Plus récents

Scripps Health confirmed Sunday their technology servers were hacked overnight, forcing the health care system to switch to offline chart systems and causing a disruption to their patient portals.

nbcsandiego.com/news/local/scr

La communication de crise du groupe Hobbs, dont font partie Dispeo, Colis Privé, ou encore Adrexo, pourrait bien rester dans les annales comme illustration de ce qu'il ne faut pas faire vis-à-vis du public et de ses clients finaux, lorsque l'on est confronté à une attaque informatique.

lemagit.fr/tribune/Cyberattaqu

Intrusion et infection par du SI de la commune de Houilles (Yvelines) au 30 janvier 2021 : les systèmes étaient obsolètes et les pare-feu dépassés

actu.fr/ile-de-france/houilles

Cerinnov Group, spécialiste de l'ingénierie robotique et des équipements industriels pour l'industrie de la céramique et du verre en France et à l'international, publie ses résultats annuels 2020. Cerinnov Group informe par ailleurs le marché, par souci de transparence, qu'il a détecté, en date du 27 mars 2021, une intrusion sur son réseau informatique et le déploiement d'un logiciel de type

finance.orange.fr/bourse/artic

La compagnie de transport Boutin a été la cible d'un . L'entreprise a fermé l'ensemble de ses systèmes informatiques, mais réussit tout de même à maintenir une partie de ses activités. Boutin est une entreprise fondée en 1945 dont le siège social se situe à Plessisville, au Centre-du-Québec. Selon son site Web, elle compte plus de 390 employés et possède une flotte qui dépasse 630 unités.

blog.hackfest.ca/blog/Groupe-B

Hotbit suffered a serious cyber attack starting around 08:00 PM UTC, Apr.29, which led to the paralyzation of a number of some basic services

hotbit.zendesk.com/hc/en-us/ar

A threat actor believed to be working on behalf of Chinese state-sponsored interests was recently observed targeting a Russia-based defense contractor involved in designing nuclear submarines for the naval arm of the Russian Armed Forces.

Rubin Design Bureau is a submarine design center located in Saint Petersburg, accounting for the design of over 85% of submarines in the Soviet and Russian Navy since its origins in 1901, including several generations of strategic missile cruiser submarines.

cybereason.com/blog/portdoor-n

Elekta, le fournisseur suédois de systèmes d'oncologie et de radiologie se remet d'une attaque informatique qui l'a contraint à placer hors ligne la totalité de son système de stockage basé sur le cloud de première génération.

hipaajournal.com/healthcare-pr

A team of computer science researchers has uncovered a line of attack that breaks all Spectre defenses, meaning that billions of computers and other devices across the globe are just as vulnerable today as they were when Spectre was first announced.

sciencedaily.com/releases/2021

Malicious actors have adopted Excel 4.0 documents as a way of distributing their malware. This method has been here for more than a year and the number of newly seen samples isn't dropping. The share of malicious samples in the total number of Excel 4.0 documents exceeds 90%, and, since a lot of well known malware families like Quakbot, ZLoader and Trickbot have been seen using them, we can expect these numbers to keep growing as more malware families pivot to this initial stage vector. The biggest risk for the targeted companies and individuals is the fact that security solutions still have a lot of problems with detecting malicious Excel 4.0 documents

blog.reversinglabs.com/blog/sp

Naikon (aka Override Panda, Lotus Panda, or Hellsing) has a track record of targeting government entities in the Asia-Pacific (APAC) region in search of geopolitical intelligence. While initially assumed to have gone off the radar since first exposed in 2015, evidence emerged to the contrary last May when the adversary was spotted using a new backdoor called « Aria-Body » to stealthily break into networks and leverage the compromised infrastructure as a command-and-control (C2) server to launch additional attacks against other organizations. The new wave of attacks employed RainyDay as the primary backdoor, with the actors using it to conduct reconnaissance, deliver additional payloads, perform lateral movement across the network, and exfiltrate sensitive information.

labs.bitdefender.com/2021/04/n

The malicious activity, collectively named « EmissarySoldier » has been attributed to a threat actor called LuckyMouse, and is said to have happened in 2020 with the goal of obtaining geopolitical insights in the region. The attacks involved deploying a toolkit dubbed SysUpdate (aka Soldier) in a number of breached organizations, including government and diplomatic agencies, telecom providers, a TV media company, and a commercial bank.

welivesecurity.com/2021/04/29/

We observed UNC2447, an aggressive financially motivated group, exploit SonicWall SMA 100 series VPN zero-day vulnerability prior to patch availability, use SOMBRAT malware, and finally deploy FIVEHANDS ransomware (Mandiant)

Microsoft has acquired Kinvolk, the creator and distributor of Flatcar Container Linux technologies, as well as the Lokomotive and Inspektor Gadget projects

Selon Maud Baheng Daizey pour Encrage Media, il y a eu une potentielle fuite de données à caractère personnel concernant les clients de Natixis. La liste des documents et données est assez longue et hétéroclite : cartes internationales d'assurance automobile, procès-verbaux de sinistre, accusés de réception de courriers, constats de dégâts, attestations d'auto-école et IBAN ont aussi été rendus publics par Natixis et la Caisse d'Epargne (faisant partie du même groupe).

encrage.media/divers/fuite-de-

Plus anciens