www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2025-05-12T06:57:34+00:00 www.secnews.physaphae.fr InfoSecurity Mag - InfoSecurity Magazine Morphing meerkat phaas plateforme upoofs 100+ marques<br>Morphing Meerkat PhaaS Platform Spoofs 100+ Brands A PhaaS platform, dubbed \'Morphing Meerkat,\' uses DNS MX records to spoof over 100 brands and steal credentials, according to Infoblox Threat Intel]]> 2025-03-28T11:20:00+00:00 https://www.infosecurity-magazine.com/news/morphing-meerkat-phaas-platform/ www.secnews.physaphae.fr/article.php?IdArticle=8658846 False Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Mozilla Patches Critical Firefox Bug similaire à la récente vulnérabilité de Chrome \\<br>Mozilla Patches Critical Firefox Bug Similar to Chrome\\'s Recent Zero-Day Vulnerability Mozilla has released updates to address a critical security flaw impacting its Firefox browser for Windows, merely days after Google patched a similar flaw in Chrome that came under active exploitation as a zero-day. The security vulnerability, CVE-2025-2857, has been described as a case of an incorrect handle that could lead to a sandbox escape. "Following the recent Chrome sandbox escape (]]> 2025-03-28T11:14:00+00:00 https://thehackernews.com/2025/03/mozilla-patches-critical-firefox-bug.html www.secnews.physaphae.fr/article.php?IdArticle=8658786 False Vulnerability,Threat None 2.0000000000000000 Bleeping Computer - Magazine Américain Oracle Health Breach compromet les données des patients dans les hôpitaux américains<br>Oracle Health breach compromises patient data at US hospitals A breach at Oracle Health impacts multiple US healthcare organizations and hospitals after a threat actor stole patient data from legacy servers. [...]]]> 2025-03-28T10:13:58+00:00 https://www.bleepingcomputer.com/news/security/oracle-health-breach-compromises-patient-data-at-us-hospitals/ www.secnews.physaphae.fr/article.php?IdArticle=8658884 False Threat,Medical None 3.0000000000000000 eSecurityPlanet - Blog Nouveau \\ 'Lucid \\' La plate-forme de phishing abuse iMessage, Android RCS pour glisser les défenses passées<br>New \\'Lucid\\' Phishing Platform Abuses iMessage, Android RCS to Slip Past Defenses Un service de cybercriminalité sophistiqué connu sous le nom de «Lucid» exploite les vulnérabilités dans les riches services de communication (RCS) d'Apple \\, permettant aux cyberthies de mener des attaques de phishing à grande échelle avec un succès alarmant.  Opérée par des acteurs de menace chinois, cette plate-forme de phishing-as-a-service (PHAAS) permet aux escrocs de contourner les filtres de sécurité basés sur SMS, ce qui en fait l'une des opérations de phishing les plus efficaces […]
>A sophisticated cybercrime service known as “Lucid” is exploiting vulnerabilities in Apple\'s iMessage and Android\'s Rich Communication Services (RCS), allowing cyberthieves to conduct large-scale phishing attacks with alarming success.  Operated by Chinese-speaking threat actors, this Phishing-as-a-Service (PhaaS) platform enables scammers to bypass traditional SMS-based security filters, making it one of the most effective phishing operations […] ]]>
2025-03-28T09:06:04+00:00 https://www.esecurityplanet.com/trends/lucid-phishing-imessage-android/ www.secnews.physaphae.fr/article.php?IdArticle=8661726 False Vulnerability,Threat,Mobile None 3.0000000000000000
ProofPoint - Cyber Firms Microsoft pour commencer à appliquer de nouvelles limites de messagerie sortante<br>Microsoft to Start Enforcing New Outbound Email Limits 2025-03-28T07:43:03+00:00 https://www.proofpoint.com/us/blog/email-and-cloud-threats/microsoft-start-enforcing-outbound-email-limits www.secnews.physaphae.fr/article.php?IdArticle=8658981 False Threat,Legislation None 3.0000000000000000 InformationSecurityBuzzNews - Site de News Securite Ouah! Un gang de ransomwares vient de reprendre l'un des plus grands FAI d'Amérique<br>WoW! A Ransomware Gang Just Took Over One of America\\'s Largest ISPs A new ransomware gang, Arkana Security, is claiming responsibility for an enormous breach at WideOpenWest (WoW), one of the largest cable operators and ISPs in the US.  The malicious actors boasted they had full backend control and even put a music video montage together to illustrate exactly how much access they had.   Threat researchers from [...]]]> 2025-03-28T07:27:56+00:00 https://informationsecuritybuzz.com/wow-a-ransomware-gang-over-one-america/ www.secnews.physaphae.fr/article.php?IdArticle=8658801 False Ransomware,Threat None 3.0000000000000000 InformationSecurityBuzzNews - Site de News Securite Le déni de violation des données d'Oracle \\ se déroule alors que les informations divulguées vérifient<br>Oracle\\'s Data Breach Denial Unravels as Leaked Info Checks Out Despite Oracle’s denial of a breach affecting its Oracle Cloud federated SSO login servers, Bleeping Computer has confirmed with multiple companies that data samples shared by the threat actor are authentic.  Recently, a threat actor, “rose87168,” claimed to be selling six million records, including sensitive account data, on dark web forums.   CloudSEK\'s investigation suggests [...]]]> 2025-03-28T06:24:44+00:00 https://informationsecuritybuzz.com/oracles-data-breach-denial-unravels/ www.secnews.physaphae.fr/article.php?IdArticle=8658784 False Data Breach,Threat,Cloud None 2.0000000000000000 TrendLabs Security - Editeur Antivirus Une plongée profonde dans l'arsenal et l'infrastructure de Gamayun \\<br>A Deep Dive into Water Gamayun\\'s Arsenal and Infrastructure Trend Research discusses the delivery methods, custom payloads, and techniques used by Water Gamayun, the suspected Russian threat actor abusing a zero-day vulnerability in the Microsoft Management Console framework (CVE-2025-26633) to execute malicious code on infected machines.]]> 2025-03-28T00:00:00+00:00 https://www.trendmicro.com/en_us/research/25/c/deep-dive-into-water-gamayun.html www.secnews.physaphae.fr/article.php?IdArticle=8658883 False Vulnerability,Threat,Prediction None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) New Morphing Meerkat Phishing Kit imite 114 marques à l'aide de Victimes \\ 'DNS Records e-mail<br>New Morphing Meerkat Phishing Kit Mimics 114 Brands Using Victims\\' DNS Email Records Cybersecurity researchers have shed light on a new phishing-as-a-service (PhaaS) platform that leverages the Domain Name System (DNS) mail exchange (MX) records to serve fake login pages that impersonate about 114 brands. DNS intelligence firm Infoblox is tracking the actor behind the PhaaS, the phishing kit, and the related activity under the moniker Morphing Meerkat. "The threat actor behind]]> 2025-03-27T22:28:00+00:00 https://thehackernews.com/2025/03/new-morphing-meerkat-phishing-kit.html www.secnews.physaphae.fr/article.php?IdArticle=8658654 False Threat None 3.0000000000000000 knowbe4 - cybersecurity services Rapport: le phishing reste la cyber-menace la plus répandue<br>Report: Phishing Remains the Most Prevalent Cyber Threat Report: Phishing Remains the Most Prevalent Cyber Threat ]]> 2025-03-27T21:07:44+00:00 https://blog.knowbe4.com/report-phishing-remains-the-most-prevalent-cyber-threat www.secnews.physaphae.fr/article.php?IdArticle=8658700 False Threat None 3.0000000000000000 CyberScoop - scoopnewsgroup.com special Cyber Ventes d'extension du navigateur, les mises à jour constituent une menace cachée pour les entreprises<br>Browser extension sales, updates pose hidden threat to enterprises Certaines autorisations d'extension du navigateur sont trop larges et les propriétaires peuvent rapidement réutiliser les capacités pré-approuvées pour une intention malveillante, a déclaré un chercheur en sécurité à Cyberscoop.
>Some browser extension permissions are too broad, and owners can quickly repurpose pre-approved capabilities for malicious intent, a security researcher told CyberScoop. ]]>
2025-03-27T19:06:43+00:00 https://cyberscoop.com/browser-extension-sales-permissions-hidden-threat/ www.secnews.physaphae.fr/article.php?IdArticle=8658667 False Threat None 3.0000000000000000
The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) APT36 Spoofs India Publier un site Web pour infecter les utilisateurs de Windows et Android avec des logiciels malveillants<br>APT36 Spoofs India Post Website to Infect Windows and Android Users with Malware An advanced persistent threat (APT) group with ties to Pakistan has been attributed to the creation of a fake website masquerading as India\'s public sector postal system as part of a campaign designed to infect both Windows and Android users in the country. Cybersecurity company CYFIRMA has attributed the campaign with medium confidence to a threat actor called APT36, which is also known as]]> 2025-03-27T18:01:00+00:00 https://thehackernews.com/2025/03/apt36-spoofs-india-post-website-to.html www.secnews.physaphae.fr/article.php?IdArticle=8658566 False Malware,Threat,Mobile APT 36 3.0000000000000000 IndustrialCyber - cyber risk firms for industrial Le rapport sur le paysage des menaces d'espace enisa met en évidence les lacunes de cybersécurité dans les satellites commerciaux, exhorte une défense améliorée<br>ENISA space threat landscape report highlights cybersecurity gaps in commercial satellites, urges enhanced defense The European Union Agency for Cybersecurity (ENISA) has released an analysis of the cybersecurity threats to the space... ]]> 2025-03-27T15:02:49+00:00 https://industrialcyber.co/vulnerabilities/enisa-space-threat-landscape-report-highlights-cybersecurity-gaps-in-commercial-satellites-urges-enhanced-defense/ www.secnews.physaphae.fr/article.php?IdArticle=8658597 False Threat,Commercial None 2.0000000000000000 RedCanary - Red Canary 2025 Rapport de détection des menaces: livre de jeu du praticien<br>2025 Threat Detection Report: Practitioner playbook Inspired by our newly released Threat Detection Report, here are five things defenders can do right now to strengthen their security posture.]]> 2025-03-27T14:37:16+00:00 https://redcanary.com/blog/threat-detection/threat-detection-report-practitioner-playbook/ www.secnews.physaphae.fr/article.php?IdArticle=8658596 False Threat None 4.0000000000000000 Recorded Future - FLux Recorded Future Médias russes, universitaire ciblé dans la campagne d'espionnage à l'aide de Google Chrome Zero-Day Exploit<br>Russian media, academia targeted in espionage campaign using Google Chrome zero-day exploit “We have discovered and reported dozens of zero-day exploits actively used in attacks, but this particular exploit is certainly one of the most interesting we\'ve encountered,” researchers from Kaspersky said in their analysis published Tuesday.]]> 2025-03-27T13:51:57+00:00 https://therecord.media/russian-media-academia-targeted-in-espionage-campaign www.secnews.physaphae.fr/article.php?IdArticle=8658578 False Vulnerability,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) 150 000 sites compromis par l'injection JavaScript faisant la promotion des plateformes de jeu chinois<br>150,000 Sites Compromised by JavaScript Injection Promoting Chinese Gambling Platforms An ongoing campaign that infiltrates legitimate websites with malicious JavaScript injects to promote Chinese-language gambling platforms has ballooned to compromise approximately 150,000 sites to date. "The threat actor has slightly revamped their interface but is still relying on an iframe injection to display a full-screen overlay in the visitor\'s browser," c/side security analyst Himanshu]]> 2025-03-27T13:43:00+00:00 https://thehackernews.com/2025/03/150000-sites-compromised-by-javascript.html www.secnews.physaphae.fr/article.php?IdArticle=8658513 False Threat None 3.0000000000000000 We Live Security - Editeur Logiciel Antivirus ESET Les affiliés de RansomHub sont liés à des gangs Raas rivaux<br>RansomHub affiliates linked to rival RaaS gangs ESET researchers also examine the growing threat posed by tools that ransomware affiliates deploy in an attempt to disrupt EDR security solutions]]> 2025-03-27T13:10:08+00:00 https://www.welivesecurity.com/en/videos/ransomhub-affiliates-linked-rival-raas-providers/ www.secnews.physaphae.fr/article.php?IdArticle=8661297 False Ransomware,Tool,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine NCA avertit des réseaux «com» ​​sadiques en ligne<br>NCA Warns of Sadistic Online “Com” Networks The UK\'s National Crime Agency is warning of a growing cyber and physical threat from homegrown teens]]> 2025-03-27T10:30:00+00:00 https://www.infosecurity-magazine.com/news/nca-warns-of-sadistic-online-com/ www.secnews.physaphae.fr/article.php?IdArticle=8658541 False Threat None 3.0000000000000000 UnderNews - Site de news "pirate" francais Deepfake-as-a-Service : L\'IA au cœur de la cyberfraude 2.0 Un nouveau rapport de TEHTRIS révèle l'industrialisation des deepfakes et de l'IA au service de la cybercriminalité, avec l'émergence de plateformes comme Haotian AI. Les entreprises et les gouvernements doivent se préparer à une nouvelle vague de menaces automatisées et sophistiquées. Tribune – TEHTRIS, éditeur de la TEHTRIS XDR AI PLATFORM qui détecte et neutralise […] The post Deepfake-as-a-Service : L'IA au cœur de la cyberfraude 2.0 first appeared on UnderNews.]]> 2025-03-27T09:50:57+00:00 https://www.undernews.fr/hacking-hacktivisme/deepfake-as-a-service-lia-au-coeur-de-la-cyberfraude-2-0.html www.secnews.physaphae.fr/article.php?IdArticle=8658535 False Threat None 3.0000000000000000 Zataz - Magazine Francais de secu Criminalité organisée en Europe : comment l\'IA et les menaces hybrides redéfinissent le monde 2025-03-27T08:56:00+00:00 https://www.zataz.com/criminalite-organisee-en-europe-comment-lia-et-les-menaces-hybrides-redefinissent-le-monde/ www.secnews.physaphae.fr/article.php?IdArticle=8658510 False Threat None 3.0000000000000000 Data Security Breach - Site de news Francais Chrome sous attaque : une faille critique exploitée dans une campagne de cyber espionnage 2025-03-27T08:02:49+00:00 https://www.datasecuritybreach.fr/chrome-sous-attaque-une-faille-critique-exploitee-dans-une-campagne-de-cyberespionnage/ www.secnews.physaphae.fr/article.php?IdArticle=8658500 False Vulnerability,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Nouvelles variantes de dérobée Sparrowdoor trouvées dans les attaques contre les organisations américaines et mexicaines<br>New SparrowDoor Backdoor Variants Found in Attacks on U.S. and Mexican Organizations The Chinese threat actor known as FamousSparrow has been linked to a cyber attack targeting a trade group in the United States and a research institute in Mexico to deliver its flagship backdoor SparrowDoor and ShadowPad. The activity, observed in July 2024, marks the first time the hacking crew has deployed ShadowPad, a malware widely shared by Chinese state-sponsored actors. "FamousSparrow]]> 2025-03-26T22:29:00+00:00 https://thehackernews.com/2025/03/new-sparrowdoor-backdoor-variants-found.html www.secnews.physaphae.fr/article.php?IdArticle=8658379 False Malware,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Encrypthub exploite Windows Zero-Day pour déployer Rhadamanthys et Stealc malware<br>EncryptHub Exploits Windows Zero-Day to Deploy Rhadamanthys and StealC Malware The threat actor known as EncryptHub exploited a recently-patched security vulnerability in Microsoft Windows as a zero-day to deliver a wide range of malware families, including backdoors and information stealers such as Rhadamanthys and StealC. "In this attack, the threat actor manipulates .msc files and the Multilingual User Interface Path (MUIPath) to download and execute malicious payload,]]> 2025-03-26T19:23:00+00:00 https://thehackernews.com/2025/03/encrypthub-exploits-windows-zero-day-to.html www.secnews.physaphae.fr/article.php?IdArticle=8658334 False Malware,Vulnerability,Threat None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Redcurl passe de l'espionnage à des ransomwares avec un premier déploiement QWCrypt<br>RedCurl Shifts from Espionage to Ransomware with First-Ever QWCrypt Deployment The Russian-speaking hacking group called RedCurl has been linked to a ransomware campaign for the first time, marking a departure in the threat actor\'s tradecraft. The activity, observed by Romanian cybersecurity company Bitdefender, involves the deployment of a never-before-seen ransomware strain dubbed QWCrypt. RedCurl, also called Earth Kapre and Red Wolf, has a history of orchestrating]]> 2025-03-26T19:13:00+00:00 https://thehackernews.com/2025/03/redcurl-shifts-from-espionage-to.html www.secnews.physaphae.fr/article.php?IdArticle=8658335 False Ransomware,Threat None 3.0000000000000000 HackRead - Chercher Cyber Next.js Middleware Flaw permet aux attaquants de contourner l'autorisation<br>Next.js Middleware Flaw Lets Attackers Bypass Authorization Researchers have uncovered a critical vulnerability (CVE-2025-29927) in Next.js middleware, allowing authorization bypass. Learn about the exploit and fixes.]]> 2025-03-26T16:40:56+00:00 https://hackread.com/next-js-middleware-flaw-bypass-authorization/ www.secnews.physaphae.fr/article.php?IdArticle=8658367 False Vulnerability,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Les clients d'Oracle confirment que les données volées dans une violation de cloud présumée sont valides<br>Oracle customers confirm data stolen in alleged cloud breach is valid Despite Oracle denying a breach of its Oracle Cloud federated SSO login servers and the theft of account data for 6 million people, BleepingComputer has confirmed with multiple companies that associated data samples shared by the threat actor are valid. [...]]]> 2025-03-26T16:20:57+00:00 https://www.bleepingcomputer.com/news/security/oracle-customers-confirm-data-stolen-in-alleged-cloud-breach-is-valid/ www.secnews.physaphae.fr/article.php?IdArticle=8658417 False Threat,Cloud None 4.0000000000000000 Bleeping Computer - Magazine Américain Les streamements révèlent la violation de données tierces après les données de fuite de pirate<br>StreamElements discloses third-party data breach after hacker leaks data Cloud-based streaming company StreamElements confirms it suffered a data breach at a third-party service provider after a threat actor leaked samples of stolen data on a hacking forum. [...]]]> 2025-03-26T14:42:51+00:00 https://www.bleepingcomputer.com/news/security/streamelements-discloses-third-party-data-breach-after-hacker-leaks-data/ www.secnews.physaphae.fr/article.php?IdArticle=8658394 False Data Breach,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Pirates à l'aide de l'outil de crime électronique Atlantis AIO pour la farce des informations d'identification sur plus de 140 plates-formes<br>Hackers Using E-Crime Tool Atlantis AIO for Credential Stuffing on 140+ Platforms Threat actors are leveraging an e-crime tool called Atlantis AIO Multi-Checker to automate credential stuffing attacks, according to findings from Abnormal Security. Atlantis AIO "has emerged as a powerful weapon in the cybercriminal arsenal, enabling attackers to test millions of stolen credentials in rapid succession," the cybersecurity company said in an analysis. Credential stuffing is a]]> 2025-03-26T14:23:00+00:00 https://thehackernews.com/2025/03/hackers-using-e-crime-tool-atlantis-aio.html www.secnews.physaphae.fr/article.php?IdArticle=8658282 False Tool,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les acteurs de la menace abusent de la confiance dans les plateformes de collaboration du cloud<br>Threat Actors Abuse Trust in Cloud Collaboration Platforms Threat actors are exploiting cloud platforms like Adobe and Dropbox to evade email gateways and steal credentials]]> 2025-03-26T14:15:00+00:00 https://www.infosecurity-magazine.com/news/threat-actors-abuse-cloud-platforms/ www.secnews.physaphae.fr/article.php?IdArticle=8658348 False Threat,Cloud None 3.0000000000000000 Dark Reading - Informationweek Branch Au-delà de Stix: intelligence cyber-menace de niveau supérieur<br>Beyond STIX: Next-Level Cyber-Threat Intelligence While industry experts continue to analyze, interpret, and act on threat data, the complexity of cyber threats necessitates solutions that can quickly convert expert knowledge into machine-readable formats.]]> 2025-03-26T14:00:00+00:00 https://www.darkreading.com/threat-intelligence/beyond-stix-next-level-cyber-threat-intelligence www.secnews.physaphae.fr/article.php?IdArticle=8658346 False Threat None 3.0000000000000000 IndustrialCyber - cyber risk firms for industrial ODNI 2025 Évaluation des menaces note les menaces de Russie, Chine, Iran, Corée du Nord ciblant les infrastructures critiques, les télécommunications<br>ODNI 2025 Threat Assessment notes threats from Russia, China, Iran, North Korea targeting critical infrastructure, telecom The Office of the Director of National Intelligence (ODNI) identified in its 2025 Annual Threat Assessment of the... ]]> 2025-03-26T12:41:36+00:00 https://industrialcyber.co/reports/odni-2025-threat-assessment-notes-threats-from-russia-china-iran-north-korea-targeting-critical-infrastructure-telecom/ www.secnews.physaphae.fr/article.php?IdArticle=8658320 False Threat None 3.0000000000000000 Recorded Future - FLux Recorded Future Le Royaume-Uni met en garde contre la menace émergente de \\ 'sadique \\' en ligne \\ 'com Réseaux \\' des adolescents<br>UK warns of emerging threat from \\'sadistic\\' online \\'Com networks\\' of teenage boys Online networks of teenage boys “dedicated to inflicting harm and committing a range of criminality” are among the most significant concerns for British law enforcement, officials announced this week.]]> 2025-03-26T12:12:40+00:00 https://therecord.media/uk-threat-com-sadistic-teenager www.secnews.physaphae.fr/article.php?IdArticle=8658318 False Threat,Legislation None 2.0000000000000000 Dark Reading - Informationweek Branch Google patchs à la hâte Chrome Zero-Day exploité par APT<br>Google Hastily Patches Chrome Zero-Day Exploited by APT Researchers at Kaspersky discovered cyber-espionage activity that used the vulnerability in a one-click phishing attack to deliver malware.]]> 2025-03-26T11:27:34+00:00 https://www.darkreading.com/cyberattacks-data-breaches/google-patches-chrome-zero-day-exploited-apt www.secnews.physaphae.fr/article.php?IdArticle=8658347 False Malware,Vulnerability,Threat None 3.0000000000000000 ProjectZero - Blog de recherche Google Déplacer devant Webp<br>Blasting Past Webp issued an out-of-band security update for iOS: Release notes for iOS 16.6.1 and iPadOS 16.6.1, including CVE-2023-41064 for ImageIO and CVE-2023-41061 for Wallet, detailing security updates and potential exploitation. Around the same time on September 7th 2023, Citizen Lab published a blog post linking the two CVEs fixed in iOS 16.6.1 to an "NSO Group Zero-Click, Zero-Day exploit captured in the wild": "[The target was] an individual employed by a Washington DC-based civil society organization with international offices... The exploit chain was capable of compromising iPhones running the latest version of iOS (16.6) without any interaction from the victim. The exploit involved PassKit attachments containing malicious images sent from an attacker iMessage account to the victim." The day before, on September 6th 2023, Apple reported a vulnerability to the WebP project, indicating in the report that they planned to ship a custom fix for Apple customers the next day. The WebP team posted their first proposed fix in the public git repo the next day, and five days after that on September 12th Google released a ]]> 2025-03-26T10:30:02+00:00 https://googleprojectzero.blogspot.com/2025/03/blasting-past-webp.html www.secnews.physaphae.fr/article.php?IdArticle=8658377 False Tool,Vulnerability,Threat,Mobile,Prediction,Technical None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Enisa sondage des menaces spatiales du paysage dans un nouveau rapport<br>ENISA Probes Space Threat Landscape in New Report EU security agency ENISA has released a new report outlining the threats and potential mitigations for the space sector]]> 2025-03-26T10:30:00+00:00 https://www.infosecurity-magazine.com/news/enisa-probes-space-threat/ www.secnews.physaphae.fr/article.php?IdArticle=8658296 False Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Alerte zéro-jour: Google publie un patch chromé pour l'exploit utilisé dans les attaques d'espionnage russes<br>Zero-Day Alert: Google Releases Chrome Patch for Exploit Used in Russian Espionage Attacks Google has released out-of-band fixes to address a high-severity security flaw in its Chrome browser for Windows that it said has been exploited in the wild as part of attacks targeting organizations in Russia.  The vulnerability, tracked as CVE-2025-2783, has been described as a case of "incorrect handle provided in unspecified circumstances in Mojo on Windows." Mojo refers to a]]> 2025-03-26T10:26:00+00:00 https://thehackernews.com/2025/03/zero-day-alert-google-releases-chrome.html www.secnews.physaphae.fr/article.php?IdArticle=8658238 False Vulnerability,Threat None 3.0000000000000000 InformationSecurityBuzzNews - Site de News Securite Les agents de l'IA réduiront le temps d'exploitation des comptes de 50%<br>AI Agents Will Cut Account Exploitation Time by 50% By 2027, AI agents are expected to reduce the time required to exploit account exposures by 50%. This was revealed in Gartner\'s new report, titled: “Predicts 2025: Navigating Imminent AI Turbulence for Cybersecurity.”  Jeremy D\'Hoinne, VP Analyst at Gartner, says account takeover (ATO) is a persistent attack vector as weak authentication credentials, including passwords, are [...]]]> 2025-03-26T05:43:16+00:00 https://informationsecuritybuzz.com/ai-agents-wil-cut-account-exploit-time/ www.secnews.physaphae.fr/article.php?IdArticle=8658248 False Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Google fixe Chrome Zero-Day exploité dans la campagne d'espionnage<br>Google fixes Chrome zero-day exploited in espionage campaign ​Google has fixed a high-severity Chrome zero-day vulnerability exploited to escape the browser\'s sandbox and deploy malware in espionage attacks targeting Russian organizations. [...]]]> 2025-03-26T02:42:48+00:00 https://www.bleepingcomputer.com/news/security/google-fixes-chrome-zero-day-exploited-in-espionage-campaign/ www.secnews.physaphae.fr/article.php?IdArticle=8658255 False Malware,Vulnerability,Threat None 2.0000000000000000 Kaspersky - Kaspersky Research blog Opération Forumtroll: Attaque APT avec Google Chrome Zero-Day Exploit Chain<br>Operation ForumTroll: APT attack with Google Chrome zero-day exploit chain Kaspersky GReAT experts discovered a complex APT attack on Russian organizations dubbed Operation ForumTroll, which exploits zero-day vulnerabilities in Google Chrome.]]> 2025-03-25T21:30:22+00:00 https://securelist.com/operation-forumtroll/115989/ www.secnews.physaphae.fr/article.php?IdArticle=8658192 False Vulnerability,Threat None 3.0000000000000000 TechRepublic - Security News US Après avoir détecté des tentatives de phishing 30B, Microsoft ajoute encore plus d'intelligence artificielle à son copilote de sécurité<br>After Detecting 30B Phishing Attempts, Microsoft Adds Even More AI to Its Security Copilot Microsoft is partnering with top firms to launch new AI security tools, boosting breach analysis, threat detection, and AI model protection across cloud platforms.]]> 2025-03-25T21:04:18+00:00 https://www.techrepublic.com/article/news-microsoft-ai-agents-security-copilot/ www.secnews.physaphae.fr/article.php?IdArticle=8658182 False Tool,Threat,Cloud None 2.0000000000000000 HackRead - Chercher Cyber Systèmes de navigation par satellite face à l'augmentation des attaques de brouillage et d'usurpation<br>Satellite Navigation Systems Facing Rising Jamming and Spoofing Attacks Satellite navigation systems are under rising threat from jamming and spoofing attacks, risking aviation, maritime, and telecom safety worldwide, warn global agencies.]]> 2025-03-25T19:47:17+00:00 https://hackread.com/satellite-navigation-systems-jamming-spoofing-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8658173 False Threat None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les chercheurs découvrent ~ 200 domaines C2 uniques liés à Raspberry Robin Access Broker<br>Researchers Uncover ~200 Unique C2 Domains Linked to Raspberry Robin Access Broker A new investigation has unearthed nearly 200 unique command-and-control (C2) domains associated with a malware called Raspberry Robin. "Raspberry Robin (also known as Roshtyak or Storm-0856) is a complex and evolving threat actor that provides initial access broker (IAB) services to numerous criminal groups, many of which have connections to Russia," Silent Push said in a report shared with The]]> 2025-03-25T19:09:00+00:00 https://thehackernews.com/2025/03/researchers-uncover-200-unique-c2.html www.secnews.physaphae.fr/article.php?IdArticle=8658107 False Malware,Threat None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les pirates chinois abritent les télécommunications asiatiques, restent non détectées pendant plus de 4 ans<br>Chinese Hackers Breach Asian Telecom, Remain Undetected for Over 4 Years A major telecommunications company located in Asia was allegedly breached by Chinese state-sponsored hackers who spent over four years inside its systems, according to a new report from incident response firm Sygnia. The cybersecurity company is tracking the activity under the name Weaver Ant, describing the threat actor as stealthy and highly persistent. The name of the telecom provider was not]]> 2025-03-25T17:24:00+00:00 https://thehackernews.com/2025/03/chinese-hackers-breach-asian-telecom.html www.secnews.physaphae.fr/article.php?IdArticle=8658091 False Threat None 3.0000000000000000 IndustrialCyber - cyber risk firms for industrial Sygnia détaille les tactiques de fourmi tisser<br>Sygnia details Weaver Ant tactics in battle against China-linked cyber threats on telecoms Les chercheurs de Sygnia ont répondu à un acteur de menace furtif et persistant lié à la Chine ciblant une grande société de télécommunications ...
>Researchers from Sygnia have responded to a stealthy and persistent China-linked threat actor targeting a major telecommunications company... ]]>
2025-03-25T17:08:06+00:00 https://industrialcyber.co/ransomware/sygnia-details-weaver-ant-tactics-in-battle-against-china-linked-cyber-threats-on-telecoms/ www.secnews.physaphae.fr/article.php?IdArticle=8658135 False Threat None 3.0000000000000000
Checkpoint - Fabricant Materiel Securite Protéger la faillite immuable - 23andMe et ce que cela signifie pour la confidentialité des données<br>Protecting the Unchangeable – 23andMe Bankruptcy and What It Means for Data Privacy Le récent dépôt de faillite par 23andme n'est pas juste une autre crise financière - c'est un avertissement frappant pour la communauté de la cybersécurité. Lorsqu'une entreprise a confié des effondrements de données génétiques immuables et sensibles, elle nous oblige à réexaminer la façon dont nous protégeons les actifs de données qui ne peuvent jamais être «réinitialisés». Cette évolution devrait servir de catalyseur aux organisations afin de hiérarchiser les mesures de protection des données robustes. Les enjeux de cybersécurité des données immuables dans le paysage des menaces d'aujourd'hui, les violations de données sont souvent considérées comme des événements isolés - quelque chose dont vous récupérez en modifiant un mot de passe ou en annulant une carte de crédit. Cependant, les données génétiques sont fondamentalement différentes. […]
>The recent bankruptcy filing by 23andMe isn\'t just another financial crisis – it\'s a stark warning for the cyber security community. When a company entrusted with immutable, sensitive genetic data collapses, it forces us to reexamine how we protect data assets that can never be “reset.” This development should serve as a catalyst for organizations to prioritize robust data protection measures. The Cyber Security Stakes of Immutable Data In today\'s threat landscape, data breaches are often viewed as isolated events – something you recover from by changing a password or canceling a credit card. However, genetic data is fundamentally different. […] ]]>
2025-03-25T13:00:57+00:00 https://blog.checkpoint.com/security/protecting-the-unchangeable-23andme-bankruptcy-and-what-it-means-for-data-privacy/ www.secnews.physaphae.fr/article.php?IdArticle=8658100 False Threat None 2.0000000000000000
InfoSecurity Mag - InfoSecurity Magazine Des pirates de fourmis tisserands liés à la Chine exposés après une infiltration de télécommunications sur quatre ans<br>China-Linked Weaver Ant Hackers Exposed After Four-Year Telco Infiltration Sygnia has uncovered Weaver Ant, a Chinese threat actor that spied on telecommunications networks for years]]> 2025-03-25T12:45:00+00:00 https://www.infosecurity-magazine.com/news/china-weaver-ant-hackers-telco/ www.secnews.physaphae.fr/article.php?IdArticle=8658092 False Threat None 2.0000000000000000 HackRead - Chercher Cyber MEDUSA Ransomware désactive les outils anti-malware avec des certificats volés<br>Medusa Ransomware Disables Anti-Malware Tools with Stolen Certificates Cybercriminals exploit AbyssWorker driver to disable EDR systems, deploying MEDUSA ransomware with revoked certificates for stealthy attacks.]]> 2025-03-25T11:56:24+00:00 https://hackread.com/medusa-ransomware-anti-malware-tools-stolen-certificates/ www.secnews.physaphae.fr/article.php?IdArticle=8658075 False Ransomware,Tool,Threat None 2.0000000000000000 Zataz - Magazine Francais de secu Faille Telegram : jusqu\'à 4 millions de dollars offerts pour une faille zero-day 2025-03-25T11:04:55+00:00 https://www.zataz.com/faille-telegram-jusqua-4-millions-de-dollars-offerts-pour-une-faille-zero-day/ www.secnews.physaphae.fr/article.php?IdArticle=8658071 False Vulnerability,Threat None 2.0000000000000000 Cyble - CyberSecurity Firm Les capteurs Cyble détectent les tentatives d'exploitation sur les caméras IP Ivanti, AVTech<br>Cyble Sensors Detect Exploit Attempts on Ivanti, AVTECH IP Cameras aperçu Les vulnérabilités dans les produits Ivanti, les caméras IP AVTech et les plugins WordPress ont récemment fait partie des dizaines de tentatives d'exploitation détectées par des capteurs de pot de miel Cyble.  Les tentatives d'attaque ont été détaillées dans les rapports hebdomadaires de Sensor Intelligence de la Menage Intelligence Company \\. Les rapports CYBLE ont également examiné les attaques persistantes contre les systèmes Linux et les appareils de réseau et de réseau, alors que les acteurs de la menace scarchent des appareils vulnérables pour ransomware href = "https://cyble.com/knowledge-hub/what-is-ddos-attack/" Target = "_ Blank" rel = "noreferrer noopener"> ddos ​​ et des botnets d'exploration de crypto. Les rapports ont également examiné les logiciels malveillants bancaires, les attaques brutes-force, les ports vulnérables et phishing campagnes.  Voici quelques-unes des campagnes d'attaque récentes couvertes dans les rapports de capteurs Cyble. Les utilisateurs pourraient être vulnérables à l'attaque si les versions de produits affectées ne sont pas corrigées et atténuées.  Exploits de vulnérabilité détectés par cyble ivanti vulnérabilité s Voici quelques-unes des vulnérabilités ciblées dans les récentes tentatives d'attaque détect]]> 2025-03-25T09:36:32+00:00 https://cyble.com/blog/cyble-sensors-detect-exploit-attempts-on-ivanti-avtech-ip-cameras/ www.secnews.physaphae.fr/article.php?IdArticle=8658054 False Malware,Vulnerability,Threat,Patching,Industrial None 2.0000000000000000 Dark Reading - Informationweek Branch Le dépôt de faillite 23andMe peut mettre des données sensibles en danger<br>23andMe Bankruptcy Filing May Put Sensitive Data at Risk Security experts worry the company\'s Chapter 11 status and aim to sell its assets could allow threat actors to exploit and misuse the genetic information it collected.]]> 2025-03-25T09:16:09+00:00 https://www.darkreading.com/cyber-risk/23andme-bankruptcy-filing-sensitive-data-at-risk www.secnews.physaphae.fr/article.php?IdArticle=8658098 False Threat None 3.0000000000000000 Kaspersky - Kaspersky Research blog Cyberstérines financières en 2024<br>Financial cyberthreats in 2024 The Kaspersky financial threat report for 2024 contains the main trends and statistics on financial phishing and scams, mobile and PC banking malware, as well as recommendations on how to protect yourself and your business.]]> 2025-03-25T08:00:33+00:00 https://securelist.com/financial-threat-report-2024/115966/ www.secnews.physaphae.fr/article.php?IdArticle=8658035 False Malware,Threat,Mobile None 3.0000000000000000 InformationSecurityBuzzNews - Site de News Securite La société de cybersécurité découvre le major Oracle Cloud Breach-Oracle le refuse<br>Cybersecurity Firm Uncovers Major Oracle Cloud Breach-Oracle Denies It Cybersecurity firm CloudSEK has identified a major data breach involving Oracle Cloud. A threat actor, known as “rose87168,” claims to be selling around 6 million records stolen from Oracle Cloud’s Single Sign-On (SSO) and Lightweight Directory Access Protocol (LDAP) servers.   The compromised data includes Java KeyStore (JKS) files, encrypted SSO passwords, key files, and Enterprise [...]]]> 2025-03-25T06:19:50+00:00 https://informationsecuritybuzz.com/firm-uncover-major-oracle-cloud-breach/ www.secnews.physaphae.fr/article.php?IdArticle=8658019 False Data Breach,Threat,Cloud None 3.0000000000000000 TrendLabs Security - Editeur Antivirus CVE-2025-26633: Comment l'eau Gamayun arme le Muipath en utilisant MSC Eviltwin<br>CVE-2025-26633: How Water Gamayun Weaponizes MUIPath using MSC EvilTwin Trend Research identified Russian threat actor Water Gamayun exploiting CVE-2025-26633, a zero-day vulnerability in the Microsoft Management Console that attackers exploit to execute malicious code and exfiltrate data.]]> 2025-03-25T00:00:00+00:00 https://www.trendmicro.com/en_us/research/25/c/cve-2025-26633-water-gamayun.html www.secnews.physaphae.fr/article.php?IdArticle=8658115 False Vulnerability,Threat,Prediction None 3.0000000000000000 Resecurity - cyber risk firms Blacklock Ransomware: un cadeau de fin de vacances avec intrusion dans l'infrastructure de l'acteur de menace<br>Blacklock Ransomware: A Late Holiday Gift with Intrusion into the Threat Actor\\'s Infrastructure 2025-03-25T00:00:00+00:00 https://www.resecurity.com/blog/article/blacklock-ransomware-a-late-holiday-gift-with-intrusion-into-the-threat-actors-infrastructure www.secnews.physaphae.fr/article.php?IdArticle=8658158 False Ransomware,Threat None 2.0000000000000000 Intigrity - Blog Intigriti Aperçu de l'escroquerie Bounty Bound Bounty<br>Intigriti insights into latest beg bounty scam The Intigriti team have recently observed an abuse scenario, trending across the industry, where malicious actors are posing as legitimate white-hat hackers, deceiving targeted companies into believing their actions are carried out in good faith. Bad actors will always try to exploit the system, in any industry, for personal gain. At Intigriti, we help customers navigate this l…]]> 2025-03-25T00:00:00+00:00 https://www.intigriti.com/blog/business-insights/intigriti-insights-into-latest-beg-bounty-scam www.secnews.physaphae.fr/article.php?IdArticle=8658123 False Threat None 2.0000000000000000 The Register - Site journalistique Anglais À mesure que le piratage de l'État-nation devient plus en face, \\ 'les chaînes d'approvisionnement sont-elles sécurisées?<br>As nation-state hacking becomes \\'more in your face,\\' are supply chains secure? Ex-US Air Force officer says companies shouldn\'t wait for govt mandates Interview  Former US Air Force cyber officer Sarah Cleveland worries about the threat of a major supply-chain attack from China or another adversarial nation. So she installed solar panels on her house: "Because what if the electric grid goes down?" …]]> 2025-03-24T20:32:11+00:00 https://go.theregister.com/feed/www.theregister.com/2025/03/24/nation_state_supply_chain_attack/ www.secnews.physaphae.fr/article.php?IdArticle=8657930 False Threat None 2.0000000000000000 Dark Reading - Informationweek Branch China-Nexus apt \\ 'tisser<br>China-Nexus APT \\'Weaver Ant\\' Caught in Yearslong Web Shell Attack The persistent threat actor was caught using sophisticated Web shell techniques against an unnamed telecommunications company in Asia.]]> 2025-03-24T18:16:34+00:00 https://www.darkreading.com/cyberattacks-data-breaches/china-nexus-apt-weaver-ant-caught-yearslong-web-shell-attack www.secnews.physaphae.fr/article.php?IdArticle=8657901 False Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Oracle nie la réclamation de la violation d'Oracle Cloud de 6M Records<br>Oracle Denies Claim of Oracle Cloud Breach of 6M Records A threat actor posted data on Breachforums from an alleged supply-chain attack that affected more than 140K tenants, claiming to have compromised the cloud via a zero-day flaw in WebLogic, researchers say.]]> 2025-03-24T15:29:40+00:00 https://www.darkreading.com/cyberattacks-data-breaches/oracle-denies-claim-oracle-cloud-breach-6m-records www.secnews.physaphae.fr/article.php?IdArticle=8657835 False Vulnerability,Threat,Cloud None 2.0000000000000000 Bleeping Computer - Magazine Américain Les pirates de fourmis tisserand chinois ont espionné un réseau de télécommunications pendant 4 ans<br>Chinese Weaver Ant hackers spied on telco network for 4 years A China-linked advanced threat group named Weaver Ant spent more than four years in the network of a telecommunications services provider, hiding traffic and infrastructure with the help of compromised Zyxel CPE routers.  [...]]]> 2025-03-24T13:53:27+00:00 https://www.bleepingcomputer.com/news/security/chinese-weaver-ant-hackers-spied-on-telco-network-for-4-years/ www.secnews.physaphae.fr/article.php?IdArticle=8657882 False Threat None 3.0000000000000000 Checkpoint Research - Fabricant Materiel Securite 24 mars - Rapport de renseignement sur les menaces<br>24th March – Threat Intelligence Report Pour les dernières découvertes en cyber Les principales attaques et violation des municipalités dans quatre États américains ont connu des cyberattaques qui ont perturbé les services pour les bureaux du comté, les tribunaux et les écoles. La cour municipale de Cleveland a été frappée par l'attaque de Qilin Ransomware, forçant les employés hors ligne et retardant les procès, tandis que […]
>For the latest discoveries in cyber research for the week of 24th March, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Municipalities in four US states experienced cyberattacks that disrupted services for county offices, courts, and schools. Cleveland Municipal Court was hit by Qilin ransomware attack, forcing employees offline and delaying trials, while […] ]]>
2025-03-24T12:12:13+00:00 https://research.checkpoint.com/2025/24th-march-threat-intelligence-report/ www.secnews.physaphae.fr/article.php?IdArticle=8657773 False Ransomware,Threat None 2.0000000000000000
IndustrialCyber - cyber risk firms for industrial FBI, les agences de soins de santé mettent en garde contre la menace crédible contre les hôpitaux, après une alerte terroriste des médias sociaux multi-villes<br>FBI, healthcare agencies warn of credible threat against hospitals, after multi-city social media terror plot alert Following a social media post last week on the active planning of a coordinated, multi-city terrorist attack on... ]]> 2025-03-24T12:11:35+00:00 https://industrialcyber.co/medical/fbi-healthcare-agencies-warn-of-credible-threat-against-hospitals-after-multi-city-social-media-terror-plot-alert/ www.secnews.physaphae.fr/article.php?IdArticle=8657775 False Threat,Medical None 3.0000000000000000 Dark Reading - Informationweek Branch Rencontrez le courtier à accès discret surcharge de la cybercriminalité de l'État russe<br>Meet the Low-Key Access Broker Supercharging Russian State Cybercrime Raspberry Robin breaks into organizations and sells access to Russian threat actors, including the military cyber unit behind attempted coups, assassinations, and influence operations throughout Europe.]]> 2025-03-24T12:00:00+00:00 https://www.darkreading.com/cyberattacks-data-breaches/access-broker-russian-state-cybercrime www.secnews.physaphae.fr/article.php?IdArticle=8658085 False Threat None 2.0000000000000000 Cyble - CyberSecurity Firm Fizzbuzz à Fogdoor: la campagne ciblée des logiciels malveillants exploite les développeurs de recherche d'emploi<br>FizzBuzz to FogDoor: Targeted Malware Campaign Exploits Job-Seeking Developers Social Engineering Campagne contre les développeurs de dissociation en déguisé malin github . À l'aide d'un faux test de recrutement nommé " FizzBuzz ", le TA tourne les victimes de télécharger un fichier ISO contenant un apparemment inoffensif javascript Exercice et un LNK malivet shortcut]]> 2025-03-24T11:09:37+00:00 https://cyble.com/blog/fake-coding-challenges-steal-sensitive-data-via-fogdoor/ www.secnews.physaphae.fr/article.php?IdArticle=8657753 False Malware,Tool,Vulnerability,Threat,Technical None 3.0000000000000000 Bleeping Computer - Magazine Américain Menaces cachées: comment les sauvegardes Microsoft 365 stockent les risques pour les attaques futures<br>Hidden Threats: How Microsoft 365 Backups Store Risks for Future Attacks Acronis Threat Research found 2M+ malicious URLs & 5,000+ malware instances in Microsoft 365 backup data-demonstrating how built-in security isn\'t always enough. Don\'t let threats persist in your cloud data. Strengthen your defenses. [...]]]> 2025-03-24T10:01:11+00:00 https://www.bleepingcomputer.com/news/security/hidden-threats-how-microsoft-365-backups-store-risks-for-future-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8657861 False Malware,Threat,Cloud None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les pirateurs de compte Google ciblent les victimes via des annonces Semrush<br>Google Account Hijackers Target Victims Via Semrush Ads Threat actors are looking to compromise Google accounts to further malvertising and data theft]]> 2025-03-24T09:30:00+00:00 https://www.infosecurity-magazine.com/news/google-hijackers-target-victims/ www.secnews.physaphae.fr/article.php?IdArticle=8657733 False Threat None 3.0000000000000000 Sygnia - CyberSecurity Firm Sygnia découvre une nouvelle fourmi acteur de menace de Chine-Nexus active<br>Sygnia Discovers New Active China-Nexus Threat Actor Weaver Ant Leader de la réponse aux incidents révèle que les routeurs domestiques à effet de tisserands de tisserand pour cibler la meilleure entreprise de télécommunications et collecter des informations sensibles.
>Incident Response leader reveals Weaver Ant leveraged home routers to target top telecoms company and collect sensitive information. ]]>
2025-03-24T07:59:21+00:00 https://www.sygnia.co/press-release/sygnia-discovers-new-active-china-nexus-threat-actor-weaver-ant/ www.secnews.physaphae.fr/article.php?IdArticle=8657711 False Threat None 3.0000000000000000
Sygnia - CyberSecurity Firm Weaver Ant, The Web Shell Whisperer: Suivi d'une opération en direct de China-Nexus<br>Weaver Ant, the Web Shell Whisperer: Tracking a Live China-nexus Operation Sygnia détaille Weaver Ant, un acteur de menace de Chine-Nexus infiltrant un grand fournisseur de télécommunications. À l'aide de coquilles Web et de tunnels, les attaquants ont maintenu la persistance et facilité le cyber-espionnage. Ce blog explore leurs tactiques et fournit des stratégies de défense clés contre les menaces parrainées par l'État.
>Sygnia details Weaver Ant, a China-nexus threat actor infiltrating a major telecom provider. Using web shells and tunneling, the attackers maintained persistence and facilitated cyber espionage. This blog explores their tactics and provides key defense strategies against state-sponsored threats. ]]>
2025-03-24T07:58:09+00:00 https://www.sygnia.co/threat-reports-and-advisories/weaver-ant-tracking-a-china-nexus-cyber-espionage-operation/ www.secnews.physaphae.fr/article.php?IdArticle=8657712 False Threat None 2.0000000000000000
Dark Reading - Informationweek Branch La race du Moyen-Orient est-elle de numériser une menace pour les infrastructures?<br>Is the Middle East\\'s Race to Digitize a Threat to Infrastructure? As the region continues with its ambitious road map, cybersecurity must be woven into every step of the process.]]> 2025-03-24T06:00:00+00:00 https://www.darkreading.com/cyberattacks-data-breaches/middle-easts-race-digitize-threat-infrastructure www.secnews.physaphae.fr/article.php?IdArticle=8657697 False Threat None 2.0000000000000000 AlienVault Lab Blog - AlienVault est un acteur de defense majeur dans les IOC La puissance de la simplicité: pourquoi le programme partenaire de niveaublue \\ facilite la cybersécurité pour les MSP et les MSSP<br>The Power of Simplicity: Why LevelBlue\\'s Partner Program Makes Cybersecurity Easier for MSPs and MSSPs 2025-03-24T06:00:00+00:00 https://levelblue.com/blogs/security-essentials/levelblues-partner-program-for-msps-and-mssps www.secnews.physaphae.fr/article.php?IdArticle=8657696 False Vulnerability,Threat None 3.0000000000000000 HackRead - Chercher Cyber Comment les cybercriminels exploitent les canaux de notification<br>How Cybercriminals Exploit Notification Channels Cybercriminals are always looking for new ways to take advantage of people. One effective method they use is…]]> 2025-03-22T23:57:34+00:00 https://hackread.com/how-cybercriminals-exploit-notification-channels/ www.secnews.physaphae.fr/article.php?IdArticle=8657471 False Threat None 2.0000000000000000 HackRead - Chercher Cyber Comment les cybercriminels exploitent les informations publiques pour les attaques: comprendre les risques et la prévention<br>How Cybercriminals Exploit Public Info for Attacks: Understanding Risks and Prevention Cybercriminals are skilled at using public information to their advantage. Knowing how they gather this data can help…]]> 2025-03-22T19:05:47+00:00 https://hackread.com/how-cybercriminals-exploit-public-info-attacks-risks-prevention/ www.secnews.physaphae.fr/article.php?IdArticle=8657434 False Threat None 2.0000000000000000 HackRead - Chercher Cyber Oracle nie la violation au milieu de la revendication d'accès de Hacker \\ à 6 millions d'enregistrements<br>Oracle Denies Breach Amid Hacker\\'s Claim of Access to 6 Million Records Oracle denies breach claims as hacker alleges access to 6 million cloud records. CloudSEK reports a potential zero-day exploit affecting 140,000 tenants.]]> 2025-03-22T13:29:00+00:00 https://hackread.com/oracle-denies-breach-hacker-access-6-million-records/ www.secnews.physaphae.fr/article.php?IdArticle=8657397 False Vulnerability,Threat,Cloud None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) L'UAT-5918 cible l'infrastructure critique de Taiwan \\ à l'aide de shells Web et d'outils open-source<br>UAT-5918 Targets Taiwan\\'s Critical Infrastructure Using Web Shells and Open-Source Tools Threat hunters have uncovered a new threat actor named UAT-5918 that has been attacking critical infrastructure entities in Taiwan since at least 2023. "UAT-5918, a threat actor believed to be motivated by establishing long-term access for information theft, uses a combination of web shells and open-sourced tooling to conduct post-compromise activities to establish persistence in victim]]> 2025-03-21T19:24:00+00:00 https://thehackernews.com/2025/03/uat-5918-targets-taiwans-critical.html www.secnews.physaphae.fr/article.php?IdArticle=8657214 False Tool,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) MEDUSA Ransomware utilise un conducteur malveillant pour désactiver l'anti-malware avec des certificats volés<br>Medusa Ransomware Uses Malicious Driver to Disable Anti-Malware with Stolen Certificates The threat actors behind the Medusa ransomware-as-a-service (RaaS) operation have been observed using a malicious driver dubbed ABYSSWORKER as part of a bring your own vulnerable driver (BYOVD) attack designed to disable anti-malware tools. Elastic Security Labs said it observed a Medusa ransomware attack that delivered the encryptor by means of a loader packed using a packer-as-a-service (PaaS]]> 2025-03-21T18:28:00+00:00 https://thehackernews.com/2025/03/medusa-ransomware-uses-malicious-driver.html www.secnews.physaphae.fr/article.php?IdArticle=8657200 False Ransomware,Tool,Threat None 3.0000000000000000 Bleeping Computer - Magazine Américain Oracle nie la violation après que le pirate prétend le vol de 6 millions d'enregistrements de données<br>Oracle denies breach after hacker claims theft of 6 million data records Oracle denies it was breached after a threat actor claimed to be selling 6 million data records allegedly stolen from the company\'s Oracle Cloud federated SSO login servers [...]]]> 2025-03-21T16:43:51+00:00 https://www.bleepingcomputer.com/news/security/oracle-denies-data-breach-after-hacker-claims-theft-of-6-million-data-records/ www.secnews.physaphae.fr/article.php?IdArticle=8657271 False Threat,Cloud None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Panda aquatique APT lié à la Chine: campagne de 10 mois, 7 cibles mondiales, 5 familles de logiciels malveillants<br>China-Linked APT Aquatic Panda: 10-Month Campaign, 7 Global Targets, 5 Malware Families The China-linked advanced persistent threat (APT) group. known as Aquatic Panda has been linked to a "global espionage campaign" that took place in 2022 targeting seven organizations. These entities include governments, catholic charities, non-governmental organizations (NGOs), and think tanks across Taiwan, Hungary, Turkey, Thailand, France, and the United States. The activity, which took place]]> 2025-03-21T16:31:00+00:00 https://thehackernews.com/2025/03/china-linked-apt-aquatic-panda-10-month.html www.secnews.physaphae.fr/article.php?IdArticle=8657175 False Malware,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) 10 Network Critical Pentest Résultats Les équipes IT Overlook<br>10 Critical Network Pentest Findings IT Teams Overlook After conducting over 10,000 automated internal network penetration tests last year, vPenTest has uncovered a troubling reality that many businesses still have critical security gaps that attackers can easily exploit. Organizations often assume that firewalls, endpoint protection, and SIEMs are enough to keep them secure. But how effective are these defenses when put to the test? That\'s where]]> 2025-03-21T16:31:00+00:00 https://thehackernews.com/2025/03/10-critical-network-pentest-findings-it.html www.secnews.physaphae.fr/article.php?IdArticle=8657174 False Threat None 4.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Kaspersky relie la tête de la jument à douze, ciblant les entités russes via des serveurs C2 partagés<br>Kaspersky Links Head Mare to Twelve, Targeting Russian Entities via Shared C2 Servers Two known threat activity clusters codenamed Head Mare and Twelve have likely joined forces to target Russian entities, new findings from Kaspersky reveal. "Head Mare relied heavily on tools previously associated with Twelve. Additionally, Head Mare attacks utilized command-and-control (C2) servers exclusively linked to Twelve prior to these incidents," the company said. "This suggests]]> 2025-03-21T15:58:00+00:00 https://thehackernews.com/2025/03/kaspersky-links-head-mare-to-twelve.html www.secnews.physaphae.fr/article.php?IdArticle=8657176 False Tool,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les cybercriminels exploitent le point de contrôle du point de contrôle antivirus en campagne malveillante<br>Cybercriminals Exploit CheckPoint Antivirus Driver in Malicious Campaign A security researcher has observed threat actors exploiting vulnerabilities in a driver used by CheckPoint\'s ZoneAlarm antivirus to bypass Windows security measures]]> 2025-03-21T12:45:00+00:00 https://www.infosecurity-magazine.com/news/cybercriminals-exploit-checkpoint/ www.secnews.physaphae.fr/article.php?IdArticle=8657190 False Vulnerability,Threat None 3.0000000000000000 HackRead - Chercher Cyber De nouvelles attaques exploitent des défauts de ServiceNow, âgés d'un an - Israël a frappé le plus durement<br>New Attacks Exploit Year-Old ServiceNow Flaws – Israel Hit Hardest ServiceNow vulnerability alert: Hackers are actively exploiting year-old flaws (CVE-2024-4879, CVE-2024-5217, CVE-2024-5178) for database access. Learn how to…]]> 2025-03-21T12:19:08+00:00 https://hackread.com/attacks-exploit-servicenow-flaws-israel-hit-hardest/ www.secnews.physaphae.fr/article.php?IdArticle=8657188 False Vulnerability,Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les cyberattaques en cours exploitent les vulnérabilités critiques dans Cisco Smart Licensing Utility<br>Ongoing Cyber Attacks Exploit Critical Vulnerabilities in Cisco Smart Licensing Utility Two now-patched security flaws impacting Cisco Smart Licensing Utility are seeing active exploitation attempts, according to SANS Internet Storm Center. The two critical-rated vulnerabilities in question are listed below -  CVE-2024-20439 (CVSS score: 9.8) - The presence of an undocumented static user credential for an administrative account that an attacker could exploit to log in to an]]> 2025-03-21T10:39:00+00:00 https://thehackernews.com/2025/03/ongoing-cyber-attacks-exploit-critical.html www.secnews.physaphae.fr/article.php?IdArticle=8657108 False Vulnerability,Threat None 3.0000000000000000 Cyble - CyberSecurity Firm Exploits du marché souterrain et menaces actives: les principaux points à retenir du rapport hebdomadaire des informations sur la vulnérabilité<br>Underground Market Exploits and Active Threats: Key Takeaways from the Weekly Vulnerability Insights Report aperçu Le rapport hebdomadaire sur les informations sur la vulnérabilité aux clients met en lumière les plus pressants cybersecurity vulnérabilités qui ont été identifiées et exploitées. Ce rapport hebdomadaire sur les informations sur la vulnérabilité met en évidence les efforts continus des organisations pour protéger leurs systèmes et réseaux de cyber-menaces , se concentrant sur la critique Vulnérabilités qui exigent une attention immédiate des professionnels de la sécurité. Notamment, la Cybersecurity and Infrastructure Security Agency (CISA) a mis à jour son catalogue de vulnérabilité exploité (KEV) connu pour inclure plusieurs défauts de haute sévérité qui sont activement ciblés par les attaquants. Au cours de la semaine du 12 mars 2025, CISA a ajouté plusieurs vulnérabilités à son catalogue KEV, reflétant des préoccupations croissantes concernant l'exploitation hyperactive. Parmi ceux-ci, CVE-2025-30066 s'est démarquée comme une menace grave, impliquant une authentification Bypass Vulnerabilité dans l'action de github TJ-Ractions / SPOGE-FILES. Ce défaut permet aux attaquants d'exécuter un code arbitraire sur les systèmes affectés en exploitant une mauvaise validation dans le ]]> 2025-03-21T10:36:30+00:00 https://cyble.com/blog/cyble-weekly-vulnerability-insights-report/ www.secnews.physaphae.fr/article.php?IdArticle=8657158 False Tool,Vulnerability,Threat,Patching,Prediction None 3.0000000000000000 Kaspersky - Kaspersky Research blog Paysage des menaces pour les systèmes d'automatisation industrielle au quatrième trimestre 2024<br>Threat landscape for industrial automation systems in Q4 2024 The report contains statistics on malware, initial infection vectors and other threats to industrial automation systems in Q4 2024.]]> 2025-03-21T10:00:29+00:00 https://securelist.com/ics-cert-q4-2024-report/115944/ www.secnews.physaphae.fr/article.php?IdArticle=8657143 False Malware,Threat,Industrial None 3.0000000000000000 InformationSecurityBuzzNews - Site de News Securite Raccourci Windows zéro-jour sous attaque active<br>Windows Shortcut Zero-Day Under Active Attack A highly advanced zero-day vulnerability has been covertly exploited for years by multiple state-sponsored hacking groups, underscoring its severe security risks. This flaw leverages Windows shortcut (.lnk) files, enabling attackers to stealthily execute malicious commands without detection.   However, Microsoft tagged it as “not meeting the bar servicing” in late September and said it wouldn’t [...]]]> 2025-03-21T04:29:54+00:00 https://informationsecuritybuzz.com/windows-shortcut-zero-day-active-attac/ www.secnews.physaphae.fr/article.php?IdArticle=8657098 False Vulnerability,Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Pourquoi il est si difficile d'arrêter la hausse du trafic TDS malveillant<br>Why It\\'s So Hard to Stop Rising Malicious TDS Traffic Cybersecurity vendors say threat actors\' abuse of traffic distribution systems (TDS) is becoming more complex and sophisticated - and much harder to detect and block.]]> 2025-03-20T18:40:40+00:00 https://www.darkreading.com/cyberattacks-data-breaches/why-hard-stop-rising-malicious-tds-traffic www.secnews.physaphae.fr/article.php?IdArticle=8657020 False Threat None 2.0000000000000000 RedCanary - Red Canary Que signifie l'acquisition de Google \\ $ à 32B de Cloud Security Startup pour les opérations de sécurité?<br>What does Google\\'s $32B acquisition of cloud security startup Wiz mean for security operations? Cloud security is a rapidly accelerating challenge for security operations-a trend highlighted in our 2025 Threat Detection Report.]]> 2025-03-20T17:42:00+00:00 https://redcanary.com/blog/security-operations/google-wiz-acquisition/ www.secnews.physaphae.fr/article.php?IdArticle=8657008 False Threat,Prediction,Cloud None 3.0000000000000000 HackRead - Chercher Cyber Le graphite spyware israélien ciblé WhatsApp avec exploit de 0 clic<br>Israeli Spyware Graphite Targeted WhatsApp with 0-Click Exploit Citizen Lab\'s investigation reveals sophisticated spyware attacks exploiting WhatsApp vulnerabilities, implicating Paragon Solutions. Learn how their research exposed these threats and the implications for digital privacy.]]> 2025-03-20T17:33:43+00:00 https://hackread.com/israeli-spyware-graphite-hit-whatsapp-0-click-exploit/ www.secnews.physaphae.fr/article.php?IdArticle=8657010 False Vulnerability,Threat None 4.0000000000000000 Dark Reading - Informationweek Branch Le secteur de la défense ukrainienne sous attaque via Dark Crystal Rat<br>Ukraine Defense Sector Under Attack Via Dark Crystal RAT The UNC-200 threat group, active since last summer, has been utilizing the Signal messaging app to social engineer targets into downloading an infostealing remote access Trojan.]]> 2025-03-20T16:41:35+00:00 https://www.darkreading.com/cyberattacks-data-breaches/ukraine-defense-sector-attack-dark-crystal-rat www.secnews.physaphae.fr/article.php?IdArticle=8657001 False Threat None 2.0000000000000000 Global Security Mag - Site de news francais Zimperium avertit: l'enracinement mobile et le jailbreaking toujours une menace de sécurité majeure<br>Zimperium Warns: Mobile Rooting and Jailbreaking Still a Major Security Threat Business News
Zimperium Warns: Mobile Rooting and Jailbreaking Still a Major Security Threat - Business News]]>
2025-03-20T14:56:40+00:00 https://www.globalsecuritymag.fr/zimperium-warns-mobile-rooting-and-jailbreaking-still-a-major-security-threat.html www.secnews.physaphae.fr/article.php?IdArticle=8656963 False Threat,Mobile None 3.0000000000000000
knowbe4 - cybersecurity services Les principaux plats à retenir du rapport Knowbe4 2025 Rapport de menaces de phishing<br>Key Takeaways from the KnowBe4 2025 Phishing Threat Trends Report clés les plats à partir du rapport de menace de phishing 2025 Notre dernier Rapport des tendances de la menace de phishing href = "https://www.knowbe4.com/resource-center/phishing"> phishing paysage en 2025, des tactiques renouvelées aux techniques d'attaque émergentes.
Key Takeaways from the 2025 Phishing Threat Trends Report Our latest Phishing Threat Trends Report explores the evolving phishing landscape in 2025, from renewed tactics to emerging attack techniques.]]>
2025-03-20T14:28:47+00:00 https://blog.knowbe4.com/key-takeaways-from-the-2025-phishing-threat-trends-report www.secnews.physaphae.fr/article.php?IdArticle=8656957 False Threat None 3.0000000000000000
CyberScoop - scoopnewsgroup.com special Cyber Les groupes de l'État-nation frappent des centaines d'organisations avec Microsoft Windows Zero-Day<br>Nation-state groups hit hundreds of organizations with Microsoft Windows zero-day Trend Micro chercheurs a découvert et signalé le défaut de huit ans à Microsoft il y a six mois. L'entreprise n'a pas pris d'engage à corriger ou à résoudre le problème.
>Trend Micro researchers discovered and reported the eight-year-old defect to Microsoft six months ago. The company hasn\'t made any commitments to patch or remediate the issue. ]]>
2025-03-20T14:07:40+00:00 https://cyberscoop.com/microsoft-windows-zero-day-exploits-nation-states/ www.secnews.physaphae.fr/article.php?IdArticle=8656960 False Vulnerability,Threat None 3.0000000000000000
Cyble - CyberSecurity Firm CISA met en garde contre l'exploitation active avec trois nouvelles vulnérabilités ajoutées au catalogue KEV<br>CISA Warns of Active Exploitation with Three New Vulnerabilities Added to KEV Catalog CVE-2025-1316 Cette vulnérabilité, identifiée le 4 mars 2025, est une vulnérabilité d'injection de commande OS qui permet aux attaquants d'exécuter à distance des commandes arbitraires sur l'appareil.   L'Edimax IC-7100 ne neutralise pas correctement les caractères spéciaux utilisés dans les commandes OS, le laissant ouvert à l'exploitation. malveillant Les acteurs peuvent élaborer des demandes spécifiques pour injecter un code malveillant dans le système d'exploitation de l'appareil photo \\, menant à l'exécution du code à distance et à l'accès inédite à l'appareil.  L'impact de cette vulnérabilité est grave, car il permet aux attaquants de prendre le contrôle de l'appareil, d'accès potentiellement à des données de surveillance vidéo sensibles ou de compromettre le réseau. Un score CVSS V4 de 9,3 a été attribué au CVE-2025-1316, indiquant la nature critique du défaut.   CISA recommande fortement que les organisations utilisant les caméras IP Edimax IC-7100 prennent des mesures immédiates pour atténuer le risque, y compris l'isolement du réseau, l'utilisation de ]]> 2025-03-20T14:07:29+00:00 https://cyble.com/blog/cisa-adds-cve-2025-1316-and-other-flaws/ www.secnews.physaphae.fr/article.php?IdArticle=8656938 False Vulnerability,Threat,Legislation None 3.0000000000000000 Cyble - CyberSecurity Firm Les menaces hybrides et l'IA forment l'ADN du paysage des menaces organisées de l'UE en 2025: Europol<br>Hybrid Threats and AI Form the DNA of EU\\'s Organized Threat Landscape in 2025: Europol Overview  The Europol released the EU-SOCTA 2025 report, which offers a comprehensive look into the complex dynamics shaping serious and organized crime across Europe.  Europol\'s analysis provides insight into the increasing intersection of cybercriminal activities, hybrid threats, and the exploitation of emerging technologies. Criminals are rapidly adapting to digital advancements, using technology to expand their reach, enhance their capabilities, and evade law enforcement, the reports said.  Hybrid Threats: A Blurring of Crime and Conflict  Hybrid threats, which combine conventional criminal methods with advanced digital strategies, present significant risks. These tactics destabilize societies, exploit critical infrastructures, and create uncertainty.   Criminal organizations now leverage methods traditionally associated with state-backed actors, including disinformation campaigns, targeted cyberattacks, and manipulation of public opinion. By exploiting vulnerabilities of interconnected systems, these actors disrupt supply chains, compromise sensitive data, and manipulate information on a large scale.  The blending of state-backed espionage and organized crime blurs the line between geopolitical conflict and tra]]> 2025-03-20T14:02:25+00:00 https://cyble.com/blog/hybrid-threats-eu-socta-2025-report/ www.secnews.physaphae.fr/article.php?IdArticle=8656939 False Malware,Tool,Vulnerability,Threat,Legislation,Medical None 2.0000000000000000 Zimperium - cyber risk firms for mobile Catchez-moi si vous le pouvez: enraciner les outils par rapport à l'industrie de la sécurité mobile<br>Catch Me If You Can: Rooting Tools vs The Mobile Security Industry Notre équipe ZLABS plonge pour pourquoi l'enracinement et le jailbreak sont une menace importante pour les entreprises et bien plus encore.
>Our zLabs team dives into why rooting and jailbreaking is a significant threat for enterprises and much more. ]]>
2025-03-20T14:00:00+00:00 https://www.zimperium.com/blog/catch-me-if-you-can-rooting-tools-vs-the-mobile-security-industry/ www.secnews.physaphae.fr/article.php?IdArticle=8656934 False Tool,Threat,Mobile None 2.0000000000000000
SlashNext - Cyber Firm Comment les attaquants abusent des applications cloud de confiance et pourquoi l'analyse d'URL est importante<br>How Attackers Abuse Trusted Cloud Apps-and Why URL Analysis Matters Ce n'est pas un secret que les cybercriminels aiment exploiter notre confiance dans les marques bien connues. Des grands détaillants aux services en ligne populaires, les attaquants s'accrocheront à tout ce qui semble sûr. Dans cet article, nous explorerons un exemple réel de ceci: l'abus de l'application réelle de DocuSign \\ pour livrer des liens malveillants. Ensuite, nous plongerons dans la façon dont notre […] Le message comment les attaquants abusent des applications cloud et pourquoi une analyse d'Url est
>It\'s no secret that cybercriminals love to exploit our trust in well-known brands. From big-name retailers to popular online services, attackers will latch onto anything that seems safe. In this post, we will explore a real-life example of this: the abuse of DocuSign\'s actual application to deliver malicious links. Then, we\'ll dive into how our […] The post How Attackers Abuse Trusted Cloud Apps-and Why URL Analysis Matters first appeared on SlashNext.]]>
2025-03-20T12:00:38+00:00 https://slashnext.com/blog/how-attackers-abuse-trusted-cloud-apps-and-why-url-analysis-matters/ www.secnews.physaphae.fr/article.php?IdArticle=8656910 False Threat,Cloud None 3.0000000000000000
Cisco - Security Firm Blog Cisco présente l'état du rapport de sécurité de l'IA pour 2025: développements clés, tendances et prédictions dans la sécurité de l'IA<br>Cisco Introduces the State of AI Security Report for 2025: Key Developments, Trends, and Predictions in AI Security Cisco is proud to share the State of AI Security report covering key developments in AI security across threat intelligence, policy, and research.]]> 2025-03-20T12:00:00+00:00 https://blogs.cisco.com/security/cisco-introduces-the-state-of-ai-security-report-for-2025/ www.secnews.physaphae.fr/article.php?IdArticle=8656903 False Threat None 3.0000000000000000 SecurityWeek - Security News Les attaques de logiciels espions paragon exploitent WhatsApp Zero-Day<br>Paragon Spyware Attacks Exploited WhatsApp Zero-Day Les attaques impliquant des logiciels espions en graphite de Paragon \\ impliquaient un jour zero-jour qui pourrait être exploité sans aucune interaction utilisateur.
>Attacks involving Paragon\'s Graphite spyware involved a WhatsApp zero-day that could be exploited without any user interaction. ]]>
2025-03-20T10:00:00+00:00 https://www.securityweek.com/paragon-spyware-attacks-exploited-whatsapp-zero-day/ www.secnews.physaphae.fr/article.php?IdArticle=8656882 False Vulnerability,Threat None 2.0000000000000000
Global Security Mag - Site de news francais Keysight présente AI Network Visibility Produits]]> 2025-03-20T08:56:59+00:00 https://www.globalsecuritymag.fr/keysight-presente-ai-network-visibility.html www.secnews.physaphae.fr/article.php?IdArticle=8656870 False Threat None 2.0000000000000000 InformationSecurityBuzzNews - Site de News Securite La violation des données de la Banque de l'alliance Western affecte près de 22 000 personnes<br>Western Alliance Bank Data Breach Affects Nearly 22,000 Individuals Western Alliance Bank has announced a data breach affecting 21,899 people, that was caused by an October 2024 cyberattack on a third-party file transfer software. The breach exposed sensitive personal and financial information, including names, Social Security numbers, driver’s license details, and financial account numbers.   The bank said the malicious actors exploited a zero-day vulnerability in the third-party software to [...]]]> 2025-03-20T06:50:29+00:00 https://informationsecuritybuzz.com/western-alliance-bank-data-breach/ www.secnews.physaphae.fr/article.php?IdArticle=8656849 False Data Breach,Vulnerability,Threat None 2.0000000000000000 AlienVault Lab Blog - AlienVault est un acteur de defense majeur dans les IOC Dangers de l'exploitation de l'exploitation des données et du hachage des données en cybersécurité<br>Dangers of Data Logging and Data Hashing in Cybersecurity 2025-03-20T06:00:00+00:00 https://levelblue.com/blogs/security-essentials/dangers-of-data-logging-and-data-hashing-in-cybersecurity www.secnews.physaphae.fr/article.php?IdArticle=8656956 False Data Breach,Tool,Vulnerability,Threat,Technical None 2.0000000000000000