Un nouveau datacenter à Auch pour FullSave
L’opérateur toulousain annonce l’ouverture d’un nouveau centre de données à Auch avec Eurofiber, qui viendra compléter les sites exploités en propre par sa maison mère Eurofiber France, dont fait partie FullSave depuis 2021. La souveraineté des données, cela compte. FullSave annonce que le nouveau bâtiment, construit en dix mois, offre une capacité de 30 baies, […]
Rogue Android Apps Target Pakistani Individuals in Sophisticated Espionage Campaign
Individuals in the Pakistan region have been targeted using two rogue Android apps available on the Google Play Store as part of a new targeted campaign. Cybersecurity firm Cyfirma attributed the campaign with moderate confidence to a threat actor known as DoNot Team, which is also tracked as APT-C-35 and Viceroy Tiger. The espionage activity involves […]
New Mystic Stealer Malware Targets 40 Web Browsers and 70 Browser Extensions
A new information-stealing malware called Mystic Stealer has been found to steal data from about 40 different web browsers and over 70 web browser extensions. First advertised on April 25, 2023, for $150 per month, the malware also targets cryptocurrency wallets, Steam, and Telegram, and employs extensive mechanisms to resist analysis. « The code is heavily obfuscated making […]
Researchers Discover New Sophisticated Toolkit Targeting Apple macOS Systems
Cybersecurity researchers have uncovered a set of malicious artifacts that they say is part of a sophisticated toolkit targeting Apple macOS systems. « As of now, these samples are still largely undetected and very little information is available about any of them, » Bitdefender researchers Andrei Lapusneanu and Bogdan Botezatu said in a preliminary report published on Friday. The […]
Introducing AI-guided Remediation for IaC Security / KICS
While the use of Infrastructure as Code (IaC) has gained significant popularity as organizations embrace cloud computing and DevOps practices, the speed and flexibility that IaC provides can also introduce the potential for misconfigurations and security vulnerabilities. IaC allows organizations to define and manage their infrastructure using machine-readable configuration files, which are
CERTFR-2023-ACT-026 : Bulletin d’actualité CERTFR-2023-ACT-026 (19 juin 2023)
Ce bulletin d’actualité du CERT-FR revient sur les vulnérabilités significatives de la semaine passée pour souligner leurs criticités. Il ne remplace pas …
L’Apple Watch se dotera-t-elle un jour de cadrans tiers ?
Apple continue d’envoyer ses représentants aux quatre coins du monde pour présenter les nouveautés dévoilées lors de la WWDC. Cette fois, c’est au tour de Kevin Lynch -VP Technology- et Deidre Caldbeck -Apple Watch (watchOS) and Health product marketing- de partir du côté de la Suisse où l’actualité semble se concentrer aujourd’hui .
Des macros simples à utiliser via les Smart Actions de Logitech
Avec la dernière version du logiciel Options+, Logitech propose une pratique nouvelle fonctionnalité permettant de mettre rapidement et simplement en place des macros.
State-Backed Hackers Employ Advanced Methods to Target Middle Eastern and African Governments
Governmental entities in the Middle East and Africa have been at the receiving end of sustained cyber-espionage attacks that leverage never-before-seen and rare credential theft and Exchange email exfiltration techniques. « The main goal of the attacks was to obtain highly confidential and sensitive information, specifically related to politicians, military activities, and ministries of foreign
Microsoft Blames Massive DDoS Attack for Azure, Outlook, and OneDrive Disruptions
Microsoft on Friday attributed a string of service outages aimed at Azure, Outlook, and OneDrive earlier this month to an uncategorized cluster it tracks under the name Storm-1359. « These attacks likely rely on access to multiple virtual private servers (VPS) in conjunction with rented cloud infrastructure, open proxies, and DDoS tools, » the tech giant said in a post […]