www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-20T17:13:18+00:00 www.secnews.physaphae.fr SecurityWeek - Security News Hackers Leak More Confidential Athlete Data 2016-09-16T07:03:21+00:00 http://feedproxy.google.com/~r/Securityweek/~3/vB4iSJ-JVq8/hackers-leak-more-confidential-athlete-data www.secnews.physaphae.fr/article.php?IdArticle=74392 False None APT 28 None Dark Reading - Informationweek Branch Olympic Athletes\' Medical Data Compromised By Russian Hackers 2016-09-14T21:05:00+00:00 http://www.darkreading.com/attacks-breaches/olympic-athletes-medical-data-compromised-by-russian-hackers/d/d-id/1326895?_mc=RSS_DR_EDT www.secnews.physaphae.fr/article.php?IdArticle=66496 False None APT 28 None We Live Security - Editeur Logiciel Antivirus ESET WADA cyberattack compromises agency\'s database 2016-09-14T17:17:36+00:00 http://feedproxy.google.com/~r/eset/blog/~3/ou_Tl-LMI_c/ www.secnews.physaphae.fr/article.php?IdArticle=64584 False None APT 28 None The State of Security - Magazine Américain Confirmed! Russian Hackers Accessed U.S. Athletes\' Doping Records Read More ]]> 2016-09-14T10:46:22+00:00 http://www.tripwire.com/state-of-security/latest-security-news/confirmed-russian-hackers-accessed-u-s-athletes-doping-records/ www.secnews.physaphae.fr/article.php?IdArticle=63113 False None APT 28 None Network World - Magazine Info Russian hackers accused of leaking US Olympic athletes\' medical files took credit for the attack and accused American Olympic athletes of doping, of using “dirty methods to win.” Furthermore, the hackers claimed that although the US Olympic team had "played well but not fair,” it had “disgraced its name by tainted victories.”To read this article in full or to leave a comment, please click here]]> 2016-09-14T07:16:00+00:00 http://www.networkworld.com/article/3120174/security/russian-hackers-accused-of-leaking-us-olympic-athletes-medical-files.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=63872 False None APT 28 None UnderNews - Site de news "pirate" francais APT28 / Fancy Bear – Quand les pirates russes s\'attaquent aux athlètes olympiques Après le piratage et l'énorme fuite de donnée personnelles ciblant les athlètes ayant eu lieu pendant les JO 2016 de Rio, les hackers professionnels russes sont pointé du doigt comme responsables par l'agence mondiale antidopage.]]> 2016-09-14T07:03:11+00:00 http://feedproxy.google.com/~r/undernews/oCmA/~3/jHmz0LtHceA/apt28-fancy-bear-quand-les-pirates-russes-sattaquent-aux-athletes-olympiques.html www.secnews.physaphae.fr/article.php?IdArticle=62761 False None APT 28 None SC Magazine - Magazine WADA confirms Fancy Bear behind attack on anti-doping database ]]> 2016-09-13T21:23:22+00:00 http://feedproxy.google.com/~r/SCMagazineHome/~3/w9b66PXet9k/ www.secnews.physaphae.fr/article.php?IdArticle=61498 False None APT 28 None Network World - Magazine Info Hackers smear Olympic athletes with data dump of medical files posted Tuesday on a site bearing the name of the hacking group Fancy Bears. “Today we'd like to tell you about the U.S. Olympic team and their dirty methods to win,” said a message on the hackers' site.The World Anti-Doping Agency confirmed it had been hacked and blamed Fancy Bears, a Russian state-sponsored cyber espionage team that is also known as APT 28 -- the very same group that may have recently breached the Democratic National Committee.To read this article in full or to leave a comment, please click here]]> 2016-09-13T17:09:52+00:00 http://www.networkworld.com/article/3119712/hackers-smear-olympic-athletes-with-data-dump-of-medical-files.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=61844 False None APT 28 None CSO - CSO Daily Dashboard Russian spies blamed for WADA hack, leaked documents confirm drug exemptions calling themselves Fancy Bears' international hack team, claimed credit for hacking World Anti-Doping Agency (WADA).To read this article in full or to leave a comment, please click here]]> 2016-09-13T14:27:00+00:00 http://www.csoonline.com/article/3119734/security/russian-spies-blamed-for-wada-hack-leaked-documents-confirm-drug-exemptions.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=61360 False None APT 28 None Network World - Magazine Info Russian hackers allegedly target the World Anti-Doping Agency statement.To read this article in full or to leave a comment, please click here]]> 2016-09-13T13:54:46+00:00 http://www.networkworld.com/article/3119877/russian-hackers-allegedly-target-the-world-anti-doping-agency.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=61137 False None APT 28 None SecurityWeek - Security News Attack on Olympics Anti-Doping Agency Linked to Russia 2016-08-24T11:54:24+00:00 http://feedproxy.google.com/~r/Securityweek/~3/xCx_Lu_NRQk/attack-olympics-anti-doping-agency-linked-russia www.secnews.physaphae.fr/article.php?IdArticle=8528 False None APT 28 None SC Magazine - Magazine Olympic drug testing agency cyber attacks linked to DNC and DCCC hackers ]]> 2016-08-23T19:00:00+00:00 http://feedproxy.google.com/~r/SCMagazineHome/~3/wmR3bEq8zng/ www.secnews.physaphae.fr/article.php?IdArticle=8347 False None APT 28 None SC Magazine - Magazine ThreatConnect, Fidelis tie Fancy Bear to DCCC hack ]]> 2016-08-02T12:56:24+00:00 http://feedproxy.google.com/~r/SCMagazineHome/~3/-0esjKPbPMw/ www.secnews.physaphae.fr/article.php?IdArticle=5238 False None APT 28 None Ars Technica - Risk Assessment Security Hacktivism DNC Staffer got pop-up messages alerting of “state-sponsored actors” 2016-08-01T20:50:45+00:00 http://arstechnica.com/security/2016/08/dnc-staffer-got-pop-up-messages-alerting-of-state-sponsored-actors/ www.secnews.physaphae.fr/article.php?IdArticle=5101 False None APT 28 None SC Magazine - Magazine Guccifer 2.0 out - Cozy Bear, Fancy Bear hacked DNC, Fidelis analysis shows ]]> 2016-06-21T13:04:21+00:00 http://feedproxy.google.com/~r/SCMagazineHome/~3/CjWOycfronc/ www.secnews.physaphae.fr/article.php?IdArticle=3156 False None APT 29,APT 28 None TrendLabs Security - Editeur Antivirus New Flash Vulnerability CVE-2016-4117 Shares Similarities With Older Pawn Storm Exploit Trendlabs Security Intelligence Blog - by Trend MicroNew Flash Vulnerability CVE-2016-4117 Shares Similarities With Older Pawn Storm Exploit]]> 2016-05-13T18:00:02+00:00 http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/bRRIssXuBUI/ www.secnews.physaphae.fr/article.php?IdArticle=1627 False None APT 28 None TrendLabs Security - Editeur Antivirus Pawn Storm Targets German Christian Democratic Union Trendlabs Security Intelligence Blog - by Trend MicroPawn Storm Targets German Christian Democratic Union]]> 2016-05-11T15:21:31+00:00 http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/eG-YZGORXDg/ www.secnews.physaphae.fr/article.php?IdArticle=1526 False None APT 28 None TrendLabs Security - Editeur Antivirus Looking Into a Cyber-Attack Facilitator in the Netherlands Trendlabs Security Intelligence Blog - by Trend MicroLooking Into a Cyber-Attack Facilitator in the Netherlands]]> 2016-04-21T10:23:44+00:00 http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/MKFUpCeHi9s/ www.secnews.physaphae.fr/article.php?IdArticle=684 False None APT 28 None Mandiant - Blog Sécu de Mandiant Opération Russiandoll: Adobe & Windows Exploits zéro-day Probablement exploités par APT28 de Russie dans une attaque très ciblée<br>Operation RussianDoll: Adobe & Windows Zero-Day Exploits Likely Leveraged by Russia\\'s APT28 in Highly-Targeted Attack Dynamic Keen Intelligence Cloud (DTI) , les chercheurs de Fireeye ont détecté un modèle d'attaques commençant le 13 avril Th , 2015. Adobe a indépendamment corrigé la vulnérabilité (CVE-2015-3043) dans APSB15-06 .Grâce à la corrélation des indicateurs techniques et des infrastructures de commandement et de contrôle, FireEye évalue que l'APT28 est probablement responsable de cette activité. Microsoft est conscient de la vulnérabilité d'escalade locale exceptionnelle dans Windows
FireEye Labs recently detected a limited APT campaign exploiting zero-day vulnerabilities in Adobe Flash and a brand-new one in Microsoft Windows. Using the Dynamic Threat Intelligence Cloud (DTI), FireEye researchers detected a pattern of attacks beginning on April 13th, 2015. Adobe independently patched the vulnerability (CVE-2015-3043) in APSB15-06. Through correlation of technical indicators and command and control infrastructure, FireEye assess that APT28 is probably responsible for this activity. Microsoft is aware of the outstanding local privilege escalation vulnerability in Windows]]>
2015-04-18T11:10:00+00:00 https://www.mandiant.com/resources/blog/probable-apt28-useo www.secnews.physaphae.fr/article.php?IdArticle=8377808 False Vulnerability,Threat,Cloud APT 28,APT 28 4.0000000000000000
Mandiant - Blog Sécu de Mandiant Malware APT28: une fenêtre sur les opérations de cyber-espionnage de la Russie?<br>APT28 Malware: A Window into Russia\\'s Cyber Espionage Operations? mandiant href = "https://www.mandiant.com/resources/mandiant-expose-apt1-chinas-cyber-espionage-units" cible = "_ Blank"> Rapport APT1, en Chine.Aujourd'hui, nous publions un nouveau rapport: apt28:Une fenêtre sur les opérations de cyber-espionnage de la Russie? Ce rapport se concentre sur un groupe de menaces que nous avons désigné comme APT28.Alors que les logiciels malveillants d'APT28 \\ sont assez connus dans la communauté de la cybersécurité, notre rapport détaille des informations supplémentaires exposant des opérations en cours et ciblées qui, selon nous, indiquent un sponsor gouvernemental basé à Moscou. dans
The role of nation-state actors in cyber attacks was perhaps most widely revealed in February 2013 when Mandiant released the APT1 report, which detailed a professional cyber espionage group based in China. Today we release a new report: APT28: A Window Into Russia\'s Cyber Espionage Operations? This report focuses on a threat group that we have designated as APT28. While APT28\'s malware is fairly well known in the cybersecurity community, our report details additional information exposing ongoing, focused operations that we believe indicate a government sponsor based in Moscow. In]]>
2014-10-27T03:00:42+00:00 https://www.mandiant.com/resources/blog/apt28-a-window-into-russias-cyber-espionage-operations www.secnews.physaphae.fr/article.php?IdArticle=8377813 False Malware,Threat APT 28,APT 28,APT 1 4.0000000000000000