www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-03T12:17:44+00:00 www.secnews.physaphae.fr SonarSource - Blog Sécu et Codage Assurer la bonne utilisation de Java 21 nouvelles fonctionnalités<br>Ensuring the right usage of Java 21 new features Last September 2023 Java 21 was released as the latest LTS (Long Time Support). But taking advantage of the changes and new features, which we are not used to including in our code, can be a tough task. Also, it can lead to improper use or poor uptake, bugs, or basically not taking full advantage of new improvements.]]> 2024-04-01T22:00:00+00:00 https://www.sonarsource.com/blog/ensuring-the-right-usage-of-java-21-new-features www.secnews.physaphae.fr/article.php?IdArticle=8479385 False None None 2.0000000000000000 Dark Reading - Informationweek Branch XZ utilise la porte dérobée implantée dans une attaque de chaîne d'approvisionnement soigneusement exécutée et soigneusement exécutée<br>XZ Utils Backdoor Implanted in Carefully Executed, Multiyear Supply Chain Attack Had a Microsoft developer not spotted the malware when he did, the outcome could have been much worse.]]> 2024-04-01T21:25:52+00:00 https://www.darkreading.com/cyber-risk/xz-utils-backdoor-implanted-in-intricate-multi-year-supply-chain-attack www.secnews.physaphae.fr/article.php?IdArticle=8474250 False Malware None 3.0000000000000000 Dark Reading - Informationweek Branch Les cybercriminels pèsent les options pour l'utilisation de LLMS: acheter, construire ou casser?<br>Cybercriminals Weigh Options for Using LLMs: Buy, Build, or Break? While some cybercriminals have bypassed guardrails to force legitimate AI models to turn bad, building their own malicious chatbot platforms and making use of open source models are a greater threat.]]> 2024-04-01T20:52:40+00:00 https://www.darkreading.com/threat-intelligence/cybercriminals-options-lms-buy-build-break www.secnews.physaphae.fr/article.php?IdArticle=8474223 False Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Le site de déchets nucléaires de sellafield étendus poursuivi pour défaillance de la cybersécurité<br>Sprawling Sellafield Nuclear Waste Site Prosecuted for Cybersecurity Failings UK regulator said that one of the world\'s most toxic sites accumulated cybersecurity "offenses" from 2019 to 2023.]]> 2024-04-01T20:24:18+00:00 https://www.darkreading.com/ics-ot-security/sellafield-nuclear-waste-site-prosecuted-cybersecurity-failings www.secnews.physaphae.fr/article.php?IdArticle=8474224 False Legislation,Prediction None 3.0000000000000000 Recorded Future - FLux Recorded Future Backlog de base de données de vulnérabilité due à une augmentation du volume, des changements dans le support \\ ', \\' nist dit<br>Vulnerability database backlog due to increased volume, changes in \\'support,\\' NIST says L'Institut national des normes et de la technologie (NIST) a blâmé l'augmentation du volume des logiciels et «un changement de support interinstitutions» pour le récent arriéré de vulnérabilités analysées dans la base de données nationale de vulnérabilité de l'organisation (NVD).Pendant des années, le NVD est une ressource inestimable pour les experts et les défenseurs de la cybersécurité qui comptent sur
The National Institute of Standards and Technology (NIST) blamed increases in the volume of software and “a change in interagency support” for the recent backlog of vulnerabilities analyzed in the organization\'s National Vulnerability Database (NVD). For years, the NVD has been an invaluable resource for cybersecurity experts and defenders who rely on it for]]>
2024-04-01T20:17:13+00:00 https://therecord.media/vulnerability-database-backlog-nist-support www.secnews.physaphae.fr/article.php?IdArticle=8474225 False Vulnerability None 2.0000000000000000
RiskIQ - cyber risk firms (now microsoft) Rescoms monte des vagues de spam d'acceptor<br>Rescoms Rides Waves of AceCryptor Spam #### Description ESET research shares insights into AceCryptor, one of the most popular and prevalent cryptors-as-a-service (CaaS) in the second half of 2023, with a focus on Rescoms campaigns in European countries. Even though well known by security products, AceCryptor\'s prevalence is not showing indications of decline: on the contrary, the number of attacks significantly increased due to the Rescoms campaigns. The threat actor behind those campaigns in some cases abused compromised accounts to send spam emails in order to make them look as credible as possible. The goal of the spam campaigns was to obtain credentials stored in browsers or email clients, which in case of a successful compromise would open possibilities for further attacks. #### Reference URL(s) 1. https://www.welivesecurity.com/en/eset-research/rescoms-rides-waves-acecryptor-spam/ #### Publication Date March 20, 2024 #### Author(s) Jakub Kaloč ]]> 2024-04-01T20:02:08+00:00 https://community.riskiq.com/article/e3595388 www.secnews.physaphae.fr/article.php?IdArticle=8474239 False Spam,Threat None 2.0000000000000000 Global Security Mag - Site de news francais Février 2025 Calendrier ]]> 2024-04-01T20:00:00+00:00 https://www.globalsecuritymag.fr/fevrier-2025.html www.secnews.physaphae.fr/article.php?IdArticle=8472638 False Conference None 3.0000000000000000 Dark Reading - Informationweek Branch AT & t confirme 73 millions de clients affectés dans la fuite de données<br>AT&T Confirms 73M Customers Affected in Data Leak AT&T denies any evidence of unauthorized access but admits that a data set released on the Dark Web including Social Security numbers and other sensitive information on tens of millions of customers is genuine.]]> 2024-04-01T19:51:05+00:00 https://www.darkreading.com/remote-workforce/att-confirms-73m-customers-affected-data-leak www.secnews.physaphae.fr/article.php?IdArticle=8474196 False None None 2.0000000000000000 PaloAlto Vunerability - PaloAlto Vunerability CVE-2024-3094 Information: Impact du code malveillant dans les outils et bibliothèques XZ (CVE-2024-3094) (Gravité: Aucun)<br>CVE-2024-3094 Informational: Impact of Malicious Code in XZ Tools and Libraries (CVE-2024-3094) (Severity: NONE) 2024-04-01T19:30:00+00:00 https://security.paloaltonetworks.com/CVE-2024-3094 www.secnews.physaphae.fr/article.php?IdArticle=8474193 False Tool None None Global Security Mag - Site de news francais Mars 2025 calendrier
3 - 5 mars - Sydney ( Australie) Gartner Security & Risk Management Summit www.gartner.com/en/conferences/apac/security-risk-management-australia 5 - 6 mars - Barcelone (Espagne) Mobile World Congress www.mobileworldcongress.com 11 - 13 mars - Baton Rouge - Louisiane (USA) Critical Infrastructure Protection & Resilience North America www.ciprna-expo.com 12 - 13 mars - Londres (UK) Cloud Expo Europe & Data Centre World & Smart IOT Lieu : Centre d\'exposition d\'ExCel (...) - Calendrier ]]>
2024-04-01T19:30:00+00:00 https://www.globalsecuritymag.fr/mars-2025.html www.secnews.physaphae.fr/article.php?IdArticle=8472639 False Mobile,Cloud,Conference None 3.0000000000000000
Korben - Bloger francais The Pirate Bay – Le plus vieux torrent actif fête ses 20 ans 2024-04-01T19:28:40+00:00 https://korben.info/pirate-bay-20-ans-partage-survie-plus-vieux-torrent-actif.html www.secnews.physaphae.fr/article.php?IdArticle=8474199 False None None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Le gouvernement indien sauve 250 citoyens forcés de participer à la cybercriminalité au Cambodge<br>Indian Government Rescues 250 Citizens Forced into Cybercrime in Cambodia The Indian government said it has rescued and repatriated about 250 citizens in Cambodia who were held captive and coerced into running cyber scams. The Indian nationals "were lured with employment opportunities to that country but were forced to undertake illegal cyber work," the Ministry of External Affairs (MEA) said in a statement, adding it had rescued 75 people in the past three]]> 2024-04-01T19:21:00+00:00 https://thehackernews.com/2024/04/indian-government-rescues-250-citizens.html www.secnews.physaphae.fr/article.php?IdArticle=8474075 False None None 4.0000000000000000 Global Security Mag - Site de news francais Mars 2025<br>March 2025 intime
3 - 5 March - Sydney ( Australia) Gartner Security & Risk Management Summit www.gartner.com/en/conferences/apac/security-risk-management-australia 5 - 6 March - Barcelona (Spain) Mobile World Congress www.mobileworldcongress.com 11 - 13 mars - Baton Rouge - Louisiane (USA) Critical Infrastructure Protection & Resilience North America www.ciprna-expo.com 12 - 13 March - London (UK) Cloud Expo Europe & Data Centre World & Smart IOT Place: Centre d\'exposition d\'ExCel (...) - Diary]]>
2024-04-01T19:15:00+00:00 https://www.globalsecuritymag.fr/march-2025.html www.secnews.physaphae.fr/article.php?IdArticle=8472822 False Mobile,Cloud,Conference None 3.0000000000000000
Korben - Bloger francais ChatGPT est maintenant accessible sans compte 2024-04-01T19:10:18+00:00 https://korben.info/chatgpt-accessible-sans-compte-avancee-majeure-ia-conversationnelle.html www.secnews.physaphae.fr/article.php?IdArticle=8474200 False None ChatGPT 2.0000000000000000 Recorded Future - FLux Recorded Future \\ 'Organisation de cybercriminalité \\' a volé les données des clients et des employés, dit le géant de la navigation<br>\\'Cybercrime organization\\' stole customer and employee data, boating giant says Les pirates ont pu accéder aux données des serveurs de l'un des plus grands vendeurs de bateaux du monde au cours d'une attaque le mois dernier, a confirmé la société.Marinemax a déposé lundi un rapport mis à jour aux régulateurs de la Securities and Exchange Commission avertissant que les informations sur les clients et les employés ont été volées au cours de l'incident.Le ransomware de Rhysida
Hackers were able to access data from the servers of one of the world\'s largest boat sellers during an attack last month, the company confirmed. MarineMax filed an updated report to regulators at the Securities and Exchange Commission on Monday warning that customer and employee information was stolen during the incident. The Rhysida ransomware]]>
2024-04-01T19:09:57+00:00 https://therecord.media/cybercrime-organization-stole-customer-data-sec-marinemax www.secnews.physaphae.fr/article.php?IdArticle=8474198 False Ransomware None 2.0000000000000000
TroyHunt - Blog Security AT&T reconnaît la fuite de données qui a frappé 73 millions d'utilisateurs actuels et anciens<br>AT&T acknowledges data leak that hit 73 million current and former users Data leak hit 7.6 million current AT&T users, 65.4 million former subscribers.]]> 2024-04-01T19:01:02+00:00 https://arstechnica.com/?p=2014073 www.secnews.physaphae.fr/article.php?IdArticle=8474168 False None None 2.0000000000000000 Recorded Future - FLux Recorded Future Les pertes liées aux escroqueries d'identité supérieure à 1 milliard de dollars par an, la FTC dit<br>Losses linked to impersonation scams top $1 billion yearly, FTC says Un type de fraude classique - lorsqu'un escroc imite une entreprise ou une agence gouvernementale - semble être plus grand que jamais, selon les statistiques fédérales, et elle est désormais la plus susceptible de commencer par SMS ou par e-mail au lieu d'un appel téléphonique.Des escroqueries d'identité signalées à la Federal Trade Commission des victimes de coûts
A classic type of fraud - when a crook impersonates a business or a government agency - appears to be bigger than ever, according to federal statistics, and it\'s now most likely to begin via text message or email instead of a phone call. Impersonation scams reported to the Federal Trade Commission cost victims]]>
2024-04-01T18:53:23+00:00 https://therecord.media/impersonation-scam-losses-top-1-billion www.secnews.physaphae.fr/article.php?IdArticle=8474172 False None None 2.0000000000000000
HackRead - Chercher Cyber Craintes de sécurité des données: le Congrès interdit l'utilisation du personnel de Microsoft \\'s Copilot<br>Data Security Fears: Congress Bans Staff Use of Microsoft\\'s AI Copilot waqas Microsoft a reconnu les préoccupations! Ceci est un article de HackRead.com Lire le post original: Craintes de sécurité des données: le Congrès interdit l'utilisation du personnel de Microsoft & # 8217; s Copilot
By Waqas Microsoft has acknowledged the concerns! This is a post from HackRead.com Read the original post: Data Security Fears: Congress Bans Staff Use of Microsoft’s AI Copilot]]>
2024-04-01T18:10:23+00:00 https://www.hackread.com/us-congress-bans-staff-microsoft-ai-copilot/ www.secnews.physaphae.fr/article.php?IdArticle=8474171 False None None 2.0000000000000000
Recorded Future - FLux Recorded Future Fcc à sonder \\ 'grave \\' faiblesses dans l'infrastructure du réseau téléphonique<br>FCC to probe \\'grave\\' weaknesses in phone network infrastructure La Federal Communications Commission (FCC) dit qu'elle prend des mesures pour traiter des faiblesses importantes dans les réseaux de télécommunications qui peuvent permettre la cybercriminalité et l'espionnage. & NBSP;L'agence enquête sur la façon dont les vulnérabilités dans le système de signalisation des protocoles n ° 7 (SS7) et le diamètre - qui permettent conjointement les appels téléphoniques \\ 'et les messages texte \' à travers les réseaux - peuvent permettre
The Federal Communications Commission (FCC) says it is taking action to address significant weaknesses in telecommunications networks that can enable cybercrime and spying.  The agency is investigating how vulnerabilities in the protocols Signaling System No. 7 (SS7) and Diameter - which jointly enable phone calls\' and text messages\' movement across networks - can allow]]>
2024-04-01T17:50:30+00:00 https://therecord.media/fcc-ss7-diameter-protocols-investigation www.secnews.physaphae.fr/article.php?IdArticle=8474146 False Vulnerability None 2.0000000000000000
HackRead - Chercher Cyber Après le déni, AT&T confirme la violation des données affectant 73 millions d'utilisateurs<br>After Denial, AT&T Confirms Data Breach Affecting 73 Million Users waqas Texte corrigé: Un autre jour, une autre violation de données massive affectant l'infrastructure critique aux États-Unis! Ceci est un article de HackRead.com Lire le post original: Après le déni, AT & # 038; t confirme la violation des données affectant 73 millions d'utilisateurs
By Waqas Corrected text: Another day, another massive data breach affecting critical infrastructure in the United States! This is a post from HackRead.com Read the original post: After Denial, AT&T Confirms Data Breach Affecting 73 Million Users]]>
2024-04-01T17:26:00+00:00 https://www.hackread.com/att-confirms-data-breach-73-million-users/ www.secnews.physaphae.fr/article.php?IdArticle=8474145 False Data Breach None 3.0000000000000000
McAfee Labs - Editeur Logiciel Attention aux escroqueries IRS et évitez le vol d'identité<br>Watch Out For IRS Scams and Avoid Identity Theft Il est temps de préparer ces formulaires fiscaux W-2 et 1099.Le 29 janvier, l'IRS a commencé à accepter du papier et ...
> It\'s time to get those W-2 and 1099 tax forms ready. On January 29th, the IRS began accepting paper and... ]]>
2024-04-01T16:52:22+00:00 https://www.mcafee.com/blogs/privacy-identity-protection/tax-season-scams-identity-theft/ www.secnews.physaphae.fr/article.php?IdArticle=8474169 False None None 2.0000000000000000
The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Détecter les logiciels malveillants à base de fenêtres grâce à une meilleure visibilité<br>Detecting Windows-based Malware Through Better Visibility Despite a plethora of available security solutions, more and more organizations fall victim to Ransomware and other threats. These continued threats aren\'t just an inconvenience that hurt businesses and end users - they damage the economy, endanger lives, destroy businesses and put national security at risk. But if that wasn\'t enough – North Korea appears to be using revenue from cyber]]> 2024-04-01T16:50:00+00:00 https://thehackernews.com/2024/04/detecting-windows-based-malware-through.html www.secnews.physaphae.fr/article.php?IdArticle=8474025 False Ransomware,Malware None 2.0000000000000000 Cisco - Security Firm Blog Crypto-monnaie et diligence raisonnable de la sécurité de la blockchain: un guide pour cacher le risque<br>Cryptocurrency and Blockchain security due diligence: A guide to hedge risk Blockchain adoption and crypto investments are peaking, along with scams. Ensure safety in this bull run by being diligent.]]> 2024-04-01T16:30:07+00:00 https://feedpress.me/link/23535/16637073/cryptocurrency-and-blockchain-security-due-diligence-a-guide-to-hedge-risk www.secnews.physaphae.fr/article.php?IdArticle=8474144 False None None 2.0000000000000000 Recorded Future - FLux Recorded Future L'Inde dit qu'elle a sauvé 250 citoyens du cyber-esclavie cambodgien<br>India says it has rescued 250 citizens from Cambodian cyber slavery Le gouvernement indien dit qu'il a sauvé 250 citoyens du Cambodge, où ils ont été attirés par des opportunités d'emploi, puis contraints de réaliser la cyber fraude.Samedi, le ministère des Affaires extérieures de l'Inde a répondu aux rapports des médias locaux sur les Indiens piégés au Cambodge, affirmant qu'ils collaboraient étroitement avec les autorités cambodgiennes pour les sauver.
The Indian government says it has rescued 250 citizens from Cambodia, where they were enticed by job opportunities and then forced to carry out cyber fraud. On Saturday, India\'s Ministry of External Affairs responded to local media reports about Indians trapped in Cambodia, saying they are closely collaborating with Cambodian authorities to rescue them.]]>
2024-04-01T16:09:16+00:00 https://therecord.media/india-rescued-cambodia-scam-centers-citizens www.secnews.physaphae.fr/article.php?IdArticle=8474122 False None None 2.0000000000000000
SecurityWeek - Security News \\ 'wallescape \\' linux vulnérabilité fuite des mots de passe utilisateur<br>\\'WallEscape\\' Linux Vulnerability Leaks User Passwords A vulnerability in util-linux, a core utilities package in Linux systems, allows attackers to leak user passwords and modify the clipboard. ]]> 2024-04-01T16:06:25+00:00 https://www.securityweek.com/wallescape-linux-vulnerability-leaks-user-passwords/ www.secnews.physaphae.fr/article.php?IdArticle=8474120 False Vulnerability None 2.0000000000000000 Securonix - Siem Cybersecurity Symphony: Securonix ajoute des capacités de soar intégrées<br>Cybersecurity Symphony: Securonix Adds Embedded SOAR Capabilities In DevOps, compliance ensures that software development and delivery are secure and trustworthy. And to ensure companies follow compliance regulations, audits are performed by external vendors (usually, but companies may have internal audits as well). Compliance involves adhering to established security policies, regulatory requirements, and industry standards throughout the development lifecycle.]]> 2024-04-01T15:54:33+00:00 https://www.securonix.com/blog/embedded-soar-capabilities/ www.secnews.physaphae.fr/article.php?IdArticle=8474214 False None None 2.0000000000000000 SecurityWeek - Security News \\ 'Vultur \\' malware Android obtient des capacités d'interaction approfondies<br>\\'Vultur\\' Android Malware Gets Extensive Device Interaction Capabilities NCC Group researchers warn that the Android banking malware \'Vultur\' has been updated with device interaction and file tampering capabilities. ]]> 2024-04-01T15:52:06+00:00 https://www.securityweek.com/vultur-android-malware-gets-extensive-device-interaction-capabilities/ www.secnews.physaphae.fr/article.php?IdArticle=8474121 False Malware,Mobile None 3.0000000000000000 knowbe4 - cybersecurity services Tire détournant l'attaque de phishing cible Journaliste de Pennsylvanie<br>Thread Hijacking Phishing Attack Targets Pennsylvania Journalist thread hijacking cible cible d'attaque de filPennsylvania Journalist Un journaliste en Pennsylvanie a été ciblé par Phishing Attaques qui impliquaient le détournement de fil, selon Brian Krebs à KrebsSonecure.
Thread Hijacking Attack Targets Pennsylvania Journalist A journalist in Pennsylvania was targeted by phishing attacks that involved thread hijacking, according to Brian Krebs at KrebsOnSecurity.]]>
2024-04-01T15:43:16+00:00 https://blog.knowbe4.com/thread-hijacking-phishing-targets-journalist www.secnews.physaphae.fr/article.php?IdArticle=8474097 False None None 3.0000000000000000
The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les applications malveillantes ont été capturées secrètement transformant les téléphones Android en procurations pour les cybercriminels<br>Malicious Apps Caught Secretly Turning Android Phones into Proxies for Cybercriminals Several malicious Android apps that turn mobile devices running the operating system into residential proxies (RESIPs) for other threat actors have been observed on the Google Play Store. The findings come from HUMAN\'s Satori Threat Intelligence team, which said the cluster of VPN apps came fitted with a Golang library that transformed the user\'s device into a proxy node without their knowledge.]]> 2024-04-01T15:40:00+00:00 https://thehackernews.com/2024/04/malicious-apps-caught-secretly-turning.html www.secnews.physaphae.fr/article.php?IdArticle=8473977 False Threat,Mobile Satori 2.0000000000000000 CybeReason - Vendor blog Podcast de vie malveillante: le Y2K Bug Pt.1<br>Malicious Life Podcast: The Y2K Bug Pt. 1 2024-04-01T15:32:50+00:00 https://www.cybereason.com/blog/malicious-life-podcast-the-y2k-bug-part-1 www.secnews.physaphae.fr/article.php?IdArticle=8474095 False None None 2.0000000000000000 Bleeping Computer - Magazine Américain OWASP révèle la violation des données causée par une mauvaise configuration du wiki<br>OWASP discloses data breach caused by wiki misconfiguration The OWASP Foundation has disclosed a data breach after some members\' resumes were exposed online due to a misconfiguration of its old Wiki web server. [...]]]> 2024-04-01T15:25:44+00:00 https://www.bleepingcomputer.com/news/security/owasp-discloses-data-breach-caused-by-wiki-misconfiguration/ www.secnews.physaphae.fr/article.php?IdArticle=8474195 False Data Breach None 2.0000000000000000 Bleeping Computer - Magazine Américain Le détaillant de yachts Marinemax révèle la violation des données après la cyberattaque<br>Yacht retailer MarineMax discloses data breach after cyberattack MarineMax, self-described as one of the world\'s largest recreational boat and yacht retailers, says attackers stole employee and customer data after breaching its systems in a March cyberattack. [...]]]> 2024-04-01T14:37:49+00:00 https://www.bleepingcomputer.com/news/security/yacht-retailer-marinemax-discloses-data-breach-after-cyberattack/ www.secnews.physaphae.fr/article.php?IdArticle=8474170 False Data Breach None 2.0000000000000000 Schneier on Security - Chercheur Cryptologue Américain Poussière de sécurité magique<br>Magic Security Dust poussière de sécurité magique . Il est à peu près de temps que quelqu'un commercialise cette technologie essentielle.
Adam Shostack is selling magic security dust. It’s about time someone is commercializing this essential technology.]]>
2024-04-01T14:19:54+00:00 https://www.schneier.com/blog/archives/2024/04/magic-security-dust.html www.secnews.physaphae.fr/article.php?IdArticle=8474076 False None None 2.0000000000000000
RedCanary - Red Canary Faire équipe avec Microsoft Copilot pour la sécurité<br>Teaming with Microsoft Copilot for Security Learn how our new plugin will enhance the power of Copilot for Security for our joint Red Canary + Microsoft customers.]]> 2024-04-01T14:06:33+00:00 https://redcanary.com/blog/microsoft-copilot-for-security/ www.secnews.physaphae.fr/article.php?IdArticle=8474045 False None None 2.0000000000000000 Dark Reading - Informationweek Branch L'Inde rapatrie les citoyens dupés dans un travail de cyber-fraude forcé au Cambodge<br>India Repatriates Citizens Duped Into Forced Cyber Fraud Labor in Cambodia So far some 250 citizens have been rescued and returned to India after being lured to Cambodia in an phony employment scheme.]]> 2024-04-01T14:05:50+00:00 https://www.darkreading.com/cyberattacks-data-breaches/india-repatriates-citizens-duped-into-forced-cyber-fraud-cambodia www.secnews.physaphae.fr/article.php?IdArticle=8474047 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Collaboration nécessaire pour lutter contre les ransomwares<br>Collaboration Needed to Fight Ransomware A global proactive and collaborative approach to cybersecurity, not just in public/private partnerships, is key to fighting back against increasingly professional ransomware gangs.]]> 2024-04-01T14:00:00+00:00 https://www.darkreading.com/vulnerabilities-threats/collaboration-needed-to-fight-ransomware www.secnews.physaphae.fr/article.php?IdArticle=8474048 False Ransomware None 2.0000000000000000 RiskIQ - cyber risk firms (now microsoft) Faits saillants hebdomadaires, 1er avril 2024<br>Weekly OSINT Highlights, 1 April 2024 2024-04-01T13:51:22+00:00 https://community.riskiq.com/article/0bb98406 www.secnews.physaphae.fr/article.php?IdArticle=8474062 False Ransomware,Spam,Malware,Tool,Vulnerability,Threat,Mobile,Cloud None 2.0000000000000000 Korben - Bloger francais Onionpipe – Créez des tunnels réseau virtuels inarrêtables 2024-04-01T13:42:04+00:00 https://korben.info/onionpipe-creer-tunnels-reseau-securises-adresses-tor-onion.html www.secnews.physaphae.fr/article.php?IdArticle=8474072 False None None 4.0000000000000000 SecurityWeek - Security News Attaque de la chaîne d'approvisionnement: les principales distributions Linux affectées par XZ Utils Backdoor<br>Supply Chain Attack: Major Linux Distributions Impacted by XZ Utils Backdoor Des alertes de sécurité urgentes émises en tant que code malveillant ont été trouvées intégrées dans la bibliothèque de compression de données XZ Utils utilisée dans de nombreuses distributions Linux.
>Urgent security alerts issued as malicious code was found embedded in the XZ Utils data compression library used in many Linux distributions. ]]>
2024-04-01T13:05:29+00:00 https://www.securityweek.com/supply-chain-attack-major-linux-distributions-impacted-by-xz-utils-backdoor/ www.secnews.physaphae.fr/article.php?IdArticle=8474046 False None None 3.0000000000000000
Checkpoint - Fabricant Materiel Securite Vérifier le logiciel Point: Vision pionnière dans la protection des points de terminaison<br>Check Point Software: Pioneering Vision in Endpoint Protection & # 160;Nous sommes ravis de partager ce point de contrôle a été reconnu comme visionnaire dans le Gartner & Reg;Magic Quadrant ™ pour les plates-formes de protection des points de terminaison.Nous pensons que cette reconnaissance renforce non seulement notre compréhension approfondie du marché, mais reconnaît également nos solutions stratégiques à l'échelle de l'industrie.La reconnaissance de Gartner célèbre la disponibilité générale de Check Point Infinity XDR aux côtés de nos récentes améliorations EDR, qui, selon nous, fortifient notre plate-forme de protection des points finaux.Dans notre mission de démocratiser la cybersécurité, nous avons conçu une console de gestion intuitive qui s'adresse aux organisations à différents niveaux de maturité de sécurité, ce qui rend les opérations de sécurité complexes plus accessibles.Notre voyage [& # 8230;]
>  We\'re excited to share that Check Point has been recognized as a Visionary in the 2023 Gartner® Magic Quadrant™ for Endpoint Protection Platforms. We believe, this recognition not only reinforces our deep understanding of the market, but also acknowledges our strategic industry-wide solutions. The recognition by Gartner celebrates the general availability of Check Point Infinity XDR alongside our recent EDR enhancements, which we feel, fortify our endpoint protection platform. In our mission to democratize cybersecurity, we\'ve designed an intuitive management, console that caters to organizations at varying levels of security maturity, making complex security operations more accessible. Our journey […] ]]>
2024-04-01T13:00:16+00:00 https://blog.checkpoint.com/security/check-point-software-pioneering-vision-in-endpoint-protection/ www.secnews.physaphae.fr/article.php?IdArticle=8474020 False None None 2.0000000000000000
CyberScoop - scoopnewsgroup.com special Cyber L'espace est essentiel pour les infrastructures.Pourquoi n'est-ce pas considéré comme critique?<br>Space is essential for infrastructure. Why isn\\'t it considered critical? There are 16 critical infrastructure sectors, and experts are deeply divided on whether space systems should be the 17th. ]]> 2024-04-01T13:00:00+00:00 https://cyberscoop.com/space-critical-infrastructure/ www.secnews.physaphae.fr/article.php?IdArticle=8474021 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Nommez ce bord toon: défiant la gravité<br>Name That Edge Toon: Defying Gravity Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.]]> 2024-04-01T13:00:00+00:00 https://www.darkreading.com/cloud-security/name-that-edge-toon-defying-gravity www.secnews.physaphae.fr/article.php?IdArticle=8474197 False None None 2.0000000000000000 IndustrialCyber - cyber risk firms for industrial US DOD dévoile la stratégie de cybersécurité Dib 2024 pour renforcer les cyber-défenses nationales<br>US DoD unveils DIB Cybersecurity Strategy 2024 to strengthen national cyber defenses Le Département américain de la Défense (DOD) a publié sa stratégie de cybersécurité de la base industrielle de la défense (DIB), une approche exploitable ...
>The U.S. Department of Defense (DoD) has published its Defense Industrial Base (DIB) Cybersecurity Strategy, an actionable approach... ]]>
2024-04-01T12:55:31+00:00 https://industrialcyber.co/threats-attacks/us-dod-unveils-dib-cybersecurity-strategy-2024-to-strengthen-national-cyber-defenses/ www.secnews.physaphae.fr/article.php?IdArticle=8474022 False Industrial None 2.0000000000000000
The Register - Site journalistique Anglais AT & t admet un vidage massif de 70m + à mi-mars est réel, mais affirme qu'il a des années<br>AT&T admits massive 70m+ mid-March data dump is real, but claims it\\'s years old Time to update that password - and four-digit account pin, which was also among the pilfered records That rumored AT&T dark web customer data dump from mid-March has been confirmed, and it\'s a whopper: A total of more than 73 million current and former customers are included in the cache, AT&T confirmed over the weekend.…]]> 2024-04-01T12:34:50+00:00 https://go.theregister.com/feed/www.theregister.com/2024/04/01/att_admits_massive_70m_midmarch/ www.secnews.physaphae.fr/article.php?IdArticle=8474019 False None None 3.0000000000000000 Security Through Education - Security Through Education Un début pour le début de l'ingénierie sociale & # 8211;Partie 1<br>A Beginner\\'s Take on Social Engineering – Part 1 I\'ll be honest, I never expected to see myself here… I\'ve looked for well over a year at positions within […]]]> 2024-04-01T12:00:31+00:00 https://www.social-engineer.org/newsletter/a-beginners-take-on-social-engineering-part-1/ www.secnews.physaphae.fr/article.php?IdArticle=8483100 False None None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Vultur Android Banking Trojan revient avec des capacités de télécommande améliorées<br>Vultur Android Banking Trojan Returns with Upgraded Remote Control Capabilities The Android banking trojan known as Vultur has resurfaced with a suite of new features and improved anti-analysis and detection evasion techniques, enabling its operators to remotely interact with a mobile device and harvest sensitive data. "Vultur has also started masquerading more of its malicious activity by encrypting its C2 communication, using multiple encrypted payloads that are decrypted]]> 2024-04-01T11:34:00+00:00 https://thehackernews.com/2024/04/vultur-android-banking-trojan-returns.html www.secnews.physaphae.fr/article.php?IdArticle=8473892 False Mobile None 2.0000000000000000 Recorded Future - FLux Recorded Future AT&T confirme la légitimité de la fuite impliquant des informations de 73 millions de personnes<br>AT&T confirms legitimacy of leak involving information of 73 million people AT & t a confirmé qu'un ensemble de données avec les informations de 73 millions de clients actuels et anciens est légitime près de deux semaines après qu'un pirate l'a offert sur un marché criminel Web sombre.Dans un communiqué de presse pendant le week-end de Pâques, le géant des télécommunications a déclaré que l'ensemble de données semble être de 2019 ou antérieure et
AT&T confirmed that a data set with the information of 73 million current and former customers is legitimate nearly two weeks after a hacker offered it on a dark web criminal marketplace. In a news release during Easter weekend, the telecommunications giant said the data set appears to be from 2019 or earlier and]]>
2024-04-01T11:30:20+00:00 https://therecord.media/att-confirms-data-leak-73-million-people www.secnews.physaphae.fr/article.php?IdArticle=8473997 False None None 3.0000000000000000
Bleeping Computer - Magazine Américain Plateforme d'achat Pandabuy La fuite des données a un impact de 1,3 million d'utilisateurs<br>Shopping platform PandaBuy data leak impacts 1.3 million users Data belonging to more than 1.3 million customers of the PandaBuy online shopping platform has been leaked, allegedly after two threat actors exploited multiple vulnerabilities to breach systems. [...]]]> 2024-04-01T11:00:28+00:00 https://www.bleepingcomputer.com/news/security/shopping-platform-pandabuy-data-leak-impacts-13-million-users/ www.secnews.physaphae.fr/article.php?IdArticle=8474071 False Vulnerability,Threat None 2.0000000000000000 Veracode - Application Security Research, News, and Education Blog Veracode avance la sécurité des applications natives dans le cloud avec l'acquisition de l'arc long<br>Veracode Advances Cloud-Native Application Security with Longbow Acquisition As I travel around the world meeting with customers and prospects, we often discuss the tectonic shifts happening in the industry. At the heart of their strategic initiatives, organizations are striving to innovate rapidly and deliver customer value with uncompromising quality and security, while gaining a competitive edge in the market. They are embracing DevOps methodologies and leveraging open-source technologies, accelerating deployments across multi-cloud environments to enhance agility and responsiveness. The biggest challenge they face is acquiring a comprehensive view of all the assets in their portfolio as they are deployed across multi cloud end points.   Security teams are overwhelmed by alert fatigue coming from sometimes 20+ tools that each provide a different view of risk. The biggest challenge is aggregating this risk from disparate sources, prioritizing it and identifying the next best action to take to secure their software assets. Compounding these…]]> 2024-04-01T11:00:00+00:00 https://www.veracode.com/blog/security-news/veracode-advances-cloud-native-application-security-longbow-acquisition www.secnews.physaphae.fr/article.php?IdArticle=8474119 False Tool,Cloud None 2.0000000000000000 AlienVault Lab Blog - AlienVault est un acteur de defense majeur dans les IOC AI - le bon, le mauvais et effrayant<br>AI - The Good, Bad, and Scary 2024-04-01T10:00:00+00:00 https://cybersecurity.att.com/blogs/security-essentials/ai-the-good-bad-and-scary www.secnews.physaphae.fr/article.php?IdArticle=8473954 False Ransomware,Tool,Prediction,Medical None 3.0000000000000000 Checkpoint Research - Fabricant Materiel Securite 1er avril & # 8211;Rapport de renseignement sur les menaces<br>1st April – Threat Intelligence Report Pour les dernières découvertes de cyber-recherche pour la semaine du 1er avril, veuillez télécharger notre bulletin Threat_Intelligence.Les meilleures attaques et violations que les gouvernements américains et britanniques ont annoncé un acte d'accusation criminel et des sanctions contre l'APT31, un groupe de pirates chinois, pour leur rôle dans les attaques prétendument contre des entreprises aux États-Unis, ainsi que [& # 8230;]
>For the latest discoveries in cyber research for the week of 1st April, please download our Threat_Intelligence Bulletin. TOP ATTACKS AND BREACHES The US and UK governments have announced a criminal indictment and sanctions against APT31, a group of Chinese hackers, for their role in allegedly conducting attacks against companies in the US, as well […] ]]>
2024-04-01T08:18:43+00:00 https://research.checkpoint.com/2024/1st-april-threat-intelligence-report/ www.secnews.physaphae.fr/article.php?IdArticle=8473934 False Threat APT 31 2.0000000000000000
Korben - Bloger francais Justine Tunney booste encore une fois les performances de llama.cpp 2024-04-01T07:20:38+00:00 https://korben.info/justine-tunney-booste-performances-llama-cpp-nouveaux-kernels-algebre-lineaire.html www.secnews.physaphae.fr/article.php?IdArticle=8473913 False None None 2.0000000000000000 Korben - Bloger francais Rust chez Google – Une productivité doublée et du code plus fiable 2024-04-01T06:17:30+00:00 https://korben.info/rust-google-productivite-doublee-code-fiable.html www.secnews.physaphae.fr/article.php?IdArticle=8473893 False None None 2.0000000000000000 Wired Threat Level - Security News Un voyage fantôme a condamné le voyage à travers la porte des larmes<br>A Ghost Ship\\'s Doomed Journey Through the Gate of Tears Millions lost internet service after three cables in the Red Sea were damaged. Houthi rebels deny targeting the cables, but their missile attack on a cargo ship, left adrift for months, is likely to blame.]]> 2024-04-01T06:00:00+00:00 https://www.wired.com/story/houthi-internet-cables-ship-anchor-path/ www.secnews.physaphae.fr/article.php?IdArticle=8473871 False None None 2.0000000000000000 Korben - Bloger francais Smartphone Xiaomi – Dites adieu à cette option que vous adorez 2024-04-01T05:00:00+00:00 https://korben.info/smartphone-xiaomi-dites-adieu-a-cette-option-que-vous-adorez.html www.secnews.physaphae.fr/article.php?IdArticle=8473872 False Mobile None 2.0000000000000000 AhnLab - Korean Security Firm "Hé, ce n'est pas le bon site!"Distribution des logiciels malveillants exploitant le suivi des annonces Google<br>“Hey, This Isn\\'t the Right Site!” Distribution of Malware Exploiting Google Ads Tracking Ahnlab Security Intelligence Center (ASEC) a récemment détecté une tension de logiciels malveillants distribuée en utilisant le suivi de Google ADS Googlefonctionnalité.Les cas confirmés montrent que les logiciels malveillants sont distribués en se déguisant comme un programme d'installation pour des groupes de groupes populaires tels que Notion et Slack.Une fois les logiciels malveillants installés et exécutés, il télécharge des fichiers malveillants et des charges utiles du serveur de l'attaquant.Vous trouverez ci-dessous la liste des noms de fichiers qui ont été découverts jusqu'à présent.Ce type de logiciels malveillants est ...
AhnLab SEcurity intelligence Center (ASEC) has recently detected a malware strain being distributed by using the Google Ads tracking feature. The confirmed cases show that the malware is being distributed by disguising itself as an installer for popular groupware such as Notion and Slack. Once the malware is installed and executed, it downloads malicious files and payloads from the attacker’s server. Below is the list of the file names that have been discovered so far. This type of malware is... ]]>
2024-04-01T01:12:13+00:00 https://asec.ahnlab.com/en/63477/ www.secnews.physaphae.fr/article.php?IdArticle=8473793 False Malware None 2.0000000000000000
Schneier on Security - Chercheur Cryptologue Américain Ross Anderson Ross Anderson est décédé de façon inattendue jeudi soir Dans, je crois, sa maison à Cambridge. Je ne peux pas me souvenir quand j'ai rencontré Ross pour la première fois.Bien sûr, c'était avant 2008, lorsque nous avons créé le sécuritéet comportement humain Atelier.C'était bien avant 2001, lorsque nous avons créé le atelier sur l'économie et la sécurité de l'information .(D'accord, il a créé les deux & # 8212; J'ai aidé.) C'était avant 1998, lorsque nous a écrit à propos de Les problèmes avec les systèmes d'entiercement clés.J'étais l'une des personnes qu'il a apportées au Newton Institute pour le programme de résidence de cryptographie de six mois qu'il a dirigé (je ne suis pas resté à tort) & # 8212; c'était en 1996 ...
Ross Anderson unexpectedly passed away Thursday night in, I believe, his home in Cambridge. I can’t remember when I first met Ross. Of course it was before 2008, when we created the Security and Human Behavior workshop. It was well before 2001, when we created the Workshop on Economics and Information Security. (Okay, he created both—I helped.) It was before 1998, when we wrote about the problems with key escrow systems. I was one of the people he brought to the Newton Institute for the six-month cryptography residency program he ran (I mistakenly didn’t stay the whole time)—that was in 1996...]]>
2024-04-01T00:21:09+00:00 https://www.schneier.com/blog/archives/2024/03/ross-anderson.html www.secnews.physaphae.fr/article.php?IdArticle=8473774 False None None 2.0000000000000000
Checkpoint Research - Fabricant Materiel Securite Spotlight malware: linodas aka dinodasrat pour Linux<br>Malware Spotlight: Linodas aka DinodasRAT for Linux Introduction Au cours des derniers mois, Check Point Research (RCR) a surveillé de près l'activité d'un acteur de menace de cyber-espionnage chinois-nexus qui se concentre sur l'Asie du Sud-Est, l'Afrique et l'Amérique du Sud.Cette activité s'aligne considérablement sur les idées que les micro-chercheurs de tendance ont publiquement partagées dans leur analyse complète d'un acteur de menace appelé & # 160; Terre Krahang.Ce [& # 8230;]
>Introduction In recent months, Check Point Research (CPR) has been closely monitoring the activity of a Chinese-nexus cyber espionage threat actor who is focusing on Southeast Asia, Africa, and South America. This activity significantly aligns with the insights the Trend Micro researchers publicly shared in their comprehensive analysis of a threat actor called Earth Krahang. This […] ]]>
2024-03-31T18:01:02+00:00 https://research.checkpoint.com/2024/29676/ www.secnews.physaphae.fr/article.php?IdArticle=8473639 False Malware,Threat,Prediction None 2.0000000000000000
Korben - Bloger francais The Nicest Place on the Internet – Un réconfort virtuel plein d\'humanité 2024-03-31T17:26:59+00:00 https://korben.info/nicest-place-internet-reconfort-virtuel-humanite.html www.secnews.physaphae.fr/article.php?IdArticle=8473638 False None None 2.0000000000000000 Bleeping Computer - Magazine Américain Dinodasrat Malware cible les serveurs Linux dans la campagne d'espionnage<br>DinodasRAT malware targets Linux servers in espionage campaign Security researchers have observed Red Hat and Ubuntu systems being attacked by a Linux version of the DinodasRAT (also known as XDealer) that may have been operating since 2022. [...]]]> 2024-03-31T10:35:17+00:00 https://www.bleepingcomputer.com/news/security/dinodasrat-malware-targets-linux-servers-in-espionage-campaign/ www.secnews.physaphae.fr/article.php?IdArticle=8473580 False Malware None 2.0000000000000000 Wired Threat Level - Security News Vous devez mettre à jour Apple iOS et Google Chrome dès que possible<br>You Should Update Apple iOS and Google Chrome ASAP Plus: Microsoft patches over 60 vulnerabilities, Mozilla fixes two Firefox zero-day bugs, Google patches 40 issues in Android, and more.]]> 2024-03-31T10:00:00+00:00 https://www.wired.com/story/apple-ios-google-chrome-critical-update-march/ www.secnews.physaphae.fr/article.php?IdArticle=8473483 False Vulnerability,Threat,Mobile None 2.0000000000000000 Korben - Bloger francais SecretPixel – Un excellent petit outil de stéganographie pour planquer vos données Suite]]> 2024-03-31T07:00:00+00:00 https://korben.info/secretpixel-outil-ultime-steganographie-securisee-furtive.html www.secnews.physaphae.fr/article.php?IdArticle=8473445 False None None 2.0000000000000000 HexaCorn - Blog de recherche Subfrida v0.1 Continuer la lecture & # 8594;
As many of you know, I am a big fan of Frida framework and I love its intuitiveness and flexibility, especially when it comes to auto-generating handlers for hooked functions, even if they are randomly chosen. In my older Frida … Continue reading →]]>
2024-03-31T00:57:22+00:00 https://www.hexacorn.com/blog/2024/03/31/subfrida-v0-1/ www.secnews.physaphae.fr/article.php?IdArticle=8473311 False None None 3.0000000000000000
McAfee Labs - Editeur Logiciel Données AT&T: ce que vous devez savoir et comment vous protéger<br>AT&T Data Leak: What You Need to Know and How to Protect Yourself AT & # 38; T, l'un des plus grands géants de télécommunications, a récemment reconnu une fuite de données importante qui a affecté des millions de ses clients ....
AT&T, one of the largest telecom giants, recently acknowledged a significant data leak that has affected millions of its customers.... ]]>
2024-03-30T21:48:19+00:00 https://www.mcafee.com/blogs/security-news/att-data-leak-what-you-need-to-know-and-how-to-protect-yourself/ www.secnews.physaphae.fr/article.php?IdArticle=8473252 False None None 2.0000000000000000
IndustrialCyber - cyber risk firms for industrial Besoin croissant de mettre en œuvre des stratégies de récupération post-invidence efficaces dans l'évolution des environnements d'OT, ICS<br>Growing need to implement effective post-incident recovery strategies in evolving OT, ICS environments Post-incident recovery strategies are vital in OT and ICS settings to lessen cybersecurity disruptions and reduce incident impacts.... ]]> 2024-03-30T21:37:16+00:00 https://industrialcyber.co/features/growing-need-to-implement-effective-post-incident-recovery-strategies-in-evolving-ot-ics-environments/ www.secnews.physaphae.fr/article.php?IdArticle=8473253 False Industrial None 2.0000000000000000 HackRead - Chercher Cyber L'application LGBTQ israélienne atraf fait face à une fuite de données, 700 000 utilisateurs touchés<br>Israeli LGBTQ App Atraf Faces Data Leak, 700,000 Users Affected Par waqas Un autre jour, une autre violation de données présumée mettant en danger des centaines de milliers d'utilisateurs sans méfiance. Ceci est un article de HackRead.com Lire le post original: L'application LGBTQ israélienne atraf fait face à une fuite de données, 700 000 utilisateurs affectés
>By Waqas Another day, another alleged data breach putting hundred of thousands of unsuspecting users at risk. This is a post from HackRead.com Read the original post: Israeli LGBTQ App Atraf Faces Data Leak, 700,000 Users Affected]]>
2024-03-30T19:09:15+00:00 https://www.hackread.com/hacker-leak-atraf-database-700k-users/ www.secnews.physaphae.fr/article.php?IdArticle=8473213 False Data Breach None 2.0000000000000000
HackRead - Chercher Cyber Blockchain dans la gestion de l'identité: sécuriser les données et identités personnelles<br>Blockchain in Identity Management: Securing Personal Data and Identities Par uzair amir Découvrez comment la blockchain transforme la gestion de l'identité numérique en autonomisant les individus ayant un contrôle de soi-même sur les données personnelles via & # 8230; Ceci est un article de HackRead.com Lire le post original: Blockchain dans la gestion de l'identité: sécuriser les données et identités personnelles
>By Uzair Amir Learn how blockchain is transforming digital identity management by empowering individuals with self-sovereign control over personal data through… This is a post from HackRead.com Read the original post: Blockchain in Identity Management: Securing Personal Data and Identities]]>
2024-03-30T12:53:05+00:00 https://www.hackread.com/blockchain-identity-management-securing-personal-data/ www.secnews.physaphae.fr/article.php?IdArticle=8473077 False None None 2.0000000000000000
Bleeping Computer - Magazine Américain AT&T confirme les données pour 73 millions de clients divulgués sur le forum des pirates<br>AT&T confirms data for 73 million customers leaked on hacker forum AT&T has finally confirmed it is impacted by a data breach affecting 73 million current and former customers after initially denying the leaked data originated from them. [...]]]> 2024-03-30T12:52:47+00:00 https://www.bleepingcomputer.com/news/security/atandt-confirms-data-for-73-million-customers-leaked-on-hacker-forum/ www.secnews.physaphae.fr/article.php?IdArticle=8473155 False Data Breach None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les pirates ciblent les utilisateurs de macOS avec des publicités malveillantes répartissant le malware du voleur<br>Hackers Target macOS Users with Malicious Ads Spreading Stealer Malware Malicious ads and bogus websites are acting as a conduit to deliver two different stealer malware, including Atomic Stealer, targeting Apple macOS users. The ongoing infostealer attacks targeting macOS users may have adopted different methods to compromise victims\' Macs, but operate with the end goal of stealing sensitive data, Jamf Threat Labs said in a report published Friday. One]]> 2024-03-30T12:46:00+00:00 https://thehackernews.com/2024/03/hackers-target-macos-users-with.html www.secnews.physaphae.fr/article.php?IdArticle=8472978 False Malware,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Les logiciels malveillants de Vultur Banking pour Android se présentent comme une application de sécurité McAfee<br>Vultur banking malware for Android poses as McAfee Security app Security researchers found a new version of the Vultur banking trojan for Android that includes more advanced remote control capabilities and an improved evasion mechanism. [...]]]> 2024-03-30T11:56:28+00:00 https://www.bleepingcomputer.com/news/security/vultur-banking-malware-for-android-poses-as-mcafee-security-app/ www.secnews.physaphae.fr/article.php?IdArticle=8473135 False Malware,Mobile None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Urgent: la porte dérobée secrète trouvée dans la bibliothèque XZ Utils, a un impact sur les grandes distros Linux<br>Urgent: Secret Backdoor Found in XZ Utils Library, Impacts Major Linux Distros RedHat on Friday released an "urgent security alert" warning that two versions of a popular data compression library called XZ Utils (previously LZMA Utils) have been backdoored with malicious code designed to allow unauthorized remote access. The software supply chain compromise, tracked as CVE-2024-3094, has a CVSS score of 10.0, indicating maximum severity. It impacts XZ Utils]]> 2024-03-30T10:53:00+00:00 https://thehackernews.com/2024/03/urgent-secret-backdoor-found-in-xz.html www.secnews.physaphae.fr/article.php?IdArticle=8472938 False None None 2.0000000000000000 Korben - Bloger francais The Elevator – Un court-métrage Star Wars très fun 2024-03-30T10:03:13+00:00 https://korben.info/ascenseur-court-metrage-star-wars-hilarant.html www.secnews.physaphae.fr/article.php?IdArticle=8473038 False None None 2.0000000000000000 Korben - Bloger francais Hiddify – La solution tout-en-un pour contourner tous types de censures sur le net 2024-03-30T08:00:00+00:00 https://korben.info/hiddify-outils-anti-censure-acces-internet-libre-securise.html www.secnews.physaphae.fr/article.php?IdArticle=8472999 False Tool None 2.0000000000000000 Korben - Bloger francais Voice Engine – Les voix synthétiques bluffantes d\'OpenAI 2024-03-30T07:10:51+00:00 https://korben.info/openai-devoile-voice-engine-ia-generatrice-voix-synthetiques.html www.secnews.physaphae.fr/article.php?IdArticle=8472979 False None None 2.0000000000000000 Korben - Bloger francais L\'outrage en ligne – Une nouvelle connerie qui menace notre liberté d\'expression 2024-03-30T06:38:04+00:00 https://korben.info/nouvelle-loi-outrage-en-ligne-menace-liberte-expression.html www.secnews.physaphae.fr/article.php?IdArticle=8472958 False None None 2.0000000000000000 HexaCorn - Blog de recherche Du métro à la sur-sol<br>From Underground to Overground Continuer la lecture & # 8594;/ span>
There are many debates and infosec dramas related to vulnerability research, publishing Offensive Security Tools (OST), Proof Of Concept (POC) Code, and in recent days – some Original Gangsters (OG) are reflecting on their own doings by posting teary memoirs … Continue reading →]]>
2024-03-30T00:05:31+00:00 https://www.hexacorn.com/blog/2024/03/30/from-underground-to-overground/ www.secnews.physaphae.fr/article.php?IdArticle=8472820 False Tool,Vulnerability None 4.0000000000000000
Dark Reading - Informationweek Branch Êtes-vous affecté par la porte dérobée dans XZ Utils?<br>Are You Affected by the Backdoor in XZ Utils? In this Tech Tip, we outline how to check if a system is impacted by the newly discovered backdoor in the open source xz compression utility.]]> 2024-03-29T22:42:16+00:00 https://www.darkreading.com/vulnerabilities-threats/are-you-affected-by-the-backdoor-in-xz-utils www.secnews.physaphae.fr/article.php?IdArticle=8472800 False None None 2.0000000000000000 Korben - Bloger francais Un backdoor bien critique découverte dans xz Utils 2024-03-29T21:36:59+00:00 https://korben.info/backdoor-linux-faille-securite-critique-xz-utils.html www.secnews.physaphae.fr/article.php?IdArticle=8472799 False None None 2.0000000000000000 Recorded Future - FLux Recorded Future Prisma Finance Crypto Vol Caps Strange Week of Platform Breachs<br>Prisma Finance crypto theft caps strange week of platform breaches Deux plates-formes de crypto éminentes ont été compromises cette semaine, avec des millions de crypto-monnaies volées par des pirates avec des motifs déroutants.Mardi soir, le jeu basé à Munchables Blockchain a déclaré qu'il avait été attaqué, et plusieurs sociétés de sécurité ont déclaré qu'environ 62 millions de dollars de crypto-monnaie avaient été volés dans le jeu. & NBSP;Des rumeurs se sont répandues parmi les trackers chevronnés des crypto-thes que le
Two prominent crypto platforms were compromised this week, with millions worth of cryptocurrency stolen by hackers with confusing motives. On Tuesday evening, the Munchables blockchain-based game said it was attacked, and several security firms said about $62 million worth of cryptocurrency was stolen from the game.  Rumors spread among seasoned crypto-theft trackers that the]]>
2024-03-29T21:17:07+00:00 https://therecord.media/prisma-finance-theft-caps-strange-crypto-week www.secnews.physaphae.fr/article.php?IdArticle=8472778 False None None 2.0000000000000000
Schneier on Security - Chercheur Cryptologue Américain Vendredi Blogging Squid: The Geopolitics of Manger Squid<br>Friday Squid Blogging: The Geopolitics of Eating Squid Sur la domination chinoise de l'industrie du calmar: La domination de la Chine dans les fruits de mer a exprimé de profondes préoccupations parmi les pêcheurs américains, les décideurs politiques et les militants des droits de l'homme.Ils avertissent que la Chine élargit sa portée maritime d'une manière qui met les pêcheurs domestiques dans le monde dans un désavantage compétitif, érodant le droit international régissant les frontières maritimes et sapant la sécurité alimentaire, en particulier dans les pays pauvres qui s'appuient fortement sur les poissons pour les protéines.Dans certaines parties du monde, des incursions illégales fréquentes par des navires chinois dans d'autres nations & # 8217;Les eaux augmentent les tensions militaires.Les législateurs américains sont préoccupés parce que les États-Unis, enfermés dans une guerre commerciale avec la Chine, sont le plus grand importateur de fruits de mer du monde ...
New York Times op-ed on the Chinese dominance of the squid industry: China’s domination in seafood has raised deep concerns among American fishermen, policymakers and human rights activists. They warn that China is expanding its maritime reach in ways that are putting domestic fishermen around the world at a competitive disadvantage, eroding international law governing sea borders and undermining food security, especially in poorer countries that rely heavily on fish for protein. In some parts of the world, frequent illegal incursions by Chinese ships into other nations’ waters are heightening military tensions. American lawmakers are concerned because the United States, locked in a trade war with China, is the world’s largest importer of seafood...]]>
2024-03-29T21:02:07+00:00 https://www.schneier.com/blog/archives/2024/03/68676.html www.secnews.physaphae.fr/article.php?IdArticle=8472755 False None None 3.0000000000000000
Dark Reading - Informationweek Branch Coin Ciso: escroquerie cyber-pro;Nouveaux visages de risque;Cyber stimule l'évaluation<br>CISO Corner: Cyber-Pro Swindle; New Faces of Risk; Cyber Boosts Valuation Our collection of the most relevant reporting and industry perspectives for those guiding cybersecurity strategies and focused on SecOps. Also included: Australia gets its cyber-groove back, and 2023\'s zero-day field day.]]> 2024-03-29T20:51:51+00:00 https://www.darkreading.com/cloud-security/ciso-corner-cyber-pro-swindle-risk-valuation www.secnews.physaphae.fr/article.php?IdArticle=8472757 False Vulnerability,Threat None 2.0000000000000000 Recorded Future - FLux Recorded Future Code de porte dérobée malveillant intégré à l'outil Linux populaire, CISA et Red Hat Warn<br>Malicious backdoor code embedded in popular Linux tool, CISA and Red Hat warn La société de logiciels Red Hat et la principale agence de cybersécurité de la nation \\ ont publié un avertissement du Vendredi Saint concernant le code malveillant intégré dans un outil Linux populaire.Le problème - tagué sous le nom de CVE-2024-3094 - affecte XZ Utils, un outil qui aide à compresser les formats de fichiers grands en plus petits plus gérables pour le partage via le transfert de fichiers.
The software company Red Hat and the nation\'s top cybersecurity agency released a Good Friday warning about malicious code being embedded in a popular Linux tool. The issue - tagged as CVE-2024-3094 - affects XZ Utils, a tool that helps compress large file formats into smaller more manageable ones for sharing via file transfer.]]>
2024-03-29T20:28:35+00:00 https://therecord.media/malicious-backdoor-code-linux-red-hat-cisa www.secnews.physaphae.fr/article.php?IdArticle=8472756 False Tool None 2.0000000000000000
The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les serrures de Dormakaba utilisées dans des millions de chambres d'hôtel pourraient être craquées en quelques secondes<br>Dormakaba Locks Used in Millions of Hotel Rooms Could Be Cracked in Seconds Security vulnerabilities discovered in Dormakaba\'s Saflok electronic RFID locks used in hotels could be weaponized by threat actors to forge keycards and stealthily slip into locked rooms. The shortcomings have been collectively named Unsaflok by researchers Lennert Wouters, Ian Carroll, rqu, BusesCanFly, Sam Curry, sshell, and Will Caruana. They were reported to the Zurich-based]]> 2024-03-29T20:24:00+00:00 https://thehackernews.com/2024/03/dormakaba-locks-used-in-millions-of.html www.secnews.physaphae.fr/article.php?IdArticle=8472611 False Vulnerability,Threat None 3.0000000000000000 CyberScoop - scoopnewsgroup.com special Cyber La violation liée à l'Ivanti de CISA a potentiellement affecté plus de 100 000 personnes<br>Ivanti-linked breach of CISA potentially affected more than 100,000 individuals Un haut responsable de la CISA a partagé les détails avec Cyberscoop concernant l'incident après que l'agence en ait informé le Congrès vendredi.
>A senior CISA official shared details with CyberScoop regarding the incident after the agency notified Congress about it on Friday. ]]>
2024-03-29T20:05:16+00:00 https://cyberscoop.com/ivanti-linked-breach-of-cisa-potentially-affected-more-than-100000-individuals/ www.secnews.physaphae.fr/article.php?IdArticle=8472729 False None None 3.0000000000000000
Dark Reading - Informationweek Branch Opérations de la paix des Nations Unies sous le feu à partir de pirates parrainés par l'État<br>UN Peace Operations Under Fire From State-Sponsored Hackers The international body isn\'t doing enough to protect details on dissidents and activists gathered by peacekeeping operations, particularly across Central Africa.]]> 2024-03-29T20:04:52+00:00 https://www.darkreading.com/cyber-risk/un-peace-operations-under-fire-from-state-sponsored-hackers www.secnews.physaphae.fr/article.php?IdArticle=8472731 False None None 2.0000000000000000 HackRead - Chercher Cyber Theoon malware Retours: 6 000 routeurs Asus piratés en 72 heures<br>TheMoon Malware Returns: 6,000 Asus Routers Hacked in 72 Hours Par waqas Une nouvelle variante de "Theoon Malware" est apparue, ciblant spécifiquement les appareils IoT vulnérables, en particulier les routeurs Asus. Ceci est un article de HackRead.com Lire la publication originale: Renvoie malveillant Theoon: 6 000 routeurs Asus piratés en 72 heures
>By Waqas A new variant of "TheMoon Malware" has emerged, specifically targeting vulnerable IoT devices, particularly Asus routers. This is a post from HackRead.com Read the original post: TheMoon Malware Returns: 6,000 Asus Routers Hacked in 72 Hours]]>
2024-03-29T19:49:35+00:00 https://www.hackread.com/themoon-malware-asus-routers-hacked-in-72-hours/ www.secnews.physaphae.fr/article.php?IdArticle=8472730 False Malware None 2.0000000000000000
Vuln AWS - FLux Vuln AWS CVE-2024-3094 aws-security@amazon.com .
Publication Date: 2024/03/29 12:30 PM PST CVE Identifier: CVE-2024-3094 AWS is aware of CVE-2024-3094, which affects versions 5.6.0 and 5.6.1 of the xz-utils package. This issue may attempt to introduce security issues in openssh through the use of liblzma within some operating system environments. Amazon Linux customers are not affected by this issue, and no action is required. AWS infrastructure and services do not utilize the affected software and are not impacted. Users of Bottlerocket are not affected. Customers using other operating systems are advised to refer to information provided by the OS vendor to address any concerns originating from this reported issue. Security-related questions or concerns can be brought to our attention via aws-security@amazon.com. ]]>
2024-03-29T19:12:44+00:00 https://aws.amazon.com/security/security-bulletins/AWS-2024-002/ www.secnews.physaphae.fr/article.php?IdArticle=8472727 False None None None
RiskIQ - cyber risk firms (now microsoft) New Go Loader pousse le voleur de Rhadamanthys<br>New Go Loader Pushes Rhadamanthys Stealer #### Description A new malvertising campaign has been discovered that uses a Go language loader to deploy the Rhadamanthys stealer. The threat actor purchased an ad that appears at the top of Google search results, claiming to be the PuTTY homepage. The ad URL points to an attacker-controlled domain where they can show a legitimate page to visitors that are not real victims. Real victims coming from the US will be redirected to a fake site that looks and feels exactly like putty.org. The malicious payload is downloaded via a two-step redirection chain, and the server is believed to perform some checks for proxies while also logging the victim\'s IP address. Upon executing the dropper, there is an IP check for the victim\'s public IP address. If a match is found, the dropper proceeds to retrieve a follow-up payload from another server. The payload is Rhadamanthys, which is executed by the parent process PuTTy.exe. The loader is closely tied to the malvertising infrastructure, and it is quite likely that the same threat actor is controlling both. #### Reference URL(s) 1. https://www.malwarebytes.com/blog/threat-intelligence/2024/03/new-go-loader-pushes-rhadamanthys #### Publication Date March 22, 2024 #### Author(s) Jérôme Segura ]]> 2024-03-29T19:00:47+00:00 https://community.riskiq.com/article/e6d270fc www.secnews.physaphae.fr/article.php?IdArticle=8472745 False Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Les leçons du démontage de Lockbit<br>Lessons From the LockBit Takedown The truly satisfying law enforcement takedown of the ransomware giant shows the value of collaborating - and fighting back.]]> 2024-03-29T18:58:38+00:00 https://www.darkreading.com/threat-intelligence/lessons-from-the-lockbit-takedown www.secnews.physaphae.fr/article.php?IdArticle=8472705 False Ransomware,Legislation None 2.0000000000000000 Dark Reading - Informationweek Branch Cloud Email Filtring Bypass Attack fonctionne 80% du temps<br>Cloud Email Filtering Bypass Attack Works 80% of the Time A majority of enterprises that employ cloud-based email spam filtering services are potentially at risk, thanks to a rampant tendency to misconfigure them.]]> 2024-03-29T18:56:16+00:00 https://www.darkreading.com/cloud-security/cloud-email-filtering-bypass-attack www.secnews.physaphae.fr/article.php?IdArticle=8472732 False Spam,Cloud None 4.0000000000000000 Recorded Future - FLux Recorded Future Ross Anderson, professeur et célèbre auteur de \\ 'Security Engineering, \\' décède<br>Ross Anderson, professor and famed author of \\'Security Engineering,\\' passes away Ross Anderson, professeur d'ingénierie de sécurité à l'Université de Cambridge, largement reconnue pour ses contributions à l'informatique, est décédé à la maison jeudi selon des amis et des collègues qui ont été en contact avec sa famille et l'université.Anderson, qui a également enseigné à l'Université d'Édimbourg, était l'un des
Ross Anderson, a professor of security engineering at the University of Cambridge who is widely recognized for his contributions to computing, passed away at home on Thursday according to friends and colleagues who have been in touch with his family and the University. Anderson, who also taught at Edinburgh University, was one of the]]>
2024-03-29T18:19:34+00:00 https://therecord.media/ross-anderson-cambridge-professor-passes-away www.secnews.physaphae.fr/article.php?IdArticle=8472707 False None None 2.0000000000000000
Dark Reading - Informationweek Branch Les logiciels malveillants Theoon augmentent avec un botnet malveillant pour la location<br>TheMoon Malware Rises Again with Malicious Botnet for Hire Outdated SOHO routers and IoT devices being hijacked by TheMoon to operate an anonymous hacker botnet service called Faceless.]]> 2024-03-29T18:06:20+00:00 https://www.darkreading.com/endpoint-security/themoon-malware-rises-malicious-botnet-for-hire www.secnews.physaphae.fr/article.php?IdArticle=8472706 False Malware None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Theoon Botnet refait surface, exploitant les appareils EOL à Power Criminal Proxy<br>TheMoon Botnet Resurfaces, Exploiting EoL Devices to Power Criminal Proxy A botnet previously considered to be rendered inert has been observed enslaving end-of-life (EoL) small home/small office (SOHO) routers and IoT devices to fuel a criminal proxy service called Faceless. "TheMoon, which emerged in 2014, has been operating quietly while growing to over 40,000 bots from 88 countries in January and February of 2024," the Black Lotus Labs team at Lumen]]> 2024-03-29T17:42:00+00:00 https://thehackernews.com/2024/03/themoon-botnet-resurfaces-exploiting.html www.secnews.physaphae.fr/article.php?IdArticle=8472561 False None None 3.0000000000000000 SecureMac - Security focused on MAC Liste de contrôle 369: escroqueries d'impôts et attaques de mot de passe<br>Checklist 369: Tax Scams and Password Attacks Dans cet épisode, IRS découvre les escroqueries fiscales, les utilisateurs d'Apple se méfient!Restez à jour, restez en sécurité!
>In this episode, IRS uncovers tax scams, Apple users beware! Keep updated, keep secure! ]]>
2024-03-29T17:33:01+00:00 https://www.securemac.com/checklist/checklist-369-tax-scams-and-password-attacks www.secnews.physaphae.fr/article.php?IdArticle=8472680 False None None 2.0000000000000000
Korben - Bloger francais Des chercheurs envoient des données 4,5 millions de fois plus vite qu\'avec une fibre grand public 2024-03-29T17:00:46+00:00 https://korben.info/revolution-internet-chercheurs-envoient-donnees-45-millions-fois-plus-vite.html www.secnews.physaphae.fr/article.php?IdArticle=8472683 False None None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) L'âge d'or des tests de pénétration automatisés est là<br>The Golden Age of Automated Penetration Testing is Here Network penetration testing plays a vital role in detecting vulnerabilities that can be exploited. The current method of performing pen testing is pricey, leading many companies to undertake it only when necessary, usually once a year for their compliance requirements. This manual approach often misses opportunities to find and fix security issues early on, leaving businesses vulnerable to]]> 2024-03-29T16:49:00+00:00 https://thehackernews.com/2024/03/the-golden-age-of-automated-penetration.html www.secnews.physaphae.fr/article.php?IdArticle=8472534 False Vulnerability None 3.0000000000000000 Silicon - Site de News Francais Pour un MFA conforme au RGPD : ce que recommande la CNIL 2024-03-29T16:42:36+00:00 https://www.silicon.fr/mfa-rgpd-cnil-477344.html www.secnews.physaphae.fr/article.php?IdArticle=8472682 False None None 2.0000000000000000 Korben - Bloger francais Paroles de chansons – La spirale infernale vers la simplicité et la négativité 2024-03-29T16:38:40+00:00 https://korben.info/paroles-chansons-simples-repetitives-negatives-etude-2.html www.secnews.physaphae.fr/article.php?IdArticle=8472684 False None None 3.0000000000000000 Bleeping Computer - Magazine Américain Activision: Activer 2FA pour sécuriser les comptes récemment volés par malware<br>Activision: Enable 2FA to secure accounts recently stolen by malware An infostealer malware campaign has reportedly collected millions of logins from users of various gaming websites, including players that use cheats, pay-to-cheat services. [...]]]> 2024-03-29T16:25:09+00:00 https://www.bleepingcomputer.com/news/security/activision-enable-2fa-to-secure-accounts-recently-stolen-by-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8472754 False Malware None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Le nouveau bug Linux pourrait conduire à des fuites de mot de passe de l'utilisateur et à un détournement de presse-papiers<br>New Linux Bug Could Lead to User Password Leaks and Clipboard Hijacking Details have emerged about a vulnerability impacting the "wall" command of the util-linux package that could be potentially exploited by a bad actor to leak a user\'s password or alter the clipboard on certain Linux distributions. The bug, tracked as CVE-2024-28085, has been codenamed WallEscape by security researcher Skyler Ferrante. It has been described as a case of improper]]> 2024-03-29T16:19:00+00:00 https://thehackernews.com/2024/03/new-linux-bug-could-lead-to-user.html www.secnews.physaphae.fr/article.php?IdArticle=8472507 False Vulnerability None 3.0000000000000000