Plus récents

Le géant américain de la restauration rapide McDonald's a indiqué vendredi 11 juin 2021 avoir été victime d'un piratage informatique ayant entraîné l'exposition de données de clients en du Sud et à

bbc.com/news/business-57447404

Impossible de prendre rendez-vous pour une première injection dans cinq centres du Grand Nancy. Les centres de vaccination gérés par la communauté professionnelle territoriale de santé (CPTS), seraient victimes d'un « bug » sur Doctolib.

estrepublicain.fr/sante/2021/0

Data Leak Market on Thursday claimed that a database carrying the details of COVID-19 vaccinated people in India was on sale for $800. The data that was allegedly leaked included the name, Aadhaar number, location and phone number of people who have registered for the vaccine. The website claimed that it is not the original leaker of data, it is a reseller.

indiatoday.in/technology/news/

Une enseignante du collège Félix-Gaillard, à Cognac, mutée par erreur à plus de 200 km. L'administration plaide le « bug » informatique, les syndicats plaident la maltraitance.

charentelibre.fr/2021/06/11/ch

Fin des perturbations téléphoniques et des indiponibilités sur les messageries électroniques de la mairie de Saint-Malo. Abîmée lors de travaux, la fibre optique est désormais réparée.

ouest-france.fr/bretagne/saint

Big Brother Awards 2021 in 2021 in the category goes to Doctolib GmbH, Berlin. - As a service acting for a doctor and as its data processor, Doctolib is obligated to separate its clients. That means Doctolib is not permitted to merge patient data from different doctors. But that is exactly what the company appears to do. At the Chaos Computer Congress 2020 (events.ccc.de) it was reported that a Doctolib database was leaked to the CCC. It was possible via the reported gap to access over 150 million scheduled appointments. The allegedly awarded seals of quality do not relate to the GDPR, contrary to the company's claims. What was given a seal here and why remains largely Doctolib's secret. What is known is that Doctolib uses an Amazon cloud service certified in - with European computers

bigbrotherawards.de/en/2021/he

Sol Oriens, a subcontractor for the U.S. Department of Energy (DOE) that works on weapons with the National Nuclear Security Administration (NNSA), last month was hit by a cyberattack that experts say came from the relentless ransomware-as-a-service (RaaS) gang.

Most of these organized groups are financially motivated but if these types of attackers are pushed to shift their motivation from monetary to malicious, we should expect severe real-world outcomes. We've only seen the tip of the iceberg in terms of the real-world effects. ( David Bishop, Trustwave )

threatpost.com/revil-hits-us-n

A representative for the hackers explainedhow the group stole a wealth of data from EA, the game publishing giant.

vice.com/en/article/7kvkqb/how

Edward Don & Company: Chicago Foodservice Supplier's Ransomware Attack Results In IT Systems And Operational Disruption. As Edward Don is one of the leading distributors of service supplies, this attack will cause a significant disruption in the for hospitals, restaurants, hotels, and bars.

bleepingcomputer.com/news/secu

The group, one of the most active in the field at the moment, has recently added a high-profile victim onto its extortion portal, which is the Valley National Bank.

technadu.com/avaddon-ransomwar

Over $150,000 was awarded to eligible civilian hackers in bounties during Hack the U.S Army 3.0. Security researchers had identified 238 vulnerabilities, of which 102 vulnerabilities were rated high or critical and designated for immediate remediation.

hackerone.com/blog/announcing-

ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. Attackers can redirect traffic from one subdomain to another, resulting in a valid TLS session.

The ALPACA attack is not fundamentally new. This attack is only possible because TLS does not protect the source or destination IP and port address of the TCP connection. As is stated in the TLS RFC, TLS is application layer independent. However, this gap in protection gives the attacker the flexibility to redirect traffic from one server to another. ALPACA will be presented at Black Hat USA 2021 and at USENIX Security Symposium 2021.

alpaca-attack.com/

This vulnerability (CVE-2021-3560) enables an unprivileged local user to get a root shell on the system. The « bug » was introduced 7 years ago. Many of the most popular distributions didn't ship the vulnerable version until more recently.

github.blog/2021-06-10-privile

Plus anciens