www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2025-05-12T05:09:54+00:00 www.secnews.physaphae.fr The Register - Site journalistique Anglais Ransomwared NHS Software Fournisseur NABS £ 3 M £ Discing For ICO pour bon comportement<br>Ransomwared NHS software supplier nabs £3M discount from ICO for good behavior Data stolen included checklist for medics on how to get into vulnerable people\'s homes The UK\'s data protection watchdog is dishing out a £3.07 million ($3.95 million) fine to Advanced Computer Software Group, whose subsidiary\'s security failings led to a ransomware attack affecting NHS care.…]]> 2025-03-27T09:30:06+00:00 https://go.theregister.com/feed/www.theregister.com/2025/03/27/ransomwared_nhs_software_supplier_nabs/ www.secnews.physaphae.fr/article.php?IdArticle=8658520 False Ransomware None 3.0000000000000000 Data Security Breach - Site de news Francais Cyberattaque sur le bureau du procureur général de Virginie : le groupe Cloak revendique la responsabilité 2025-03-27T09:13:11+00:00 https://www.datasecuritybreach.fr/cloack-virginia-justice/ www.secnews.physaphae.fr/article.php?IdArticle=8658525 False Ransomware None 3.0000000000000000 Data Security Breach - Site de news Francais Rakuten face à une vague d\'escroqueries par hameçonnage : les clients appelés à renforcer leur sécurité 2025-03-27T08:58:06+00:00 https://www.datasecuritybreach.fr/escroqueries-par-hameconnage/ www.secnews.physaphae.fr/article.php?IdArticle=8658514 False None None 3.0000000000000000 Zataz - Magazine Francais de secu Criminalité organisée en Europe : comment l\'IA et les menaces hybrides redéfinissent le monde 2025-03-27T08:56:00+00:00 https://www.zataz.com/criminalite-organisee-en-europe-comment-lia-et-les-menaces-hybrides-redefinissent-le-monde/ www.secnews.physaphae.fr/article.php?IdArticle=8658510 False Threat None 3.0000000000000000 Zataz - Magazine Francais de secu Cyberattaque chez Astral Foods : baisse de profit de 60 % 2025-03-27T08:43:34+00:00 https://www.zataz.com/cyberattaque-chez-astral-foods/ www.secnews.physaphae.fr/article.php?IdArticle=8658511 False None None 3.0000000000000000 Global Security Mag - Site de news francais Mirantis annonce le k0rdent Application Catalog Produits]]> 2025-03-27T08:32:22+00:00 https://www.globalsecuritymag.fr/mirantis-annonce-le-k0rdent-application-catalog.html www.secnews.physaphae.fr/article.php?IdArticle=8658512 False None None 3.0000000000000000 Data Security Breach - Site de news Francais Chrome sous attaque : une faille critique exploitée dans une campagne de cyber espionnage 2025-03-27T08:02:49+00:00 https://www.datasecuritybreach.fr/chrome-sous-attaque-une-faille-critique-exploitee-dans-une-campagne-de-cyberespionnage/ www.secnews.physaphae.fr/article.php?IdArticle=8658500 False Vulnerability,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Des dizaines de défauts de l'onduleur solaire pourraient être exploités pour attaquer les réseaux électriques<br>Dozens of solar inverter flaws could be exploited to attack power grids Dozens of vulnerabilities in products from three leading makers of solar inverters, Sungrow, Growatt, and SMA, could be exploited to control devices or execute code remotely on the vendor\'s cloud platform. [...]]]> 2025-03-27T08:00:05+00:00 https://www.bleepingcomputer.com/news/security/dozens-of-solar-inverter-flaws-could-be-exploited-to-attack-power-grids/ www.secnews.physaphae.fr/article.php?IdArticle=8658551 False Vulnerability,Cloud None 4.0000000000000000 InformationSecurityBuzzNews - Site de News Securite Nouvel outil de cybercriminalité \\ 'Atlantis AIO \\' amplifie les attaques de rembourrage des informations d'identification<br>New Cybercrime Tool \\'Atlantis AIO\\' Amps Up Credential Stuffing Attacks A powerful new attack tool, Atlantis AIO, is making it easier than ever for cybercrooks to access online accounts. Designed to perform credential stuffing attacks automatically, Atlantis AIO enables hackers to test millions of stolen usernames and passwords in rapid succession.   In new research, Abnormal Security has described how, by offering pre-configured modules to target [...]]]> 2025-03-27T07:38:03+00:00 https://informationsecuritybuzz.com/new-cybercrime-tool-atlantis-aio-crede/ www.secnews.physaphae.fr/article.php?IdArticle=8658502 False Tool None 3.0000000000000000 BBC - BBC News - Technology Le fournisseur de logiciels NHS a infligé une amende de 3 millions de livres sterling sur une violation de données après une attaque de ransomware<br>NHS software provider fined £3m over data breach after ransomware attack Security failings by the Advanced Computer Software Group led to a cyberattack in 2022 that impacted NHS services.]]> 2025-03-27T01:25:34+00:00 https://www.bbc.com/news/articles/cp3yv1zxn94o www.secnews.physaphae.fr/article.php?IdArticle=8658455 False Ransomware,Data Breach None 3.0000000000000000 Recorded Future - FLux Recorded Future British Company a avancé une amende de 3 millions de livres sterling par le régulateur de la vie privée sur Ransomware Attack<br>British company Advanced fined £3m by privacy regulator over ransomware attack A business that provides IT services to numerous healthcare providers in the United Kingdom has been fined about $4 million by the country\'s privacy regulator over a ransomware attack in 2022.]]> 2025-03-27T00:01:00+00:00 https://therecord.media/advanced-fined-3-million-ransomware-attack-ico www.secnews.physaphae.fr/article.php?IdArticle=8658444 False Ransomware,Medical None 3.0000000000000000 TrendLabs Security - Editeur Antivirus Cybertron remodèle la sécurité de l'IA à mesure que le «cyber-cerveau» grandit<br>Cybertron Reshapes AI Security as “Cyber Brain” Grows Previously exclusive to Trend Vision One customers, select Trend Cybertron models, datasets and agents are now available via open-source. Build advanced security solutions and join us in developing the next generation of AI security technology.]]> 2025-03-27T00:00:00+00:00 https://www.trendmicro.com/en_us/research/25/c/cybertron-ai-security.html www.secnews.physaphae.fr/article.php?IdArticle=8658447 False Prediction None 3.0000000000000000 Silicon - Site de News Francais Oracle piraté ? Pourquoi la revendication est crédible 2025-03-27T00:00:00+00:00 https://www.silicon.fr/Thematique/cybersecurite-1371/Breves/oracle-pirate-pourquoi-revendication-credible-469470.htm#utm_source=IndexThematique&utm_medium=Rss&utm_campaign= www.secnews.physaphae.fr/article.php?IdArticle=8658592 False None None 3.0000000000000000 Cyber Skills - Podcast Cyber Tech Industry Alliance \\\'s Techfest 2025: Tech, Ai & Humanity - Façonner notre avenir<br>Tech Industry Alliance\\\'s TechFest 2025: Tech, AI & Humanity – Shaping Our Future We are excited to announce that we are proud sponsors of Tech Industry Alliance\'s TechFest 2025: Tech, AI & Humanity – Shaping Our Future. Join us for TechFest 2025, the leading technology conference in the South West of Ireland, on May 15 at the Rochestown Park Hotel, Cork. This flagship event will bring together tech and business leaders to explore the evolving relationship between technology, artificial intelligence, and humanity – and how we can harness innovation to shape a better future. At TechFest 2025, industry pioneers, disruptors, and thought leaders will unite for an immersive experience featuring forward-thinking discussions and inspiring talks from both global visionaries and local trailblazers who are shaping the future of technology. To find out more and secure your ticket, please visit: https://techindustryalliance.ie/techfest-2025/ #TIATechFest ]]> 2025-03-27T00:00:00+00:00 https://www.cyberskills.ie/explore/news/tech-industry-alliances-techfest-2025-tech-ai--humanity--shaping-our-future.html www.secnews.physaphae.fr/article.php?IdArticle=8658595 False Conference None 3.0000000000000000 Smashing Security - Podcast Cyber 410: Débrochez l'armée AI Bot contre les escrocs - maintenant!<br>410: Unleash the AI bot army against the scammers - now! A YouTuber has unleashed an innovative AI bot army to disrupt and outwit the world of online scammers, and a New York Times investigation looks into the intricate web of global money laundering. All this and more is discussed in the latest edition of the "Smashing Security" podcast by cybersecurity veterans Graham Cluley and Carole...]]> 2025-03-27T00:00:00+00:00 https://www.smashingsecurity.com/410-unleash-the-ai-bot-army-against-the-scammers-now/ www.secnews.physaphae.fr/article.php?IdArticle=8658440 False None None 3.0000000000000000 TrendLabs Security - Editeur Antivirus Trend Micro & IBM s'associe pour booster la sécurité mainframe<br>Trend Micro & IBM Team Up To Boost Mainframe Security Trend Micro Deep Security adds security for mainframe enterprise integration]]> 2025-03-27T00:00:00+00:00 https://www.trendmicro.com/en_us/research/25/c/boost-mainframe-security.html www.secnews.physaphae.fr/article.php?IdArticle=8658615 False Prediction None 3.0000000000000000 HackRead - Chercher Cyber Les archives Internet (archive.org) diminuent après la «panne de courant»<br>Internet Archive (Archive.org) Goes Down Following “Power Outage” The Internet Archive (Archive.org), home to the Wayback Machine, is temporarily offline due to a reported power outage.…]]> 2025-03-26T23:19:14+00:00 https://hackread.com/internet-archive-archive-org-down-power-outage/ www.secnews.physaphae.fr/article.php?IdArticle=8658445 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Nouvelles variantes de dérobée Sparrowdoor trouvées dans les attaques contre les organisations américaines et mexicaines<br>New SparrowDoor Backdoor Variants Found in Attacks on U.S. and Mexican Organizations The Chinese threat actor known as FamousSparrow has been linked to a cyber attack targeting a trade group in the United States and a research institute in Mexico to deliver its flagship backdoor SparrowDoor and ShadowPad. The activity, observed in July 2024, marks the first time the hacking crew has deployed ShadowPad, a malware widely shared by Chinese state-sponsored actors. "FamousSparrow]]> 2025-03-26T22:29:00+00:00 https://thehackernews.com/2025/03/new-sparrowdoor-backdoor-variants-found.html www.secnews.physaphae.fr/article.php?IdArticle=8658379 False Malware,Threat None 3.0000000000000000 Dark Reading - Informationweek Branch L'expert en sécurité Troy Hunt attiré par Mailchimp Phish<br>Security Expert Troy Hunt Lured in by Mailchimp Phish Hunt quickly took to his blog to notify the public of the breach and provide further details on how this could have happened.]]> 2025-03-26T21:46:46+00:00 https://www.darkreading.com/cyberattacks-data-breaches/security-expert-troy-hunt-lured-mailchimp-phish www.secnews.physaphae.fr/article.php?IdArticle=8658427 False None None 3.0000000000000000 Global Security Mag - Site de news francais Les entreprises perdent de l'argent et mettent en danger la sécurité à l'étalement et aux correctifs rapides, explique Espria<br>Businesses are losing money and jeopardising security to IT sprawl and quick fixes, says Espria Opinion
Businesses are losing money and jeopardising security to IT sprawl and quick fixes, says Espria - Opinion]]>
2025-03-26T21:14:05+00:00 https://www.globalsecuritymag.fr/businesses-are-losing-money-and-jeopardising-security-to-it-sprawl-and-quick.html www.secnews.physaphae.fr/article.php?IdArticle=8658425 False None None 3.0000000000000000
Netskope - etskope est une société de logiciels américaine fournissant une plate-forme de sécurité informatique Le nac hérité ne peut pas suivre. Uztna est la réponse.<br>Legacy NAC Can\\'t Keep Up. UZTNA Is the Answer. Avec la montée en puissance du travail hybride et de l'IoT, la demande d'accès au réseau sécurisé, évolutif et adaptatif n'a jamais été plus grand. Le contrôle traditionnel d'accès au réseau (NAC) a été conçu pour les environnements sur site, en se concentrant sur la visibilité, la conformité des appareils et le contrôle d'accès. Mais il ne répond plus aux demandes de sécurité modernes. Ce blog explore les limites du NAC traditionnel […]
>With the rise of hybrid work and IoT, the demand for secure, scalable, and adaptive network access has never been greater. Traditional network access control (NAC) was built for on-premises environments, focusing on visibility, device compliance, and access control. But it no longer meets modern security demands. This blog explores the limitations of traditional NAC […] ]]>
2025-03-26T20:46:51+00:00 https://www.netskope.com/blog/legacy-nac-cant-keep-up-uztna-is-the-answer www.secnews.physaphae.fr/article.php?IdArticle=8658413 False None None 3.0000000000000000
CyberScoop - scoopnewsgroup.com special Cyber Les chefs du renseignement insistent sur le fait que le chat signalé était une simple erreur<br>Intelligence chiefs insist Signal chat was a simple mistake Les démocrates du comité du renseignement de la Chambre ont exprimé leur colère quant à l'utilisation de l'application de messagerie pour coordonner les grèves militaires sur les cibles houthi au Yémen.
>Democrats on the House Intelligence Committee expressed anger over the use of the messaging app to coordinate military strikes on Houthi targets in Yemen. ]]>
2025-03-26T20:32:10+00:00 https://cyberscoop.com/signal-chat-house-intelligence-tulsi-gabbard-chrissy-houlahan/ www.secnews.physaphae.fr/article.php?IdArticle=8658418 False None None 4.0000000000000000
ComputerWeekly - Computer Magazine Advanced Software a condamné à une amende de 3 millions de livres sterling sur l'attaque de verrouillage<br>Advanced Software fined £3m over LockBit attack 2025-03-26T20:01:00+00:00 https://www.computerweekly.com/news/366621298/Advanced-Software-fined-3m-over-LockBit-attack www.secnews.physaphae.fr/article.php?IdArticle=8658441 False None None 3.0000000000000000 Bleeping Computer - Magazine Américain Fournisseur de logiciels aux amendes britanniques 3,07 millions de livres sterling pour une violation de ransomware 2022<br>UK fines software provider £3.07 million for 2022 ransomware breach The UK Information Commissioner\'s Office (ICO) has fined Advanced Computer Software Group Ltd £3.07 million over a 2022 ransomware attack that exposed the sensitive personal data of 79,404 people, including National Health Service (NHS) patients. [...]]]> 2025-03-26T20:01:00+00:00 https://www.bleepingcomputer.com/news/security/uk-fines-software-provider-307-million-for-2022-ransomware-breach/ www.secnews.physaphae.fr/article.php?IdArticle=8658449 False Ransomware None 3.0000000000000000 CyberScoop - scoopnewsgroup.com special Cyber Le commerce limite 19 entreprises chinoises et taïwanaises d'achat de la technologie américaine<br>Commerce limits 19 Chinese, Taiwanese companies from buying U.S. tech Les sanctions placent les entreprises dans le cadre d'un régime de licence strict destiné à limiter leur accès à la technologie fondamentale pour l'informatique quantique, le cloud et l'IA.
>The sanctions place the companies under a strict licensing regime meant to limit their access to foundational technology for quantum computing, cloud and AI. ]]>
2025-03-26T19:48:01+00:00 https://cyberscoop.com/commerce-sanctions-chinese-firms-quantum-computing-ai-cloud/ www.secnews.physaphae.fr/article.php?IdArticle=8658406 False Cloud None 3.0000000000000000
SecurityWeek - Security News OpenAI offrant des primes de 100 000 $ pour les vulnérabilités critiques<br>OpenAI Offering $100K Bounties for Critical Vulnerabilities OpenAI a augmenté son paiement maximal de primes de bogue à 100 000 $ (contre 20 000 $) pour les défauts à fort impact dans son infrastructure et ses produits.
>OpenAI has raised its maximum bug bounty payout to $100,000 (up from $20,000) for high-impact flaws in its infrastructure and products. ]]>
2025-03-26T19:38:04+00:00 https://www.securityweek.com/openai-offering-100k-bounties-for-critical-vulnerabilities/ www.secnews.physaphae.fr/article.php?IdArticle=8658405 False Vulnerability None 3.0000000000000000
HackRead - Chercher Cyber Services de test de pénétration: renforcement de la cybersécurité contre l'évolution des menaces<br>Penetration Testing Services: Strengthening Cybersecurity Against Evolving Threats Cybersecurity threats are evolving at an unprecedented pace, leaving organizations vulnerable to large-scale attacks. Security breaches and data…]]> 2025-03-26T19:34:17+00:00 https://hackread.com/penetration-testing-services-strength-cybersecurity-threats/ www.secnews.physaphae.fr/article.php?IdArticle=8658407 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Les lacunes de cybersécurité laissent les portes grandes ouvertes<br>Cybersecurity Gaps Leave Doors Wide Open Attackers don\'t always need to resort to sophisticated gambits to break and enter; organizations often make it easy for them to walk right in.]]> 2025-03-26T19:24:55+00:00 https://www.darkreading.com/cyberattacks-data-breaches/cybersecurity-gaps-leave-doors-wide-open www.secnews.physaphae.fr/article.php?IdArticle=8658404 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Encrypthub exploite Windows Zero-Day pour déployer Rhadamanthys et Stealc malware<br>EncryptHub Exploits Windows Zero-Day to Deploy Rhadamanthys and StealC Malware The threat actor known as EncryptHub exploited a recently-patched security vulnerability in Microsoft Windows as a zero-day to deliver a wide range of malware families, including backdoors and information stealers such as Rhadamanthys and StealC. "In this attack, the threat actor manipulates .msc files and the Multilingual User Interface Path (MUIPath) to download and execute malicious payload,]]> 2025-03-26T19:23:00+00:00 https://thehackernews.com/2025/03/encrypthub-exploits-windows-zero-day-to.html www.secnews.physaphae.fr/article.php?IdArticle=8658334 False Malware,Vulnerability,Threat None 2.0000000000000000 Ars Technica - Risk Assessment Security Hacktivism Google fait Android Development Private, poursuivra les sorties open source<br>Google makes Android development private, will continue open source releases Google says this change will simplify things for developers and OEMs.]]> 2025-03-26T19:20:24+00:00 https://arstechnica.com/gadgets/2025/03/google-makes-android-development-private-will-continue-open-source-releases/ www.secnews.physaphae.fr/article.php?IdArticle=8658414 False Mobile None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Redcurl passe de l'espionnage à des ransomwares avec un premier déploiement QWCrypt<br>RedCurl Shifts from Espionage to Ransomware with First-Ever QWCrypt Deployment The Russian-speaking hacking group called RedCurl has been linked to a ransomware campaign for the first time, marking a departure in the threat actor\'s tradecraft. The activity, observed by Romanian cybersecurity company Bitdefender, involves the deployment of a never-before-seen ransomware strain dubbed QWCrypt. RedCurl, also called Earth Kapre and Red Wolf, has a history of orchestrating]]> 2025-03-26T19:13:00+00:00 https://thehackernews.com/2025/03/redcurl-shifts-from-espionage-to.html www.secnews.physaphae.fr/article.php?IdArticle=8658335 False Ransomware,Threat None 3.0000000000000000 Wired Threat Level - Security News Signalgate n'est pas sur le signal<br>SignalGate Isn\\'t About Signal The Trump cabinet\'s shocking leak of its plans to bomb Yemen raises myriad confidentiality and legal issues. The security of the encrypted messaging app Signal is not one of them.]]> 2025-03-26T18:54:49+00:00 https://www.wired.com/story/signalgate-isnt-about-signal/ www.secnews.physaphae.fr/article.php?IdArticle=8658392 False None None 3.0000000000000000 Zataz - Magazine Francais de secu Proton et ZATAZ, une alliance pour la cybersécurité 2025-03-26T18:47:43+00:00 https://www.zataz.com/proton-et-zataz-une-alliance-pour-la-cybersecurite/ www.secnews.physaphae.fr/article.php?IdArticle=8658389 False None None 3.0000000000000000 Recorded Future - FLux Recorded Future Les Chiefs d'Intel disent à nouveau qu'ils n'ont pas partagé d'informations classifiées au milieu de nouvelles questions sur les chats de guerre<br>Intel chiefs again say they did not share classified info amid new questions on war chats President Donald Trump\'s intelligence chiefs on Wednesday maintained they did not share classified information about an eminent U.S. military strike on a messaging app, even as more details about the discussion came to light.]]> 2025-03-26T18:28:18+00:00 https://therecord.media/intel-chiefs-again-say-they-did-not-share-classified-info-house-hearing www.secnews.physaphae.fr/article.php?IdArticle=8658395 False None None 3.0000000000000000 Zataz - Magazine Francais de secu Troy Hunt piégé par un phishing : quand le chasseur devient la proie 2025-03-26T18:27:17+00:00 https://www.zataz.com/troy-hunt-piege-par-un-phishing-quand-le-chasseur-devient-la-proie/ www.secnews.physaphae.fr/article.php?IdArticle=8658390 False None None 3.0000000000000000 Zataz - Magazine Francais de secu Faux papiers et données volées : un site inquiétant sort de l\'ombre 2025-03-26T18:12:53+00:00 https://www.zataz.com/faux-papiers-et-donnees-volees-un-site-inquietant-sort-de-lombre/ www.secnews.physaphae.fr/article.php?IdArticle=8658391 False None None 3.0000000000000000 HackRead - Chercher Cyber Nouvelle attaque de logiciels malveillants NPM infecte la bibliothèque Ethereum populaire avec porte dérobée<br>New npm Malware Attack Infects Popular Ethereum Library with Backdoor Security researchers at ReversingLabs have discovered a new malware campaign on the npm package repository, revealing a new…]]> 2025-03-26T17:57:43+00:00 https://hackread.com/npm-malware-infects-ethereum-library-with-backdoor/ www.secnews.physaphae.fr/article.php?IdArticle=8658382 False Malware None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Le package NPM malveillant modifie la bibliothèque locale \\ 'Ethers \\' pour lancer des attaques de coquilles inversées<br>Malicious npm Package Modifies Local \\'ethers\\' Library to Launch Reverse Shell Attacks Cybersecurity researchers have discovered two malicious packages on the npm registry that are designed to infect another locally installed package, underscoring the continued evolution of software supply chain attacks targeting the open-source ecosystem. The packages in question are ethers-provider2 and ethers-providerz, with the former downloaded 73 times to date since it was published on]]> 2025-03-26T17:30:00+00:00 https://thehackernews.com/2025/03/malicious-npm-package-modifies-local.html www.secnews.physaphae.fr/article.php?IdArticle=8658322 False None None 3.0000000000000000 Korben - Bloger francais Vers une uniformisation des accents grâce / à cause de l\'IA ? 2025-03-26T16:59:18+00:00 https://korben.info/krisp-ia-conversion-accent-americain-temps-reel.html www.secnews.physaphae.fr/article.php?IdArticle=8658381 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Sortage dans le cyber ring: Utilisation de Pentest automatisé pour renforcer la résilience<br>Sparring in the Cyber Ring: Using Automated Pentesting to Build Resilience “A boxer derives the greatest advantage from his sparring partner…” - Epictetus, 50–135 AD Hands up. Chin tucked. Knees bent. The bell rings, and both boxers meet in the center and circle. Red throws out three jabs, feints a fourth, and-BANG-lands a right hand on Blue down the center. This wasn\'t Blue\'s first day and despite his solid defense in front of the mirror, he feels the pressure.]]> 2025-03-26T16:55:00+00:00 https://thehackernews.com/2025/03/sparring-in-cyber-ring-using-automated.html www.secnews.physaphae.fr/article.php?IdArticle=8658323 False None None 3.0000000000000000 HackRead - Chercher Cyber Next.js Middleware Flaw permet aux attaquants de contourner l'autorisation<br>Next.js Middleware Flaw Lets Attackers Bypass Authorization Researchers have uncovered a critical vulnerability (CVE-2025-29927) in Next.js middleware, allowing authorization bypass. Learn about the exploit and fixes.]]> 2025-03-26T16:40:56+00:00 https://hackread.com/next-js-middleware-flaw-bypass-authorization/ www.secnews.physaphae.fr/article.php?IdArticle=8658367 False Vulnerability,Threat None 3.0000000000000000 Recorded Future - FLux Recorded Future Les pirates chinois \\ 'célèbres sont de retour des morts et ciblant l'Amérique du Nord, disent les chercheurs<br>Chinese \\'FamousSparrow\\' hackers back from the dead and targeting North America, researchers say Thought to be dormant since 2022, the group is now believed to have been targeting organizations in the U.S., Mexico and Honduras.]]> 2025-03-26T16:36:07+00:00 https://therecord.media/china-famous-sparrow-back-eset www.secnews.physaphae.fr/article.php?IdArticle=8658369 False None None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine SecurityScoreCard observe une augmentation des violations tierces<br>SecurityScorecard Observes Surge in Third-Party Breaches In its 2025 Global Third-Party Breach Report, SecurityScorecard has found that 35.5% of all cyber breaches in 2024 were third-party related, up from 29% in 2023]]> 2025-03-26T16:30:00+00:00 https://www.infosecurity-magazine.com/news/securityscorecard-surge-third/ www.secnews.physaphae.fr/article.php?IdArticle=8658371 False None None 3.0000000000000000 Bleeping Computer - Magazine Américain Les clients d'Oracle confirment que les données volées dans une violation de cloud présumée sont valides<br>Oracle customers confirm data stolen in alleged cloud breach is valid Despite Oracle denying a breach of its Oracle Cloud federated SSO login servers and the theft of account data for 6 million people, BleepingComputer has confirmed with multiple companies that associated data samples shared by the threat actor are valid. [...]]]> 2025-03-26T16:20:57+00:00 https://www.bleepingcomputer.com/news/security/oracle-customers-confirm-data-stolen-in-alleged-cloud-breach-is-valid/ www.secnews.physaphae.fr/article.php?IdArticle=8658417 False Threat,Cloud None 4.0000000000000000 CyberScoop - scoopnewsgroup.com special Cyber La chaîne de défauts dans le composant Kubernetes populaire met 40% des environnements cloud en danger<br>String of defects in popular Kubernetes component puts 40% of cloud environments at risk Les chercheurs ne sont pas conscients de l'exploitation active dans la nature, mais ils préviennent que le risque de contrôleurs Nginx exposés et non corrigées est extrêmement élevé.
>Researchers aren\'t aware of active exploitation in the wild, but they warn the risk for publicly exposed and unpatched Ingress Nginx controllers is extremely high. ]]>
2025-03-26T16:19:50+00:00 https://cyberscoop.com/kubernetes-nginx-controller-defects-wiz/ www.secnews.physaphae.fr/article.php?IdArticle=8658366 False Cloud None 3.0000000000000000
Korben - Bloger francais Anbernic RG40XXV : une console rétro incroyable avec un écran 4 pouces et une tonne de jeux une petite console de la taille d'une gameboy, c'est un grand oui, surtout avec un écran de 4 pouces, qui change absolument tout face à la plupart des consoles de ce type.]]> 2025-03-26T15:56:46+00:00 https://korben.info/anbernic-rg40xxv-une-console-retro-incroyable-avec-un-ecran-4-pouces-et-une-tonne-de-jeux.html www.secnews.physaphae.fr/article.php?IdArticle=8658356 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Comment PAM atténue les menaces d'initiés: prévenir les violations de données, les privilèges abusifs, et plus<br>How PAM Mitigates Insider Threats: Preventing Data Breaches, Privilege Misuse, and More When people think of cybersecurity threats, they often picture external hackers breaking into networks. However, some of the most damaging breaches stem from within organizations. Whether through negligence or malicious intent, insiders can expose your organization to significant cybersecurity risks. According to Verizon\'s 2024 Data Breach Investigations Report, 57% of companies experience over]]> 2025-03-26T15:45:00+00:00 https://thehackernews.com/2025/03/how-pam-mitigates-insider-threats.html www.secnews.physaphae.fr/article.php?IdArticle=8658297 False Data Breach None 3.0000000000000000 SecurityWeek - Security News AMTSO libère le cadre d'évaluation du bac à sable<br>AMTSO Releases Sandbox Evaluation Framework AMTSO a développé un cadre d'évaluation de bac à sable pour normaliser les tests des solutions d'analyse de logiciels malveillants. 
>AMTSO has developed a Sandbox Evaluation Framework to standardize the testing of malware analysis solutions.  ]]>
2025-03-26T15:30:00+00:00 https://www.securityweek.com/amtso-releases-sandbox-evaluation-framework/ www.secnews.physaphae.fr/article.php?IdArticle=8658358 False Malware None 3.0000000000000000
Recorded Future - FLux Recorded Future Cyber ​​Chief de New York sur les villes et les États à l'abri des cyberattaques<br>New York\\'s cyber chief on keeping cities and states safe from cyberattacks Colin Ahern sat down with Recorded Future News earlier this year to discuss New York\'s efforts to protect local governments from ransomware and more.]]> 2025-03-26T15:19:17+00:00 https://therecord.media/new-york-cyber-chief-on-keeping-cities-states-safe www.secnews.physaphae.fr/article.php?IdArticle=8658370 False Ransomware None 3.0000000000000000 Recorded Future - FLux Recorded Future L'Autriche découvre une prétendue campagne de désinformation russe.<br>Austria uncovers alleged Russian disinformation campaign spreading lies about Ukraine The campaign was identified during an investigation into a Bulgarian woman accused of spying for Russia earlier this year.]]> 2025-03-26T14:59:53+00:00 https://therecord.media/austria-uncovers-russian-disinfo-campaign www.secnews.physaphae.fr/article.php?IdArticle=8658344 False None None 3.0000000000000000 We Live Security - Editeur Logiciel Antivirus ESET Changeant les sables de l'Edrkillshifter de RansomHub \\<br>Shifting the sands of RansomHub\\'s EDRKillShifter ESET researchers discover new ties between affiliates of RansomHub and of rival gangs Medusa, BianLian, and Play]]> 2025-03-26T14:58:00+00:00 https://www.welivesecurity.com/en/eset-research/shifting-sands-ransomhub-edrkillshifter/ www.secnews.physaphae.fr/article.php?IdArticle=8661305 False None None 2.0000000000000000 LogPoint - Blog Secu [🇫🇷 WEBINAIRE] – Je découvre Logpoint après Forum InCyber 2025 Jeudi 15 avril à 11h30Je découvre Logpoint après Forum InCyberDécouvrez ce que propose Logpoint, SIEM historique, agnostique et Européen qui intègre désormais un NDR.AgendaPrésentation de Logpoint et quelques cas d'usage.Renforcer la cyberdéfense de votre organisation grâce à une sonde NDR pilotée par l'IA.Améliorer votre résilience.Découvrez le triangle magique SIEM, NDR, EDR.  [...] ]]> 2025-03-26T14:56:26+00:00 https://www.logpoint.com/fr/blog/webinaire-je-decouvre-logpoint-apres-forum-incyber-2025/ www.secnews.physaphae.fr/article.php?IdArticle=8658341 False None None 3.0000000000000000 Recorded Future - FLux Recorded Future Entrepreneur de défense pour payer 4,6 millions de dollars sur la faiblesse de la sécurité du fournisseur tiers \\<br>Defense contractor to pay $4.6 million over third-party provider\\'s security weakness A technology company based in Cambridge, Massachusetts, is the latest defense contractor to reach a settlement with the U.S. government for failing to meet federal cybersecurity requirements.]]> 2025-03-26T14:46:50+00:00 https://therecord.media/defense-contractor-to-pay-millions-over-cyber-practices www.secnews.physaphae.fr/article.php?IdArticle=8658345 False None None 3.0000000000000000 We Live Security - Editeur Logiciel Antivirus ESET Vous vous en souviendrez toujours comme le jour où vous avez finalement attrapé FamousSparrow<br>You will always remember this as the day you finally caught FamousSparrow ESET researchers uncover the toolset used by the FamousSparrow APT group, including two undocumented versions of the group\'s signature backdoor, SparrowDoor]]> 2025-03-26T14:45:00+00:00 https://www.welivesecurity.com/en/eset-research/you-will-always-remember-this-as-the-day-you-finally-caught-famoussparrow/ www.secnews.physaphae.fr/article.php?IdArticle=8661301 False None None 4.0000000000000000 Bleeping Computer - Magazine Américain Les streamements révèlent la violation de données tierces après les données de fuite de pirate<br>StreamElements discloses third-party data breach after hacker leaks data Cloud-based streaming company StreamElements confirms it suffered a data breach at a third-party service provider after a threat actor leaked samples of stolen data on a hacking forum. [...]]]> 2025-03-26T14:42:51+00:00 https://www.bleepingcomputer.com/news/security/streamelements-discloses-third-party-data-breach-after-hacker-leaks-data/ www.secnews.physaphae.fr/article.php?IdArticle=8658394 False Data Breach,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Pirates à l'aide de l'outil de crime électronique Atlantis AIO pour la farce des informations d'identification sur plus de 140 plates-formes<br>Hackers Using E-Crime Tool Atlantis AIO for Credential Stuffing on 140+ Platforms Threat actors are leveraging an e-crime tool called Atlantis AIO Multi-Checker to automate credential stuffing attacks, according to findings from Abnormal Security. Atlantis AIO "has emerged as a powerful weapon in the cybercriminal arsenal, enabling attackers to test millions of stolen credentials in rapid succession," the cybersecurity company said in an analysis. Credential stuffing is a]]> 2025-03-26T14:23:00+00:00 https://thehackernews.com/2025/03/hackers-using-e-crime-tool-atlantis-aio.html www.secnews.physaphae.fr/article.php?IdArticle=8658282 False Tool,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les acteurs de la menace abusent de la confiance dans les plateformes de collaboration du cloud<br>Threat Actors Abuse Trust in Cloud Collaboration Platforms Threat actors are exploiting cloud platforms like Adobe and Dropbox to evade email gateways and steal credentials]]> 2025-03-26T14:15:00+00:00 https://www.infosecurity-magazine.com/news/threat-actors-abuse-cloud-platforms/ www.secnews.physaphae.fr/article.php?IdArticle=8658348 False Threat,Cloud None 3.0000000000000000 Dark Reading - Informationweek Branch Au-delà de Stix: intelligence cyber-menace de niveau supérieur<br>Beyond STIX: Next-Level Cyber-Threat Intelligence While industry experts continue to analyze, interpret, and act on threat data, the complexity of cyber threats necessitates solutions that can quickly convert expert knowledge into machine-readable formats.]]> 2025-03-26T14:00:00+00:00 https://www.darkreading.com/threat-intelligence/beyond-stix-next-level-cyber-threat-intelligence www.secnews.physaphae.fr/article.php?IdArticle=8658346 False Threat None 3.0000000000000000 Dark Reading - Informationweek Branch \\ 'Lucid \\' Phishing-As-A-Service exploite les défauts dans iMessage, Android RCS<br>\\'Lucid\\' Phishing-as-a-Service Exploits Faults in iMessage, Android RCS Cybercriminals in China have figured out how to undermine the strengths of mobile messaging protocols.]]> 2025-03-26T14:00:00+00:00 https://www.darkreading.com/threat-intelligence/lucid-phishing-exploits-imessage-android-rcs www.secnews.physaphae.fr/article.php?IdArticle=8658331 False Mobile None 3.0000000000000000 Fortinet - Fabricant Materiel Securite Life at Fortinet: Breaking Cybersecurity Idées fausses<br>Life at Fortinet: Breaking Cybersecurity Misconceptions Cybersecurity is a highly collaborative, strategic, and business-driven industry that has a direct impact on people, businesses, and critical infrastructures.]]> 2025-03-26T14:00:00+00:00 https://www.fortinet.com/blog/life-at-fortinet/life-at-fortinet-breaking-cybersecurity-misconceptions www.secnews.physaphae.fr/article.php?IdArticle=8658354 False None None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les packages NPM malveillants offrent des coquilles inverses sophistiquées<br>Malicious npm Packages Deliver Sophisticated Reverse Shells A newly discovered malware campaign uses malicious npm packages to deploy reverse shells, compromising development environments]]> 2025-03-26T13:30:00+00:00 https://www.infosecurity-magazine.com/news/malicious-npm-packages-deliver/ www.secnews.physaphae.fr/article.php?IdArticle=8658333 False Malware None 3.0000000000000000 Dark Reading - Informationweek Branch Nouveau cadre de test aide à évaluer les bacs de sable<br>New Testing Framework Helps Evaluate Sandboxes The Anti-Malware Testing Standards Organization published a Sandbox Evaluation Framework to set a standard among various sandbox offerings that help protect organizations from rising threats.]]> 2025-03-26T13:00:30+00:00 https://www.darkreading.com/application-security/testing-framework-evaluate-sandbox www.secnews.physaphae.fr/article.php?IdArticle=8658332 False None None 3.0000000000000000 GoogleSec - Firm Security Blog Titan Security Keys maintenant disponible dans plus de pays<br>Titan Security Keys now available in more countries 2025-03-26T13:00:12+00:00 http://security.googleblog.com/2025/03/titan-security-keys-now-available-in.html www.secnews.physaphae.fr/article.php?IdArticle=8658401 False None None 3.0000000000000000 Checkpoint - Fabricant Materiel Securite Transformer la gestion de la sécurité avec des agents et assistants de l'IA<br>Transforming Security Management with AI Agents and Assistants Les attaquants utilisent déjà l'IA, mais vous pouvez retourner le feu en déployant vos propres outils de cybersécurité alimentés par l'IA. Se tourner vers General Use LLMS comme Chatgpt ou Deepseek n'est pas une option pour la gestion de la sécurité car ils ne sont pas spécialisés pour la sécurité du réseau et les risques d'exposition des données sensibles. Mais les assistants du Genai de qualité en entreprise et les agents de l'IA ont le potentiel de fournir tous les avantages du Genai pour vous aider à rester en avance sur les attaques alimentées par l'IA, sans exposer votre organisation aux risques inhérents à l'utilisation d'outils Genai à usage général. Les avantages des assistants Genai comprennent la rationalisation des opérations, l'économie d'économie de temps et de coûts, […]
>Attackers are already using AI, but you can return fire by deploying your own AI-powered cyber security tools. Turning to general use LLMs like ChatGPT or DeepSeek is not an option for security management as they are not specialized for network security and risk exposing sensitive data. But enterprise-grade, purpose built GenAI assistants and AI agents have the potential to provide all the benefits of GenAI to help you stay ahead of AI-powered attacks, without exposing your organization to the inherent risks of using general purpose GenAI tools. The benefits of GenAI assistants include streamlining operations, saving time and costs, […] ]]>
2025-03-26T13:00:10+00:00 https://blog.checkpoint.com/transforming-security-management-with-ai-agents-and-assistants/ www.secnews.physaphae.fr/article.php?IdArticle=8658317 False Tool ChatGPT 3.0000000000000000
SecurityWeek - Security News Un nouveau groupe de ransomware revendique une attaque contre la société de télécommunications américaine Wideopenwest<br>New Ransomware Group Claims Attack on US Telecom Firm WideOpenWest Un nouveau groupe de ransomwares appelé Arkana prétend avoir compromis le fournisseur américain de télécommunications Wideopenwest.
>A new ransomware group called Arkana claims to have compromised the US telecommunications provider WideOpenWest. ]]>
2025-03-26T12:46:55+00:00 https://www.securityweek.com/new-ransomware-group-claims-attack-on-us-telecom-firm-wideopenwest/ www.secnews.physaphae.fr/article.php?IdArticle=8658324 False Ransomware None 3.0000000000000000
IndustrialCyber - cyber risk firms for industrial ODNI 2025 Évaluation des menaces note les menaces de Russie, Chine, Iran, Corée du Nord ciblant les infrastructures critiques, les télécommunications<br>ODNI 2025 Threat Assessment notes threats from Russia, China, Iran, North Korea targeting critical infrastructure, telecom The Office of the Director of National Intelligence (ODNI) identified in its 2025 Annual Threat Assessment of the... ]]> 2025-03-26T12:41:36+00:00 https://industrialcyber.co/reports/odni-2025-threat-assessment-notes-threats-from-russia-china-iran-north-korea-targeting-critical-infrastructure-telecom/ www.secnews.physaphae.fr/article.php?IdArticle=8658320 False Threat None 3.0000000000000000 IndustrialCyber - cyber risk firms for industrial RMC Global acquiert le crieur et les associés, pour étendre l'expertise dans les infrastructures et la défense critiques<br>RMC Global acquires Shearer and Associates, to expand expertise in critical infrastructure and defense RMC Global, un fournisseur de gestion des risques et de solutions de cybersécurité industrielle pour les infrastructures critiques et les missions critiques, a annoncé ...
>RMC Global, a provider of risk management and industrial cybersecurity solutions for critical infrastructure and critical missions, announced... ]]>
2025-03-26T12:37:42+00:00 https://industrialcyber.co/news/rmc-global-acquires-shearer-and-associates-to-expand-expertise-in-critical-infrastructure-and-defense/ www.secnews.physaphae.fr/article.php?IdArticle=8658321 False Industrial None 3.0000000000000000
CyberSecurityVentures - cybersecurity services Erreur humaine et impact financier de la cybercriminalité<br>Human Error and The Financial Impact of Cybercrime Cette semaine en cybersécurité des éditeurs du magazine Cybercrime - lisez l'histoire complète dans Techbulllion Sausalito, Californie - 26 mars 2025 Les répercussions financières des cyber-incidents peuvent être stupéfiantes, affectant les grandes et petites entreprises. Selon un rapport de Cybersecurity Ventures, les dommages mondiaux de la cybercriminalité sont prédits
>This week in cybersecurity from the editors at Cybercrime Magazine –Read the full story in TechBulllion Sausalito, Calif. – Mar. 26, 2025 The financial repercussions of cyber incidents can be staggering, affecting companies large and small. According to a report from Cybersecurity Ventures, global cybercrime damages are predicted ]]>
2025-03-26T12:35:06+00:00 https://cybersecurityventures.com/human-error-and-the-financial-impact-of-cybercrime/ www.secnews.physaphae.fr/article.php?IdArticle=8658315 False None None 3.0000000000000000
Recorded Future - FLux Recorded Future Le Royaume-Uni met en garde contre la menace émergente de \\ 'sadique \\' en ligne \\ 'com Réseaux \\' des adolescents<br>UK warns of emerging threat from \\'sadistic\\' online \\'Com networks\\' of teenage boys Online networks of teenage boys “dedicated to inflicting harm and committing a range of criminality” are among the most significant concerns for British law enforcement, officials announced this week.]]> 2025-03-26T12:12:40+00:00 https://therecord.media/uk-threat-com-sadistic-teenager www.secnews.physaphae.fr/article.php?IdArticle=8658318 False Threat,Legislation None 2.0000000000000000 Detection Engineering - Blog Sécu The Security Research Product Function Product teams build, security research teams help navigate]]> 2025-03-26T12:03:57+00:00 https://www.detectionengineering.net/p/the-security-research-product-function-e18 www.secnews.physaphae.fr/article.php?IdArticle=8658304 False None None 3.0000000000000000 Cisco - Security Firm Blog Les avantages d'un écosystème d'intégration large et ouvert<br>The Benefits of a Broad and Open Integration Ecosystem Since inception, Cisco XDR has followed the Open XDR philosophy. We integrate telemetry and data from dozens of Cisco and third-party security solutions.]]> 2025-03-26T12:00:00+00:00 https://blogs.cisco.com/security/the-benefits-of-a-broad-and-open-integration-ecosystem/ www.secnews.physaphae.fr/article.php?IdArticle=8658314 False None None 3.0000000000000000 SecurityWeek - Security News Les utilisateurs de MacOS ont mis en garde contre les nouvelles versions de Readeupdate malware<br>macOS Users Warned of New Versions of ReaderUpdate Malware Les utilisateurs de macOS sont ciblés avec plusieurs versions du logiciel malveillant ReaderUpdate écrit dans les langages de programmation Crystal, Nim, Rust et Go.
>macOS users are targeted with multiple versions of the ReaderUpdate malware written in Crystal, Nim, Rust, and Go programming languages. ]]>
2025-03-26T11:39:07+00:00 https://www.securityweek.com/macos-users-warned-of-new-versions-of-readerupdate-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8658307 False Malware None 3.0000000000000000
InfoSecurity Mag - InfoSecurity Magazine ETSI publie de nouvelles normes de chiffrement en sécurité quantique<br>ETSI Publishes New Quantum-Safe Encryption Standards Standards body ETSI has defined a scheme for key encapsulation mechanisms with access control (KEMAC), enabling quantum-secure encryption]]> 2025-03-26T11:30:00+00:00 https://www.infosecurity-magazine.com/news/etsi-quantum-safe-encryption/ www.secnews.physaphae.fr/article.php?IdArticle=8658308 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Google patchs à la hâte Chrome Zero-Day exploité par APT<br>Google Hastily Patches Chrome Zero-Day Exploited by APT Researchers at Kaspersky discovered cyber-espionage activity that used the vulnerability in a one-click phishing attack to deliver malware.]]> 2025-03-26T11:27:34+00:00 https://www.darkreading.com/cyberattacks-data-breaches/google-patches-chrome-zero-day-exploited-apt www.secnews.physaphae.fr/article.php?IdArticle=8658347 False Malware,Vulnerability,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Les 7 tendances technologiques qui pourraient remplacer les mots de passe<br>The 7 technology trends that could replace passwords 230M stolen passwords met complexity requirements-and were still compromised. Passwords aren\'t going away for now, but there are new technologies that may increasingly replace them. Learn more from Specops Software about how to protect your passwords. [...]]]> 2025-03-26T11:16:33+00:00 https://www.bleepingcomputer.com/news/security/the-7-technology-trends-that-could-replace-passwords/ www.secnews.physaphae.fr/article.php?IdArticle=8658357 False None None 3.0000000000000000 Schneier on Security - Chercheur Cryptologue Américain Empoisonnement aux données de l'IA<br>AI Data Poisoning nouvelle fonctionnalité —A Au lieu de simplement bloquer les robots, le nouveau système de CloudFlare les attire dans un «labyrinthe» de pages réalistes mais non pertinentes, gaspillant les ressources informatiques du Crawler. L'approche est un changement notable par rapport à la stratégie standard de bloc et de défense utilisé par la plupart des services de protection du site Web. Cloudflare dit que bloquer les robots se retourne parfois parce qu'il alerte les opérateurs du robot de robot qu'ils ont été détectés. «Lorsque nous détectons la rampe non autorisée, plutôt que de bloquer la demande, nous lierons une série de pages générées par l'IA qui sont suffisamment convaincantes pour inciter un robot pour les traverser», écrit Cloudflare. "Mais bien que réel, ce contenu n'est pas réellement le contenu du site que nous protégeons, donc le Crawler gaspille du temps et des ressources." ...
Cloudflare has a new feature—available to free users as well—that uses AI to generate random pages to feed to AI web crawlers: Instead of simply blocking bots, Cloudflare’s new system lures them into a “maze” of realistic-looking but irrelevant pages, wasting the crawler’s computing resources. The approach is a notable shift from the standard block-and-defend strategy used by most website protection services. Cloudflare says blocking bots sometimes backfires because it alerts the crawler’s operators that they’ve been detected. “When we detect unauthorized crawling, rather than blocking the request, we will link to a series of AI-generated pages that are convincing enough to entice a crawler to traverse them,” writes Cloudflare. “But while real looking, this content is not actually the content of the site we are protecting, so the crawler wastes time and resources.”...]]>
2025-03-26T11:07:13+00:00 https://www.schneier.com/blog/archives/2025/03/ai-data-poisoning.html www.secnews.physaphae.fr/article.php?IdArticle=8658292 False None None 3.0000000000000000
The Register - Site journalistique Anglais NCSC robinet les influenceurs pour rendre le 2FA de devenir viral<br>NCSC taps influencers to make 2FA go viral
Who knew social media stars had a role to play in building national cyber resilience? The world\'s biggest brands have benefited from influencer marketing for years – now the UK\'s National Cyber Security Centre (NCSC) has hopped on the bandwagon to preach two-factor authentication (2FA) to the masses.… ]]>
2025-03-26T11:00:13+00:00 https://go.theregister.com/feed/www.theregister.com/2025/03/26/ncsc_influencers_2fa/ www.secnews.physaphae.fr/article.php?IdArticle=8658295 False None None 3.0000000000000000
ANSSI - Flux Étatique Francais L\'ANSSI vous donne rendez-vous au Forum InCyber 2025 ! anssiadm mer 26/03/2025 - 10:51 Du 1er au 3 avril 2025, l'ANSSI participe au Forum InCyber (FIC) à Lille, rendez-vous annuel important pour un grand nombre d'acteurs de la cybersécurité. L'Agence est présente au FIC pour échanger avec ses interlocuteurs du quotidien et assurer ses missions de prévention et de sensibilisation. Échangez avec nos experts Sur son stand (stand D-6, hall D du Grand Palais), les agents vous accueillent, présentent nos dernières actualités et répondent à vos questions au travers de sept corners thématiques : le CERT-FR, le Centre de formation SSI, la Directive NIS 2, l'Innovation, l'Industrie et la Technologie, le Management de la sécurité numérique, ou encore le Recrutement.   Découvrez la programmation détaillée de ces ateliers L'ANSSI anime, sur son stand, des ateliers lors des 3 jours du salon. Ceux-ci ont pour objectif de mettre en avant des sujets structurants pour l'écosystème cyber en proposant des expériences interactives à nos communautés. Rendez-vous sur le stand de l'ANSSI : L'IA au service de la détection : enjeux et impacts ? Retour sur une étude du marché français Comment est utilisée l'IA au service des capacités de détection et de réponse aux incidents cyber ? L'ANSSI et Wavestone présenteront leur étude du marché français, issue d'entretiens menés avec une vingtaine d'éditeurs. Mardi 1er avril – 11h30-12h00 Mercredi 2 avril - 14h30-15h00 Jeudi 3 avril – 10h00-10h30 MesServicesCyber : la plateforme de l'offre de services cyber de l'ANSSI Venez découvrir MesServicesCyber, une #InnovationANSSI pensée pour faire découvrir l'offre de services et les ressources clés de l'ANSSI et de ses partenaires. MesServicesCyber s'adresse en particulier aux entités régulées par la directive NIS2 ! MesServicesCyber propose également une navigation simplifiée entre les services numériques proposés par l'ANSSI (la suite cyber) ainsi qu'un test de maturité cyber. Mardi 1er avril - 15h00-15h30 Mercredi 2 avril – 11h00-11h30 Jeudi 3 avri]]> 2025-03-26T10:51:36+00:00 https://cyber.gouv.fr/actualites/lanssi-vous-donne-rendez-vous-au-forum-incyber-2025 www.secnews.physaphae.fr/article.php?IdArticle=8658303 False None None 3.0000000000000000 HackRead - Chercher Cyber Crypto Wheist soupçonne «Wiz» arrêté après 243 millions de dollars de vol<br>Crypto Heist Suspect “Wiz” Arrested After $243 Million Theft Veer Chetal, known online as "Wiz" and one of the key suspects in the massive $243 million cryptocurrency heist, has been apprehended by U.S. Marshals.]]> 2025-03-26T10:46:38+00:00 https://hackread.com/crypto-heist-suspect-wiz-arrested-243-million-theft/ www.secnews.physaphae.fr/article.php?IdArticle=8658294 False None None 3.0000000000000000 ProjectZero - Blog de recherche Google Déplacer devant Webp<br>Blasting Past Webp issued an out-of-band security update for iOS: Release notes for iOS 16.6.1 and iPadOS 16.6.1, including CVE-2023-41064 for ImageIO and CVE-2023-41061 for Wallet, detailing security updates and potential exploitation. Around the same time on September 7th 2023, Citizen Lab published a blog post linking the two CVEs fixed in iOS 16.6.1 to an "NSO Group Zero-Click, Zero-Day exploit captured in the wild": "[The target was] an individual employed by a Washington DC-based civil society organization with international offices... The exploit chain was capable of compromising iPhones running the latest version of iOS (16.6) without any interaction from the victim. The exploit involved PassKit attachments containing malicious images sent from an attacker iMessage account to the victim." The day before, on September 6th 2023, Apple reported a vulnerability to the WebP project, indicating in the report that they planned to ship a custom fix for Apple customers the next day. The WebP team posted their first proposed fix in the public git repo the next day, and five days after that on September 12th Google released a ]]> 2025-03-26T10:30:02+00:00 https://googleprojectzero.blogspot.com/2025/03/blasting-past-webp.html www.secnews.physaphae.fr/article.php?IdArticle=8658377 False Tool,Vulnerability,Threat,Mobile,Prediction,Technical None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Enisa sondage des menaces spatiales du paysage dans un nouveau rapport<br>ENISA Probes Space Threat Landscape in New Report EU security agency ENISA has released a new report outlining the threats and potential mitigations for the space sector]]> 2025-03-26T10:30:00+00:00 https://www.infosecurity-magazine.com/news/enisa-probes-space-threat/ www.secnews.physaphae.fr/article.php?IdArticle=8658296 False Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Alerte zéro-jour: Google publie un patch chromé pour l'exploit utilisé dans les attaques d'espionnage russes<br>Zero-Day Alert: Google Releases Chrome Patch for Exploit Used in Russian Espionage Attacks Google has released out-of-band fixes to address a high-severity security flaw in its Chrome browser for Windows that it said has been exploited in the wild as part of attacks targeting organizations in Russia.  The vulnerability, tracked as CVE-2025-2783, has been described as a case of "incorrect handle provided in unspecified circumstances in Mojo on Windows." Mojo refers to a]]> 2025-03-26T10:26:00+00:00 https://thehackernews.com/2025/03/zero-day-alert-google-releases-chrome.html www.secnews.physaphae.fr/article.php?IdArticle=8658238 False Vulnerability,Threat None 3.0000000000000000 SecurityWeek - Security News Les entreprises de sécurité disent que les preuves semblent confirmer Oracle Cloud Hack<br>Security Firms Say Evidence Seems to Confirm Oracle Cloud Hack Malgré Oracle nie catégoriquement que ses systèmes cloud ont été violés, les exemples de données publiées par le pirate semble prouver le contraire.
>Despite Oracle categorically denying that its Cloud systems have been breached, sample data released by the hacker seems to prove otherwise. ]]>
2025-03-26T10:10:00+00:00 https://www.securityweek.com/security-firms-say-evidence-seems-to-confirm-oracle-cloud-hack/ www.secnews.physaphae.fr/article.php?IdArticle=8658293 False Hack,Cloud None 3.0000000000000000
The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Nouveaux défauts de sécurité trouvés dans VMware Tools et Crushftp - Risque élevé, pas de solution de contournement<br>New Security Flaws Found in VMware Tools and CrushFTP - High Risk, No Workaround Broadcom has issued security patches to address a high-severity security flaw in VMware Tools for Windows that could lead to an authentication bypass. Tracked as CVE-2025-22230, the vulnerability is rated 7.8 on the ten-point Common Vulnerability Scoring System (CVSS). "VMware Tools for Windows contains an authentication bypass vulnerability due to improper access control," Broadcom said in an]]> 2025-03-26T09:50:00+00:00 https://thehackernews.com/2025/03/new-security-flaws-found-in-vmware.html www.secnews.physaphae.fr/article.php?IdArticle=8658239 False Tool,Vulnerability None 3.0000000000000000 Global Security Mag - Site de news francais IGEL étend le modèle de sécurité préventive ™<br>IGEL Expands Preventative Security Model™ Revues de produits
IGEL Expands Preventative Security Model™ to Secure and Modernize Legacy IT/OT Systems - Product Reviews]]>
2025-03-26T09:47:09+00:00 https://www.globalsecuritymag.fr/igel-expands-preventative-security-model-tm.html www.secnews.physaphae.fr/article.php?IdArticle=8658283 False Industrial None 3.0000000000000000
IndustrialCyber - cyber risk firms for industrial Le NCSC britannique introduit huit principes pour améliorer les cyber-défenses pour les postes de travail à accès privilégié sécurisé<br>UK NCSC introduces eight principles to enhance cyber defenses for secure privileged access workstations The U.K. National Cyber Security Centre (NCSC) has introduced a comprehensive set of eight principles for privileged access... ]]> 2025-03-26T09:41:09+00:00 https://industrialcyber.co/news/uk-ncsc-introduces-eight-principles-to-enhance-cyber-defenses-for-secure-privileged-access-workstations/ www.secnews.physaphae.fr/article.php?IdArticle=8658279 False None None 2.0000000000000000 Global Security Mag - Site de news francais Kyocera félicite les efforts de cybersécurité du secteur public tout en soulignant le besoin de mesures proactives continues<br>Kyocera commends public sector\\'s cybersecurity efforts while highlighting need for continued proactive measures Opinion
Kyocera commends public sector\'s cybersecurity efforts while highlighting need for continued proactive measures - Opinion]]>
2025-03-26T09:39:09+00:00 https://www.globalsecuritymag.fr/kyocera-commends-public-sector-s-cybersecurity-efforts-while-highlighting-need.html www.secnews.physaphae.fr/article.php?IdArticle=8658284 False None None 3.0000000000000000
IndustrialCyber - cyber risk firms for industrial ONNINUE rapporte 132% de surtension des attaques de ransomwares, avec AITM et Plugx Rat augmentant à mesure que les tactiques changent<br>Ontinue reports 132% surge in ransomware attacks, with AiTM and PlugX RAT increasing as tactics shift Ontinue identifies that ransomware attacks rose 132 percent, despite a 35 percent drop in payments, signaling a shift... ]]> 2025-03-26T09:36:28+00:00 https://industrialcyber.co/reports/ontinue-reports-132-surge-in-ransomware-attacks-with-aitm-and-plugx-rat-increasing-as-tactics-shift/ www.secnews.physaphae.fr/article.php?IdArticle=8658280 False Ransomware None 2.0000000000000000 Global Security Mag - Site de news francais HUMAN Security procède à des nominations clés<br>HUMAN Security procède à des nominations clés Business
HUMAN Security annonce des nominations clés - Business]]>
2025-03-26T09:31:05+00:00 https://www.globalsecuritymag.fr/human-security-procede-a-des-nominations-cles.html www.secnews.physaphae.fr/article.php?IdArticle=8658285 False None None 2.0000000000000000
InfoSecurity Mag - InfoSecurity Magazine La nouvelle stratégie de fraude du gouvernement britannique pour se concentrer sur les menaces de technologie<br>UK Government\\'s New Fraud Strategy to Focus on Tech-Enabled Threats The UK government\'s new fraud minister will today announce plans for a newly expanded fraud strategy]]> 2025-03-26T09:30:00+00:00 https://www.infosecurity-magazine.com/news/governments-fraud-strategy/ www.secnews.physaphae.fr/article.php?IdArticle=8658281 False None None 2.0000000000000000 The Last Watchdog - Blog Sécurité de Byron V Acohido Essai d'invité: le cas pour faire de la continuité des affaires en temps réel une priorité de cybersécurité de première ligne<br>GUEST ESSAY: The case for making real-time business continuity a frontline cybersecurity priority Cela commence par une ondulation de confusion, puis la panique. Les systèmes hospitaliers gèlent à mi-procédure. Les dossiers médicaux électroniques deviennent inaccessibles. lié: Intelt Intel System de santé préciel sur le système d'inteaux de santé Expositions Aux soins intensifs, les alarmes restent en tant que médecins et infirmières qui se bousculent pour stabiliser les patients critiques… (plus…) Le dernier chien de garde .
>It starts with a ripple of confusion, then panic. Hospital systems freeze mid-procedure. Electronic medical records become inaccessible. Related: Valuable intel on healthcare system cyber exposures In the ICU, alarms blare as doctors and nurses scramble to stabilize critical patients … (more…) The post GUEST ESSAY: The case for making real-time business continuity a frontline cybersecurity priority first appeared on The Last Watchdog.]]>
2025-03-26T09:23:19+00:00 https://www.lastwatchdog.com/guest-essay-the-case-for-making-real-time-business-continuity-a-frontline-cybersecurity-priority/ www.secnews.physaphae.fr/article.php?IdArticle=8658275 False Medical None 3.0000000000000000
Bleeping Computer - Magazine Américain New NPM Attack poisons Packages locaux avec des déambulations<br>New npm attack poisons local packages with backdoors Two malicious packages were discovered on npm (Node package manager) that covertly patch legitimate, locally installed packages to inject a persistent reverse shell backdoor. [...]]]> 2025-03-26T08:00:00+00:00 https://www.bleepingcomputer.com/news/security/new-npm-attack-poisons-local-packages-with-backdoors/ www.secnews.physaphae.fr/article.php?IdArticle=8658319 False None None 3.0000000000000000 Global Security Mag - Site de news francais ManageEngine élargit son réseau d'intégration avec plus de 100 intégrations prédéfinies pour la gestion de l'identité d'entreprise<br>ManageEngine Expands Its Integration Network With 100+ Prebuilt Integrations for Enterprise Identity Management https://mnge.it/ad360-marketplace - Revues de produits
ManageEngine Expands Its Integration Network With 100+ Prebuilt Integrations for Enterprise Identity Management The Company\'s IAM Platform, AD360, Helps Converge Disconnected Identities ● ManageEngine AD360 expands its integration support, with 100+ new ready-to-use integrations ● These integrations empower enterprises for seamless, scalable identity management across diverse IT applications ● Explore the complete lineup of integrations available in AD360 at https://mnge.it/ad360-marketplace - Product Reviews]]>
2025-03-26T07:57:02+00:00 https://www.globalsecuritymag.fr/manageengine-expands-its-integration-network-with-100-prebuilt-integrations-for.html www.secnews.physaphae.fr/article.php?IdArticle=8658263 False None None 3.0000000000000000
Dark Reading - Informationweek Branch Public-Private Ops Net Big Wins contre la cybercriminalité africaine<br>Public-Private Ops Net Big Wins Against African Cybercrime Three cybersecurity firms worked with Interpol and authorities in Nigeria, South Africa, Rwanda, and four other African nations to arrest more than 300 cybercriminals.]]> 2025-03-26T07:00:00+00:00 https://www.darkreading.com/threat-intelligence/public-private-ops-big-wins-african-cybercrime www.secnews.physaphae.fr/article.php?IdArticle=8658256 False None None 3.0000000000000000 InformationSecurityBuzzNews - Site de News Securite Même le meilleur peut être Pwned -Troy Hunt \\'s Transparency donne le bon exemple<br>Even the Best Can Be Pwned -Troy Hunt\\'s Transparency Sets the Right Example Security consultant and founder of the popular Troy Hunt, a security consultant who runs the popular data-breach search service Have I Been Pwned?, has disclosed that he has become a victim of a phishing attack that exposed the email addresses of 16,000 subscribers to his blog troyhunt.com.   “Every active subscriber on my list will shortly [...]]]> 2025-03-26T05:51:25+00:00 https://informationsecuritybuzz.com/even-the-best-can-be-pwned-troy-hunts/ www.secnews.physaphae.fr/article.php?IdArticle=8658247 False None None 3.0000000000000000 InformationSecurityBuzzNews - Site de News Securite Les agents de l'IA réduiront le temps d'exploitation des comptes de 50%<br>AI Agents Will Cut Account Exploitation Time by 50% By 2027, AI agents are expected to reduce the time required to exploit account exposures by 50%. This was revealed in Gartner\'s new report, titled: “Predicts 2025: Navigating Imminent AI Turbulence for Cybersecurity.”  Jeremy D\'Hoinne, VP Analyst at Gartner, says account takeover (ATO) is a persistent attack vector as weak authentication credentials, including passwords, are [...]]]> 2025-03-26T05:43:16+00:00 https://informationsecuritybuzz.com/ai-agents-wil-cut-account-exploit-time/ www.secnews.physaphae.fr/article.php?IdArticle=8658248 False Threat None 3.0000000000000000 Wired Threat Level - Security News 20% Coupon Wayfair et codes promotionnels | Mars 2025<br>20% Wayfair Coupon & Promo Codes | March 2025 Save during Spring Cyber Week with Wayfair promo codes and coupons for 10% of, up to 80% off furniture, and more on WIRED.]]> 2025-03-26T05:10:00+00:00 https://www.wired.com/story/wayfair-coupon/ www.secnews.physaphae.fr/article.php?IdArticle=8658245 False None None 2.0000000000000000 The State of Security - Magazine Américain Implémentation des postes de travail d'accès privilégié: un guide étape par étape<br>Implementing Privileged Access Workstations: A Step-by-Step Guide At a time when cyber threats seem to escalate daily, security teams are always on the lookout for new ways to protect their sensitive data and systems. For some, Privileged Access Workstations (PAWs) are being viewed as one solution to keep privileged accounts and critical systems safe from compromise. These are specialized workstations built for administrators and users who manage highly sensitive environments. PAWs are dedicated, hardened workstations that provide a secure environment when performing administrative or privileged tasks. Unlike everyday endpoints, these machines are isolated...]]> 2025-03-26T04:55:56+00:00 https://www.tripwire.com/state-of-security/implementing-privileged-access-workstations-step-step-guide www.secnews.physaphae.fr/article.php?IdArticle=8658276 False None None 3.0000000000000000 The State of Security - Magazine Américain Comment construire un programme de gestion de vulnérabilité mature<br>How to Build a Mature Vulnerability Management Program The terms “patch management” and “ vulnerability management“ are not the same. And that difference is a big difference. They may be confused because applying patches is one of the many ways to mitigate cyber risks. However, it is one piece of the entire vulnerability management puzzle and organizations that do not realize this are burdened with a false sense of security. A patch management program is a wonderful start, but it does not have the reach or resources of a fully mature vulnerability management program. An effective vulnerability management program does more than update outdated...]]> 2025-03-26T04:55:53+00:00 https://www.tripwire.com/state-of-security/build-mature-vulnerability-management-program www.secnews.physaphae.fr/article.php?IdArticle=8658277 False Vulnerability None 3.0000000000000000 InformationSecurityBuzzNews - Site de News Securite La violation de Spyx montre que les utilisateurs d'Apple sont invulnérables et le silence est assourdissant<br>SpyX Breach Shows Apple Users Aren\\'t Invulnerable and Silence is Deafening Consumer-grade spyware operation SpyX has been identified on the data breach notification site have I been pwned? as experiencing a data breach in June 2024 that compromised almost 2 million unique email addresses. Among those, interestingly, were thousands of Apple users.  The incident highlights not only the structural vulnerabilities of such applications (apps) but also [...]]]> 2025-03-26T04:53:46+00:00 https://informationsecuritybuzz.com/spyx-breach-apple-arent-invulnerable/ www.secnews.physaphae.fr/article.php?IdArticle=8658236 False Data Breach,Vulnerability None 2.0000000000000000