www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2025-05-12T09:26:00+00:00 www.secnews.physaphae.fr Dark Reading - Informationweek Branch Duke University & GCF Partner pour identifier les voies pour faire progresser les carrières des femmes en cybersécurité<br>Duke University & GCF Partner to Identify Pathways for Advancing Women\\'s Careers in Cybersecurity 2025-03-18T20:42:43+00:00 https://www.darkreading.com/cybersecurity-operations/duke-university-gcf-partner-advancing-women-in-cyber www.secnews.physaphae.fr/article.php?IdArticle=8656545 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Google pour acquérir Wiz pour 32 milliards de dollars en jeu de sécurité multicloud<br>Google to Acquire Wiz for $32B in Multicloud Security Play The all-cash deal offers a path for Google to better support cloud customers who have assets spread across public environments, including Azure and others.]]> 2025-03-18T20:16:44+00:00 https://www.darkreading.com/cloud-security/google-acquire-wiz-32b-multicloud-security-play www.secnews.physaphae.fr/article.php?IdArticle=8656546 False Cloud None 2.0000000000000000 Recorded Future - FLux Recorded Future Les raccourcis de fenêtres empoisonnés se sont révélés être un favori du chinois, du russe et. Pirates d'État coréens<br>Poisoned Windows shortcuts found to be a favorite of Chinese, Russian, N. Korean state hackers The Zero Day Initiative measured the prevalence of manipulated Windows shortcut files in campaigns attributed to nation-state hacking groups - finding at least 11 exploited a bug that allows malicious use of the files.]]> 2025-03-18T20:12:34+00:00 https://therecord.media/windows-lnk-files-nation-state-hacking-campaigns www.secnews.physaphae.fr/article.php?IdArticle=8656541 False Threat None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Flaw Windows Zero-Day non corrigé exploité par 11 groupes de menaces parrainées par l'État depuis 2017<br>Unpatched Windows Zero-Day Flaw Exploited by 11 State-Sponsored Threat Groups Since 2017 An unpatched security flaw impacting Microsoft Windows has been exploited by 11 state-sponsored groups from China, Iran, North Korea, and Russia as part of data theft, espionage, and financially motivated campaigns that date back to 2017. The zero-day vulnerability, tracked by Trend Micro\'s Zero Day Initiative (ZDI) as ZDI-CAN-25373, refers to an issue that allows bad actors to execute hidden]]> 2025-03-18T19:39:00+00:00 https://thehackernews.com/2025/03/unpatched-windows-zero-day-flaw.html www.secnews.physaphae.fr/article.php?IdArticle=8656478 False Vulnerability,Threat,Prediction None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Google acquiert Wiz pour 32 milliards de dollars dans sa plus grande transaction pour stimuler la sécurité du cloud<br>Google Acquires Wiz for $32 Billion in Its Biggest Deal Ever to Boost Cloud Security Google is making the biggest ever acquisition in its history by purchasing cloud security company Wiz in an all-cash deal worth $32 billion. "This acquisition represents an investment by Google Cloud to accelerate two large and growing trends in the AI era: improved cloud security and the ability to use multiple clouds (multicloud)," the tech giant said today. It added the acquisition, which is]]> 2025-03-18T19:30:00+00:00 https://thehackernews.com/2025/03/google-acquires-wiz-for-32-billion-in.html www.secnews.physaphae.fr/article.php?IdArticle=8656479 False Cloud None 3.0000000000000000 Dark Reading - Informationweek Branch Microsoft semble avertissement sur \\ 'Stilachirat \\' multifonctionnel<br>Microsoft Sounds Warning on Multifunctional \\'StilachiRAT\\' The sneaky malware packs capabilities for system reconnaissance as well as credential and cryptocurrency theft.]]> 2025-03-18T19:29:44+00:00 https://www.darkreading.com/vulnerabilities-threats/microsoft-sounds-warning-on-multifunctional-stilachirat www.secnews.physaphae.fr/article.php?IdArticle=8656532 False Malware None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) La nouvelle vulnérabilité Critical AMI BMC permet une prise de contrôle et des briques de serveur distant<br>New Critical AMI BMC Vulnerability Enables Remote Server Takeover and Bricking A critical security vulnerability has been disclosed in AMI\'s MegaRAC Baseboard Management Controller (BMC) software that could allow an attacker to bypass authentication and carry out post-exploitation actions. The vulnerability, tracked as CVE-2024-54085, carries a CVSS v4 score of 10.0, indicating maximum severity. "A local or remote attacker can exploit the vulnerability by accessing the]]> 2025-03-18T19:01:00+00:00 https://thehackernews.com/2025/03/new-critical-ami-bmc-vulnerability.html www.secnews.physaphae.fr/article.php?IdArticle=8656480 False Vulnerability,Threat None 3.0000000000000000 Recorded Future - FLux Recorded Future Les municipalités de quatre États sont aux prises avec des cyberattaques limitant les services<br>Municipalities in four states are struggling with cyberattacks limiting services Cyberattacks on public entities across the U.S. - from police stations to school districts and courts - are causing wide-ranging issues for residents and public employees.]]> 2025-03-18T18:54:57+00:00 https://therecord.media/municipalities-struggling-cyberattacks-services www.secnews.physaphae.fr/article.php?IdArticle=8656523 False Legislation None 2.0000000000000000 Bleeping Computer - Magazine Américain Le géant des spermatozoïdes California Cryobank met en garde contre une violation de données<br>Sperm donation giant California Cryobank warns of a data breach US sperm donor giant California Cryobank is warning customers it suffered a data breach that exposed customers\' personal information. [...]]]> 2025-03-18T18:53:25+00:00 https://www.bleepingcomputer.com/news/security/sperm-donation-giant-california-cryobank-warns-of-a-data-breach/ www.secnews.physaphae.fr/article.php?IdArticle=8656568 False Data Breach None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Une nouvelle campagne de fraude publicitaire exploite 331 applications avec 60m + téléchargements pour le phishing et les publicités intrusives<br>New Ad Fraud Campaign Exploits 331 Apps with 60M+ Downloads for Phishing and Intrusive Ads Cybersecurity researchers have warned about a large-scale ad fraud campaign that has leveraged hundreds of malicious apps published on the Google Play Store to serve full-screen ads and conduct phishing attacks. "The apps display out-of-context ads and even try to persuade victims to give away credentials and credit card information in phishing attacks," Bitdefender said in a report shared with]]> 2025-03-18T18:41:00+00:00 https://thehackernews.com/2025/03/new-ad-fraud-campaign-exploits-331-apps.html www.secnews.physaphae.fr/article.php?IdArticle=8656457 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Black Basta Leader en ligue avec des responsables russes, salon des journaux de discussion<br>Black Basta Leader in League With Russian Officials, Chat Logs Show Though the chat logs were leaked a month ago, analysts are now seeing that Russian officials may have assisted Black Basta members according, to the shared messages.]]> 2025-03-18T18:05:23+00:00 https://www.darkreading.com/threat-intelligence/black-basta-league-russian-officials-chat-logs www.secnews.physaphae.fr/article.php?IdArticle=8656533 False None None 3.0000000000000000 HackRead - Chercher Cyber Les escrocs rendent plus de 300 applications de fraude publicitaire sur Google Play avec 60m téléchargements<br>Scammers Sneak 300+ Ad Fraud Apps onto Google Play with 60M Downloads Google Play Store hit by 300+ fake Android apps, downloaded more than 60 million times pushing ad fraud and data theft. Learn how to spot and remove these threats.]]> 2025-03-18T18:05:18+00:00 https://hackread.com/scammers-ad-fraud-apps-google-play-60m-downloads/ www.secnews.physaphae.fr/article.php?IdArticle=8656513 False Mobile None 2.0000000000000000 Recorded Future - FLux Recorded Future Western Alliance Bank affirme près de 22 000 impactés par la violation des logiciels de transfert de fichiers<br>Western Alliance Bank says nearly 22,000 impacted by file transfer software breach Phoenix-based Western Alliance Bank filed data breach notices saying about 22,000 people were affected by an incident involving file transfer software.]]> 2025-03-18T17:59:02+00:00 https://therecord.media/western-alliance-bank-data-breach www.secnews.physaphae.fr/article.php?IdArticle=8656514 False Data Breach None 2.0000000000000000 Dark Reading - Informationweek Branch Redémarrage d'extorsion: l'équipe de ransomware menace la fuite de Snowden<br>Extortion Reboot: Ransomware Crew Threatens Leak to Snowden Though the group initially stuck to classic ransomware TTPs before demanding the ransom, it went off script when it began threatening the group and detailing potential consequences the victim would face.]]> 2025-03-18T17:42:19+00:00 https://www.darkreading.com/cyberattacks-data-breaches/ransomware-crew-leak-snowden-extortion-tactic www.secnews.physaphae.fr/article.php?IdArticle=8656516 False Ransomware None 3.0000000000000000 ComputerWeekly - Computer Magazine La plus grande transaction de cyber reflète les ambitions CNApp de Google \\<br>Largest ever cyber deal reflects Google\\'s CNAPP ambitions 2025-03-18T17:32:00+00:00 https://www.computerweekly.com/news/366621040/Largest-ever-cyber-deal-reflects-Googles-CNAPP-ambitions www.secnews.physaphae.fr/article.php?IdArticle=8656561 False None None 2.0000000000000000 Recorded Future - FLux Recorded Future Microsoft identifie de nouveaux portefeuilles de crypto-monnaie de ciblage de rats et plus encore<br>Microsoft identifies new RAT targeting cryptocurrency wallets and more A previously unreported remote access trojan that Microsoft researchers dubbed StilachiRAT is designed to steal a wide range of data, including information about cryptocurrency wallet extensions for Google\'s Chrome browser.]]> 2025-03-18T17:25:46+00:00 https://therecord.media/stilachirat-new-remote-access-trojan-crypto-wallets www.secnews.physaphae.fr/article.php?IdArticle=8656515 False None None 2.0000000000000000 ProofPoint - Firm Security ProofPoint améliore la cybersécurité en élargissant un partenariat avec Microsoft Azure<br>Proofpoint enhances cybersecurity by expanding partnership with Microsoft Azure 2025-03-18T17:13:59+00:00 https://www.proofpoint.com/us/newsroom/news/proofpoint-enhances-cybersecurity-expanding-partnership-microsoft-azure www.secnews.physaphae.fr/article.php?IdArticle=8657665 False None None 2.0000000000000000 ProofPoint - Firm Security MSFT \\ 'renforce le partenariat de cybersécurité avec Proofpoint<br>MSFT \\'Strengthens\\' Cybersecurity Partnership with Proofpoint 2025-03-18T17:05:14+00:00 https://www.proofpoint.com/us/newsroom/news/msft-strengthens-cybersecurity-partnership-proofpoint www.secnews.physaphae.fr/article.php?IdArticle=8657666 False None None 2.0000000000000000 ProofPoint - Firm Security Darren Lee, EVP + GM à Proofpoint se joint en direct sur NYSE TV<br>Darren Lee, EVP + GM at Proofpoint joins LIVE on NYSE TV 2025-03-18T16:59:56+00:00 https://www.proofpoint.com/us/newsroom/news/darren-lee-evp-gm-proofpoint-joins-live-nyse-tv www.secnews.physaphae.fr/article.php?IdArticle=8657667 False None None 2.0000000000000000 IndustrialCyber - cyber risk firms for industrial Garbarino exhorte l'examen fédéral du comité d'examen de la cyber-sécurité de l'ère Biden au milieu de la transparence, des problèmes d'efficacité<br>Garbarino urges federal review of Biden-era Cyber Safety Review Board amid transparency, efficacy concerns A member of the U.S. House Committee on Homeland Security has reached out to the federal government, urging... ]]> 2025-03-18T16:42:34+00:00 https://industrialcyber.co/critical-infrastructure/garbarino-urges-federal-review-of-biden-era-cyber-safety-review-board-amid-transparency-efficacy-concerns/ www.secnews.physaphae.fr/article.php?IdArticle=8656502 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Comment améliorer la sécurité d'Okta en quatre étapes<br>How to Improve Okta Security in Four Steps While Okta provides robust native security features, configuration drift, identity sprawl, and misconfigurations can provide opportunities for attackers to find their way in. This article covers four key ways to proactively secure Okta as part of your identity security efforts. Okta serves as the cornerstone of identity governance and security for organizations worldwide. However, this]]> 2025-03-18T16:30:00+00:00 https://thehackernews.com/2025/03/how-to-improve-okta-security-in-four.html www.secnews.physaphae.fr/article.php?IdArticle=8656436 False None None 2.0000000000000000 Bleeping Computer - Magazine Américain Le piratage d'action GitHub a probablement conduit à un autre dans l'attaque de la chaîne d'approvisionnement en cascade<br>GitHub Action hack likely led to another in cascading supply chain attack A cascading supply chain attack that began with the compromise of the "reviewdog/action-setup@v1" GitHub Action is believed to have led to the recent breach of "tj-actions/changed-files" that leaked CI/CD secrets. [...]]]> 2025-03-18T16:03:50+00:00 https://www.bleepingcomputer.com/news/security/github-action-hack-likely-led-to-another-in-cascading-supply-chain-attack/ www.secnews.physaphae.fr/article.php?IdArticle=8656530 False Hack None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Mirrorface liée à la Chine déploie Anel et Asyncrat dans une nouvelle opération de cyber-espionnage<br>China-Linked MirrorFace Deploys ANEL and AsyncRAT in New Cyber Espionage Operation Threat hunters have shed more light on a previously disclosed malware campaign undertaken by the China-aligned MirrorFace threat actor that targeted a diplomatic organization in the European Union with a backdoor known as ANEL. The attack, detected by ESET in late August 2024, singled out a Central European diplomatic institute with lures related to Word Expo, which is scheduled to kick off in]]> 2025-03-18T15:54:00+00:00 https://thehackernews.com/2025/03/china-linked-mirrorface-deploys-anel.html www.secnews.physaphae.fr/article.php?IdArticle=8656437 False Malware,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Western Alliance Bank informe 21 899 clients de violation de données<br>Western Alliance Bank notifies 21,899 customers of data breach Arizona-based Western Alliance Bank is notifying nearly 22,000 customers their personal information was stolen in October after a third-party vendor\'s secure file transfer software was breached. [...]]]> 2025-03-18T15:50:25+00:00 https://www.bleepingcomputer.com/news/security/western-alliance-bank-notifies-21-899-customers-of-data-breach/ www.secnews.physaphae.fr/article.php?IdArticle=8656531 False Data Breach None 2.0000000000000000 We Live Security - Editeur Logiciel Antivirus ESET Mirrorface met à jour le jeu d'outils, élargit le ciblage vers l'Europe<br>MirrorFace updates toolset, expands targeting to Europe The group\'s Operation AkaiRyū begins with targeted spearphishing emails that use the upcoming World Expo 2025 in Osaka, Japan, as a lure]]> 2025-03-18T15:45:18+00:00 https://www.welivesecurity.com/en/videos/mirrorface-updates-toolset-expands-reach-europe/ www.secnews.physaphae.fr/article.php?IdArticle=8661303 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Badbox 2.0 Botnet infecte 1 million d'appareils Android pour la fraude publicitaire et les abus de proxy<br>BADBOX 2.0 Botnet Infects 1 Million Android Devices for Ad Fraud and Proxy Abuse At least four different threat actors have been identified as involved in an updated version of a massive ad fraud and residential proxy scheme called BADBOX, painting a picture of an interconnected cybercrime ecosystem. This includes SalesTracker Group, MoYu Group, Lemon Group, and LongTV, according to new findings from the HUMAN Satori Threat Intelligence and Research team, published in]]> 2025-03-18T15:31:00+00:00 https://thehackernews.com/2025/03/badbox-20-botnet-infects-1-million.html www.secnews.physaphae.fr/article.php?IdArticle=8656438 False Threat,Mobile Satori 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Le chercheur en sécurité prouve que les outils Genai peuvent développer des infostenteurs Google Chrome<br>Security Researcher Proves GenAI Tools Can Develop Google Chrome Infostealers A Cato Networks researcher discovered a new LLM jailbreaking technique enabling the creation of password-stealing malware]]> 2025-03-18T15:30:00+00:00 https://www.infosecurity-magazine.com/news/security-researcher-llm/ www.secnews.physaphae.fr/article.php?IdArticle=8656495 False Malware,Tool None 3.0000000000000000 Dark Reading - Informationweek Branch Le bug de chat de chatpt exploité activement met en danger les organisations<br>Actively Exploited ChatGPT Bug Puts Organizations at Risk A server-side request forgery vulnerability in OpenAI\'s chatbot infrastructure can allow attackers to direct users to malicious URLs, leading to a range of threat activity.]]> 2025-03-18T15:28:52+00:00 https://www.darkreading.com/cyberattacks-data-breaches/actively-exploited-chatgpt-bug-organizations-risk www.secnews.physaphae.fr/article.php?IdArticle=8656493 False Vulnerability,Threat ChatGPT 3.0000000000000000 Dark Reading - Informationweek Branch La start-up d'Orion Security s'attaque aux menaces d'initiés avec l'IA<br>Orion Security Startup Tackles Insider Threats With AI The data loss prevention company emerges from stealth with an AI-powered platform to help organizations distinguish between legitimate and risky activity.]]> 2025-03-18T15:27:06+00:00 https://www.darkreading.com/insider-threats/orion-security-startup-minimize-insider-threats www.secnews.physaphae.fr/article.php?IdArticle=8656494 False None None 3.0000000000000000 The Register - Site journalistique Anglais Microsoft n'est pas de réparer l'exploit de raccourci de 8 ans abusé de l'espionnage<br>Microsoft isn\\'t fixing 8-year-old shortcut exploit abused for spying \'Only\' a local access bug but important part of N Korea, Russia, and China attack picture An exploitation avenue found by Trend Micro has been used in an eight-year-long spying campaign, but there\'s no sign of a fix from Microsoft, which apparently considers this a low priority.…]]> 2025-03-18T15:13:08+00:00 https://go.theregister.com/feed/www.theregister.com/2025/03/18/microsoft_trend_flaw/ www.secnews.physaphae.fr/article.php?IdArticle=8656492 False Threat,Prediction None 3.0000000000000000 Fortinet - Fabricant Materiel Securite Révolutionner la sécurité des points finaux avec Fortiedr et un client unifié<br>Revolutionizing Endpoint Security with FortiEDR and a Unified Client Learn how FortiEndpoint unified FortiEDR\'s endpoint protection and FortiClient\'s network security capabilities to deliver a more cohesive, automated defense against modern threats.]]> 2025-03-18T15:00:00+00:00 https://www.fortinet.com/blog/business-and-technology/revolutionizing-endpoint-security-with-fortiedr-and-a-unified-client www.secnews.physaphae.fr/article.php?IdArticle=8656489 False None None 2.0000000000000000 RedCanary - Red Canary Les attaques d'identité et les infostateurs dominent le rapport de détection de menace 2025<br>Identity attacks and infostealers dominate the 2025 Threat Detection Report Our annual analysis brings you a year\'s worth of security operations and intelligence insights, with actionable guidance on every page.]]> 2025-03-18T14:59:14+00:00 https://redcanary.com/blog/threat-detection/2025-threat-detection-report/ www.secnews.physaphae.fr/article.php?IdArticle=8656474 False Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Le nouveau rapport met en évidence les mots de passe communs dans les attaques RDP<br>New Report Highlights Common Passwords in RDP Attacks Report reveals common password use in RDP attacks, highlighting weak credentials remain a major security flaw]]> 2025-03-18T14:45:00+00:00 https://www.infosecurity-magazine.com/news/common-passwords-rdp-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8656481 False None None 3.0000000000000000 CyberScoop - scoopnewsgroup.com special Cyber Google acquiert Wiz pour 32 milliards de dollars<br>Google acquires Wiz for $32 billion Le co-fondateur de Wiz, Asaaf Rappaport, a déclaré que la société restera concentrée sur la protection d'un large éventail de services cloud.
>Wiz co-founder Asaaf Rappaport said the company will remain focused on protecting a wide range of cloud services. ]]>
2025-03-18T14:30:52+00:00 https://cyberscoop.com/google-acquires-wiz-for-32-billion/ www.secnews.physaphae.fr/article.php?IdArticle=8656488 False Cloud None 3.0000000000000000
Recorded Future - FLux Recorded Future La Chine identifie les pirates taïwanais prétendument derrière les cyberattaques et l'espionnage<br>China identifies Taiwanese hackers allegedly behind cyberattacks and espionage In a rare move, China\'s state security ministry released the names and photos of four alleged hackers within Taiwan\'s defense ministry.]]> 2025-03-18T14:29:02+00:00 https://therecord.media/china-taiwan-hacks-identify-cyber www.secnews.physaphae.fr/article.php?IdArticle=8656487 False None None 3.0000000000000000 knowbe4 - cybersecurity services AIATIQUE AI: Pourquoi les cyber-défenseurs ont enfin le dessus<br>Agentic AI: Why Cyber Defenders Finally Have the Upper Hand émergent Ai Defense Mes deux publications récentes précédentes sur l'IA ont couvert «]]> 2025-03-18T14:27:16+00:00 https://blog.knowbe4.com/emergent-agentic-ai-defense www.secnews.physaphae.fr/article.php?IdArticle=8656476 False None None 2.0000000000000000 Dark Reading - Informationweek Branch 3 rôles basés sur l'IA dans la cybersécurité<br>3 AI-Driven Roles in Cybersecurity For candidates with a cybersecurity background who want to stay competitive, now is the time to invest in obtaining AI skills.]]> 2025-03-18T14:00:00+00:00 https://www.darkreading.com/cybersecurity-operations/3-ai-driven-roles-cybersecurity www.secnews.physaphae.fr/article.php?IdArticle=8656465 False None None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les liens de ransomware Blackbasta avec les autorités russes découvertes<br>BlackBasta Ransomware Ties to Russian Authorities Uncovered Leaked chat logs have exposed connections between the BlackBasta ransomware group and Russian authorities, according to new analysis by Trellix]]> 2025-03-18T14:00:00+00:00 https://www.infosecurity-magazine.com/news/blackbasta-ransomwares-ties-russia/ www.secnews.physaphae.fr/article.php?IdArticle=8656460 False Ransomware None 3.0000000000000000 Recorded Future - FLux Recorded Future Google achète le fournisseur de sécurité de cloud Wiz pour 32 milliards de dollars<br>Google buys cloud security provider Wiz for $32 billion The purchase is the biggest such deal in Google\'s history and also the largest corporate acquisition overall this year.]]> 2025-03-18T13:56:04+00:00 https://therecord.media/google-buys-cloud-security-provider-wiz www.secnews.physaphae.fr/article.php?IdArticle=8656471 False Cloud None 3.0000000000000000 Bleeping Computer - Magazine Américain Les applications malveillantes Android \\ 'Vapor \\' sur Google Play ont installé 60 millions de fois<br>Malicious Android \\'Vapor\\' apps on Google Play installed 60 million times Over 300 malicious Android applications downloaded 60 million items from Google Play acted as adware or attempted to steal credentials and credit card information. [...]]]> 2025-03-18T13:52:53+00:00 https://www.bleepingcomputer.com/news/security/malicious-android-vapor-apps-on-google-play-installed-60-million-times/ www.secnews.physaphae.fr/article.php?IdArticle=8656511 False Mobile None 3.0000000000000000 HackRead - Chercher Cyber Analyser les menaces mobiles plus rapidement: Any.Run présente Android Os à son bac à sable interactif<br>Analyze Mobile Threats Faster: ANY.RUN Introduces Android OS to Its Interactive Sandbox Disclosure: This article was provided by ANY.RUN. The information and analysis presented are based on their research and findings.]]> 2025-03-18T13:51:25+00:00 https://hackread.com/analyze-mobile-threats-any-run-android-os-sandbox/ www.secnews.physaphae.fr/article.php?IdArticle=8656458 False Mobile None 4.0000000000000000 Cyble - CyberSecurity Firm SQLI, XSS et SSRF: décomposer les dernières menaces de sécurité de Zimbra \\<br>SQLi, XSS, and SSRF: Breaking Down Zimbra\\'s Latest Security Threats Overview Zimbra Collaboration Suite (ZCS) is a widely used email and collaboration platform. Security remains a top priority for administrators and users who rely on Zimbra for business communication. Recently, Zimbra has addressed several critical security issues, including stored cross-site scripting (XSS), SQL injection (SQLi), and server-side request forgery (SSRF). This article provides a detailed technical breakdown of these vulnerabilities, their potential impact, and recommended actions. Below is an in-depth analysis of these vulnerabilities. 1. Stored Cross-Site Scripting (XSS) - CVE-2025-27915 Affected Versions: ZCS 9.0, 10.0, and 10.1 (before patches 44, 10.0.13, and 10.1.5) Patch Availability: Fixed in the latest patches Description: This vulnerability resides in the Classic Web Client due to insufficient sanitization of HTML content in ICS calendar invite files. Attackers can embed malicious JavaScript inside an ICS file, which executes when a victim opens an email containing the ICS entry. Exploitation allows unauthorized actions within the victim\'s session, such as modifying email filters to redirect messages to an attacker\'s inbox. ]]> 2025-03-18T13:50:51+00:00 https://cyble.com/blog/breaking-down-zimbras-latest-security-threats/ www.secnews.physaphae.fr/article.php?IdArticle=8656463 False Vulnerability,Industrial,Technical None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Google achète Wiz dans une poussée de sécurité cloud de 32 milliards de dollars<br>Google Buys Wiz in $32bn Cloud Security Push Google is set to acquire Wiz, a cloud security platform founded in 2020, for $32bn in an all-cash deal]]> 2025-03-18T13:45:00+00:00 https://www.infosecurity-magazine.com/news/google-buys-wiz-32bn-cloud/ www.secnews.physaphae.fr/article.php?IdArticle=8656461 False Cloud None 2.0000000000000000 IndustrialCyber - cyber risk firms for industrial Les sénateurs réintroduisent les projets de loi bipartisans pour fortifier les systèmes d'eau ruraux avec des mesures de cybersécurité améliorées<br>Senators reintroduce bipartisan bills to fortify rural water systems with enhanced cybersecurity measures Two bipartisan bills aimed at supporting rural water systems have been reintroduced in the U.S. Senate, offering enhanced... ]]> 2025-03-18T13:41:27+00:00 https://industrialcyber.co/utilities-energy-power-water-waste/senators-reintroduce-bipartisan-bills-to-fortify-rural-water-systems-with-enhanced-cybersecurity-measures/ www.secnews.physaphae.fr/article.php?IdArticle=8656472 False None None 3.0000000000000000 Cyble - CyberSecurity Firm Rapport de vulnérabilité informatique: Cyble Insive Correses pour Apple, PHP Flaws<br>IT Vulnerability Report: Cyble Urges Fixes for Apple, PHP Flaws 2025-03-18T13:33:57+00:00 https://cyble.com/blog/it-vulnerability-report-for-apple-php-flaws/ www.secnews.physaphae.fr/article.php?IdArticle=8656464 False Vulnerability,Threat,Patching None 2.0000000000000000 Security Through Education - Security Through Education Comment prendre le contrôle de votre présence en ligne<br>How to Take Control of Your Online Presence Many of us don\'t realize just how much we share about ourselves on the internet. Social media provides us with […]]]> 2025-03-18T13:30:02+00:00 https://www.social-engineer.org/general-blog/how-to-take-control-of-your-online-presence/ www.secnews.physaphae.fr/article.php?IdArticle=8659470 False None None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Plus de 16,8 milliards d'enregistrements exposés à mesure que les violations de données augmentent de 6%<br>Over 16.8 Billion Records Exposed as Data Breaches Increase 6% Flashpoint data points to a surge in data breaches fueled by compromised credentials, ransomware and exploits]]> 2025-03-18T13:30:00+00:00 https://www.infosecurity-magazine.com/news/168-billion-records-exposed/ www.secnews.physaphae.fr/article.php?IdArticle=8656462 False Ransomware None 3.0000000000000000 IndustrialCyber - cyber risk firms for industrial Bitsight Trace rapporte les cyber-risques dans les chaînes d'approvisionnement américaines en raison de fournisseurs étrangers<br>Bitsight TRACE reports cyber risks in US supply chains due to foreign providers La nouvelle recherche sur les traces de bits-tight a identifié des cyber-menaces cachées dans les chaînes d'approvisionnement mondiales, mettant en évidence les risques des fournisseurs liés à l'étranger ...
>New Bitsight TRACE research has identified hidden cyber threats in global supply chains, highlighting risks from foreign-linked providers... ]]>
2025-03-18T13:17:19+00:00 https://industrialcyber.co/supply-chain-security/bitsight-trace-reports-cyber-risks-in-us-supply-chains-due-to-foreign-providers/ www.secnews.physaphae.fr/article.php?IdArticle=8656473 False None None 2.0000000000000000
HackRead - Chercher Cyber Faux installateurs de l'IA profonde, sites Web et applications diffusant des logiciels malveillants<br>Fake DeepSeek AI Installers, Websites, and Apps Spreading Malware Cybercriminals exploit AI hype with SEO poisoning, tricking users into downloading malware disguised as DeepSeek software, warns McAfee Labs in a new report.]]> 2025-03-18T13:16:45+00:00 https://hackread.com/fake-deepseek-ai-installers-websites-apps-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8656459 False Malware,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Nouveau-jour Zero-Day exploité par 11 groupes de piratage d'État depuis 2017<br>New Windows zero-day exploited by 11 state hacking groups since 2017 At least 11 state-backed hacking groups from North Korea, Iran, Russia, and China have been exploiting a new Windows vulnerability in data theft and cyber espionage zero-day attacks since 2017. [...]]]> 2025-03-18T13:11:24+00:00 https://www.bleepingcomputer.com/news/security/new-windows-zero-day-exploited-by-11-state-hacking-groups-since-2017/ www.secnews.physaphae.fr/article.php?IdArticle=8656512 False Vulnerability,Threat None 2.0000000000000000 The Register - Site journalistique Anglais Google Acquisition Target Wiz Liens les attaques de la chaîne d'approvisionnement fraîche vers 23k Pwned Github Repos<br>Google acquisition target Wiz links fresh supply chain attack to 23K pwned GitHub repos 2025-03-18T13:02:18+00:00 https://go.theregister.com/feed/www.theregister.com/2025/03/18/wiz_github_supply_chain/ www.secnews.physaphae.fr/article.php?IdArticle=8656447 False None None 2.0000000000000000 Palo Alto Network - Site Constructeur Soc et Awe - comment la sécurité autonome change le jeu<br>SOC and Awe - How Autonomous Security Is Changing the Game Apprenez comment la détection de l'IA et du cloud-natif révolutionne les SOC en OPS de sécurité autonome. Clay Brothers of Unit 42 met en garde contre les méthodes traditionnelles.
>Learn how AI and cloud-native detection are revolutionizing SOCs into autonomous security ops. Clay Brothers of Unit 42 warns against traditional methods. ]]>
2025-03-18T13:00:51+00:00 https://www.paloaltonetworks.com/blog/2025/03/autonomous-security-changing-the-game/ www.secnews.physaphae.fr/article.php?IdArticle=8656446 False None None 2.0000000000000000
HackRead - Chercher Cyber Squarex lance «Année de bugs de navigateur» (YOBB) pour exposer les angles morts de sécurité critiques<br>SquareX Launches “Year of Browser Bugs” (YOBB) to Expose Critical Security Blind Spots Palo Alto, USA, 18th March 2025, CyberNewsWire]]> 2025-03-18T13:00:40+00:00 https://hackread.com/squarex-launches-year-of-browser-bugs-yobb-to-expose-critical-security-blind-spots/ www.secnews.physaphae.fr/article.php?IdArticle=8656448 False None None 2.0000000000000000 Checkpoint - Fabricant Materiel Securite Comment les fabricants peuvent transformer la sécurité en un avantage concurrentiel<br>How Manufacturers Can Turn Security Into a Competitive Advantage La numérisation a considérablement modifié la fabrication au cours des 25 dernières années. Les avantages comprennent la réduction des coûts des stocks et des temps d'arrêt de la machine, et une augmentation de la précision du débit et des prévisions. Mais à mesure que la numérisation a augmenté dans la prévalence, les défis de sécurité sont également confrontés aux fabricants. Cela comprend le ransomware, les systèmes hérités difficiles à corriger et les risques tiers, entre autres types de menaces. Au tournant du 21e siècle, les installations de production utilisaient des logiciels dans divers domaines, mais ces systèmes étaient rarement intégrés et les départements fonctionnaient souvent dans des silos. Les lignes d'assemblage robotiques étaient déjà bien établies - principalement dans l'industrie automobile - mais étaient […]
>Digitization has significantly changed manufacturing over the past 25 years. The benefits include reducing inventory costs and machine downtime, and boosting throughput and forecasting accuracy. But as digitization has grown in prevalence, so have the security challenges facing manufacturers. This includes ransomware, legacy systems that are hard to patch, and third-party risk, among other types of threats. At the turn of the 21st century, production facilities were using software in various areas, but these systems were rarely integrated, and departments often operated in silos. Robotic assembly lines were already well established – primarily in the automotive industry – but were […] ]]>
2025-03-18T13:00:07+00:00 https://blog.checkpoint.com/security/how-manufacturers-can-turn-security-into-a-competitive-advantage/ www.secnews.physaphae.fr/article.php?IdArticle=8656455 False Ransomware None 3.0000000000000000
InfoSecurity Mag - InfoSecurity Magazine Campagne d'applications malveillantes à grande échelle en contournant la sécurité Android<br>Large-Scale Malicious App Campaign Bypassing Android Security Bitdefender said the malicious app campaign has resulted in more than 60 million downloads of malicious apps from the Google Play Store]]> 2025-03-18T13:00:00+00:00 https://www.infosecurity-magazine.com/news/malicious-app-bypass-android/ www.secnews.physaphae.fr/article.php?IdArticle=8656449 False Mobile None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Microsoft avertit de Stilachirat: un rat furtif ciblant les références et les portefeuilles cryptographiques<br>Microsoft Warns of StilachiRAT: A Stealthy RAT Targeting Credentials and Crypto Wallets Microsoft is calling attention to a novel remote access trojan (RAT) named StilachiRAT that it said employs advanced techniques to sidestep detection and persist within target environments with an ultimate aim to steal sensitive data. The malware contains capabilities to "steal information from the target system, such as credentials stored in the browser, digital wallet information, data stored]]> 2025-03-18T12:30:00+00:00 https://thehackernews.com/2025/03/microsoft-warns-of-stilachirat-stealthy.html www.secnews.physaphae.fr/article.php?IdArticle=8656408 False Malware None 3.0000000000000000 Cisco - Security Firm Blog Redéfinir la gestion de la sécurité dans un monde hyperconnecté<br>Redefining Security Management in a Hyperconnected World Cisco is bringing Secure Workload, Secure Access, and AI Defense into Security Cloud control, enhancing its capabilities and providing comprehensive management.]]> 2025-03-18T12:00:00+00:00 https://blogs.cisco.com/security/redefining-security-management-in-a-hyperconnected-world/ www.secnews.physaphae.fr/article.php?IdArticle=8656509 False Cloud None 2.0000000000000000 SecurityWeek - Security News Western Alliance Bank révèle la violation des données liée à Cleo Hack<br>Western Alliance Bank Discloses Data Breach Linked to Cleo Hack Les informations personnelles de 22 000 clients de la Western Alliance Bank ont ​​été volées dans une violation de données liée au piratage de l'outil de transfert de fichiers CLEO. par CL0P.
>The personal information of 22,000 Western Alliance Bank customers was stolen in a data breach linked to Cl0p\'s hacking of the Cleo file transfer tool. ]]>
2025-03-18T11:45:18+00:00 https://www.securityweek.com/western-alliance-bank-discloses-data-breach-linked-to-cleo-hack/ www.secnews.physaphae.fr/article.php?IdArticle=8656435 False Data Breach,Hack,Tool None 2.0000000000000000
Schneier on Security - Chercheur Cryptologue Américain La recherche sur les facteurs humains de la sécurité est-elle biaisée envers les idées et les habitudes occidentales?<br>Is Security Human Factors Research Skewed Towards Western Ideas and Habits? À quel point la recherche de confidentialité et de sécurité utilisable est-elle bizarre? " By By By ByAyako A. Hasegawa Daisuke Inoue et Mitsuaki Akiyama: Résumé : Dans les domaines des facteurs humains tels que l'interaction humaine-ordinateur (HCI) et la psychologie, les chercheurs craignaient que les participants proviennent principalement de pays étranges (occidentaux, éduqués, industrialisés, riches et démocratiques). Ce biais étrange peut entraver la compréhension de diverses populations et de leurs différences culturelles. Le domaine utilisable de la confidentialité et de la sécurité (UPS) a hérité de nombreuses méthodologies de recherche à partir de recherches sur les domaines des facteurs humains. Nous avons effectué une revue de la littérature pour comprendre dans quelle mesure les échantillons des participants dans les articles UPS provenaient de pays étranges et les caractéristiques des méthodologies et des sujets de recherche dans chaque étude utilisateur recrutant les participants occidentaux ou non occidentaux. Nous avons constaté que le biais envers les pays étranges en UPS est supérieur à celui de HCI. Les barrières géographiques et linguistiques dans les méthodes d'étude et les méthodes de recrutement peuvent amener les chercheurs à mener des études utilisateur localement. De plus, de nombreux articles n'ont pas signalé la démographie des participants, ce qui pourrait entraver la réplication des études rapportées, conduisant à une faible reproductibilité. Pour améliorer la diversité géographique, nous fournissons les suggestions, notamment en facilitant les études de réplication, abordons les problèmes géographiques et linguistiques des méthodes d'étude / de recrutement, et faciliter la recherche sur les sujets des populations non Web ...
Really interesting research: “How WEIRD is Usable Privacy and Security Research?” by Ayako A. Hasegawa Daisuke Inoue, and Mitsuaki Akiyama: Abstract: In human factor fields such as human-computer interaction (HCI) and psychology, researchers have been concerned that participants mostly come from WEIRD (Western, Educated, Industrialized, Rich, and Democratic) countries. This WEIRD skew may hinder understanding of diverse populations and their cultural differences. The usable privacy and security (UPS) field has inherited many research methodologies from research on human factor fields. We conducted a literature review to understand the extent to which participant samples in UPS papers were from WEIRD countries and the characteristics of the methodologies and research topics in each user study recruiting Western or non-Western participants. We found that the skew toward WEIRD countries in UPS is greater than that in HCI. Geographic and linguistic barriers in the study methods and recruitment methods may cause researchers to conduct user studies locally. In addition, many papers did not report participant demographics, which could hinder the replication of the reported studies, leading to low reproducibility. To improve geographic diversity, we provide the suggestions including facilitate replication studies, address geographic and linguistic issues of study/recruitment methods, and facilitate research on the topics for non-WEIRD populations...]]>
2025-03-18T11:10:08+00:00 https://www.schneier.com/blog/archives/2025/03/is-security-human-factors-research-skewed-towards-western-ideas-and-habits.html www.secnews.physaphae.fr/article.php?IdArticle=8656444 False Studies,Conference None 2.0000000000000000
DarkTrace - DarkTrace: AI bases detection Darktrace\'s Detection of State-Linked ShadowPad Malware In 2024, Darktrace identified a cluster of intrusions involving the state-linked malware, ShadowPad. This blog will detail ShadowPad and the associated activities detected by Darktrace.]]> 2025-03-18T11:01:06+00:00 https://www.darktrace.com/blog/darktrace-detection-of-state-linked-shadowpad-malware www.secnews.physaphae.fr/article.php?IdArticle=8657148 False Malware None 2.0000000000000000 Korben - Bloger francais Nous sommes trop cons - Ou comment la tech bouffe notre cerveau 2025-03-18T10:38:53+00:00 https://korben.info/sommes-nous-devenus-trop-cons-declin-cognitif-ere-numerique.html www.secnews.physaphae.fr/article.php?IdArticle=8656422 False None None 3.0000000000000000 We Live Security - Editeur Logiciel Antivirus ESET Opération Akairyū: Mirrorface invite l'Europe à exposer 2025 et ravive Anel Backdoor<br>Operation AkaiRyū: MirrorFace invites Europe to Expo 2025 and revives ANEL backdoor ESET researchers uncovered MirrorFace activity that expanded beyond its usual focus on Japan and targeted a Central European diplomatic institute with the ANEL backdoor]]> 2025-03-18T10:00:00+00:00 https://www.welivesecurity.com/en/eset-research/operation-akairyu-mirrorface-invites-europe-expo-2025-revives-anel-backdoor/ www.secnews.physaphae.fr/article.php?IdArticle=8661309 False None None 3.0000000000000000 Zataz - Magazine Francais de secu Sécurité nationale et vie privée : la proposition de loi Narcotrafic au cœur d\'un débat brûlant 2025-03-18T09:48:33+00:00 https://www.zataz.com/securite-nationale-et-vie-privee-la-proposition-de-loi-narcotrafic-au-coeur-dun-debat-brulant/ www.secnews.physaphae.fr/article.php?IdArticle=8656424 False Legislation None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Le tiers de la chaîne d'approvisionnement britannique s'appuie sur des entreprises «militaires chinoises»<br>Third of UK Supply Chain Relies on “Chinese Military” Companies Bitsight reveals that UK companies are more exposed to cyber risk than global peers via their digital supply chains]]> 2025-03-18T09:45:00+00:00 https://www.infosecurity-magazine.com/news/third-uk-supply-chain-relies/ www.secnews.physaphae.fr/article.php?IdArticle=8656423 False None None 3.0000000000000000 Global Security Mag - Site de news francais Ransomwares : la menace la plus probable en 2025, selon une étude Ivanti Malwares]]> 2025-03-18T09:27:10+00:00 https://www.globalsecuritymag.fr/ransomwares-la-menace-la-plus-probable-en-2025-selon-une-etude-ivanti.html www.secnews.physaphae.fr/article.php?IdArticle=8656416 False None None 2.0000000000000000 Zataz - Magazine Francais de secu Piratage massif de Facebook ? Un pirate russophone met en vente une base de données de 712 millions de comptes 2025-03-18T09:09:02+00:00 https://www.zataz.com/piratage-massif-de-facebook-un-pirate-russophone-met-en-vente-une-base-de-donnees-de-712-millions-de-comptes/ www.secnews.physaphae.fr/article.php?IdArticle=8656425 False None None 3.0000000000000000 InformationSecurityBuzzNews - Site de News Securite La faille de cryptage RSA massive expose des millions de dispositifs IoT à attaquer<br>Massive RSA Encryption Flaw Exposes Millions of IoT Devices to Attack A major security flaw has been found in RSA encryption keys used across the internet. Researchers discovered that about one in 172 online certificates are at risk due to a mathematical weakness.  The issue mainly affects Internet of Things (IoT) devices but could impact any system using improperly generated RSA keys, arising from poor random [...]]]> 2025-03-18T07:18:58+00:00 https://informationsecuritybuzz.com/rsa-encryption-flaw-expose-iot-devices/ www.secnews.physaphae.fr/article.php?IdArticle=8656402 False None None 3.0000000000000000 InformationSecurityBuzzNews - Site de News Securite Github Laak met en danger les chaînes d'approvisionnement des logiciels: des milliers de secrets exposés<br>GitHub Leak Puts Software Supply Chains at Risk: Thousands of Secrets Exposed Over 23,000 organizations may be at risk following a supply chain attack affecting tj-actions/changed-files GitHub Action, say researchers at StepSecurity.    GitHub Actions is a CI/CD service that allows developers to automate software builds and testing. Workflows run in response to specific events, such as committing new code to a repository. With adoption in over 23,000 [...]]]> 2025-03-18T06:22:39+00:00 https://informationsecuritybuzz.com/github-leak-software-supply-chain-risk/ www.secnews.physaphae.fr/article.php?IdArticle=8656395 False None None 3.0000000000000000 The State of Security - Magazine Américain Qu'est-ce que Bundesamt Für Sicherheit dans Der InformationStechnik (BSI)?<br>What is Bundesamt für Sicherheit in der Informationstechnik (BSI)? Most countries have some sort of government agency dedicated to protecting digital infrastructure and promoting cybersecurity awareness. In the English-speaking world alone, the UK has the National Cyber Security Center (NCSC), the US has the National Institute of Standards and Technology ( NIST), and Canada has the Canadian Centre for Cyber Security; chances are you\'re already aware of them. However, cybersecurity knows no borders. Expanding our knowledge beyond the anglosphere is crucial to working effectively in the modern world. With this in mind, let\'s look at one of the most important...]]> 2025-03-18T06:05:37+00:00 https://www.tripwire.com/state-of-security/what-is-bundesamt-fur-sicherheit-in-der-informationstechnik-bsi www.secnews.physaphae.fr/article.php?IdArticle=8656433 False None None 2.0000000000000000 AlienVault Lab Blog - AlienVault est un acteur de defense majeur dans les IOC Conformité sans complexité<br>Compliance without Complexity L'enquête de sécurité 2023 , 78% des décideurs de sécurité ont estimé les données sensibles de leur organisation. La récupération des violations de données peut entraîner des coûts élevés et un temps et des efforts considérables. Dans le Les principales menaces de cybersécurité en 2024 Rapport par Forrester, la moitié des répondants à un niveau de cyber a estimé que le coût du cu]]> 2025-03-18T06:00:00+00:00 https://levelblue.com/blogs/security-essentials/levelblue-compliance-without-complexity www.secnews.physaphae.fr/article.php?IdArticle=8656386 False Ransomware,Tool,Vulnerability,Legislation,Medical None 2.0000000000000000 InformationSecurityBuzzNews - Site de News Securite Aperçu du rapport critique des cyber-menaces de Reliaquest pour l'hospitalité et les loisirs<br>Insight Into Reliaquest\\'s Critical Cyber Threats to Hospitality and Recreation Report The latest threat landscape report from ReliaQuest has unearthed some concerning findings regarding the critical threats faced by the hospitality and recreation sector. These include identifying a 43% increase in ransomware attacks, the discovery that 44% of phishing emails contained credential harvesters, and a staggering 433% increase in external remote services abuse.  The reporting period [...]]]> 2025-03-18T05:36:32+00:00 https://informationsecuritybuzz.com/insight-reliaquest-criti-cyber-threats/ www.secnews.physaphae.fr/article.php?IdArticle=8656388 False Ransomware,Threat None 2.0000000000000000 ProofPoint - Firm Security ProofPoint établit une alliance stratégique mondiale avec Microsoft pour s'appuyer sur Azure et renforcer la cybersécurité centrée sur l'homme pour les organisations<br>Proofpoint Establishes Global Strategic Alliance with Microsoft to Build on Azure and Strengthen Human-Centric Cybersecurity for Organizations 2025-03-18T05:00:00+00:00 https://www.proofpoint.com/us/newsroom/press-releases/proofpoint-establishes-global-strategic-alliance-microsoft-build-azure-and www.secnews.physaphae.fr/article.php?IdArticle=8656591 False None None 2.0000000000000000 InformationSecurityBuzzNews - Site de News Securite De nouveaux «agents» d'IA pourraient aider les mauvais acteurs à lancer des attaques<br>New AI “Agents” Could Help Bad Actors Launch Attacks The next generation of artificial intelligence (AI), known as “agents,” may open the door to new cyber threats, experts are warning.  AI agents are advanced tools that can carry out tasks on their own, such as browsing the internet, writing emails, or even interacting with websites. While they are designed to help people automate mundane [...]]]> 2025-03-18T04:08:08+00:00 https://informationsecuritybuzz.com/new-ai-agents-could-help-bad-actors-launch-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8656379 False Tool None 3.0000000000000000 The Register - Site journalistique Anglais \\ 'Dead Simple \\' Trou de détournement dans Apache Tomcat \\ 'maintenant activement exploité dans la nature \\'<br>\\'Dead simple\\' hijacking hole in Apache Tomcat \\'now actively exploited in the wild\\' One PUT request, one poisoned session file, and the server\'s yours A trivial flaw in Apache Tomcat that allows remote code execution and access to sensitive files is said to be under attack in the wild within a week of its disclosure.…]]> 2025-03-18T00:44:39+00:00 https://go.theregister.com/feed/www.theregister.com/2025/03/18/apache_tomcat_java_rce_flaw/ www.secnews.physaphae.fr/article.php?IdArticle=8656351 False None None 2.0000000000000000 HackRead - Chercher Cyber Comment supprimer de façon permanente et solidement des photos d'un iPhone<br>How to Permanently and Securely Delete Photos from an iPhone Do you need to permanently and securely delete photos from an iPhone to prevent unauthorized access? Simply deleting…]]> 2025-03-18T00:23:19+00:00 https://hackread.com/how-to-permanently-securely-delete-photos-from-an-iphone/ www.secnews.physaphae.fr/article.php?IdArticle=8656357 False Mobile None 3.0000000000000000 TrendLabs Security - Editeur Antivirus ZDI-CAN-25373: Exploit de raccourci Windows abusé comme zéro-jour dans des campagnes APT réparties<br>ZDI-CAN-25373: Windows Shortcut Exploit Abused as Zero-Day in Widespread APT Campaigns Trend Zero Day Initiative™ (ZDI) uncovered both state-sponsored and cybercriminal groups extensively exploiting ZDI-CAN-25373, a Windows .lnk file vulnerability that enables hidden command execution.]]> 2025-03-18T00:00:00+00:00 https://www.trendmicro.com/en_us/research/25/c/windows-shortcut-zero-day-exploit.html www.secnews.physaphae.fr/article.php?IdArticle=8656475 False Vulnerability,Threat,Prediction None 2.0000000000000000 TrendMicro - Security Firm Blog Les techniques d'intrusion de Socgholish \\ facilitent la distribution du ransomware RansomHub<br>SocGholish\\'s Intrusion Techniques Facilitate Distribution of RansomHub Ransomware Trend Research analyzed SocGholish\'s MaaS framework and its role in deploying RansomHub ransomware through compromised websites, using highly obfuscated JavaScript loaders to evade detection and execute various malicious tasks.]]> 2025-03-18T00:00:00+00:00 https://www.trendmicro.com/en_us/research/25/c/socgholishs-intrusion-techniques-facilitate-distribution-of-rans.html www.secnews.physaphae.fr/article.php?IdArticle=8655664 False Ransomware,Prediction None 3.0000000000000000 Silicon - Site de News Francais { Tribune Expert } - Arrêtons de parler de " gestion des risques " en cybersécurité : parlons plutôt de " danger " 2025-03-18T00:00:00+00:00 https://www.silicon.fr/Thematique/cybersecurite-1371/Breves/cybersecurite-parlons-danger-gestion-risques-469050.htm#utm_source=IndexThematique&utm_medium=Rss&utm_campaign= www.secnews.physaphae.fr/article.php?IdArticle=8656427 False Threat None 2.0000000000000000 Recorded Future - FLux Recorded Future Crypto Exchange Okx Arrête l'outil utilisé par les pirates nord-coréens pour blanchir des fonds volés<br>Crypto exchange OKX shuts down tool used by North Korean hackers to launder stolen funds OKX said it detected a coordinated effort by one of North Korea\'s most prolific hacking outfits to misuse its decentralized finance (DeFi) services.]]> 2025-03-17T23:24:41+00:00 https://therecord.media/crypto-okx-shuts-down-exchange www.secnews.physaphae.fr/article.php?IdArticle=8656349 False Tool None 3.0000000000000000 TechRepublic - Security News US Utilisateurs d'iPhone et Android: une mise à niveau majeure de confidentialité arrive bientôt<br>iPhone & Android Users: A Major Privacy Upgrade is Coming Soon This breakthrough will finally allow secure, encrypted messaging between different mobile platforms.]]> 2025-03-17T22:59:47+00:00 https://www.techrepublic.com/article/news-iphone-android-encrypted-messaging/ www.secnews.physaphae.fr/article.php?IdArticle=8656715 False Mobile None 3.0000000000000000 Zataz - Magazine Francais de secu L\'IA fantôme : une menace silencieuse qui pourrait provoquer une crise de sécurité mondiale 2025-03-17T22:59:10+00:00 https://www.zataz.com/lia-fantome-une-menace-silencieuse-qui-pourrait-provoquer-une-crise-de-securite-mondiale/ www.secnews.physaphae.fr/article.php?IdArticle=8656344 False Tool None 2.0000000000000000 Zataz - Magazine Francais de secu 8 jours de prison pour diffusion de fake news ! 2025-03-17T22:38:52+00:00 https://www.zataz.com/8-jours-de-prison-pour-diffusion-de-fake-news/ www.secnews.physaphae.fr/article.php?IdArticle=8656345 False Legislation None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) La vulnérabilité d'Apache Tomcat a activement exploité seulement 30 heures après la divulgation publique<br>Apache Tomcat Vulnerability Actively Exploited Just 30 Hours After Public Disclosure A recently disclosed security flaw impacting Apache Tomcat has come under active exploitation in the wild following the release of a public proof-of-concept (PoC) a mere 30 hours after public disclosure. The vulnerability, tracked as CVE-2025-24813, affects the below versions - Apache Tomcat 11.0.0-M1 to 11.0.2 Apache Tomcat 10.1.0-M1 to 10.1.34 Apache Tomcat 9.0.0-M1 to 9.0.98 It concerns a]]> 2025-03-17T22:38:00+00:00 https://thehackernews.com/2025/03/apache-tomcat-vulnerability-comes-under.html www.secnews.physaphae.fr/article.php?IdArticle=8656287 False Vulnerability None 3.0000000000000000 Data Security Breach - Site de news Francais Créer un inventaire des actifs d\'IA : une nécessité stratégique pour la sécurité et la conformité 2025-03-17T22:22:50+00:00 https://www.datasecuritybreach.fr/creer-un-inventaire-des-actifs-dia-une-necessite-strategique-pour-la-securite-et-la-conformite/ www.secnews.physaphae.fr/article.php?IdArticle=8656346 False None None 3.0000000000000000 Data Security Breach - Site de news Francais Un outil gratuit pour vaincre le ransomware Akira sur Linux Continue reading Un outil gratuit pour vaincre le ransomware Akira sur Linux]]> 2025-03-17T22:09:45+00:00 https://www.datasecuritybreach.fr/un-outil-gratuit-pour-vaincre-le-ransomware-akira-sur-linux/ www.secnews.physaphae.fr/article.php?IdArticle=8656347 False Ransomware None 3.0000000000000000 Dark Reading - Informationweek Branch Les attaques OAuth Target Microsoft 365, Github<br>OAuth Attacks Target Microsoft 365, GitHub In a cyber twist, attackers behind two of the campaigns are using the apps to redirect users to phishing and malware distribution sites.]]> 2025-03-17T21:53:27+00:00 https://www.darkreading.com/application-security/oauth-attacks-target-microsoft-365-github www.secnews.physaphae.fr/article.php?IdArticle=8656325 False Malware None 3.0000000000000000 Dark Reading - Informationweek Branch Clickfix Attack compromet plus de 100 sites de concessionnaires automobiles<br>ClickFix Attack Compromises 100+ Car Dealership Sites The ClickFix attack tactic seems to be gaining traction among threat actors.]]> 2025-03-17T21:49:37+00:00 https://www.darkreading.com/cyberattacks-data-breaches/compromised-car-dealership-websites-clickfix-breach www.secnews.physaphae.fr/article.php?IdArticle=8656326 False Threat None 3.0000000000000000 Zataz - Magazine Francais de secu Un développeur de LockBit extradé d\'Israël et inculpé aux États-Unis 2025-03-17T21:42:39+00:00 https://www.zataz.com/un-developpeur-de-lockbit-extrade-disrael-et-inculpe-aux-etats-unis/ www.secnews.physaphae.fr/article.php?IdArticle=8656336 False Ransomware,Malware None 2.0000000000000000 Dark Reading - Informationweek Branch Lexmark étend les services de sécurité imprimés dans le monde entier<br>Lexmark Expands Print Security Services Worldwide 2025-03-17T21:34:09+00:00 https://www.darkreading.com/cyberattacks-data-breaches/lexmark-expands-print-security-services-worldwide www.secnews.physaphae.fr/article.php?IdArticle=8656327 False None None 2.0000000000000000 HackRead - Chercher Cyber Les pirates exploitent Chatgpt avec CVE-2024-27564, plus de 10 000 attaques en une semaine<br>Hackers Exploit ChatGPT with CVE-2024-27564, 10,000+ Attacks in a Week In its latest research report, cybersecurity firm Veriti has spotted active exploitation of a vulnerability within OpenAI’s ChatGPT…]]> 2025-03-17T21:26:03+00:00 https://hackread.com/hackers-exploit-chatgpt-cve-2024-27564-10000-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8656335 False Vulnerability,Threat ChatGPT 3.0000000000000000 Dark Reading - Informationweek Branch Varonis acquiert Cyral pour réinventer la surveillance de l'activité de la base de données<br>Varonis Acquires Cyral to Reinvent Database Activity Monitoring 2025-03-17T21:20:55+00:00 https://www.darkreading.com/application-security/varonis-acquires-cyral-to-reinvent-database-activity-monitoring www.secnews.physaphae.fr/article.php?IdArticle=8656328 False None None 2.0000000000000000 Data Security Breach - Site de news Francais Mora_001 : un nouveau ransomware exploite des failles Fortinet 2025-03-17T21:17:13+00:00 https://www.datasecuritybreach.fr/mora_001-une-nouvelle-menace-ransomware-exploite-des-failles-fortinet/ www.secnews.physaphae.fr/article.php?IdArticle=8656337 False Ransomware None 3.0000000000000000 Dark Reading - Informationweek Branch Le Danemark met en garde contre l'augmentation du cyber-espionnage contre le secteur des télécommunications<br>Denmark Warns of Increased Cyber Espionage Against Telecom Sector A new threat assessment from the Danish Civil Protection Authority (SAMSIK) warned of cyberattacks targeting the telecommunications sector after citing a wave of incidents hitting European organizations the past few years.]]> 2025-03-17T21:14:26+00:00 https://www.darkreading.com/threat-intelligence/denmark-warns-increased-cyber-espionage-telecom-sector www.secnews.physaphae.fr/article.php?IdArticle=8656329 False Threat None 3.0000000000000000 Zataz - Magazine Francais de secu Des pirates exploitent une fausse annonce de décès pour diffuser un logiciel espion 2025-03-17T21:06:33+00:00 https://www.zataz.com/des-pirates-exploitent-une-fausse-annonce-de-deces-pour-diffuser-un-logiciel-espion/ www.secnews.physaphae.fr/article.php?IdArticle=8656323 False None None 3.0000000000000000 Recorded Future - FLux Recorded Future GitHub restaure le code après des modifications malveillantes de l'outil TJ-Actionn<br>GitHub restores code following malicious changes to tj-actions tool GitHub was forced to take action this weekend to help users after a threat actor compromised a popular open source package used by more than 23,000 organizations.]]> 2025-03-17T20:36:44+00:00 https://therecord.media/github-restores-code-malicious-tj-actions-changes www.secnews.physaphae.fr/article.php?IdArticle=8656315 False Tool,Threat None 3.0000000000000000 HackRead - Chercher Cyber Stilachirat exploite Chrome pour les portefeuilles et les informations d'identification cryptographiques<br>StilachiRAT Exploits Chrome for Crypto Wallets and Credentials StilachiRAT: Sophisticated malware targets crypto wallets & credentials. Undetected, it maps systems & steals data. Microsoft advises strong security measures.]]> 2025-03-17T20:17:53+00:00 https://hackread.com/stilachirat-exploits-chrome-crypto-wallets-credentials/ www.secnews.physaphae.fr/article.php?IdArticle=8656322 False Malware None 3.0000000000000000 CyberScoop - scoopnewsgroup.com special Cyber Qui envoie ces SMS SMSS sur les péages non rémunérés?<br>Who is sending those scammy text messages about unpaid tolls? La dernière arnaque de smiming suit un processus familier en tant qu'industrie que l'industrie a connue au cours de la dernière décennie.
>The latest smishing scam follows a familiar process as ones the industry has seen over the past decade. ]]>
2025-03-17T20:14:39+00:00 https://cyberscoop.com/toll-road-text-message-scam-swells-nationwide-how-to-stop/ www.secnews.physaphae.fr/article.php?IdArticle=8656316 False None None 3.0000000000000000
The Last Watchdog - Blog Sécurité de Byron V Acohido ALERTE NOUVELLE: La recherche de Link11 \\ montre que les attaques DDOS sont plus ciblées - et doublées - d'une année sur l'autre<br>News alert: Link11\\'s research shows DDoS attacks are more targeted - and doubled - year-over-year Francfort, Allemagne, 17 mars 2025, CyberNewswire - Les cyberattaques ne sont plus une menace abstraite - elles dominent la planification des risques pour les entreprises du monde entier. le dernier link11 Le rapport de cyber européen montre une tendance alarmante: le nombre d'attaques DDOS a plus que… (plus…) Le message News Alert: Link11 \'s Research Shows DDOS est plus ciblé - A et doublé - an-an-an-année href = "https://www.lastwatchdog.com"> Le dernier chien de garde .
>Frankfurt, Germany, Mar. 17, 2025, CyberNewswire — Cyberattacks are no longer an abstract threat – they dominate risk planning for companies worldwide. The latest Link11 European Cyber Report shows an alarming trend: the number of DDoS attacks has more than … (more…) The post News alert: Link11\'s research shows DDoS attacks are more targeted - and doubled - year-over-year first appeared on The Last Watchdog.]]>
2025-03-17T19:59:44+00:00 https://www.lastwatchdog.com/news-alert-link11s-research-shows-ddos-attacks-are-more-targeted-and-doubled-year-over-year/ www.secnews.physaphae.fr/article.php?IdArticle=8656306 False Threat,Prediction None 3.0000000000000000
HackRead - Chercher Cyber ChatGpt Down lorsque les utilisateurs signalent l'erreur «Time-Out»<br>ChatGPT Down as Users Report “Gateway Time-out” Error ChatGPT Down: Users report "Gateway time-out" errors. OpenAI\'s popular AI chatbot is experiencing widespread outages. Stay updated on the service disruption.]]> 2025-03-17T19:57:16+00:00 https://hackread.com/chatgpt-down-as-users-report-gateway-time-out-error/ www.secnews.physaphae.fr/article.php?IdArticle=8656313 False None ChatGPT 3.0000000000000000 Dark Reading - Informationweek Branch Vulnérabilité Apache Tomcat RCE sous le feu avec un exploit en 2 étapes<br>Apache Tomcat RCE Vulnerability Under Fire With 2-Step Exploit The researchers who discovered the initial assault warned that the simple, staged attack is just the beginning for advanced exploit sequences that will test cyber defenses in new and more difficult ways.]]> 2025-03-17T18:52:23+00:00 https://www.darkreading.com/vulnerabilities-threats/apache-tomcat-rce-vulnerability-exploit www.secnews.physaphae.fr/article.php?IdArticle=8656299 False Vulnerability,Threat None 3.0000000000000000