www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2025-05-12T13:50:28+00:00 www.secnews.physaphae.fr Dark Reading - Informationweek Branch La nouvelle directive sur la responsabilité des produits des produits de l'UE et son impact sur la cybersécurité<br>EU\\'s New Product Liability Directive & Its Cybersecurity Impact By proactively addressing liabilities tied to software updates, data loss, and AI technologies, businesses can mitigate risks and achieve compliance.]]> 2025-03-03T15:00:00+00:00 https://www.darkreading.com/cybersecurity-operations/eus-new-product-liability-directive-cybersecurity-impact www.secnews.physaphae.fr/article.php?IdArticle=8653015 False None None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine La CISA nie les rapports de changement de posture de cybersécurité au milieu des menaces russes<br>CISA Denies Reports of Shift in Cybersecurity Posture Amid Russian Threats The US Cybersecurity and Infrastructure Security Agency confirmed it will keep defending against Russian cyber threats to US critical infrastructure]]> 2025-03-03T14:45:00+00:00 https://www.infosecurity-magazine.com/news/cisa-denies-report-russian-threats/ www.secnews.physaphae.fr/article.php?IdArticle=8653019 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Les organisations latino-américaines sont confrontées à 40% de plus d'attaques que la moyenne mondiale<br>Latin American Orgs Face 40% More Attacks Than Global Average Technological adoption, demographics, politics, and uniquely Latin American law enforcement challenges have combined to make the region uniquely fertile for cyberattacks.]]> 2025-03-03T14:23:21+00:00 https://www.darkreading.com/cybersecurity-analytics/latin-american-orgs-more-cyberattacks-global-average www.secnews.physaphae.fr/article.php?IdArticle=8653016 False Legislation None 3.0000000000000000 Bleeping Computer - Magazine Américain DHS dit que la CISA n'arrêtera pas de surveiller les cyber-menaces russes<br>DHS says CISA will not stop monitoring Russian cyber threats The US Cybersecurity and Infrastructure Security Agency says that media reports about it being directed to no longer follow or report on Russian cyber activity are untrue, and its mission remains unchanged. [...]]]> 2025-03-03T14:22:00+00:00 https://www.bleepingcomputer.com/news/security/dhs-says-cisa-will-not-stop-monitoring-russian-cyber-threats/ www.secnews.physaphae.fr/article.php?IdArticle=8653110 False None None 3.0000000000000000 HackRead - Chercher Cyber Une nouvelle campagne de logiciels malveillants exploite API Microsoft Graph pour infecter Windows<br>New Malware Campaign Exploits Microsoft Graph API to Infect Windows FortiGuard Labs discovers an advanced attack using modified Havoc Demon and SharePoint. Explore the attack\'s evasion techniques and security measures.]]> 2025-03-03T14:09:18+00:00 https://hackread.com/malware-exploits-microsoft-graph-api-infect-windows/ www.secnews.physaphae.fr/article.php?IdArticle=8653018 False Malware None 3.0000000000000000 TechRepublic - Security News US Comment la Corée du Nord a exécuté le plus gros crispo de tous les temps<br>How North Korea Executed the Largest Crypto Heist Ever North Korea\'s Lazarus Group pulled off the $1.5B Bybit hack, making it the biggest crypto heist ever. Here\'s how they did it-and what\'s next.]]> 2025-03-03T14:05:24+00:00 https://www.techrepublic.com/article/bybit-hack-north-korea-crypto-heist-2025/ www.secnews.physaphae.fr/article.php?IdArticle=8653050 False Hack APT 38 3.0000000000000000 Security Through Education - Security Through Education Ingénierie sociale: retour aux bases<br>Social Engineering: Back to the Basics When I first heard of social engineering, about 6 years ago, I couldn\'t define it clearly and concisely if you […]]]> 2025-03-03T14:00:42+00:00 https://www.social-engineer.org/newsletter/social-engineering-back-to-the-basics/ www.secnews.physaphae.fr/article.php?IdArticle=8656358 False None None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine La campagne de phishing utilise un cadre de ravage pour contrôler les systèmes infectés<br>Phishing Campaign Uses Havoc Framework to Control Infected Systems A new phishing campaign has been identified using Havoc to control infected systems, leveraging SharePoint and Microsoft Graph API]]> 2025-03-03T14:00:00+00:00 https://www.infosecurity-magazine.com/news/phishing-campaign-havoc-framework/ www.secnews.physaphae.fr/article.php?IdArticle=8652997 False None None 2.0000000000000000 Fortinet - Fabricant Materiel Securite Havoc: SharePoint avec l'API du graphique Microsoft se transforme en FUD C2<br>Havoc: SharePoint with Microsoft Graph API turns into FUD C2 ForitGuard Lab reveals a modified Havoc deployed by a ClickFix phishing campaign. The threat actor hides each stage behind SharePoint and also uses it as a C2. Learn more.]]> 2025-03-03T14:00:00+00:00 https://www.fortinet.com/blog/threat-research/havoc-sharepoint-with-microsoft-graph-api-turns-into-fud-c2 www.secnews.physaphae.fr/article.php?IdArticle=8653035 False Threat None 2.0000000000000000 Mandiant - Blog Sécu de Mandiant Pas perdu dans la traduction: Rosetta 2 Artefacts in macOS Intrusions<br>Not Lost in Translation: Rosetta 2 Artifacts in macOS Intrusions Résumé exécutif Rosetta 2 est la technologie de traduction d'Apple \\ pour l'exécution de binaires x86-64 sur les systèmes de macOS de silicium Apple (ARM64). La traduction Rosetta 2 crée un cache de fichiers à l'avance (AOT) qui peuvent servir de précieux artefacts médico-légaux. Mandiant a observé des acteurs de menace sophistiqués en tirant parti de la malware macOS compilé x86-64, probablement en raison de la compatibilité plus large et des politiques d'exécution assouplies par rapport aux binaires ARM64. L'analyse des fichiers AOT, combinée à FSevents et aux journaux unifiés (avec un profil personnalisé), peut aider à étudier les intrusions macOS. Introduction Rosetta 2 (connu en interne sur MacOS sous le nom d'OAH) a été introduit dans MacOS 11 (Big Sur) en 2020 pour permettre des binaires compilés pour les architectures x86-64 pour fonctionner sur des architectures de silicium Apple (ARM64). Rosetta 2 traduit des binaires x86-64 signés et non signés juste à temps ou à l'avance au point d'exécution. Mandiant a identifié plusieurs nouvelles variantes de logiciels malveillants MacOS hautement sophistiqués au cours de la dernière année, notamment compilé pour l'architecture x86-64. Mandiant a évalué que ce choix d'architecture était très probablement dû à une augmentation des chances de compatibilité sur les systèmes de victimes et des politiques d'exécution plus assouplies. Notamment, macOS applique ) vérifie si un fichier d'attente (aot) est déjà en ligne pour le binaire;" ROSETTA 2 CACHE DIRECTORY sur le volume de données à / var / db / oah / / . La valeur UUID dans ce chemin de fichier semble être générée au hasard sur l'installation ou la mise à jour. Si un fichier AOT n'existe pas, on sera créé en écrivant du code de traduction dans un . IN_PROGRESS Fichier et ensuite le renommant dans un ]]> 2025-03-03T14:00:00+00:00 https://cloud.google.com/blog/topics/threat-intelligence/rosetta2-artifacts-macos-intrusions/ www.secnews.physaphae.fr/article.php?IdArticle=8653034 False Malware,Threat,Cloud None 2.0000000000000000 HackRead - Chercher Cyber Mozilla modifie les termes Firefox après un tumulte sur les données d'utilisation du langage<br>Mozilla Tweaks Firefox Terms After Uproar Over Data Use Language Firefox’s new Terms of Use spark user backlash over data rights. Learn how Mozilla responded to concerns about…]]> 2025-03-03T13:05:10+00:00 https://hackread.com/mozilla-tweaks-firefox-terms-over-data-use-language/ www.secnews.physaphae.fr/article.php?IdArticle=8652978 False None None 3.0000000000000000 Cyble - CyberSecurity Firm La fraude et les ransomwares dominent le rapport de cybersécurité de la Malaisie \\'s Q4 2024<br>Fraud and Ransomware Dominate Malaysia\\'s Q4 2024 Cybersecurity Report . Le cyber999 Réponse des incidents Le centre rassemble activement l'intelligence et collabore avec des entités mondiales pour améliorer les défenses de la cybersécurité. Au Q4 2024, Cyber999 a enregistré 1 550 incidents , marquant une diminution de 4% à partir des 1 623 incidents au Q3 2024. Répartition des incidents par mois au Q4 2024: ]]> 2025-03-03T13:04:23+00:00 https://cyble.com/blog/fraud-and-ransomware-cybersecurity-report/ www.secnews.physaphae.fr/article.php?IdArticle=8652974 False Ransomware,Malware,Vulnerability,Threat,Legislation,Mobile,Prediction None 2.0000000000000000 Checkpoint - Fabricant Materiel Securite Cinq raisons de choisir Secure SD-WAN à partir du point de contrôle<br>Five Reasons to Choose Secure SD-WAN from Check Point Dans le paysage numérique au rythme rapide d'aujourd'hui, les entreprises ont de plus en plus besoin d'une connectivité fiable, sécurisée et haute performance. Les solutions SDD-WAN sécurisées de Check Point offrent une approche complète en combinant la sécurité de premier ordre avec une connectivité Internet et réseau optimisée, en garantissant des opérations sûres et ininterrompues. Voici les cinq principales raisons pour lesquelles les solutions SD-WAN sécurisées de Check Point se distinguent: 1. La puissance des solutions SD-WAN Secure Secure Point de la puissance du point de contrôle Unity Rassemblez-vous dans un seul appareil. Cette convergence garantit que les entreprises bénéficient du plus haut niveau de protection et de performance. Avec un taux de capture remarquable de 99,9% pour les nouveaux logiciels malveillants, ces solutions fournissent […]
>In today’s fast-paced digital landscape, businesses are increasingly in need of reliable, secure, and high-performance connectivity. Check Point’s secure SD-WAN solutions offer a comprehensive approach by combining top-notch security with optimized internet and network connectivity, ensuring safe and uninterrupted operations. Here are the top five reasons why Check Point’s secure SD-WAN solutions stand out: 1. The Power of Unity Check Point’s secure SD-WAN solutions bring together security and network optimization in a single appliance. This convergence ensures that businesses benefit from the highest level of protection and performance. With a remarkable 99.9% catch rate for new malware, these solutions provide […] ]]>
2025-03-03T13:00:49+00:00 https://blog.checkpoint.com/securing-the-network/five-reasons-to-choose-secure-sd-wan-from-check-point/ www.secnews.physaphae.fr/article.php?IdArticle=8652976 False Malware None 3.0000000000000000
Cisco - Security Firm Blog Bacon canadien: Cloud Native & Security?<br>Canadian Bacon: Cloud Native & Security? Cloud service providers struggle with security in hybrid cloud use cases, but multicloud defense can help. Learn how in our blog.]]> 2025-03-03T13:00:00+00:00 https://blogs.cisco.com/security/canadian-bacon-cloud-native-security/ www.secnews.physaphae.fr/article.php?IdArticle=8652973 False Cloud None 2.0000000000000000 SecurityWeek - Security News Les États-Unis saisissent 31 millions de dollars de crypto volés dans un hack de financement d'uranium<br>US Seizes $31 Million Worth of Crypto Stolen in Uranium Finance Hack Le gouvernement américain a saisi environ 31 millions de dollars en crypto-monnaie volé en 2021 à l'uranium finance.
>The US government has seized roughly $31 million in cryptocurrency stolen in 2021 from Uranium Finance. ]]>
2025-03-03T12:58:00+00:00 https://www.securityweek.com/us-seizes-31-million-worth-of-crypto-stolen-in-uranium-finance-hack/ www.secnews.physaphae.fr/article.php?IdArticle=8652979 False Hack None 3.0000000000000000
Checkpoint Research - Fabricant Materiel Securite 3 mars - Rapport de renseignement sur les menaces<br>3rd March – Threat Intelligence Report Pour les dernières découvertes en cyber recherche pour la semaine du 3 mars, veuillez télécharger notre bulletin de renseignement sur les menaces. Les meilleures attaques et violations Orange Group ont confirmé une cyberattaque sur sa branche roumaine, dans laquelle un pirate lié au groupe de ransomware Hellcat a volé 6,5 Go de données sur un mois. La violation a exposé 380 000 e-mail […]
>For the latest discoveries in cyber research for the week of 3rd March, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Orange Group has confirmed a cyberattack on its Romanian branch, in which a hacker linked to the HellCat ransomware group stole 6.5GB of data over a month. The breach exposed 380,000 email […] ]]>
2025-03-03T12:56:28+00:00 https://research.checkpoint.com/2025/3rd-march-threat-intelligence-report/ www.secnews.physaphae.fr/article.php?IdArticle=8652972 False Ransomware,Threat None 3.0000000000000000
Recorded Future - FLux Recorded Future La Finlande libère le navire russe \\ 'Spy \\' mais continue de détenir trois membres d'équipage en tant que suspects<br>Finland releases Russian \\'spy\\' ship but continues to detain three crew members as suspects Finnish authorities have released the oil tanker Eagle S but are detaining three crew members as the investigation continues into the undersea infrastructure damage caused by the vessel.]]> 2025-03-03T12:46:36+00:00 https://therecord.media/finland-eagle-s-tanker-released-3-crew-still-detained www.secnews.physaphae.fr/article.php?IdArticle=8652977 False None None 3.0000000000000000 Bleeping Computer - Magazine Américain Nouvelle attaque ClickFix déploie Havoc C2 via Microsoft SharePoint<br>New ClickFix attack deploys Havoc C2 via Microsoft Sharepoint A newly uncovered ClickFix phishing campaign is tricking victims into executing malicious PowerShell commands that deploy the Havok post-exploitation framework for remote access to compromised devices. [...]]]> 2025-03-03T12:33:52+00:00 https://www.bleepingcomputer.com/news/security/new-clickfix-attack-deploys-havoc-c2-via-microsoft-sharepoint/ www.secnews.physaphae.fr/article.php?IdArticle=8653069 False None None 2.0000000000000000 IT Security Guru - Blog Sécurité Les gagnants des femmes les plus inspirantes des cyber-prix 2025 ont révélé<br>Winners of Most Inspiring Women in Cyber Awards 2025 Revealed The 20 winners of the Most Inspiring Women in Cyber Awards were announced at a ceremony held at the iconic BT Tower in London on the 26th February 2025. The awards celebrated the achievements of women working in cybersecurity around the globe – whether recognising personal achievements, efforts to close the gender divide in the industry […] ]]> 2025-03-03T12:32:12+00:00 https://www.itsecurityguru.org/2025/03/03/winners-of-most-inspiring-women-in-cyber-awards-2025-revealed/?utm_source=rss&utm_medium=rss&utm_campaign=winners-of-most-inspiring-women-in-cyber-awards-2025-revealed www.secnews.physaphae.fr/article.php?IdArticle=8653186 False None None 2.0000000000000000 Cyble - CyberSecurity Firm Rapport de vulnérabilité informatique: Mac, correctifs Windows poussés par Cyble<br>IT Vulnerability Report: Mac, Windows Fixes Urged by Cyble 2025-03-03T12:17:52+00:00 https://cyble.com/blog/it-vulnerability-mac-windows-fixes-urged-by-cyble/ www.secnews.physaphae.fr/article.php?IdArticle=8652975 False Malware,Tool,Vulnerability,Threat,Patching None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Vodafone Trials Quantum-Safe Tech pour protéger la navigation des smartphones<br>Vodafone Trials Quantum-Safe Tech to Protect Smartphone Browsing Telecoms provider Vodafone has developed the new proof of concept with IBM, as it seeks to implement post-quantum cryptography ahead of anticipated quantum-based attacks]]> 2025-03-03T12:00:00+00:00 https://www.infosecurity-magazine.com/news/vodafone-trials-quantum-safe/ www.secnews.physaphae.fr/article.php?IdArticle=8652956 False None None 2.0000000000000000 SecurityWeek - Security News Le courtier en stock indien Angel One révèle la violation des données<br>Indian Stock Broker Angel One Discloses Data Breach Angel One indique que les informations du client ont été compromises dans une violation de données impliquant son compte AWS.
>Angel One says client information was compromised in a data breach involving its AWS account. ]]>
2025-03-03T11:20:00+00:00 https://www.securityweek.com/indian-stock-broker-angel-one-discloses-data-breach/ www.secnews.physaphae.fr/article.php?IdArticle=8652955 False Data Breach None 3.0000000000000000
SecurityWeek - Security News Black Basta Laak offre un aperçu des travaux internes du groupe \\<br>Black Basta Leak Offers Glimpse Into Group\\'s Inner Workings A massive hoard of internal chats has been leaked from Black Basta, rivalling the Conti leaks of late February 2022. ]]> 2025-03-03T11:00:00+00:00 https://www.securityweek.com/black-basta-leak-offers-glimpse-into-groups-inner-workings/ www.secnews.physaphae.fr/article.php?IdArticle=8652939 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Le pic de Vo1d Botnet \\ dépasse 1,59 m Android Infected TVS, couvrant 226 pays<br>Vo1d Botnet\\'s Peak Surpasses 1.59M Infected Android TVs, Spanning 226 Countries Brazil, South Africa, Indonesia, Argentina, and Thailand have become the targets of a campaign that has infected Android TV devices with a botnet malware dubbed Vo1d. The improved variant of Vo1d has been found to encompass 800,000 daily active IP addresses, with the botnet scaling a peak of 1,590,299 on January 19, 2025, spanning 226 countries. As of February 25, 2025, India has experienced a]]> 2025-03-03T10:47:00+00:00 https://thehackernews.com/2025/03/vo1d-botnets-peak-surpasses-159m.html www.secnews.physaphae.fr/article.php?IdArticle=8652857 False Malware,Mobile None 3.0000000000000000 Sygnia - CyberSecurity Firm Assurer la continuité des opérations industrielles: un guide des stratégies de sauvegarde OT<br>Ensuring Continuity in Industrial Operations: A Guide to OT Backup Strategies Adapter les stratégies de sauvegarde pour assurer la résilience opérationnelle, protéger les configurations critiques et atténuer les risques dans les environnements technologiques opérationnels.
>Tailoring backup strategies to ensure operational resilience, safeguard critical configurations, and mitigate risks in Operational Technology environments. ]]>
2025-03-03T10:38:55+00:00 https://www.sygnia.co/guides-and-tools/ensuring-continuity-industrial-operations-ot-backup-strategies/ www.secnews.physaphae.fr/article.php?IdArticle=8653753 False Industrial None 3.0000000000000000
InfoSecurity Mag - InfoSecurity Magazine ICO lance une enquête Tiktok sur l'utilisation des données des enfants<br>ICO Launches TikTok Investigation Over Use of Children\\'s Data The Information Commissioner\'s Office is now investigating how TikTok uses 13–17-year-olds\' personal information]]> 2025-03-03T10:30:00+00:00 https://www.infosecurity-magazine.com/news/ico-tiktok-investigation-use/ www.secnews.physaphae.fr/article.php?IdArticle=8652940 False None None 3.0000000000000000 Kaspersky - Kaspersky Research blog Évolution mobile des logiciels malveillants en 2024<br>Mobile malware evolution in 2024 The most notable mobile threats of 2024, and statistics on Android-specific malware, adware and potentially unwanted software.]]> 2025-03-03T10:00:49+00:00 https://securelist.com/mobile-threat-report-2024/115494/ www.secnews.physaphae.fr/article.php?IdArticle=8652920 False Malware,Mobile None 3.0000000000000000 We Live Security - Editeur Logiciel Antivirus ESET Martin Rees: Intelligence post-humaine - une perspective cosmique | Pilation forts de Starmus<br>Martin Rees: Post-human intelligence – a cosmic perspective | Starmus highlights Take a moment to think beyond our current capabilities and consider what might come next in the grand story of evolution]]> 2025-03-03T10:00:00+00:00 https://www.welivesecurity.com/en/we-live-science/martin-rees-post-human-intelligence-cosmic-perspective-starmus-highlights/ www.secnews.physaphae.fr/article.php?IdArticle=8661312 False None None 2.0000000000000000 IndustrialCyber - cyber risk firms for industrial Géopolitique, IA et équipes générationnelles: trois tendances clés remodelant l'avenir du cyberadehip<br>Geopolitics, AI, and generational shifts: Three key trends reshaping the future of cyber leadership In a post for the World Economic Forum (WEF), three key trends have been identified as shaping the... ]]> 2025-03-03T09:54:38+00:00 https://industrialcyber.co/critical-infrastructure/geopolitics-ai-and-generational-shifts-three-key-trends-reshaping-the-future-of-cyber-leadership/ www.secnews.physaphae.fr/article.php?IdArticle=8652922 False None None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine BYOVD ATTAQUES EXPLOITS ZERO-DAY dans Paragon Partition Manager<br>BYOVD Attacks Exploit Zero-Day in Paragon Partition Manager Threat actors are exploiting a zero-day bug in Paragon Partition Manager\'s BioNTdrv.sys driver during ransomware attacks]]> 2025-03-03T09:35:00+00:00 https://www.infosecurity-magazine.com/news/byovd-zero-day-paragon-partition/ www.secnews.physaphae.fr/article.php?IdArticle=8652921 False Ransomware,Vulnerability,Threat None 2.0000000000000000 InformationSecurityBuzzNews - Site de News Securite Au-delà du périmètre: pourquoi l'échange de données de confiance zéro est essentiel pour la sécurité moderne<br>Beyond the Perimeter: Why Zero Trust Data Exchange is Essential for Modern Security The landscape of cybersecurity threats presents increasingly dire challenges for organisations worldwide. According to IBM\'s 2024 Cost of a Data Breach Report, the global average cost of a data breach has reached an all-time high of $4.88 million, representing a 15% increase over the past three years. This same research reveals that breaches now take [...]]]> 2025-03-03T09:30:12+00:00 https://informationsecuritybuzz.com/zero-trust-data-exchange-is-essential/ www.secnews.physaphae.fr/article.php?IdArticle=8652923 False Data Breach None 3.0000000000000000 InformationSecurityBuzzNews - Site de News Securite Qilin affirme que Lee Enterprises Ransomware Attack<br>Qilin Claims Lee Enterprises Ransomware Attack Notorious ransomware gang Qilin has claimed responsibility for the 3 February attack on Lee Enterprises, an American media company.  On its data leak site, Qilin claimed to have stolen 350 GB of data, including “investor records, financial arrangements that raise questions, payments to journalists and publishers, funding for tailored news stories, and approaches to obtaining [...]]]> 2025-03-03T09:10:02+00:00 https://informationsecuritybuzz.com/qilin-claims-lee-enterprises-ransomware-attack/ www.secnews.physaphae.fr/article.php?IdArticle=8652924 False Ransomware None 3.0000000000000000 Korben - Bloger francais WeTube - Une appli gratuite qui contourne YouTube et ses pubs 2025-03-03T09:00:00+00:00 https://korben.info/wetube-application-android-alternative-youtube-sans-pub.html www.secnews.physaphae.fr/article.php?IdArticle=8652904 False Mobile None 3.0000000000000000 InformationSecurityBuzzNews - Site de News Securite La cour municipale de Cleveland reste fermée après le cyber<br>Cleveland Municipal Court Remains Closed After Cyber Event The Cleveland Municipal Court, including Cleveland Housing Court, will remain closed today, one week after it was hit by a cyber event.  On its Facebook page on 24 February, it said it is currently investigating a cyber incident. Although it has not confirmed its nature and scope, it said it is taking this incident seriously.    [...]]]> 2025-03-03T08:48:23+00:00 https://informationsecuritybuzz.com/cleveland-municipal-court-remains-clos/ www.secnews.physaphae.fr/article.php?IdArticle=8652903 False None None 2.0000000000000000 Global Security Mag - Site de news francais Verizon Business et Accenture s\'associent pour aider les entreprises à lutter contre les nouvelles menaces de cybersécurité Business]]> 2025-03-03T08:34:36+00:00 https://www.globalsecuritymag.fr/verizon-business-et-accenture-s-associent-pour-aider-les-entreprises-a-lutter.html www.secnews.physaphae.fr/article.php?IdArticle=8652917 False Threat None 3.0000000000000000 The Register - Site journalistique Anglais <i> Le registre </i> obtient ses griffes sur le téléphone tripolaire de Huawei \\<br><i>The Register</i> gets its claws on Huawei\\'s bonkers tri-fold phone It\'s well-built and surprisingly easy to handle but let down by Android. And stupidly expensive First Look  Huawei\'s triple-fold Mate XT smartphone is a classy creation that\'s easy to handle even when fully extended, but disappoints because it\'s ridiculously expensive and the included Android variant struggles to keep pace with the machine\'s contortions.…]]> 2025-03-03T06:33:08+00:00 https://go.theregister.com/feed/www.theregister.com/2025/03/03/ithe_registeri_gets_its_claws/ www.secnews.physaphae.fr/article.php?IdArticle=8652872 False Mobile None 3.0000000000000000 Palo Alto Network - Site Constructeur Sécuriser votre transformation commerciale 5G<br>Secure Your 5G Business Transformation La convergence de la technologie 5G et IA accélère la transformation des entreprises dans les infrastructures critiques et les gouvernements, améliorant la connectivité et l'intelligence.
>5G and AI technology convergence accelerate business transformation in critical infrastructure and governments, enhancing connectivity and intelligence. ]]>
2025-03-03T04:55:17+00:00 https://www.paloaltonetworks.com/blog/2025/03/secure-5g-business-transformation/ www.secnews.physaphae.fr/article.php?IdArticle=8652842 False None None 3.0000000000000000
The Register - Site journalistique Anglais US Cyber ​​Command aurait fait une pause cyberattaques sur la Russie<br>US Cyber Command reportedly pauses cyberattacks on Russia PLUS: Phishing suspects used fishing gear as alibi; Apple\'s \'Find My\' can track PCs and Androids; and more Infosec In Brief  US Defense Secretary Pete Hegseth has reportedly ordered US Cyber Command to pause offensive operations against Russia, as the USA\'s Cybersecurity and Infrastructure Security Agency (CISA) has denied any change in its posture.…]]> 2025-03-03T03:31:11+00:00 https://go.theregister.com/feed/www.theregister.com/2025/03/03/infosec_in_brief/ www.secnews.physaphae.fr/article.php?IdArticle=8652827 False None None 3.0000000000000000 The State of Security - Magazine Américain AI d'origine: redéfinir l'avenir de l'autonomie dans les affaires<br>Agentic AI: Redefining the Future of Autonomy in Business The evolution of artificial intelligence (AI) agents signals a profound transformation in how businesses operate. Unlike traditional AI models that process and respond to queries, Google defines that “Agents are autonomous and can act independently of human intervention.” At the same time, the World Economic Forum explains that an agent is “an entity that perceives its environment through sensors and acts on it through effectors.” AI agents have evolved from rule-based systems to advanced models capable of complex decision-making and independent operation, set to redefine industries. The shift...]]> 2025-03-03T01:50:01+00:00 https://www.tripwire.com/state-of-security/agentic-ai-redefining-future-autonomy-business www.secnews.physaphae.fr/article.php?IdArticle=8652888 False None None 3.0000000000000000 The Register - Site journalistique Anglais Les meilleurs télécommunications de l'Inde \\ prévoient des PC cloud pour ses 475 millions d'abonnés<br>India\\'s top telco plans cloud PCs for its 475 million subscribers 2025-03-03T00:30:37+00:00 https://go.theregister.com/feed/www.theregister.com/2025/03/03/asia_tech_news_in_brief/ www.secnews.physaphae.fr/article.php?IdArticle=8652784 False Cloud None 3.0000000000000000 TrendLabs Security - Editeur Antivirus Les groupes de ransomware Black Basta et Cactus ajoutent des logiciels malveillants en arrière-plan à leur arsenal<br>Black Basta and Cactus Ransomware Groups Add BackConnect Malware to Their Arsenal In this blog entry, we discuss how the Black Basta and Cactus ransomware groups utilized the BackConnect malware to maintain persistent control and exfiltrate sensitive data from compromised machines.]]> 2025-03-03T00:00:00+00:00 https://www.trendmicro.com/en_us/research/25/b/black-basta-cactus-ransomware-backconnect.html www.secnews.physaphae.fr/article.php?IdArticle=8652887 False Ransomware,Malware None 3.0000000000000000 Resecurity - cyber risk firms DragonForce Ransomware - Rapport d'ingénierie inverse<br>DragonForce Ransomware - Reverse Engineering Report 2025-03-03T00:00:00+00:00 https://www.resecurity.com/blog/article/dragonforce-ransomware-reverse-engineering-report www.secnews.physaphae.fr/article.php?IdArticle=8653519 False Ransomware None 3.0000000000000000 Global Security Mag - Site de news francais Les transactions financières exhortent la CISA à annuler et réviser la règle de cyber-rapport trop large<br>Financial Trades Urge CISA to Rescind and Revise Overly Broad Cyber Reporting Rule Opinion
Financial Trades Urge CISA to Rescind and Revise Overly Broad Cyber Reporting Rule - Opinion]]>
2025-03-02T22:09:07+00:00 https://www.globalsecuritymag.fr/financial-trades-urge-cisa-to-rescind-and-revise-overly-broad-cyber-reporting.html www.secnews.physaphae.fr/article.php?IdArticle=8652781 False None None 3.0000000000000000
HackRead - Chercher Cyber La montée du phishing QR: comment les escrocs exploitent les codes QR et comment rester en sécurité<br>The Rise of QR Phishing: How Scammers Exploit QR Codes and How to Stay Safe QR phishing is on the rise, tricking users into scanning malicious QR codes. Learn how cybercriminals exploit QR codes and how to protect yourself.]]> 2025-03-02T20:30:00+00:00 https://hackread.com/rise-of-qr-phishing-how-scammers-exploit-qr-codes/ www.secnews.physaphae.fr/article.php?IdArticle=8652740 False Threat None 3.0000000000000000 Wired Threat Level - Security News Le nouvel agent d'IA d'honneur peut lire et comprendre votre écran<br>Honor\\'s New AI Agent Can Read and Understand Your Screen The Honor UI Agent-powered by Google\'s Gemini 2 model-gives a glimpse of artificial intelligence agents on Android.]]> 2025-03-02T16:30:00+00:00 https://www.wired.com/story/exclusive-look-at-honor-ai-mwc-2025/ www.secnews.physaphae.fr/article.php?IdArticle=8652683 False Mobile None 3.0000000000000000 Global Security Mag - Site de news francais Le salon IT and Cybersecurity Meetings à Cannes Événements]]> 2025-03-02T15:47:14+00:00 https://www.globalsecuritymag.fr/le-salon-it-and-cybersecurity-meetings-a-cannes.html www.secnews.physaphae.fr/article.php?IdArticle=8652680 False None None 3.0000000000000000 Zataz - Magazine Francais de secu HIBP intègre 284 millions de comptes compromis, le SVZ vous avez déjà alerté 2025-03-02T15:07:42+00:00 https://www.zataz.com/hibp-integre-284-millions-de-comptes-compromis-le-svz-vous-avez-deja-alerte/ www.secnews.physaphae.fr/article.php?IdArticle=8652653 False None None 2.0000000000000000 Zataz - Magazine Francais de secu Cyber Command : suspension des opérations cybernétiques contre la Russie 2025-03-02T09:28:00+00:00 https://www.zataz.com/cyber-command-suspension-des-operations-cybernetique-contre-la-russie/ www.secnews.physaphae.fr/article.php?IdArticle=8652582 False None None 3.0000000000000000 IndustrialCyber - cyber risk firms for industrial Mettre en évidence l'accent mis sur l'essor des CISO industriels pour équilibrer la cybersécurité organisationnelle, les opérations, la résilience<br>Highlighting focus on rise of industrial CISOs to balance organizational cybersecurity, operations, resilience As the boundaries between IT and OT environments blur and regulators move to bolster ICS cybersecurity across critical... ]]> 2025-03-02T09:07:56+00:00 https://industrialcyber.co/features/highlighting-focus-on-rise-of-industrial-cisos-to-balance-organizational-cybersecurity-operations-resilience/ www.secnews.physaphae.fr/article.php?IdArticle=8652566 False Industrial None 3.0000000000000000 Korben - Bloger francais Créez facilement des raccourcis clavier en images Keyboard Shortcut Image Generator est un outil en ligne qui vous permet de saisir une combinaison de touches sur votre clavier, et l’outil génère instantanément une image propre et claire des touches qui vont bien. L’outil prend en charge toutes les touches essentielles : Touches de modification (Ctrl, Alt, Shift) Touches Windows/Command pour Mac Barre d’espace Touches directionnelles Icônes spécifiques pour les raccourcis Mac (Options, Cmd, etc.) Vous pouvez ajuster plusieurs paramètres pour obtenir exactement le rendu souhaité tels que la taille de l’image, le style des touches (format Mac ou Windows) ainsi que le format de sortie.]]> 2025-03-02T09:00:00+00:00 https://korben.info/generateur-images-raccourcis-clavier.html www.secnews.physaphae.fr/article.php?IdArticle=8652567 False None None 3.0000000000000000 Wired Threat Level - Security News Gardez votre ancien téléphone Android plus longtemps avec LineageO<br>Keep Your Old Android Phone Running Longer With LineageOS Resist the urge to toss that old phone. Give it a second life by installing this open-source version of Android optimized for outdated hardware.]]> 2025-03-01T13:30:00+00:00 https://www.wired.com/story/keep-your-old-android-phone-running-longer-with-lineageos/ www.secnews.physaphae.fr/article.php?IdArticle=8652313 False Mobile None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Mozilla met à jour les termes de Firefox après le contrecoup sur un langage de licence de données large<br>Mozilla Updates Firefox Terms Again After Backlash Over Broad Data License Language Firefox browser maker Mozilla on Friday updated its Terms of Use a second time within a week following criticism overbroad language that appeared to give the company the rights to all information uploaded by users. The revised Terms of Use now states - You give Mozilla the rights necessary to operate Firefox. This includes processing your data as we describe in the Firefox Privacy Notice. It]]> 2025-03-01T13:30:00+00:00 https://thehackernews.com/2025/03/mozilla-updates-firefox-terms-again.html www.secnews.physaphae.fr/article.php?IdArticle=8652250 False None None 2.0000000000000000 Zataz - Magazine Francais de secu Fuite de données : les municipalités de Les Lilas et Lorient victimes d\'un piratage ? 2025-03-01T12:43:31+00:00 https://www.zataz.com/fuite-de-donnees-les-municipalites-de-les-lilas-et-lorient-victimes-dun-piratage/ www.secnews.physaphae.fr/article.php?IdArticle=8652312 False None None 3.0000000000000000 Wired Threat Level - Security News L'administration Trump dépriorise la Russie en tant que cyber-menace<br>The Trump Administration Is Deprioritizing Russia as a Cyber Threat Plus: The FBI pins that ByBit theft on North Korea, a malicious app download breaches Disney, spyware targets a priest close to the pope, and more.]]> 2025-03-01T11:30:00+00:00 https://www.wired.com/story/trump-administration-deprioritizing-russia-cyber-threat/ www.secnews.physaphae.fr/article.php?IdArticle=8652293 False Threat None 3.0000000000000000 Korben - Bloger francais BioArt Source - Une mine d\'or d\'illustrations médicales gratuites BioArt Source, une bibliothèque gratuite d’illustrations médicales qui va ravir tous ceux qui galèrent à trouver des illustrations scientifiques de qualité. Si vous avez déjà galéré comme moi à chercher une illustration correcte d’un virus, d’une bactérie ou d’un processus biologique pour vos présentations, vos articles de site web ou vos rapports de stage, vous le savez aussi bien que moi, les images trouvées sur Google sont souvent approximatives, protégées par copyright, ou carrément fausses scientifiquement.]]> 2025-03-01T09:00:00+00:00 https://korben.info/bioart-source-illustrations-medicales-gratuites.html www.secnews.physaphae.fr/article.php?IdArticle=8652249 False None None 3.0000000000000000 Zataz - Magazine Francais de secu L\'Opéra de Paris piraté ? 2025-03-01T01:38:18+00:00 https://www.zataz.com/lopera-de-paris-pirate/ www.secnews.physaphae.fr/article.php?IdArticle=8652148 False None None 2.0000000000000000 Zataz - Magazine Francais de secu Un pirate s\'attaque à EDF DPIH 2025-03-01T01:14:23+00:00 https://www.zataz.com/un-pirate-sattaque-a-edf-dpih/ www.secnews.physaphae.fr/article.php?IdArticle=8652149 False None None 1.00000000000000000000 Zataz - Magazine Francais de secu Nouvelle fuite de données à la Fédération Française de Football : plus de 43 000 utilisateurs concernés 2025-03-01T01:01:45+00:00 https://www.zataz.com/nouvelle-fuite-de-donnees-a-la-federation-francaise-de-football-plus-de-43-000-utilisateurs-concernes/ www.secnews.physaphae.fr/article.php?IdArticle=8652131 False None None 2.0000000000000000 HexaCorn - Blog de recherche Chasse pour Warez et autres trucs douteux que les gens installent / téléchargement, partie 1<br>Hunting for the warez & other dodgy stuff people install / download, part 1 Continuer la lecture →
It is a sad IT fact, but employees install pirated/dodgy software on regular basis and download&execute whatever they want. There is no way to stop them… other than implementing a very strict software installation/program execution policy. Which obviously always ricochets … Continue reading →]]>
2025-03-01T00:30:33+00:00 https://www.hexacorn.com/blog/2025/03/01/hunting-for-the-warez-other-dodgy-stuff-people-install-download-part-1/ www.secnews.physaphae.fr/article.php?IdArticle=8652147 False None None 3.0000000000000000
CyberScoop - scoopnewsgroup.com special Cyber Solarwinds CISO dit que les dirigeants de sécurité sont \\ 'nerveux \\' sur la responsabilité individuelle pour les violations de données<br>SolarWinds CISO says security execs are \\'nervous\\' about individual liability for data breaches Tim Brown n'a pas appelé les lois sur l'indemnisation, mais a suggéré que les CISO traitant des implications juridiques pour les cyberattaques sont stressantes et une distraction de leur travail principal.
>Tim Brown didn\'t call for indemnification laws, but suggested that CISOs dealing with legal implications for cyberattacks is stressful and a distraction from their core work. ]]>
2025-02-28T23:23:32+00:00 https://cyberscoop.com/tim-brown-solarwinds-liability-cyberlawcon/ www.secnews.physaphae.fr/article.php?IdArticle=8652129 False None None 3.0000000000000000
Dark Reading - Informationweek Branch L'accord Snapattack de Cisco étend les capacités de Splunk \\<br>Cisco\\'s SnapAttack Deal Expands Splunk\\'s Capabilities The addition of SnapAttack, a startup incubated by Booz Allen Hamilton\'s Darklabs, will enhance Splunk with accelerated SIEM migration and proactive threat hunting.]]> 2025-02-28T23:15:07+00:00 https://www.darkreading.com/threat-intelligence/cisco-snapattack-deal-expands-splunk-capabilities www.secnews.physaphae.fr/article.php?IdArticle=8652995 False Threat None 2.0000000000000000 TroyHunt - Blog Security Android 0 jour vendu par Cellebrite exploité pour pirater le téléphone de l'étudiant serbe \\<br>Android 0-day sold by Cellebrite exploited to hack Serbian student\\'s phone Android users who have installed Google\'s February patch batch should do so ASAP.]]> 2025-02-28T23:08:30+00:00 https://arstechnica.com/security/2025/02/android-0-day-sold-by-cellebrite-exploited-to-hack-serbian-students-phone/ www.secnews.physaphae.fr/article.php?IdArticle=8652128 False Hack,Mobile None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Amnesty trouve le jour zéro de Cellebrite \\ pour déverrouiller le téléphone Android de l'activiste serbe \\<br>Amnesty Finds Cellebrite\\'s Zero-Day Used to Unlock Serbian Activist\\'s Android Phone A 23-year-old Serbian youth activist had their Android phone targeted by a zero-day exploit developed by Cellebrite to unlock the device, according to a new report from Amnesty International. "The Android phone of one student protester was exploited and unlocked by a sophisticated zero-day exploit chain targeting Android USB drivers, developed by Cellebrite," the international non-governmental]]> 2025-02-28T22:18:00+00:00 https://thehackernews.com/2025/02/amnesty-finds-cellebrites-zero-day.html www.secnews.physaphae.fr/article.php?IdArticle=8652039 False Vulnerability,Threat,Mobile None 3.0000000000000000 Schneier on Security - Chercheur Cryptologue Américain Vendredi Blogging Squid: Manger des calamaires bioluminescents<br>Friday Squid Blogging: Eating Bioluminescent Squid Deligy à New York. Blog Moderation Policy.
Firefly squid is now a delicacy in New York. Blog moderation policy.]]>
2025-02-28T22:00:34+00:00 https://www.schneier.com/blog/archives/2025/02/friday-squid-blogging-eating-bioluminescent-squid.html www.secnews.physaphae.fr/article.php?IdArticle=8652099 False None None 2.0000000000000000
Techworm - News 1,6 million de téléviseurs Android piratés et infectés par le botnet VO1D dans le monde entier<br>1.6 Million Android TVs Hacked & Infected By Vo1d Botnet Worldwide 2025-02-28T21:54:06+00:00 https://www.techworm.net/2025/02/1-6-million-android-tvs-hacked-infected-by-vo1d-botnet-worldwide.html www.secnews.physaphae.fr/article.php?IdArticle=8652024 False Malware,Vulnerability,Threat,Mobile None 3.0000000000000000 HackRead - Chercher Cyber Microsoft perturbe la tempête-2139 pour LLMJacking et Azure Ai Exploitation<br>Microsoft Disrupts Storm-2139 for LLMjacking and Azure AI Exploitation Microsoft exposes Storm-2139, a cybercrime network exploiting Azure AI via LLMjacking. Learn how stolen API keys enabled harmful…]]> 2025-02-28T20:54:25+00:00 https://hackread.com/microsoft-storm-2139-llmjacking-azure-ai-exploitation/ www.secnews.physaphae.fr/article.php?IdArticle=8652086 False None None 2.0000000000000000 SecurityWeek - Security News Amnesty révèle l'exploit Android Cellebrite Zero-Day sur un militant étudiant serbe<br>Amnesty Reveals Cellebrite Zero-Day Android Exploit on Serbian Student Activist Amnesty International publie des détails techniques sur les vulnérabilités zéro jour exploitées par les outils médico-légaux mobiles de Cellebrite \\ pour espionner un militant étudiant serbe.
>Amnesty International publishes technical details on zero-day vulnerabilities exploited by Cellebrite\'s mobile forensic tools to spy on a Serbian student activist. ]]>
2025-02-28T20:20:54+00:00 https://www.securityweek.com/amnesty-reveals-cellebrite-zero-day-android-exploit-on-serbian-student-activist/ www.secnews.physaphae.fr/article.php?IdArticle=8652085 False Tool,Vulnerability,Threat,Mobile,Technical None 3.0000000000000000
Krebs on Security - Chercheur Américain Malware notoire, l'hôte de spam «Prospero» se déplace vers Kaspersky Lab<br>Notorious Malware, Spam Host “Prospero” Moves to Kaspersky Lab One of the most notorious providers of abuse-friendly "bulletproof" web hosting for cybercriminals has started routing its operations through networks run by the Russian antivirus and security firm Kaspersky Lab, KrebsOnSecurity has learned.]]> 2025-02-28T20:14:58+00:00 https://krebsonsecurity.com/2025/02/notorious-malware-spam-host-prospero-moves-to-kaspersky-lab/ www.secnews.physaphae.fr/article.php?IdArticle=8652084 False Spam,Malware None 2.0000000000000000 HackRead - Chercher Cyber Convertir l'audio en vidéo: comment transformer vos podcasts en vidéos incontournables<br>Convert Audio to Video: How to Transform Your Podcasts into Must-Watch Videos Not getting enough views or traffic to your podcasts? Try this stunning AI audio-to-video generator to transform your…]]> 2025-02-28T20:09:00+00:00 https://hackread.com/convert-audio-to-video-transform-podcasts-must-watch-videos/ www.secnews.physaphae.fr/article.php?IdArticle=8652130 False None None 3.0000000000000000 Recorded Future - FLux Recorded Future Exclusif: Hegseth ordonne à la cyber commande de se retirer sur la planification de la Russie<br>Exclusive: Hegseth orders Cyber Command to stand down on Russia planning The secretary of Defense has ordered U.S. Cyber Command to stand down from all planning against Russia, including offensive digital actions, sources tell Recorded Future News.]]> 2025-02-28T20:01:33+00:00 https://therecord.media/hegseth-orders-cyber-command-stand-down-russia-planning www.secnews.physaphae.fr/article.php?IdArticle=8652070 False None None 3.0000000000000000 Recorded Future - FLux Recorded Future La Californie arrête le courtier de données pour ne pas s'inscrire<br>California shuts down data broker for failing to register The California Privacy Protection Agency (CPPA) on Thursday announced that a data broker must shut down its business for three years for failing to comply with the state\'s Delete Act, which requires certain brokers to register with the state.]]> 2025-02-28T19:54:20+00:00 https://therecord.media/california-shuts-down-data-broker-for-failing-to-register www.secnews.physaphae.fr/article.php?IdArticle=8652071 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Microsoft Busts Hackers vendant un accès Azure illégal<br>Microsoft Busts Hackers Selling Illegal Azure AI Access LLMjacking operation leveraged illicit access GenAI services to produce explicit celebrity images and other harmful content, Microsoft\'s digital crimes unit says.]]> 2025-02-28T19:53:16+00:00 https://www.darkreading.com/application-security/microsoft-openai-hackers-selling-illicit-access-azure-llm-services www.secnews.physaphae.fr/article.php?IdArticle=8652068 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) RDP: une épée à double tranchant pour les équipes informatiques - essentiel mais exploitable<br>RDP: a Double-Edged Sword for IT Teams – Essential Yet Exploitable Remote Desktop Protocol (RDP) is an amazing technology developed by Microsoft that lets you access and control another computer over a network. It\'s like having your office computer with you wherever you go. For businesses, this means IT staff can manage systems remotely, and employees can work from home or anywhere, making RDP a true game-changer in today\'s work environment. But here\'s the]]> 2025-02-28T19:53:00+00:00 https://thehackernews.com/2025/02/rdp-double-edged-sword-for-it-teams.html www.secnews.physaphae.fr/article.php?IdArticle=8651993 False None None 3.0000000000000000 Dark Reading - Informationweek Branch US Soldier a l'intention d'admettre le piratage de 15 transporteurs de télécommunications<br>US Soldier Intends to Admit Hacking 15 Telecom Carriers The federal government views the defendant as a flight risk and danger to the community due to his ability to access sensitive and private information.]]> 2025-02-28T19:36:49+00:00 https://www.darkreading.com/cyber-risk/us-soldier-admits-hacking-15-telecom-carriers www.secnews.physaphae.fr/article.php?IdArticle=8652069 False None None 3.0000000000000000 Bleeping Computer - Magazine Américain Les États-Unis récupèrent 31 millions de dollars volés en 2021 Uranium Finance Hack<br>U.S. recovers $31 million stolen in 2021 Uranium Finance hack U.S. authorities recovered $31 million in cryptocurrency stolen in 2021 cyberattacks on Uranium Finance, a Binance Smart Chain-based DeFi protocol. [...]]]> 2025-02-28T19:22:35+00:00 https://www.bleepingcomputer.com/news/cryptocurrency/us-recovers-31-million-stolen-in-2021-uranium-finance-hack/ www.secnews.physaphae.fr/article.php?IdArticle=8652132 False Hack None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) 5 000 PDF de phishing sur 260 domaines distribuent le voleur de Lumma via de faux captchas<br>5,000 Phishing PDFs on 260 Domains Distribute Lumma Stealer via Fake CAPTCHAs Cybersecurity researchers have uncovered a widespread phishing campaign that uses fake CAPTCHA images shared via PDF documents hosted on Webflow\'s content delivery network (CDN) to deliver the Lumma stealer malware. Netskope Threat Labs said it discovered 260 unique domains hosting 5,000 phishing PDF files that redirect victims to malicious websites. "The attacker uses SEO to trick victims into]]> 2025-02-28T19:19:00+00:00 https://thehackernews.com/2025/02/5000-phishing-pdfs-on-260-domains.html www.secnews.physaphae.fr/article.php?IdArticle=8651994 False Malware,Threat None 3.0000000000000000 HackRead - Chercher Cyber Plus de 350 sites Web de haut niveau frappés par une attaque 360XSS<br>Over 350 High-Profile Websites Hit by 360XSS Attack 360XSS campaign exploits Krpano XSS to hijack search results & distribute spam ads on 350+ sites, including government,…]]> 2025-02-28T18:17:13+00:00 https://hackread.com/over-350-high-profile-websites-hit-by-360xss-attack/ www.secnews.physaphae.fr/article.php?IdArticle=8652053 False Spam None 3.0000000000000000 Recorded Future - FLux Recorded Future Le gouvernement allemand nie les interférences aux élections étrangères qui ont réussi<br>German government denies foreign election interference was successful The recent federal election in Germany "was not manipulated by foreign actors,” a government spokesperson said, following comments by a Bundestag member.]]> 2025-02-28T17:55:15+00:00 https://therecord.media/german-government-denies-election-interference-successful www.secnews.physaphae.fr/article.php?IdArticle=8652040 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Risque tiers Risque Top Cybersecurity Claims<br>Third-Party Risk Top Cybersecurity Claims Data collected by cyber-insurers show that ransomware accounts for the majority of insurance claims, but that much of the losses stem from third-party breaches affecting policyholders.]]> 2025-02-28T16:20:46+00:00 https://www.darkreading.com/cyber-risk/third-party-risk-top-cybersecurity-claims www.secnews.physaphae.fr/article.php?IdArticle=8652996 False Ransomware None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Microsoft expose les cybercriminels llmjacking derrière le système d'abus Azure AI<br>Microsoft Exposes LLMjacking Cybercriminals Behind Azure AI Abuse Scheme Microsoft on Thursday unmasked four of the individuals that it said were behind an Azure Abuse Enterprise scheme that involves leveraging unauthorized access to generative artificial intelligence (GenAI) services in order to produce offensive and harmful content. The campaign, called LLMjacking, has targeted various AI offerings, including Microsoft\'s Azure OpenAI Service. The tech giant is]]> 2025-02-28T16:03:00+00:00 https://thehackernews.com/2025/02/microsoft-exposes-llmjacking.html www.secnews.physaphae.fr/article.php?IdArticle=8651947 False None None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) 12 000+ clés API et mots de passe trouvés dans les ensembles de données publiques utilisés pour la formation LLM<br>12,000+ API Keys and Passwords Found in Public Datasets Used for LLM Training A dataset used to train large language models (LLMs) has been found to contain nearly 12,000 live secrets, which allow for successful authentication. The findings once again highlight how hard-coded credentials pose a severe security risk to users and organizations alike, not to mention compounding the problem when LLMs end up suggesting insecure coding practices to their users. Truffle]]> 2025-02-28T15:54:00+00:00 https://thehackernews.com/2025/02/12000-api-keys-and-passwords-found-in.html www.secnews.physaphae.fr/article.php?IdArticle=8651924 False None None 3.0000000000000000 Zataz - Magazine Francais de secu L\'Opéra national du Rhin se retrouve sans voix après un piratage 2025-02-28T15:42:35+00:00 https://www.zataz.com/lopera-national-du-rhin-se-retrouve-sans-voix-apres-un-piratage/ www.secnews.physaphae.fr/article.php?IdArticle=8652011 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Le loup-garou collant utilise un implant sans papiers pour déployer le voleur de Lumma en Russie et en Biélorussie<br>Sticky Werewolf Uses Undocumented Implant to Deploy Lumma Stealer in Russia and Belarus The threat actor known as Sticky Werewolf has been linked to targeted attacks primarily in Russia and Belarus with the aim of delivering the Lumma Stealer malware by means of a previously undocumented implant. Cybersecurity company Kaspersky is tracking the activity under the name Angry Likho, which it said bears a "strong resemblance" to Awaken Likho (aka Core Werewolf, GamaCopy, and]]> 2025-02-28T15:06:00+00:00 https://thehackernews.com/2025/02/sticky-werewolf-uses-undocumented.html www.secnews.physaphae.fr/article.php?IdArticle=8651925 False Malware,Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Top 10 pour les façons les plus probables qu'une entreprise puisse être piratée<br>Top 10 Most Probable Ways a Company Can Be Hacked How to win the battle with root cause analysis and a data-driven approach.]]> 2025-02-28T15:00:00+00:00 https://www.darkreading.com/vulnerabilities-threats/top-10-most-probable-ways-company-can-be-hacked www.secnews.physaphae.fr/article.php?IdArticle=8651992 False None None 3.0000000000000000 Recorded Future - FLux Recorded Future La répression mondiale du matériel de violence sexuelle générée par les enfants générés par l'IA mène à 25 arrestations<br>Global crackdown on AI-generated child sexual abuse material leads to 25 arrests “Operation Cumberland,” led by Danish law enforcement, included the arrests of more than two dozen suspected members of a group distributing sexual images of minors generated by artificial intelligence.]]> 2025-02-28T14:59:20+00:00 https://therecord.media/csam-ai-arrests-europol www.secnews.physaphae.fr/article.php?IdArticle=8651996 False Legislation None 3.0000000000000000 Recorded Future - FLux Recorded Future Anne Neuberger sur ai: \\ 'Nous devons nous défier à être le premier \\'<br>Anne Neuberger on AI: \\'We have to challenge ourselves to be first\\' The Click Here podcast caught up with Anne Neuberger, the former White House deputy national security advisor for cyber and emerging technologies on the sidelines of this year\'s Munich Security Conference.]]> 2025-02-28T14:54:16+00:00 https://therecord.media/neuberger-on-ai-challenge-to-be-first www.secnews.physaphae.fr/article.php?IdArticle=8652026 False Conference None 3.0000000000000000 Recorded Future - FLux Recorded Future Le silence britannique sur Apple \\ 'Door Door \\' est non durable et injustifiable, disent des experts<br>UK silence over Apple \\'back door\\' is unsustainable and unjustifiable, say experts Britain\'s government risks its domestic and international standing as it refuses to either confirm or deny any details about a legal notice targeting Apple\'s cryptographic protections for iCloud accounts, experts tell Recorded Future News.]]> 2025-02-28T14:32:57+00:00 https://therecord.media/apple-uk-back-door-request-privacy-security-experts www.secnews.physaphae.fr/article.php?IdArticle=8651997 False None None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les attaques tierces entraînent des pertes financières majeures en 2024<br>Third-Party Attacks Drive Major Financial Losses in 2024 Data from Resilience found that third-party attacks made up 23% of material cyber insurance claims in 2024, with ransomware attacks targeting vendors a major driver]]> 2025-02-28T14:15:00+00:00 https://www.infosecurity-magazine.com/news/third-party-financial-losses/ www.secnews.physaphae.fr/article.php?IdArticle=8651995 False Ransomware None 3.0000000000000000 knowbe4 - cybersecurity services Protégez vos appareils: les attaques de phishing mobile contournent les mesures de sécurité du bureau<br>Protect Your Devices: Mobile Phishing Attacks Bypass Desktop Security Measures Protect Your Devices: Mobile Phishing Attacks Bypass Desktop Security Measures ]]> 2025-02-28T14:13:19+00:00 https://blog.knowbe4.com/protect-your-devices-mobile-phishing-attacks-bypass-desktop-security-measures www.secnews.physaphae.fr/article.php?IdArticle=8651991 False Mobile None 3.0000000000000000 Zataz - Magazine Francais de secu Une nouvelle fuite de données chez La Poste ? Un pirate revend 50 000 informations sensibles 2025-02-28T14:11:43+00:00 https://www.zataz.com/une-nouvelle-fuite-de-donnees-chez-la-poste-un-pirate-revend-50-000-informations-sensibles/ www.secnews.physaphae.fr/article.php?IdArticle=8651990 False None None 3.0000000000000000 SecurityWeek - Security News Dans d'autres nouvelles: Krispy Kreme Breach Cost, Pwn2own Berlin, Disney Hack Story<br>In Other News: Krispy Kreme Breach Cost, Pwn2Own Berlin, Disney Hack Story Des histoires remarquables qui auraient pu glisser sous le radar: la violation de données Krispy Kreme coûte 11 millions de dollars, Pwn2own déménage à Berlin, l'histoire du hack Disney 2024.
>Noteworthy stories that might have slipped under the radar: Krispy Kreme data breach costs $11M, Pwn2Own moves to Berlin, the story of the 2024 Disney hack. ]]>
2025-02-28T13:22:27+00:00 https://www.securityweek.com/in-other-news-krispy-kreme-breach-cost-pwn2own-berlin-disney-hack-story/ www.secnews.physaphae.fr/article.php?IdArticle=8651977 False Data Breach,Hack None 3.0000000000000000
IndustrialCyber - cyber risk firms for industrial Les chercheurs du modat révèlent des vulnérabilités massives de l'AMS, mettant les industries critiques à un cyber-risque<br>Modat researchers reveal massive AMS vulnerabilities, putting critical industries at cyber risk Les chercheurs de MODAT ont détaillé un risque de sécurité mondial important résultant de systèmes de gestion d'accès erronés et insuffisamment garantis ...
>Researchers from Modat detailed a significant global security risk stemming from misconfigured and inadequately secured access management systems... ]]>
2025-02-28T13:22:00+00:00 https://industrialcyber.co/vulnerabilities/modat-researchers-reveal-massive-ams-vulnerabilities-putting-critical-industries-at-cyber-risk/ www.secnews.physaphae.fr/article.php?IdArticle=8652220 False Vulnerability None 4.0000000000000000
Bleeping Computer - Magazine Américain Qilin Ransomware réclame une attaque à Lee Enterprises, des fuites volées de données<br>Qilin ransomware claims attack at Lee Enterprises, leaks stolen data The Qilin ransomware gang has claimed responsibility for the attack at Lee Enterprises that disrupted operations on February 3, leaking samples of data they claim was stolen from the company. [...]]]> 2025-02-28T13:20:31+00:00 https://www.bleepingcomputer.com/news/security/qilin-ransomware-claims-attack-at-lee-enterprises-leaks-stolen-data/ www.secnews.physaphae.fr/article.php?IdArticle=8652054 False Ransomware None 2.0000000000000000 Checkpoint - Fabricant Materiel Securite Migration du réseau Hub and Speak à Azure Virtual Wan<br>Migrating from Hub and Spoke Network to Azure Virtual WAN Azure Virtual Wan est un service réseau robuste qui combine les fonctionnalités de mise en réseau, de sécurité et de routage dans une seule interface opérationnelle. Cette approche innovante simplifie la complexité de la gestion de plusieurs types de connectivité tels que VNET, VPN, utilisateur distant et connectivité expressRoute. Pour bénéficier des avantages de Azure Virtual WAN, vous pouvez commencer par 2 VNETS - et en ajoutez d'autres à mesure que vos réseaux et vos besoins commerciaux évoluent. L'intime à retenir ici est que Azure Virtual WAN est un modèle «réseau en tant que service» qui utilise une architecture familière de pavage et de rayons et exploite le squelette mondial Microsoft pour une connectivité transparente en transit. Défis des architectures de hub et de rayons Le hub et rayon traditionnel […]
>Azure Virtual WAN is a robust network service that combines networking, security, and routing functionalities into a single operational interface. This innovative approach simplifies the complexity of managing multiple connectivity types such as VNet, VPN, remote user, and ExpressRoute connectivity. To gain the benefits of Azure Virtual WAN you can begin with 2 VNets -and add others as your networks and business needs evolve. The key takeaway here is that Azure Virtual WAN is a “network-as-a-service” model that uses a familiar hub-and-spoke architecture and leverages the Microsoft global backbone for seamless transit connectivity. Challenges of Hub-and-Spoke Architectures The traditional hub-and-spoke […] ]]>
2025-02-28T13:00:31+00:00 https://blog.checkpoint.com/security/migrating-from-hub-and-spoke-network-to-azure-virtual-wan/ www.secnews.physaphae.fr/article.php?IdArticle=8651963 False None None 2.0000000000000000
Palo Alto Network - Site Constructeur Deepseek dévoilé - Exposer les risques Genai se cachant à la vue<br>DeepSeek Unveiled - Exposing the GenAI Risks Hiding in Plain Sight Les réseaux Palo Alto ont connu une augmentation de 1 800% du trafic en profondeur, soulignant la nécessité de rester vigilant contre de nouveaux outils d'IA dépassant les mesures de sécurité.
>Palo Alto Networks saw a 1,800% increase in DeepSeek traffic, highlighting the need to stay vigilant against new AI tools outpacing security measures. ]]>
2025-02-28T13:00:18+00:00 https://www.paloaltonetworks.com/blog/2025/02/deepseek-unveiled-exposing-genai-risks-hiding-in-plain-sight/ www.secnews.physaphae.fr/article.php?IdArticle=8651962 False Tool None 2.0000000000000000
Recorded Future - FLux Recorded Future Hacker derrière plus de 90 fuites de données de haut niveau dans le monde arrêtées en Thaïlande<br>Hacker behind over 90 high-profile data leaks worldwide arrested in Thailand Authorities said they arrested a 39-year-old in Bangkok who was the hacker responsible for dozens of high-profile extortion cases.]]> 2025-02-28T12:57:27+00:00 https://therecord.media/hacker-arrested-bangkok-data-breaches-extortion www.secnews.physaphae.fr/article.php?IdArticle=8651964 False None None 3.0000000000000000 Wired Threat Level - Security News Utilisez Apple Invite à organiser votre prochain événement<br>Use Apple Invites to Organize Your Next Event Apple\'s new event planning app lets you gather friends and family in one place-even if they\'re on Android.]]> 2025-02-28T12:30:00+00:00 https://www.wired.com/story/how-to-use-apple-invites/ www.secnews.physaphae.fr/article.php?IdArticle=8651961 False Mobile None 3.0000000000000000 IndustrialCyber - cyber risk firms for industrial La loi sur la cybersécurité agricole et alimentaire réintroduite pour protéger la chaîne d'approvisionnement alimentaire des cyber-menaces<br>Farm and Food Cybersecurity Act reintroduced to protect food supply chain from cyber threats U.S. lawmakers from the Senate and House of Representatives have reintroduced the Farm and Food Cybersecurity legislation that... ]]> 2025-02-28T12:05:24+00:00 https://industrialcyber.co/regulation-standards-and-compliance/farm-and-food-cybersecurity-act-reintroduced-to-protect-food-supply-chain-from-cyber-threats/ www.secnews.physaphae.fr/article.php?IdArticle=8651942 False Legislation None 2.0000000000000000 IndustrialCyber - cyber risk firms for industrial Black Basta Laak expose les tactiques de ransomware critiques et les conflits internes, révélant des modèles d'attaque<br>Black Basta leak exposes critical ransomware tactics and internal strife, revealing attack patterns Les chercheurs de Kela ont rapporté que la fuite de Blasta noire a révélé des modèles critiques utilisés par les opérateurs de ransomwares pour infiltrer l'entreprise ...
>KELA researchers reported that the Black Basta leak revealed critical patterns used by ransomware operators to infiltrate corporate... ]]>
2025-02-28T12:03:40+00:00 https://industrialcyber.co/ransomware/black-basta-leak-exposes-critical-ransomware-tactics-and-internal-strife-revealing-attack-patterns/ www.secnews.physaphae.fr/article.php?IdArticle=8651943 False Ransomware None 3.0000000000000000
InfoSecurity Mag - InfoSecurity Magazine Cybersecurity M&A Roundup: Solarwinds acquis pour 4,4 milliards de dollars<br>Cybersecurity M&A Roundup: SolarWinds Acquired for $4.4bn In February 2025, Sophos completed the Secureworks deal and SolarWinds went private]]> 2025-02-28T12:00:00+00:00 https://www.infosecurity-magazine.com/news/cybersecurity-ma-roundup-february/ www.secnews.physaphae.fr/article.php?IdArticle=8651958 False None None 2.0000000000000000