www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-20T21:03:05+00:00 www.secnews.physaphae.fr IT Security Guru - Blog Sécurité WordPress Sites Targeted in World Cup-Themed Spam Scam 2018-07-13T10:40:03+00:00 http://www.itsecurityguru.org/2018/07/13/wordpress-sites-targeted-world-cup-themed-spam-scam/ www.secnews.physaphae.fr/article.php?IdArticle=743649 False Spam None None Security Affairs - Blog Secu Twitter shared details about its strategy for fighting spam and bots 2018-06-29T12:55:04+00:00 https://securityaffairs.co/wordpress/73997/breaking-news/twitter-fighting-spam-bots.html www.secnews.physaphae.fr/article.php?IdArticle=728651 False Spam,Tool None None Security Intelligence - Site de news Américain Goal! Spam Campaigns Capitalize on the World Cup Craze IBM X-Force researchers observed several ongoing spam campaigns tied to the World Cup - many of which used the official branding of tournament sponsors to lure victims. ]]> 2018-06-28T13:15:05+00:00 https://securityintelligence.com/goal-spam-campaigns-capitalize-on-the-world-cup-craze/ www.secnews.physaphae.fr/article.php?IdArticle=726915 False Spam None None Malwarebytes Labs - MalwarebytesLabs Red Hen website suffers SEO spam compromise A website belonging to an eatery currently making waves in the news has been compromised with SEO spam. We take a look at what's happened, and explain what the hackers are up to. Categories: Cybercrime Hacking Tags: (Read more...) ]]> 2018-06-27T21:11:02+00:00 https://blog.malwarebytes.com/cybercrime/2018/06/red-hen-website-suffers-seo-spam-compromise/ www.secnews.physaphae.fr/article.php?IdArticle=726042 False Spam None None InformationSecurityBuzzNews - Site de News Securite Caught In The Wild-Millions Of Phishing Attempts Each Month Are Trying To Hook Your Users Caught In The Wild-Millions Of Phishing Attempts Each Month Are Trying To Hook Your Users]]> 2018-06-26T21:30:02+00:00 https://www.informationsecuritybuzz.com/study-research/caught-in-the-wild-millions/ www.secnews.physaphae.fr/article.php?IdArticle=724465 False Spam None None Security Affairs - Blog Secu Recent spam campaigns powered by Necurs uses Internet Query File attachments 2018-06-26T13:47:05+00:00 https://securityaffairs.co/wordpress/73916/malware/necurs-iqf-attachments.html www.secnews.physaphae.fr/article.php?IdArticle=723796 False Spam,Malware None None SecurityWeek - Security News Necurs Campaign Uses Internet Query File Attachments 2018-06-26T00:41:01+00:00 https://www.securityweek.com/necurs-campaign-uses-internet-query-file-attachments www.secnews.physaphae.fr/article.php?IdArticle=723109 False Spam None None Bleeping Computer - Magazine Américain Blackmail Campaign Pretending to be WannaCry Is Really Just WannaSpam 2018-06-22T10:58:05+00:00 https://www.bleepingcomputer.com/news/security/blackmail-campaign-pretending-to-be-wannacry-is-really-just-wannaspam/ www.secnews.physaphae.fr/article.php?IdArticle=717558 False Spam Wannacry None Security Affairs - Blog Secu Red Alert 2.0 Android Trojan available for rent in the underground at $500 per Month 2018-06-22T05:40:03+00:00 https://securityaffairs.co/wordpress/73789/malware/red-alert-2-trojan.html www.secnews.physaphae.fr/article.php?IdArticle=716636 False Spam None None TechRepublic - Security News US Why we might see more spam and phishing post-GDPR 2018-06-21T18:12:05+00:00 https://www.techrepublic.com/article/why-we-might-see-more-spam-and-phishing-post-gdpr/#ftag=RSS56d97e7 www.secnews.physaphae.fr/article.php?IdArticle=715883 False Spam None None IT Security Guru - Blog Sécurité Researchers find free ransomware variant being distributed on the Dark Web 2018-02-21T14:09:05+00:00 http://www.itsecurityguru.org/2018/02/21/researchers-find-free-ransomware-variant-distributed-dark-web/ www.secnews.physaphae.fr/article.php?IdArticle=487270 False Spam None None Mandiant - Blog Sécu de Mandiant Les acteurs de la menace tirent parti de l'exploit éternel pour livrer des charges utiles non de la wannacry<br>Threat actors leverage EternalBlue exploit to deliver non-WannaCry payloads MS017-010 ) a d'abord été utilisépar Wannacry Ransomware et Adylkuzz Cryptocurrency Miner.Maintenant, plus d'acteurs de menaces tirent parti de la vulnérabilité à MicrosoftProtocole de bloc de messages du serveur (SMB) & # 8211;Cette fois pour distribuer Backdoor.Nitol et Trojan Gh0st Rat. Fireeye Dynamic Threat Intelligence (DTI) a historiquement observé des charges utiles similaires livrées via l'exploitation de la vulnérabilité CVE-2014-6332 ainsi que dans certaines campagnes de spam par e-mail en utilisant Commandes de versions .Plus précisément, Backdoor.Nitol a également été lié à des campagnes impliquant une exécution de code distante
The “EternalBlue” exploit (MS017-010) was initially used by WannaCry ransomware and Adylkuzz cryptocurrency miner. Now more threat actors are leveraging the vulnerability in Microsoft Server Message Block (SMB) protocol – this time to distribute Backdoor.Nitol and Trojan Gh0st RAT. FireEye Dynamic Threat Intelligence (DTI) has historically observed similar payloads delivered via exploitation of CVE-2014-6332 vulnerability as well as in some email spam campaigns using powershell commands. Specifically, Backdoor.Nitol has also been linked to campaigns involving a remote code execution]]>
2017-06-02T08:00:00+00:00 https://www.mandiant.com/resources/blog/threat-actors-leverage-eternalblue-exploit-deliver-non-wannacry-payloads www.secnews.physaphae.fr/article.php?IdArticle=8377776 False Ransomware,Spam,Vulnerability,Threat Wannacry 4.0000000000000000
Mandiant - Blog Sécu de Mandiant Microsoft Word Intruder (MWI): un nouveau kit d'exploitation de documents Word<br>Microsoft Word Intruder (MWI): A New Word Document Exploit Kit The tools used to create malicious documents that exploit vulnerabilities in Microsoft Word are now being advertised in underground forums and one new tool has emerged that provides the ability to track the effectiveness of campaigns. The builder, Microsoft Word Intruder (MWI), is advertised as an “APT” tool to be used in targeted attacks. It is accompanied by a statistics package known as “MWISTAT” that allows operators to track various campaigns. According to the author, the use of MWI in conjunction with spam is forbidden, and those who ignore this risk having their license revoked. In]]> 2015-04-01T15:17:27+00:00 https://www.mandiant.com/resources/blog/a-new-word-document www.secnews.physaphae.fr/article.php?IdArticle=8377809 False Spam,Tool,Vulnerability,Technical None 4.0000000000000000