La start-up française 🇫🇷 Pasqal (pasqal.io
) qui cherche à développer un ordinateur quantique de 1 000 qubits fusionne avec l'entreprise Néerlandaise 🇳🇱 Qu&Co (quandco.com
) pour donner naissance à un leader européen. #france #nederlands #quantum #cyber #business #quantique #informatique
🇨🇭 « Il faut parler du nouveau
danger informatique » ( Denise Gemesio, ingénieure en informatique, conseillère communale PLR ) #swiss #political #numérique #digital #suisse #cloud #cyber #politics #informatique
https://www.24heures.ch/il-faut-parler-du-nouveau-danger-informatique-816295074323
🇫🇷 1/4 des employés français de -45 ans sont prêt à démissionner à cause d'expériences négatives avec l'outil informatique. Ras-le-bol. La coupe est pleine. #france #numérique #digital #report #cloud #cyber #business #informatique
https://www.solutions-numeriques.com/un-employe-de-45-ans-sur-4-pret-a-demissionner-a-cause-de-linformatique/
A code similarity of 85% between the #Linux and #Windows samples of TellYouThePass, showcasing the minimal adjustments needed to make the #ransomware run on different operating systems. #Google #Golang's popularity among #malware developers has steadily increased over the past years. #cyber #threats #informatique
https://www.crowdstrike.com/blog/tellyouthepass-ransomware-analysis-reveals-modern-reinterpretation-using-golang/
🇨🇭 Gestion de fortune: la plateforme Aquila (aquila.ch
) victime d'un piratage ? Des pirates affirment avoir volé des données à la société zurichoise, un important acteur de la finance, qui offre des services à des gestionnaires de fortune indépendants, notamment à Genève. #swiss #cyber #financial #threats #money #databreach #suisse #informatique
https://www.letemps.ch/economie/gestion-fortune-plateforme-aquila-victime-dune-cyberattaque
🇺🇸 Une prison du Nouveau-Mexique aux États-Unis paralysée par une attaque informatique de type #ransomware. Des caméras et des portes automatiques hors service, le fonctionnement du centre de détention est en mode dégradé, et les détenus ont été confinés. #usa #cyber #digital #threats #informatique
🇺🇸 A #ransomware attack took a New Mexico jail offline, leaving inmates in #lockdown - The attack knocked out #security cameras and automatic #doors in the #detention center in Bernalillo County, triggering a crisis response #usa #ransomware #city #cyber #networks #devices #threats #informatique
In December 2022, LibreOffice's QA community worked on hundreds of bug reports, and resolved 489 of them. #libreoffice #informatique
https://qa.blog.documentfoundation.org/2022/01/12/qa-dev-report-december-2021/
Microsoft Security Update Guide (SUG) - Customers can sign up with any email address ( no longer a requirement that the email be a Microsoft Live ID ) and receive notifications at that #email address. The new system will be launched in 3 phases:
When we reach a critical mass of people receiving the new notifications, we will discontinue sending from the old system. #windows #updates #notifications #informatique
\https://msrc-blog.microsoft.com/2022/01/11/coming-soon-new-security-update-guide-notification-system/
🌟 A great article ! ESET researchers look at malware that abuses vulnerabilities in kernel drivers and outline mitigation techniques against this type of exploitation. Vulnerable drivers have been a known problem for a long time and have been abused, and while some effort has been made to mitigate the effects, it is still an ongoing battle. #microsoft #windows #software #kernel #driver #device #threats #informatique #informatique
https://www.welivesecurity.com/2022/01/11/signed-kernel-drivers-unguarded-gateway-windows-core/
Analyzing malicious Office files - Microsoft #Office files are used by attackers to deliver #malware to endpoints. Attackers are leveraging both the different file formats and vulnerabilities in Microsoft Office products to launch malicious commands that will eventually lead to malware. #windows #cyber #threats #informatique #informatique
https://www.intezer.com/blog/malware-analysis/analyze-malicious-microsoft-office-files/
Abusing Microsoft Office - The OceanLotus group of state-sponsored hackers are now using the web archive file format (.MHT and .MHTML) to deploy #backdoors to compromised #Windows systems. Several techniques used by attackers to deliver #malware through infected #Microsoft #Office files. #cyber #threats #informatique
http://www.netskope.com/blog/abusing-microsoft-office-using-malicious-web-archive-files
KB5009543 & KB5009566 - After installing #Microsoft Updates, #Windows users find their L2TP VPN connections broken when attempting to connect using the Windows #VPN client. For the moment, it is not clear what caused the « bug ». #vuln #internet #informatique
#Nanocore, #Netwire & #AsyncRAT spreading campaign uses public cloud infrastructure - Threat actors are increasingly using #cloud #technologies to achieve their objectives without having to resort to hosting their own #infrastructure. These types of cloud #services like Microsoft Azure and Amazon AWS allow attackers to set up their infrastructure and connect to the #internet with minimal time or monetary commitments. It also makes it more difficult for defenders to track down the attackers' operations. This actor is using the DuckDNS dynamic DNS service to change domain names of the C2 hosts. #malware #cyber #email #threats #informatique
http://blog.talosintelligence.com/2022/01/nanocore-netwire-and-asyncrat-spreading.html
🇨🇦 The Canadian Security Intelligence Service (CSIS), for the first time, is warning individual MPs and senators from all major parties about #influence operations being carried out by China and other adversarial states. « This is different from « normal #diplomatic conduct » in that it's #clandestine or #deceptive and includes efforts such as exploitative relationships, gifts, free travel, blackmail, bribes, #disinformation, #cyber attacks and #espionage. » « We're dealing with increased hostile state activity targeting our democratic system » #canada #threats
🇺🇸 The U.S. State Department has announced a reward of up to $10 million for information about that leads to the identification or location of leaders of the #REvil/#DarkSide #ransomware groups. #usa #informatique
Who is the Network Access Broker Wazawaka ? According to their posts on Exploit, Wazawaka has worked with at least two different #ransomware affiliate programs, including #LockBit and #DarkSide. #cybercrime #malware #cyber #threats #informatique
L'attaque informatique qui a visé ministère de la Défense le 16 décembre 2022, semble plus grave qu'initialement diagnostiquée. Une partie des infrastructures militaires toujours déconnectées d'Internet. Pour la ministre en charge de la Défense, cette attaque illustre plus que jamais la nécessité de développer une cinquième composante au sein de l’armée belge. « Nous souhaitons toutefois insister sur le fait que l'attaque n'a eu aucun impact sur notre niveau opérationnel» #belgium #military #defense #government #digital #cyber #gouvernement #threats #internet #belgique #informatique
North Korean APT group « Konni » targeting Russian #diplomatic sector using a spear phishing theme #cyber #threats #informatique
https://cluster25.io/2022/01/03/konni-targets-the-russian-diplomatic-sector/
🇺🇸 For the second day in a row, schools within the Neenah Joint School District (neenah.k12.wi.us
) will remain closed Wednesday due to a cyber security situation affecting the district. #usa #education #ransomware #cyber #threats #school #databreach #informatique
sc(r)apy | full metal packets
> We Are the Borg
> You Will be Assimilated
> Resistance is Futile