Imprimantes HP : de nouveaux pilotes Linux disponibles

De nouveaux pilotes HP – HPLIP 3.23.5 – ont été publiés à destination des imprimantes. Les versions Linux ajoutent le support des distributions les plus récentes et de nouvelles imprimantes. Voici la liste complète. C’est quoi HPLIP ? HPLIP est une solution développée par HP pour assurer la compatibilité des imprimantes et scanners de la […]

La maturité Cloud, clé de l’efficacité des entreprises ?

Les entreprises qui font preuve d’une grande maturité dans l’adoption, la normalisation et la mise à l’échelle de leur adoption multi-cloud sont plus performantes, selon une étude. HashiCorp livre les résultats de son Enquête 2023 sur l’état de la stratégie cloud, en collaboration avec Forrester Consulting. Qu’apprend-on ? 56 % des personnes interrogées ont augmenté […]

Chinese UNC4841 Group Exploits Zero-Day Flaw in Barracuda Email Security Gateway

A suspected China-nexus threat actor dubbed UNC4841 has been linked to the exploitation of a recently patched zero-day flaw in Barracuda Email Security Gateway (ESG) appliances since October 2022. « UNC4841 is an espionage actor behind this wide-ranging campaign in support of the People’s Republic of China, » Google-owned Mandiant said in a new report published today, […]

Vidar Malware Using New Tactics to Evade Detection and Anonymize Activities

The threat actors behind the Vidar malware have made changes to their backend infrastructure, indicating attempts to retool and conceal their online trail in response to public disclosures about their modus operandi. « Vidar threat actors continue to rotate their backend IP infrastructure, favoring providers in Moldova and Russia, » cybersecurity company Team Cymru said in a new analysis […]

Warning: GravityRAT Android Trojan Steals WhatsApp Backups and Deletes Files

An updated version of an Android remote access trojan dubbed GravityRAT has been found masquerading as messaging apps BingeChat and Chatico as part of a narrowly targeted campaign since June 2022. « Notable in the newly discovered campaign, GravityRAT can exfiltrate WhatsApp backups and receive commands to delete files, » ESET researcher Lukáš Štefanko said in a new report published today. […]

New Supply Chain Attack Exploits Abandoned S3 Buckets to Distribute Malicious Binaries

In what’s a new kind of software supply chain attack aimed at open source projects, it has emerged that threat actors could seize control of expired Amazon S3 buckets to serve rogue binaries without altering the modules themselves. « Malicious binaries steal the user IDs, passwords, local machine environment variables, and local host name, and then […]

New Report Reveals Shuckworm’s Long-Running Intrusions on Ukrainian Organizations

The Russian threat actor known as Shuckworm has continued its cyber assault spree against Ukrainian entities in a bid to steal sensitive information from compromised environments. Targets of the recent intrusions, which began in February/March 2023, include security services, military, and government organizations, Symantec said in a new report shared with The Hacker News. « In some cases, the

Microsoft Warns of New Russian State-Sponsored Hacker Group with Destructive Intent

Microsoft on Wednesday took the lid off a « novel and distinct Russian threat actor, » which it said is linked to the General Staff Main Intelligence Directorate (GRU) and has a « relatively low success rate. » The tech giant’s Threat Intelligence team, which was previously tracking the group under its emerging moniker DEV-0586, has graduated it to a […]

Windows 11 : la dernière mise à jour fait planter Google Chrome, comment résoudre le problème ?

La dernière mise à jour de Windows 11 a eu un effet néfaste inattendu. Celle-ci empêche les utilisateurs de l’antivirus Malwarebytes d’accéder au navigateur Chrome. Dans l’attente d’un correctif officiel, voici quelques solutions de contournement. L’article Windows 11 : la dernière mise à jour fait planter Google Chrome, comment résoudre le problème ? est apparu […]

Gestion des identités et des accès : le Cloud est-il une alternative fiable ?

Bien qu’il existe, aujourd’hui, une multitude de solutions IAM sur le marché, la grande majorité des solutions respectent l’expérience utilisateur. Ces outils sont pensés pour communiquer entre eux – parlant alors de fédération d’identité, via les protocoles SAML, OAuth, OpenID.

Me contacter