Lateo.net - Flux RSS en pagaille (pour en ajouter : @ moi)

🔒
❌ À propos de FreshRSS
Il y a de nouveaux articles disponibles, cliquez pour rafraîchir la page.
À partir d’avant-hierInformatique & geek

Russian forces now using Musk’s Starlink on Ukraine front line

Photo showling Starlink terminal on front line

Enlarge / Ukraine’s GUR military intelligence unit made its claim following multiple reports in recent days that Russian forces are using Starlink’s distinctive square-shaped terminals. (credit: Pierre Crom/Getty Images)

Russian forces are using Starlink terminals on the front line in Ukraine, according to the Ukrainian military, which said the adoption of Elon Musk’s satellite Internet service by Moscow’s troops was becoming “systemic.”

Ukraine’s GUR military intelligence unit said on Telegram on Sunday that radio intercepts confirmed the use of Starlink terminals by Russian units operating in the occupied Donetsk region of eastern Ukraine.

“Yes, there have been recorded cases of the Russian occupiers using these devices,” Andriy Yusov, a GUR officer, told RBC-Ukraine. “This is starting to take on a systemic nature.”

Read 13 remaining paragraphs | Comments

Sueur sur le front des hackers de Money Team

[Info ZATAZ] - Le forum pirates, spécialisé dans la diffusion de faux documents volés ou fabriqués par des hackers malveillants, a fermé. Le FSB aurait été caché derrière....

Microsoft network breached through password-spraying by Russia-state hackers

Par : Dan Goodin
Microsoft network breached through password-spraying by Russia-state hackers

Enlarge (credit: Getty Images)

Russia-state hackers exploited a weak password to compromise Microsoft’s corporate network and accessed emails and documents that belonged to senior executives and employees working in security and legal teams, Microsoft said late Friday.

The attack, which Microsoft attributed to a Kremlin-backed hacking group it tracks as Midnight Blizzard, is at least the second time in as many years that failures to follow basic security hygiene have resulted in a breach that has the potential to harm customers. One paragraph in Friday’s disclosure, filed with the Securities and Exchange Commission, was gobsmacking:

Beginning in late November 2023, the threat actor used a password spray attack to compromise a legacy non-production test tenant account and gain a foothold, and then used the account’s permissions to access a very small percentage of Microsoft corporate email accounts, including members of our senior leadership team and employees in our cybersecurity, legal, and other functions, and exfiltrated some emails and attached documents. The investigation indicates they were initially targeting email accounts for information related to Midnight Blizzard itself. We are in the process of notifying employees whose email was accessed.

Microsoft didn’t detect the breach until January 12, exactly a week before Friday’s disclosure. Microsoft's description of the incident raises the prospect that the Russian hackers had uninterrupted access to the accounts for as long as two months.

Read 11 remaining paragraphs | Comments

❌