Plus récents

La start-up française 🇫🇷 Pasqal (pasqal.io) qui cherche à développer un ordinateur quantique de 1 000 qubits fusionne avec l'entreprise Néerlandaise 🇳🇱 Qu&Co (quandco.com) pour donner naissance à un leader européen.

pasqal.io/2022/01/11/quantum-s

🇫🇷 1/4 des employés français de -45 ans sont prêt à démissionner à cause d'expériences négatives avec l'outil informatique. Ras-le-bol. La coupe est pleine.
solutions-numeriques.com/un-em

A code similarity of 85% between the and samples of TellYouThePass, showcasing the minimal adjustments needed to make the run on different operating systems. 's popularity among developers has steadily increased over the past years.
crowdstrike.com/blog/tellyouth

🇨🇭 Gestion de fortune: la plateforme Aquila (aquila.ch) victime d'un piratage ? Des pirates affirment avoir volé des données à la société zurichoise, un important acteur de la finance, qui offre des services à des gestionnaires de fortune indépendants, notamment à Genève.
letemps.ch/economie/gestion-fo

🇺🇸 Une prison du Nouveau-Mexique aux États-Unis paralysée par une attaque informatique de type . Des caméras et des portes automatiques hors service, le fonctionnement du centre de détention est en mode dégradé, et les détenus ont été confinés.

numerama.com/cyberguerre/81637

🇺🇸 A attack took a New Mexico jail offline, leaving inmates in - The attack knocked out cameras and automatic in the center in Bernalillo County, triggering a crisis response

theverge.com/2022/1/11/2287847

Microsoft Security Update Guide (SUG) - Customers can sign up with any email address ( no longer a requirement that the email be a Microsoft Live ID ) and receive notifications at that address. The new system will be launched in 3 phases:

  • Phase #1 : Create a « Profile » and « Sign-up » for the new notifications
  • Phase #2 : Notifications sent from new system and old system
  • Phase #3 : Notifications cease from old system

When we reach a critical mass of people receiving the new notifications, we will discontinue sending from the old system.
\msrc-blog.microsoft.com/2022/0

🌟 A great article ! ESET researchers look at malware that abuses vulnerabilities in kernel drivers and outline mitigation techniques against this type of exploitation. Vulnerable drivers have been a known problem for a long time and have been abused, and while some effort has been made to mitigate the effects, it is still an ongoing battle.

welivesecurity.com/2022/01/11/

Analyzing malicious Office files - Microsoft files are used by attackers to deliver to endpoints. Attackers are leveraging both the different file formats and vulnerabilities in Microsoft Office products to launch malicious commands that will eventually lead to malware.

intezer.com/blog/malware-analy

Abusing Microsoft Office - The OceanLotus group of state-sponsored hackers are now using the web archive file format (.MHT and .MHTML) to deploy to compromised systems. Several techniques used by attackers to deliver through infected files.

netskope.com/blog/abusing-micr

KB5009543 & KB5009566 - After installing Updates, users find their L2TP VPN connections broken when attempting to connect using the Windows client. For the moment, it is not clear what caused the « bug ».

bleepingcomputer.com/news/micr

, & spreading campaign uses public cloud infrastructure - Threat actors are increasingly using to achieve their objectives without having to resort to hosting their own . These types of cloud like Microsoft Azure and Amazon AWS allow attackers to set up their infrastructure and connect to the with minimal time or monetary commitments. It also makes it more difficult for defenders to track down the attackers' operations. This actor is using the DuckDNS dynamic DNS service to change domain names of the C2 hosts.

blog.talosintelligence.com/202

🇨🇦 The Canadian Security Intelligence Service (CSIS), for the first time, is warning individual MPs and senators from all major parties about operations being carried out by China and other adversarial states. « This is different from « normal conduct » in that it's or and includes efforts such as exploitative relationships, gifts, free travel, blackmail, bribes, , attacks and . » « We're dealing with increased hostile state activity targeting our democratic system »

theglobeandmail.com/politics/a

🇺🇸 The U.S. State Department has announced a reward of up to $10 million for information about that leads to the identification or location of leaders of the /#DarkSide groups.

hipaajournal.com/doj-indicts-2

Who is the Network Access Broker Wazawaka ? According to their posts on Exploit, Wazawaka has worked with at least two different affiliate programs, including and .

L'attaque informatique qui a visé ministère de la Défense le 16 décembre 2022, semble plus grave qu'initialement diagnostiquée. Une partie des infrastructures militaires toujours déconnectées d'Internet. Pour la ministre en charge de la Défense, cette attaque illustre plus que jamais la nécessité de développer une cinquième composante au sein de l’armée belge. « Nous souhaitons toutefois insister sur le fait que l'attaque n'a eu aucun impact sur notre niveau opérationnel»

lalibre.be/belgique/societe/20

🇺🇸 For the second day in a row, schools within the Neenah Joint School District (neenah.k12.wi.us) will remain closed Wednesday due to a cyber security situation affecting the district.

youtube.com/watch?v=uxJaTyCd9-

Plus anciens