www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-04-18T04:12:01+00:00 www.secnews.physaphae.fr Korben - Bloger francais UPT – Le gestionnaire universel de paquets Linux 2024-04-16T07:00:00+00:00 https://korben.info/upt-un-outil-unifie-pour-gerer-tous-vos-paquets-linux-unix-macos-windows.html www.secnews.physaphae.fr/article.php?IdArticle=8483262 False None None 2.0000000000000000 Korben - Bloger francais AirChat – Le Twitter (X) vocal qui fait le buzz 2024-04-16T06:59:11+00:00 https://korben.info/airchat-lapp-vocale-asynchrone-qui-fait-le-buzz.html www.secnews.physaphae.fr/article.php?IdArticle=8483263 False None None 2.0000000000000000 IndustrialCyber - cyber risk firms for industrial Les nouveaux conseils de la NSA identifient la mise à jour des systèmes d'IA pour répondre aux risques changeants, renforcez la sécurité<br>New NSA guidance identifies need to update AI systems to address changing risks, bolster security La US National Security Agency (NSA) a publié lundi une fiche d'information sur la cybersécurité (CSI), offrant des conseils sur l'amélioration ...
>The U.S. National Security Agency (NSA) released a Cybersecurity Information Sheet (CSI) on Monday, offering guidance on enhancing... ]]>
2024-04-16T06:35:28+00:00 https://industrialcyber.co/ai/new-nsa-guidance-identifies-need-to-update-ai-systems-to-address-changing-risks-bolster-security/ www.secnews.physaphae.fr/article.php?IdArticle=8483234 False None None 2.0000000000000000
ProofPoint - Cyber Firms De l'ingénierie sociale aux abus DMARC: Ta427 \\'s Art of Information Gathering<br>From Social Engineering to DMARC Abuse: TA427\\'s Art of Information Gathering 2024-04-16T06:00:54+00:00 https://www.proofpoint.com/us/blog/threat-insight/social-engineering-dmarc-abuse-ta427s-art-information-gathering www.secnews.physaphae.fr/article.php?IdArticle=8483299 False Malware,Tool,Threat,Conference APT 43,APT 37 2.0000000000000000 Dark Reading - Informationweek Branch Les cyber-opérations s'intensifier au Moyen-Orient, avec Israël la cible principale<br>Cyber Operations Intensify in Middle East, With Israel the Main Target Cyberattacks tripled over the past year in Israel, making it the most targeted nation in 2023, as cyber operations become a standard part of military conflicts and global protests.]]> 2024-04-16T06:00:00+00:00 https://www.darkreading.com/cyber-risk/cyber-operations-intensify-in-middle-east-with-israel-the-main-target www.secnews.physaphae.fr/article.php?IdArticle=8483207 False None None 2.0000000000000000 The State of Security - Magazine Américain SCM et NERC: ce que vous devez savoir<br>SCM and NERC: What You Need to Know Security configurations are an often ignored but essential factor in any organization\'s security posture: any tool, program, or solution can be vulnerable to cyberattacks or other security incidents if the settings are not configured correctly. Staying on top of all of these security configurations can be a daunting responsibility for security or IT teams to focus on, which is where security configuration management (SCM) comes in. While SCM can be a valuable tool for organizations across all sectors, it is particularly helpful for critical organizations required to comply with certain...]]> 2024-04-16T02:59:03+00:00 https://www.tripwire.com/state-of-security/scm-and-nerc-what-you-need-know www.secnews.physaphae.fr/article.php?IdArticle=8483268 False Tool None 2.0000000000000000 The State of Security - Magazine Américain Casquer un filet de cybersécurité pour sécuriser l'IA génératrice dans la fabrication<br>Casting a Cybersecurity Net to Secure Generative AI in Manufacturing Generative AI has exploded in popularity across many industries. While this technology has many benefits, it also raises some unique cybersecurity concerns. Securing AI must be a top priority for organizations as they rush to implement these tools. The use of generative AI in manufacturing poses particular challenges. Over one-third of manufacturers plan to invest in this technology, making it the industry\'s fourth most common strategic business change. As that trend continues, manufacturers - often prime cybercrime targets - must ensure generative AI is secure enough before its risks outweigh...]]> 2024-04-16T02:58:57+00:00 https://www.tripwire.com/state-of-security/casting-cybersecurity-net-secure-generative-ai-manufacturing www.secnews.physaphae.fr/article.php?IdArticle=8483269 False Tool,Prediction None 2.0000000000000000 HackRead - Chercher Cyber Intelbroker revendique une violation des yeux dans l'espace, ciblant les données de sécurité nationale américaines<br>IntelBroker Claims Space-Eyes Breach, Targeting US National Security Data Par waqas Hacker "Intelbroker" prétend avoir violé les yeux d'espace, une entreprise de renseignement géospatial, exposant des données de sécurité nationale américaines.Les autorités enquêtent sur la réclamation qui pourrait avoir un impact sur les opérations gouvernementales sensibles. Ceci est un article de HackRead.com Lire le post original: Intelbroker revendique une violation des yeux d'espace, ciblant les données de sécurité nationale américaines
>By Waqas Hacker "IntelBroker" claims to have breached Space-Eyes, a geospatial intelligence firm, exposing US national security data. Authorities investigate the claim that could impact sensitive government operations. This is a post from HackRead.com Read the original post: IntelBroker Claims Space-Eyes Breach, Targeting US National Security Data]]>
2024-04-16T00:08:13+00:00 https://www.hackread.com/intelbroker-space-eyes-breach-us-national-security-data/ www.secnews.physaphae.fr/article.php?IdArticle=8483075 False None None 2.0000000000000000
Resecurity - cyber risk firms Les campagnes de désinformation et de hacktiviste ciblent les Philippines au milieu des tensions croissantes avec la Chine<br>Misinformation and Hacktivist Campaigns Target the Philippines Amidst Rising Tensions with China 2024-04-16T00:00:00+00:00 https://www.resecurity.com/blog/article/misinformation-and-hacktivist-campaigns-target-the-philippines-amidst-rising-tensions-with-china www.secnews.physaphae.fr/article.php?IdArticle=8483296 False None None 2.0000000000000000 Zataz - Magazine Francais de secu Lyon Terminal menacé par les hackers de 8base 2024-04-15T22:26:13+00:00 https://www.zataz.com/lyon-terminal-menace-par-les-hackers-de-8base/ www.secnews.physaphae.fr/article.php?IdArticle=8483025 False None None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les BMC Intel et Lenovo contiennent une faille de serveur LightTPD non corrigé<br>Intel and Lenovo BMCs Contain Unpatched Lighttpd Server Flaw A security flaw impacting the Lighttpd web server used in baseboard management controllers (BMCs) has remained unpatched by device vendors like Intel and Lenovo, new findings from Binarly reveal. While the original shortcoming was discovered and patched by the Lighttpd maintainers way back in August 2018 with version 1.4.51, the lack of a CVE identifier or an advisory meant that]]> 2024-04-15T22:21:00+00:00 https://thehackernews.com/2024/04/intel-and-lenovo-bmcs-contain-unpatched.html www.secnews.physaphae.fr/article.php?IdArticle=8482851 False None None 2.0000000000000000 Zataz - Magazine Francais de secu Dunghill Leak menace un partenaire européen de SpaceX 2024-04-15T22:20:41+00:00 https://www.zataz.com/dunghill-leak-menace-un-partenaire-europeen-de-spacex/ www.secnews.physaphae.fr/article.php?IdArticle=8483026 False None None 2.0000000000000000 The Intercept - Site journalistique Anglais Les États-Unis, pas Israël, ont abattu la plupart des drones et des missiles iraniens<br>U.S., Not Israel, Shot Down Most Iran Drones and Missiles Les forces américaines ont fait la majeure partie de la durée de travail en répondant aux représailles de l'Iran \\ pour l'attaque contre son ambassade à Damas.
>American forces did most of the heavy lifting responding to Iran\'s retaliation for the attack on its embassy in Damascus. ]]>
2024-04-15T21:48:43+00:00 https://theintercept.com/2024/04/15/iran-attack-israel-drones-missiles/ www.secnews.physaphae.fr/article.php?IdArticle=8482992 False None None 2.0000000000000000
Recorded Future - FLux Recorded Future L'homme du Nebraska aurait fraudé les fournisseurs de nuages de millions de personnes via le cryptojacking<br>Nebraska man allegedly defrauded cloud providers of millions via cryptojacking 2024-04-15T21:44:22+00:00 https://therecord.media/nebraska-man-cryptojacking-indictment www.secnews.physaphae.fr/article.php?IdArticle=8482993 False Cloud None 2.0000000000000000 Korben - Bloger francais Bloqueurs de pubs sur mobile – YouTube contre-attaque 2024-04-15T21:32:39+00:00 https://korben.info/youtube-contre-attaque-bloqueurs-pubs-mobile.html www.secnews.physaphae.fr/article.php?IdArticle=8483020 False Mobile None 2.0000000000000000 Dark Reading - Informationweek Branch Le prix de la défense lance le projet Purdue pour renforcer les systèmes cyber-physiques<br>Defense Award Launches Purdue Project to Strengthen Cyber-Physical Systems 2024-04-15T20:50:15+00:00 https://www.darkreading.com/cybersecurity-operations/defense-award-launches-purdue-project-to-strengthen-cyber-physical-systems www.secnews.physaphae.fr/article.php?IdArticle=8482961 False None None 2.0000000000000000 RiskIQ - cyber risk firms (now microsoft) Zero-Day Exploitation of Unauthenticated Remote Code Execution Vulnerability in GlobalProtect (CVE-2024-3400) ## Snapshot On April 10, 2024, Volexity discovered zero-day exploitation of a vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS at one of its network security monitoring (NSM) customers. The vulnerability was confirmed as an OS command injection issue and assigned CVE-2024-3400. The issue is an unauthenticated remote code execution vulnerability with a CVSS base score of 10.0. The threat actor, which Volexity tracks under the alias UTA0218, was able to remotely exploit the firewall device, create a reverse shell, and download further tools onto the device. The attacker focused on exporting configuration data from the devices, and then leveraging it as an entry point to move laterally within the victim organizations. During its investigation, Volexity observed that UTA0218 attempted to install a custom Python backdoor, which Volexity calls UPSTYLE, on the firewall. The UPSTYLE backdoor allows the attacker to execute additional commands on the device via specially crafted network requests. UTA0218 was observed exploiting firewall devices to successfully deploy malicious payloads. After successfully exploiting devices, UTA0218 downloaded additional tooling from remote servers they controlled in order to facilitate access to victims\' internal networks. They quickly moved laterally thr]]> 2024-04-15T20:31:45+00:00 https://community.riskiq.com/article/958d183b www.secnews.physaphae.fr/article.php?IdArticle=8482982 False Tool,Vulnerability,Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Le service d'authentification multifactoriel de Cisco Duo \\<br>Cisco Duo\\'s Multifactor Authentication Service Breached A third-party telephony service provider for Cisco Duo falls prey to social engineering, and the company advises customer vigilance against subsequent phishing attacks.]]> 2024-04-15T20:21:17+00:00 https://www.darkreading.com/cyberattacks-data-breaches/cisco-duo-multifactor-authentication-service-breached www.secnews.physaphae.fr/article.php?IdArticle=8482962 False None None 2.0000000000000000 Recorded Future - FLux Recorded Future Cisco: Hacker a violé le fournisseur de messages d'authentification multifactor le 1er avril<br>Cisco: Hacker breached multifactor authentication message provider on April 1 2024-04-15T20:06:27+00:00 https://therecord.media/cisco-duo-data-breach-mfa-telephony-provider www.secnews.physaphae.fr/article.php?IdArticle=8482964 False None None 2.0000000000000000 HackRead - Chercher Cyber Planification collaborative: améliorer la coordination de l'équipe avec des outils open source<br>Collaborative Scheduling: Enhancing Team Coordination With Open-Source Tools Par uzair amir Dans l'environnement de travail en évolution rapide d'aujourd'hui, la planification collaborative se distingue comme un pilier fondamental pour efficace & # 8230; Ceci est un article de HackRead.com Lire la publication originale: Planification collaborative: améliorer la coordination de l'équipe avec des outils open-source
>By Uzair Amir In the rapidly evolving work environment of today, collaborative scheduling stands out as a foundational pillar for effective… This is a post from HackRead.com Read the original post: Collaborative Scheduling: Enhancing Team Coordination With Open-Source Tools]]>
2024-04-15T19:49:12+00:00 https://www.hackread.com/collaborative-scheduling-enhancing-team-coordination-open-source-tools/ www.secnews.physaphae.fr/article.php?IdArticle=8482932 False Tool None 2.0000000000000000
Dark Reading - Informationweek Branch Roku oblige 2FA pour les clients après compromis de compromis pour les références<br>Roku Mandates 2FA for Customers After Credential-Stuffing Compromise Roku assures customers that no financial information was stolen and that any purchases made through user accounts have been reimbursed.]]> 2024-04-15T19:43:50+00:00 https://www.darkreading.com/cyberattacks-data-breaches/roku-mandates-2fa-for-customers-after-credential-stuffing-compromise www.secnews.physaphae.fr/article.php?IdArticle=8482963 False None None 2.0000000000000000 Recorded Future - FLux Recorded Future Les chercheurs arrêtent \\ 'Tentative de prise de contrôle crédible \\' Similaire à l'incident de la porte dérobée des utils XZ<br>Researchers stop \\'credible takeover attempt\\' similar to XZ Utils backdoor incident 2024-04-15T19:41:14+00:00 https://therecord.media/researchers-stop-credible-takeover-xz-utils www.secnews.physaphae.fr/article.php?IdArticle=8482931 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Palo Alto Network émet des chaussettes pour un bug zéro-jour dans son pare-feu OS<br>Palo Alto Network Issues Hotfixes for Zero-Day Bug in Its Firewall OS A sophisticated threat actor is leveraging the bug to deploy a Python backdoor for stealing data and executing other malicious actions.]]> 2024-04-15T19:28:57+00:00 https://www.darkreading.com/cyberattacks-data-breaches/palo-alto-network-issues-hot-fixes-for-zero-day-bug-in-its-firewall-os www.secnews.physaphae.fr/article.php?IdArticle=8482930 False Vulnerability,Threat None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Copilot AI: lancement de fusées d'innovation, mais méfiez-vous de l'obscurité<br>AI Copilot: Launching Innovation Rockets, But Beware of the Darkness Ahead Imagine a world where the software that powers your favorite apps, secures your online transactions, and keeps your digital life could be outsmarted and taken over by a cleverly disguised piece of code. This isn\'t a plot from the latest cyber-thriller; it\'s actually been a reality for years now. How this will change – in a positive or negative direction – as artificial intelligence (AI) takes on]]> 2024-04-15T19:00:00+00:00 https://thehackernews.com/2024/04/ai-copilot-launching-innovation-rockets.html www.secnews.physaphae.fr/article.php?IdArticle=8482751 False None None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les changements de Balance confondus se concentrent sur le SaaS et le nuage pour les attaques d'extorsion et de vol de données<br>Muddled Libra Shifts Focus to SaaS and Cloud for Extortion and Data Theft Attacks The threat actor known as Muddled Libra has been observed actively targeting software-as-a-service (SaaS) applications and cloud service provider (CSP) environments in a bid to exfiltrate sensitive data. "Organizations often store a variety of data in SaaS applications and use services from CSPs," Palo Alto Networks Unit 42 said in a report published last week. "The threat]]> 2024-04-15T18:59:00+00:00 https://thehackernews.com/2024/04/muddled-libra-shifts-focus-to-saas-and.html www.secnews.physaphae.fr/article.php?IdArticle=8482752 False Threat,Cloud None 2.0000000000000000 SecurityWeek - Security News Cisco Duo dit que le piratage chez le fournisseur de téléphonie<br>Cisco Duo Says Hack at Telephony Supplier Exposed MFA SMS Logs Cisco Duo avertit que la violation des numéros de téléphone exposés, des opérateurs de téléphone, des métadonnées et d'autres journaux qui pourraient conduire à des attaques d'ingénierie sociale en aval.
>Cisco Duo warns that breach exposed phone numbers, phone carriers, metadata and other logs that could lead to downstream social engineering attacks. ]]>
2024-04-15T18:34:59+00:00 https://www.securityweek.com/cisco-duo-says-hack-at-telephony-supplier-exposed-mfa-sms-logs/ www.secnews.physaphae.fr/article.php?IdArticle=8482929 False Hack None 2.0000000000000000
HackRead - Chercher Cyber PALO ALTO PATCES 0-DAY (CVE-2024-3400) Exploité par Python Backdoor<br>Palo Alto Patches 0-Day (CVE-2024-3400) Exploited by Python Backdoor Par deeba ahmed pare-feu en feu! Ceci est un article de HackRead.com Lire le post original: Palo Alto Patches 0-Day (CVE-2024-3400) Exploité par Python Backdoor
>By Deeba Ahmed Firewall on fire! This is a post from HackRead.com Read the original post: Palo Alto Patches 0-Day (CVE-2024-3400) Exploited by Python Backdoor]]>
2024-04-15T18:29:11+00:00 https://www.hackread.com/palo-alto-patche-0-day-cve-2024-3400-python-backdoor/ www.secnews.physaphae.fr/article.php?IdArticle=8482902 False None None 2.0000000000000000
TroyHunt - Blog Security Le Pixel 9 se préparait au support SATEllite SOS<br>The Pixel 9 reportedly gears up for satellite SOS support No one wants to build an Android satellite phone, so Google is going to do it.]]> 2024-04-15T18:25:53+00:00 https://arstechnica.com/?p=2017214 www.secnews.physaphae.fr/article.php?IdArticle=8482959 False Mobile None 2.0000000000000000 Recorded Future - FLux Recorded Future Les hacktivistes ukrainiens prétendent violer un développeur de drones russes<br>Ukrainian hacktivists claim to breach Russian drone developer 2024-04-15T18:21:42+00:00 https://therecord.media/russia-albatross-drones-alleged-data-leak-ukraine-cyber-resistance www.secnews.physaphae.fr/article.php?IdArticle=8482901 False None None 3.0000000000000000 Wired Threat Level - Security News De fausses images de l'attaque d'Iran contre Israël devient virale<br>Fake Footage of Iran\\'s Attack on Israel Is Going Viral Misleading posts including AI-generated videos, photos, and repurposed footage from other conflicts have been viewed millions of times.]]> 2024-04-15T17:31:29+00:00 https://www.wired.com/story/iran-israel-attack-viral-fake-content/ www.secnews.physaphae.fr/article.php?IdArticle=8482874 False None None 3.0000000000000000 Recorded Future - FLux Recorded Future PALO Alto Networks Relaying Corrections pour les jours zéro alors que les attaquants essaiffent la vulnérabilité VPN<br>Palo Alto Networks releases fixes for zero-day as attackers swarm VPN vulnerability 2024-04-15T16:43:18+00:00 https://therecord.media/palo-alto-networks-fixes-vpn-zero-day www.secnews.physaphae.fr/article.php?IdArticle=8482845 False Vulnerability,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Les nouvelles attaques de Steganoamor utilisent la stéganographie pour cibler 320 organisations dans le monde entier<br>New SteganoAmor attacks use steganography to target 320 orgs globally A new campaign conducted by the TA558 hacking group is concealing malicious code inside images using steganography to deliver various malware tools onto targeted systems. [...]]]> 2024-04-15T16:31:28+00:00 https://www.bleepingcomputer.com/news/security/new-steganoamor-attacks-use-steganography-to-target-320-orgs-globally/ www.secnews.physaphae.fr/article.php?IdArticle=8482960 False Malware,Tool None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Russie et Ukraine Top Inaugural World Cybercrime Index<br>Russia and Ukraine Top Inaugural World Cybercrime Index An international team of researchers published the first-ever index ranking countries by cybercrime threat level]]> 2024-04-15T16:15:00+00:00 https://www.infosecurity-magazine.com/news/russia-ukraine-world-cybercrime/ www.secnews.physaphae.fr/article.php?IdArticle=8482848 False Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Des pirates soutenus par l'Iran font exploser des textes menaçants aux Israéliens<br>Iran-Backed Hackers Blast Out Threatening Texts to Israelis Handala threat group claims to have hacked radar systems in Israel as tensions rise between the two nations.]]> 2024-04-15T16:07:11+00:00 https://www.darkreading.com/endpoint-security/iran-backed-hackers-blast-out-threatening-texts-to-israelis www.secnews.physaphae.fr/article.php?IdArticle=8482844 False Threat None 3.0000000000000000 IndustrialCyber - cyber risk firms for industrial Claroty \\'s Team82 détaille Cyber Attack par des pirates de blackjack sur les systèmes de détection d'urgence de Moscou \\<br>Claroty\\'s Team82 details cyber attack by Blackjack hackers on Moscow\\'s emergency detection systems Researchers from Claroty\'s Team82 detailed the Blackjack hacking group, believed to be affiliated with Ukrainian intelligence services, and... ]]> 2024-04-15T16:02:10+00:00 https://industrialcyber.co/ransomware/clarotys-team82-details-cyber-attack-by-blackjack-hackers-on-moscows-emergency-detection-systems/ www.secnews.physaphae.fr/article.php?IdArticle=8482814 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Le timing est tout: le rôle de l'accès privilégié juste à temps dans l'évolution de la sécurité<br>Timing is Everything: The Role of Just-in-Time Privileged Access in Security Evolution To minimize the risk of privilege misuse, a trend in the privileged access management (PAM) solution market involves implementing just-in-time (JIT) privileged access. This approach to privileged identity management aims to mitigate the risks associated with prolonged high-level access by granting privileges temporarily and only when necessary, rather than providing users with]]> 2024-04-15T15:51:00+00:00 https://thehackernews.com/2024/04/timing-is-everything-role-of-just-in.html www.secnews.physaphae.fr/article.php?IdArticle=8482679 False Prediction None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine La nouvelle variante Lockbit exploite les fonctionnalités d'auto-répandre<br>New LockBit Variant Exploits Self-Spreading Features Kaspersky also uncovered the use of the SessionGopher script to extract saved passwords]]> 2024-04-15T15:30:00+00:00 https://www.infosecurity-magazine.com/news/lockbit-variant-self-spreading/ www.secnews.physaphae.fr/article.php?IdArticle=8482816 False None None 3.0000000000000000 Recorded Future - FLux Recorded Future Tanzanie \\ 'Étendue \\' Censors LGBTQ + Applications et sites Web, les chercheurs trouvent<br>Tanzania \\'extensively\\' censors LGBTQ+ apps and websites, researchers find 2024-04-15T15:20:33+00:00 https://therecord.media/tanzania-lgbtq-digital-censorship-report www.secnews.physaphae.fr/article.php?IdArticle=8482815 False None None 2.0000000000000000 RiskIQ - cyber risk firms (now microsoft) Faits saillants hebdomadaires, 15 avril 2024<br>Weekly OSINT Highlights, 15 April 2024 2024-04-15T15:15:00+00:00 https://community.riskiq.com/article/c2035b32 www.secnews.physaphae.fr/article.php?IdArticle=8482834 False Ransomware,Spam,Malware,Tool,Threat,Prediction None 2.0000000000000000 Krebs on Security - Chercheur Américain Grillons des systèmes de chirp dans une fuite de clé de verrouillage intelligent<br>Crickets from Chirp Systems in Smart Lock Key Leak The U.S. government is warning that smart locks securing entry to an estimated 50,000 dwellings nationwide contain hard-coded credentials that can be used to remotely open any of the locks. The lock\'s maker Chirp Systems remains unresponsive, even though it was first notified about the critical weakness in March 2021. Meanwhile, Chirp\'s parent company, RealPage, Inc., is being sued by multiple U.S. states for allegedly colluding with landlords to illegally raise rents.]]> 2024-04-15T14:51:17+00:00 https://krebsonsecurity.com/2024/04/crickets-from-chirp-systems-in-smart-lock-key-leak/ www.secnews.physaphae.fr/article.php?IdArticle=8482811 False None None 2.0000000000000000 Silicon - Site de News Francais Les leçons d\'une start-up sur l\'usage de l\'API OpenAPI 2024-04-15T14:44:13+00:00 https://www.silicon.fr/lecons-usage-gpt-api-openai-477757.html www.secnews.physaphae.fr/article.php?IdArticle=8482812 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Développeurs de jeux Web3 ciblés dans le schéma de vol cryptographique<br>Web3 Game Developers Targeted in Crypto Theft Scheme A Russian-language cyberattack campaign impersonates legitimate game operations to spread various cross-platform infostealers.]]> 2024-04-15T14:35:03+00:00 https://www.darkreading.com/cyberattacks-data-breaches/russian-actor-targets-web3-game-developers-with-infostealers www.secnews.physaphae.fr/article.php?IdArticle=8482783 False None None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les logiciels espions iOS liés à listes chinoises ciblent les utilisateurs d'iPhone sud-asiatique<br>Chinese-Linked LightSpy iOS Spyware Targets South Asian iPhone Users Cybersecurity researchers have discovered a "renewed" cyber espionage campaign targeting users in South Asia with the aim of delivering an Apple iOS spyware implant called LightSpy. "The latest iteration of LightSpy, dubbed \'F_Warehouse,\' boasts a modular framework with extensive spying features," the BlackBerry Threat Research and Intelligence Team said in a report published last]]> 2024-04-15T14:34:00+00:00 https://thehackernews.com/2024/04/chinese-linked-lightspy-ios-spyware.html www.secnews.physaphae.fr/article.php?IdArticle=8482613 False Threat,Mobile None 2.0000000000000000 CyberScoop - scoopnewsgroup.com special Cyber Le projet de loi sur la confidentialité du Congrès cherche à freiner les courtiers de données<br>Congressional privacy bill looks to rein in data brokers Les experts disent que l'American Privacy Rights Act est une bonne première étape, mais cela peut être fait pour protéger les consommateurs de la vente de leurs données personnelles.
>Experts say the American Privacy Rights Act is a good first step but that more can be done to protect consumers from the sale of their personal data. ]]>
2024-04-15T14:33:51+00:00 https://cyberscoop.com/congressional-privacy-bill-looks-to-rein-in-data-brokers/ www.secnews.physaphae.fr/article.php?IdArticle=8482780 False None None 2.0000000000000000
InfoSecurity Mag - InfoSecurity Magazine Palo Alto Networks Flaw Zero-Day exploité dans des attaques ciblées<br>Palo Alto Networks Zero-Day Flaw Exploited in Targeted Attacks Designated CVE-2024-3400 and with a CVSS score of 10.0, the flaw enables unauthorized actors to execute arbitrary code on affected firewalls]]> 2024-04-15T14:30:00+00:00 https://www.infosecurity-magazine.com/news/palo-alto-networks-zero-day-flaw/ www.secnews.physaphae.fr/article.php?IdArticle=8482784 False Vulnerability,Threat None 2.0000000000000000 ZoneAlarm - Security Firm Blog Escroqueries du travail le caisselet silencieux dans les recherches d'emploi<br>Job Scams The Silent Snare in Employment Searches Les demandeurs d'emploi sont confrontés non seulement à la tâche intimidante de trouver un emploi, mais aussi au danger qui se cache de la victime des escroqueries par l'emploi. & # 160;Une arnaque d'emploi est une offre frauduleuse de travail qui cible spécifiquement les personnes qui recherchent un emploi légitime.Les escrocs utilisent diverses tactiques pour tromper les demandeurs d'emploi, dans l'objectif ultime d'obtenir de l'argent, des informations personnelles, & # 8230;
>Job seekers face not only the daunting task of finding employment but also the lurking danger of falling victim to job scams.  A job scam is a fraudulent offer for work that specifically targets individuals seeking legitimate employment. Scammers employ various tactics to deceive job seekers, with the ultimate goal of obtaining money, personal information, … ]]>
2024-04-15T14:18:31+00:00 https://blog.zonealarm.com/2024/04/job-scams-the-silent-snare-in-employment-searches/ www.secnews.physaphae.fr/article.php?IdArticle=8482776 False None None 2.0000000000000000
HackRead - Chercher Cyber Prise en charge du logiciel: 7 raisons essentielles que vous ne pouvez pas négliger<br>Software Support: 7 Essential Reasons You Can\\'t Overlook owais sultan Explorez l'importance du support logiciel dans le monde numérique au rythme rapide.Découvrez comment la maintenance continue, la fixation des bogues, l'amélioration des fonctionnalités et la gestion de l'intégration optimisent les opérations.Avec une aide experte, améliorer la sécurité, assurer la continuité du projet et améliorer les processus d'excellence opérationnelle Ceci est un article de HackRead.com Lire la publication originale: Prise en charge du logiciel: 7 raisons essentielles que vous ne pouvez pas ignorer
By Owais Sultan Explore the significance of software support in the fast-paced digital world. Discover how continuous maintenance, bug fixing, feature enhancement, and integration management optimize operations. With expert assistance, enhance security, ensure project continuity, and improve processes for operational excellence This is a post from HackRead.com Read the original post: Software Support: 7 Essential Reasons You Can’t Overlook]]>
2024-04-15T14:02:42+00:00 https://www.hackread.com/software-support-7-reasons-you-cant-overlook/ www.secnews.physaphae.fr/article.php?IdArticle=8482745 False None None 2.0000000000000000
Dark Reading - Informationweek Branch Microsoft veut que vous regardiez ce qu'il dit, pas ce qu'il fait<br>Microsoft Wants You to Watch What It Says, Not What It Does The responsibility to hold Microsoft accountable for abiding by its self-proclaimed principles shouldn\'t fall to customers and competition authorities.]]> 2024-04-15T14:00:00+00:00 https://www.darkreading.com/vulnerabilities-threats/microsoft-wants-you-to-watch-what-it-says-not-what-it-does www.secnews.physaphae.fr/article.php?IdArticle=8482742 False None None 4.0000000000000000 Vuln AWS - FLux Vuln AWS CVE-2024-28056 aws-security@amazon.com avec toute question ou préoccupation de sécurité.
Publication Date: 2024/04/15 07:00 PM PST AWS is aware of CVE-2024-28056, which affects Amplify CLI versions prior to 12.10.1. We released a fix to Amplify on January 10, 2024, and recommend customers upgrade to 12.10.1 to address this issue. We have proactively communicated with the customers using affected versions. AWS has taken additional steps to protect customers using Amplify from unintentional misconfigurations. AWS added a mitigation to the AWS Security Token Service (STS) where attempts to make a cross-account role assumption with a trust policy referencing AWS Cognito as the trusted principal, without conditions restricting access, will fail. As a result, cross-account access will no longer be possible with policies created by earlier unpatched versions of Amplify.". AWS also added a mitigation to the AWS Identity and Access Management (IAM) control plane such that any attempt to create a role trust policy that references AWS Cognito as the trusted principal, without adding conditions restricting access, will fail. We would like to thank Datadog for responsibly disclosing this issue to AWS. Please email aws-security@amazon.com with any security questions or concerns. ]]>
2024-04-15T13:59:10+00:00 https://aws.amazon.com/security/security-bulletins/AWS-2024-003/ www.secnews.physaphae.fr/article.php?IdArticle=8482777 False None None None
McAfee Labs - Editeur Logiciel Comment gérez-vous votre confidentialité des médias sociaux?<br>How Do You Manage Your Social Media Privacy? \\ 'Assurez-vous que vos paramètres de confidentialité sont définis au plus haut niveau \' & # 8211;Si vous lisez un peu mes messages ...
> \'Ensure your privacy settings are set to the highest level\' – if you\'ve been reading my posts for a bit... ]]>
2024-04-15T13:51:39+00:00 https://www.mcafee.com/blogs/internet-security/how-do-you-manage-your-social-media-privacy/ www.secnews.physaphae.fr/article.php?IdArticle=8482744 False None None 1.00000000000000000000
IndustrialCyber - cyber risk firms for industrial Kaspersky ICS CERT rapporte sur l'escalade des conséquences des cyberattaques contre les organisations industrielles<br>Kaspersky ICS CERT reports on escalating consequences of cyber attacks on industrial organizations New data released by researchers from the Kaspersky ICS CERT team provides details on cybercriminal and hacktivist attacks... ]]> 2024-04-15T13:47:34+00:00 https://industrialcyber.co/reports/kaspersky-ics-cert-reports-on-escalating-consequences-of-cyber-attacks-on-industrial-organizations/ www.secnews.physaphae.fr/article.php?IdArticle=8482743 False Industrial None 4.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Palo Alto Networks libère des correctifs urgents pour la vulnérabilité PAN-OS exploitée<br>Palo Alto Networks Releases Urgent Fixes for Exploited PAN-OS Vulnerability Palo Alto Networks has released hotfixes to address a maximum-severity security flaw impacting PAN-OS software that has come under active exploitation in the wild. Tracked as CVE-2024-3400 (CVSS score: 10.0), the critical vulnerability is a case of command injection in the GlobalProtect feature that an unauthenticated attacker could weaponize to execute arbitrary code with root]]> 2024-04-15T13:47:00+00:00 https://thehackernews.com/2024/04/palo-alto-networks-releases-urgent.html www.secnews.physaphae.fr/article.php?IdArticle=8482580 False Vulnerability None 2.0000000000000000 Silicon - Site de News Francais OpenAI licencie deux chercheurs suite à des fuites d\'informations 2024-04-15T13:03:01+00:00 https://www.silicon.fr/openai-licencie-deux-chercheurs-suite-a-des-fuites-dinformations-477763.html www.secnews.physaphae.fr/article.php?IdArticle=8482712 False None None 3.0000000000000000 IT Security Guru - Blog Sécurité # MIWIC24 Cyber Marketeur de l'année: Laura Reilly<br>#MIWIC24 Cyber Marketeer of the Year: Laura Reilly # miwic24 Cyber Marketered of the the the the the the the the the the the-marketeer of the the the the the the the the-cyber marketinger of the the the the the the the theAnnée: Laura Reilly est apparue pour la première fois sur gourou de la sécurité informatique .
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on this year’s winner of the Paula Brici Cyber Marketeer of the Year Award, which was presented to Laura Reilly for her exceptional […] The post #MIWIC24 Cyber Marketeer of the Year: Laura Reilly first appeared on IT Security Guru. ]]>
2024-04-15T13:02:23+00:00 https://www.itsecurityguru.org/2024/04/15/miwic24-cyber-marketeer-of-the-year-laura-reilly/?utm_source=rss&utm_medium=rss&utm_campaign=miwic24-cyber-marketeer-of-the-year-laura-reilly www.secnews.physaphae.fr/article.php?IdArticle=8482708 False None None 2.0000000000000000
Checkpoint - Fabricant Materiel Securite Microsoft et Google en tête de liste des attaques de phishing du premier tri<br>Microsoft and Google Top the List in Q1 2024 Phishing Attacks: Check Point Research Highlights a Surge in Cyber Threats L'entrée Airbnb & # 8217; dans le top 10 des marques a imité les signaux élargissant les horizons cybercriminaux dans le paysage en constante évolution des cyber-menaces, les attaques de phishing continuent de présenter un risque important pour les individus et les organisations dans le monde.Check Point Research (RCR), la branche de renseignement des menaces de Check Point & Reg;Software Technologies Ltd., a récemment publié son dernier classement de phishing de marque pour le premier trimestre de 2024. Ce classement a mis en lumière les marques les plus fréquemment imitées par les cybercriminels dans leurs tentatives implacables de tromper et de voler des informations personnelles ou des informations d'identification de paiement.Au cours du premier trimestre de 2024, Microsoft a continué d'être la marque la plus imitée en phishing [& # 8230;]
>Airbnb’s Entry into Top 10 imitated Brands Signals Expanding Cybercriminal Horizons In the ever-evolving landscape of cyber threats, phishing attacks continue to pose a significant risk to individuals and organizations worldwide. Check Point Research (CPR), the Threat Intelligence arm of Check Point® Software Technologies Ltd., has recently released its latest Brand Phishing Ranking for the first quarter of 2024. This ranking shed light on the brands most frequently imitated by cybercriminals in their relentless attempts to deceive and steal personal information or payment credentials. During the first quarter of 2024, Microsoft continued to be the most imitated brand in phishing […] ]]>
2024-04-15T13:00:33+00:00 https://blog.checkpoint.com/security/microsoft-and-google-top-the-list-in-q1-2024-phishing-attacks-check-point-research-highlights-a-surge-in-cyber-threats/ www.secnews.physaphae.fr/article.php?IdArticle=8482740 False Threat None 3.0000000000000000
Palo Alto Network - Site Constructeur Ce qui est suivant dans le cortex - XSIAM pour le cloud et d'autres innovations<br>What\\'s Next in Cortex - XSIAM for Cloud and Other Innovations Cortex XSIAM présente de nouvelles capacités pour aider à relever une grande variété de défis, y compris de nouvelles capacités cloud et des améliorations de fonctionnalités.
>Cortex XSIAM introduces new capabilities to help tackle a wide variety of challenges, including new cloud capabilities and feature enhancements. ]]>
2024-04-15T13:00:27+00:00 https://www.paloaltonetworks.com/blog/2024/04/whats-next-in-cortex-tackling-diverse-secops-challenges/ www.secnews.physaphae.fr/article.php?IdArticle=8482706 False Cloud None 3.0000000000000000
HackRead - Chercher Cyber SEXT SECRETS: Comment les applications Messenger gardent vos chats<br>Texting Secrets: How Messenger Apps Guard Your Chats Par uzair amir Vous vous inquiétez des yeux indiscrets?Nous expliquons comment les applications Messenger gardent vos chats confidentiels avec des fonctionnalités comme Encryption & # 038;Authentification multi-facteurs.Renseignez-vous sur les risques de sécurité & # 038;technologies émergentes pour un avenir numérique plus sûr. Ceci est un article de HackRead.com Lire la publication originale: SEMPS SEMPS: Comment les applications Messenger gardent vos chats
>By Uzair Amir Worried about prying eyes? We explain how messenger apps keep your chats confidential with features like encryption & multi-factor authentication. Learn about security risks & emerging technologies for a safer digital future. This is a post from HackRead.com Read the original post: Texting Secrets: How Messenger Apps Guard Your Chats]]>
2024-04-15T12:59:56+00:00 https://www.hackread.com/texting-how-messenger-apps-guard-your-chats/ www.secnews.physaphae.fr/article.php?IdArticle=8482711 False None None 3.0000000000000000
Global Security Mag - Site de news francais Apple alerte ses utilisateurs visés par des attaques de logiciels espions, répartis dans 92 pays Malwares]]> 2024-04-15T12:56:47+00:00 https://www.globalsecuritymag.fr/apple-alerte-ses-utilisateurs-vises-par-des-attaques-de-logiciels-espions.html www.secnews.physaphae.fr/article.php?IdArticle=8482766 False None None 1.00000000000000000000 SecurityWeek - Security News Destructif ics malware \\ 'Fuxnet \\' utilisé par l'Ukraine contre l'infrastructure russe<br>Destructive ICS Malware \\'Fuxnet\\' Used by Ukraine Against Russian Infrastructure ICS malware Fuxnet allegedly used by Ukrainian Blackjack group to disrupt industrial sensors and other systems belonging to a Moscow infrastructure firm. ]]> 2024-04-15T12:51:28+00:00 https://www.securityweek.com/destructive-ics-malware-fuxnet-used-by-ukraine-against-russian-infrastructure/ www.secnews.physaphae.fr/article.php?IdArticle=8482741 False Malware,Industrial None 3.0000000000000000 Korben - Bloger francais RNNoise, la lib qui supprime le bruit, sort en version 0.2 2024-04-15T12:50:09+00:00 https://korben.info/rnnoise-0-2-suppression-bruit-reseau-neuronal-pc.html www.secnews.physaphae.fr/article.php?IdArticle=8482746 False None None 2.0000000000000000 Korben - Bloger francais Un joueur japonais arrêté pour vente de Pokémons trafiqués 2024-04-15T12:41:17+00:00 https://korben.info/pokemon-joueur-japonais-arrete-vente-monstres-modifies.html www.secnews.physaphae.fr/article.php?IdArticle=8482747 False Legislation None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Chipmaker Giant Nexperia confirme la cyberattaque au milieu des réclamations du groupe ransomware<br>Chipmaker Giant Nexperia Confirms Cyber-Attack Amid Ransomware Group Claims Nexperia confirmed its IT servers were accessed by attackers, with the Dunghill ransomware group claiming to have stolen chip designs and other sensitive documents]]> 2024-04-15T12:35:00+00:00 https://www.infosecurity-magazine.com/news/chipmaker-nexperia-attack/ www.secnews.physaphae.fr/article.php?IdArticle=8482713 False Ransomware None 2.0000000000000000 Korben - Bloger francais Attention aux Deep \'Cyprien\' Fakes ! 2024-04-15T12:34:16+00:00 https://korben.info/ia-generatrice-deepfake-cyprien-enflamme-web.html www.secnews.physaphae.fr/article.php?IdArticle=8482748 False None None 2.0000000000000000 Recorded Future - FLux Recorded Future La société de semi-conducteurs appartenant à des Chinois Nexperia a frappé par une attaque de ransomware<br>Chinese-owned semiconductor company Nexperia hit by ransomware attack 2024-04-15T12:18:08+00:00 https://therecord.media/nexperia-semiconductor-company-ransomware-incident www.secnews.physaphae.fr/article.php?IdArticle=8482709 False Ransomware None 2.0000000000000000 Data Security Breach - Site de news Francais Crise évitée de justesse : comment une cyberattaque sur Linux a failli bouleverser Internet 2024-04-15T12:11:11+00:00 https://www.datasecuritybreach.fr/xz-utils/ www.secnews.physaphae.fr/article.php?IdArticle=8482710 False None None 2.0000000000000000 Cisco - Security Firm Blog Cisco Telemetry Broker (CTB) 2.1 lancement<br>Cisco Telemetry Broker (CTB) 2.1 Launch Cisco Telemetry Broker 2.1 is now GA and provides many great capabilities for customers including performance enhancements and the ability to generate Netflow.]]> 2024-04-15T12:00:14+00:00 https://feedpress.me/link/23535/16650544/cisco-telemetry-broker-ctb-2-1-launch www.secnews.physaphae.fr/article.php?IdArticle=8482674 False None None 2.0000000000000000 Bleeping Computer - Magazine Américain Chipmaker Nexperia confirme la violation après la fuite de gangs de ransomware qui divulgue<br>Chipmaker Nexperia confirms breach after ransomware gang leaks data Dutch chipmaker Nexperia confirmed late last week that hackers breached its network in March 2024 after a ransomware gang leaked samples of allegedly stolen data. [...]]]> 2024-04-15T12:00:01+00:00 https://www.bleepingcomputer.com/news/security/chipmaker-nexperia-confirms-breach-after-ransomware-gang-leaks-data/ www.secnews.physaphae.fr/article.php?IdArticle=8482813 False Ransomware None 2.0000000000000000 HackRead - Chercher Cyber L'arrêt du FBI et de l'AFP, un développeur présumé, marketeur de Firebird / Hive Rat<br>FBI and AFP Arrest Alleged Developer, Marketer of Firebird/Hive RAT Par waqas Firebird Rat, également connu sous le nom de Hive, est paralysé dans une opération internationale de piqûre.Le FBI et l'AFP ont arrêté le développeur et le spécialiste du marketing de ce cheval de Troie à distance malveillant. Ceci est un article de HackRead.com Lire le post original: L'arrêt du FBI et de l'AFP, un développeur présumé, marketeur de Firebird / Hive Rat
>By Waqas Firebird RAT, also known as Hive, crippled in an international sting operation. The FBI and AFP arrested the developer and marketer of this malicious remote access trojan. This is a post from HackRead.com Read the original post: FBI and AFP Arrest Alleged Developer, Marketer of Firebird/Hive RAT]]>
2024-04-15T11:56:16+00:00 https://www.hackread.com/fbi-afp-arrest-developer-firebird-hive-rat/ www.secnews.physaphae.fr/article.php?IdArticle=8482676 False None None 3.0000000000000000
Data Security Breach - Site de news Francais Hausse des attaques d\'ingénierie sociale dans le secteur des services d\'assistance informatique en santé 2024-04-15T11:49:52+00:00 https://www.datasecuritybreach.fr/social-engineering-sante-hhs/ www.secnews.physaphae.fr/article.php?IdArticle=8482675 False None None 2.0000000000000000 The Register - Site journalistique Anglais Feline Firewall a réveillé le développeur à Declaw DDOS DSASTAST<br>Feline firewall woke developer to declaw DDoS disaster System alerts were pinging but cat had no way of knowing what was happening A developer named Danny Guo has shared a story of the time his cat alerted him to a DDoS attack.…]]> 2024-04-15T11:30:08+00:00 https://go.theregister.com/feed/www.theregister.com/2024/04/15/cat_warns_owner_of_ddos/ www.secnews.physaphae.fr/article.php?IdArticle=8482677 False None None 2.0000000000000000 Checkpoint Research - Fabricant Materiel Securite 15 avril & # 8211;Rapport de renseignement sur les menaces<br>15th April – Threat Intelligence Report Pour les dernières découvertes en cyberLes principales attaques et violation du géant de l'optique japonaise Hoya Corporation ont été victimes d'une attaque de ransomware qui a eu un impact sur sa principale infrastructure informatique et diverses divisions commerciales.Hunters International Ransomware Gang a revendiqué la responsabilité de l'attaque et [& # 8230;]
>For the latest discoveries in cyber research for the week of 15th April, please download our Threat_Intelligence Bulletin. TOP ATTACKS AND BREACHES Japanese optics giant Hoya Corporation has been a victim of a ransomware attack that impacted its major IT infrastructure and various business divisions. Hunters International ransomware gang claimed responsibility for the attack and […] ]]>
2024-04-15T11:16:11+00:00 https://research.checkpoint.com/2024/15th-april-threat-intelligence-report/ www.secnews.physaphae.fr/article.php?IdArticle=8482678 False Ransomware,Threat None 2.0000000000000000
Schneier on Security - Chercheur Cryptologue Américain Nouvelle technique cryptanalytique du réseau<br>New Lattice Cryptanalytic Technique nouveau papier présente un algorithme quantique en temps polynomial pour résoudre certains problèmes de réseau dur.Cela pourrait être un gros problème pour les algorithmes cryptographiques post-Quantum, car beaucoup d'entre eux fondent leur sécurité sur les problèmes de réseau dur. quelques choses à noter.Premièrement, ce document n'a pas encore été évalué par des pairs.Comme ce commentaire souligne: & # 8220; nous avionsDéjà dans certains cas où des algorithmes quantiques efficaces pour des problèmes de réseau ont été découverts, mais ils se sont avérés Ne pas être correct ou n'a travaillé que pour caisses spéciales simples . & # 8221; deux, il s'agit d'un algorithme quantique, ce qui signifie qu'il n'a pas été testé.Il y a un large fossé entre les algorithmes quantiques en théorie et dans la pratique.Et jusqu'à ce que nous puissions réellement coder et tester ces algorithmes, nous devons nous méfier de leurs revendications de vitesse et de complexité ...
A new paper presents a polynomial-time quantum algorithm for solving certain hard lattice problems. This could be a big deal for post-quantum cryptographic algorithms, since many of them base their security on hard lattice problems. A few things to note. One, this paper has not yet been peer reviewed. As this comment points out: “We had already some cases where efficient quantum algorithms for lattice problems were discovered, but they turned out not being correct or only worked for simple special cases.” Two, this is a quantum algorithm, which means that it has not been tested. There is a wide gulf between quantum algorithms in theory and in practice. And until we can actually code and test these algorithms, we should be suspicious of their speed and complexity claims...]]>
2024-04-15T11:04:50+00:00 https://www.schneier.com/blog/archives/2024/04/new-lattice-cryptanalytic-technique.html www.secnews.physaphae.fr/article.php?IdArticle=8482643 False None None 2.0000000000000000
Bleeping Computer - Magazine Américain Daixin Ransomware Gang affirme une attaque sur les hôtels Omni<br>Daixin ransomware gang claims attack on Omni Hotels The Daixin Team ransomware gang claimed a recent cyberattack on Omni Hotels & Resorts and is now threatening to publish customers\' sensitive information if a ransom is not paid. [...]]]> 2024-04-15T11:01:54+00:00 https://www.bleepingcomputer.com/news/security/daixin-ransomware-gang-claims-attack-on-omni-hotels/ www.secnews.physaphae.fr/article.php?IdArticle=8482781 False Ransomware None 2.0000000000000000 Silicon - Site de News Francais ESG : comment le " datacenter vert " gagne du terrain 2024-04-15T10:59:45+00:00 https://www.silicon.fr/esg-comment-le-datacenter-vert-gagne-du-terrain-477614.html www.secnews.physaphae.fr/article.php?IdArticle=8482644 False Cloud None 2.0000000000000000 Bleeping Computer - Magazine Américain Cisco Duo avertit la violation de données tierce des journaux SMS exposés<br>Cisco Duo warns third-party data breach exposed SMS MFA logs Cisco Duo\'s security team warns that hackers stole some customers\' VoIP and SMS logs for multi-factor authentication (MFA) messages in a cyberattack on their telephony provider. [...]]]> 2024-04-15T10:52:39+00:00 https://www.bleepingcomputer.com/news/security/cisco-duo-warns-third-party-data-breach-exposed-sms-mfa-logs/ www.secnews.physaphae.fr/article.php?IdArticle=8482782 False Data Breach None 2.0000000000000000 Silicon - Site de News Francais OpenTofu-HashiCorp : frictions autour de la licence BSL 2024-04-15T10:17:55+00:00 https://www.silicon.fr/opentofu-hashicorp-bsl-477744.html www.secnews.physaphae.fr/article.php?IdArticle=8482645 False None None 2.0000000000000000 Korben - Bloger francais Les IA comme ChatGPT aident-elles réellement les étudiants en informatique ? 2024-04-15T10:13:05+00:00 https://korben.info/apprendre-a-coder-avec-ia-etude-generateurs-code-novice.html www.secnews.physaphae.fr/article.php?IdArticle=8482646 False Tool ChatGPT 3.0000000000000000 Global Security Mag - Site de news francais Alertes de vulnérabilité de la vigilance - Wind River Vxworks: fuite de mémoire via OpenSSL Task / POSIX Thread, analysé le 15/02/2024<br>Vigilance Vulnerability Alerts - Wind River VxWorks: memory leak via OpenSSL Task / POSIX Thread, analyzed on 15/02/2024 vulnérabilité de sécurité
An attacker can create a memory leak of Wind River VxWorks, via OpenSSL Task / POSIX Thread, in order to trigger a denial of service. - Security Vulnerability]]>
2024-04-15T10:07:07+00:00 https://www.globalsecuritymag.fr/vigilance-vulnerability-alerts-wind-river-vxworks-memory-leak-via-openssl-task.html www.secnews.physaphae.fr/article.php?IdArticle=8482630 False Vulnerability None 2.0000000000000000
Kaspersky - Kaspersky Research blog Utilisation du constructeur de verrouillage pour générer des ransomwares ciblés<br>Using the LockBit builder to generate targeted ransomware Kaspersky researchers revisit the leaked LockBit 3.0 builder and share insights into a real-life incident involving a custom targeted ransomware variant created with this builder.]]> 2024-04-15T10:00:28+00:00 https://securelist.com/lockbit-3-0-based-custom-targeted-ransomware/112375/ www.secnews.physaphae.fr/article.php?IdArticle=8482611 False Ransomware None 2.0000000000000000 AlienVault Lab Blog - AlienVault est un acteur de defense majeur dans les IOC Le cycle de vie d'un fichier numérique<br>The Lifecycle of a Digital File 2024-04-15T10:00:00+00:00 https://cybersecurity.att.com/blogs/security-essentials/the-lifecycle-of-a-digital-file www.secnews.physaphae.fr/article.php?IdArticle=8482607 False Tool None 3.0000000000000000 Global Security Mag - Site de news francais HarfangLab et Filigran s\'allient pour optimiser la réponse à incidents Business]]> 2024-04-15T09:39:45+00:00 https://www.globalsecuritymag.fr/harfanglab-et-filigran-s-allient-pour-optimiser-la-reponse-a-incidents.html www.secnews.physaphae.fr/article.php?IdArticle=8482631 False Threat None 2.0000000000000000 Korben - Bloger francais Windows 11 enfin accessible aux PC Rocket Lake après deux ans d\'attente 2024-04-15T09:38:50+00:00 https://korben.info/windows-11-microsoft-leve-blocage-mise-a-jour-cpu-rocket-lake.html www.secnews.physaphae.fr/article.php?IdArticle=8482647 False None None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Le FBI met en garde contre les services de péage massifs<br>FBI Warns of Massive Toll Services Smishing Scam The Feds have received thousands of complaints about phishing texts from fake road toll collection services]]> 2024-04-15T09:30:00+00:00 https://www.infosecurity-magazine.com/news/fbi-toll-services-smishing-scam/ www.secnews.physaphae.fr/article.php?IdArticle=8482612 False None None 2.0000000000000000 Incogni - Blog Sécu de la société incogni, spécialisé en protection de la vie privé Combien de fois mon nom a-t-il été googlé?<br>How many times has my name been Googled? 2024-04-15T09:21:30+00:00 https://blog.incogni.com/how-many-times-has-my-name-been-googled/ www.secnews.physaphae.fr/article.php?IdArticle=8482610 False None None 3.0000000000000000 Zataz - Magazine Francais de secu L\'impact de l\'intelligence artificielle sur la société et les menaces croissantes des cybercriminels 2024-04-15T09:08:44+00:00 https://www.zataz.com/limpact-de-lintelligence-artificielle-sur-la-societe-et-les-menaces-croissantes-des-cybercriminels/ www.secnews.physaphae.fr/article.php?IdArticle=8482614 False Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine La police a plongé sur & euro; 645m Gang de fraude d'investissement de cannabis<br>Police Swoop on €645m Cannabis Investment Fraud Gang Nine arrests and millions of euros seized in bid to bust JuicyFields investment scammers]]> 2024-04-15T08:45:00+00:00 https://www.infosecurity-magazine.com/news/police-swoop-645m-cannabis/ www.secnews.physaphae.fr/article.php?IdArticle=8482579 False Legislation None 2.0000000000000000 Silicon - Site de News Francais Salesforce, d\'actionnaire à propriétaire d\'Informatica ? 2024-04-15T08:18:40+00:00 https://www.silicon.fr/salesforce-informatica-477740.html www.secnews.physaphae.fr/article.php?IdArticle=8482578 False None None 2.0000000000000000 Korben - Bloger francais Netflix crée la polémique avec de fausses photos IA dans un docu true crime 2024-04-15T08:16:38+00:00 https://korben.info/netflix-utilise-fausses-photos-ia-documentaire-true-crime.html www.secnews.physaphae.fr/article.php?IdArticle=8482581 False None None 2.0000000000000000 Global Security Mag - Site de news francais MongoDB étend sa collaboration avec Google Cloud Produits]]> 2024-04-15T08:13:08+00:00 https://www.globalsecuritymag.fr/mongodb-etend-sa-collaboration-avec-google-cloud.html www.secnews.physaphae.fr/article.php?IdArticle=8482597 False Tool,Cloud None 3.0000000000000000 Global Security Mag - Site de news francais Cinq manières de rendre un pipeline CI/CD vulnérable. Points de Vue]]> 2024-04-15T08:01:45+00:00 https://www.globalsecuritymag.fr/cinq-manieres-de-rendre-un-pipeline-ci-cd-vulnerable.html www.secnews.physaphae.fr/article.php?IdArticle=8482563 False None None 3.0000000000000000 Global Security Mag - Site de news francais Avast lance Avast One Silver Produits]]> 2024-04-15T07:56:50+00:00 https://www.globalsecuritymag.fr/avast-lance-avast-one-silver.html www.secnews.physaphae.fr/article.php?IdArticle=8482564 False None None 2.0000000000000000 Zataz - Magazine Francais de secu L\'impact dévastateur des cyberattaques sur l\'industrie hôtelière : le cas d\'Omni Hotels & Resorts 2024-04-15T07:51:39+00:00 https://www.zataz.com/limpact-devastateur-des-cyberattaques-sur-lindustrie-hoteliere-le-cas-domni-hotels-resorts/ www.secnews.physaphae.fr/article.php?IdArticle=8482545 False None None 2.0000000000000000 Korben - Bloger francais La plateforme MEDIUM interdit le contenu généré par IA de son programme partenaire 2024-04-15T07:25:46+00:00 https://korben.info/ia-bannie-medium-plateforme-interdit-contenu-genere-ia-programme-partenaire.html www.secnews.physaphae.fr/article.php?IdArticle=8482546 False None None 2.0000000000000000 Korben - Bloger francais SUPIR – L\'IA qui restaure vos photos comme jamais 2024-04-15T07:00:00+00:00 https://korben.info/supir-revolutionnary-ai-powered-image-restoration-high-quality-text-guided-control.html www.secnews.physaphae.fr/article.php?IdArticle=8482547 False None None 3.0000000000000000 ProofPoint - Cyber Firms Comment la protection d'identification de la preuve peut vous aider à répondre aux exigences de conformité CMMC<br>How Proofpoint Impersonation Protection Can Help You Meet CMMC Compliance Requirements 2024-04-15T06:00:31+00:00 https://www.proofpoint.com/us/blog/email-and-cloud-threats/safeguard-business-with-impersonation-protection www.secnews.physaphae.fr/article.php?IdArticle=8482707 False Threat,Industrial,Prediction,Commercial None 2.0000000000000000 The State of Security - Magazine Américain Qu'est-ce qu'un agent axone, et pourquoi en avez-vous besoin?<br>What Is an Axon Agent, and Why Do You Need One? The number of endpoints in an organization often exceeds the number of employees. Managing these often disparate entities is more than a full-time job. Moreover, keeping them secure is equally difficult, yet securing all of your endpoints against cyber threats has become paramount for organizations worldwide. A common oversight that undermines these security efforts is the misconception about data volume versus the necessity for comprehensive data collection. Endpoint security does not need to be an insurmountable task. Fortra\'s Tripwire Axon agent revolutionizes endpoint security by ensuring...]]> 2024-04-15T03:11:38+00:00 https://www.tripwire.com/state-of-security/what-axon-agent-and-why-do-you-need-one www.secnews.physaphae.fr/article.php?IdArticle=8482576 False None None 2.0000000000000000 The State of Security - Magazine Américain What Is an Axon Agent, and Why Do You Need One? The number of endpoints in an organization often exceeds the number of employees. Managing these often disparate entities is more than a full-time job. Moreover, keeping them secure is equally difficult, yet securing all of your endpoints against cyber threats has become paramount for organizations worldwide. A common oversight that undermines these security efforts is the misconception about data volume versus the necessity for comprehensive data collection. Endpoint security does not need to be an insurmountable task. Fortra\'s Tripwire Axon agent revolutionizes endpoint security by ensuring...]]> 2024-04-15T03:11:38+00:00 https://www.tripwire.com/state-of-security/what-is-fim-agent www.secnews.physaphae.fr/article.php?IdArticle=8483270 False None None 2.0000000000000000 The State of Security - Magazine Américain Le rapport de violation de données d'ITRC \\ en 2023 est un sac mixte<br>ITRC\\'s 2023 Data Breach Report Is a Mixed Bag In the first quarter of every year, organizations around the world release reports summing up data breach trends from the previous twelve months. And every year, these reports say broadly the same thing: data breach numbers have gone up again. This year is no different. Or is it? Compromises Up, Victims Down However, the Identity Theft Resource Center\'s (ITRC) Data Breach Report 2023 tells a somewhat more complicated story. The total number of compromises in 2023 rose by 72% since the previous record high in 2021, but the total number of victims fell 16% year-on-year. In the report\'s executive...]]> 2024-04-15T03:11:35+00:00 https://www.tripwire.com/state-of-security/itrc-data-breach-report www.secnews.physaphae.fr/article.php?IdArticle=8482577 False Data Breach None 2.0000000000000000 The Register - Site journalistique Anglais US House approuve FISA Renewal & # 8211;surveillance sans mandat et tout<br>US House approves FISA renewal – warrantless surveillance and all PLUS: Chinese chipmaker Nexperia attacked; A Microsoft-signed backdoor; CISA starts scanning your malware; and more Infosec in brief  US Congress nearly killed a reauthorization of FISA Section 702 last week over concerns that it would continue to allow warrantless surveillance of Americans, but an amendment to require a warrant failed to pass.…]]> 2024-04-15T01:58:06+00:00 https://go.theregister.com/feed/www.theregister.com/2024/04/15/security_in_brief/ www.secnews.physaphae.fr/article.php?IdArticle=8482388 False Malware None 2.0000000000000000 AhnLab - Korean Security Firm Package «totalement inattendu» Packware à l'aide du plug-in Modified Notepad ++ (Wikiloader)<br>“Totally Unexpected” Package Malware Using Modified Notepad++ Plug-in (WikiLoader) Ahnlab Security Intelligence Center (ASEC) a récemment identifié la distribution d'une version modifiée de & # 8220;mimetools.dll & # 8221;, un plug-in.Le fichier malveillant mimetools.dll en question a été inclus dans le fichier d'installation du package d'une certaine version du package Notepad ++ et déguisé en fichier de package légitime.Comme indiqué dans l'image ci-dessous, MiMetools est un module pour effectuer un codage Base64 et d'autres tâches.Il est inclus par défaut et ne nécessite pas que l'utilisateur l'ajoute manuellement ....
AhnLab SEcurity intelligence Center (ASEC) has recently identified the distribution of a modified version of “mimeTools.dll”, a default Notepad++ plug-in. The malicious mimeTools.dll file in question was included in the package installation file of a certain version of the Notepad++ package and disguised as a legitimate package file. As shown in the image below, mimeTools is a module for conducting Base64 encoding and other tasks. It is included by default and does not require the user to add it manually.... ]]>
2024-04-15T01:12:41+00:00 https://asec.ahnlab.com/en/64106/ www.secnews.physaphae.fr/article.php?IdArticle=8482387 False Malware None 2.0000000000000000