.fr/article.php?IdArticle=8475395 False Threat None 2.0000000000000000 HackRead - Chercher Cyber Finaliste Aembit pour la conférence RSA 2024 Innovation Sandbox<br>Aembit Finalist for RSA Conference 2024 Innovation Sandbox Par cyber navre La principale entreprise pour obtenir l'accès entre les charges de travail reconnues pour la plate-forme Aembit Workload IAM. Ceci est un article de HackRead.com Lire la publication originale: Finaliste Aembit pour RSA Conference 2024 Innovation Sandbox
>By Cyber Newswire The Leading Company for Securing Access Between Workloads Recognized for the Aembit Workload IAM Platform. This is a post from HackRead.com Read the original post: Aembit Finalist for RSA Conference 2024 Innovation Sandbox]]>
2024-04-03T14:48:18+00:00 https://www.hackread.com/aembit-finalist-rsa-conference-2024-innovation-sandbox/ www.secnews.physaphae.fr/article.php?IdArticle=8475370 False Conference None 2.0000000000000000
Nextron - Blog Secu Protéger votre entreprise: aborder la crise de la vulnérabilité de Microsoft Exchange<br>Protecting Your Business: Addressing the Microsoft Exchange Vulnerability Crisis Découvrez comment sauvegarder votre entreprise à partir de la crise de vulnérabilité en cours Microsoft Exchange mise en évidence par l'Office fédéral allemand pour la sécurité de l'information (BSI).Découvrez les avertissements critiques, l'importance du correctif et comment les évaluations automatisées des compromis avec Thor Cloud Lite peuvent fortifier votre stratégie de cybersécurité.
>Discover how to safeguard your business from the ongoing Microsoft Exchange vulnerability crisis highlighted by the German Federal Office for Information Security (BSI). Learn about critical warnings, the importance of patching, and how automated compromise assessments with THOR Cloud Lite can fortify your cybersecurity strategy. ]]>
2024-04-03T14:31:53+00:00 https://www.nextron-systems.com/2024/04/03/microsoft-exchange-vulnerability-crisis/ www.secnews.physaphae.fr/article.php?IdArticle=8475747 False Vulnerability,Patching,Cloud None 3.0000000000000000
Silicon - Site de News Francais Au-delà de ChatGPT, L\'Oréal lance ses services de GenAI 2024-04-03T14:30:46+00:00 https://www.silicon.fr/au-dela-de-chatgpt-loreal-lance-ses-services-de-genai-477417.html www.secnews.physaphae.fr/article.php?IdArticle=8475275 False None ChatGPT 2.0000000000000000 Global Security Mag - Site de news francais Cyberattaques contre la France depuis 2023<br>Cyber attacks on France since 2023 rapports spéciaux
Cyber attacks on France since 2023 by Surfshark - Special Reports]]>
2024-04-03T14:00:10+00:00 https://www.globalsecuritymag.fr/cyber-attacks-on-france-since-2023.html www.secnews.physaphae.fr/article.php?IdArticle=8475239 False None None 2.0000000000000000
Dark Reading - Informationweek Branch Pourquoi la cybersécurité est un problème de société<br>Why Cybersecurity Is a Whole-of-Society Issue Working together and integrating cybersecurity as part of our corporate and individual thinking can make life harder for hackers and safer for ourselves.]]> 2024-04-03T14:00:00+00:00 https://www.darkreading.com/cyberattacks-data-breaches/why-cybersecurity-is-whole-of-society-issue www.secnews.physaphae.fr/article.php?IdArticle=8475233 False None None 2.0000000000000000 RedCanary - Red Canary Le guide de Trainman \\ pour les points d'entrée négligés dans Microsoft Azure<br>The Trainman\\'s Guide to overlooked entry points in Microsoft Azure Guided by The Matrix\'s "Trainman," we walk through more obscure user access passageways into Microsoft Azure, and how to detect their usage.]]> 2024-04-03T13:58:25+00:00 https://redcanary.com/blog/microsoft-azure-entry/ www.secnews.physaphae.fr/article.php?IdArticle=8475238 False None None 3.0000000000000000 Global Security Mag - Site de news francais Benjamin Duchet, HP France : Les technologies doivent évoluer avec des réponses pragmatiques face aux menaces émergentes Interviews / ]]> 2024-04-03T13:54:45+00:00 https://www.globalsecuritymag.fr/benjamin-duchet-hp-france-les-technologies-doivent-evoluer-avec-des-reponses.html www.secnews.physaphae.fr/article.php?IdArticle=8475240 False Threat None 2.0000000000000000 Wired Threat Level - Security News Le mystère de \\ 'jia tan, \\' le cerveau de porte dérobée XZ<br>The Mystery of \\'Jia Tan,\\' the XZ Backdoor Mastermind The thwarted XZ Utils supply chain attack was years in the making. Now, clues suggest nation-state hackers were behind the persona that inserted the malicious code.]]> 2024-04-03T13:54:14+00:00 https://www.wired.com/story/jia-tan-xz-backdoor/ www.secnews.physaphae.fr/article.php?IdArticle=8475229 False None None 4.0000000000000000 HackRead - Chercher Cyber Intelbroker fuit des données présumées de sécurité nationale liées à l'entrepreneur américain Acuity Inc.<br>IntelBroker Leaks Alleged National Security Data Tied to US Contractor Acuity Inc. Par waqas Les données divulguées étaient auparavant vendues par le pirate IntelBroker pour seulement 3 000 $ en crypto-monnaie Monero (XMR). Ceci est un article de HackRead.com Lire le post original: Intelbroker fuit des données présumées de sécurité nationale liées à l'entrepreneur américain Acuity Inc.
>By Waqas The leaked data was previously being sold by the IntelBroker hacker for just $3,000 in Monero (XMR) cryptocurrency. This is a post from HackRead.com Read the original post: IntelBroker Leaks Alleged National Security Data Tied to US Contractor Acuity Inc.]]>
2024-04-03T13:46:57+00:00 https://www.hackread.com/intelbroker-us-national-security-data-contractor-acuity/ www.secnews.physaphae.fr/article.php?IdArticle=8475232 False None None 2.0000000000000000
Zataz - Magazine Francais de secu Blackmarket : la boutique CosaNostra fermée ! 2024-04-03T13:44:19+00:00 https://www.zataz.com/blackmarket-la-boutique-cosanostra-fermee/ www.secnews.physaphae.fr/article.php?IdArticle=8475230 False None None 3.0000000000000000 Global Security Mag - Site de news francais Les entreprises investissent plus de 100.000 $ par an pour renforcer les compétences de leurs équipes de cybersécurité Investigations]]> 2024-04-03T13:39:19+00:00 https://www.globalsecuritymag.fr/les-entreprises-investissent-plus-de-100-000-par-an-pour-renforcer-les.html www.secnews.physaphae.fr/article.php?IdArticle=8475241 False None None 2.0000000000000000 Global Security Mag - Site de news francais Varonis présente sa solution de cybersécurité pour Microsoft 365 Copilot Produits]]> 2024-04-03T13:34:43+00:00 https://www.globalsecuritymag.fr/varonis-presente-sa-solution-de-cybersecurite-pour-microsoft-365-copilot.html www.secnews.physaphae.fr/article.php?IdArticle=8475242 False None None 2.0000000000000000 Bleeping Computer - Magazine Américain Ivanti corrige la vulnérabilité de la passerelle VPN permettant RCE, DOS ATTAQUES<br>Ivanti fixes VPN gateway vulnerability allowing RCE, DoS attacks IT security software company Ivanti has released patches to fix multiple security vulnerabilities impacting its Connect Secure and Policy Secure gateways. [...]]]> 2024-04-03T13:29:32+00:00 https://www.bleepingcomputer.com/news/security/ivanti-fixes-vpn-gateway-vulnerability-allowing-rce-dos-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8475367 False Vulnerability None 2.0000000000000000 Global Security Mag - Site de news francais La France a été la cible de 44 cyberattaques depuis 2023, selon une étude Investigations]]> 2024-04-03T13:29:05+00:00 https://www.globalsecuritymag.fr/la-france-a-ete-la-cible-de-44-cyberattaques-depuis-2023-selon-une-etude.html www.secnews.physaphae.fr/article.php?IdArticle=8475243 False None None 2.0000000000000000 Global Security Mag - Site de news francais Cloudflare soutient le déploiement des applications IA grâce à Hugging Face Produits]]> 2024-04-03T13:23:56+00:00 https://www.globalsecuritymag.fr/cloudflare-soutient-le-deploiement-des-applications-ia-grace-a-hugging-face.html www.secnews.physaphae.fr/article.php?IdArticle=8475244 False None None 3.0000000000000000 Global Security Mag - Site de news francais Netwrix propose six conseils pour éviter d'être arnaqué lors de ses voyages aux Jeux olympiques<br>Netwrix offers six tips to avoid being scammed when travelling to the Olympics opinion
Netwrix offers six tips to avoid being scammed when travelling to the Olympics Mitigate falling victim to scammers and cybercriminals for a safer Olympic experience - Opinion]]>
2024-04-03T13:16:30+00:00 https://www.globalsecuritymag.fr/netwrix-offers-six-tips-to-avoid-being-scammed-when-travelling-to-the-olympics.html www.secnews.physaphae.fr/article.php?IdArticle=8475245 False None None 3.0000000000000000
Krebs on Security - Chercheur Américain \\ 'Les manipulaters \\' améliorer le phishing, échouent toujours à l'OPSEC<br>\\'The Manipulaters\\' Improve Phishing, Still Fail at Opsec Roughly nine years ago, KrebsOnSecurity profiled a Pakistan-based cybercrime group called "The Manipulaters," a sprawling web hosting network of phishing and spam delivery platforms. In January 2024, The Manipulaters pleaded with this author to unpublish previous stories about their work, claiming the group had turned over a new leaf and gone legitimate. But new research suggests that while they have improved the quality of their products and services, these nitwits still fail spectacularly at hiding their illegal activities.]]> 2024-04-03T13:16:25+00:00 https://krebsonsecurity.com/2024/04/the-manipulaters-improve-phishing-still-fail-at-opsec/ www.secnews.physaphae.fr/article.php?IdArticle=8475228 False Spam None 3.0000000000000000 Silicon - Site de News Francais Caisse des Dépôts : Odile Duthil est nommée directrice de la cybersécurité 2024-04-03T13:14:30+00:00 https://www.silicon.fr/caisse-des-depots-odile-duthil-est-nommee-directrice-de-la-cybersecurite-477406.html www.secnews.physaphae.fr/article.php?IdArticle=8475234 False None None 1.00000000000000000000