www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2025-05-12T09:26:02+00:00 www.secnews.physaphae.fr Fortinet Vunerability - Fortinet Vunerability Utilisation de la clé codée en dur utilisée pour le cryptage de mot de passe du serveur de sauvegarde à distance<br>Use of hardcoded key used for remote backup server password encryption A Use of Hard-coded Cryptographic Key vulnerability [CWE-321] in FortiSandbox may allow a privileged attacker with super-admin profile and CLI access to read sensitive data via CLI. Revised on 2025-03-11 00:00:00]]> 2025-03-11T00:00:00+00:00 https://fortiguard.fortinet.com/psirt/FG-IR-24-327 www.secnews.physaphae.fr/article.php?IdArticle=8655045 False Vulnerability None None Fortinet Vunerability - Fortinet Vunerability Exposition d'informations sensibles à un acteur non autorisé<br>Exposure of Sensitive Information to an Unauthorized Actor An exposure of sensitive information to an unauthorized actor vulnerability [CWE-200] in FortiSIEM may allow a remote unauthenticated attacker who acquired knowledge of the agent\'s authorization header by other means to read the database password via crafted api requests Revised on 2025-03-11 00:00:00]]> 2025-03-11T00:00:00+00:00 https://fortiguard.fortinet.com/psirt/FG-IR-23-117 www.secnews.physaphae.fr/article.php?IdArticle=8655036 False Vulnerability None None Fortinet Vunerability - Fortinet Vunerability Règles de pare-feu d'application Web contourner en utilisant un nom de fichier vide<br>Web application firewall rules bypass by using an empty filename Two improper handling of syntactically invalid structure vulnerabilities [CWE-228] in FortiWeb may allow an unauthenticated attacker to bypass web firewall protections via HTTP/S crafted requests. Revised on 2025-03-11 00:00:00]]> 2025-03-11T00:00:00+00:00 https://fortiguard.fortinet.com/psirt/FG-IR-23-115 www.secnews.physaphae.fr/article.php?IdArticle=8655046 False Vulnerability None None Fortinet Vunerability - Fortinet Vunerability Flaw XSS dans les pages Fortivew / Securitylogs<br>XSS flaw in Fortiview/SecurityLogs pages An improper neutralization of input during web page generation (\'Cross-site Scripting\') vulnerability [CWE-79] in FortiADC GUI may allow an authenticated attacker to perform an XSS attack via crafted HTTP or HTTPs requests. Revised on 2025-03-11 00:00:00]]> 2025-03-11T00:00:00+00:00 https://fortiguard.fortinet.com/psirt/FG-IR-23-216 www.secnews.physaphae.fr/article.php?IdArticle=8655047 False Vulnerability None None Fortinet Vunerability - Fortinet Vunerability Vulnérabilités de chaîne à format multiples<br>Multiple format string vulnerabilities A use of externally-controlled format string vulnerability [CWE-134] in FortiOS, FortiProxy, FortiPAM, FortiSRA and FortiWeb may allow a privileged attacker to execute unauthorized code or commands via specially crafted HTTP or HTTPS commands. Revised on 2025-03-11 00:00:00]]> 2025-03-11T00:00:00+00:00 https://fortiguard.fortinet.com/psirt/FG-IR-24-325 www.secnews.physaphae.fr/article.php?IdArticle=8655040 False Vulnerability None None Fortinet Vunerability - Fortinet Vunerability Autorisation incorrecte dans la page des incidents<br>Incorrect authorization in incident page An incorrect authorization vulnerability [CWE-863] in FortiSIEM may allow an authenticated attacker to perform unauthorized operations on incidents via crafted HTTP requests. Revised on 2025-03-11 00:00:00]]> 2025-03-11T00:00:00+00:00 https://fortiguard.fortinet.com/psirt/FG-IR-24-377 www.secnews.physaphae.fr/article.php?IdArticle=8655038 False Vulnerability None None Fortinet Vunerability - Fortinet Vunerability La contrefaçon de demande de site croisé dans le point de terminaison de l'administrateur<br>Cross Site Request Forgery in admin endpoint A cross site request forgery vulnerability [CWE-352] in FortiNDR may allow a remote unauthenticated attacker to execute unauthorized actions via crafted HTTP GET requests. Revised on 2025-03-11 00:00:00]]> 2025-03-11T00:00:00+00:00 https://fortiguard.fortinet.com/psirt/FG-IR-23-353 www.secnews.physaphae.fr/article.php?IdArticle=8655034 False Vulnerability None None Fortinet Vunerability - Fortinet Vunerability Vulnérabilité Apache Camel - CVE-2025-27636<br>Apache Camel Vulnerability - CVE-2025-27636 2025-03-11T00:00:00+00:00 https://fortiguard.fortinet.com/psirt/FG-IR-25-166 www.secnews.physaphae.fr/article.php?IdArticle=8655031 False Vulnerability None None Fortinet Vunerability - Fortinet Vunerability Débordement de tampon de pile dans la commande CLI<br>Stack buffer overflow in CLI command A stack-buffer overflow vulnerability [CWE-121] in FortiMail CLI may allow a privileged attacker to execute arbitrary code or commands via specifically crafted CLI commands. Revised on 2025-03-11 00:00:00]]> 2025-03-11T00:00:00+00:00 https://fortiguard.fortinet.com/psirt/FG-IR-24-331 www.secnews.physaphae.fr/article.php?IdArticle=8655044 False Vulnerability None None TrendLabs Security - Editeur Antivirus Faux référentiels GitHub assistés AI Fuel Smartloader et Lummastealer Distribution<br>AI-Assisted Fake GitHub Repositories Fuel SmartLoader and LummaStealer Distribution In this blog entry, we uncovered a campaign that uses fake GitHub repositories to distribute SmartLoader, which is then used to deliver Lumma Stealer and other malicious payloads. The campaign leverages GitHub\'s trusted reputation to evade detection, using AI-generated content to make fake repositories appear legitimate.]]> 2025-03-11T00:00:00+00:00 https://www.trendmicro.com/en_us/research/25/c/ai-assisted-fake-github-repositories.html www.secnews.physaphae.fr/article.php?IdArticle=8654951 False None None 3.0000000000000000 Fortinet Vunerability - Fortinet Vunerability Attaque du refus de service pré-authentification dans OpenSSH - CVE-2025-26466<br>Pre-authentication Denial of Service attack in OpenSSH - CVE-2025-26466 CVE-2025-26466A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack. Revised on 2025-03-11 00:00:00]]> 2025-03-11T00:00:00+00:00 https://fortiguard.fortinet.com/psirt/FG-IR-25-122 www.secnews.physaphae.fr/article.php?IdArticle=8655043 False None None None SlashNext - Cyber Firm Du phishing à la vue - des attaques modernes d'ingénierie sociale<br>From Phishing to Vishing – Modern Social Engineering Attacks Les attaques de phishing sont allés au-delà de l'envoi de courriels avec des liens malveillants pour incorporer des techniques d'ingénierie sociale plus modernes, y compris la tendance alarmante du mélange dans le smir (phishing SMS) et le Vishing (phishing vocal). Ces techniques constituent une menace croissante au-delà de la sécurité des e-mails et améliorent les capacités des cybercriminels pour atteindre leurs objectifs en utilisant cette nouvelle gamme de communication […] Le message du phishing à la viseuse - les attaques modernes de l'ingénierie sociale sont d'abord apparues sur slashnext .
>Phishing attacks have moved beyond simply sending emails with malicious links to incorporate more modern social engineering techniques, including the alarming trend of mixing in smishing (SMS phishing) and vishing (voice phishing). These techniques are a growing threat beyond email security and enhance cybercriminals’ capabilities to achieve their objectives using this new range of communication […] The post From Phishing to Vishing – Modern Social Engineering Attacks first appeared on SlashNext.]]>
2025-03-10T22:06:46+00:00 https://slashnext.com/blog/from-phishing-to-vishing-modern-social-engineering-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8655006 False Threat,Prediction None 2.0000000000000000
HackRead - Chercher Cyber Garantex Crypto Exchange saisi, deux inculpés dans le programme de blanchiment<br>Garantex Crypto Exchange Seized, Two Charged in Laundering Scheme International law enforcement disrupts Garantex, a multi-billion-dollar cryptocurrency exchange used for money laundering. Two individuals, Aleksej Besciokov and…]]> 2025-03-10T22:06:28+00:00 https://hackread.com/garantex-crypto-exchange-seized-2-charged-laundering/ www.secnews.physaphae.fr/article.php?IdArticle=8654928 False Legislation None 2.0000000000000000 HackRead - Chercher Cyber Cloud IMS: La confluence de l'innovation et de la sécurité dans les télécommunications modernes<br>Cloud IMS: The Confluence of Innovation and Security in Modern Telecommunications The telecom industry is at a major turning point. With 5G, IoT, and AI reshaping global connectivity, the…]]> 2025-03-10T21:50:46+00:00 https://hackread.com/cloud-ims-confluence-innovation-security-modern-telecommunications/ www.secnews.physaphae.fr/article.php?IdArticle=8654929 False Cloud None 2.0000000000000000 Dark Reading - Informationweek Branch Exploit de voitures vous permet d'espionner les conducteurs en temps réel<br>Car Exploit Allows You to Spy on Drivers in Real Time Just like with any regular computer, researchers figured out how to crack into, force restart, and upload malware to an aftermarket in-vehicle infotainment system.]]> 2025-03-10T21:27:46+00:00 https://www.darkreading.com/vulnerabilities-threats/car-exploit-spy-drivers-real-time www.secnews.physaphae.fr/article.php?IdArticle=8655573 False Malware,Threat None 3.0000000000000000 Dark Reading - Informationweek Branch \\ 'Sidewinder \\' intensifie les attaques contre le secteur maritime<br>\\'SideWinder\\' Intensifies Attacks on Maritime Sector The likely India-based threat group is also targeting logistics companies in a continued expansion of its activities.]]> 2025-03-10T21:20:12+00:00 https://www.darkreading.com/cyberattacks-data-breaches/sidewinder-intensifies-attacks-maritime-sector www.secnews.physaphae.fr/article.php?IdArticle=8654930 False Threat None 3.0000000000000000 Recorded Future - FLux Recorded Future Le fournisseur de soins de santé du Kansas affirme plus de 220 000 touchés par la cyberattaque<br>Kansas healthcare provider says more than 220,000 impacted by cyberattack Sunflower Medical Group said it initially discovered the breach on January 7 and hired a cybersecurity firm to investigate before it was discovered the hackers had been inside their systems since mid-December.]]> 2025-03-10T21:19:33+00:00 https://therecord.media/kansas-healthcare-provider-data-breach www.secnews.physaphae.fr/article.php?IdArticle=8654927 False Medical None 3.0000000000000000 Dark Reading - Informationweek Branch Google paie près de 12 millions de dollars dans le programme de primes de bogue 2024<br>Google Pays Out Nearly $12M in 2024 Bug Bounty Program The program underwent a series of changes in the past year, including richer maximum rewards in a variety of bug categories.]]> 2025-03-10T20:17:24+00:00 https://www.darkreading.com/vulnerabilities-threats/google-pays-nearly-12m-2024-bug-bounty-program www.secnews.physaphae.fr/article.php?IdArticle=8654924 False None None 4.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les chercheurs exposent une nouvelle attaque polymorphe qui clones les extensions du navigateur pour voler des informations d'identification<br>Researchers Expose New Polymorphic Attack That Clones Browser Extensions to Steal Credentials Cybersecurity researchers have demonstrated a novel technique that allows a malicious web browser extension to impersonate any installed add-on. "The polymorphic extensions create a pixel perfect replica of the target\'s icon, HTML popup, workflows and even temporarily disables the legitimate extension, making it extremely convincing for victims to believe that they are providing credentials to]]> 2025-03-10T20:17:00+00:00 https://thehackernews.com/2025/03/researchers-expose-new-polymorphic.html www.secnews.physaphae.fr/article.php?IdArticle=8654896 False None None 3.0000000000000000 CyberScoop - scoopnewsgroup.com special Cyber Plusieurs vulnérabilités trouvées dans iconics industriel SCADA Software<br>Multiple vulnerabilities found in ICONICS industrial SCADA software Les vulnérabilités comptabilisées ont permis une escalade des privilèges, un détournement de DLL, une modification des fichiers et même un compromis total du système.
>The since-patched vulnerabilities allowed for privilege escalation, DLL hijacking, file modification and even total system compromise. ]]>
2025-03-10T20:13:21+00:00 https://cyberscoop.com/iconics-scada-vulnerabilities-2025-palo-alto/ www.secnews.physaphae.fr/article.php?IdArticle=8654922 False Vulnerability,Industrial None 4.0000000000000000
Recorded Future - FLux Recorded Future Musk blâme les pannes sur présumés \\ 'massive \\' cyberattaque<br>Musk blames X outages on alleged \\'massive\\' cyberattack Elon Musk said a "coordinated group and/or a country" had targeted the platform. Musk has claimed in the past, without evidence, that cyberattacks were the cause of technological issues on the site.]]> 2025-03-10T20:05:52+00:00 https://therecord.media/cyberattack-twitter-musk-massive-outages www.secnews.physaphae.fr/article.php?IdArticle=8654923 False None None 3.0000000000000000 Dark Reading - Informationweek Branch APT \\ 'Blind Eagle \\' cible le gouvernement colombien<br>APT \\'Blind Eagle\\' Targets Colombian Government The South American-based advanced persistent threat group is using an exploit with a "high infection rate," according to research from Check Point.]]> 2025-03-10T19:38:36+00:00 https://www.darkreading.com/cyberattacks-data-breaches/apt-blind-eagle-targets-colombian-government www.secnews.physaphae.fr/article.php?IdArticle=8654919 False Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Desert Dexter cible 900 victimes à l'aide de publicités Facebook et de liens de logiciels malveillants télégrammes<br>Desert Dexter Targets 900 Victims Using Facebook Ads and Telegram Malware Links The Middle East and North Africa have become the target of a new campaign that delivers a modified version of a known malware called AsyncRAT since September 2024. "The campaign, which leverages social media to distribute malware, is tied to the region\'s current geopolitical climate," Positive Technologies researchers Klimentiy Galkin and Stanislav Pyzhov said in an analysis published last week.]]> 2025-03-10T18:20:00+00:00 https://thehackernews.com/2025/03/desert-dexter-targets-900-victims-using.html www.secnews.physaphae.fr/article.php?IdArticle=8654867 False Malware None 2.0000000000000000 Recorded Future - FLux Recorded Future L'administration Trump termine le dossier de violation des données de Ransomware de FTC \\ contre MGM Resorts<br>Trump administration ends FTC\\'s ransomware data breach case against MGM Resorts The Federal Trade Commission (FTC) shuttered its case against MGM Resorts International centered on the company\'s handling of personal data stolen during a 2023 ransomware attack.]]> 2025-03-10T17:55:45+00:00 https://therecord.media/trump-admin-ends-ftc-ransomware-case www.secnews.physaphae.fr/article.php?IdArticle=8654912 False Ransomware,Data Breach None 3.0000000000000000 Global Security Mag - Site de news francais ForcePoint à acquérir GetVisibilité<br>Forcepoint to Acquire Getvisibility Business News
Forcepoint to Acquire Getvisibility, Expanding AI-Driven Data Security and Risk Visibility Acquisition will strengthen Forcepoint\'s leadership in data security, transforming data risk into proactive protection with AI-powered visibility and continuous controls Getvisibility\'s DSPM, DDR and AI-Mesh technology will integrate seamlessly into Forcepoint\'s Data Security Everywhere architecture, advancing real-time risk detection, automated response and compliance enforcement - Business News]]>
2025-03-10T17:51:47+00:00 https://www.globalsecuritymag.fr/forcepoint-to-acquire-getvisibility.html www.secnews.physaphae.fr/article.php?IdArticle=8654910 False None None 3.0000000000000000
Korben - Bloger francais Wordsmash - Améliorez votre vitesse de frappe au clavier avec ce jeu addictif façon Tetris 2025-03-10T17:28:24+00:00 https://korben.info/wordsmash-ameliorez-votre-vitesse-de-frappe-au-clavier-avec-ce-jeu-addictif-facon-tetris.html www.secnews.physaphae.fr/article.php?IdArticle=8654905 False None None 3.0000000000000000 SecurityWeek - Security News Trump Coins utilisé comme leurre dans la campagne de logiciels malveillants<br>Trump Coins Used as Lure in Malware Campaign La binance est usurpée dans une campagne de courrier électronique en utilisant des pièces Trump gratuites comme un leurre menant à l'installation du rat Connectwise.
>Binance is being spoofed in an email campaign using free TRUMP Coins as a lure leading to the installation of the ConnectWise RAT. ]]>
2025-03-10T17:27:48+00:00 https://www.securityweek.com/trump-coins-used-as-lure-in-malware-campaign/ www.secnews.physaphae.fr/article.php?IdArticle=8654911 False Malware None 3.0000000000000000
Dark Reading - Informationweek Branch L'ancien employé reconnu coupable de vengeance à un programme de commutation de kill<br>Ex-Employee Found Guilty in Revenge Kill-Switch Scheme Clandestine kill switch was designed to lock out other users if the developer\'s account in the company\'s Windows Active Directory was ever disabled.]]> 2025-03-10T17:20:37+00:00 https://www.darkreading.com/cyberattacks-data-breaches/ex-employee-guilty-revenge-kill-switch-scheme www.secnews.physaphae.fr/article.php?IdArticle=8654913 False None None 3.0000000000000000 IT Security Guru - Blog Sécurité MIWIC25 - Eva Benn, chef d'état-major, stratégie - Microsoft Red Team<br>MIWIC25 – Eva Benn, Chief of Staff, Strategy – Microsoft Red Team Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024\'s Top 20 women selected by an esteemed panel of judges. Presented in a Q&A format, the nominee\'s answers are […] ]]> 2025-03-10T16:57:48+00:00 https://www.itsecurityguru.org/2025/03/10/miwic25-eva-benn-chief-of-staff-strategy-microsoft-red-team/?utm_source=rss&utm_medium=rss&utm_campaign=miwic25-eva-benn-chief-of-staff-strategy-microsoft-red-team www.secnews.physaphae.fr/article.php?IdArticle=8654952 False None None 2.0000000000000000 HackRead - Chercher Cyber Plus de 1000 forfaits malveillants ont trouvé l'exploitation des plates-formes open source<br>Over 1000 Malicious Packages Found Exploiting Open-Source Platforms Over 1,000 malicious packages found using low file counts, suspicious installs, and hidden APIs. Learn key detection methods…]]> 2025-03-10T16:48:41+00:00 https://hackread.com/malicious-packages-exploiting-open-source-platforms/ www.secnews.physaphae.fr/article.php?IdArticle=8654904 False None None 3.0000000000000000 Recorded Future - FLux Recorded Future Les groupes d'immigrants poursuivent pour bloquer l'administration Trump d'accès aux données IRS pour les déportations<br>Immigrant groups sue to block Trump administration from accessing IRS data for deportations Homeland Security officials reportedly recently asked the IRS to provide personal data belonging to potentially undocumented people who have filed their taxes - a request the plaintiffs say is illegal.]]> 2025-03-10T16:43:57+00:00 https://therecord.media/immigrant-groups-sue-trump-deportation www.secnews.physaphae.fr/article.php?IdArticle=8654902 False None None 3.0000000000000000 Recorded Future - FLux Recorded Future SIBITEUR SUPPOSSION DE BINANCE SPAM<br>Scam spoofs Binance website and uses TRUMP coin as lure for malware Researchers at phishing defense company Cofense say hackers are spreading a malicious remote access tool through a fake Binance page that offers access to the TRUMP coin.]]> 2025-03-10T16:35:47+00:00 https://therecord.media/email-scam-spoofs-binance-offers-trump-coin-connectwise-rat www.secnews.physaphae.fr/article.php?IdArticle=8654903 False Malware,Tool None 3.0000000000000000 Palo Alto Network - Site Constructeur La montée des attaques avancées - ce que les chefs d'entreprise doivent savoir<br>The Rise of Advanced Attacks - What Business Leaders Need to Know Le bouclier d'exfiltration extrait les demandes HTTP et vérifie les domaines en temps réel, empêchant les attaquants d'utiliser des domaines de confiance pour exfiltrater les données non détectées.
>Exfiltration Shield extracts HTTP requests and verify domains in real time, preventing attackers from using trusted domains to exfiltrate data undetected. ]]>
2025-03-10T16:30:01+00:00 https://www.paloaltonetworks.com/blog/2025/03/rise-advanced-attacks-what-business-leaders-need-to-know/ www.secnews.physaphae.fr/article.php?IdArticle=8654899 False None None 2.0000000000000000
InfoSecurity Mag - InfoSecurity Magazine Sim échangeant des surtensions de fraude au Moyen-Orient<br>SIM Swapping Fraud Surges in the Middle East SIM swapping fraud surges in the Middle East as cybercriminals exploit websites mimicking legitimate services to steal personal data]]> 2025-03-10T16:30:00+00:00 https://www.infosecurity-magazine.com/news/sim-swapping-fraud-surges-middle/ www.secnews.physaphae.fr/article.php?IdArticle=8654907 False Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Pourquoi l'espace de travail Google moderne a besoin d'une sécurité unifiée<br>Why The Modern Google Workspace Needs Unified Security The Need For Unified Security Google Workspace is where teams collaborate, share ideas, and get work done. But while it makes work easier, it also creates new security challenges. Cybercriminals are constantly evolving, finding ways to exploit misconfigurations, steal sensitive data, and hijack user accounts. Many organizations try to secure their environment by piecing together different]]> 2025-03-10T16:30:00+00:00 https://thehackernews.com/2025/03/why-modern-google-workspace-needs.html www.secnews.physaphae.fr/article.php?IdArticle=8654859 False Threat None 2.0000000000000000 The Register - Site journalistique Anglais Sidewinder devient nucléaire, cours de graphiques pour le chaos maritime dans le changement de tactique<br>Sidewinder goes nuclear, charts course for maritime mayhem in tactics shift Phishing and ancient vulns still do the trick for one of the most prolific groups around Researchers say the Sidewinder offensive cyber crew is starting to target maritime and nuclear organizations.…]]> 2025-03-10T16:01:11+00:00 https://go.theregister.com/feed/www.theregister.com/2025/03/10/sidewinder_tactics_shift/ www.secnews.physaphae.fr/article.php?IdArticle=8654894 False None APT-C-17 2.0000000000000000 ANSSI - Flux Étatique Francais Appel à commentaires sur le vote par internet pour les élections non politiques anssiadm lun 10/03/2025 - 15:40 Ce guide de recommandations cible la mise en œuvre du vote par Internet pour le vote non politique (associations, élections professionnelles, etc.). Il est destiné aux organisateurs de ces scrutins, aux prestataires fournisseurs de solutions de vote par Internet ainsi qu'aux tiers intervenant dans la vérification de la sincérité des scrutins. Ce guide s'inscrit dans le cadre d'une collaboration avec la Commission Nationale Informatique et Libertés (CNIL) et la mise à jour en 2025 de la recommandation relative à la sécurité des systèmes de vote par correspondance électronique, appelé aussi vote par Internet. Un projet de recommandation a été publié le 20 janvier 2025 sous la forme d'une consultation publique. Précisément, la recommandation de la CNIL définit des objectifs de sécurité à remplir pour protéger les données personnelles et respecter les grands principes électoraux (secret du vote, sincérité du scrutin, transparence). Le guide ANSSI fait, pour chaque objectif CNIL, des recommandations techniques pour répondre à l'objectif. Le guide couvre uniquement le recours au vote par Internet pour les élections non politiques, telles que les élections professionnelles. Les observations, commentaires et propositions peuvent être transmis jusqu'au 11 avril 2025, à l'adresse vote-electronique@ssi.gouv.fr et à l'aide de la fiche de relecture ci-dessous. Le public cible de cet appel à commentaires inclut : Les organisateurs de scrutin. Les prestataires fournisseurs de solutions de vote par correspondance électronique. Les tiers intervenant dans la vérification de la sincérité des scrutins, en particulier les experts indépendants (au sens de la délibération de la CNIL). L'ANSSI publiera, à l'issue de l'appel à commentaires et après consolidation des commentaires reçus, la version finale du guide ainsi qu'une synthèse anonymisée de ces commentaires. L'ANSSI remercie par avance tous ceux qui répondront &agra]]> 2025-03-10T15:40:31+00:00 https://cyber.gouv.fr/actualites/appel-commentaires-sur-le-vote-par-internet-pour-les-elections-non-politiques www.secnews.physaphae.fr/article.php?IdArticle=8654892 False None None 3.0000000000000000 Data Security Breach - Site de news Francais DeepSeek : 12 000 Clés API Exposées - L\'IA, nouvelle faille de sécurité ? 2025-03-10T15:25:03+00:00 https://www.datasecuritybreach.fr/deepseek-12-000-cles-api-exposees-lia-nouvelle-faille-de-securite/ www.secnews.physaphae.fr/article.php?IdArticle=8654895 False None None 2.0000000000000000 Korben - Bloger francais Trae - Un IDE gratuit dopé à l\'IA Trae est un nouvel environnement de développement (IDE) qui n’est pas juste un énième éditeur de code avec un chatbot greffé sur le côté. Il faut plutôt le vir comme un partenaire de développement pensé pour une collaboration fluide entre vous et l’intelligence artificielle. Contrairement à d’autres outils qui se contentent d’analyser le fichier ouvert, Trae est conçu pour comprendre l’intégralité de votre base de code comme peut le faire Cursor ou Windsurf. Il explore ainsi votre espace de travail, analyse vos fichiers, et même les sorties de votre terminal pour vous proposer des suggestions parfaitement adaptées à votre projet.]]> 2025-03-10T15:16:18+00:00 https://korben.info/trae-ide-qui-transforme-ia-en-partenaire-de-code.html www.secnews.physaphae.fr/article.php?IdArticle=8654883 False Tool None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) ⚡ Recaps hebdomadaire thn: nouvelles attaques, anciens astuces, plus grand impact<br>⚡ THN Weekly Recap: New Attacks, Old Tricks, Bigger Impact Cyber threats today don\'t just evolve-they mutate rapidly, testing the resilience of everything from global financial systems to critical infrastructure. As cybersecurity confronts new battlegrounds-ranging from nation-state espionage and ransomware to manipulated AI chatbots-the landscape becomes increasingly complex, prompting vital questions: How secure are our cloud environments? Can our]]> 2025-03-10T15:16:00+00:00 https://thehackernews.com/2025/03/thn-weekly-recap-new-attacks-old-tricks.html www.secnews.physaphae.fr/article.php?IdArticle=8654845 False Ransomware,Cloud None 3.0000000000000000 TroyHunt - Blog Security DOJ: Google doit vendre Chrome, Android pourrait être le prochain<br>DOJ: Google must sell Chrome, Android could be next Google says government proposals would "harm America\'s consumers."]]> 2025-03-10T15:07:29+00:00 https://arstechnica.com/google/2025/03/doj-google-must-sell-chrome-android-could-be-next/ www.secnews.physaphae.fr/article.php?IdArticle=8654891 False Mobile None 2.0000000000000000 Dark Reading - Informationweek Branch Quand les secondes comptent: comment survivre les microburstes DDOS rapides et furieux<br>When Seconds Count: How to Survive Fast-and-Furious DDoS Microbursts In the battle against two-minute micro-attacks that can knock out critical communication services, the difference between success and failure can literally come down to seconds.]]> 2025-03-10T15:00:00+00:00 https://www.darkreading.com/cyberattacks-data-breaches/survive-fast-furious-ddos-microbursts www.secnews.physaphae.fr/article.php?IdArticle=8654875 False None None 3.0000000000000000 Checkpoint Research - Fabricant Materiel Securite 10 mars - Rapport de renseignement sur les menaces<br>10th March – Threat Intelligence Report Pour les dernières découvertes en cyber recherche pour la semaine du 10 mars, veuillez télécharger notre bulletin de renseignement sur les menaces. Les principales attaques et violation de la ville de Mission, au Texas, ont déclaré un état d'urgence local à la suite d'un grave incident de cybersécurité qui menace d'exposer des informations personnelles protégées, des dossiers de santé et d'autres données critiques gérées par […]
>For the latest discoveries in cyber research for the week of 10th March, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES The City of Mission, Texas, has declared a local state of emergency following a severe cybersecurity incident that threatens to expose protected personal information, health records, and other critical data managed by […] ]]>
2025-03-10T14:45:38+00:00 https://research.checkpoint.com/2025/10th-march-threat-intelligence-report/ www.secnews.physaphae.fr/article.php?IdArticle=8654890 False Threat None 3.0000000000000000
Zataz - Magazine Francais de secu Arrestation du fondateur de YesCoin et démantèlement d\'un réseau de fraude utilisant des SIM box 2025-03-10T14:43:23+00:00 https://www.zataz.com/arrestation-du-fondateur-de-yescoin-et-demantelement-dun-reseau-de-fraude-utilisant-des-sim-box/ www.secnews.physaphae.fr/article.php?IdArticle=8654885 False None None 3.0000000000000000 IndustrialCyber - cyber risk firms for industrial Assurer la sécurité de bout en bout pour les flux de données<br>Ensuring End-to-End Security for Data Flows Debout au milieu d'une salle de contrôle de colibri, vous pourriez voir une rangée d'indicateurs d'état flash ...
>Standing in the midst of a humming control room, you might see a row of status indicators flash... ]]>
2025-03-10T14:27:51+00:00 https://industrialcyber.co/industrial-cyber-attacks/ensuring-end-to-end-security-for-data-flows/ www.secnews.physaphae.fr/article.php?IdArticle=8654886 False None None 3.0000000000000000
Data Security Breach - Site de news Francais Sécurité électorale : le rôle de la CISA fragilisé par le retrait du soutien fédéral 2025-03-10T14:14:07+00:00 https://www.datasecuritybreach.fr/securite-electorale-le-role-de-la-cisa-fragilise-par-le-retrait-du-soutien-federal/ www.secnews.physaphae.fr/article.php?IdArticle=8654887 False None None 3.0000000000000000 Mandiant - Blog Sécu de Mandiant Temps de démêlage: une plongée profonde dans les bugs d'émulation d'instructions TTD<br>Unraveling Time: A Deep Dive into TTD Instruction Emulation Bugs Executive Summary This blog post presents an in-depth exploration of Microsoft\'s Time Travel Debugging (TTD) framework, a powerful record-and-replay debugging framework for Windows user-mode applications. TTD relies heavily on accurate CPU instruction emulation to faithfully replay program executions. However, subtle inaccuracies within this emulation process can lead to significant security and reliability issues, potentially masking vulnerabilities or misleading critical investigations-particularly incident response and malware analysis-potentially causing analysts to overlook threats or draw incorrect conclusions. Furthermore, attackers can exploit these inaccuracies to intentionally evade detection or disrupt forensic analyses, severely compromising investigative outcomes.  The blog post examines specific challenges, provides historical context, and analyzes real-world emulation bugs, highlighting the critical importance of accuracy and ongoing improvement to ensure the effectiveness and reliability of investigative tooling. Ultimately, addressing these emulation issues directly benefits users by enhancing security analyses, improving reliability, and ensuring greater confidence in their debugging and investigative processes. Overview We begin with an introduction to TTD, detailing its use of a sophisticated CPU emulation layer powered by the Nirvana runtime engine. Nirvana translates guest instructions into host-level micro-operations, enabling detailed capture and precise replay of a program\'s execution history. The discussion transitions into exploring historical challenges in CPU emulation, particularly for the complex x86 architecture. Key challenges include issues with floating-point and SIMD operations, memory model intricacies, peripheral and device emulation, handling of self-modifying code, and the constant trade-offs between performance and accuracy. These foundational insights lay the groundwork for our deeper examination of specific instruction emulation bugs discovered within TTD. These include: A bug involving the emulation of the pop r16, resulting in critical discrepancies between native execution and TTD instrumentation. An issue with the push segment instruction that demonstrates differences between Intel and AMD CPU implementations, highlighting the importance of accurate emulation aligned with hardware behavior Errors in the implementation of the lodsb and lodsw instructions, where TTD incorrectly clears upper bits t]]> 2025-03-10T14:00:00+00:00 https://cloud.google.com/blog/topics/threat-intelligence/ttd-instruction-emulation-bugs/ www.secnews.physaphae.fr/article.php?IdArticle=8654881 False Malware,Tool,Vulnerability,Threat,Technical None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine La surtension des packages de logiciels malveillants exploite les défauts du système<br>Surge in Malicious Software Packages Exploits System Flaws A new report by Fortinet reveals techniques used by attackers to evade detection and compromise systems]]> 2025-03-10T14:00:00+00:00 https://www.infosecurity-magazine.com/news/malicious-software-packages/ www.secnews.physaphae.fr/article.php?IdArticle=8654877 False None None 3.0000000000000000 Checkpoint - Fabricant Materiel Securite Le danger croissant de Blind Eagle: l'un des groupes de cyber-criminels les plus dangereux de l'Amérique latine cible la Colombie<br>The Growing Danger of Blind Eagle: One of Latin America\\'s Most Dangerous Cyber Criminal Groups Targets Colombia 2025-03-10T13:47:20+00:00 https://blog.checkpoint.com/research/the-growing-danger-of-blind-eagle-one-of-latin-americas-most-dangerous-cyber-criminal-groups-targets-colombia/ www.secnews.physaphae.fr/article.php?IdArticle=8654873 False Malware,Threat APT-C-36 3.0000000000000000 Detection At Scale - Blog de reverseur L'ingénieur de détection alimenté par l'IA<br>The AI-Powered Detection Engineer Transforming Security Monitoring with Code-First Detection Logic and Intelligent AI Automation]]> 2025-03-10T13:43:26+00:00 https://www.detectionatscale.com/p/the-ai-powered-detection-engineer www.secnews.physaphae.fr/article.php?IdArticle=8654874 False None None 3.0000000000000000 Zataz - Magazine Francais de secu ZATAZ repère une vague de faux sites de casinos visant les joueurs français 2025-03-10T13:20:43+00:00 https://www.zataz.com/zataz-repere-une-vague-de-faux-sites-de-casinos-visant-les-joueurs-francais/ www.secnews.physaphae.fr/article.php?IdArticle=8654878 False None None 3.0000000000000000 knowbe4 - cybersecurity services Un logiciel malveillant en génie social DeepFake en ingénierie social Deepfake en AI autonome compatible AI arrive!<br>Autonomous Agentic AI-Enabled Deepfake Social Engineering Malware is Coming Your Way! Autonomous Agentic AI-Enabled Deepfake Social Engineering Malware is Coming Your Way! ]]> 2025-03-10T13:17:27+00:00 https://blog.knowbe4.com/autonomous-agentic-ai-enabled-deepfake-social-engineering-malware-is-coming-your-way www.secnews.physaphae.fr/article.php?IdArticle=8654876 False Malware None 3.0000000000000000 Fortinet - Fabricant Materiel Securite Fortinet identifie les forfaits malveillants dans la nature: idées et tendances à partir de novembre 2024<br>Fortinet Identifies Malicious Packages in the Wild: Insights and Trends from November 2024 Onward FortiGuard Labs analyzes malicious software packages detected from November 2024 to the present and has identified various techniques used to exploit system vulnerabilities. Learn more.]]> 2025-03-10T13:00:00+00:00 https://www.fortinet.com/blog/threat-research/fortinet-identifies-malicious-packages-in-the-wild-insights-and-trends www.secnews.physaphae.fr/article.php?IdArticle=8654863 False Vulnerability,Threat None 2.0000000000000000 Dragos - CTI Society Réseau, apprendre, défendre: le forum Dragos aide à autonomiser les professionnels de la sécurité des OT<br>Network, Learn, Defend: the Dragos Forum Helps to Empower OT Security Professionals Êtes-vous un propriétaire ou un opérateur d'actifs dans le secteur industriel, travaillant à fortifier votre posture de cybersécurité OT contre toujours ... Le message Network, apprend, défendez-vous: le forum DragOS aide à permettre aux professionnels de la sécurité OT qui ont d'abord apporté dragos .
>Are you an asset owner or operator in the industrial sector, working to fortify your OT cybersecurity posture against ever-evolving... The post Network, Learn, Defend: the Dragos Forum Helps to Empower OT Security Professionals  first appeared on Dragos.]]>
2025-03-10T13:00:00+00:00 https://www.dragos.com/blog/network-learn-defend-dragos-forum-helps-to-empower-ot-security-professionals/ www.secnews.physaphae.fr/article.php?IdArticle=8654871 False Industrial None 3.0000000000000000
Checkpoint Research - Fabricant Materiel Securite Aigle aveugle:… et justice pour tous<br>Blind Eagle: …And Justice for All Points clés Introduction APT-C-36, également connu sous le nom de Blind Eagle, est un groupe de menaces qui se livre à la fois dans l'espionnage et la cybercriminalité. Il cible principalement les organisations en Colombie et d'autres pays d'Amérique latine. Actif depuis 2018, ce groupe avancé de menace persistante (APT) se concentre sur les institutions gouvernementales, les organisations financières et les infrastructures critiques. Blind Eagle est connu pour utiliser […]
>Key Points Introduction APT-C-36, also known as Blind Eagle, is a threat group that engages in both espionage and cybercrime. It primarily targets organizations in Colombia and other Latin American countries. Active since 2018, this Advanced Persistent Threat (APT) group focuses on government institutions, financial organizations, and critical infrastructure. Blind Eagle is known for employing […] ]]>
2025-03-10T12:56:28+00:00 https://research.checkpoint.com/2025/blind-eagle-and-justice-for-all/ www.secnews.physaphae.fr/article.php?IdArticle=8654870 False Threat APT-C-36 3.0000000000000000
The Register - Site journalistique Anglais Comment ne pas faire up votre réponse aux incidents de sécurité<br>How NOT to f-up your security incident response Experts say that the way you handle things after the criminals break in can make things better or much, much worse Feature  Experiencing a ransomware infection or other security breach ranks among the worst days of anyone\'s life - but it can still get worse.…]]> 2025-03-10T12:42:19+00:00 https://go.theregister.com/feed/www.theregister.com/2025/03/10/incident_response_advice/ www.secnews.physaphae.fr/article.php?IdArticle=8654864 False Ransomware None 3.0000000000000000 CyberSecurityVentures - cybersecurity services Hack Global Cybersecurity ETF atteint 1 milliard de dollars d'actifs sous gestion<br>HACK Global Cybersecurity ETF Reaches $1B In Assets Under Management Cette semaine en cybersécurité des éditeurs du magazine Cybercrime - lisez l'histoire complète de Betashares Sausalito, Californie - 10 mars 2025 avec tant de dispositifs interconnectés en affaires et à la maison, la cybersécurité n'est pas un élément de ligne sur les budgets - It \\ est une nécessité
>This week in cybersecurity from the editors at Cybercrime Magazine –Read the full story in Betashares Sausalito, Calif. – Mar. 10, 2025 With so many interconnected devices in business and at home, cybersecurity isn\'t just a line item on IT budgets – it\'s a necessity ]]>
2025-03-10T12:31:13+00:00 https://cybersecurityventures.com/hack-global-cybersecurity-etf-reaches-1b-in-assets-under-management/ www.secnews.physaphae.fr/article.php?IdArticle=8654862 False Hack None 2.0000000000000000
InfoSecurity Mag - InfoSecurity Magazine RECHERCHE DE L'IA UK sous la menace des pirates d'État-nation<br>UK AI Research Under Threat From Nation-State Hackers The Alan Turing institute urged government and academia to address systemic cultural and structural security barriers in UK AI research]]> 2025-03-10T12:30:00+00:00 https://www.infosecurity-magazine.com/news/uk-ai-research-nation-state/ www.secnews.physaphae.fr/article.php?IdArticle=8654865 False Threat None 2.0000000000000000 Cyble - CyberSecurity Firm Trois VMware Zero-Days sous exploitation active - ce que vous devez savoir<br>Three VMware Zero-Days Under Active Exploitation – What You Need to Know 2025-03-10T12:10:47+00:00 https://cyble.com/blog/three-vmware-zero-days-under-active-exploitation/ www.secnews.physaphae.fr/article.php?IdArticle=8654866 False Vulnerability,Threat,Patching,Cloud,Technical None 2.0000000000000000 IndustrialCyber - cyber risk firms for industrial Le centre de cyber-intelligence de Kela détaille plus d'informations sur les tactiques de ransomware de Black Basta \\, les stratégies de sélection des victimes<br>KELA\\'s Cyber Intelligence Center details more insights on Black Basta\\'s ransomware tactics, victim selection strategies Following their recent reveal that the Black Basta leak exposed ransomware tactics, researchers from the KELA\'s Cyber Intelligence... ]]> 2025-03-10T12:07:12+00:00 https://industrialcyber.co/ransomware/kelas-cyber-intelligence-center-details-more-insights-on-black-bastas-ransomware-tactics-victim-selection-strategies/ www.secnews.physaphae.fr/article.php?IdArticle=8654858 False Ransomware None 2.0000000000000000 SecurityWeek - Security News Google a payé 12 millions de dollars via des programmes de primes de bogues en 2024<br>Google Paid Out $12 Million via Bug Bounty Programs in 2024 En 2024, Google a versé près de 12 millions de dollars en primes de bogues grâce à ses programmes de récompense de vulnérabilité remaniés.
>In 2024, Google paid out nearly $12 million in bug bounties through its revamped vulnerability reward programs. ]]>
2025-03-10T12:07:05+00:00 https://www.securityweek.com/google-paid-out-12-million-via-bug-bounty-programs-in-2024/ www.secnews.physaphae.fr/article.php?IdArticle=8654855 False Vulnerability None 3.0000000000000000
Zataz - Magazine Francais de secu REFUND : 30 millions d\'euros détournés via à une arnaque de faux retours 2025-03-10T11:56:16+00:00 https://www.zataz.com/refund-30-millions-deuros-detournes-via-a-une-arnaque-de-faux-retours/ www.secnews.physaphae.fr/article.php?IdArticle=8654856 False None None 2.0000000000000000 Bleeping Computer - Magazine Américain Google a payé 12 millions de dollars en primes de bug l'année dernière aux chercheurs en sécurité<br>Google paid $12 million in bug bounties last year to security researchers Google paid almost $12 million in bug bounty rewards to 660 security researchers who reported security bugs through the company\'s Vulnerability Reward Program (VRP) in 2024. [...]]]> 2025-03-10T11:36:01+00:00 https://www.bleepingcomputer.com/news/security/google-paid-12-million-in-bug-bounties-last-year-to-security-researchers/ www.secnews.physaphae.fr/article.php?IdArticle=8654893 False Vulnerability None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine La Suisse oblige les rapports de cyberattaques pour les infrastructures critiques<br>Switzerland Mandates Cyber-Attack Reporting for Critical Infrastructure Starting April 2025, Swiss critical infrastructure organizations will have to report cyber-attacks to the country\'s authorities within 24 hours of discovery]]> 2025-03-10T11:30:00+00:00 https://www.infosecurity-magazine.com/news/switzerland-mandates-cyber/ www.secnews.physaphae.fr/article.php?IdArticle=8654857 False None None 3.0000000000000000 Schneier on Security - Chercheur Cryptologue Américain Des milliers de sites Web WordPress infectés par des logiciels malveillants<br>Thousands of WordPress Websites Infected with Malware quatre backdoors distincts : La création de quatre baignoires facilite les attaquants qui ont plusieurs points de rentrée devraient être détectés et supprimés. Un cas unique que nous n'avons jamais vu auparavant. Qui introduit un autre type d'attaque réalisé éventuellement en abusant de sites Web qui ne surveillent pas les dépendances tierces dans le navigateur de leurs utilisateurs. le quatre baisses arrière : Les fonctions des quatre déambulations sont expliquées ci-dessous: Backdoor 1, qui télécharge et installe un faux plugin nommé «Processeur Ultra SEO», qui est ensuite utilisé pour exécuter des commandes émises à l'attaquant ...
The malware includes four separate backdoors: Creating four backdoors facilitates the attackers having multiple points of re-entry should one be detected and removed. A unique case we haven’t seen before. Which introduces another type of attack made possibly by abusing websites that don’t monitor 3rd party dependencies in the browser of their users. The four backdoors: The functions of the four backdoors are explained below: Backdoor 1, which uploads and installs a fake plugin named “Ultra SEO Processor,” which is then used to execute attacker-issued commands ...]]>
2025-03-10T11:01:17+00:00 https://www.schneier.com/blog/archives/2025/03/thousands-of-wordpress-websites-infected-with-malware.html www.secnews.physaphae.fr/article.php?IdArticle=8654848 False Malware None 3.0000000000000000
Dark Reading - Informationweek Branch Les logiciels malveillants hébergés par Github infectent les utilisateurs de 1M Windows<br>GitHub-Hosted Malware Infects 1M Windows Users Microsoft has identified a complex, malvertising-based attack chain that delivered Lumma and other infostealers to enterprise and consumer PC users; the campaign is unlikely the last of its kind.]]> 2025-03-10T10:43:45+00:00 https://www.darkreading.com/endpoint-security/github-hosted-malware-1m-windows-users www.secnews.physaphae.fr/article.php?IdArticle=8654914 False Malware None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Développeur du Texas condamné après Kill Switch Sabotage Terrain<br>Texas Developer Convicted After Kill Switch Sabotage Plot Software developer Davis Lu cost his employer hundreds of thousands after deploying malware that caused crashes and failed logins]]> 2025-03-10T10:30:00+00:00 https://www.infosecurity-magazine.com/news/texas-dev-convicted-kill-switch/ www.secnews.physaphae.fr/article.php?IdArticle=8654850 False Malware None 3.0000000000000000 Global Security Mag - Site de news francais Kaspersky dévoile la dernière stratégie en date des cybercriminels : faire chanter des Youtubeurs pour qu\'ils diffusent des logiciels malveillants de minage de cryptomonnaie Malwares]]> 2025-03-10T10:24:08+00:00 https://www.globalsecuritymag.fr/kaspersky-devoile-la-derniere-strategie-en-date-des-cybercriminels-faire.html www.secnews.physaphae.fr/article.php?IdArticle=8654851 False None None 4.0000000000000000 Global Security Mag - Site de news francais Armis prend le contrôle d'Otorio<br>Armis übernimmt OTORIO Business
Armis übernimmt OTORIO und stärkt seine Führungsrolle in der Sicherheit Cyber-Physischer Systeme Dritte Übernahme in weniger als 12 Monaten erweitert die Fähigkeiten von Armis Centrix™ in der OT/ICS-Sicherheit - Business]]>
2025-03-10T10:22:12+00:00 https://www.globalsecuritymag.fr/armis-ubernimmt-otorio.html www.secnews.physaphae.fr/article.php?IdArticle=8654852 False Industrial None 2.0000000000000000
Zataz - Magazine Francais de secu Escroquerie au président : la menace des faux RIB pour détourner les salaires 2025-03-10T10:09:05+00:00 https://www.zataz.com/escroquerie-au-president-la-menace-des-faux-rib-pour-detourner-les-salaires/ www.secnews.physaphae.fr/article.php?IdArticle=8654849 False None None 3.0000000000000000 Kaspersky - Kaspersky Research blog Sidewinder cible les secteurs maritimes et nucléaires avec un ensemble d'outils mis à jour<br>SideWinder targets the maritime and nuclear sectors with an updated toolset In this article, we discuss the tools and TTPs used in the SideWinder APT\'s attacks in H2 2024, as well as shifts in its targets, such as an increase in attacks against the maritime and logistics sectors.]]> 2025-03-10T10:00:36+00:00 https://securelist.com/sidewinder-apt-updates-its-toolset-and-targets-nuclear-sector/115847/ www.secnews.physaphae.fr/article.php?IdArticle=8654837 False Tool APT-C-17 3.0000000000000000 We Live Security - Editeur Logiciel Antivirus ESET Déception dirigée par l'AI: un nouveau visage de la fraude d'entreprise<br>AI-driven deception: A new face of corporate fraud Malicious use of AI is reshaping the fraud landscape, creating major new risks for businesses]]> 2025-03-10T10:00:00+00:00 https://www.welivesecurity.com/en/cybersecurity/ai-driven-deception-new-face-corporate-fraud/ www.secnews.physaphae.fr/article.php?IdArticle=8661308 False None None 2.0000000000000000 IndustrialCyber - cyber risk firms for industrial L'Idaho et l'INL mènent la charge en génie cyber-informé pour protéger les systèmes d'eau<br>Idaho and INL lead the charge in cyber-informed engineering to protect water systems Idaho and the Idaho National Laboratory (INL) are at the forefront of efforts to safeguard public health in... ]]> 2025-03-10T09:53:58+00:00 https://industrialcyber.co/cyber-informed-engineering/idaho-and-inl-lead-the-charge-in-cyber-informed-engineering-to-protect-water-systems/ www.secnews.physaphae.fr/article.php?IdArticle=8654843 False None None 3.0000000000000000 IndustrialCyber - cyber risk firms for industrial Le comité de la Chambre exhorte la TSA à renforcer le cadre de cybersécurité au milieu des menaces croissantes pour les infrastructures de transport<br>House Committee urges TSA to strengthen cybersecurity framework amid rising threats to transportation infrastructure The U.S. House Committee on Homeland Security addressed a letter to Adam Stahl, the Acting Administrator of the... ]]> 2025-03-10T09:49:20+00:00 https://industrialcyber.co/regulation-standards-and-compliance/house-committee-urges-tsa-to-strengthen-cybersecurity-framework-amid-rising-threats-to-transportation-infrastructure/ www.secnews.physaphae.fr/article.php?IdArticle=8654844 False None None 3.0000000000000000 Data Security Breach - Site de news Francais Arnaque au faux ransomware : des lettres physiques ciblent les cadres dirigeants​ 2025-03-10T09:47:57+00:00 https://www.datasecuritybreach.fr/arnaque-au-faux-ransomware-des-lettres-physiques-ciblent-les-cadres-dirigeants/ www.secnews.physaphae.fr/article.php?IdArticle=8654842 False Ransomware None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Silentcryptominer infecte 2 000 utilisateurs russes via les faux VPN et les outils de contournement DPI<br>SilentCryptoMiner Infects 2,000 Russian Users via Fake VPN and DPI Bypass Tools A new mass malware campaign is infecting users with a cryptocurrency miner named SilentCryptoMiner by masquerading it as a tool designed to circumvent internet blocks and restrictions around online services. Russian cybersecurity company Kaspersky said the activity is part of a larger trend where cybercriminals are increasingly leveraging Windows Packet Divert (WPD) tools to distribute malware]]> 2025-03-10T09:42:00+00:00 https://thehackernews.com/2025/03/silentcryptominer-infects-2000-russian.html www.secnews.physaphae.fr/article.php?IdArticle=8654818 False Malware,Tool,Prediction None 3.0000000000000000 Global Security Mag - Site de news francais Smartphones, Smartwatches, Tablets – beim Thema Phishing gehen Angreifer zunehmend ‚Mobile First\' Sonderberichte ]]> 2025-03-10T09:32:06+00:00 https://www.globalsecuritymag.fr/smartphones-smartwatches-tablets-beim-thema-phishing-gehen-angreifer-zunehmend.html www.secnews.physaphae.fr/article.php?IdArticle=8654839 False None None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Le nombre de copies de frappe de cobalt non autorisées chute 80%<br>Number of Unauthorized Cobalt Strike Copies Plummets 80% Fortra claims the number of unauthorized Cobalt Strike licenses in the wild fell 80% over two years]]> 2025-03-10T09:30:00+00:00 https://www.infosecurity-magazine.com/news/number-unauthorized-cobalt-strike/ www.secnews.physaphae.fr/article.php?IdArticle=8654838 False None None 4.0000000000000000 Korben - Bloger francais Compresseur d\'images - L\'allié discret de vos sites web ReducePNGSize. Cet outil en ligne fait l’effet d’une potion magique en réduisant le poids de vos images jusqu’à 90% sans que les visiteurs de votre site ne voient la différence. J’ai testé avec des PNG mais aussi des WebP et des JPEG et rien ne lui résiste ! Il compresse même les SVG, ce qui en fait un outil assez universel.]]> 2025-03-10T09:25:45+00:00 https://korben.info/compresseur-images-allie-discret-sites-web.html www.secnews.physaphae.fr/article.php?IdArticle=8654840 False None None 3.0000000000000000 Cyble - CyberSecurity Firm Rapport de vulnérabilité ICS: Flaws critiques dans les systèmes de vidéosurveillance, de RTOS et de génome<br>ICS Vulnerability Report: Critical Flaws in CCTV, RTOS and Genome Systems 2025-03-10T09:02:21+00:00 https://cyble.com/blog/ics-vulnerability-cctv-rtos-and-genome-systems/ www.secnews.physaphae.fr/article.php?IdArticle=8654832 False Tool,Vulnerability,Threat,Patching,Industrial,Medical,Commercial None 3.0000000000000000 The Last Watchdog - Blog Sécurité de Byron V Acohido Essai d'invité: quatre stratégies essentielles pour renforcer la cyber-résilience dans les infrastructures critiques<br>GUEST ESSAY: Four essential strategies to bolster cyber resilience in critical infrastructure En 2023, les victimes ont signalé presque 900 000 plaintes cybercriminales au FBI. Au total, les pertes ont éclipsé 12,5 milliards de dollars - une augmentation significative de 22% par rapport aux pertes en 2022. lié: combler l'écart de résilience Sans surprise, les experts prédisent que cette tendance continuera de croître… (plus…) ]]> 2025-03-10T07:04:47+00:00 https://www.lastwatchdog.com/guest-essay-four-essential-strategies-to-bolster-cyber-resilience-in-critical-infrastructure/ www.secnews.physaphae.fr/article.php?IdArticle=8654825 False Prediction None 3.0000000000000000 The State of Security - Magazine Américain Comprendre la plate-forme de filtrage Windows (WFP): un aperçu rapide<br>Understanding the Windows Filtering Platform (WFP): A Quick Overview What is it? The Tripwire Enterprise Critical Change Audit rules provide customers with the ability to monitor for critical events that could have a significant impact on a system. Monitoring for critical events can help administrators identify malicious and/or unexpected changes within their environment. Changes To CCA Additional rules were added to the Critical Change Audit rule set. These rules provide customers the ability to monitor for changes to the firewall, installed certificates, expiring/expired certificates, USB devices (i.e. keyboards), WFP Filtering, and HTTP Proxy. Firewall...]]> 2025-03-10T04:57:17+00:00 https://www.tripwire.com/state-of-security/understanding-windows-filtering-platform-wfp-quick-overview www.secnews.physaphae.fr/article.php?IdArticle=8654836 False None None 3.0000000000000000 Global Security Mag - Site de news francais Armis acquiert OTORIO et propose dorénavant sa plateforme Armis Centrix™ en version on premise Marchés]]> 2025-03-10T02:13:00+00:00 https://www.globalsecuritymag.fr/armis-acquiert-otorio-et-propose-dorenavant-sa-plateforme-armis-centrix-tm-en.html www.secnews.physaphae.fr/article.php?IdArticle=8654938 False Industrial None 3.0000000000000000 The Register - Site journalistique Anglais Microsoft admet que Github stockait des logiciels malveillants qui ont infecté près d'un million d'appareils<br>Microsoft admits GitHub used to store malware that infected almost a million devices Also, phone cleaner apps are a data-sucking scam, Singapore considering the literal rod for scammers, and more Infosec in Brief  Microsoft has spotted a malvertising campaign that downloaded nastyware hosted on GitHub and exposed nearly a million devices to information thieves.…]]> 2025-03-10T01:56:06+00:00 https://go.theregister.com/feed/www.theregister.com/2025/03/10/infosec_in_brief/ www.secnews.physaphae.fr/article.php?IdArticle=8654809 False Malware None 3.0000000000000000 BBC - BBC News - Technology Les pirates nord-coréens encaissent des centaines de millions à partir de 1,5 milliard de dollars de piratage<br>North Korean hackers cash out hundreds of millions from $1.5bn ByBit hack Hackers from the infamous Lazarus Group are in a cat-and-mouse game to launder their stolen funds from the ByBit heist.]]> 2025-03-10T01:11:47+00:00 https://www.bbc.com/news/articles/c2kgndwwd7lo www.secnews.physaphae.fr/article.php?IdArticle=8654807 False Hack APT 38 3.0000000000000000 Silicon - Site de News Francais Cybersécurité du secteur santé : mieux vaut prévenir que guérir ! 2025-03-10T00:00:00+00:00 https://www.silicon.fr/Thematique/cybersecurite-1371/Breves/cybersecurite-secteur-sante-defis-risques-468610.htm#utm_source=IndexThematique&utm_medium=Rss&utm_campaign= www.secnews.physaphae.fr/article.php?IdArticle=8654901 False None None 3.0000000000000000 Silicon - Site de News Francais Backdoor ou pas ? La question des commandes non documentées 2025-03-10T00:00:00+00:00 https://www.silicon.fr/Thematique/cybersecurite-1371/Breves/backdoor-question-commandes-468617.htm#utm_source=IndexThematique&utm_medium=Rss&utm_campaign= www.secnews.physaphae.fr/article.php?IdArticle=8654900 False None None 3.0000000000000000 The Register - Site journalistique Anglais L'Inde veut des délais dans les nuages, les e-mails, le SaaS, pour les inspecteurs fiscaux<br>India wants backdoors into clouds, email, SaaS, for tax inspectors PLUS: Malaysia teams with Arm for local chip designs; NTT warns of possible breach; Samsung strikers settle; and more Asia in Brief  India\'s government has proposed giving its tax authorities sweeping powers to access private email systems and applications.…]]> 2025-03-09T23:58:10+00:00 https://go.theregister.com/feed/www.theregister.com/2025/03/09/asia_tech_news_roundup/ www.secnews.physaphae.fr/article.php?IdArticle=8654802 False Cloud None 3.0000000000000000 Techworm - News Microsoft avertit: malvertising infecte les appareils 1M + dans le monde entier<br>Microsoft Warns: Malvertising Infects 1M+ Devices Globally 2025-03-09T21:43:10+00:00 https://www.techworm.net/2025/03/microsoft-warn-malvertising-infect-devices-globally.html www.secnews.physaphae.fr/article.php?IdArticle=8654780 False Malware,Tool,Threat,Cloud,Technical None 2.0000000000000000 IndustrialCyber - cyber risk firms for industrial Autoriser les organisations à protéger les infrastructures critiques avec une surveillance avancée du réseau OT pour la défense des cyber-menaces<br>Empowering organizations to protect critical infrastructure with advanced OT network monitoring for cyber threat defense Increasing cyber threats and attacks have led modern organizations to focus on OT network monitoring, as it has... ]]> 2025-03-09T07:55:44+00:00 https://industrialcyber.co/features/empowering-organizations-to-protect-critical-infrastructure-with-advanced-ot-network-monitoring-for-cyber-threat-defense/ www.secnews.physaphae.fr/article.php?IdArticle=8654752 False Threat,Industrial None 3.0000000000000000 HexaCorn - Blog de recherche Chasse pour Warez et autres trucs douteux que les gens installent / téléchargez la partie 2<br>Hunting for the warez & other dodgy stuff people install / download, part 2 continuer à lire →
In the first part of this series we explored some basic search terms that can be used to find ‘unwanted’ software being installed on company endpoints. Today, I’d like to take this research a step further and look at other … Continue reading →]]>
2025-03-08T22:19:50+00:00 https://www.hexacorn.com/blog/2025/03/08/hunting-for-the-warez-other-dodgy-stuff-people-install-download-part-2/ www.secnews.physaphae.fr/article.php?IdArticle=8654726 False None None 3.0000000000000000
Zataz - Magazine Francais de secu Les informations de la semaine du 8 mars 2025 2025-03-08T13:44:37+00:00 https://www.zataz.com/les-informations-de-la-semaine-du-8-mars-2025/ www.secnews.physaphae.fr/article.php?IdArticle=8654696 False None None 2.0000000000000000 HackRead - Chercher Cyber Que se passe-t-il lorsque les notifications push deviennent malveillantes?<br>What Happens When Push Notifications Go Malicious? A Storm of Scams Awaits!]]> 2025-03-08T13:15:33+00:00 https://hackread.com/what-happens-when-push-notifications-go-malicious/ www.secnews.physaphae.fr/article.php?IdArticle=8654694 False None None 2.0000000000000000 Bleeping Computer - Magazine Américain Développeur coupable d'utiliser Kill Switch aux systèmes de Sabotage Employeur \\<br>Developer guilty of using kill switch to sabotage employer\\'s systems A software developer has been found guilty of sabotaging his ex-employer\'s systems by running custom malware and installing a "kill switch" after being demoted at the company. [...]]]> 2025-03-08T12:43:15+00:00 https://www.bleepingcomputer.com/news/security/developer-guilty-of-using-kill-switch-to-sabotage-employers-systems/ www.secnews.physaphae.fr/article.php?IdArticle=8654711 False Malware None 3.0000000000000000 Data Security Breach - Site de news Francais vulnérabilité initialement localisée, désormais mondiale ! 2025-03-08T11:56:03+00:00 https://www.datasecuritybreach.fr/cve-2024-4577-php/ www.secnews.physaphae.fr/article.php?IdArticle=8654687 False None None 2.0000000000000000 Zataz - Magazine Francais de secu L\'attaque historique contre Bybit : 1,4 milliard de dollars blanchis ! 2025-03-08T11:44:40+00:00 https://www.zataz.com/lattaque-historique-contre-bybit-14-milliard-de-dollars-blanchis/ www.secnews.physaphae.fr/article.php?IdArticle=8654686 False None None 2.0000000000000000 Bleeping Computer - Magazine Américain YouTubers a été extorqué par des coups de droit d'auteur pour répandre les logiciels malveillants<br>YouTubers extorted via copyright strikes to spread malware Cybercriminals are sending bogus copyright claims to YouTubers to coerce them into promoting malware and cryptocurrency miners on their videos. [...]]]> 2025-03-08T10:11:21+00:00 https://www.bleepingcomputer.com/news/security/youtubers-extorted-via-copyright-strikes-to-spread-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8654703 False Malware None 4.0000000000000000 Data Security Breach - Site de news Francais Une nouvelle menace sur Android : le virus EvilLoader cible les comptes Telegram 2025-03-08T09:53:25+00:00 https://www.datasecuritybreach.fr/une-nouvelle-menace-sur-android-le-virus-evilloader-cible-les-comptes-telegram/ www.secnews.physaphae.fr/article.php?IdArticle=8654678 False Mobile None 3.0000000000000000 Korben - Bloger francais shadPS4 - Le nouvel émulateur PS4 multi-plateformes shadPS4, un tout nouvel émulateur qui promet de faire tourner vos jeux PS4 préférés directement sur votre ordinateur. Et même si le projet est encore jeune, c’est prometteur car il y déjà a pas mal de jeux supportés. Développé en C++ par une équipe de passionnés, shadPS4 se distingue par sa compatibilité multi-plateformes. Que vous soyez sur Windows, Linux ou macOS, vous pourrez ainsi profiter de vos jeux PS4 (enfin, certains d’entre eux pour le moment) comme Castlevania Requiem: Symphony of the Night & Rondo of Blood, Peggle 2, Beach Buggy Racing 2: Island Adventure, Super Meat Boy, Puyo Puyo Tetris 2, DOOM, Sonic Mania et j’en passe.]]> 2025-03-08T09:00:00+00:00 https://korben.info/shadps4-emulateur-ps4-windows-linux-macos.html www.secnews.physaphae.fr/article.php?IdArticle=8654679 False None None 2.0000000000000000 Krebs on Security - Chercheur Américain Fedss Link 150 M $ Cyberheist à 2022 Hacks LastPass<br>Feds Link $150M Cyberheist to 2022 LastPass Hacks In September 2023, KrebsOnSecurity published findings from security researchers who concluded that a series of six-figure cyberheists across dozens of victims resulted from thieves cracking master passwords stolen from the password manager service LastPass in 2022. In a court filing this week, U.S. federal agents investigating a spectacular $150 million cryptocurrency heist said they had reached the same conclusion.]]> 2025-03-08T01:20:05+00:00 https://krebsonsecurity.com/2025/03/feds-link-150m-cyberheist-to-2022-lastpass-hacks/ www.secnews.physaphae.fr/article.php?IdArticle=8654652 False None LastPass 3.0000000000000000