www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-20T18:24:33+00:00 www.secnews.physaphae.fr Tech Worm - Desc Hackers Hack Minnesota Senate Computers, Access Password Files 2020-06-03T13:58:18+00:00 https://www.techworm.net/2020/06/hacker-minnesota-senate-computer-password.html www.secnews.physaphae.fr/article.php?IdArticle=1748275 False Hack None None The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Two Critical Flaws in Zoom Could\'ve Let Attackers Hack Systems via Chat ]]> 2020-06-03T08:53:45+00:00 http://feedproxy.google.com/~r/TheHackersNews/~3/qgszbhEPRd0/zoom-video-software-hacking.html www.secnews.physaphae.fr/article.php?IdArticle=1748463 False Hack None None Tech Worm - Desc Anonymous Hack Chicago Police Radios To Play NWA\'s \'Fuck Tha Police\' During Protests 2020-06-03T06:01:10+00:00 https://www.techworm.net/2020/06/anonymous-hack-chicago-police-radio.html www.secnews.physaphae.fr/article.php?IdArticle=1747512 False Hack None None The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Newly Patched SAP ASE Flaws Could Let Attackers Hack Database Servers ]]> 2020-06-03T05:56:01+00:00 http://feedproxy.google.com/~r/TheHackersNews/~3/omVi9bBEkJM/newly-patched-sap-ase-flaws-could-let.html www.secnews.physaphae.fr/article.php?IdArticle=1748197 False Hack None None IT Security Guru - Blog Sécurité Chinese Hackers May Be Behind EasyJet Hack 2020-06-02T16:35:31+00:00 https://www.itsecurityguru.org/2020/06/02/chinese-hackers-may-be-behind-easyjet-hack/?utm_source=rss&utm_medium=rss&utm_campaign=chinese-hackers-may-be-behind-easyjet-hack www.secnews.physaphae.fr/article.php?IdArticle=1746551 False Hack None None IT Security Guru - Blog Sécurité Minneapolis Police Department Hack Likely Fake 2020-06-02T16:28:19+00:00 https://www.itsecurityguru.org/2020/06/02/minneapolis-police-department-hack-likely-fake/?utm_source=rss&utm_medium=rss&utm_campaign=minneapolis-police-department-hack-likely-fake www.secnews.physaphae.fr/article.php?IdArticle=1746553 False Hack None None Security Affairs - Blog Secu Over 100K+ WordPress sites using PageLayer plugin exposed to hack 2020-05-31T08:20:24+00:00 https://securityaffairs.co/wordpress/104051/hacking/wordpress-pagelayer-plugin-flaws.html?utm_source=rss&utm_medium=rss&utm_campaign=wordpress-pagelayer-plugin-flaws www.secnews.physaphae.fr/article.php?IdArticle=1742666 True Hack None None The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Exclusive – Any Mitron (Viral TikTok Clone) Profile Can Be Hacked in Seconds ]]> 2020-05-30T00:56:49+00:00 http://feedproxy.google.com/~r/TheHackersNews/~3/LOwl7zcSjsY/titok-mitron-app-hacking.html www.secnews.physaphae.fr/article.php?IdArticle=1741341 False Hack,Vulnerability None 5.0000000000000000 InformationSecurityBuzzNews - Site de News Securite Security Expert Re: Fortune 500 Company NTT Discloses Hack On Internal Network Security Expert Re: Fortune 500 Company NTT Discloses Hack On Internal Network]]> 2020-05-29T12:13:56+00:00 https://www.informationsecuritybuzz.com/expert-comments/security-expert-re-fortune-500-company-ntt-discloses-hack-on-internal-network/ www.secnews.physaphae.fr/article.php?IdArticle=1740169 False Hack,Guideline None None Security Affairs - Blog Secu Security breach impacted Cisco VIRL-PE infrastructure 2020-05-28T21:47:52+00:00 https://securityaffairs.co/wordpress/103963/hacking/cisco-virl-pe-infrastructure-hack.html?utm_source=rss&utm_medium=rss&utm_campaign=cisco-virl-pe-infrastructure-hack www.secnews.physaphae.fr/article.php?IdArticle=1739346 False Hack,Threat None None IT Security Guru - Blog Sécurité 25 million records leaked by Maths app Mathway 2020-05-28T10:23:54+00:00 https://www.itsecurityguru.org/2020/05/28/25-million-records-leaked-by-maths-app-mathway/?utm_source=rss&utm_medium=rss&utm_campaign=25-million-records-leaked-by-maths-app-mathway www.secnews.physaphae.fr/article.php?IdArticle=1738272 False Hack,Threat None None Dark Reading - Informationweek Branch 6 Steps Consumers Should Take Following a Hack 2020-05-27T09:30:00+00:00 https://www.darkreading.com/attacks-breaches/6-steps-consumers-should-take-following-a-hack/d/d-id/1337892?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple www.secnews.physaphae.fr/article.php?IdArticle=1736338 False Hack None None InformationSecurityBuzzNews - Site de News Securite Mathway Data Leak – Experts Commentary Mathway Data Leak – Experts Commentary]]> 2020-05-25T09:23:52+00:00 https://www.informationsecuritybuzz.com/expert-comments/mathway-data-leak-experts-commentary/ www.secnews.physaphae.fr/article.php?IdArticle=1731666 False Hack,Threat None None Security Affairs - Blog Secu Security Affairs newsletter Round 265 2020-05-24T12:39:10+00:00 https://securityaffairs.co/wordpress/103701/breaking-news/security-affairs-newsletter-round-265.html?utm_source=rss&utm_medium=rss&utm_campaign=security-affairs-newsletter-round-265 www.secnews.physaphae.fr/article.php?IdArticle=1729519 False Hack None None Bleeping Computer - Magazine Américain Online education site EduCBA discloses data breach after hack 2020-05-23T12:27:24+00:00 https://www.bleepingcomputer.com/news/security/online-education-site-educba-discloses-data-breach-after-hack/ www.secnews.physaphae.fr/article.php?IdArticle=1728132 False Data Breach,Hack None None InformationSecurityBuzzNews - Site de News Securite Experts Reaction On Japan Investigates Potential Leak of Prototype Missile Data in Mitsubishi Hack Experts Reaction On Japan Investigates Potential Leak of Prototype Missile Data in Mitsubishi Hack]]> 2020-05-22T08:12:42+00:00 https://www.informationsecuritybuzz.com/expert-comments/experts-reaction-on-japan-investigates-potential-leak-of-prototype-missile-data-in-mitsubishi-hack/ www.secnews.physaphae.fr/article.php?IdArticle=1725442 False Hack None None ZD Net - Magazine Info Japan investigates potential leak of prototype missile data in Mitsubishi hack 2020-05-21T11:21:41+00:00 https://www.zdnet.com/article/japan-investigates-potential-leak-of-prototype-missile-design-in-mitsubishi-hack/#ftag=RSSbaffb68 www.secnews.physaphae.fr/article.php?IdArticle=1722928 False Hack None None ZD Net - Magazine Info BlockFi discloses failed hack attempt after SIM swapping incident 2020-05-21T03:57:35+00:00 https://www.zdnet.com/article/blockfi-discloses-failed-hack-attempt-after-sim-swapping-incident/#ftag=RSSbaffb68 www.secnews.physaphae.fr/article.php?IdArticle=1722128 False Hack None None ZD Net - Magazine Info Hacker selling 40 million user records from popular Wishbone app 2020-05-20T23:07:17+00:00 https://www.zdnet.com/article/hacker-selling-40-million-user-records-from-popular-wishbone-app/#ftag=RSSbaffb68 www.secnews.physaphae.fr/article.php?IdArticle=1721632 False Hack None 3.0000000000000000 TechRepublic - Security News US Dark Web sees rise in postings selling access to corporate networks 2020-05-20T13:08:51+00:00 https://www.techrepublic.com/article/dark-web-sees-rise-in-postings-selling-access-to-corporate-networks/#ftag=RSS56d97e7 www.secnews.physaphae.fr/article.php?IdArticle=1720659 False Hack None None Security Affairs - Blog Secu Three flaws in Nitro Pro PDF reader expose businesses to hack 2020-05-20T09:03:30+00:00 https://securityaffairs.co/wordpress/103498/hacking/nitro-pro-pdf-flaws.html?utm_source=rss&utm_medium=rss&utm_campaign=nitro-pro-pdf-flaws www.secnews.physaphae.fr/article.php?IdArticle=1720119 False Hack,Threat None None Graham Cluley - Blog Security EasyJet hack impacts nine million passengers 2020-05-19T11:52:45+00:00 https://www.grahamcluley.com/easyjet-hack-impacts-nine-million-passengers/ www.secnews.physaphae.fr/article.php?IdArticle=1718172 False Hack None None Tech Worm - Desc Nintendo Sues Stores Selling New \'Team-Xecuter\' Switch Hack 2020-05-19T07:47:55+00:00 https://www.techworm.net/2020/05/nintendo-team-xecuter-switch-hack.html www.secnews.physaphae.fr/article.php?IdArticle=1717633 False Hack None 3.0000000000000000 Security Affairs - Blog Secu Experts reported the hack of several supercomputers across Europe 2020-05-17T14:34:29+00:00 https://securityaffairs.co/wordpress/103358/cyber-crime/supercomputers-hacked-across-eu.html?utm_source=rss&utm_medium=rss&utm_campaign=supercomputers-hacked-across-eu www.secnews.physaphae.fr/article.php?IdArticle=1714364 False Hack None None Graham Cluley - Blog Security Smashing Security #178: Office pranks, meat dresses, and robocop dogs 2020-05-13T23:01:05+00:00 https://www.grahamcluley.com/smashing-security-178/ www.secnews.physaphae.fr/article.php?IdArticle=1707911 False Hack None None Hacking Articles - Blog de Raj Chandel Hack the Box: Open Admin Box Walkthrough Continue reading → ]]> 2020-05-13T18:56:55+00:00 https://www.hackingarticles.in/hack-the-box-open-admin-box-walkthrough/ www.secnews.physaphae.fr/article.php?IdArticle=1707482 False Hack None None IT Security Guru - Blog Sécurité Private messages revealed in WeLeakData hack 2020-05-13T09:52:58+00:00 https://www.itsecurityguru.org/2020/05/13/private-messages-revealed-in-weleakdata-hack/?utm_source=rss&utm_medium=rss&utm_campaign=private-messages-revealed-in-weleakdata-hack www.secnews.physaphae.fr/article.php?IdArticle=1706501 False Hack None None 01net. Actualites - Securite - Magazine Francais Thunderspy, le hack qui met à mal la prise Thunderbolt ]]> 2020-05-11T09:46:02+00:00 https://www.01net.com/actualites/thunderspy-le-hack-qui-met-a-mal-la-prise-thunderbolt-1911933.html www.secnews.physaphae.fr/article.php?IdArticle=1702649 False Hack None None ZD Net - Magazine Info Hacker gains access to a small number of Microsoft\'s private GitHub repos 2020-05-08T02:12:37+00:00 https://www.zdnet.com/article/hacker-gains-access-to-a-small-number-of-microsofts-private-github-repos/#ftag=RSSbaffb68 www.secnews.physaphae.fr/article.php?IdArticle=1697945 False Hack None 5.0000000000000000 TechRepublic - Security News US Microsoft: We\'ll give you $100,000 if you can hack our Azure Sphere IoT platform 2020-05-07T11:56:01+00:00 https://www.techrepublic.com/article/microsoft-well-give-you-100000-if-you-can-hack-our-azure-sphere-iot-platform/#ftag=RSS56d97e7 www.secnews.physaphae.fr/article.php?IdArticle=1696783 False Hack None None Dark Reading - Informationweek Branch Microsoft Challenges Security Researchers to Hack Azure Sphere 2020-05-05T17:45:00+00:00 https://www.darkreading.com/threat-intelligence/microsoft-challenges-security-researchers-to-hack-azure-sphere/d/d-id/1337739?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple www.secnews.physaphae.fr/article.php?IdArticle=1693089 False Hack None None InformationSecurityBuzzNews - Site de News Securite Experts On News: Ghost Confirms Hack Attack – 750,000 Users Spooked By Critical Vulnerability Experts On News: Ghost Confirms Hack Attack – 750,000 Users Spooked By Critical Vulnerability]]> 2020-05-05T16:23:59+00:00 https://www.informationsecuritybuzz.com/expert-comments/experts-on-news-ghost-confirms-hack-attack-750000-users-spooked-by-critical-vulnerability/ www.secnews.physaphae.fr/article.php?IdArticle=1692626 True Hack,Vulnerability None None InformationSecurityBuzzNews - Site de News Securite Hackers Targeting UK Universities To Steal Coronavirus Research Hackers Targeting UK Universities To Steal Coronavirus Research]]> 2020-05-05T16:20:27+00:00 https://www.informationsecuritybuzz.com/expert-comments/hackers-targeting-uk-universities-to-steal-coronavirus-research/ www.secnews.physaphae.fr/article.php?IdArticle=1692627 False Hack None None ZD Net - Magazine Info German authorities charge Russian hacker for 2015 Bundestag hack 2020-05-05T11:06:27+00:00 https://www.zdnet.com/article/german-authorities-charge-russian-hacker-for-2015-bundestag-hack/#ftag=RSSbaffb68 www.secnews.physaphae.fr/article.php?IdArticle=1692038 False Hack None None Tech Worm - Desc Hacker leaks 15 million records from Tokopedia, Payment Info Secure: Reports 2020-05-04T12:21:16+00:00 https://www.techworm.net/2020/05/records-tokopedia-payment-info.html www.secnews.physaphae.fr/article.php?IdArticle=1690100 False Hack None None Security Affairs - Blog Secu Hackers are scanning the internet for vulnerable Salt installs, Ghost blogging platform hacked 2020-05-04T11:15:24+00:00 https://securityaffairs.co/wordpress/102718/hacking/salt-hacking-campaign-ghost-hacked.html www.secnews.physaphae.fr/article.php?IdArticle=1689845 False Hack None None IT Security Guru - Blog Sécurité Publishing platform Ghost confirms hack 2020-05-04T09:49:51+00:00 https://www.itsecurityguru.org/2020/05/04/publishing-platform-ghost-confirms-hack/?utm_source=rss&utm_medium=rss&utm_campaign=publishing-platform-ghost-confirms-hack www.secnews.physaphae.fr/article.php?IdArticle=1689708 False Hack None None InformationSecurityBuzzNews - Site de News Securite Expert Reaction On Chegg Confirms Third Hack In 3 Years Expert Reaction On Chegg Confirms Third Hack In 3 Years]]> 2020-04-30T14:56:27+00:00 https://www.informationsecuritybuzz.com/expert-comments/expert-reaction-on-chegg-confirms-third-hack-in-3-years/ www.secnews.physaphae.fr/article.php?IdArticle=1683802 False Hack None None Security Affairs - Blog Secu Google found zero-click vulnerabilities in Apple\'s multimedia processing components 2020-04-29T11:55:39+00:00 https://securityaffairs.co/wordpress/102459/hacking/apple-zero-click-vulnerabilities.html www.secnews.physaphae.fr/article.php?IdArticle=1681756 False Hack,Threat None None InformationSecurityBuzzNews - Site de News Securite Warwick University Hides Hack From Students And Staff – Experts Comments Warwick University Hides Hack From Students And Staff – Experts Comments]]> 2020-04-28T15:47:39+00:00 https://www.informationsecuritybuzz.com/expert-comments/warwick-university-hides-hack-from-students-and-staff-experts-comments/ www.secnews.physaphae.fr/article.php?IdArticle=1679895 False Hack None None IT Security Guru - Blog Sécurité ExecuPharm internal data published after ransomware hack 2020-04-28T10:12:57+00:00 https://www.itsecurityguru.org/2020/04/28/execupharm-internal-data-published-after-ransomware-hack/?utm_source=rss&utm_medium=rss&utm_campaign=execupharm-internal-data-published-after-ransomware-hack www.secnews.physaphae.fr/article.php?IdArticle=1679221 False Ransomware,Hack None None IT Security Guru - Blog Sécurité Students and staff not informed about Warwick University hack 2020-04-28T10:02:43+00:00 https://www.itsecurityguru.org/2020/04/28/students-and-staff-not-informed-about-warwick-university-hack/?utm_source=rss&utm_medium=rss&utm_campaign=students-and-staff-not-informed-about-warwick-university-hack www.secnews.physaphae.fr/article.php?IdArticle=1679094 False Hack None None Security Affairs - Blog Secu 100k+ WordPress sites exposed to hack due to a bug in Real-Time Find and Replace plugin 2020-04-28T09:03:11+00:00 https://securityaffairs.co/wordpress/102391/hacking/wordpress-real-time-find-and-replace-flaw.html www.secnews.physaphae.fr/article.php?IdArticle=1679014 False Hack,Vulnerability None None The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) How An Image Could\'ve Let Attackers Hack Microsoft Teams Accounts ]]> 2020-04-27T01:34:39+00:00 http://feedproxy.google.com/~r/TheHackersNews/~3/12xKLMv_jYc/microsoft-teams-vulnerability.html www.secnews.physaphae.fr/article.php?IdArticle=1677346 False Hack,Vulnerability None 4.0000000000000000 Tech Worm - Desc Nintendo Confirms At Least 160,000 Switch Accounts Were Hacked 2020-04-25T13:54:15+00:00 https://www.techworm.net/2020/04/nintendo-hack-switch-accounts.html www.secnews.physaphae.fr/article.php?IdArticle=1674973 False Hack None 4.0000000000000000 IT Security Guru - Blog Sécurité $5K Bug Bounties given to WHO 2020-04-24T09:24:27+00:00 https://www.itsecurityguru.org/2020/04/24/5k-bug-bounties-given-to-who/?utm_source=rss&utm_medium=rss&utm_campaign=5k-bug-bounties-given-to-who www.secnews.physaphae.fr/article.php?IdArticle=1673013 False Hack None None InformationSecurityBuzzNews - Site de News Securite Expert Insight On iPhone Zero-Day Hack Found In The Wild Expert Insight On iPhone Zero-Day Hack Found In The Wild]]> 2020-04-23T14:28:12+00:00 https://www.informationsecuritybuzz.com/expert-comments/expert-insight-on-iphone-zero-day-hack-found-in-the-wild/ www.secnews.physaphae.fr/article.php?IdArticle=1671952 False Hack,Vulnerability None None InformationSecurityBuzzNews - Site de News Securite Experts Comments On iPhone\'s Could Be Vulnerable To Email Software Hack Experts Comments On iPhone’s Could Be Vulnerable To Email Software Hack]]> 2020-04-23T14:07:11+00:00 https://www.informationsecuritybuzz.com/expert-comments/experts-comments-on-iphones-could-be-vulnerable-to-email-software-hack/ www.secnews.physaphae.fr/article.php?IdArticle=1671953 False Hack None None BBC - BBC News - Technology Apple iPhone at risk of hacking through email app 2020-04-23T03:41:48+00:00 https://www.bbc.co.uk/news/technology-52391759 www.secnews.physaphae.fr/article.php?IdArticle=1671031 False Hack None None Security Affairs - Blog Secu Hacking Apple iPhones and iPads by sending emails to the victims 2020-04-22T22:52:20+00:00 https://securityaffairs.co/wordpress/102076/hacking/iphone-zero-days.html www.secnews.physaphae.fr/article.php?IdArticle=1670770 False Hack None None ZD Net - Magazine Info Hackers have breached 60 ad servers to load their own malicious ads 2020-04-22T13:00:00+00:00 https://www.zdnet.com/article/hackers-have-breached-60-ad-servers-to-load-their-own-malicious-ads/#ftag=RSSbaffb68 www.secnews.physaphae.fr/article.php?IdArticle=1669761 False Hack None None The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Zero-Day Warning: It\'s Possible to Hack iPhones Just by Sending Emails ]]> 2020-04-22T09:14:29+00:00 http://feedproxy.google.com/~r/TheHackersNews/~3/sI68buta3Dk/zero-day-warning-its-possible-to-hack.html www.secnews.physaphae.fr/article.php?IdArticle=1670240 False Hack None None The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) New iPhone Hack is Being Exploited to Spy Uyghurs Muslims in China ]]> 2020-04-22T02:11:59+00:00 http://feedproxy.google.com/~r/TheHackersNews/~3/BslYHgvaExo/iphone-zero-day-exploit.html www.secnews.physaphae.fr/article.php?IdArticle=1669288 False Hack None 2.0000000000000000 Wired Threat Level - Security News A Vital Hack Could Turn Medical Devices Into Ventilators 2020-04-17T14:00:00+00:00 https://www.wired.com/story/a-vital-hack-could-turn-medical-devices-into-ventilators www.secnews.physaphae.fr/article.php?IdArticle=1660587 False Hack None None Security Affairs - Blog Secu Russia-linked Energetic Bear APT behind San Francisco airport attacks 2020-04-15T09:04:01+00:00 https://securityaffairs.co/wordpress/101601/apt/energetic-bear-airport-hack.html www.secnews.physaphae.fr/article.php?IdArticle=1656045 True Hack None None ZD Net - Magazine Info Russian state hackers behind San Francisco airport hack 2020-04-14T13:46:46+00:00 https://www.zdnet.com/article/russian-state-hackers-behind-san-francisco-airport-hack/#ftag=RSSbaffb68 www.secnews.physaphae.fr/article.php?IdArticle=1654357 False Hack None None Bleeping Computer - Magazine Américain Russian hackers tried to steal San Francisco airport Windows accounts 2020-04-14T10:14:14+00:00 https://www.bleepingcomputer.com/news/security/russian-hackers-tried-to-steal-san-francisco-airport-windows-accounts/ www.secnews.physaphae.fr/article.php?IdArticle=1654430 False Hack None None Security Affairs - Blog Secu SFO discloses data breach following the hack of 2 of its websites 2020-04-11T16:31:23+00:00 https://securityaffairs.co/wordpress/101435/data-breach/sfo-data-breach.html www.secnews.physaphae.fr/article.php?IdArticle=1648798 True Data Breach,Hack None None Security Affairs - Blog Secu CVE-2020-3952 flaw could allow attackers to hack VMware vCenter Server 2020-04-10T14:22:09+00:00 https://securityaffairs.co/wordpress/101388/security/cve-2020-3952-vmware-vcenter-server.html www.secnews.physaphae.fr/article.php?IdArticle=1646750 False Hack,Vulnerability None None Bleeping Computer - Magazine Américain San Francisco Intl Airport discloses data breach after hack 2020-04-10T12:14:22+00:00 https://www.bleepingcomputer.com/news/security/san-francisco-intl-airport-discloses-data-breach-after-hack/ www.secnews.physaphae.fr/article.php?IdArticle=1646956 False Data Breach,Hack None None ZD Net - Magazine Info SEC settles with two suspects in EDGAR hacking case 2020-04-10T10:04:43+00:00 https://www.zdnet.com/article/sec-settles-with-two-suspects-in-edgar-hacking-case/#ftag=RSSbaffb68 www.secnews.physaphae.fr/article.php?IdArticle=1646363 False Hack None None CSO - CSO Daily Dashboard 16 real-world phishing examples - and how to recognize them Image by ThinkstockEven though computer users are getting smarter, and the anti-phishing tools they use as protection are more accurate than ever, the scammers are still succeeding. Lured with promises of monetary gain or threats of financial or physical danger, people are being scammed out of tens of thousands of dollars. Corporations lose even more - tens of millions.]]> 2020-04-09T11:01:00+00:00 https://www.csoonline.com/article/3235520/15-real-world-phishing-examples-and-how-to-recognize-them.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=1645255 False Malware,Hack None None TechRepublic - Security News US These are the countries trying to hack US critical infrastructure 2020-04-06T14:46:50+00:00 https://www.techrepublic.com/article/these-are-the-countries-trying-to-hack-us-critical-infrastructure/#ftag=RSS56d97e7 www.secnews.physaphae.fr/article.php?IdArticle=1641253 False Hack,Threat None None Security Affairs - Blog Secu Hacking iPhone or MacBook devices by tricking into visiting a site 2020-04-03T22:45:12+00:00 https://securityaffairs.co/wordpress/101012/hacking/iphone-hack-camera.html www.secnews.physaphae.fr/article.php?IdArticle=1637010 False Hack None None Security Affairs - Blog Secu 100,000 WordPress sites using the Contact Form 7 Datepicker plugin are exposed to hack 2020-04-03T08:50:13+00:00 https://securityaffairs.co/wordpress/100972/hacking/contact-form-7-datepicker-plugin-hack.html www.secnews.physaphae.fr/article.php?IdArticle=1635723 False Hack,Vulnerability None None Errata Security - Errata Security About them Zoom vulns... Now is a good time to remind people to stop using the same password everywhere and to visit https://haveibeenpwned.com to view all the accounts where they've had their password stolen. Using the same password everywhere is the #1 vulnerability the average person is exposed to, and is a possible problem here. For critical accounts (Windows login, bank, email), use a different password for each. (Sure, for accounts you don't care about, use the same password everywhere, I use 'Foobar1234'). Write these passwords down on paper and put that paper in a secure location. Don't print them, don't store them in a file on  your computer. Writing it on a Post-It note taped under your keyboard is adequate security if you trust everyone in your household.If hackers use this Zoom method to steal your Windows password, then you aren't in much danger. They can't log into your computer because it's almost certainly behind a firewall. And they can't use the password on your other accounts, because it's not the same.Why you shouldn't worryThe reason you shouldn't worry about this password stealing problem is because it's everywhere, not just Zoom. It's also here in this browser you are using. If you click on file://hackme.robertgraham.com/foo/bar.html, then I can grab your password in exactly the same way as if you clicked on that vulnerable link in Zoom chat. That's how the Zoom bug works: hackers post these evil links in the chat window during a Zoom conference.It's hard to say Zoom has a vulnerability when so many other applications have the same issue.Many home ISPs block such connections to the Internet, such as Comcast, AT&TCox, Verizon Wireless, and others. If this is the case, when you click on the above link, nothing will happen. Your computer till try to contact hackme.robertgraham.com, and fail. You may be protected from clicking on the above link without doing anything. If your ISP doesn't block such connections, you can configure your home router to do this. Go into the firewall settings and block "TCP port 445 outbound". Alternatively, you can configure Windows to only follow such links internal to your home network, but not to the Internet.If hackers (like me if you click on the above link) gets your password, then they probably can't use use it. That's because while your home Internet router allows outbound connections, it (almost always) blocks inbound connections. Thus, if I steal your Windows password, I can't use it to log into your home computer unless I also break physically into your house. But if I can break into your computer physically, I can hack it without knowing your password.The same arguments apply to corporate desktops. Corporations should block such outbound connections. They ]]> 2020-04-02T01:23:55+00:00 https://blog.erratasec.com/2020/04/about-them-zoom-vulns.html www.secnews.physaphae.fr/article.php?IdArticle=1633464 False Hack,Vulnerability,Threat None None Hacking Articles - Blog de Raj Chandel How VPN Technology Protects Your Privacy from Hackers Continue reading → ]]> 2020-03-27T10:50:35+00:00 https://www.hackingarticles.in/how-vpn-technology-protects-your-privacy-from-hackers/ www.secnews.physaphae.fr/article.php?IdArticle=1622396 False Hack None 2.0000000000000000 Wired Threat Level - Security News An Elite Spy Group Used 5 Zero-Days to Hack North Koreans 2020-03-26T22:30:30+00:00 https://www.wired.com/story/north-korea-hacking-zero-days-google www.secnews.physaphae.fr/article.php?IdArticle=1621698 False Hack None None Hacking Articles - Blog de Raj Chandel Hack the Box: Wall Walkthrough Continue reading → ]]> 2020-03-26T07:02:03+00:00 https://www.hackingarticles.in/hack-the-box-wall-walkthrough/ www.secnews.physaphae.fr/article.php?IdArticle=1620379 False Hack None 5.0000000000000000 Malwarebytes Labs - MalwarebytesLabs Criminals hack Tupperware website with credit card skimmer This latest hack from Magecart threat actors was well planned and executed. Categories: Hacking Tags: (Read more...) ]]> 2020-03-25T15:00:00+00:00 https://blog.malwarebytes.com/hacking-2/2020/03/criminals-hack-tupperware-website-with-credit-card-skimmer/ www.secnews.physaphae.fr/article.php?IdArticle=1619452 False Hack,Threat None None IT Security Guru - Blog Sécurité Microsoft warns Windows users of unfixable hack attack 2020-03-25T11:10:13+00:00 https://www.itsecurityguru.org/2020/03/25/microsoft-warns-windows-users-of-unfixable-hack-attack/?utm_source=rss&utm_medium=rss&utm_campaign=microsoft-warns-windows-users-of-unfixable-hack-attack www.secnews.physaphae.fr/article.php?IdArticle=1619102 False Malware,Hack,Vulnerability None None Security Affairs - Blog Secu Fortune 500 tech giant General Electric (GE) discloses data breach after Canon hack 2020-03-24T14:46:51+00:00 https://securityaffairs.co/wordpress/100353/breaking-news/general-electric-data-breach.html www.secnews.physaphae.fr/article.php?IdArticle=1617619 True Data Breach,Hack None None Bleeping Computer - Magazine Américain Tech Giant GE Discloses Data Breach After Service Provider Hack 2020-03-23T17:47:19+00:00 https://www.bleepingcomputer.com/news/security/tech-giant-ge-discloses-data-breach-after-service-provider-hack/ www.secnews.physaphae.fr/article.php?IdArticle=1616459 False Data Breach,Hack None None Hacking Articles - Blog de Raj Chandel Hack the Box: Postman Walkthrough Continue reading → ]]> 2020-03-22T18:27:11+00:00 https://www.hackingarticles.in/hack-the-box-postman-walkthrough/ www.secnews.physaphae.fr/article.php?IdArticle=1614144 True Hack None None TechRepublic - Security News US Libya-based hackers using coronavirus pandemic to spread mobile surveillance malware 2020-03-18T21:36:25+00:00 https://www.techrepublic.com/article/libya-based-hackers-using-coronavirus-pandemic-to-spread-mobile-surveillance-malware/#ftag=RSS56d97e7 www.secnews.physaphae.fr/article.php?IdArticle=1605782 False Malware,Hack None None IT Security Guru - Blog Sécurité Government Blockchain Hacked in Argentina 2020-03-17T10:01:21+00:00 https://www.itsecurityguru.org/2020/03/17/government-blockchain-hacked-in-argentina/?utm_source=rss&utm_medium=rss&utm_campaign=government-blockchain-hacked-in-argentina www.secnews.physaphae.fr/article.php?IdArticle=1602358 False Hack None 4.0000000000000000 Security Affairs - Blog Secu Flaws in the Popup Builder WordPress plugin expose 100K+ websites to hack 2020-03-13T11:42:03+00:00 https://securityaffairs.co/wordpress/99533/hacking/popup-builder-wordpress-plugin-flaws.html www.secnews.physaphae.fr/article.php?IdArticle=1595282 False Hack None None Security Affairs - Blog Secu Hacking a network, using an \'invisibility cloak\' – Is it that simple? 2020-03-12T12:54:15+00:00 https://securityaffairs.co/wordpress/99465/hacking/hacking-a-network-invisibility-cloak.html www.secnews.physaphae.fr/article.php?IdArticle=1593424 False Hack None None Security Affairs - Blog Secu Avast disables the JavaScript engine component due to a severe issue 2020-03-11T23:26:39+00:00 https://securityaffairs.co/wordpress/99410/hacking/avast-javascript-engine-bug.html www.secnews.physaphae.fr/article.php?IdArticle=1592508 False Hack,Vulnerability None None Wired Threat Level - Security News The Secret History of a Cold War Mastermind 2020-03-11T13:12:44+00:00 https://www.wired.com/story/the-secret-history-of-a-cold-war-mastermind www.secnews.physaphae.fr/article.php?IdArticle=1592047 False Hack None None IT Security Guru - Blog Sécurité Nation-state groups hack Microsoft Exchange servers 2020-03-09T11:27:44+00:00 https://www.itsecurityguru.org/2020/03/09/nation-state-groups-hack-microsoft-exchange-servers/?utm_source=rss&utm_medium=rss&utm_campaign=nation-state-groups-hack-microsoft-exchange-servers www.secnews.physaphae.fr/article.php?IdArticle=1589511 False Hack,Vulnerability None None IT Security Guru - Blog Sécurité New research reveals Cerberus Malware easily preventable 2020-03-09T10:35:18+00:00 https://www.itsecurityguru.org/2020/03/09/new-research-reveals-cerberus-malware-easily-preventable/?utm_source=rss&utm_medium=rss&utm_campaign=new-research-reveals-cerberus-malware-easily-preventable www.secnews.physaphae.fr/article.php?IdArticle=1589402 False Malware,Hack None None Tech Worm - Desc 17-Yr-Old RCE Flaw Can Hack Several Linux Systems  2020-03-07T11:37:40+00:00 https://www.techworm.net/2020/03/17-yr-old-rce-flaw-can-hack-several-linux-systems.html www.secnews.physaphae.fr/article.php?IdArticle=1586492 False Hack,Vulnerability None None Errata Security - Errata Security Huawei backdoors explanation, explained #backdoor” seem frightening? That's because it's often used incorrectly – sometimes to deliberately create fear. Watch to learn the truth about backdoors and other types of network access. #cybersecurity pic.twitter.com/NEUXbZbcqw- Huawei (@Huawei) March 4, 2020This video seems in response to last month's story about Huawei misusing law enforcement backdoors from the Wall Street Journal. All telco equipment has backdoors usable only by law enforcement, the accusation is that Huawei has a backdoor into this backdoor, so that Chinese intelligence can use it.That story was bogus. Sure, Huawei is probably guilty of providing backdoor access to the Chinese government, but something is deeply flawed with this particular story.We know something is wrong with the story because the U.S. officials cited are anonymous. We don't know who they are or what position they have in the government. If everything they said was true, they wouldn't insist on being anonymous, but would stand up and declare it in a press conference so that every newspaper could report it. When something is not true or spun, then they anonymously "leak" it to a corrupt journalist to report it their way.This is objectively bad journalism. The Society of Professional Journalists calls this the "Washington Game". They also discuss this on their Code of Ethics page. Yes, it's really common in Washington D.C. reporting, you see it all the time, especially with the NYTimes, Wall Street Journal, and Washington Post. But it happens because what the government says is news, regardless of its false or propaganda, giving government officials the ability to influence journalists. Exclusive access to corrupt journalists is how they influence stories.We know the reporter is being especially shady because of the one quote in the story that is attributed to a named official:“We have evidence that Huawei has the capability secretly to access sensitive and personal information in systems it maintains and sells around the world,” said national security adviser Robert O'Brien. This quote is deceptive because O'Brien doesn't say any of the things that readers assume he's saying. He doesn't actually confirm any of the allegations in the rest of the story.It doesn't say.That Huawei has used that capability.That Huawei intentionally put that capability there.That this is special to Huawei (rather than everywhere in the industry).In fact, this quote applies to every telco equipment maker. They all have law enforcement backdoors. These backdoors always hve "controls" to prevent them from being misused. But these controls are always flawed, either in design or how they are used in the real world.Moreover, all telcos have maintenance/service contracts with the equipment makers. When there are ways around such controls, it's the company's own support engineers who will know them.I absolutely believe Huawei that it has don]]> 2020-03-06T15:57:01+00:00 https://blog.erratasec.com/2020/03/huawei-backdoors-explanation-explained.html www.secnews.physaphae.fr/article.php?IdArticle=1585376 False Hack,Threat None None Graham Cluley - Blog Security Police raid tech support scam centre who had their CCTV hacked by vigilantes 2020-03-04T12:26:32+00:00 https://www.grahamcluley.com/police-raid-tech-support-scam-centre/ www.secnews.physaphae.fr/article.php?IdArticle=1580651 False Hack Uber None Graham Cluley - Blog Security Cathay Pacific slammed for security failures following hack which exposed 9.4 million people worldwide 2020-03-04T11:47:24+00:00 https://hotforsecurity.bitdefender.com/blog/cathay-pacific-slammed-for-security-failures-following-hack-which-exposed-9-4-million-people-worldwide-22411.html#new_tab www.secnews.physaphae.fr/article.php?IdArticle=1580525 False Hack None None Tech Worm - Desc Hackers Can Hijack Siri, Google Assistant Using Ultrasonic Waves 2020-03-03T14:56:36+00:00 https://www.techworm.net/2020/03/hack-siri-google-assistant-ultrasonic-waves.html www.secnews.physaphae.fr/article.php?IdArticle=1579068 False Hack None None IT Security Guru - Blog Sécurité Hackers target WordPress zero-days plugins 2020-03-02T11:17:26+00:00 https://www.itsecurityguru.org/2020/03/02/hackers-target-wordpress-zero-days-plugins/?utm_source=rss&utm_medium=rss&utm_campaign=hackers-target-wordpress-zero-days-plugins www.secnews.physaphae.fr/article.php?IdArticle=1576419 False Hack None None Hacking Articles - Blog de Raj Chandel Hack the Box: Haystack Walkthrough Continue reading → ]]> 2020-02-29T05:27:02+00:00 https://www.hackingarticles.in/hack-the-box-haystack-walkthrough/ www.secnews.physaphae.fr/article.php?IdArticle=1571322 True Hack None None AlienVault Blog - AlienVault est un acteur de defense majeur dans les IOC Online payment security: 8 Steps to ensure safe transactions Data Security Standard – an internationally accepted standard for secure card payments with 12 security requirements. PCI Security Standards Council was established in 2006 for regulating payment brands and helping merchants secure financial data of customers. Regardless of the size of your business, compliance to the standard is important to ensure that you meet fundamental security requirements to process customer transactions. PCI SSC also provides online safety education to merchants and assists them in taking important steps to improve their website’s safety. They analyze your transaction system, find and fix vulnerabilities. Their compliance team then creates a report and shares it with all banks and card brands associated with your business. Compliance with PCI DSS means that your company has implemented and the requirements for card payment security. Ensure data encryption The second step towards enhancing online payment security is to use data encryption to keep customer’s financial information private. Nowadays with open WIFI networks, identity theft is prevalent and relatively an easy task for hackers if the data is unencrypted. Websites that your business deals with for online transactions should be valid and with legitimate operators. Data encryption ensures that your sensitive information is only viewed by the authorized parties and does not fall into wrong hands. It also reduces password-hacking likelihood to a great extent. All these features combined proved an additional protection layer for customers during the transaction. Keep your network updated Hackers regularly come up with new ways to hack into systems, and while your network may be safe from them today, it may not be tomorrow. For this reason, it is really important that your business’s computer networks have security updates regularly installed on them. The best way is to sign up for automatic system updates to stay a step ahead from new threats. Automatic update will ensure that all important safeguards are installed, the absence of w]]> 2020-02-27T13:00:00+00:00 https://feeds.feedblitz.com/~/619133740/0/alienvault-blogs~Online-payment-security-Steps-to-ensure-safe-transactions www.secnews.physaphae.fr/article.php?IdArticle=1568638 False Hack,Vulnerability None None IT Security Guru - Blog Sécurité Clearview AI, Hacked 2020-02-27T10:24:14+00:00 https://www.itsecurityguru.org/2020/02/27/clearview-ai-hacked/?utm_source=rss&utm_medium=rss&utm_campaign=clearview-ai-hacked www.secnews.physaphae.fr/article.php?IdArticle=1568401 False Hack None None BBC - BBC News - Technology Redcar council IT hack confirmed as ransomware attack 2020-02-26T18:01:25+00:00 https://www.bbc.co.uk/news/uk-england-tees-51651405 www.secnews.physaphae.fr/article.php?IdArticle=1567380 False Ransomware,Hack None None TechRepublic - Security News US How to hack an election without touching a voting machine 2020-02-25T18:23:00+00:00 https://www.techrepublic.com/article/how-to-hack-an-election-without-touching-a-voting-machine/#ftag=RSS56d97e7 www.secnews.physaphae.fr/article.php?IdArticle=1565278 False Hack None 3.0000000000000000 InformationSecurityBuzzNews - Site de News Securite Ordnance Survey Hack – Expert Reaction Ordnance Survey Hack – Expert Reaction]]> 2020-02-25T13:49:16+00:00 https://www.informationsecuritybuzz.com/expert-comments/ordnance-survey-hack-expert-reaction/ www.secnews.physaphae.fr/article.php?IdArticle=1564772 False Hack None None AlienVault Blog - AlienVault est un acteur de defense majeur dans les IOC How to harden your employees from the massive social engineering threat Leading Cyber Ladies meetup in Toronto recently, where threat research expert Sherrod DeGrippo visited all the way from Atlanta to talk about how cyber threats often work these days, and what their attack chains are like. I had the idea to write about social engineering before I attended the meeting, but I wasn’t expecting to do research for this post by attending it. It was just a very fortunate coincidence that DeGrippo said some things about social engineering that really captured my attention. After the meeting, we had a quick chat and followed each other on Twitter. During her talk at the meeting, DeGrippo mentioned how she sees a lot of cyber attackers, from APTs to script kiddies, target human beings as an initial attack vector a lot more often than they used to. She said doing reconnaissance for a corporate network is very difficult, whereas doing reconnaissance on a person is a lot easier. We post about ourselves on social media all the time. We talk about the places we’ve visited and the things we like on Twitter. We talk about who our family and friends are on Facebook. And we tell LinkedIn our job titles, who we work for, and what we do there. An individual who works for a targeted company has privileged access to their networks and to their physical buildings. Socially engineer them, and you can get malware on their systems to send sensitive data to a command and control server, or you could possibly walk into an employees-only area of an office. The other thing she discussed which intrigued me is that she sees information security professionals targeted for social engineering attacks more often than ever before, and how we can be really lucrative for social engineering exploitation. Contrary to us thinking that we know better, it often works! I asked DeGrippo about it. She said: "Yes, targeting infosec professionals is my big concern lately. The more sophisticated actors are doing really specific targeting. This includes people in security roles and lots of people in software development roles. There is so much info out there. A job offer, a security report, a discussion of a new technology and a code snippet-- all potential social engineering lures to send to technical people with privileged access.” I said, “Maybe some of us are way too confident. That confidence can be dangerous.” "… totally. I worry about that. I worry that as an industry we are so focused on protecting others that we let our own opsec (operational security) slip or we just don’t have time to focus on it as much. It’s not really hubris in most cases, it’s just forgetting to do a threat model on ourselves.” She also spoke to me about how cyber attackers often choose their social engineering targets. “The thing I like to do is get into the psychology of a threat actor. If I could be anyone I wanted to be, but only online, who would I choose? A software dev at a fancy car company? I could hack some luxury car software to unlock for me anytime, anywhere!  A junior HR admin at a large company? Steal a ton of identity and payroll data! Maybe I would be a fancy CFO’s assistant and make changes to deposit instructions for invoices to my own mule account ]]> 2020-02-25T13:00:00+00:00 https://feeds.feedblitz.com/~/619020986/0/alienvault-blogs~How-to-harden-your-employees-from-the-massive-social-engineering-threat www.secnews.physaphae.fr/article.php?IdArticle=1564782 False Malware,Hack,Threat,Guideline None None IT Security Guru - Blog Sécurité MGM Hotel Hack Leaves 10.6M Guests\' Personal Data Exposed 2020-02-21T15:09:46+00:00 https://www.itsecurityguru.org/2020/02/21/mgm-hotel-hack-leaves-10-6m-guests-personal-data-exposed/?utm_source=rss&utm_medium=rss&utm_campaign=mgm-hotel-hack-leaves-10-6m-guests-personal-data-exposed www.secnews.physaphae.fr/article.php?IdArticle=1557218 False Hack None None IT Security Guru - Blog Sécurité White House communications data hack 2020-02-21T11:11:05+00:00 https://www.itsecurityguru.org/2020/02/21/white-house-communications-data-hack/?utm_source=rss&utm_medium=rss&utm_campaign=white-house-communications-data-hack www.secnews.physaphae.fr/article.php?IdArticle=1556677 False Hack None None BBC - BBC News - Technology ISS World: Hack leaves half a million employees without computers 2020-02-20T11:34:38+00:00 https://www.bbc.co.uk/news/technology-51572575 www.secnews.physaphae.fr/article.php?IdArticle=1554249 False Ransomware,Hack None None BBC - BBC News - Technology MGM hack exposes personal data of 10.6 million guests 2020-02-20T03:36:00+00:00 https://www.bbc.co.uk/news/technology-51568885 www.secnews.physaphae.fr/article.php?IdArticle=1553145 False Hack None 4.0000000000000000 Hacking Articles - Blog de Raj Chandel Hack the Box: Networked Walkthrough Continue reading → ]]> 2020-02-19T07:24:09+00:00 https://www.hackingarticles.in/hack-the-box-networked-walkthrough/ www.secnews.physaphae.fr/article.php?IdArticle=1551095 True Hack None None