www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2025-05-12T16:02:15+00:00 www.secnews.physaphae.fr InfoSecurity Mag - InfoSecurity Magazine Une nouvelle campagne de cyber-espionnage cible l'aviation et le transport des EAU<br>New Cyber-Espionage Campaign Targets UAE Aviation and Transport A cyber-espionage campaign targeting UAE aviation and transport has been identified by researchers, using customized lures to deploy Sosano malware]]> 2025-03-04T16:30:00+00:00 https://www.infosecurity-magazine.com/news/espionage-campaign-targets-uae/ www.secnews.physaphae.fr/article.php?IdArticle=8653497 False Malware None 2.0000000000000000 CyberScoop - scoopnewsgroup.com special Cyber La maison adopte une facture obligeant les entrepreneurs fédéraux à avoir des politiques de divulgation de vulnérabilité<br>House passes bill requiring federal contractors to have vulnerability disclosure policies La législation pour faire en sorte que les entrepreneurs mettent en œuvre des VDP alignés sur les directives du NIST visent à protéger les données des Américains \\ ', la co-sponsor Nancy Mace dit.
>The legislation to make contractors implement VDPs aligned with NIST guidelines is aimed at protecting Americans\' data, co-sponsor Rep. Nancy Mace says. ]]>
2025-03-04T16:19:35+00:00 https://cyberscoop.com/house-passes-federal-contractors-vdp-bill/ www.secnews.physaphae.fr/article.php?IdArticle=8653491 False Vulnerability,Legislation None 2.0000000000000000
Recorded Future - FLux Recorded Future Ordonnances du tribunal catalan Les anciens dirigeants du groupe NSO sont inculpés pour des abus de logiciels espions<br>Catalan court orders former NSO Group executives be indicted for spyware abuses A provincial court in Barcelona has ordered that three former senior executives at NSO Group, a prominent spyware manufacturer, be indicted for their alleged role in a high-profile hacking scandal in which at least 63 Catalan civil society members were targeted with the company\'s surveillance technology.]]> 2025-03-04T16:11:23+00:00 https://therecord.media/catalan-court-orders-nso-execs-investigated www.secnews.physaphae.fr/article.php?IdArticle=8653477 False None None 3.0000000000000000 HackRead - Chercher Cyber Les chasseurs annoncent de nouvelles capacités d'IA avec Pathfinder IA pour l'automatisation SoC plus intelligente<br>Hunters Announces New AI Capabilities with Pathfinder AI for Smarter SOC Automation Boston and Tel Aviv, United States, 4th March 2025, CyberNewsWire]]> 2025-03-04T16:10:14+00:00 https://hackread.com/hunters-announces-new-ai-capabilities-with-pathfinder-ai-for-smarter-soc-automation/ www.secnews.physaphae.fr/article.php?IdArticle=8653473 False None None 3.0000000000000000 Fortinet - Fabricant Materiel Securite Apprenez à protéger les systèmes OT au Sommet de sécurité Fortinet OT<br>Learn How to Protect OT Systems at the Fortinet OT Security Summit A Q&A about the upcoming Fortinet event for OT professionals and security leaders looking to protect their IT and OT systems.]]> 2025-03-04T16:00:00+00:00 https://www.fortinet.com/blog/business-and-technology/learn-how-to-protect-ot-systems-at-the-fortinet-ot-security-summit www.secnews.physaphae.fr/article.php?IdArticle=8653475 False Industrial None 2.0000000000000000 Recorded Future - FLux Recorded Future Les pirates soupçonnés de l'Iran ciblent les EAU avec des logiciels malveillants \\ 'sosano \\' nouvellement découverts<br>Suspected Iran-backed hackers target UAE with newly discovered \\'Sosano\\' malware Researchers say they spotted new backdoor malware that suspected Iranian regime-backed hackers have aimed at sectors such as aviation, satellite communications and critical transportation infrastructure in the United Arab Emirates.]]> 2025-03-04T15:53:29+00:00 https://therecord.media/sosano-malware-targets-uae-iran-suspected www.secnews.physaphae.fr/article.php?IdArticle=8653452 False Malware None 2.0000000000000000 MitnickSecurity - Former Hacker Services 5 Questions d'entrevue pour poser des tests de pénétration<br>5 Interview Questions to Ask Penetration Testing Companies Pénétration Testing Company Si vous n'avez jamais connu de violation de données, considérez-vous chanceux. Si vous l'avez fait, vous savez que c'est un cauchemar absolu. Avec les cybercriminels à la recherche de vulnérabilités, une stratégie de cybersécurité forte est le meilleur moyen de lutter contre ces risques et de protéger votre intelligence critique.
penetration testing company If you\'ve never experienced a data breach, consider yourself lucky. If you have, you know it\'s an absolute nightmare. With cyber criminals looking for vulnerabilities, a strong cybersecurity strategy is the best way to combat these risks and protect your critical intelligence.]]>
2025-03-04T15:47:41+00:00 https://www.mitnicksecurity.com/blog/penetration-testing-company www.secnews.physaphae.fr/article.php?IdArticle=8653448 False Data Breach,Vulnerability None 2.0000000000000000
InfoSecurity Mag - InfoSecurity Magazine VMware avertit les clients de corriger les vulnérabilités activement exploitées zéro-jours<br>VMware Warns Customers to Patch Actively Exploited Zero-Day Vulnerabilities Cloud software firm VMware has issued a critical security advisory, detailing three zero-day vulnerabilities being actively exploited in the wild]]> 2025-03-04T15:45:00+00:00 https://www.infosecurity-magazine.com/news/vmware-patch-exploited-zero-day/ www.secnews.physaphae.fr/article.php?IdArticle=8653451 False Vulnerability,Threat,Cloud None 3.0000000000000000 Ars Technica - Risk Assessment Security Hacktivism Apple annonce un iPad Air propulsé par M3 avec une disposition de clavier magique améliorée<br>Apple announces M3-powered iPad Air with improved Magic Keyboard layout The base iPad also doubled its storage, is "6x faster" than some Android models.]]> 2025-03-04T15:38:07+00:00 https://arstechnica.com/gadgets/2025/03/apple-announces-m3-powered-ipad-air-with-improved-magic-keyboard-layout/ www.secnews.physaphae.fr/article.php?IdArticle=8653518 False Mobile None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les pirates iraniens présumés ont utilisé le courrier électronique de la société indienne compromis à cibler U.A.E. Secteur de l'aviation<br>Suspected Iranian Hackers Used Compromised Indian Firm\\'s Email to Target U.A.E. Aviation Sector Threat hunters are calling attention to a new highly-targeted phishing campaign that singled out "fewer than five" entities in the United Arab Emirates (U.A.E.) to deliver a previously undocumented Golang backdoor dubbed Sosano. The malicious activity was specifically directed against aviation and satellite communications organizations, according to Proofpoint, which detected it in late October]]> 2025-03-04T15:28:00+00:00 https://thehackernews.com/2025/03/suspected-iranian-hackers-used.html www.secnews.physaphae.fr/article.php?IdArticle=8653348 False Threat None 3.0000000000000000 AlienVault Lab Blog - AlienVault est un acteur de defense majeur dans les IOC Implémentation HitRust par rapport aux niveaux de prisma mesurés: quelle est la différence?<br>HITRUST Implementation vs. Measured PRISMA Levels: What Is the Difference? 2025-03-04T15:22:00+00:00 https://levelblue.com/blogs/security-essentials/hitrust-implementation-vs-measured-prisma-levels www.secnews.physaphae.fr/article.php?IdArticle=8653449 False Legislation None 3.0000000000000000 IndustrialCyber - cyber risk firms for industrial MS-ISAC avertit de l'augmentation des cyber-menaces pour les installations SLTT, demande une amélioration de la résilience et de la coordination<br>MS-ISAC warns of rising cyber threats to SLTT installations, urges enhanced resilience and coordination The Multi-State Information Sharing and Analysis Center (MS-ISAC) has highlighted in a recent report the growing cyber threats... ]]> 2025-03-04T15:15:59+00:00 https://industrialcyber.co/reports/ms-isac-warns-of-rising-cyber-threats-to-sltt-installations-urges-enhanced-resilience-and-coordination/ www.secnews.physaphae.fr/article.php?IdArticle=8653454 False None None 3.0000000000000000 Recorded Future - FLux Recorded Future Concentrez-vous sur les algorithmes d'Elon Musk \\, pas ses mots, dit l'agence de désinformation de la France \\<br>Focus on Elon Musk\\'s algorithms, not his words, says France\\'s disinformation agency Anne-Sophie Dhiver, the deputy head of the French government agency Viginum, spoke to Recorded Future News about why and how her agency was addressing the threat of disinformation.]]> 2025-03-04T15:11:10+00:00 https://therecord.media/focus-on-musk-algorithms-not-words-france-disinfo-agency-interview www.secnews.physaphae.fr/article.php?IdArticle=8653453 False Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Le nouveau botnet onven11bot infecte 86 000 appareils pour les attaques DDOS<br>New Eleven11bot botnet infects 86,000 devices for DDoS attacks A new botnet malware named \'Eleven11bot\' has infected over 86,000 IoT devices, primarily security cameras and network video recorders (NVRs), to conduct DDoS attacks. [...]]]> 2025-03-04T15:10:04+00:00 https://www.bleepingcomputer.com/news/security/new-eleven11bot-botnet-infects-86-000-devices-for-ddos-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8653557 False Malware None 2.0000000000000000 IndustrialCyber - cyber risk firms for industrial Prendre les grandes décisions avec les diagrammes de cyber décision<br>Make The Big Decisions With Cyber Decision Diagrams Cet article est une version raccourcie de ma session S4x25. La photo me montre sur scène à Tampa, ...
>This article is a shortened version of my S4x25 session. The picture shows me on stage in Tampa,... ]]>
2025-03-04T15:05:19+00:00 https://industrialcyber.co/expert/make-the-big-decisions-with-cyber-decision-diagrams/ www.secnews.physaphae.fr/article.php?IdArticle=8653430 False None None 2.0000000000000000
Dark Reading - Informationweek Branch Pourquoi les emplois de cybersécurité sont difficiles à trouver au milieu d'une pénurie de travailleurs<br>Why Cybersecurity Jobs Are Hard to Find Amid a Worker Shortage The cybersecurity job market nowadays is facing an unusual paradox: Many roles seem open, but competition and hiring practices can make securing a position a real challenge.]]> 2025-03-04T15:00:00+00:00 https://www.darkreading.com/cybersecurity-operations/cybersecurity-jobs-hard-find-amid-worker-shortage www.secnews.physaphae.fr/article.php?IdArticle=8653442 False None None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Plus de 4 000 IPS IPS ciblés dans des attaques brutes pour déployer des voleurs d'informations et des cryptomineurs<br>Over 4,000 ISP IPs Targeted in Brute-Force Attacks to Deploy Info Stealers and Cryptominers Internet service providers (ISPs) in China and the West Coast of the United States have become the target of a mass exploitation campaign that deploys information stealers and cryptocurrency miners on compromised hosts. The findings come from the Splunk Threat Research Team, which said the activity also led to the delivery of various binaries that facilitate data exfiltration as well as offer]]> 2025-03-04T14:31:00+00:00 https://thehackernews.com/2025/03/over-4000-isp-networks-targeted-in.html www.secnews.physaphae.fr/article.php?IdArticle=8653349 False Threat None 3.0000000000000000 Detection At Scale - Blog de reverseur Enseigner aux agents de l'IA de sécurité pour naviguer dans votre organisation<br>Teaching Security AI Agents to Navigate Your Organization Learning your organization\'s security patterns that evolve with your business]]> 2025-03-04T14:14:36+00:00 https://www.detectionatscale.com/p/teaching-ai-agents-your-organization www.secnews.physaphae.fr/article.php?IdArticle=8654609 False None None 3.0000000000000000 IT Security Guru - Blog Sécurité Amélioration de la sécurité avec les journaux cloud élargis de Microsoft \\<br>Enhancing security with Microsoft\\'s expanded cloud logs Nation-state-sponsored hacking stories are a big part of everyone\'s favourite Hollywood movies - that is, until it becomes a real-life story of our own compromised personal or corporate sensitive data ending up on the dark web or in hackers\' hands. In real life, cyber espionage groups\' activities trigger stringent security enforcement. First in the government sector, then […] ]]> 2025-03-04T14:02:53+00:00 https://www.itsecurityguru.org/2025/03/04/enhancing-security-with-microsofts-expanded-cloud-logs/?utm_source=rss&utm_medium=rss&utm_campaign=enhancing-security-with-microsofts-expanded-cloud-logs www.secnews.physaphae.fr/article.php?IdArticle=8653610 False Legislation,Cloud None 3.0000000000000000 Fortinet - Fabricant Materiel Securite Fortinet est le seul vendeur reconnu comme un choix de clients \\ 'dans la voix du client de Gartner® Peer Insights ™ du client pour ZTNA 2025<br>Fortinet Is the Only Vendor Recognized as a Customers\\' Choice in the 2025 Gartner® Peer Insights™ Voice of the Customer for ZTNA Fortinet is the only vendor named as a 2025 Gartner Peer Insights™ Customers\' Choice for ZTNA. Learn more.]]> 2025-03-04T14:00:00+00:00 https://www.fortinet.com/blog/business-and-technology/foritnet-is-the-only-vendor-recognized-as-a-customer-choice-in-gartner-peer-insights-voc-for-ztna www.secnews.physaphae.fr/article.php?IdArticle=8653445 False None None 3.0000000000000000 Recorded Future - FLux Recorded Future Dark Caracal Group a peut-être actualisé ses logiciels malveillants, disent les chercheurs<br>Dark Caracal group might have refreshed its malware, researchers say Dark Caracal, a group suspected of cyber mercenary activities, appeared to shift to a new espionage tool in a campaign aimed at Latin American targets, according to researchers.]]> 2025-03-04T13:51:25+00:00 https://therecord.media/dark-caracal-hackers-poco-rat-bandook www.secnews.physaphae.fr/article.php?IdArticle=8653427 False Malware,Tool None 3.0000000000000000 Cyble - CyberSecurity Firm CISA ajoute de nouvelles vulnérabilités critiques au catalogue de vulnérabilités exploitées connues<br>CISA Adds New Critical Vulnerabilities to Known Exploited Vulnerabilities Catalog 2025-03-04T13:07:26+00:00 https://cyble.com/blog/cisa-adds-new-exploited-vulnerabilities-to-catalog/ www.secnews.physaphae.fr/article.php?IdArticle=8653393 False Tool,Vulnerability,Threat,Patching None 3.0000000000000000 Checkpoint - Fabricant Materiel Securite Cinq raisons pour lesquelles les chaînes de vente au détail ne peuvent ignorer le sase<br>Five Reasons Retail Chains Can\\'t Ignore SASE 2025-03-04T13:01:55+00:00 https://blog.checkpoint.com/harmony-sase/five-reasons-retail-chains-cant-ignore-sase/ www.secnews.physaphae.fr/article.php?IdArticle=8653425 False Tool None 2.0000000000000000 Recorded Future - FLux Recorded Future La Russie à redéployer les ressources libérées d'ici la fin de la guerre en Ukraine avertit le renseignement finlandais<br>Russia to redeploy resources freed up by end of war in Ukraine, warns Finnish intelligence “The end of the war in Ukraine will improve the ability of Russia to engage in hostile activity elsewhere in Europe as it pursues its political objectives by means both fair and foul,” the Finnish security and intelligence agency Supo said.]]> 2025-03-04T12:45:34+00:00 https://therecord.media/finland-intelligence-report-russia-redeploy-resources-after-ukraine-war www.secnews.physaphae.fr/article.php?IdArticle=8653408 False None None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Faux nord-coréens Les travailleurs informatiques tirent parti de GitHub pour construire des personnages de demandeur d'emploi<br>North Korean Fake IT Workers Leverage GitHub to Build Jobseeker Personas Nisos has found six personas leveraging new and existing GitHub accounts to get developer jobs in Japan and the US]]> 2025-03-04T12:45:00+00:00 https://www.infosecurity-magazine.com/news/north-korean-fake-it-workers-github/ www.secnews.physaphae.fr/article.php?IdArticle=8653407 False None None 3.0000000000000000 McAfee Labs - Editeur Logiciel Protégez votre famille des escroqueries avec ces 5 conseils de sécurité en ligne clés<br>Protect Your Family From Scams With These 5 Key Online Safety Tips ]]> 2025-03-04T12:30:03+00:00 https://www.mcafee.com/blogs/family-safety/protect-your-family-from-scams-with-these-5-key-online-safety-tips/ www.secnews.physaphae.fr/article.php?IdArticle=8653494 False None None 2.0000000000000000 Netskope - etskope est une société de logiciels américaine fournissant une plate-forme de sécurité informatique Permettre à Proactive It: comment l'IA transforme la visibilité du réseau<br>Enabling Proactive IT: How AI is Transforming Network Visibility Depuis des années, les équipes informatiques sont coincées dans un mode réactif, se brouillant pour résoudre les problèmes de performances du réseau qu'après que les utilisateurs se plaignent. Malgré une abondance d'outils de surveillance, le véritable défi a toujours été d'identifier et de résoudre les problèmes avant d'avoir un impact sur la productivité sans passer d'innombrables heures à dépanner manuel. Une enquête récente a révélé que 67% de […]
>For years, IT teams have been stuck in a reactive mode, scrambling to fix network performance issues only after users start complaining. Despite an abundance of monitoring tools, the real challenge has always been identifying and resolving issues before they impact productivity-without spending countless hours on manual troubleshooting. A recent survey revealed that 67% of […] ]]>
2025-03-04T12:30:00+00:00 https://www.netskope.com/blog/enabling-proactive-it-how-ai-is-transforming-network-visibility www.secnews.physaphae.fr/article.php?IdArticle=8653390 False Tool None 3.0000000000000000
Zataz - Magazine Francais de secu Identification des développeurs derrière un réseau mondial de deepfake 2025-03-04T12:09:44+00:00 https://www.zataz.com/microsoft-identifie-les-developpeurs-derriere-un-reseau-mondial-de-deepfake/ www.secnews.physaphae.fr/article.php?IdArticle=8653394 False None None 3.0000000000000000 Schneier on Security - Chercheur Cryptologue Américain L'outil d'IA Trojaned mène à Disney Hack<br>Trojaned AI Tool Leads to Disney Hack SAD STORY Des pirates qui prennent le contrôle de son ordinateur et, finalement, lui coûtant son travail.
This is a sad story of someone who downloaded a Trojaned AI tool that resulted in hackers taking over his computer and, ultimately, costing him his job.]]>
2025-03-04T12:08:31+00:00 https://www.schneier.com/blog/archives/2025/03/trojaned-ai-tool-leads-to-disney-hack.html www.secnews.physaphae.fr/article.php?IdArticle=8653391 False Hack,Tool None 2.0000000000000000
HackRead - Chercher Cyber Le nouveau voleur de zhong chinois infecte fintech via le support client<br>New Chinese Zhong Stealer Infects Fintech via Customer Support A new malware threat called Zhong Stealer has surfaced from China, and it\'s already slipping into businesses through…]]> 2025-03-04T12:06:26+00:00 https://hackread.com/chinese-zhong-stealer-infects-fintech-customer-support/ www.secnews.physaphae.fr/article.php?IdArticle=8653387 False Malware,Threat None 2.0000000000000000 Wired Threat Level - Security News Tous les meilleurs nouveaux gadgets au MWC 2025<br>All the Top New Gadgets at MWC 2025 At the annual tradeshow in Barcelona, we saw an ultra-slim smartphone, solar-powered laptop, and Google\'s Astra technology baked into its Gemini assistant, coming to Android phones soon.]]> 2025-03-04T12:03:30+00:00 https://www.wired.com/story/top-gadgets-at-mwc-2025/ www.secnews.physaphae.fr/article.php?IdArticle=8653392 False Mobile None 2.0000000000000000 ProofPoint - Cyber Firms Appelez cela comme vous voulez: l'acteur de menace offre un malware polyglotte à plusieurs étapes très ciblé<br>Call It What You Want: Threat Actor Delivers Highly Targeted Multistage Polyglot Malware 2025-03-04T12:02:54+00:00 https://www.proofpoint.com/us/blog/threat-insight/call-it-what-you-want-threat-actor-delivers-highly-targeted-multistage-polyglot www.secnews.physaphae.fr/article.php?IdArticle=8653588 False Malware,Tool,Threat,Technical,Commercial None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les risques de responsabilité du CISO stimulent les changements de politique à 93% des organisations<br>CISO Liability Risks Spur Policy Changes at 93% of Organizations Fastly found that organizations have introduced changes such as increasing CISO participation in strategic decisions in response to growing personal liability risks]]> 2025-03-04T12:00:00+00:00 https://www.infosecurity-magazine.com/news/ciso-liability-risks-policy-changes/ www.secnews.physaphae.fr/article.php?IdArticle=8653386 False None None 3.0000000000000000 Bleeping Computer - Magazine Américain Google étend la détection Android AI Scam à plus d'appareils de pixels<br>Google expands Android AI scam detection to more Pixel devices Google has announced an increased rollout of new AI-powered scam detection features on Android to help protect users from increasingly sophisticated phone and text social engineering scams. [...]]]> 2025-03-04T12:00:00+00:00 https://www.bleepingcomputer.com/news/security/google-expands-android-ai-scam-detection-to-more-pixel-devices/ www.secnews.physaphae.fr/article.php?IdArticle=8653523 False Mobile None 3.0000000000000000 GoogleSec - Firm Security Blog Nouvelles fonctionnalités de détection d'escroqueries alimentées par AI pour vous protéger sur Android<br>New AI-Powered Scam Detection Features to Help Protect You on Android arnaques et ]]> 2025-03-04T11:59:32+00:00 http://security.googleblog.com/2025/03/new-ai-powered-scam-detection-features.html www.secnews.physaphae.fr/article.php?IdArticle=8653538 False Spam,Tool,Threat,Mobile None 3.0000000000000000 Zataz - Magazine Francais de secu Cybercriminalité : un hacker derrière 90 dataleaks arrêté en Thaïlande 2025-03-04T11:42:41+00:00 https://www.zataz.com/cybercriminalite-un-hacker-derriere-90-dataleaks-arrete-en-thailande/ www.secnews.physaphae.fr/article.php?IdArticle=8653371 False None None 2.0000000000000000 SecurityWeek - Security News Google Patches Paire de vulnérabilités exploitées dans Android<br>Google Patches Pair of Exploited Vulnerabilities in Android La mise à jour de sécurité du mars 2025 d'Android s'adresse à plus de 40 vulnérabilités, dont deux activement exploitées dans la nature.
>Android\'s March 2025 security update addresses over 40 vulnerabilities, including two actively exploited in the wild. ]]>
2025-03-04T11:42:05+00:00 https://www.securityweek.com/google-patches-pair-of-exploited-vulnerabilities-in-android/ www.secnews.physaphae.fr/article.php?IdArticle=8653369 False Vulnerability,Mobile None 2.0000000000000000
Korben - Bloger francais Swasticars, Ioniq 5 et raclette en pleine nature 2025-03-04T11:21:32+00:00 https://korben.info/vehicules-electriques-2025-etat-du-marche-et-innovations.html www.secnews.physaphae.fr/article.php?IdArticle=8653367 False None None 3.0000000000000000 Korben - Bloger francais L\'IA joue à Super Mario… et à 13 ans j\'étais plus fort qu\'elle 2025-03-04T11:21:03+00:00 https://korben.info/lia-joue-a-super-mario-et-a-13-ans-jetais-plus-fort-quelle.html www.secnews.physaphae.fr/article.php?IdArticle=8653368 False None None 3.0000000000000000 Zataz - Magazine Francais de secu Opération Cumberland : répression contre les contenus pédopornographiques générés par l\'IA 2025-03-04T11:19:31+00:00 https://www.zataz.com/operation-cumberland-repression-contre-les-contenus-pedopornographiques-generes-par-lia/ www.secnews.physaphae.fr/article.php?IdArticle=8653372 False None None 2.0000000000000000 Bleeping Computer - Magazine Américain Les nouveaux logiciels malveillants polyglots frappent l'aviation, les entreprises de communication par satellite<br>New polyglot malware hits aviation, satellite communication firms A previously undocumented polyglot malware is being deployed in attacks against aviation, satellite communication, and critical transportation organizations in the United Arab Emirates. [...]]]> 2025-03-04T11:17:18+00:00 https://www.bleepingcomputer.com/news/security/new-polyglot-malware-hits-aviation-satellite-communication-firms/ www.secnews.physaphae.fr/article.php?IdArticle=8653478 False Malware None 2.0000000000000000 Zataz - Magazine Francais de secu La Russie va frapper sur ses pirates informatiques 2025-03-04T10:46:14+00:00 https://www.zataz.com/russie-pirate-informatique-loi-justice/ www.secnews.physaphae.fr/article.php?IdArticle=8653350 False None None 3.0000000000000000 Bleeping Computer - Magazine Américain Polish Space Agency Offline lors de sa récupation de Cyberattack<br>Polish Space Agency offline as it recovers from cyberattack ​The Polish Space Agency (POLSA) has been offline since it disconnected its systems from the Internet over the weekend to contain a breach of its IT infrastructure. [...]]]> 2025-03-04T10:32:01+00:00 https://www.bleepingcomputer.com/news/security/polish-space-agency-offline-as-it-recovers-from-cyberattack/ www.secnews.physaphae.fr/article.php?IdArticle=8653455 False None None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine La CISA exhorte le gouvernement à corriger Cisco, Microsoft Flaws<br>CISA Urges Government to Patch Exploited Cisco, Microsoft Flaws CISA has added five more CVEs into its known exploited vulnerabilities catalog]]> 2025-03-04T10:30:00+00:00 https://www.infosecurity-magazine.com/news/cisa-govt-patch-exploited-cisco/ www.secnews.physaphae.fr/article.php?IdArticle=8653364 False Vulnerability None 2.0000000000000000 Zataz - Magazine Francais de secu L\'Australie interdit l\'antivirus Kaspersky : une question de sécurité nationale 2025-03-04T10:21:03+00:00 https://www.zataz.com/laustralie-interdit-lantivirus-kaspersky-une-question-de-securite-nationale/ www.secnews.physaphae.fr/article.php?IdArticle=8653351 False None None 2.0000000000000000 The Register - Site journalistique Anglais Comment Google suit les utilisateurs de l'appareil Android avant qu'ils aient même ouvert une application<br>How Google tracks Android device users before they\\'ve even opened an app
No warning, no opt-out, and critic claims ... no consent Research from a leading academic shows Android users have advertising cookies and other gizmos working to build profiles on them even before they open their first app.… ]]>
2025-03-04T10:15:10+00:00 https://go.theregister.com/feed/www.theregister.com/2025/03/04/google_android/ www.secnews.physaphae.fr/article.php?IdArticle=8653347 False Mobile None 4.0000000000000000
The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Cisco, Hitachi, Microsoft et Progress Flaws Exploited-Cisa Sonds Alarme<br>Cisco, Hitachi, Microsoft, and Progress Flaws Actively Exploited-CISA Sounds Alarm The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added five security flaws impacting software from Cisco, Hitachi Vantara, Microsoft Windows, and Progress WhatsUp Gold to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The list of vulnerabilities is as follows - CVE-2023-20118 (CVSS score: 6.5) - A command injection]]> 2025-03-04T10:09:00+00:00 https://thehackernews.com/2025/03/cisco-hitachi-microsoft-and-progress.html www.secnews.physaphae.fr/article.php?IdArticle=8653273 False Vulnerability None 3.0000000000000000 Bleeping Computer - Magazine Américain Hunters International Ransomware revendique une attaque contre Tata Technologies<br>Hunters International ransomware claims attack on Tata Technologies The Hunters International ransomware gang has claimed responsibility for a January cyberattack attack on Tata Technologies, stating they stole 1.4TB of data from the company. [...]]]> 2025-03-04T10:04:54+00:00 https://www.bleepingcomputer.com/news/security/hunters-international-ransomware-claims-attack-on-tata-technologies/ www.secnews.physaphae.fr/article.php?IdArticle=8653431 False Ransomware None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine La moitié des entreprises de jeu en ligne perdent 10% des revenus à la fraude<br>Half of Online Gambling Firms Lose 10% of Revenue to Fraud Sumsub research finds European iGaming market is losing billions to fraud each year]]> 2025-03-04T10:00:00+00:00 https://www.infosecurity-magazine.com/news/half-online-gambling-lose-10/ www.secnews.physaphae.fr/article.php?IdArticle=8653341 False None None 3.0000000000000000 Data Security Breach - Site de news Francais QSDC : Une avancée majeure dans la communication quantique ? 2025-03-04T09:59:54+00:00 https://www.datasecuritybreach.fr/communication-quantique-qsdc/ www.secnews.physaphae.fr/article.php?IdArticle=8653326 False None None 3.0000000000000000 IndustrialCyber - cyber risk firms for industrial La CISA réaffirme pour sauvegarder les infrastructures critiques américaines contre l'escalade des menaces du groupe Ransomware Qilin<br>CISA reaffirms to safeguard US critical infrastructure against escalating threats from Qilin ransomware group The U.S. Cybersecurity and Infrastructure Security Agency (CISA) said Monday that its goal is to protect the nation\'s... ]]> 2025-03-04T09:47:25+00:00 https://industrialcyber.co/cisa/cisa-reaffirms-to-safeguard-us-critical-infrastructure-against-escalating-threats-from-qilin-ransomware-group/ www.secnews.physaphae.fr/article.php?IdArticle=8653342 False Ransomware None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) La mise à jour Android Security de Google \\ est en mars 2025 Correction de deux vulnérabilités activement exploitées<br>Google\\'s March 2025 Android Security Update Fixes Two Actively Exploited Vulnerabilities Google has released its monthly Android Security Bulletin for March 2025 to address a total of 44 vulnerabilities, including two that it said have come under active exploitation in the wild. The two high-severity vulnerabilities are listed below - CVE-2024-43093 - A privilege escalation flaw in the Framework component that could result in unauthorized access to "Android/data," "Android/obb,"]]> 2025-03-04T09:37:00+00:00 https://thehackernews.com/2025/03/googles-march-2025-android-security.html www.secnews.physaphae.fr/article.php?IdArticle=8653258 False Vulnerability,Mobile None 2.0000000000000000 Cyble - CyberSecurity Firm IA, ransomware et cyberterrorisme: comment les EAU se battent 200 000 attaques quotidiennes<br>AI, Ransomware, and Cyberterrorism: How UAE is Fighting 200,000 Daily Attacks Overview The UAE Cyber Security Council (CSC) has disclosed that the country faces over 200,000 cyberattacks daily, primarily targeting strategic sectors. These cyberterrorist attacks originate from 14 countries, with their perpetrators and attack launch sites identified and countered using advanced global cybersecurity measures. These attacks aim to disrupt critical infrastructure, steal sensitive data, and undermine national security. The CSC has implemented state-of-the-art threat detection and mitigation strategies to safeguard essential services and institutions from these cyber threats. Strategic Sectors Under Attack The CSC has reported that cyberterrorist groups primarily focus their attacks on key industries, aiming to disrupt operations and steal sensitive information. Among the affected sectors, the government sector accounted for the highest share at 30%, followed by the financial and banking sector at 7% and the education sector at 7%. Other affected industries, including technology, aviation, and hospitals, each experienced 4% of the attacks, while the remaining 44% were distributed among various other sectors. Cyberattack Types and Methods Cyberattacks come in various forms, each posing unique threats to digital infrastructure. The CSC identified several key attack types: Attacks on Information Technology and Infrastructure – 40% of total incidents File-sharing Attacks – 9% Database Vulnerabilities – 3% ]]> 2025-03-04T09:34:08+00:00 https://cyble.com/blog/uae-reports-200000-daily-attacks-from-global-terror-groups/ www.secnews.physaphae.fr/article.php?IdArticle=8653340 False Ransomware,Malware,Vulnerability,Threat None 2.0000000000000000 Zataz - Magazine Francais de secu Une attaque DDoS massive perturbe Beeline et Tele2 en Russie 2025-03-04T09:26:54+00:00 https://www.zataz.com/une-attaque-ddos-massive-perturbe-beeline-et-tele2-en-russie/ www.secnews.physaphae.fr/article.php?IdArticle=8653327 False None None 2.0000000000000000 Global Security Mag - Site de news francais Autorité de l'appareil a lancé son outil de découverte de Keyscaler<br>Device Authority has launched its KeyScaler Discovery tool Revues de produits
Device Authority unveils Discovery Tool to enhance IoT visibility and security New tool will simplify the process of discovering every unmanaged device on a network, highlighting vulnerabilities and improving asset security - Product Reviews]]>
2025-03-04T09:17:50+00:00 https://www.globalsecuritymag.fr/device-authority-has-launched-its-keyscaler-discovery-tool.html www.secnews.physaphae.fr/article.php?IdArticle=8653343 False Tool,Vulnerability None 2.0000000000000000
Global Security Mag - Site de news francais Cheops Technology devient partenaire officiel d\'Alpine Endurance Team Marchés]]> 2025-03-04T09:09:39+00:00 https://www.globalsecuritymag.fr/cheops-technology-devient-partenaire-officiel-d-alpine-endurance-team.html www.secnews.physaphae.fr/article.php?IdArticle=8653344 False Cloud None 3.0000000000000000 Global Security Mag - Site de news francais Alphalink lance sa gamme Cyber 360 à destination du Channel IT Produits]]> 2025-03-04T09:07:39+00:00 https://www.globalsecuritymag.fr/alphalink-lance-sa-gamme-cyber-360-a-destination-du-channel-it.html www.secnews.physaphae.fr/article.php?IdArticle=8653321 False None None 2.0000000000000000 Global Security Mag - Site de news francais 17 mars 2025, 18 h 00 - 20 h 00 par visioconférence Zoom "Lundi de la cybersécurité" : Garder une longueur d\'avance sur les risques OT Événements]]> 2025-03-04T09:06:23+00:00 https://www.globalsecuritymag.fr/17-mars-2025-18-h-00-20-h-00-par-visioconference-zoom-lundi-de-la-cybersecurite.html www.secnews.physaphae.fr/article.php?IdArticle=8653322 False Industrial None 2.0000000000000000 Korben - Bloger francais OpenHaystack - Tracez vos objets sur le réseau Find My d\'Apple 2025-03-04T09:00:00+00:00 https://korben.info/openhaystack-tracker-objets-reseau-find-my-apple.html www.secnews.physaphae.fr/article.php?IdArticle=8653320 False None None 2.0000000000000000 Global Security Mag - Site de news francais Stoïk et la DGA, une collaboration au service de la cybersécurité des entreprises de la défense Business]]> 2025-03-04T08:39:17+00:00 https://www.globalsecuritymag.fr/stoik-et-la-dga-une-collaboration-au-service-de-la-cybersecurite-des.html www.secnews.physaphae.fr/article.php?IdArticle=8653323 False None None 2.0000000000000000 InformationSecurityBuzzNews - Site de News Securite Plus vous vous souciez, plus vous partagez: le partage d'informations et la sensibilisation au cyber<br>The More You Care, The More You Share: Information Sharing and Cyber Awareness Cybersecurity information sharing is a crucial element of a strong security culture, and organizations should actively facilitate and encourage it to reduce human risk, a new report from KnowBe4 argues.   Called “Cybersecurity Information Sharing as an Element of Sustainable Security Cultured,” the report was authored by Dr Martin Kraemer, Security Awareness Advocate at KnowBe4, and [...]]]> 2025-03-04T07:46:00+00:00 https://informationsecuritybuzz.com/information-share-and-cyber-awarenes/ www.secnews.physaphae.fr/article.php?IdArticle=8653290 False None None 2.0000000000000000 Global Security Mag - Site de news francais Multiples vulnérabilités dans Google Android (04 mars 2025) Vulnérabilités]]> 2025-03-04T07:41:59+00:00 https://www.globalsecuritymag.fr/multiples-vulnerabilites-dans-google-android-04-mars-2025.html www.secnews.physaphae.fr/article.php?IdArticle=8653468 False Mobile None 2.0000000000000000 InformationSecurityBuzzNews - Site de News Securite Les États-Unis font une pause cyber-ops offensive contre la Russie<br>US Pauses Offensive Cyber-Ops Against Russia Defense Secretary Pete Hegseth has ordered U.S. Cyber Command to halt all planning against Russia, including offensive digital operations, The Record reports.  The directive, issued towards the end of last week to Cyber Command chief General Timothy Haugh, heralds a major shift in U.S. cyber strategy toward Moscow.  The order, which was subsequently relayed to [...]]]> 2025-03-04T07:26:43+00:00 https://informationsecuritybuzz.com/us-pauses-offensive-cyber-ops-against/ www.secnews.physaphae.fr/article.php?IdArticle=8653291 False None None 2.0000000000000000 Bleeping Computer - Magazine Américain Google fixe Android Zero-Day exploité par les autorités serbes<br>Google fixes Android zero-day exploited by Serbian authorities Google has released patches for 43 vulnerabilities in Android\'s March 2025 security update, including two zero-days. Serbian authorities have used one of the zero-days to unlock confiscated devices. [...]]]> 2025-03-04T06:38:22+00:00 https://www.bleepingcomputer.com/news/security/google-fixes-android-zero-days-exploited-in-targeted-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8653383 False Vulnerability,Threat,Mobile None 2.0000000000000000 The Register - Site journalistique Anglais Alors… la Russie n'est plus une cyber-menace pour l'Amérique?<br>So … Russia no longer a cyber threat to America? Mixed messages from Pentagon, CISA as Trump gets pally with Putin and Kremlin strikes US critical networks Comment  America\'s cybersecurity chiefs in recent days have been sending mixed messages about the threat posed by Russia in the digital world.…]]> 2025-03-04T02:56:16+00:00 https://go.theregister.com/feed/www.theregister.com/2025/03/04/russia_cyber_threat/ www.secnews.physaphae.fr/article.php?IdArticle=8653217 False Threat None 2.0000000000000000 The State of Security - Magazine Américain Amélioration de la surveillance de la sécurité avec l'audit de changement de Tripwire \\: les nouvelles règles pour les pare-feu, les applications WFP et Microsoft Store<br>Enhancing Security Monitoring with Tripwire\\'s Change Audit: New Rules for Firewalls, WFP, and Microsoft Store Applications What is it? The Tripwire Enterprise Change Audit rules provide customers with the ability to monitor for change events that could have an impact on a system. Monitoring for change events can help administrators identify malicious and/or unexpected changes within their environment. Changes to CA Additional rules were added to the Change Audit rule set. These rules provide customers the ability to monitor for changes to the firewall, Windows Filtering Platform, and Microsoft Store. Firewall Firewalls monitor network traffic and use rules to block or allow traffic. Allowing services that are not...]]> 2025-03-04T01:43:43+00:00 https://www.tripwire.com/state-of-security/enhancing-security-monitoring-tripwires-change-audit www.secnews.physaphae.fr/article.php?IdArticle=8653304 False None None 3.0000000000000000 The State of Security - Magazine Américain Qu'est-ce que la gestion de la posture de sécurité SaaS (SSPM)?<br>What is SaaS Security Posture Management (SSPM)? Over 80% of businesses use at least one Software-as-a-Service (SaaS) application in their operations, per a report by SaaS Academy. It\'s easy to see why SaaS applications are the fulcrum of many businesses today. From collaboration tools to CRMs, SaaS platforms enable flexibility, scalability, and operational efficiency. However, this convenience also comes with several security risks. According to a report by Gartner, “99% of cloud security failures will be the customer\'s fault”. Two factors that contribute to this are misconfigurations and overlooked vulnerabilities. As SaaS adoption...]]> 2025-03-04T01:43:41+00:00 https://www.tripwire.com/state-of-security/what-saas-security-posture-management-sspm www.secnews.physaphae.fr/article.php?IdArticle=8653305 False Tool,Vulnerability,Cloud None 3.0000000000000000 ProofPoint - Cyber Firms Construire vers un assistant d'investigation pour les incidents de sécurité alimentée par l'IA<br>Building Towards an AI-Powered Security Incident Investigation Assistant 2025-03-04T01:23:01+00:00 https://www.proofpoint.com/us/blog/engineering-insights/building-ai-powered-security-incident-investigation-assistant www.secnews.physaphae.fr/article.php?IdArticle=8653589 False Tool,Threat,Cloud,Technical None 2.0000000000000000 TrendLabs Security - Editeur Antivirus Exploiter Deepseek-R1: décomposer la chaîne de sécurité de la pensée<br>Exploiting DeepSeek-R1: Breaking Down Chain of Thought Security This entry explores how the Chain of Thought reasoning in the DeepSeek-R1 AI model can be susceptible to prompt attacks, insecure output generation, and sensitive data theft.]]> 2025-03-04T00:00:00+00:00 https://www.trendmicro.com/en_us/research/25/c/exploiting-deepseek-r1.html www.secnews.physaphae.fr/article.php?IdArticle=8653412 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les pirates exploitent AWS erronés pour lancer des attaques de phishing via SES et Workmail<br>Hackers Exploit AWS Misconfigurations to Launch Phishing Attacks via SES and WorkMail Threat actors are targeting Amazon Web Services (AWS) environments to push out phishing campaigns to unsuspecting targets, according to findings from Palo Alto Networks Unit 42. The cybersecurity company is tracking the activity cluster under the name TGR-UNK-0011 (short for a threat group with unknown motivation), which it said overlaps with a group known as JavaGhost. TGR-UNK-0011 is known to]]> 2025-03-03T22:56:00+00:00 https://thehackernews.com/2025/03/hackers-exploit-aws-misconfigurations.html www.secnews.physaphae.fr/article.php?IdArticle=8653100 False Threat None 3.0000000000000000 Recorded Future - FLux Recorded Future Ministère de la santé Palau sur la promenade après l'attaque de Qilin Ransomware<br>Palau health ministry on the mend after Qilin ransomware attack A U.S. Cyber Command “defend forward” team is now on-site conducting forensics collection and analysis, according to Palau officials.]]> 2025-03-03T22:06:29+00:00 https://therecord.media/palau-health-ministry-ransomware-recover www.secnews.physaphae.fr/article.php?IdArticle=8653179 False Ransomware None 2.0000000000000000 HackRead - Chercher Cyber Services SEO alimentés par AI: révolutionner le marketing numérique<br>AI-powered SEO services: revolutionizing digital marketing Artificial Intelligence is a tool that is currently changing how businesses approach digital marketing and SEO. Explore how your business can transform with AI-powered SEO services here.]]> 2025-03-03T21:27:47+00:00 https://hackread.com/ai-powered-seo-services-revolutionizing-digital-marketing/ www.secnews.physaphae.fr/article.php?IdArticle=8653162 False Tool None 2.0000000000000000 CyberScoop - scoopnewsgroup.com special Cyber Android Security Update contient 2 vulnérabilités activement exploitées<br>Android security update contains 2 actively exploited vulnerabilities Google\'s monthly batch of security fixes addressed 43 vulnerabilities. ]]> 2025-03-03T21:08:08+00:00 https://cyberscoop.com/android-security-update-march-2025/ www.secnews.physaphae.fr/article.php?IdArticle=8653151 False Vulnerability,Mobile None 2.0000000000000000 Dark Reading - Informationweek Branch Nommez ce bord toon: sur le précipice<br>Name That Edge Toon: On the Precipice Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 gift card.]]> 2025-03-03T21:07:16+00:00 https://www.darkreading.com/remote-workforce/name-that-edge-toon-on-the-precipice www.secnews.physaphae.fr/article.php?IdArticle=8653150 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Les données des adolescents de Tiktok \\ ont sondage sondé par les régulateurs britanniques<br>TikTok\\'s Teen Data Use Probed by UK Regulators Investigators at the ICO are looking into how (or if) TikTok, as well as Reddit and Imgur, are enforcing UK privacy protections for 13- to 17-year-old users.]]> 2025-03-03T20:44:06+00:00 https://www.darkreading.com/application-security/tiktok-teen-data-use-probed-regulators www.secnews.physaphae.fr/article.php?IdArticle=8653129 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Qilin Cybercrime Ring réclame le crédit pour la violation du journal Lee<br>Qilin Cybercrime Ring Claims Credit for Lee Newspaper Breach The ransomware-as-a-service (RaaS) cybercrime group intends to leak the stolen information in just two days, it claims; but oddly, it doesn\'t seek a ransom payment from its victim.]]> 2025-03-03T20:29:43+00:00 https://www.darkreading.com/cyberattacks-data-breaches/qilin-cyber-gang-credit-lee-newspaper-breach www.secnews.physaphae.fr/article.php?IdArticle=8653130 False None None 2.0000000000000000 HackRead - Chercher Cyber Bubba AI, Inc. lance Comp AI pour aider 100 000 startups à obtenir la conformité SOC 2 d'ici 2032.<br>Bubba AI, Inc. is launching Comp AI to help 100,000 startups get SOC 2 compliant by 2032. San Francisco, California, 3rd March 2025, CyberNewsWire]]> 2025-03-03T20:16:17+00:00 https://hackread.com/bubba-ai-inc-is-launching-comp-ai-to-help-100000-startups-get-soc-2-compliant-by-2032/ www.secnews.physaphae.fr/article.php?IdArticle=8653143 False None None 2.0000000000000000 Recorded Future - FLux Recorded Future CISA dit qu'elle continuera de surveiller les cyber-menaces russes<br>CISA says it will continue to monitor Russian cyber threats The Cybersecurity and Infrastructure Security Agency (CISA) shot down reports that changes are being made to how they approach cyberthreats from Russia following a report by The Guardian last week.]]> 2025-03-03T20:15:59+00:00 https://therecord.media/cisa-says-it-will-continue-to-monitor-russian-cyber-threats www.secnews.physaphae.fr/article.php?IdArticle=8653132 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Phishers a fait des ravages, \\ 'déguisé l'attaque à l'intérieur de SharePoint<br>Phishers Wreak \\'Havoc,\\' Disguising Attack Inside SharePoint A complex campaign allows cyberattackers to take over Windows systems by a combining a ClickFix-style attack and sophisticated obfuscation that abuses legitimate Microsoft services.]]> 2025-03-03T20:02:24+00:00 https://www.darkreading.com/cyberattacks-data-breaches/phishers-wreak-havoc-disguising-attack-inside-sharepoint www.secnews.physaphae.fr/article.php?IdArticle=8653131 False None None 2.0000000000000000 RedCanary - Red Canary Plongez dans le lac de données de sécurité Red Canary<br>Dive into the Red Canary Security Data Lake Red Canary now offers cost-efficient data storage that improves your security posture. Learn more about our new Security Data Lake offering.]]> 2025-03-03T19:57:29+00:00 https://redcanary.com/blog/product-updates/security-data-lake/ www.secnews.physaphae.fr/article.php?IdArticle=8653109 False None None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les pirates utilisent Clickfix Trick pour déployer Havoc C2 basé sur PowerShell via des sites SharePoint<br>Hackers Use ClickFix Trick to Deploy PowerShell-Based Havoc C2 via SharePoint Sites Cybersecurity researchers are calling attention to a new phishing campaign that employs the ClickFix technique to deliver an open-source command-and-control (C2) framework called Havoc. "The threat actor hides each malware stage behind a SharePoint site and uses a modified version of Havoc Demon in conjunction with the Microsoft Graph API to obscure C2 communications within trusted, well-known]]> 2025-03-03T19:30:00+00:00 https://thehackernews.com/2025/03/hackers-use-clickfix-trick-to-deploy.html www.secnews.physaphae.fr/article.php?IdArticle=8653008 False Malware,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les pirates exploitent la vulnérabilité du pilote du gestionnaire de partition de paragon dans les attaques de ransomwares<br>Hackers Exploit Paragon Partition Manager Driver Vulnerability in Ransomware Attacks Threat actors have been exploiting a security vulnerability in Paragon Partition Manager\'s BioNTdrv.sys driver in ransomware attacks to escalate privileges and execute arbitrary code. The zero-day flaw (CVE-2025-0289) is part of a set of five vulnerabilities that was discovered by Microsoft, according to the CERT Coordination Center (CERT/CC). "These include arbitrary kernel memory mapping and]]> 2025-03-03T19:26:00+00:00 https://thehackernews.com/2025/03/hackers-exploit-paragon-partition.html www.secnews.physaphae.fr/article.php?IdArticle=8653009 False Ransomware,Vulnerability,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) L'ICO du Royaume-Uni enquête sur Tiktok, Reddit et Imgur sur les pratiques de protection des données des enfants<br>U.K. ICO Investigates TikTok, Reddit, and Imgur Over Children\\'s Data Protection Practices The U.K.\'s Information Commissioner\'s Office (ICO) has opened an investigation into online platforms TikTok, Reddit, and Imgur to assess the steps they are taking to protect children between the ages of 13 and 17 in the country. To that end, the watchdog said it\'s probing how the ByteDance-owned video-sharing service uses the personal data of children in the age range to surface recommendations]]> 2025-03-03T19:26:00+00:00 https://thehackernews.com/2025/03/uk-ico-investigates-tiktok-reddit-and.html www.secnews.physaphae.fr/article.php?IdArticle=8653010 False None None 3.0000000000000000 HackRead - Chercher Cyber Faux de prise en charge informatique Trick Microsoft Teams Les utilisateurs dans l'installation des ransomwares<br>Fake IT Support Calls Trick Microsoft Teams Users into Installing Ransomware Cybercriminals pose as IT support, using fake calls and Microsoft Teams messages to trick users into installing ransomware through email floods and remote access.]]> 2025-03-03T19:23:00+00:00 https://hackread.com/fake-it-support-calls-microsoft-teams-users-install-ransomware/ www.secnews.physaphae.fr/article.php?IdArticle=8653111 False Ransomware None 3.0000000000000000 Global Security Mag - Site de news francais NDR to SOAR : introduction à la cybersécurité pour les dirigeants<br>NDR to SOAR : introduction à la cybersécurité pour les dirigeants Points de Vue
NDR to SOAR : introduction à la cybersécurité pour les dirigeants Par Petr Springl, Senior Director, Software Engineering, Progress - Points de Vue]]>
2025-03-03T18:31:29+00:00 https://www.globalsecuritymag.fr/ndr-to-soar-introduction-a-la-cybersecurite-pour-les-dirigeants.html www.secnews.physaphae.fr/article.php?IdArticle=8653103 False None None 2.0000000000000000
Global Security Mag - Site de news francais Numeryx renouvelle sa labellisation France Cybersecurity Business]]> 2025-03-03T18:28:35+00:00 https://www.globalsecuritymag.fr/numeryx-renouvelle-sa-labellisation-france-cybersecurity.html www.secnews.physaphae.fr/article.php?IdArticle=8653104 False None None 2.0000000000000000 Global Security Mag - Site de news francais CSIS et Bech-Bruun lancent un service de disposition conjointe de la réponse aux incidents<br>CSIS and Bech-Bruun Launch Joint Cyber Incident Response Retainer Service Business News
CSIS and Bech-Bruun Launch Joint Cyber Incident Response Retainer Service New single point of contact offering from two leading cyber incident advisors combines leading cybersecurity expertise with legal and regulatory support to strengthen organisations\' cyber resilience. - Business News]]>
2025-03-03T18:25:55+00:00 https://www.globalsecuritymag.fr/csis-and-bech-bruun-launch-joint-cyber-incident-response-retainer-service.html www.secnews.physaphae.fr/article.php?IdArticle=8653105 False None None 3.0000000000000000
Recorded Future - FLux Recorded Future Les télécommunications russes se sont confrontées à des pannes après la cyberattaque<br>Russian telecom Beeline facing outages after cyberattack Russia\'s communications watchdog reported that subscribers in Moscow and surrounding areas had filed mass complaints over connectivity issues following the incident.]]> 2025-03-03T18:20:03+00:00 https://therecord.media/russian-telecom-beeline-outages-cyber www.secnews.physaphae.fr/article.php?IdArticle=8653089 False None None 2.0000000000000000 Global Security Mag - Site de news francais 10 au 19 avril : Catastrophes, terrorisme, cyberattaques : le bootcamp immersif du HCFRN pour renforcer la gestion de crise et la résilience des organisations Événements]]> 2025-03-03T18:17:52+00:00 https://www.globalsecuritymag.fr/10-au-19-avril-catastrophes-terrorisme-cyberattaques-le-bootcamp-immersif-du.html www.secnews.physaphae.fr/article.php?IdArticle=8653106 False None None 3.0000000000000000 Global Security Mag - Site de news francais Intelligence artificielle (IA) et agents IA : un changement de donne pour la cybersécurité et la cybercriminalité Points de Vue]]> 2025-03-03T18:07:49+00:00 https://www.globalsecuritymag.fr/intelligence-artificielle-ia-et-agents-ia-un-changement-de-donne-pour-la.html www.secnews.physaphae.fr/article.php?IdArticle=8653084 False None None 3.0000000000000000 Global Security Mag - Site de news francais 10 mars à 13h00 aura lieu la remise des prix du challenge " Passe Ton Hack d\'Abord " au Campus cyber, à la Défense (Paris) Événements]]> 2025-03-03T18:03:49+00:00 https://www.globalsecuritymag.fr/10-mars-a-13h00-aura-lieu-la-remise-des-prix-du-challenge-passe-ton-hack-d.html www.secnews.physaphae.fr/article.php?IdArticle=8653085 False Hack None 3.0000000000000000 SecurityWeek - Security News CISA: Aucun changement sur la défense contre les cyber-menaces russes<br>CISA: No Change on Defending Against Russian Cyber Threats La clarification publique de la CISA suit les nouvelles que l'administration Trump s'arrête temporairement des cyber-opérations offensives contre Moscou.
>The CISA public clarification follows news the Trump administration is temporarily pausing offensive cyber operations against Moscow. ]]>
2025-03-03T17:28:16+00:00 https://www.securityweek.com/cisa-no-change-on-defending-against-russian-cyber-threats/ www.secnews.physaphae.fr/article.php?IdArticle=8653070 False None None 3.0000000000000000
The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Recap hebdomadaire thn: Alertes sur les exploits zéro-jours, les violations de l'IA et les cambriolages crypto<br>⚡ THN Weekly Recap: Alerts on Zero-Day Exploits, AI Breaches, and Crypto Heists This week, a 23-year-old Serbian activist found themselves at the crossroads of digital danger when a sneaky zero-day exploit turned their Android device into a target. Meanwhile, Microsoft pulled back the curtain on a scheme where cybercriminals used AI tools for harmful pranks, and a massive trove of live secrets was discovered, reminding us that even the tools we rely on can hide risky]]> 2025-03-03T17:28:00+00:00 https://thehackernews.com/2025/03/thn-weekly-recap-alerts-on-zero-day.html www.secnews.physaphae.fr/article.php?IdArticle=8652990 False Tool,Vulnerability,Threat,Mobile None 3.0000000000000000 Recorded Future - FLux Recorded Future Plusieurs gouvernements locaux aux prises avec des cyberattaques limitant les services<br>Several local governments struggling with cyberattacks limiting services Government services offered by one of the largest counties in Maryland are still being limited more than a week after it was targeted by a cyberattack.]]> 2025-03-03T17:07:12+00:00 https://therecord.media/local-govs-cyberattacks-limiting-services www.secnews.physaphae.fr/article.php?IdArticle=8653071 False None None 3.0000000000000000 The Register - Site journalistique Anglais L'ancien CTO SAP s'évanouit avec un paiement de 7,1 millions d'euros après le scandale<br>Ex-SAP CTO walks away with €7.1M payout after scandal Investigation understood to have ended following settlement SAP paid former CTO Jürgen Müller €7.1 million ($7.5 million) after he left the German software company by mutual agreement in September last year.… ]]> 2025-03-03T16:59:09+00:00 https://go.theregister.com/feed/www.theregister.com/2025/03/03/former_sap_cto_payout/ www.secnews.physaphae.fr/article.php?IdArticle=8653052 False None None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les attaquants exploitent les équipes Microsoft et l'assistance rapide pour l'accès<br>Attackers Leverage Microsoft Teams and Quick Assist for Access Phishing attack exploits social engineering techniques alongside Microsoft Teams and remote access software to deploy BackConnect malware]]> 2025-03-03T16:30:00+00:00 https://www.infosecurity-magazine.com/news/attackers-exploit-microsoft-teams/ www.secnews.physaphae.fr/article.php?IdArticle=8653054 False Malware None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les nouveaux groupes de ransomwares se tremblent 2025<br>The New Ransomware Groups Shaking Up 2025 In 2024, global ransomware attacks hit 5,414, an 11% increase from 2023.  After a slow start, attacks spiked in Q2 and surged in Q4, with 1,827 incidents (33% of the year\'s total). Law enforcement actions against major groups like LockBit caused fragmentation, leading to more competition and a rise in smaller gangs. The number of active ransomware groups jumped 40%, from 68 in 2023 to 95]]> 2025-03-03T16:30:00+00:00 https://thehackernews.com/2025/03/the-new-ransomware-groups-shaking-up.html www.secnews.physaphae.fr/article.php?IdArticle=8652967 False Ransomware,Legislation None 3.0000000000000000 HackRead - Chercher Cyber Comment automatiser les questionnaires de sécurité et réduire le temps de réponse<br>How to Automate Security Questionnaires and Reduce Response Time Security questionnaires take a lot of time and repetitively answering the same questions manually chews up business time…]]> 2025-03-03T16:13:49+00:00 https://hackread.com/automate-security-questionnaires-reduce-response-time/ www.secnews.physaphae.fr/article.php?IdArticle=8653053 False None None 3.0000000000000000 CyberScoop - scoopnewsgroup.com special Cyber DHS dit que CISA a gagné \\ 'ne cessait de regarder les cyber-menaces russes<br>DHS says CISA won\\'t stop looking at Russian cyber threats The statement is a rebuttal to stories suggesting otherwise. ]]> 2025-03-03T16:11:17+00:00 https://cyberscoop.com/dhs-cisa-wont-stop-looking-at-russian-cyber-threats/ www.secnews.physaphae.fr/article.php?IdArticle=8653051 False None None 3.0000000000000000 Bleeping Computer - Magazine Américain Rubrik tourne les touches d'authentification après une violation du serveur de journaux<br>Rubrik rotates authentication keys after log server breach Rubrik disclosed last month that one of its servers hosting log files was breached, causing the company to rotate potentially leaked authentication keys. [...]]]> 2025-03-03T15:53:52+00:00 https://www.bleepingcomputer.com/news/security/rubrik-rotates-authentication-keys-after-log-server-breach/ www.secnews.physaphae.fr/article.php?IdArticle=8653128 False None None 3.0000000000000000