Microsoft Exchange : Un script pour vérifier si votre système est vulnérable aux failles zero-day
Menaces

Microsoft Exchange : Un script pour vérifier si votre système est vulnérable aux failles zero-day

Après la révélation la semaine dernière de quatre failles zero-day activement exploitées sur les serveurs Exchange, Microsoft a publié, en plus des correctifs, un script pour vérifier la vulnérabilité de ses serveurs. Source : Microsoft Exchange […]

8 Signs of a Smartphone Hack
Hacking

8 Signs of a Smartphone Hack

The more we depend on smartphones, the more attractive an attack vector they become. Android and iOS and devices have become common targets for cybercriminals, as people use them for work, communications, social media, travel, […]

@veillecyber3
Cheval de troie

Le malware TrickBot vérifie désormais la résolution de l’écran pour échapper à une analyse

Le cheval de Troie TrickBot, dont nous vous parlions récemment, a commencé à vérifier les résolutions d’écran des victimes pour détecter si le malware s’exécute sur une machine virtuelle. Lorsque les chercheurs analysent des logiciels […]

Virus hot spot residents crash website
Cyber Attaques

Virus hot spot residents crash website

The authority will now review and request additional information from holders in the 10 locked-down postcodes after a surge of licence amendments were lodged as people tried desperately to avoid stage three restrictions for a […]

Egypt cyber attack on Ethiopia
Menaces

Egypt cyber attack on Ethiopia

The two countries have been at loggerheads with each other for years over Ethiopia’s construction of the massive hydroelectric dam on the Nile—Egypt’s sole water source for irrigation farming and in general for its 100 […]

China steps up attacks on Australia, says spying allegations just 'the tip of the iceberg'
Hacking

China steps up attacks on Australia, says spying allegations just ‘the tip of the iceberg’ 

China’s Foreign Ministry has escalated its attacks on Australia, accusing the Federal Government of conducting espionage in China and calling tabloid claims of Australian spying the « tip of the iceberg ». Key points: China has thrown […]

6 ways HTTP/3 benefits security (and 7 serious concerns)
Menaces

6 ways HTTP/3 benefits security

HTTP3, the third official version of hypertext transfer protocol (HTTP), will not use the transmission control protocol (TCP) as did its predecessors. Instead, it uses the quick UDP internet connections (QUIC) protocol developed by Google […]