www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2025-05-12T09:26:03+00:00 www.secnews.physaphae.fr InformationSecurityBuzzNews - Site de News Securite Cyber-résilience des services publics à l'ère quantique<br>Utility Cyber Resilience in the Quantum Era Utilities-power, water, gas, and pipelines-form the backbone of modern society. Their critical role in delivering essential services makes them attractive targets of cyber attackers, who are leveraging increasingly sophisticated methods to infiltrate industrial control systems (ICS) and supervisory control and data acquisition (SCADA) environments. However, while these OT systems may be the ultimate target, the [...]]]> 2025-03-24T03:34:23+00:00 https://informationsecuritybuzz.com/utility-cyber-resilience-in-the-quantum-era/ www.secnews.physaphae.fr/article.php?IdArticle=8657680 False Industrial None 2.0000000000000000 InformationSecurityBuzzNews - Site de News Securite Abynsworker: un nouveau Edr-Killer dans les attaques de Ransomware Medusa<br>ABYSSWORKER: A New EDR-Killer in Medusa Ransomware Attacks Elastic Security Labs has observed a financially motivated campaign delivering Medusa ransomware via a HEARTCRYPT-packed loader.   This loader is deployed alongside a driver, signed with a revoked certificate from a Chinese vendor, which Elastic has named ABYSSWORKER. Once installed on the victim\'s machine, the driver is used to disable various EDR solutions.   This EDR-disrupting driver [...]]]> 2025-03-24T03:04:47+00:00 https://informationsecuritybuzz.com/abyssworker-a-new-edr-killer-in-medusa/ www.secnews.physaphae.fr/article.php?IdArticle=8657671 False Ransomware None 2.0000000000000000 InformationSecurityBuzzNews - Site de News Securite La confiance excessive du Royaume-Uni CNI \\ met en danger la sécurité nationale<br>UK CNI\\'s Overconfidence Puts National Security at Risk Despite mounting threats and high incident rates, organizations in the UK\'s critical national infrastructure (CNI) sector display an alarming overconfidence in their cybersecurity defenses. According to Bridewell\'s latest Cyber Security in Critical National Infrastructure Organizations report, confidence that critical systems are protected from cyber threats has grown steadily since 2025, despite 95% of respondents admitting [...]]]> 2025-03-24T02:31:38+00:00 https://informationsecuritybuzz.com/uk-cnis-overconfidence-natio-sec-risk/ www.secnews.physaphae.fr/article.php?IdArticle=8657672 False None None 3.0000000000000000 Bleeping Computer - Magazine Américain Astra (partage d'écran) de Google Gemini \\ lance sur Android pour certains utilisateurs<br>Google Gemini\\'s Astra (screen sharing) rolls out on Android for some users At MWC 2025, Google confirmed it was working on screen and video share capabilities for Gemini Live, codenamed "Project Astra". At that time, Google promised that the feature would begin rolling out soon, and now some users have spotted it in the wild. [...]]]> 2025-03-24T00:08:37+00:00 https://www.bleepingcomputer.com/news/artificial-intelligence/google-geminis-astra-screen-sharing-rolls-out-on-android-for-some-users/ www.secnews.physaphae.fr/article.php?IdArticle=8657688 False Mobile None 2.0000000000000000 Silicon - Site de News Francais Cybersécurité des collectivités : la CNIL prépare NIS 2 2025-03-24T00:00:00+00:00 https://www.silicon.fr/Thematique/cybersecurite-1371/Breves/collectivites-cnil-prepare-nis2-469279.htm#utm_source=IndexThematique&utm_medium=Rss&utm_campaign= www.secnews.physaphae.fr/article.php?IdArticle=8657802 False None None 3.0000000000000000 HackRead - Chercher Cyber Comment supprimer des photos en double sur iPhone pour enregistrer le stockage<br>How to Delete Duplicate Photos on iPhone to Save Storage Learn the easiest way to delete duplicate photos on your iPhone device with our simple, step-by-step guide.]]> 2025-03-23T22:07:52+00:00 https://hackread.com/how-to-delete-duplicate-photos-on-iphone-save-storage/ www.secnews.physaphae.fr/article.php?IdArticle=8657634 False Mobile None 1.00000000000000000000 The Register - Site journalistique Anglais Oracle Cloud dit que ce n'est pas vrai que quelqu'un a fait irruption dans ses serveurs de connexion et a volé des données<br>Oracle Cloud says it\\'s not true someone broke into its login servers and stole data Despite evidence to the contrary as alleged pilfered info goes on sale Oracle has straight up denied claims by a miscreant that its public cloud offering has been compromised and information stolen.…]]> 2025-03-23T21:28:17+00:00 https://go.theregister.com/feed/www.theregister.com/2025/03/23/oracle_cloud_customers_keys_credentials/ www.secnews.physaphae.fr/article.php?IdArticle=8657633 False Cloud None 3.0000000000000000 HackRead - Chercher Cyber ANSIBLE VS TERRAFORM: qui est plus sûr pour l'automatisation des infrastructures?<br>Ansible vs Terraform: Which is More Secure for Infrastructure Automation? Gartner describes infrastructure as code (IaC) as a key way to unlock the potential of the cloud. However,…]]> 2025-03-23T18:44:14+00:00 https://hackread.com/ansible-vs-terraform-secure-infrastructure-automation/ www.secnews.physaphae.fr/article.php?IdArticle=8657608 False Cloud None 2.0000000000000000 Checkpoint Research - Fabricant Materiel Securite Vanhelsing, New Raas en ville<br>VanHelsing, new RaaS in Town Points clés VanhelSing Raas ces dernières semaines, un programme nouveau et en expansion rapide en tant que programme Ransomware en tant que service (RAAS) appelé VanHelsingraas a fait des vagues dans le monde de la cybercriminalité. Lancé le 7 mars 2025, ce service a déjà démontré sa croissance rapide et son potentiel mortel, ayant infecté trois victimes en seulement deux semaines suivant son introduction. Les affiliés réputés peuvent […]
>Key Points VanHelsing RaaS In recent weeks, a new and rapidly expanding ransomware-as-a-service (RaaS) program called VanHelsingRaaS has been making waves in the cybercrime world. Launched on March 7, 2025, this service has already demonstrated its rapid growth and deadly potential, having infected three victims within just two weeks of its introduction. Reputable affiliates can […] ]]>
2025-03-23T13:00:48+00:00 https://research.checkpoint.com/2025/vanhelsing-new-raas-in-town/ www.secnews.physaphae.fr/article.php?IdArticle=8657570 False None None 2.0000000000000000
Zataz - Magazine Francais de secu Fuite massive de données chez Vitalis : plus de 202 000 clients compromis 2025-03-23T11:22:38+00:00 https://www.zataz.com/fuite-massive-de-donnees-chez-vitalis-plus-de-202-000-clients-compromis/ www.secnews.physaphae.fr/article.php?IdArticle=8657557 False None None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Broissance de la chaîne d'approvisionnement de GitHub: Coinbase Attack expose 218 référentiels, fuites Secrets CI / CD<br>GitHub Supply Chain Breach: Coinbase Attack Exposes 218 Repositories, Leaks CI/CD Secrets The supply chain attack involving the GitHub Action "tj-actions/changed-files" started as a highly-targeted attack against one of Coinbase\'s open-source projects, before evolving into something more widespread in scope. "The payload was focused on exploiting the public CI/CD flow of one of their open source projects – agentkit, probably with the purpose of leveraging it for further compromises,"]]> 2025-03-23T10:56:00+00:00 https://thehackernews.com/2025/03/github-supply-chain-breach-coinbase.html www.secnews.physaphae.fr/article.php?IdArticle=8657510 False None None 2.0000000000000000 Zataz - Magazine Francais de secu Fuite massive de données chez AUTOSUR : plus de 12 millions de dossiers exposés 2025-03-23T10:55:46+00:00 https://www.zataz.com/fuite-massive-de-donnees-chez-autosur-plus-de-12-millions-de-dossiers-exposes/ www.secnews.physaphae.fr/article.php?IdArticle=8657549 False None None 2.0000000000000000 Bleeping Computer - Magazine Américain Les avertissements du FBI sont des convertisseurs de fichiers de tarif réels poussent des logiciels malveillants<br>FBI warnings are true-fake file converters do push malware The FBI is warning that fake online document converters are being used to steal people\'s information and, in worst-case scenarios, lead to ransomware attacks. [...]]]> 2025-03-23T10:09:19+00:00 https://www.bleepingcomputer.com/news/security/fbi-warnings-are-true-fake-file-converters-do-push-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8657616 False Ransomware,Malware None 2.0000000000000000 Zataz - Magazine Francais de secu Fuite de données chez Intersport : ce que les clients doivent savoir 2025-03-23T09:15:43+00:00 https://www.zataz.com/fuite-de-donnees-chez-intersport-ce-que-les-clients-doivent-savoir/ www.secnews.physaphae.fr/article.php?IdArticle=8657541 False None None 3.0000000000000000 IndustrialCyber - cyber risk firms for industrial Choisir la gestion des cyber-risques basée sur les conséquences pour hiérarchiser l'impact sur la probabilité, redéfinir la sécurité industrielle<br>Choosing consequence-based cyber risk management to prioritize impact over probability, redefine industrial security With cyber attacks and threats continuing to escalate in tandem with geopolitical tensions, consequence-based cyber risk management has... ]]> 2025-03-23T07:14:22+00:00 https://industrialcyber.co/features/choosing-consequence-based-cyber-risk-management-to-prioritize-impact-over-probability-redefine-industrial-security/ www.secnews.physaphae.fr/article.php?IdArticle=8657525 False Industrial None 3.0000000000000000 HackRead - Chercher Cyber Comment les cybercriminels exploitent les canaux de notification<br>How Cybercriminals Exploit Notification Channels Cybercriminals are always looking for new ways to take advantage of people. One effective method they use is…]]> 2025-03-22T23:57:34+00:00 https://hackread.com/how-cybercriminals-exploit-notification-channels/ www.secnews.physaphae.fr/article.php?IdArticle=8657471 False Threat None 2.0000000000000000 HackRead - Chercher Cyber Comment les contrefacteurs utilisent la technologie pour simuler les étiquettes de produits (et les stratégies pour lutter contre la fraude)<br>How Counterfeiters Use Technology to Fake Product Labels (and Strategies to Combat Fraud) Counterfeit products are a growing problem in today\'s market. With advancements in technology, counterfeiters have become more skilled…]]> 2025-03-22T23:24:32+00:00 https://hackread.com/counterfeiters-technology-fake-product-labels-combat-fraud/ www.secnews.physaphae.fr/article.php?IdArticle=8657472 False None None 2.0000000000000000 HackRead - Chercher Cyber Pourquoi les systèmes d'IA ont besoin d'une équipe rouge plus que jamais<br>Why AI Systems Need Red Teaming Now More Than Ever AI systems are becoming a huge part of our lives, but they are not perfect. Red teaming helps…]]> 2025-03-22T22:56:50+00:00 https://hackread.com/why-ai-systems-need-red-teaming-more-than-ever/ www.secnews.physaphae.fr/article.php?IdArticle=8657463 False None None 2.0000000000000000 HackRead - Chercher Cyber Comment les cybercriminels exploitent les informations publiques pour les attaques: comprendre les risques et la prévention<br>How Cybercriminals Exploit Public Info for Attacks: Understanding Risks and Prevention Cybercriminals are skilled at using public information to their advantage. Knowing how they gather this data can help…]]> 2025-03-22T19:05:47+00:00 https://hackread.com/how-cybercriminals-exploit-public-info-attacks-risks-prevention/ www.secnews.physaphae.fr/article.php?IdArticle=8657434 False Threat None 2.0000000000000000 IndustrialCyber - cyber risk firms for industrial US FCC lance des sondes sur des entités liées au CCP au milieu des problèmes de sécurité nationale<br>US FCC launches probes into CCP-linked entities amid national security concerns Après la création de la semaine dernière d'un nouveau Conseil pour la sécurité nationale, la Federal Communications Commission (FCC) américaine a ...
>Following last week’s creation of a new Council for National Security, the U.S. Federal Communications Commission (FCC) has... ]]>
2025-03-22T17:40:21+00:00 https://industrialcyber.co/critical-infrastructure/us-fcc-launches-probes-into-ccp-linked-entities-amid-national-security-concerns/ www.secnews.physaphae.fr/article.php?IdArticle=8657526 False None None 2.0000000000000000
HackRead - Chercher Cyber Oracle nie la violation au milieu de la revendication d'accès de Hacker \\ à 6 millions d'enregistrements<br>Oracle Denies Breach Amid Hacker\\'s Claim of Access to 6 Million Records Oracle denies breach claims as hacker alleges access to 6 million cloud records. CloudSEK reports a potential zero-day exploit affecting 140,000 tenants.]]> 2025-03-22T13:29:00+00:00 https://hackread.com/oracle-denies-breach-hacker-access-6-million-records/ www.secnews.physaphae.fr/article.php?IdArticle=8657397 False Vulnerability,Threat,Cloud None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les sanctions en espèces de Tornado en espèces du Trésor américain au milieu de la Corée du Nord<br>U.S. Treasury Lifts Tornado Cash Sanctions Amid North Korea Money Laundering Probe The U.S. Treasury Department has announced that it\'s removing sanctions against Tornado Cash, a cryptocurrency mixer service that has been accused of aiding the North Korea-linked Lazarus Group to launder their ill-gotten proceeds. "Based on the Administration\'s review of the novel legal and policy issues raised by use of financial sanctions against financial and commercial activity occurring]]> 2025-03-22T13:02:00+00:00 https://thehackernews.com/2025/03/us-treasury-lifts-tornado-cash.html www.secnews.physaphae.fr/article.php?IdArticle=8657361 False Commercial APT 38 2.0000000000000000 Bleeping Computer - Magazine Américain Microsoft Trusted Signing Service a maltraité au malware de code de code<br>Microsoft Trusted Signing service abused to code-sign malware Cybercriminals are abusing Microsoft\'s Trusted Signing platform to code-sign malware executables with short-lived three-day certificates. [...]]]> 2025-03-22T10:30:04+00:00 https://www.bleepingcomputer.com/news/security/microsoft-trusted-signing-service-abused-to-code-sign-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8657625 False Malware None 2.0000000000000000 HackRead - Chercher Cyber Une nouvelle arnaque de phishing utilise un faux chatbot Instagram pour détourner les comptes<br>New Phishing Scam Uses Fake Instagram Chatbot to Hijack Accounts New phishing scam targets Instagram business accounts using fake chatbots and support emails, tricking users into handing over login credentials.]]> 2025-03-21T23:05:14+00:00 https://hackread.com/phishing-scam-fake-instagram-chatbots-hijack-accounts/ www.secnews.physaphae.fr/article.php?IdArticle=8657291 False None None 2.0000000000000000 TechRepublic - Security News US Huawei \\'s Pura x fosts Android pour harmonyos, fait ses débuts AIDE ASSISTANT avec Deepseek<br>Huawei\\'s Pura X Ditches Android for HarmonyOS, Debuts AI Assistant With DeepSeek Huawei flips the foldable game with Pura X - a wide-screen flip phone powered by HarmonyOS 5, packed with AI, pro cameras, and zero reliance on Android.]]> 2025-03-21T22:58:08+00:00 https://www.techrepublic.com/article/news-huawei-pura-x/ www.secnews.physaphae.fr/article.php?IdArticle=8657300 False Mobile None 3.0000000000000000 SecureMac - Security focused on MAC Liste de contrôle 416: logiciels malveillants comme A.I. et A.I. Être trippin \\ '<br>Checklist 416: Malware as A.I. and A.I. Be Trippin\\' Les problèmes de précision d'Ai \\ étimulent une action en justice car Chatgpt accuse faussement les utilisateurs de crimes, tandis que les escroqueries en logiciels malveillants Deepseek mettent la confidentialité et la sécurité en danger.
>AI\'s accuracy issues spark legal action as ChatGPT falsely accuses users of crimes, while DeepSeek malware scams put privacy and security at risk. ]]>
2025-03-21T21:49:05+00:00 https://www.securemac.com/checklist/checklist-416-malware-as-a-i-and-a-i-be-trippin www.secnews.physaphae.fr/article.php?IdArticle=8657280 False Malware ChatGPT 2.0000000000000000
Dark Reading - Informationweek Branch Ce que le désarroi de l'équipe rouge de CISA \\ signifie pour les cyber-défenses américaines<br>What CISA\\'s Red Team Disarray Means for US Cyber Defenses DOGE is making wild moves at CISA, including bringing back fired probationary employees only to put them on paid leave, and reportedly gutting the agency\'s red teams.]]> 2025-03-21T20:42:20+00:00 https://www.darkreading.com/threat-intelligence/cisa-red-team-disarray-cyber-defenses www.secnews.physaphae.fr/article.php?IdArticle=8657272 False None None 3.0000000000000000 Schneier on Security - Chercheur Cryptologue Américain Vendredi Blogging Squid: une nouvelle explication du camouflage Squid<br>Friday Squid Blogging: A New Explanation of Squid Camouflage Research : Professeur agrégé de chimie et de biologie chimique à la Northeastern University, Deravi \\ 'S Récemment publié de documents dans le journal du journal fonctionnent essentiellement comme des cellules solaires organiques pour aider à alimenter leurs capacités de camouflage. Comme d'habitude, vous pouvez également utiliser ce post de calmar pour parler des histoires de sécurité dans les nouvelles que je n'ai pas couvertes.
New research: An associate professor of chemistry and chemical biology at Northeastern University, Deravi\'s recently published paper in the Journal of Materials Chemistry C sheds new light on how squid use organs that essentially function as organic solar cells to help power their camouflage abilities. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.]]>
2025-03-21T20:30:35+00:00 https://www.schneier.com/blog/archives/2025/03/friday-squid-blogging-a-new-explanation-of-squid-camouflage.html www.secnews.physaphae.fr/article.php?IdArticle=8657274 False None None 2.0000000000000000
Dark Reading - Informationweek Branch Les attaquants pivotent à SEMRUSH SUPPOF pour voler des informations d'identification Google<br>Attackers Pivot to SEMrush Spoof to Steal Google Credentials The attackers are taking an indirect approach to targeting SEO professionals and their Google credentials, using a fake digital marketing website.]]> 2025-03-21T20:23:26+00:00 https://www.darkreading.com/cyberattacks-data-breaches/attackers-semrush-steal-google-credentials www.secnews.physaphae.fr/article.php?IdArticle=8657283 False None None 3.0000000000000000 Dark Reading - Informationweek Branch État national \\ 'Paragon \\' Les infections de logiciels espions ciblent la société civile<br>Nation-State \\'Paragon\\' Spyware Infections Target Civil Society Law enforcement entities in democratic states have been deploying top-of-the-line messaging app spyware against journalists and aid workers.]]> 2025-03-21T20:18:05+00:00 https://www.darkreading.com/application-security/nation-state-paragon-spyware-infections www.secnews.physaphae.fr/article.php?IdArticle=8657273 False Legislation None 2.0000000000000000 ComputerWeekly - Computer Magazine NCSC, DSIT Enrôlez IBM pour diriger le programme de cyber-diversité<br>NCSC, DSIT enlist IBM to spearhead cyber diversity agenda 2025-03-21T20:01:00+00:00 https://www.computerweekly.com/news/366621232/NCSC-DSIT-enlist-IBM-to-spearhead-cyber-diversity-agenda www.secnews.physaphae.fr/article.php?IdArticle=8657298 False None None 2.0000000000000000 Bleeping Computer - Magazine Américain Coinbase était la cible principale des violations récentes des actions GitHub<br>Coinbase was primary target of recent GitHub Actions breaches Researchers have determined that Coinbase was the primary target in a recent GitHub Actions cascading supply chain attack that compromised secrets in hundreds of repositories. [...]]]> 2025-03-21T19:35:17+00:00 https://www.bleepingcomputer.com/news/security/coinbase-was-primary-target-of-recent-github-actions-breaches/ www.secnews.physaphae.fr/article.php?IdArticle=8657301 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) L'UAT-5918 cible l'infrastructure critique de Taiwan \\ à l'aide de shells Web et d'outils open-source<br>UAT-5918 Targets Taiwan\\'s Critical Infrastructure Using Web Shells and Open-Source Tools Threat hunters have uncovered a new threat actor named UAT-5918 that has been attacking critical infrastructure entities in Taiwan since at least 2023. "UAT-5918, a threat actor believed to be motivated by establishing long-term access for information theft, uses a combination of web shells and open-sourced tooling to conduct post-compromise activities to establish persistence in victim]]> 2025-03-21T19:24:00+00:00 https://thehackernews.com/2025/03/uat-5918-targets-taiwans-critical.html www.secnews.physaphae.fr/article.php?IdArticle=8657214 False Tool,Threat None 3.0000000000000000 Krebs on Security - Chercheur Américain Arrestations dans le schéma de tap-to-payé par le phishing<br>Arrests in Tap-to-Pay Scheme Powered by Phishing Authorities in at least two U.S. states last week independently announced arrests of Chinese nationals accused of perpetrating a novel form of tap-to-pay fraud using mobile devices. Details released by authorities so far indicate the mobile wallets being used by the scammers were created through online phishing scams, and that the accused were relying on a custom Android app to relay tap-to-pay transactions from mobile devices located in China.]]> 2025-03-21T19:12:04+00:00 https://krebsonsecurity.com/2025/03/arrests-in-tap-to-pay-scheme-powered-by-phishing/ www.secnews.physaphae.fr/article.php?IdArticle=8657260 False Mobile None 3.0000000000000000 CyberScoop - scoopnewsgroup.com special Cyber La FCC \\'s Carr allègue que les entreprises chinoises font des interdictions de télécommunications chinoises, annonce une enquête<br>FCC\\'s Carr alleges Chinese companies are making \\'end run\\' around Chinese telecom bans, announces investigation Le commissaire de la FCC a déclaré que des lettres d'enquête et au moins une assignation ont été envoyées à des sociétés appartenant à des Chinois.
>The FCC commissioner said letters of inquiry and at least one subpoena have been sent to Chinese-owned companies. ]]>
2025-03-21T19:11:51+00:00 https://cyberscoop.com/fcc-china-investigation-telecoms-equipment-secure-networks-act/ www.secnews.physaphae.fr/article.php?IdArticle=8657263 False None None 3.0000000000000000
Global Security Mag - Site de news francais Les contrôles de la CNIL en 2025 : applications mobiles, administration pénitentiaire, cybersécurité des collectivités RGPD / ]]> 2025-03-21T19:00:00+00:00 https://www.globalsecuritymag.fr/les-controles-de-la-cnil-en-2025-applications-mobiles-administration.html www.secnews.physaphae.fr/article.php?IdArticle=8657187 False None None 2.0000000000000000 Fortinet - Fabricant Materiel Securite Comment les Steelers de Pittsburgh tirent parti du tissu de sécurité Fortinet pour la défense de l'industrie<br>How the Pittsburgh Steelers Leverage the Fortinet Security Fabric for Industry-Leading Defense Scott Phelps, Vice President of Technology at the Pittsburgh Steelers, discusses how Fortinet has helped improve the fan experience, streamlined business operations, and bolstered defense. Learn more.]]> 2025-03-21T19:00:00+00:00 https://www.fortinet.com/blog/customer-stories/pittsburgh-steelers-leverage-fortinet-security-fabric-for-industry-leading-defense www.secnews.physaphae.fr/article.php?IdArticle=8657262 False None None 3.0000000000000000 Recorded Future - FLux Recorded Future Clearview AI règle le procès en matière de confidentialité de l'action en classe d'une valeur estimée à 50 millions de dollars<br>Clearview AI settles class-action privacy lawsuit worth an estimated $50 million A federal judge ruled that a settlement in a privacy lawsuit involving Clearview AI is fair, estimating that the agreement is worth $50 million to plaintiffs and their lawyers.]]> 2025-03-21T18:43:09+00:00 https://therecord.media/clearview-ai-illinois-class-action-lawsuit-settlement www.secnews.physaphae.fr/article.php?IdArticle=8657253 False None None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) MEDUSA Ransomware utilise un conducteur malveillant pour désactiver l'anti-malware avec des certificats volés<br>Medusa Ransomware Uses Malicious Driver to Disable Anti-Malware with Stolen Certificates The threat actors behind the Medusa ransomware-as-a-service (RaaS) operation have been observed using a malicious driver dubbed ABYSSWORKER as part of a bring your own vulnerable driver (BYOVD) attack designed to disable anti-malware tools. Elastic Security Labs said it observed a Medusa ransomware attack that delivered the encryptor by means of a loader packed using a packer-as-a-service (PaaS]]> 2025-03-21T18:28:00+00:00 https://thehackernews.com/2025/03/medusa-ransomware-uses-malicious-driver.html www.secnews.physaphae.fr/article.php?IdArticle=8657200 False Ransomware,Tool,Threat None 3.0000000000000000 Schneier on Security - Chercheur Cryptologue Américain Mes écrits sont dans le corpus de formation Libgen AI<br>My Writings Are in the LibGen AI Training Corpus outil de recherche qui vous permet de rechercher des œuvres spécifiques dans les modèles "libgen" de la données de la données de copyle. (Le reste de l'article est derrière un mur payant, mais pas l'outil de recherche.) Il est impossible de savoir exactement quelles parties de Libgen Meta utilisaient pour former son IA et quelles pièces il aurait pu décider d'exclure; Cet instantané a été pris en janvier 2025, après que Meta soit connue pour avoir accédé à la base de données, donc certains titres ici n'auraient pas été disponibles en téléchargement. Toujours… intéressant. La recherche de mon nom donne 199 résultats: tous mes livres dans différentes versions, plus un tas d'articles plus courts ...
The Atlantic has a search tool that allows you to search for specific works in the “LibGen” database of copyrighted works that Meta used to train its AI models. (The rest of the article is behind a paywall, but not the search tool.) It\'s impossible to know exactly which parts of LibGen Meta used to train its AI, and which parts it might have decided to exclude; this snapshot was taken in January 2025, after Meta is known to have accessed the database, so some titles here would not have been available to download. Still…interesting. Searching my name yields 199 results: all of my books in different versions, plus a bunch of shorter items...]]>
2025-03-21T18:26:22+00:00 https://www.schneier.com/blog/archives/2025/03/my-writings-are-in-the-libgen-ai-training-corpus.html www.secnews.physaphae.fr/article.php?IdArticle=8657252 False Tool None 3.0000000000000000
Recorded Future - FLux Recorded Future L'ordre de Trump sur le partage d'informations semble avoir des implications pour Doge et au-delà<br>Trump order on information sharing appears to have implications for DOGE and beyond A new executive order on breaking down "information silos" across federal agencies does not mention DOGE\'s aggressive tactics or the related legal challenges, but experts say the document clearly points in that direction.]]> 2025-03-21T17:35:39+00:00 https://therecord.media/trump-executive-order-information-silos-data-sharing-doge www.secnews.physaphae.fr/article.php?IdArticle=8657243 False None None 3.0000000000000000 HackRead - Chercher Cyber Le pilote ZonEalarm Flaw Flaw expose les utilisateurs au vol d'identification<br>Checkpoint ZoneAlarm Driver Flaw Exposes Users to Credential Theft Credential theft alert! Venak Security discovers a BYOVD attack using .SYS drivers to bypass Windows security. Learn how…]]> 2025-03-21T17:35:02+00:00 https://hackread.com/checkpoint-zonealarm-driver-flaw-user-credential-theft/ www.secnews.physaphae.fr/article.php?IdArticle=8657242 False None None 3.0000000000000000 ProofPoint - Firm Security Le facteur humain: redéfinir la cybersécurité à l'ère de l'IA<br>The Human Factor: Redefining Cybersecurity In The Age Of AI 2025-03-21T17:19:40+00:00 https://www.proofpoint.com/us/newsroom/news/human-factor-redefining-cybersecurity-age-ai www.secnews.physaphae.fr/article.php?IdArticle=8657664 False None None 2.0000000000000000 Global Security Mag - Site de news francais Checkmarx a l\'expertise pour aider les plus grandes entreprises du monde à anticiper les risques liés aux applications sans ralentir le développement. Cyber Securité / ]]> 2025-03-21T17:11:56+00:00 https://www.globalsecuritymag.fr/checkmarx-a-l-expertise-pour-aider-les-plus-grandes-entreprises-du-monde-a.html www.secnews.physaphae.fr/article.php?IdArticle=8657244 False None None 3.0000000000000000 CyberArk - Software Vendor Menaces tournées dans les séances post-authentification<br>Lurking Threats in Post-Authentication Sessions An attacker doesn\'t need your password anymore. They don\'t even need to break your MFA. They just need to get ahold of your session. And once they have it, they are you. Organizations have focused...]]> 2025-03-21T16:55:38+00:00 https://www.cyberark.com/blog/lurking-threats-in-post-authentication-sessions/ www.secnews.physaphae.fr/article.php?IdArticle=8657230 False None None 3.0000000000000000 Bleeping Computer - Magazine Américain Oracle nie la violation après que le pirate prétend le vol de 6 millions d'enregistrements de données<br>Oracle denies breach after hacker claims theft of 6 million data records Oracle denies it was breached after a threat actor claimed to be selling 6 million data records allegedly stolen from the company\'s Oracle Cloud federated SSO login servers [...]]]> 2025-03-21T16:43:51+00:00 https://www.bleepingcomputer.com/news/security/oracle-denies-data-breach-after-hacker-claims-theft-of-6-million-data-records/ www.secnews.physaphae.fr/article.php?IdArticle=8657271 False Threat,Cloud None 2.0000000000000000 Global Security Mag - Site de news francais Elastic Security Labs découvre que des pirates utilisent des pilotes malveillants pour contourner la sécurité Malwares]]> 2025-03-21T16:31:11+00:00 https://www.globalsecuritymag.fr/elastic-security-labs-decouvre-que-des-pirates-utilisent-des-pilotes.html www.secnews.physaphae.fr/article.php?IdArticle=8657233 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Panda aquatique APT lié à la Chine: campagne de 10 mois, 7 cibles mondiales, 5 familles de logiciels malveillants<br>China-Linked APT Aquatic Panda: 10-Month Campaign, 7 Global Targets, 5 Malware Families The China-linked advanced persistent threat (APT) group. known as Aquatic Panda has been linked to a "global espionage campaign" that took place in 2022 targeting seven organizations. These entities include governments, catholic charities, non-governmental organizations (NGOs), and think tanks across Taiwan, Hungary, Turkey, Thailand, France, and the United States. The activity, which took place]]> 2025-03-21T16:31:00+00:00 https://thehackernews.com/2025/03/china-linked-apt-aquatic-panda-10-month.html www.secnews.physaphae.fr/article.php?IdArticle=8657175 False Malware,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) 10 Network Critical Pentest Résultats Les équipes IT Overlook<br>10 Critical Network Pentest Findings IT Teams Overlook After conducting over 10,000 automated internal network penetration tests last year, vPenTest has uncovered a troubling reality that many businesses still have critical security gaps that attackers can easily exploit. Organizations often assume that firewalls, endpoint protection, and SIEMs are enough to keep them secure. But how effective are these defenses when put to the test? That\'s where]]> 2025-03-21T16:31:00+00:00 https://thehackernews.com/2025/03/10-critical-network-pentest-findings-it.html www.secnews.physaphae.fr/article.php?IdArticle=8657174 False Threat None 4.0000000000000000 Global Security Mag - Site de news francais ESET Research détecte la première attaque européenne du groupe MirrorFace Malwares]]> 2025-03-21T16:27:49+00:00 https://www.globalsecuritymag.fr/eset-research-detecte-la-premiere-attaque-europeenne-du-groupe-mirrorface.html www.secnews.physaphae.fr/article.php?IdArticle=8657234 False Tool None 3.0000000000000000 Recorded Future - FLux Recorded Future Le Trésor américain supprime les sanctions contre la torade en espèces après une perte de cour d'appel<br>US Treasury removes sanctions on Tornado Cash after appellate court loss Tornado Cash, which the U.S. sanctioned in 2022, was dropped from that list by the Trump administration following a court decision favoring the cryptocurrency mixer in November.]]> 2025-03-21T16:00:41+00:00 https://therecord.media/treasury-drops-tornado-cash-sanctions www.secnews.physaphae.fr/article.php?IdArticle=8657222 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Kaspersky relie la tête de la jument à douze, ciblant les entités russes via des serveurs C2 partagés<br>Kaspersky Links Head Mare to Twelve, Targeting Russian Entities via Shared C2 Servers Two known threat activity clusters codenamed Head Mare and Twelve have likely joined forces to target Russian entities, new findings from Kaspersky reveal. "Head Mare relied heavily on tools previously associated with Twelve. Additionally, Head Mare attacks utilized command-and-control (C2) servers exclusively linked to Twelve prior to these incidents," the company said. "This suggests]]> 2025-03-21T15:58:00+00:00 https://thehackernews.com/2025/03/kaspersky-links-head-mare-to-twelve.html www.secnews.physaphae.fr/article.php?IdArticle=8657176 False Tool,Threat None 3.0000000000000000 Global Security Mag - Site de news francais Investir dans la gouvernance, l\'automatisation et l\'alignement entre sécurité et métiers, permet de construire une posture de sécurité solide Cyber Securité / ]]> 2025-03-21T15:53:51+00:00 https://www.globalsecuritymag.fr/investir-dans-la-gouvernance-l-automatisation-et-l-alignement-entre-securite-et.html www.secnews.physaphae.fr/article.php?IdArticle=8657223 False None None 2.0000000000000000 Korben - Bloger francais Il bloque les pubs YouTube sur Apple TV en modifiant un seul octet de Protobuf Protocol Buffers (Protobuf) inventés par Google sont une merveille d’ingénierie. C’est un format de sérialisation de données binaire, compact et performant qui alimente une grande partie de l’infrastructure moderne du web. Pour faire simple, Protobuf permet de transformer des données structurées en une séquence d’octets ultra-compacte, beaucoup plus légère et rapide à traiter que du XML ou du JSON. C’est comme si vous compressiez un fichier texte en binaire, mais avec la possibilité de le lire sans le décompresser complètement. Ce truc sert notamment aux échanges client-serveur à grande échelle, comme ceux de… YouTube.]]> 2025-03-21T14:55:42+00:00 https://korben.info/bloquer-pubs-youtube-apple-tv-protobuf-exploit.html www.secnews.physaphae.fr/article.php?IdArticle=8657211 False None None 3.0000000000000000 knowbe4 - cybersecurity services Pourquoi la sécurité du mot de passe est importante: le problème de mot de passe danois et suédois<br>Why Password Security Matters: The Danish and Swedish Password Problem Why Password Security Matters: The Danish and Swedish Password Problem ]]> 2025-03-21T14:46:44+00:00 https://blog.knowbe4.com/why-password-security-matters-the-danish-and-swedish-password-problem www.secnews.physaphae.fr/article.php?IdArticle=8657208 False None None 3.0000000000000000 knowbe4 - cybersecurity services Des centaines d'applications Android malveillantes ont reçu 60 millions de téléchargements<br>Hundreds of Malicious Android Apps Received 60 Million Downloads Hundreds of Malicious Android Apps Received 60 Million Downloads ]]> 2025-03-21T14:46:15+00:00 https://blog.knowbe4.com/hundreds-of-malicious-android-apps-received-60-million-downloads www.secnews.physaphae.fr/article.php?IdArticle=8657209 False Mobile None 3.0000000000000000 SecurityWeek - Security News Ransomware Group affirme l'attaque contre le bureau du procureur général de Virginie \\<br>Ransomware Group Claims Attack on Virginia Attorney General\\'s Office Le Cloak Ransomware Group a revendiqué la responsabilité d'une cyberattaque de février sur le bureau du procureur général de Virginie.
>The Cloak ransomware group has claimed responsibility for a February cyberattack on Virginia Attorney General\'s Office. ]]>
2025-03-21T14:45:00+00:00 https://www.securityweek.com/ransomware-group-claims-attack-on-virginia-attorney-generals-office/ www.secnews.physaphae.fr/article.php?IdArticle=8657213 False Ransomware None 3.0000000000000000
IndustrialCyber - cyber risk firms for industrial Bridewell rapporte la hausse des cyber-menaces dans les infrastructures nationales critiques avec le cloud, les risques de mise au point<br>Bridewell reports rising cyber threats in critical national infrastructure with cloud, OT risks in focus La société de services de cybersécurité Bridewell a révélé que les principaux défis auxquels sont confrontés les organisations critiques de l'infrastructure nationale (CNI) sont conformes à ...
>Cybersecurity services firm Bridewell revealed that the top challenges facing critical national infrastructure (CNI) organizations are consistent with... ]]>
2025-03-21T14:37:46+00:00 https://industrialcyber.co/reports/bridewell-reports-rising-cyber-threats-in-critical-national-infrastructure-with-cloud-ot-risks-in-focus/ www.secnews.physaphae.fr/article.php?IdArticle=8657212 False Industrial,Cloud None 3.0000000000000000
InfoSecurity Mag - InfoSecurity Magazine Le ransomware Albabat évolue pour cibler Linux et MacOS<br>Albabat Ransomware Evolves to Target Linux and macOS Trend Micro observed a continuous development of Albabat ransomware, designed to expand attacks and streamline operations]]> 2025-03-21T14:30:00+00:00 https://www.infosecurity-magazine.com/news/albabat-ransomware-linux-macos/ www.secnews.physaphae.fr/article.php?IdArticle=8657232 False Ransomware,Prediction None 3.0000000000000000 Vuln AWS - FLux Vuln AWS Issue avec les plugins CLI CDK AWS CDK et personnalisés (CVE-2025-2598)<br>Issue with the AWS CDK CLI and custom credential plugins (CVE-2025-2598) CVE-2025-2598 , un problème dans le ]]> 2025-03-21T14:04:13+00:00 https://aws.amazon.com/security/security-bulletins/AWS-2025-005/ www.secnews.physaphae.fr/article.php?IdArticle=8657210 False Tool,Cloud None None Dark Reading - Informationweek Branch Pourquoi la cyber-qualité est la clé de la sécurité<br>Why Cyber Quality Is the Key to Security The time to secure foundations, empower teams, and make cyber resilience the standard is now - because the cost of waiting is far greater than the investment in proactive security.]]> 2025-03-21T14:00:00+00:00 https://www.darkreading.com/cyberattacks-data-breaches/why-cyber-quality-key-security www.secnews.physaphae.fr/article.php?IdArticle=8657199 False None None 3.0000000000000000 Checkpoint - Fabricant Materiel Securite Zéro confiance à l'ère de l'IA générative: sécuriser les informations avec des approches innovantes<br>Zero Trust in the Era of Generative AI: Securing Information with Innovative Approaches Introduction: L'augmentation de la demande de programmes de sécurité des entreprises de cybersécurité améliorés en AI évolue rapidement en adoptant les technologies de l'IA de nouvelle génération, y compris l'IA génératrice (Genai) qui offrent de nombreux avantages, mais présentent également de nouveaux risques et menaces. Cette épée bilatérale est devenue une préoccupation majeure pour les dirigeants. Une stratégie éprouvée, Zero Trust, est essentielle pour lutter contre ces nouveaux risques car il implique une vérification continue et jamais la confiance, assurant ainsi la protection de vos informations à l'ère de l'IA. Section 1: L'importance de la confiance zéro pourquoi les dirigeants devraient être concernés sans confiance pour que les dirigeants comprennent et adoptent, et il garantit […]
>Introduction: Increasing Demand for AI-Enhanced Cybersecurity Enterprise security programs are evolving rapidly by embracing the new-generation AI technologies, including generative AI (GenAI) which offer numerous benefits, but also present new risks and threats. This two-sided sword has become a major concern for executives. One proven strategy, Zero Trust, is essential to address these new risks because it involves continuous verification and never trust, thus ensuring the protection of your information in the age of AI. Section 1: The Importance of Zero Trust Why Executives Should Be Concerned Zero Trust is crucial for executives to understand and embrace, and it ensures […] ]]>
2025-03-21T13:00:45+00:00 https://blog.checkpoint.com/security/zero-trust-in-the-era-of-generative-ai-securing-information-with-innovative-approaches/ www.secnews.physaphae.fr/article.php?IdArticle=8657185 False None None 3.0000000000000000
Checkpoint - Fabricant Materiel Securite Garder la tête hors de l'eau: cybersécurité et eau<br>Keeping Your Head Above Water: Cyber Security and Water L'eau est l'essence de la vie, mais dans le monde numérique d'aujourd'hui, il est également une cible de plus en plus attrayante pour les cybercriminels. Les usines de traitement de l'eau et les systèmes de distribution reposent sur des contrôles numériques, qui, s'ils sont compromis, peuvent entraîner des conséquences désastreuses, notamment la contamination, les perturbations de service et les menaces pour la santé publique. Une évaluation 2024 de l'Agence américaine de protection de l'environnement (EPA) a constaté que 97 systèmes d'eau potable, desservant environ 26,6 millions de personnes, avaient des vulnérabilités critiques de cyber-sécurité. Selon Check Point Research, jusqu'à présent en 2025, l'industrie de l'énergie et des services publics (y compris l'eau) a subi en moyenne 1872 tentatives d'attaque hebdomadaires par […]
>Water is the essence of life, but in today\'s digital world, it\'s also an increasingly attractive target for cyber criminals. Water treatment plants and distribution systems rely on digital controls, which, if compromised, can lead to disastrous consequences, including contamination, service disruptions, and threats to public health.​ A 2024 assessment by the U.S. Environmental Protection Agency (EPA) found that 97 drinking water systems, serving approximately 26.6 million people, had critical or high-risk cyber security vulnerabilities. ​According to Check Point Research, thus far in 2025, the energy & utilities (including water) industry has suffered on average 1872 weekly attack attempts per […] ]]>
2025-03-21T13:00:29+00:00 https://blog.checkpoint.com/security/keeping-your-head-above-water-cyber-security-and-water/ www.secnews.physaphae.fr/article.php?IdArticle=8657186 False Vulnerability None 3.0000000000000000
InfoSecurity Mag - InfoSecurity Magazine Les cybercriminels exploitent le point de contrôle du point de contrôle antivirus en campagne malveillante<br>Cybercriminals Exploit CheckPoint Antivirus Driver in Malicious Campaign A security researcher has observed threat actors exploiting vulnerabilities in a driver used by CheckPoint\'s ZoneAlarm antivirus to bypass Windows security measures]]> 2025-03-21T12:45:00+00:00 https://www.infosecurity-magazine.com/news/cybercriminals-exploit-checkpoint/ www.secnews.physaphae.fr/article.php?IdArticle=8657190 False Vulnerability,Threat None 3.0000000000000000 HackRead - Chercher Cyber De nouvelles attaques exploitent des défauts de ServiceNow, âgés d'un an - Israël a frappé le plus durement<br>New Attacks Exploit Year-Old ServiceNow Flaws – Israel Hit Hardest ServiceNow vulnerability alert: Hackers are actively exploiting year-old flaws (CVE-2024-4879, CVE-2024-5217, CVE-2024-5178) for database access. Learn how to…]]> 2025-03-21T12:19:08+00:00 https://hackread.com/attacks-exploit-servicenow-flaws-israel-hit-hardest/ www.secnews.physaphae.fr/article.php?IdArticle=8657188 False Vulnerability,Threat None 3.0000000000000000 SecurityWeek - Security News Les pirates chinois I-Soon ont frappé 7 organisations dans l'opération Fishmedley<br>Chinese I-Soon Hackers Hit 7 Organizations in Operation FishMedley Le groupe Fishmonger APT, une subdivision de la société chinoise de cybersécurité I-Soon, a compromis sept organisations dans une campagne en 2022.
>The FishMonger APT group, a subdivision of Chinese cybersecurity firm I-Soon, compromised seven organizations in a 2022 campaign. ]]>
2025-03-21T12:05:14+00:00 https://www.securityweek.com/chinese-i-soon-hackers-hit-7-organizations-in-operation-fishmedley/ www.secnews.physaphae.fr/article.php?IdArticle=8657177 False None None 3.0000000000000000
IT Security Guru - Blog Sécurité Un tiers des organisations CNI admettent le paiement des ransomwares selon le nouveau rapport de Bridewell<br>One-third of CNI organisations admit to paying ransomware according to new report from Bridewell According to new research entitled Cyber Security in Critical National Infrastructure: 2025, from Bridewell, a leading UK-based cyber security services provider, one-third of UK CNI organisations targeted by ransomware admitted to paying the ransom – a practice which has been hotly debated in recent times. Furthermore, a staggering 95% of UK Critical National Infrastructure (CNI) […] ]]> 2025-03-21T11:58:50+00:00 https://www.itsecurityguru.org/2025/03/21/one-third-of-cni-organisations-admit-to-paying-ransomware-according-to-new-report-from-bridewell/?utm_source=rss&utm_medium=rss&utm_campaign=one-third-of-cni-organisations-admit-to-paying-ransomware-according-to-new-report-from-bridewell www.secnews.physaphae.fr/article.php?IdArticle=8657317 False Ransomware None 4.0000000000000000 Schneier on Security - Chercheur Cryptologue Américain NCSC verse la chronologie de la cryptographie post-quantum<br>NCSC Releases Post-Quantum Cryptography Timeline publié a ]]> 2025-03-21T11:47:32+00:00 https://www.schneier.com/blog/archives/2025/03/ncsc-releases-post-quantum-cryptography-timeline.html www.secnews.physaphae.fr/article.php?IdArticle=8657171 False None None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les attaquants utilisent de faux captchas pour déployer Lummma Steal Rat<br>Attackers Use Fake CAPTCHAs to Deploy Lumma Stealer RAT Attackers are exploiting user familiarity with CAPTCHAs to distribute the Lumma Stealer RAT via malicious PowerShell commands, according to HP]]> 2025-03-21T11:40:00+00:00 https://www.infosecurity-magazine.com/news/attackers-fake-captchas-lumma/ www.secnews.physaphae.fr/article.php?IdArticle=8657172 False None None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les cyberattaques en cours exploitent les vulnérabilités critiques dans Cisco Smart Licensing Utility<br>Ongoing Cyber Attacks Exploit Critical Vulnerabilities in Cisco Smart Licensing Utility Two now-patched security flaws impacting Cisco Smart Licensing Utility are seeing active exploitation attempts, according to SANS Internet Storm Center. The two critical-rated vulnerabilities in question are listed below -  CVE-2024-20439 (CVSS score: 9.8) - The presence of an undocumented static user credential for an administrative account that an attacker could exploit to log in to an]]> 2025-03-21T10:39:00+00:00 https://thehackernews.com/2025/03/ongoing-cyber-attacks-exploit-critical.html www.secnews.physaphae.fr/article.php?IdArticle=8657108 False Vulnerability,Threat None 3.0000000000000000 Cyble - CyberSecurity Firm Exploits du marché souterrain et menaces actives: les principaux points à retenir du rapport hebdomadaire des informations sur la vulnérabilité<br>Underground Market Exploits and Active Threats: Key Takeaways from the Weekly Vulnerability Insights Report aperçu Le rapport hebdomadaire sur les informations sur la vulnérabilité aux clients met en lumière les plus pressants cybersecurity vulnérabilités qui ont été identifiées et exploitées. Ce rapport hebdomadaire sur les informations sur la vulnérabilité met en évidence les efforts continus des organisations pour protéger leurs systèmes et réseaux de cyber-menaces , se concentrant sur la critique Vulnérabilités qui exigent une attention immédiate des professionnels de la sécurité. Notamment, la Cybersecurity and Infrastructure Security Agency (CISA) a mis à jour son catalogue de vulnérabilité exploité (KEV) connu pour inclure plusieurs défauts de haute sévérité qui sont activement ciblés par les attaquants. Au cours de la semaine du 12 mars 2025, CISA a ajouté plusieurs vulnérabilités à son catalogue KEV, reflétant des préoccupations croissantes concernant l'exploitation hyperactive. Parmi ceux-ci, CVE-2025-30066 s'est démarquée comme une menace grave, impliquant une authentification Bypass Vulnerabilité dans l'action de github TJ-Ractions / SPOGE-FILES. Ce défaut permet aux attaquants d'exécuter un code arbitraire sur les systèmes affectés en exploitant une mauvaise validation dans le ]]> 2025-03-21T10:36:30+00:00 https://cyble.com/blog/cyble-weekly-vulnerability-insights-report/ www.secnews.physaphae.fr/article.php?IdArticle=8657158 False Tool,Vulnerability,Threat,Patching,Prediction None 3.0000000000000000 IndustrialCyber - cyber risk firms for industrial UAT-5918 Le groupe APT cible l'infrastructure critique de Taiwan, un lien possible avec Volt Typhoon<br>UAT-5918 APT group targets Taiwan critical infrastructure, possible linkage to Volt Typhoon Cisco Talos discovered a malicious campaign tracked under the UAT-5918 umbrella, which has been active since at least... ]]> 2025-03-21T10:27:52+00:00 https://industrialcyber.co/critical-infrastructure/uat-5918-apt-group-targets-taiwan-critical-infrastructure-possible-linkage-to-volt-typhoon/ www.secnews.physaphae.fr/article.php?IdArticle=8657162 False None Guam 2.0000000000000000 IndustrialCyber - cyber risk firms for industrial Integrity360 acquiert le holiseum pour renforcer les services de cybersécurité IoT en Europe<br>Integrity360 acquires Holiseum to strengthen OT,  IoT cybersecurity services in Europe Poursuivant son plan d'expansion mondial Integrity360 a acquis la société de cybersécurité Holiseum dont le siège est à Paris, en France. Les termes de ...
>Continuing its global expansion plan Integrity360 has acquired cybersecurity company Holiseum headquartered in Paris, France. The terms of... ]]>
2025-03-21T10:21:53+00:00 https://industrialcyber.co/news/integrity360-acquires-holiseum-to-strengthen-ot-iot-cybersecurity-services-in-europe/ www.secnews.physaphae.fr/article.php?IdArticle=8657163 False Industrial None 2.0000000000000000
Cyble - CyberSecurity Firm Rapport de vulnérabilité ICS: Énergie solaire, correctifs de cardiologie poussés par Cyble<br>ICS Vulnerability Report: Solar Energy, Cardiology Fixes Urged by Cyble vulnérabilités trouvés dans les systèmes de gestion de l'énergie et de cardiologie de l'énergie solaire. Vulnérabilités ICS critiques Cyble a noté que Vulnérabilités Dans Sungrow Isolarcloud "sont parmi les importants car ils ont un impact sur les systèmes de gestion de l'énergie critiques." L'application Android et le micrologiciel A]]> 2025-03-21T10:12:55+00:00 https://cyble.com/blog/ics-vulnerability-report-solar-fixes-urged-by-cyble/ www.secnews.physaphae.fr/article.php?IdArticle=8657159 False Tool,Vulnerability,Patching,Mobile,Industrial,Medical,Commercial None 2.0000000000000000 SecurityWeek - Security News Impact, cause profonde des actions de Github Hack de chaîne d'approvisionnement révélées<br>Impact, Root Cause of GitHub Actions Supply Chain Hack Revealed Plus de détails ont fait la lumière sur la récente attaque de la chaîne d'approvisionnement ciblant les actions GitHub, y compris sa cause profonde.
>More details have come to light on the recent supply chain attack targeting GitHub Actions, including its root cause. ]]>
2025-03-21T10:08:00+00:00 https://www.securityweek.com/impact-root-cause-of-github-actions-supply-chain-hack-revealed/ www.secnews.physaphae.fr/article.php?IdArticle=8657157 False Hack None 2.0000000000000000
Kaspersky - Kaspersky Research blog Paysage des menaces pour les systèmes d'automatisation industrielle au quatrième trimestre 2024<br>Threat landscape for industrial automation systems in Q4 2024 The report contains statistics on malware, initial infection vectors and other threats to industrial automation systems in Q4 2024.]]> 2025-03-21T10:00:29+00:00 https://securelist.com/ics-cert-q4-2024-report/115944/ www.secnews.physaphae.fr/article.php?IdArticle=8657143 False Malware,Threat,Industrial None 3.0000000000000000 Korben - Bloger francais NAPS2 - Le logiciel de numérisation gratuit qui va vous réconcilier avec votre scanner 2025-03-21T09:30:27+00:00 https://korben.info/naps2-logiciel-scanner-gratuit-open-source.html www.secnews.physaphae.fr/article.php?IdArticle=8657160 False None None 4.0000000000000000 Korben - Bloger francais Arrêtez de chercher un nom de domaine car l\'IA le fait mieux que vous ! 2025-03-21T09:30:00+00:00 https://korben.info/arretez-de-chercher-un-nom-de-domaine-car-lia-le-fait-mieux-que-vous.html www.secnews.physaphae.fr/article.php?IdArticle=8657161 False None None 2.0000000000000000 Bleeping Computer - Magazine Américain Steam tire la démo de la démo infectée Windows avec des logiciels malveillants voleurs d'informations<br>Steam pulls game demo infecting Windows with info-stealing malware Valve has removed a game titled \'Sniper: Phantom\'s Resolution\' from the Steam store following multiple user reports that indicated its demo installer actually infected their systems with information stealing malware. [...]]]> 2025-03-21T09:24:23+00:00 https://www.bleepingcomputer.com/news/security/steam-pulls-game-demo-infecting-windows-with-info-stealing-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8657198 False Malware None 3.0000000000000000 DarkTrace - DarkTrace: AI bases detection Cyberhaven Supply Chain Attack: Exploiting Browser Extensions In late 2024, Darktrace detected unusual activity linked to Cyberhaven\'s Chrome browser extension. Read more about Darktrace\'s investigation here.]]> 2025-03-21T09:07:21+00:00 https://www.darktrace.com/blog/cyberhaven-supply-chain-attack-exploiting-browser-extensions www.secnews.physaphae.fr/article.php?IdArticle=8657145 False None None 3.0000000000000000 The Register - Site journalistique Anglais Paragon Spyware déployé contre les journalistes et les militants, Citizen Lab.<br>Paragon spyware deployed against journalists and activists, Citizen Lab claims Plus: Customer info stolen from \'parental control\' software slinger SpyX; F-35 kill switch denied Infosec newsbytes  Israeli spyware maker Paragon Solutions pitches its tools as helping governments and law enforcement agencies to catch criminals and terrorists, but a fresh Citizen Lab report claims its software has been used to target journalists, activists, and other civilians.…]]> 2025-03-21T06:26:06+00:00 https://go.theregister.com/feed/www.theregister.com/2025/03/21/paragon_spyx_hacked/ www.secnews.physaphae.fr/article.php?IdArticle=8657119 False Tool,Legislation None 3.0000000000000000 InformationSecurityBuzzNews - Site de News Securite California Cryobank alerte les consommateurs de violation de données<br>California Cryobank Alerts Consumers to Data Breach California Cryobank (CCB), one of the world’s largest reproductive tissue banks, has begun informing consumers about a data breach impacting an unspecified number of individuals. The biotechnology company reported detecting unauthorized activity on certain computers on 21 April last year, and subsequently isolated them from its IT network.  Protecting Data Confidentiality  In a statement, the [...]]]> 2025-03-21T04:39:39+00:00 https://informationsecuritybuzz.com/california-cryobank-alerts-data-breach/ www.secnews.physaphae.fr/article.php?IdArticle=8657097 False Data Breach None 2.0000000000000000 InformationSecurityBuzzNews - Site de News Securite Raccourci Windows zéro-jour sous attaque active<br>Windows Shortcut Zero-Day Under Active Attack A highly advanced zero-day vulnerability has been covertly exploited for years by multiple state-sponsored hacking groups, underscoring its severe security risks. This flaw leverages Windows shortcut (.lnk) files, enabling attackers to stealthily execute malicious commands without detection.   However, Microsoft tagged it as “not meeting the bar servicing” in late September and said it wouldn’t [...]]]> 2025-03-21T04:29:54+00:00 https://informationsecuritybuzz.com/windows-shortcut-zero-day-active-attac/ www.secnews.physaphae.fr/article.php?IdArticle=8657098 False Vulnerability,Threat None 2.0000000000000000 InformationSecurityBuzzNews - Site de News Securite Le rapport sur l'éducation mondiale indique que certaines écoles perdurent plus de 2 500 tentatives de cyberattaques par jour<br>Global Education Report Says Some Schools Endure Over 2,500 Attempted Cyberattacks a Day The latest report from cybersecurity company KnowBe4 begins with the staggering revelation that \'Some schools endure over 2,500 attempted cyberattacks a day\' – and the learning doesn\'t stop there for the education sector.  The report, entitled \'From Primary Schools to Universities, the Global Education Sector is Unprepared for Escalating Cyber Attacks,\' follows up its opening [...]]]> 2025-03-21T04:28:56+00:00 https://informationsecuritybuzz.com/global-education-report-says-some-schools-endure-over-2500-attempted-cyberattacks-a-day/ www.secnews.physaphae.fr/article.php?IdArticle=8657099 False None None 3.0000000000000000 DarkTrace - DarkTrace: AI bases detection Attaque de la chaîne d'approvisionnement Cyberhaven: Exploiter les extensions du navigateur<br>Cyberhaven Supply Chain Attack: Exploiting Browser Extensions In late 2024, Darktrace detected unusual activity linked to Cyberhaven\'s Chrome browser extension. Read more about Darktrace\'s investigation here.]]> 2025-03-21T02:57:30+00:00 https://darktrace.com/blog/cyberhaven-supply-chain-attack-exploiting-browser-extensions www.secnews.physaphae.fr/article.php?IdArticle=8657081 False None None 3.0000000000000000 HackRead - Chercher Cyber Où est la vision informatique essentielle aujourd'hui? Insistance du PDG d'Alltegrio \\<br>Where Is Computer Vision Essential Today? Insights from Alltegrio\\'s CEO Today, we are discussing Computer Vision applications, one of the most impactful AI-powered technologies that is reshaping our…]]> 2025-03-21T01:09:34+00:00 https://hackread.com/computer-vision-essential-today-insights-from-alltegrio-ceo/ www.secnews.physaphae.fr/article.php?IdArticle=8657067 False None None 2.0000000000000000 Resecurity - cyber risk firms Dark Web Intelligence découvre les réseaux de trafic de fentanyl persistant sur Telegram - Partie 3<br>Dark Web Intelligence Uncovers Fentanyl Trafficking Networks Persisting on Telegram - Part 3 2025-03-21T00:00:00+00:00 https://www.resecurity.com/blog/article/dark-web-intelligence-uncovers-fentanyl-trafficking-networks-persisting-on-telegram-part-3 www.secnews.physaphae.fr/article.php?IdArticle=8657109 False None None 2.0000000000000000 Silicon - Site de News Francais Le modèle SASE tient-il ses promesses ? 2025-03-21T00:00:00+00:00 https://www.silicon.fr/Thematique/cybersecurite-1371/Breves/modele-sase-tient-promesses-469208.htm#utm_source=IndexThematique&utm_medium=Rss&utm_campaign= www.secnews.physaphae.fr/article.php?IdArticle=8657189 False Cloud None 2.0000000000000000 Silicon - Site de News Francais GitHub Actions compromis : plus de peur que de mal ? 2025-03-21T00:00:00+00:00 https://www.silicon.fr/Thematique/cybersecurite-1371/Breves/github-actions-compromis-peur-mal-469200.htm#utm_source=IndexThematique&utm_medium=Rss&utm_campaign= www.secnews.physaphae.fr/article.php?IdArticle=8657135 False None None 2.0000000000000000 TrendLabs Security - Editeur Antivirus Albabat Ransomware Group étend potentiellement les cibles à plusieurs SG, utilise GitHub pour rationaliser les opérations<br>Albabat Ransomware Group Potentially Expands Targets to Multiple OS, Uses GitHub to Streamline Operations Trend Research encounters new versions of the Albabat ransomware, which appears to target Windows, Linux, and macOS devices. We also reveal the group\'s use of GitHub to streamline their ransomware operation.]]> 2025-03-21T00:00:00+00:00 https://www.trendmicro.com/en_us/research/25/c/albabat-ransomware-group.html www.secnews.physaphae.fr/article.php?IdArticle=8657126 False Ransomware,Prediction None 2.0000000000000000 Recorded Future - FLux Recorded Future L'ancien entraîneur de football du Michigan inculpé dans des hacks de bases de données d'athlètes de plus de 100 collèges<br>Former Michigan football coach indicted in hacks of athlete databases of more than 100 colleges Federal prosecutors said Matthew Weiss, a former assistant football coach at the University of Michigan, learned hacking skills to breach online databases, primarily targeting information about "female college athletes."]]> 2025-03-20T21:41:40+00:00 https://therecord.media/former-michigan-football-assistant-coach-indicted-hacks-athletes www.secnews.physaphae.fr/article.php?IdArticle=8657049 False None None 2.0000000000000000 Global Security Mag - Site de news francais Cloudflare lance Cloudforce One Produits]]> 2025-03-20T21:29:09+00:00 https://www.globalsecuritymag.fr/cloudflare-lance-cloudforce-one.html www.secnews.physaphae.fr/article.php?IdArticle=8657048 False None None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les tricheurs de jeu YouTube répartissent les logiciels malveillants du voleur arcanique aux utilisateurs russes<br>YouTube Game Cheats Spread Arcane Stealer Malware to Russian-Speaking Users YouTube videos promoting game cheats are being used to deliver a previously undocumented stealer malware called Arcane likely targeting Russian-speaking users. "What\'s intriguing about this malware is how much it collects," Kaspersky said in an analysis. "It grabs account information from VPN and gaming clients, and all kinds of network utilities like ngrok, Playit, Cyberduck, FileZilla, and]]> 2025-03-20T21:09:00+00:00 https://thehackernews.com/2025/03/youtube-game-cheats-spread-arcane.html www.secnews.physaphae.fr/article.php?IdArticle=8656981 False Malware None 2.0000000000000000 Dark Reading - Informationweek Branch Vextrio en utilisant 20 000 sites WordPress piratés dans le schéma de redirection du trafic<br>VexTrio Using 20,000 Hacked WordPress Sites in Traffic Redirect Scheme A massive cybercrime network known as "VexTrio" is using thousands of compromised WordPress sites to funnel traffic through a complex redirection scheme.]]> 2025-03-20T20:05:51+00:00 https://www.darkreading.com/cyberattacks-data-breaches/vextrio-20000-hacked-wordpress-sites-traffic-redirect-scheme www.secnews.physaphae.fr/article.php?IdArticle=8657038 False None None 2.0000000000000000 Dark Reading - Informationweek Branch La compétition universitaire se concentre sur la résolution des défis générateurs de l'IA<br>University Competition Focuses on Solving Generative AI Challenges The Amazon Nova AI Challenge puts student research to the test and aims to bring a new perspective to challenges arising from the increase in AI-assisted software development.]]> 2025-03-20T20:01:08+00:00 https://www.darkreading.com/application-security/university-competition-solving-generative-ai-challenges www.secnews.physaphae.fr/article.php?IdArticle=8657173 False None None 3.0000000000000000 Recorded Future - FLux Recorded Future Les principaux services Web deviennent sombres en Russie au milieu du bloc Cloudflare signalé<br>Major web services go dark in Russia amid reported Cloudflare block Website outages were observed across Russia this week, with regulators attributing them to issues with foreign servers. Observers said the problems might be tied to Russian government moves to block the Cloudflare service.]]> 2025-03-20T19:43:51+00:00 https://therecord.media/russia-websites-dark-reported-cloudflare-block www.secnews.physaphae.fr/article.php?IdArticle=8657028 False None None 2.0000000000000000 Bleeping Computer - Magazine Américain Veeam RCE Bug permet aux utilisateurs du domaine de pirater les serveurs de sauvegarde, patch maintenant<br>Veeam RCE bug lets domain users hack backup servers, patch now Veeam has patched a critical remote code execution vulnerability tracked as CVE-2025-23120 in its Backup & Replication software that impacts domain-joined installations. [...]]]> 2025-03-20T19:30:38+00:00 https://www.bleepingcomputer.com/news/security/veeam-rce-bug-lets-domain-users-hack-backup-servers-patch-now/ www.secnews.physaphae.fr/article.php?IdArticle=8657064 False Hack,Vulnerability None 2.0000000000000000 RedCanary - Red Canary Intelligence Insights: mars 2025<br>Intelligence Insights: March 2025 Worms break ground and fake browser updates march forward in this month\'s edition of Intelligence Insights]]> 2025-03-20T19:24:39+00:00 https://redcanary.com/blog/threat-intelligence/intelligence-insights-march-2025/ www.secnews.physaphae.fr/article.php?IdArticle=8657029 False None None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Patchs de libération Veeam et IBM pour les défauts à haut risque dans les systèmes de sauvegarde et AIX<br>Veeam and IBM Release Patches for High-Risk Flaws in Backup and AIX Systems Veeam has released security updates to address a critical security flaw impacting its Backup & Replication software that could lead to remote code execution. The vulnerability, tracked as CVE-2025-23120, carries a CVSS score of 9.9 out of 10.0. It affects 12.3.0.310 and all earlier version 12 builds. "A vulnerability allowing remote code execution (RCE) by authenticated domain users," the]]> 2025-03-20T19:13:00+00:00 https://thehackernews.com/2025/03/veeam-and-ibm-release-patches-for-high.html www.secnews.physaphae.fr/article.php?IdArticle=8656948 False Vulnerability None 2.0000000000000000 Dark Reading - Informationweek Branch Pourquoi il est si difficile d'arrêter la hausse du trafic TDS malveillant<br>Why It\\'s So Hard to Stop Rising Malicious TDS Traffic Cybersecurity vendors say threat actors\' abuse of traffic distribution systems (TDS) is becoming more complex and sophisticated - and much harder to detect and block.]]> 2025-03-20T18:40:40+00:00 https://www.darkreading.com/cyberattacks-data-breaches/why-hard-stop-rising-malicious-tds-traffic www.secnews.physaphae.fr/article.php?IdArticle=8657020 False Threat None 2.0000000000000000