www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-06-03T10:35:13+00:00 www.secnews.physaphae.fr 01net. Actualites - Securite - Magazine Francais Ethereum : premier hack suite à The Merge, la cryptomonnaie est-elle en danger ? Une faille de sécurité a été identifiée sur une chaîne de la blockchain Ethereum. Un pirate a exploité la brèche pour gagner des actifs numériques. Peu après le Merge, la deuxième cryptomonnaie la plus valorisée du marché est-elle devenue vulnérable ? On fait le point. L'article Ethereum : premier hack suite à The Merge, la cryptomonnaie est-elle en danger ? est à retrouver sur 01net.com.]]> 2022-09-24T12:10:48+00:00 https://www.01net.com/actualites/ethereum-premier-hack-suite-merge-crypto-danger.html www.secnews.physaphae.fr/article.php?IdArticle=7106620 False Hack None None The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Hackers Using Fake CircleCI Notifications to Hack GitHub Accounts 2022-09-23T19:34:00+00:00 https://thehackernews.com/2022/09/hackers-using-fake-circleci.html www.secnews.physaphae.fr/article.php?IdArticle=7083703 False Hack None None TroyHunt - Blog Security So long slowdown: New hack runs SNES Star Fox at up to 60 fps 2022-09-23T16:37:23+00:00 https://arstechnica.com/?p=1884060 www.secnews.physaphae.fr/article.php?IdArticle=7085788 False Hack None None InformationSecurityBuzzNews - Site de News Securite Microsoft Exchange Hack 2022-09-23T13:14:19+00:00 https://informationsecuritybuzz.com/expert-comments/microsoft-exchange-hack/ www.secnews.physaphae.fr/article.php?IdArticle=7082776 False Hack,Threat None None The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) IT Security Takeaways from the Wiseasy Hack 2022-09-22T18:42:00+00:00 https://thehackernews.com/2022/09/it-security-takeaways-from-wiseasy-hack.html www.secnews.physaphae.fr/article.php?IdArticle=7061470 False Hack None None TechRepublic - Security News US Tech news you may have missed: Sept 15 – 21 Learn how to grant access to Excel workbook ranges, get the latest updates on the Windows 11 22H2 release and learn about the Uber hack in this week's roundup of the news. ]]> 2022-09-22T13:44:39+00:00 https://www.techrepublic.com/article/tech-news-may-missed-sept-15/ www.secnews.physaphae.fr/article.php?IdArticle=7062600 False Hack Uber,Uber None The State of Security - Magazine Américain SecTor 2022: The IoT Hack Lab is Back! Last year, it was great to be back at SecTor after everything was canceled in 2020. The capacity was reduced, but the Hack Lab was still plenty busy and we loved having everyone come by and visit our table and play with the gear. Even more than that, we were excited to meet up with […]… Read More ]]> 2022-09-22T03:00:00+00:00 https://www.tripwire.com/state-of-security/vert/sector-2022-iot-hack-lab-is-back/ www.secnews.physaphae.fr/article.php?IdArticle=7052783 False Hack None None CSO - CSO Daily Dashboard D&O insurance not yet a priority despite criminal trial of Uber\'s former CISO has drawn the attention of security professionals.To read this article in full, please click here]]> 2022-09-22T02:00:00+00:00 https://www.csoonline.com/article/3674308/dando-insurance-not-yet-a-priority-despite-criminal-trial-of-uber-s-former-ciso.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=7057330 False Hack Uber,Uber None The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Crypto Trading Firm Wintermute Loses $160 Million in Hacking Incident 2022-09-21T17:51:00+00:00 https://thehackernews.com/2022/09/crypto-trading-firm-wintermute-loses.html www.secnews.physaphae.fr/article.php?IdArticle=7039065 False Hack None None InformationSecurityBuzzNews - Site de News Securite Rockstar Confirm Data Leak, GTA Footage Stolen 2022-09-21T14:58:37+00:00 https://informationsecuritybuzz.com/expert-comments/rockstar-confirm-data-leak-gta-footage-stolen/ www.secnews.physaphae.fr/article.php?IdArticle=7040026 False Hack None None The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Critical Remote Hack Flaws Found in Dataprobe\'s Power Distribution Units 2022-09-21T10:54:00+00:00 https://thehackernews.com/2022/09/critical-remote-hack-flaws-found-in.html www.secnews.physaphae.fr/article.php?IdArticle=7032348 False Hack,Guideline None None SecurityWeek - Security News iBoot Power Distribution Unit Flaws Allow Hackers to Remotely Shut Down Devices 2022-09-21T10:35:00+00:00 https://www.securityweek.com/iboot-power-distribution-unit-flaws-allow-hackers-remotely-shut-down-devices www.secnews.physaphae.fr/article.php?IdArticle=7037086 False Hack None None Zataz - Magazine Francais de secu SecSea, les 14 et 15 octobre 2022-09-20T11:36:14+00:00 https://www.zataz.com/secsea-les-14-et-15-octobre/ www.secnews.physaphae.fr/article.php?IdArticle=7014556 False Hack None None InformationSecurityBuzzNews - Site de News Securite Revolut Hack Exposes Data Of 50,000 Users, Fuels New Phishing Wave 2022-09-20T11:24:32+00:00 https://informationsecuritybuzz.com/expert-comments/revolut-hack-exposes-data-of-50000-users-fuels-new-phishing-wave/ www.secnews.physaphae.fr/article.php?IdArticle=7013779 False Hack None None Bleeping Computer - Magazine Américain Uber links breach to Lapsus$ group, blames contractor for hack 2022-09-19T14:26:20+00:00 https://www.bleepingcomputer.com/news/security/uber-links-breach-to-lapsus-group-blames-contractor-for-hack/ www.secnews.physaphae.fr/article.php?IdArticle=7004815 False Hack Uber,Uber None SecurityWeek - Security News GTA 6 Videos and Source Code Stolen in Rockstar Games Hack 2022-09-19T10:24:11+00:00 https://www.securityweek.com/gta-6-videos-and-source-code-stolen-rockstar-games-hack www.secnews.physaphae.fr/article.php?IdArticle=7001779 False Hack Uber,Uber None Bleeping Computer - Magazine Américain Revolut hack exposes data of 50,000 users, fuels new phishing wave 2022-09-19T10:13:55+00:00 https://www.bleepingcomputer.com/news/security/revolut-hack-exposes-data-of-50-000-users-fuels-new-phishing-wave/ www.secnews.physaphae.fr/article.php?IdArticle=7002825 False Data Breach,Hack None None Bleeping Computer - Magazine Américain GTA 6 source code and videos leaked after Rockstar Games hack 2022-09-18T16:23:07+00:00 https://www.bleepingcomputer.com/news/security/gta-6-source-code-and-videos-leaked-after-rockstar-games-hack/ www.secnews.physaphae.fr/article.php?IdArticle=6987831 False Hack None None Security Affairs - Blog Secu Uber says there is no evidence that users\' private information was compromised 2022-09-18T11:58:11+00:00 https://securityaffairs.co/wordpress/135876/data-breach/uber-data-breach-update.html www.secnews.physaphae.fr/article.php?IdArticle=6978688 False Hack Uber,Uber None Security Affairs - Blog Secu LastPass revealed that intruders had internal access for four days during the August hack The Password management solution LastPass revealed that the threat actors had access to its systems for four days during the August hack. Password management solution LastPass shared more details about the security breach that the company suffered in August 2022. The company revealed that the threat actor had access to its network for four days […] ]]> 2022-09-17T18:11:10+00:00 https://securityaffairs.co/wordpress/135869/hacking/lastpass-august-hack-notice.html www.secnews.physaphae.fr/article.php?IdArticle=6960731 False Hack,Threat LastPass None TroyHunt - Blog Security Twitter pranksters derail GPT-3 bot with newly discovered “prompt injection” hack 2022-09-16T17:38:52+00:00 https://arstechnica.com/?p=1882057 www.secnews.physaphae.fr/article.php?IdArticle=6936171 False Hack None None CyberScoop - scoopnewsgroup.com special Cyber Blame game follows Uber hack. Experts say don\'t fault employee. 2022-09-16T17:00:29+00:00 https://www.cyberscoop.com/uber-hack-systems-failure-dont-blame-employee/ www.secnews.physaphae.fr/article.php?IdArticle=6932978 False Hack Uber,Uber None Schneier on Security - Chercheur Cryptologue Américain Massive Data Breach at Uber big: The breach appeared to have compromised many of Uber’s internal systems, and a person claiming responsibility for the hack sent images of email, cloud storage and code repositories to cybersecurity researchers and The New York Times. “They pretty much have full access to Uber,” said Sam Curry, a security engineer at Yuga Labs who corresponded with the person who claimed to be responsible for the breach. “This is a total compromise, from what it looks like.” It looks like a pretty basic phishing attack; someone gave the hacker their login credentials. And because Uber has lousy internal security, lots of people have access to everything. So once a hacker gains a foothold, they have access to everything...]]> 2022-09-16T14:07:13+00:00 https://www.schneier.com/blog/archives/2022/09/massive-data-breach-at-uber.html www.secnews.physaphae.fr/article.php?IdArticle=6931477 False Data Breach,Hack Uber,Uber None BBC - BBC News - Technology Uber investigating hack on its computer systems 2022-09-16T10:10:38+00:00 https://www.bbc.co.uk/news/technology-62925047?at_medium=RSS&at_campaign=KARANGA www.secnews.physaphae.fr/article.php?IdArticle=6927818 False Hack Uber None The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Uber Says It\'s Investigating a Potential Breach of Its Computer Systems 2022-09-16T08:38:00+00:00 https://thehackernews.com/2022/09/uber-says-its-investigating-potential.html www.secnews.physaphae.fr/article.php?IdArticle=6921329 False Hack Uber None AlienVault Lab Blog - AlienVault est un acteur de defense majeur dans les IOC APIs: Risks and security solutions recent report found that the average number of APIs per company increased by 221% in 2021. Not only are APIs impossible to ignore, but the need to invest in API security cannot be overlooked. The trend in usage is closely followed by opportunists seeking ways to exploit vulnerabilities for their gain. To ensure adequate security, developers and organizations alike need to understand the risks and design their security strategy to mitigate them. Too often, security approaches are redesigned after a breach or hack occurs. By then, the damage has been done. Being proactive will save organizations time, money, and heartache. API security risks As cybercriminals work tirelessly to develop new ways to steal data and harm organizations, the list of threats is seemingly endless. That should not be cause for despair, however. While it can feel overwhelming, IT departments and financial controllers should not let it stunt them into doing nothing. In this article, we cover the most prominent threats to API security, and ways to employ tactics to protect users, data, and networks. Software bugs At a base level, software bugs are an easy point of exploitation for cybercriminals. Application errors will weaken API security, leaving your organization - and your valuable data - vulnerable to attackers. It’s crucial to have a system in place to regularly check for software updates and patches. Patches function like a software update, plugging potential holes that cyberattackers may use to enter your network or systems. Ensure you conduct regular vulnerability scans and perform security attacks on your implemented APIs. Of course, identifying these vulnerabilities is only the first step. Organizations must ensure they have a workflow in place to address weaknesses swiftly. Broken object-level authorization attacks Another key API security risk is at exposed endpoints that relate to object identifiers. These can be seen as a welcome mat for attackers to enter the endpoints, leaving a wide attack area with access to objects and data. To mitigate this risk, organizations must implement authorization checks at the object level. Checking every function that accesses a data source through input from users will help protect you from criminal activity. Consider using an API gateway, access tokens, object-level authorization checks, and implementing proper authorization credentials to stay protected. Misconfiguration Security misconfigurations are another common threat to API security. This risk is typically enabled through factors such as insecure default configs, misconfigured HTTP headers, unnecessary HTTP methods, or open cloud storage. It is crucial not to rely on default configurations and instead to configure APIs to fit your organization’s specific needs and requirements. Exposed data At times, developers leave object properties exposed, leaving it up to organizations to filter data before availing it to end users. While well intentioned, this unfortunately leaves a large amount of data exposed, luring cybercriminals to attack. Ensure the data exposed through APIs is strictly limited to only the necessary, trusted users. Evaluate access control and ensure you’re deliberate with what is available, and to whom. Injections The threat]]> 2022-09-15T10:00:00+00:00 https://cybersecurity.att.com/blogs/security-essentials/apis-risks-and-security-solutions www.secnews.physaphae.fr/article.php?IdArticle=6906513 False Hack,Vulnerability,Threat None None TroyHunt - Blog Security Breach of software maker used to backdoor as many as 200,000 servers 2022-09-13T23:34:47+00:00 https://arstechnica.com/?p=1881102 www.secnews.physaphae.fr/article.php?IdArticle=6876434 False Hack None None InformationSecurityBuzzNews - Site de News Securite Lazarus APT Uses Log4j Flaw To Hack US, Canadian Energy Co\'s – Cyber Experts Comment 2022-09-12T14:24:45+00:00 https://informationsecuritybuzz.com/expert-comments/lazarus-apt-uses-log4j-flaw-to-hack-us-canadian-energy-cos-cyber-experts-comment/ www.secnews.physaphae.fr/article.php?IdArticle=6860571 False Hack APT 38 None Bleeping Computer - Magazine Américain Apple fixes eighth zero-day used to hack iPhones and Macs this year 2022-09-12T14:20:48+00:00 https://www.bleepingcomputer.com/news/security/apple-fixes-eighth-zero-day-used-to-hack-iphones-and-macs-this-year/ www.secnews.physaphae.fr/article.php?IdArticle=6862372 False Hack,Vulnerability None None SecurityWeek - Security News Vulnerability in BackupBuddy Plugin Exploited to Hack WordPress Sites 2022-09-12T11:34:17+00:00 https://www.securityweek.com/vulnerability-backupbuddy-plugin-exploited-hack-wordpress-sites www.secnews.physaphae.fr/article.php?IdArticle=6860251 False Hack,Vulnerability None None InformationSecurityBuzzNews - Site de News Securite Experts Insight On Holiday Inn Hack 2022-09-07T15:30:12+00:00 https://informationsecuritybuzz.com/expert-comments/experts-insight-on-holiday-inn-hack/ www.secnews.physaphae.fr/article.php?IdArticle=6768806 False Hack None None InfoSecurity Mag - InfoSecurity Magazine BlackCat Ransomware Linked to Italy\'s Energy Services Firm Hack 2022-09-06T08:10:00+00:00 https://www.infosecurity-magazine.com/news/blackcat-italys-energy-services/ www.secnews.physaphae.fr/article.php?IdArticle=6752062 False Ransomware,Hack None None The Security Ledger - Blog Sécurité Episode 242: Hacking the Farm (and John Deere) with Sick Codes Episode 242: Hacking the Farm (and John Deere) with Sick Codes appeared...Read the whole entry... »Click the icon below to listen. ]]> 2022-09-05T16:32:55+00:00 https://feeds.feedblitz.com/~/709716304/0/thesecurityledger~Episode-Hacking-the-Farm-and-John-Deere-with-Sick-Codes/ www.secnews.physaphae.fr/article.php?IdArticle=6741649 False Hack None None InformationSecurityBuzzNews - Site de News Securite Cybersecurity Experts Welcome NSA/CISA Best Practices For Software Supply Chain 2022-09-05T13:50:41+00:00 https://informationsecuritybuzz.com/expert-comments/cybersecurity-experts-welcome-nsa-cisa-best-practices-for-software-supply-chain/ www.secnews.physaphae.fr/article.php?IdArticle=6740396 False Hack None None Bleeping Computer - Magazine Américain TikTok denies hack following leak of user data, source code 2022-09-05T09:52:03+00:00 https://www.bleepingcomputer.com/news/security/tiktok-denies-hack-following-leak-of-user-data-source-code/ www.secnews.physaphae.fr/article.php?IdArticle=6740452 False Hack None None Security Affairs - Blog Secu EvilProxy Phishing-As-A-Service With MFA Bypass Emerged In Dark Web Resecurity researchers discovered a new Phishing-as-a-Service (PhaaS) called EvilProxy advertised on the Dark Web. Original post: https://resecurity.com/blog/article/evilproxy-phishing-as-a-service-with-mfa-bypass-emerged-in-dark-web Following the recent Twilio hack leading to the leakage of 2FA (OTP) codes, cybercriminals continue to upgrade their attack arsenal to orchestrate advanced phishing campaigns targeting users worldwide. Resecurity has recently identified a new Phishing-as-a-Service (PhaaS) called EvilProxy advertised in the Dark […] ]]> 2022-09-05T08:39:46+00:00 https://securityaffairs.co/wordpress/135318/cyber-crime/evilproxy-phishing-as-a-service.html www.secnews.physaphae.fr/article.php?IdArticle=6738394 False Hack,Guideline None None Bleeping Computer - Magazine Américain Samsung discloses data breach after July hack 2022-09-02T13:23:29+00:00 https://www.bleepingcomputer.com/news/security/samsung-discloses-data-breach-after-july-hack/ www.secnews.physaphae.fr/article.php?IdArticle=6688270 False Data Breach,Hack None None Security Affairs - Blog Secu Attack infrastructure used in Cisco hack linked to Evil Corp affiliate Researchers discovered that the infrastructure used in Cisco hack was the same used to target a Workforce Management Solution firm. Researchers from cybersecurity firm eSentire discovered that the attack infrastructure used in recent Cisco hack was also used to attack a top Workforce Management corporation in in April 2022. The experts also speculate that the […] ]]> 2022-09-02T07:25:46+00:00 https://securityaffairs.co/wordpress/135188/cyber-crime/cisco-hack-atatck-infrastructure.html www.secnews.physaphae.fr/article.php?IdArticle=6679609 False Hack None None The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Infra Used in Cisco Hack Also Targeted Workforce Management Solution 2022-09-01T15:33:00+00:00 https://thehackernews.com/2022/09/infra-used-in-cisco-hack-also-targeted.html www.secnews.physaphae.fr/article.php?IdArticle=6662591 False Hack None None SecurityWeek - Security News Ransomware Gang Claims Customer Data Stolen in TAP Air Portugal Hack 2022-09-01T12:59:12+00:00 https://www.securityweek.com/ransomware-gang-claims-customer-data-stolen-tap-air-portugal-hack www.secnews.physaphae.fr/article.php?IdArticle=6665711 False Ransomware,Hack,Threat None None Schneier on Security - Chercheur Cryptologue Américain High-School Graduation Prank Hack This is a fun story, detailing the hack a group of high school students perpetrated against an Illinois school district, hacking 500 screens across a bunch of schools. During the process, the group broke into the school's IT systems; repurposed software used to monitor students' computers; discovered a new vulnerability (and reported it); wrote their own scripts; secretly tested their system at night; and managed to avoid detection in the school's network. Many of the techniques were not sophisticated, but they were pretty much all illegal...]]> 2022-08-31T14:33:41+00:00 https://www.schneier.com/blog/archives/2022/08/high-school-graduation-prank-hack.html www.secnews.physaphae.fr/article.php?IdArticle=6647220 False Hack,Vulnerability None None Anomali - Firm Blog Anomali Cyber Watch: First Real-Life Video-Spoofing Attack, MagicWeb Backdoors via Non-Standard Key Identifier, LockBit Ransomware Blames Victim for DDoSing Back, and More Figure 1 - IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed. Trending Cyber News and Threat Intelligence LastPass Hackers Stole Source Code (published: August 26, 2022) In August 2022, an unidentified threat actor gained access to portions of the password management giant LastPass development environment. LastPass informed that it happened through a single compromised developer account and the attacker took portions of source code and some proprietary LastPass technical information. The company claims that this incident did not affect customer data or encrypted password vaults. Analyst Comment: This incident doesn’t seem to have an immediate impact on LastPass users. Still, organizations relying on LastPass should raise the concern in their risk assessment since “white-box hacking” (when source code of the attacking system is known) is easier for threat actors. Organizations providing public-facing software should take maximum measures to block threat actors from their development environment and establish robust and transparent security protocols and practices with all third parties involved in their code development. Tags: LastPass, Password manager, Data breach, Source code Mercury Leveraging Log4j 2 Vulnerabilities in Unpatched Systems to Target Israeli (published: August 25, 2022) Starting in July 2022, a new campaign by Iran-sponsored group Static Kitten (Mercury, MuddyWater) was detected targeting Israeli organizations. Microsoft researchers detected that this campaign was leveraging exploitation of Log4j 2 vulnerabilities (CVE-2021-45046 and CVE-2021-44228) in SysAid applications (IT management tools). For persistence Static Kitten was dropping webshells, creating local administrator accounts, stealing credentials, and adding their tools in the startup folders and autostart extensibility point (ASEP) registry keys. Overall the group was heavily using various open-source and built-in operating system tools: eHorus remote management software, Ligolo reverse tunneling tool, Mimikatz credential theft tool, PowerShell programs, RemCom remote service, Venom proxy tool, and Windows Management Instrumentation (WMI). Analyst Comment: Network defenders should monitor for alerts related to web shell threats, suspicious RDP sessions, ASEP registry anomaly, and suspicious account creation. Similarly, SysAid users can monitor for webshells and abnormal processes related to SysAisServer instance. Even though Static Kitten was observed leveraging the Log4Shell vulnerabilities in the past (targeting VMware apps), most of their attacks still start with spearphishing, often from a compromised email account. MITRE ATT&CK: [MITRE ATT&CK] Exploit Public-Facing Application - T1190 | [MITRE ATT&CK] OS Credential Dumping - T1003 | [MITRE ATT&CK] Phishing - T1566 | ]]> 2022-08-30T15:01:00+00:00 https://www.anomali.com/blog/anomali-cyber-watch-first-real-life-video-spoofing-attack-magicweb-backdoors-via-non-standard-key-identifier-lockbit-ransomware-blames-victim-for-ddosing-back-and-more www.secnews.physaphae.fr/article.php?IdArticle=6626943 False Ransomware,Hack,Tool,Vulnerability,Threat,Guideline,Cloud APT 29,APT 37,LastPass None InformationSecurityBuzzNews - Site de News Securite Microsoft 365 Business Users Targeted With New DocuSign Phishing Scam 2022-08-29T21:06:12+00:00 https://informationsecuritybuzz.com/expert-comments/microsoft-365-business-users-targeted-with-new-docusign-phishing-scam/ www.secnews.physaphae.fr/article.php?IdArticle=6616015 False Hack None None Security Affairs - Blog Secu Twilio breach let attackers access Authy two-factor accounts of 93 users Threat actors behind the Twilio hack also gained access to the accounts of 93 individual users of its Authy two-factor authentication (2FA) service. Early August, the communications company Twilio discloses a data breach, threat actors had access to the data of some of its customers. The attackers accessed company systems using employee credentials obtained through […] ]]> 2022-08-29T15:25:45+00:00 https://securityaffairs.co/wordpress/134984/data-breach/twilio-hack-authy-2fa.html www.secnews.physaphae.fr/article.php?IdArticle=6613781 False Hack,Threat None None Bleeping Computer - Magazine Américain Okta one-time MFA passcodes exposed in Twilio cyberattack 2022-08-28T13:15:05+00:00 https://www.bleepingcomputer.com/news/security/okta-one-time-mfa-passcodes-exposed-in-twilio-cyberattack/ www.secnews.physaphae.fr/article.php?IdArticle=6614117 True Hack,Threat None None Bleeping Computer - Magazine Américain Twilio breach let hackers see Okta\'s one-time MFA passwords 2022-08-28T13:15:05+00:00 https://www.bleepingcomputer.com/news/security/twilio-breach-let-hackers-see-oktas-one-time-mfa-passwords/ www.secnews.physaphae.fr/article.php?IdArticle=6598343 False Hack,Threat None None Security Affairs - Blog Secu Twilio hackers also breached the food delivery firm DoorDash Twilio hackers also compromised the food delivery firm DoorDash, the attackers had access to company data, including customer and employee info. On-demand food delivery service DoorDash disclosed a data breach, the threat actors behind the Twilio hack gained access to the company’s data. DoorDash declared that malicious hackers stole credentials from employees of a third-party vendor, then […] ]]> 2022-08-27T16:14:51+00:00 https://securityaffairs.co/wordpress/134905/data-breach/twilio-hackers-breached-doordash.html www.secnews.physaphae.fr/article.php?IdArticle=6573227 False Hack,Threat None None Ars Technica - Risk Assessment Security Hacktivism The number of companies caught up in the Twilio hack keeps growing 2022-08-26T19:54:39+00:00 https://arstechnica.com/?p=1876496 www.secnews.physaphae.fr/article.php?IdArticle=6551654 False Hack LastPass None Bleeping Computer - Magazine Américain DoorDash discloses new data breach tied to Twilio hack 2022-08-26T15:30:34+00:00 https://www.bleepingcomputer.com/news/security/doordash-discloses-new-data-breach-tied-to-twilio-hack/ www.secnews.physaphae.fr/article.php?IdArticle=6550442 False Data Breach,Hack None None SecurityWeek - Security News DoorDash Data Compromised Following Twilio Hack 2022-08-26T14:40:34+00:00 https://www.securityweek.com/doordash-data-compromised-following-twilio-hack www.secnews.physaphae.fr/article.php?IdArticle=6546136 False Hack None 5.0000000000000000 SecurityWeek - Security News Plex Confirms Database Breach, Data Theft 2022-08-24T14:56:27+00:00 https://www.securityweek.com/plex-confirms-database-breach-data-theft www.secnews.physaphae.fr/article.php?IdArticle=6503516 False Hack None None ProjectZero - Blog de recherche Google CVE-2021-1782, an iOS in-the-wild vulnerability in vouchers writeup published last week looking at an ASN.1 parser bug, this blog post is based on the notes I took as I was analyzing the patch and trying to understand the XNU vouchers subsystem. I hope that this writeup serves as the missing documentation for how some of the internals of the voucher subsystem works and its quirks which lead to this vulnerability. CVE-2021-1782 was fixed in iOS 14.4, as noted by @s1guza on twitter: This vulnerability was fixed on January 26th 2021, and Apple updated the iOS 14.4 release notes on May 28th 2021 to indicate that the issue may have been actively exploited: ]]> 2022-08-24T12:02:07+00:00 https://googleprojectzero.blogspot.com/2022/04/cve-2021-1782-ios-in-wild-vulnerability.html www.secnews.physaphae.fr/article.php?IdArticle=8221932 False Hack,Tool,Vulnerability,Guideline None 3.0000000000000000 Bleeping Computer - Magazine Américain Hackers use AiTM attack to monitor Microsoft 365 accounts for BEC scams 2022-08-24T11:53:36+00:00 https://www.bleepingcomputer.com/news/security/hackers-use-aitm-attack-to-monitor-microsoft-365-accounts-for-bec-scams/ www.secnews.physaphae.fr/article.php?IdArticle=6503632 False Hack None None InfoSecurity Mag - InfoSecurity Magazine Counterfeit Android Devices Revealed to Contain Backdoor Designed to Hack WhatsApp 2022-08-23T14:15:00+00:00 https://www.infosecurity-magazine.com/news/counterfeit-android-devices/ www.secnews.physaphae.fr/article.php?IdArticle=6485062 False Hack None 4.0000000000000000 knowbe4 - cybersecurity services CyberheistNews Vol 12 #34 [Eye Opener] The Cisco Hack Was Caused by Initial Access Broker Phishing CyberheistNews Vol 12 #34 ]]> 2022-08-23T13:30:00+00:00 https://blog.knowbe4.com/cyberheistnews-vol-12-34-eye-opener-the-cisco-hack-was-caused-by-initial-access-broker-phishing www.secnews.physaphae.fr/article.php?IdArticle=6484378 False Hack None None Schneier on Security - Chercheur Cryptologue Américain Signal Phone Numbers Exposed in Twilio Hack were exposed: Here’s what our users need to know: All users can rest assured that their message history, contact lists, profile information, whom they’d blocked, and other personal data remain private and secure and were not affected. For about 1,900 users, an attacker could have attempted to re-register their number to another device or learned that their number was registered to Signal. This attack has since been shut down by Twilio. 1,900 users is a very small percentage of Signal’s total users, meaning that most were not affected...]]> 2022-08-23T11:30:40+00:00 https://www.schneier.com/blog/archives/2022/08/signal-phone-numbers-exposed-in-twilio-hack.html www.secnews.physaphae.fr/article.php?IdArticle=6482900 False Hack None None IT Security Guru - Blog Sécurité Counterfeit Phones Found to Contain Backdoor to Hack WhatsApp 2022-08-23T11:12:43+00:00 https://www.itsecurityguru.org/2022/08/23/counterfeit-phones-found-to-harbour-backdoor-to-hack-whatsapp/?utm_source=rss&utm_medium=rss&utm_campaign=counterfeit-phones-found-to-harbour-backdoor-to-hack-whatsapp www.secnews.physaphae.fr/article.php?IdArticle=6483264 True Malware,Hack None None Security Affairs - Blog Secu Lockbit leak sites hit by mysterious DDoS attack after Entrust hack LockBit ransomware gang claims to have hacked the IT giant Entrust and started leaking the stolen files. Entrust Corp., provides software and hardware used to issue financial cards, e-passport production, user authentication for those looking to access secure networks or conduct financial transactions, trust certificated for websites, mobile credentials, and connected devices. The Lockbit ransomware […] ]]> 2022-08-23T00:02:06+00:00 https://securityaffairs.co/wordpress/134707/cyber-crime/lockbit-hacked-entrust.html www.secnews.physaphae.fr/article.php?IdArticle=6477170 False Ransomware,Hack None None The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Researchers Find Counterfeit Phones with Backdoor to Hack WhatsApp Accounts 2022-08-22T07:28:00+00:00 https://thehackernews.com/2022/08/researchers-find-counterfeit-phones.html www.secnews.physaphae.fr/article.php?IdArticle=6473453 False Hack None None Wired Threat Level - Security News Janet Jackson\'s \'Rhythm Nation\' Can Crash Old Hard Drives 2022-08-20T13:00:00+00:00 https://www.wired.com/story/janet-jackson-rhythm-nation-crash-hard-drives/ www.secnews.physaphae.fr/article.php?IdArticle=6434011 False Hack,Tool None None Bleeping Computer - Magazine Américain Russian APT29 hackers abuse Azure services to hack Microsoft 365 users 2022-08-19T11:10:55+00:00 https://www.bleepingcomputer.com/news/security/russian-apt29-hackers-abuse-azure-services-to-hack-microsoft-365-users/ www.secnews.physaphae.fr/article.php?IdArticle=6415346 False Hack APT 29 None McAfee Labs - Editeur Logiciel Encrypted Messaging Service Hack Exposes Phone Numbers Many people opt for encrypted messaging services because they like the additional layers of privacy they offer. They allow users... ]]> 2022-08-18T21:37:53+00:00 https://www.mcafee.com/blogs/internet-security/encrypted-messaging-service-hack-exposes-phone-numbers/ www.secnews.physaphae.fr/article.php?IdArticle=6402347 False Hack None None Bleeping Computer - Magazine Américain Apple releases Safari 15.6.1 to fix zero-day bug used in attacks 2022-08-18T15:49:45+00:00 https://www.bleepingcomputer.com/news/security/apple-releases-safari-1561-to-fix-zero-day-bug-used-in-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=6398160 False Hack,Vulnerability None None Wired Threat Level - Security News How a Hacked Tractor Added Fuel to the Right-to-Repair Movement 2022-08-18T12:00:00+00:00 https://www.wired.com/story/gadget-lab-podcast-562/ www.secnews.physaphae.fr/article.php?IdArticle=6391836 False Hack None None Malwarebytes Labs - MalwarebytesLabs Urgent update for macOS and iOS! Two actively exploited zero-days fixed Categories: Exploits and vulnerabilitiesCategories: NewsTags: macOS Tags: iOS Tags: CVE-2022-32894 Tags: CVE-2022-32893 Tags: kernel privileges Tags: WebKit Tags: actively exploited Tags: watering hole Tags: exploit kit Apple has released emergency security updates to fix two zero-day vulnerabilities previously exploited by attackers to hack iPhones, iPads, or Macs. (Read more...) ]]> 2022-08-18T10:00:00+00:00 https://www.malwarebytes.com/blog/news/2022/08/urgent-update-for-macos-and-ios-two-actively-exploited-zero-days-fixed www.secnews.physaphae.fr/article.php?IdArticle=6401567 True Hack None None Bleeping Computer - Magazine Américain Apple security updates fix 2 zero-days used to hack iPhones, Macs 2022-08-17T18:35:26+00:00 https://www.bleepingcomputer.com/news/security/apple-security-updates-fix-2-zero-days-used-to-hack-iphones-macs/ www.secnews.physaphae.fr/article.php?IdArticle=6381185 False Hack None None IT Security Guru - Blog Sécurité Job Seekers Targeted in Lazarus Group Hack 2022-08-17T09:33:15+00:00 https://www.itsecurityguru.org/2022/08/17/job-seekers-targeted-in-lazarus-group-hack/?utm_source=rss&utm_medium=rss&utm_campaign=job-seekers-targeted-in-lazarus-group-hack www.secnews.physaphae.fr/article.php?IdArticle=6370619 True Malware,Hack,Medical APT 38 None InfoSecurity Mag - InfoSecurity Magazine New Attack Weaponizes PLCs to Hack Enterprise and OT Networks 2022-08-16T14:15:00+00:00 https://www.infosecurity-magazine.com/news/new-attack-weaponizes-plcs-to-hack/ www.secnews.physaphae.fr/article.php?IdArticle=6354017 False Hack,Guideline None None SecurityWeek - Security News Ransomware Group Claims Access to SCADA in Confusing UK Water Company Hack 2022-08-16T13:53:13+00:00 https://www.securityweek.com/ransomware-group-claims-access-scada-confusing-uk-water-company-hack www.secnews.physaphae.fr/article.php?IdArticle=6353804 False Ransomware,Hack None None knowbe4 - cybersecurity services CyberheistNews Vol 12 #33 [Eye Opener] Recent Cisco Hack by Ransomware Group Started Because of a Phishing Attack CyberheistNews Vol 12 #33 ]]> 2022-08-16T13:34:25+00:00 https://blog.knowbe4.com/cyberheistnews-vol-12-33-eye-opener-recent-cisco-hack-by-ransomware-group-started-because-of-a-phishing-attack www.secnews.physaphae.fr/article.php?IdArticle=6353337 True Ransomware,Hack None None InfoSecurity Mag - InfoSecurity Magazine #DEFCON: How US Teen RickRolled His High School District 2022-08-16T13:30:00+00:00 https://www.infosecurity-magazine.com/news/defcon-how-us-teen-rickrolled/ www.secnews.physaphae.fr/article.php?IdArticle=6353258 False Hack None None 01net. Actualites - Securite - Magazine Francais Il a hacké un tracteur John Deere… et a installé Doom John Deere root access Au delà du jeu vidéo, ce hack permettrait aux utilisateurs de regagner le contrôle des équipements agricoles qu'ils possèdent et de ne plus être obligés de passer par un concessionnaire pour les mises à jour. L'article Il a hacké un tracteur John Deere… et a installé Doom est à retrouver sur 01net.com.]]> 2022-08-16T11:30:27+00:00 https://www.01net.com/actualites/il-a-hacke-un-tracteur-john-deere-et-a-installe-doom.html www.secnews.physaphae.fr/article.php?IdArticle=6351729 False Hack None None SecurityWeek - Security News Signal Discloses Impact From Twilio Hack 2022-08-16T11:09:42+00:00 https://www.securityweek.com/signal-discloses-impact-twilio-hack www.secnews.physaphae.fr/article.php?IdArticle=6352311 False Hack,Threat None None The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Nearly 1,900 Signal Messenger Accounts Potentially Compromised in Twilio Hack 2022-08-15T22:42:11+00:00 https://thehackernews.com/2022/08/nearly-1900-signal-messenger-accounts.html www.secnews.physaphae.fr/article.php?IdArticle=6348470 False Hack None None Bleeping Computer - Magazine Américain Twilio hack exposed Signal phone numbers of 1,900 users 2022-08-15T17:46:24+00:00 https://www.bleepingcomputer.com/news/security/twilio-hack-exposed-signal-phone-numbers-of-1-900-users/ www.secnews.physaphae.fr/article.php?IdArticle=6345363 False Data Breach,Hack None None SecurityWeek - Security News Weaponized PLCs Can Hack Engineering Workstations in Attacks on Industrial Orgs 2022-08-15T10:46:06+00:00 https://www.securityweek.com/weaponized-plcs-can-hack-engineering-workstations-attacks-industrial-orgs www.secnews.physaphae.fr/article.php?IdArticle=6340427 False Hack None None SecurityWeek - Security News Zero-Day Vulnerability Exploited to Hack Over 1,000 Zimbra Email Servers 2022-08-12T10:43:09+00:00 https://www.securityweek.com/zero-day-vulnerability-exploited-hack-over-1000-zimbra-email-servers www.secnews.physaphae.fr/article.php?IdArticle=6269250 False Hack,Vulnerability None None Security Affairs - Blog Secu Experts warn of mass exploitation of an RCE flaw in Zimbra Collaboration Suite Threat actors are exploiting an authentication bypass Zimbra flaw, tracked as CVE-2022-27925, to hack Zimbra Collaboration Suite email servers worldwide. An authentication bypass affecting Zimbra Collaboration Suite, tracked as CVE-2022-27925, is actively exploited to hack ZCS email servers worldwide. Zimbra is an email and collaboration platform used by more than 200,000 businesses from over 140 countries. Yesterday, August 11, CISA has […] ]]> 2022-08-12T08:00:43+00:00 https://securityaffairs.co/wordpress/134314/hacking/zimbra-rce-actively-exploited.html www.secnews.physaphae.fr/article.php?IdArticle=6265951 False Hack None None knowbe4 - cybersecurity services Recent Cisco Hack by Ransomware Group Started Because of a Phishing Attack Recent Cisco Hack by Ransomware Group Started Because of a Phishing Attack ]]> 2022-08-11T12:59:06+00:00 https://blog.knowbe4.com/recent-cisco-hack-by-ransomware-group-started-because-of-a-phishing-attack www.secnews.physaphae.fr/article.php?IdArticle=6249900 False Ransomware,Hack None None CSO - CSO Daily Dashboard Cisco admits hack on IT network, links attacker to LAPSUS$ threat group the company said. Cisco claimed it took immediate action to contain and eradicate the bad actor, which it has linked to notorious threat group LAPSUS$. It also said that it has taken the decision to publicly announce the incident now as it was previously actively collecting information about the bad actor to help protect the security community.To read this article in full, please click here]]> 2022-08-11T03:53:00+00:00 https://www.csoonline.com/article/3670068/cisco-admits-hack-on-it-network-links-attacker-to-lapsus-threat-group.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=6248126 False Hack,Threat None None The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) What the Zola Hack Can Teach Us About Password Security 2022-08-11T03:24:07+00:00 https://thehackernews.com/2022/08/what-zola-hack-can-teach-us-about.html www.secnews.physaphae.fr/article.php?IdArticle=6248095 False Hack None None InfoSecurity Mag - InfoSecurity Magazine Cyber-criminals Shift From Macros to Shortcut Files to Hack Business PCs, HP Report 2022-08-10T16:05:00+00:00 https://www.infosecurity-magazine.com/news/cyber-criminals-shift-macros/ www.secnews.physaphae.fr/article.php?IdArticle=6232057 False Hack None 2.0000000000000000 GoogleSec - Firm Security Blog Making Linux Kernel Exploit Cooking Harder Cover of the medieval cookbook. Title in large letters kernel Exploits. Adorned. Featuring a small penguin. 15th century. Color. High quality picture. Private collection. Detailed.The Linux kernel is a key component for the security of the Internet. Google uses Linux in almost everything, from the computers our employees use, to the products people around the world use daily like Chromebooks, Android on phones, cars, and TVs, and workloads on Google Cloud. Because of this, we have heavily invested in Linux's security - and today, we're announcing how we're building on those investments and increasing our rewards.In 2020, we launched an open-source Kubernetes-based Capture-the-Flag (CTF) project called, kCTF. The kCTF Vulnerability Rewards Program (VRP) lets researchers connect to our Google Kubernetes Engine (GKE) instances, and if they can hack it, they get a flag, and are potentially rewarded. All of GKE and its dependenci]]> 2022-08-10T12:00:24+00:00 http://security.googleblog.com/2022/08/making-linux-kernel-exploit-cooking.html www.secnews.physaphae.fr/article.php?IdArticle=6232094 False Hack Uber None CyberScoop - scoopnewsgroup.com special Cyber Twilio, a texting platform popular with political campaigns, reports breach The company says it became aware of the hack on Aug. 4 but it declined to say how many customers were affected by the incident. ]]> 2022-08-08T16:28:03+00:00 https://www.cyberscoop.com/twilio-campaign-hack-text/ www.secnews.physaphae.fr/article.php?IdArticle=6203843 False Hack None None IT Security Guru - Blog Sécurité How You Can Hack Your Senses to Work Better 2022-08-08T13:49:02+00:00 https://www.itsecurityguru.org/2022/08/08/how-you-can-hack-your-senses-to-work-better/?utm_source=rss&utm_medium=rss&utm_campaign=how-you-can-hack-your-senses-to-work-better www.secnews.physaphae.fr/article.php?IdArticle=6202562 False Ransomware,Hack None None Malwarebytes Labs - MalwarebytesLabs KMSpico explained: No, KMS is not "kill Microsoft" Categories: ExplainedA hack tool called KMSPico is hailed as the go-to tool when it comes to activiating Windows. But is it safe? (Read more...) ]]> 2022-08-08T07:00:00+00:00 https://www.malwarebytes.com/blog/news/2022/08/kmspico-explained-no-kms-is-not-kill-microsoft www.secnews.physaphae.fr/article.php?IdArticle=6206748 False Hack,Tool None None Ars Technica - Risk Assessment Security Hacktivism Cyberattack on Albanian government suggests new Iranian aggression 2022-08-05T21:30:37+00:00 https://arstechnica.com/?p=1871914 www.secnews.physaphae.fr/article.php?IdArticle=6149292 True Hack None None Detectify - Detectify Labs How To Hack Web Applications in 2022: Part 2 2022-08-05T14:20:00+00:00 https://labs.detectify.com/2022/08/05/how-to-hack-web-applications-in-2022/ www.secnews.physaphae.fr/article.php?IdArticle=6143301 True Hack None None Wired Threat Level - Security News An Attack on Albanian Government Suggests New Iranian Aggression 2022-08-04T21:30:27+00:00 https://www.wired.com/story/iran-cyberattack-albania/ www.secnews.physaphae.fr/article.php?IdArticle=6130343 False Hack None None CISCO Talos - Cisco Research blog Attackers leveraging Dark Utilities "C2aaS" platform in malware campaigns By Edmund Brumaghin, Azim Khodjibaev and Matt Thaxton, with contributions from Arnaud Zobec.Executive SummaryDark Utilities, released in early 2022, is a platform that provides full-featured C2 capabilities to adversaries.It is marketed as a means to enable remote access, command execution, distributed denial-of-service (DDoS) attacks and cryptocurrency mining operations on infected systems.Payloads provided by the platform support Windows, Linux and Python-based implementations and are hosted within the Interplanetary File System (IPFS), making them resilient to content moderation or law enforcement intervention.Since its initial release, we've observed malware samples in the wild leveraging it to facilitate remote access and cryptocurrency mining.What is "Dark Utilities?"In early 2022, a new C2 platform called "Dark Utilities" was established, offering a variety of services such as remote system access, DDoS capabilities and cryptocurrency mining. The operators of the service also established Discord and Telegram communities where they provide technical support and assistance for customers on the platform.Dark Utilities provides payloads consisting of code that is executed on victim systems, allowing them to be registered with the service and establish a command and control (C2) communications channel. The platform currently supports Windows, Linux and Python-based payloads, allowing adversaries to target multiple architectures without requiring significant development resources. During our analysis, we observed efforts underway to expand OS and system architecture support as the platform continues to see ongoing develo]]> 2022-08-04T08:00:13+00:00 http://blog.talosintelligence.com/2022/08/dark-utilities.html www.secnews.physaphae.fr/article.php?IdArticle=6123175 False Spam,Malware,Hack,Tool,Threat,Guideline APT 19 None Global Security Mag - Site de news francais Analyse de Chainalysis concernant le hack de Nomad Bridge Malwares]]> 2022-08-03T13:51:03+00:00 http://www.globalsecuritymag.fr/Analyse-de-Chainalysis-concernant,20220803,128551.html www.secnews.physaphae.fr/article.php?IdArticle=6107192 False Hack None None CyberScoop - scoopnewsgroup.com special Cyber Solana hack wipes more than 7,000 wallets, totaling nearly $5 million in losses The apparent software-based attack stands out among other major cryptocurrency hacks that have totaled nearly $2 billion so far in 2022. ]]> 2022-08-03T13:26:39+00:00 https://www.cyberscoop.com/solana-hack-wallet-nomad-cryptocurrency/ www.secnews.physaphae.fr/article.php?IdArticle=6106885 False Hack None None SecurityWeek - Security News Nearly $200 Million Stolen From Cryptocurrency Bridge Nomad 2022-08-03T10:10:14+00:00 https://www.securityweek.com/nearly-200-million-stolen-cryptocurrency-bridge-nomad www.secnews.physaphae.fr/article.php?IdArticle=6105638 False Hack None None Tech Worm - Desc Microsoft: Windows, Adobe Zero-Day Used To Hack Windows Users The Microsoft Threat Intelligence Center (MSTIC) and the Microsoft Security Response Center (MSRC) on Wednesday claimed that they found an Austrian-based private-sector offensive actor (PSOA) exploiting multiple Windows and Adobe 0-day exploits in “limited and targeted attacks” against European and Central American customers. For the unversed, PSOAs are private companies that manufacture and sell cyberweapons […] ]]> 2022-07-28T10:17:24+00:00 https://www.techworm.net/2022/07/microsoft-windows-adobe-zero-day-hack.html www.secnews.physaphae.fr/article.php?IdArticle=5988402 False Hack,Threat None None IT Security Guru - Blog Sécurité Microsoft Threat Intelligence Center Links Threat Group to Austrian Spyware Vendor DSRIF 2022-07-28T09:20:39+00:00 https://www.itsecurityguru.org/2022/07/28/microsoft-threat-intelligence-center-links-threat-group-to-austrian-spyware-vendor-dsrif/?utm_source=rss&utm_medium=rss&utm_campaign=microsoft-threat-intelligence-center-links-threat-group-to-austrian-spyware-vendor-dsrif www.secnews.physaphae.fr/article.php?IdArticle=5987602 False Malware,Hack,Threat None None Ars Technica - Risk Assessment Security Hacktivism 0-days sold by Austrian firm used to hack Windows users, Microsoft says 2022-07-27T20:24:22+00:00 https://arstechnica.com/?p=1869797 www.secnews.physaphae.fr/article.php?IdArticle=5975907 False Hack None None Krebs on Security - Chercheur Américain A Retrospective on the 2015 Ashley Madison Breach 2022-07-27T01:04:51+00:00 https://krebsonsecurity.com/2022/07/a-retrospective-on-the-2015-ashley-madison-breach/ www.secnews.physaphae.fr/article.php?IdArticle=5960017 False Hack,Guideline None None SecurityWeek - Security News European Lawmaker Targeted With Cytrox Predator Surveillance Spyware 2022-07-26T20:12:01+00:00 https://www.securityweek.com/european-lawmaker-targeted-cytrox-predator-surveillance-spyware www.secnews.physaphae.fr/article.php?IdArticle=5955957 False Hack None None TroyHunt - Blog Security How big is the risk that someone will hack an EV charging network? 2022-07-26T17:49:17+00:00 https://arstechnica.com/?p=1856853 www.secnews.physaphae.fr/article.php?IdArticle=5955419 False Hack None None UnderNews - Site de news "pirate" francais Phishing – 967 faux sites voient le jour : comment ne pas se faire avoir ? D'après un article du Parisien, un anonyme a déposé la semaine dernière 967 adresses de sites web en .fr qui reprennent, avec quelques fautes de frappe, les noms de marques et d'institutions bien connues. Si les intentions sont encore inconnues, il y a fort à parier qu'une tentative de hack ou de phishing soit en train […] The post Phishing – 967 faux sites voient le jour : comment ne pas se faire avoir ? first appeared on UnderNews.]]> 2022-07-26T17:14:09+00:00 https://www.undernews.fr/reseau-securite/phishing-hoax/phishing-967-faux-sites-voient-le-jour-comment-ne-pas-se-faire-avoir.html www.secnews.physaphae.fr/article.php?IdArticle=5953615 False Hack None None