Quotidien Hebdomadaire Mensuel

Hebdomadaire Shaarli

Tous les liens d'un semaine sur une page.

Semaine 11 (March 10, 2025)

Fake "Security Alert" issues on GitHub use OAuth app to hijack accounts

A widespread phishing campaign has targeted nearly 12,000 GitHub repositories with fake
#Computer #GitHub #InfoSec #Issue #OAuth #Phishing #Repository #Security

New Ransomware Operator Exploits Fortinet Vulnerability Duo

Between late January and early March, Forescout Research – Vedere Labs identified a series of intrusions based on two Fortinet vulnerabilities. It began with the exploitation of Fortigate firewall appliances — culminating in the deployment of a newly discovered ransomware strain we have dubbed SuperBlack.

ICANN moves to retire Soviet-era .SU country domain name - Domain Name Wire

Domain system overseer plans to retire .su in 2030. ICANN has notified the operator of the legacy Soviet Union country code domain, .su, of its plans to retire the domain in five years, Domain Name Wire has learned. The .su namespace, which remains open for new registrations and currently has around 100,000 domain names, is […]

Exclusive: Hackers claim cyber attack on Trump winery, golf courses

Threat actors have claimed a cyber attack on two businesses owned by US President Donald Trump, allegedly bringing down their websites.

NIST Selects HQC as Fifth Algorithm for Post-Quantum Encryption

The new algorithm will serve as a backup for the general encryption needed to protect data from quantum computers developed in the future

ClickFix: The Social Engineering Technique Hackers Use to Manipulate Victims

Discover how the ClickFix social engineering attack exploits human psychology to bypass security. Learn how hackers use this tactic and how to protect against it.

North Korean government hackers snuck spyware on Android app store | TechCrunch

Cybersecurity firm Lookout found several samples of a North Korean spyware it calls KoSpy.

Lookout Discovers North Korean APT37 Mobile Spyware | Threat Intel

Lookout researchers have discovered a novel Android surveillance tool dubber KoSpy. It is attributed to APT 37 aka ScarCruft

Rapport menaces et incidents - CERT-FR

Dans cette quatrième édition du panorama de la menace, l’Agence nationale de la sécurité des systèmes d’information (ANSSI) revient sur les grandes tendances de la menace informatique ainsi que sur les éléments et incidents marquants dont elle a eu connaissance en 2024.
Dans la continuité des années précédentes, l’ANSSI estime aujourd’hui que les attaquants liés à l’écosystème cybercriminel ou réputés liés à la Chine et la Russie constituent les trois principales menaces tant pour les systèmes d’information les plus critiques que pour l’écosystème national de manière systémique.

L’année 2024 aura également été marquée par l’organisation des Jeux Olympiques et Paralympiques de Paris ainsi que par le nombre et l’impact des vulnérabilités affectant les équipements de sécurité situés en bordure de SI.

DOGE axes CISA ‘red team’ staffers amid ongoing federal cuts | TechCrunch

Affected staff say more than 100 employees working to protect U.S. government networks were ‘axed’ with no prior warning

Medusa Ransomware Activity Continues to Increase

Attacks using this ransomware have displayed consistent TTPs and grown steadily since 2023.

GreyNoise Detects Mass Exploitation of Critical PHP-CGI Vulnerability (CVE-2024-4577)

‍GreyNoise data confirms that exploitation of CVE-2024-4577 extends far beyond initial reports. Attack attempts have been observed across multiple regions, with notable spikes in the United States, Singapore, Japan, and other countries throughout January 2025.

Google paid $12 million in bug bounties last year to security researchers

Google paid almost $12 million in bug bounty rewards to 660 security researchers who reported security bugs through the company's Vulnerability Reward Program (VRP) in 2024.

Swiss critical sector faces new 24-hour cyberattack reporting rule

Switzerland's National Cybersecurity Centre (NCSC) has announced a new reporting obligation for critical infrastructure organizations in the country, requiring them to report cyberattacks to the agency within 24 hours of their discovery.