www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-20T18:24:46+00:00 www.secnews.physaphae.fr Security Intelligence - Site de news Américain TrickBot Widens Infection Campaigns in Japan Ahead of Holiday Season 2019-12-03T11:00:28+00:00 https://securityintelligence.com/posts/trickbot-widens-infection-campaigns-in-japan-ahead-of-holiday-season/ www.secnews.physaphae.fr/article.php?IdArticle=1493652 False Threat None None Security Intelligence - Site de news Américain Shifting From Ransomware Detection to Prevention 2019-11-18T12:00:23+00:00 https://securityintelligence.com/posts/shifting-from-ransomware-detection-to-prevention/ www.secnews.physaphae.fr/article.php?IdArticle=1473829 False Ransomware,Threat None None Security Intelligence - Site de news Américain 10 Myths and Misconceptions About Industrial Espionage 2019-11-08T14:10:25+00:00 https://securityintelligence.com/articles/10-myths-and-misconceptions-about-industrial-espionage/ www.secnews.physaphae.fr/article.php?IdArticle=1454417 False Threat None None Security Intelligence - Site de news Américain How to Start Building an Insider Threat Program 2019-11-07T13:35:21+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/KzVh1oExNJo/ www.secnews.physaphae.fr/article.php?IdArticle=1451765 False Threat None 3.0000000000000000 Security Intelligence - Site de news Américain Keep Adversaries at Bay With the MITRE ATT&CK Framework 2019-10-25T12:00:24+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/InHg6GDvABU/ www.secnews.physaphae.fr/article.php?IdArticle=1426231 False Threat None None Security Intelligence - Site de news Américain A Threat Intelligence Strategy Map: Connecting Technical Activities to Business Value 2019-10-24T14:50:22+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/oIvESaq1nfU/ www.secnews.physaphae.fr/article.php?IdArticle=1424283 False Data Breach,Threat None None Security Intelligence - Site de news Américain Now\'s the Time to Shift From Defense in Depth to Security in Depth 2019-09-30T11:00:26+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/U_cEU8UL3ZI/ www.secnews.physaphae.fr/article.php?IdArticle=1370803 False Threat None None Security Intelligence - Site de news Américain How Analysts Connect Threat Intelligence Sources to Make Investigations More Efficient 2019-09-26T12:00:33+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/gl1VzirLasU/ www.secnews.physaphae.fr/article.php?IdArticle=1363148 False Threat None None Security Intelligence - Site de news Américain What Is Unified Threat Management? A Pragmatic Approach to Information Security 2019-09-23T13:00:23+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/u2EvE5OzU-g/ www.secnews.physaphae.fr/article.php?IdArticle=1356195 False Threat None None Security Intelligence - Site de news Américain Night Vision: Navigating the Darknet for Improved Threat Intelligence 2019-09-19T14:15:24+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/2bl3kVgCv7Q/ www.secnews.physaphae.fr/article.php?IdArticle=1346747 False Threat None None Security Intelligence - Site de news Américain How Data Loss Prevention (DLP) Can Help Solve the Insider Threat Problem 2019-09-18T13:30:30+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/1LrRdoVjdN4/ www.secnews.physaphae.fr/article.php?IdArticle=1343620 False Threat None None Security Intelligence - Site de news Américain More_eggs, Anyone? Threat Actor ITG08 Strikes Again Reading Time: 14 minutes X-Force IRIS observed ITG08, which has historically targeted POS machines in the retail and hospitality sectors, injecting malicious code into online checkout pages to steal payment card data. ]]> 2019-08-29T10:00:05+00:00 https://securityintelligence.com/posts/more_eggs-anyone-threat-actor-itg08-strikes-again/ www.secnews.physaphae.fr/article.php?IdArticle=1293019 False Threat None None Security Intelligence - Site de news Américain What Is SIEM and How Does It Enhance Threat Detection? Reading Time: 3 minutes What is SIEM? Security information and event management helps organizations detect threats via fine-grained, real-time visibility into on-premises and cloud-based activity. ]]> 2019-08-26T13:00:02+00:00 https://securityintelligence.com/articles/what-is-siem-and-how-does-it-enhance-threat-detection/ www.secnews.physaphae.fr/article.php?IdArticle=1286326 False Threat None None Security Intelligence - Site de news Américain Why Deepfake Audio Technology Is a Real Threat to Enterprise Security Reading Time: 3 minutes Deepfake audio technology has already begun wreaking havoc on the business world. Is your enterprise prepared for this next-generation threat? ]]> 2019-08-23T10:45:02+00:00 https://securityintelligence.com/articles/why-deepfake-audio-technology-is-a-real-threat-to-enterprise-security/ www.secnews.physaphae.fr/article.php?IdArticle=1280849 False Threat None None Security Intelligence - Site de news Américain 5G Technology Is Coming, But Is It Already Filled With Security Flaws? Reading Time: 3 minutes There is a lot to be excited about with 5G technology, but it will also open more doors for threat actors to get into networks, making it more difficult to effectively protect endpoints and data. ]]> 2019-08-12T12:10:02+00:00 https://securityintelligence.com/articles/5g-technology-is-coming-but-is-it-already-filled-with-security-flaws/ www.secnews.physaphae.fr/article.php?IdArticle=1258311 False Threat None None Security Intelligence - Site de news Américain What Is Security Intelligence? Here\'s What Your Business Leaders Want to Know 2019-08-12T11:30:02+00:00 https://securityintelligence.com/posts/what-is-security-intelligence-heres-what-your-business-leaders-want-to-know/ www.secnews.physaphae.fr/article.php?IdArticle=1258199 False Threat,Guideline None None Security Intelligence - Site de news Américain From State-Sponsored Attackers to Common Cybercriminals: Destructive Attacks on the Rise Reading Time: 4 minutes Destructive attacks have been on the rise, posing a growing threat to a wide variety of businesses who may not consider themselves an obvious target of cybercriminals. ]]> 2019-08-05T07:15:02+00:00 https://securityintelligence.com/posts/from-state-sponsored-attackers-to-common-cybercriminals-destructive-attacks-on-the-rise/ www.secnews.physaphae.fr/article.php?IdArticle=1243767 False Threat None None Security Intelligence - Site de news Américain 5 IoT Security Conferences You Don\'t Want to Miss 2019-07-24T11:00:02+00:00 https://securityintelligence.com/posts/5-iot-security-conferences-you-dont-want-to-miss/ www.secnews.physaphae.fr/article.php?IdArticle=1221282 False Threat,Guideline None None Security Intelligence - Site de news Américain I Can\'t Believe Mirais: Tracking the Infamous IoT Malware 2019-07-18T10:00:03+00:00 https://securityintelligence.com/posts/i-cant-believe-mirais-tracking-the-infamous-iot-malware-2/ www.secnews.physaphae.fr/article.php?IdArticle=1212329 False Malware,Threat None None Security Intelligence - Site de news Américain Threat Intelligence Is the SOC\'s Road Map to DNS Security 2019-07-15T12:00:02+00:00 https://securityintelligence.com/posts/threat-intelligence-is-the-socs-road-map-to-dns-security/ www.secnews.physaphae.fr/article.php?IdArticle=1206135 False Threat None None Security Intelligence - Site de news Américain Take a Proactive Approach to the Darknet Threat A proactive approach to security and intelligence gathering is the best way to stem the tide of threats and lucrative trading of business-critical data on the darknet. ]]> 2019-07-11T15:15:02+00:00 https://securityintelligence.com/articles/take-a-proactive-approach-to-the-darknet-threat/ www.secnews.physaphae.fr/article.php?IdArticle=1201931 False Threat None 5.0000000000000000 Security Intelligence - Site de news Américain How Would You React? What \'Killing Eve\' Can Teach Us About Social Engineering 2019-05-24T11:00:02+00:00 https://securityintelligence.com/articles/how-would-you-react-what-killing-eve-can-teach-us-about-social-engineering/ www.secnews.physaphae.fr/article.php?IdArticle=1123030 False Threat None None Security Intelligence - Site de news Américain Here\'s Why More Security Solutions Doesn\'t Equal Better Security 2019-05-22T11:30:02+00:00 https://securityintelligence.com/heres-why-more-security-solutions-doesnt-equal-better-security/ www.secnews.physaphae.fr/article.php?IdArticle=1119424 False Threat None None Security Intelligence - Site de news Américain Hunt With Intention: Why You Should Adopt Threat Hunting and How to Get Started Hackers today are more sophisticated and coordinated than the dark, hooded figures often portrayed in movies. Threat hunting is critical to spot threats before they cause damage on the network. ]]> 2019-05-17T15:20:02+00:00 https://securityintelligence.com/hunt-with-intention-why-you-should-adopt-threat-hunting-and-how-to-get-started/ www.secnews.physaphae.fr/article.php?IdArticle=1112593 False Threat None 2.0000000000000000 Security Intelligence - Site de news Américain The Decline of Hacktivism: Attacks Drop 95 Percent Since 2015 Despite the rise in vulnerability reporting, cryptojacking attacks and attacks on critical infrastructure, one threat trend has been on the decline: hacktivism. Where have all the hacktivists gone? ]]> 2019-05-16T12:00:02+00:00 https://securityintelligence.com/the-decline-of-hacktivism-attacks-drop-95-percent-since-2015/ www.secnews.physaphae.fr/article.php?IdArticle=1110232 False Vulnerability,Threat None None Security Intelligence - Site de news Américain Why You Need a Healthy Mix of Security Analytics to Investigate Threats Effective threat management requires security teams to combine various sources of security analytics with machine-generated data to investigate incidents with speed and accuracy. ]]> 2019-04-26T12:30:03+00:00 https://securityintelligence.com/posts/why-you-need-a-healthy-mix-of-security-analytics-to-investigate-threats/ www.secnews.physaphae.fr/article.php?IdArticle=1095456 False Threat None None Security Intelligence - Site de news Américain Zero Trust: Why Your Most Privileged Users Could Be Your Biggest Security Weakness Organizations that do not apply the zero trust model to protecting privileged users open themselves up to attacks by threat actors looking to access sensitive systems and networks. ]]> 2019-04-25T12:50:01+00:00 https://securityintelligence.com/posts/zero-trust-why-your-most-privileged-users-could-be-your-biggest-security-weakness/ www.secnews.physaphae.fr/article.php?IdArticle=1095458 False Threat None None Security Intelligence - Site de news Américain Level Up Security Operations With Threat Intelligence Cheat Codes Like the video game industry, security has shifted toward unified platforms, and contextual threat intelligence is the cheat code SOC teams need to defeat the bosses standing in the way of security. ]]> 2019-04-18T12:30:02+00:00 https://securityintelligence.com/level-up-security-operations-with-threat-intelligence-cheat-codes/ www.secnews.physaphae.fr/article.php?IdArticle=1094162 False Threat None 2.0000000000000000 Security Intelligence - Site de news Américain Challenges and Opportunities to Close the Cybersecurity Gap in the Financial Services Industry For the financial services industry, being transparent and demonstrating a mature, integrated business and security model is critical to build trust in today's evolving threat landscape. ]]> 2019-04-18T11:00:02+00:00 https://securityintelligence.com/challenges-and-opportunities-to-close-the-cybersecurity-gap-in-the-financial-services-industry/ www.secnews.physaphae.fr/article.php?IdArticle=1094163 False Threat None None Security Intelligence - Site de news Américain SOAR: The Second Arm of Security Operations SIEM tools can help security operations center (SOC) teams detect threats, but what good is threat data without the context analysts need to quickly respond to incidents? That's where SOAR comes in. ]]> 2019-04-09T12:00:03+00:00 https://securityintelligence.com/soar-the-second-arm-of-security-operations/ www.secnews.physaphae.fr/article.php?IdArticle=1091911 False Threat None None Security Intelligence - Site de news Américain How a Cunning Remote Overlay Malware Met Its Match A remote overlay malware that is attacking Latin American banks met its match in a solution built from behavioral biometrics, deep research, reverse engineering and finely tuned threat modeling. ]]> 2019-04-04T15:20:03+00:00 https://securityintelligence.com/how-a-cunning-remote-overlay-malware-met-its-match/ www.secnews.physaphae.fr/article.php?IdArticle=1089122 False Malware,Threat None None Security Intelligence - Site de news Américain When It Comes to Incident Response, Failing to Plan Means Planning to Fail In today's treacherous threat landscape, it seems the odds are overwhelmingly stacked against cyberdefenders. But there is one advantage attackers can't take away: thorough incident response planning. ]]> 2019-03-26T17:00:02+00:00 https://securityintelligence.com/when-it-comes-to-incident-response-failing-to-plan-means-planning-to-fail/ www.secnews.physaphae.fr/article.php?IdArticle=1082274 False Threat None None Security Intelligence - Site de news Américain Think Inside the Box to Bridge the Cybersecurity Skills Gap The threat landscape is growing more perilous each day and our white hats need all the help they can get. The problem is that many organizations are struggling to close the cybersecurity skills gap. ]]> 2019-03-25T12:10:02+00:00 https://securityintelligence.com/think-inside-the-box-to-bridge-the-cybersecurity-skills-gap/ www.secnews.physaphae.fr/article.php?IdArticle=1080854 False Threat None None Security Intelligence - Site de news Américain Hunting for the True Meaning of Threat Hunting at RSAC 2019 Many vendors at RSAC 2019 boasted of their advanced and even automated threat hunting capabilities, but it's important to understand the difference between true threat hunting and marketing jargon. ]]> 2019-03-21T12:30:03+00:00 https://securityintelligence.com/hunting-for-the-true-meaning-of-threat-hunting-at-rsac-2019/ www.secnews.physaphae.fr/article.php?IdArticle=1074697 False Threat None None Security Intelligence - Site de news Américain Spectre, Meltdown and More: What You Need to Know About Hardware Vulnerabilities According to IBM X-Force IRIS research, threat actors will continue to search for ways to leverage Spectre, Meltdown and other hardware vulnerabilities to steal data in the coming years. ]]> 2019-03-12T13:30:02+00:00 https://securityintelligence.com/spectre-meltdown-and-more-what-you-need-to-know-about-hardware-vulnerabilities/ www.secnews.physaphae.fr/article.php?IdArticle=1065878 False Threat None None Security Intelligence - Site de news Américain Comprehensive Vulnerability Management in Connected Security Solutions To stay ahead of attackers, organizations should consider vulnerability management solutions that integrate with SIEM tools, network and threat modeling capabilities, and patch management systems. ]]> 2019-03-07T13:05:02+00:00 https://securityintelligence.com/comprehensive-vulnerability-management-in-connected-security-solutions/ www.secnews.physaphae.fr/article.php?IdArticle=1058079 False Vulnerability,Threat None None Security Intelligence - Site de news Américain Follow the Leaders: 7 Tried-and-True Tips to Get the Most Out of Your Security Analytics By following the example of industry leaders with mature security analytics capabilities, less advanced organizations can improve SOC visibility and shift from reactive to proactive threat detection. ]]> 2019-03-01T13:00:02+00:00 https://securityintelligence.com/follow-the-leaders-7-tried-and-true-tips-to-get-the-most-out-of-your-security-analytics/ www.secnews.physaphae.fr/article.php?IdArticle=1047665 False Threat,Guideline None None Security Intelligence - Site de news Américain Cryptojacking Rises 450 Percent as Cybercriminals Pivot From Ransomware to Stealthier Attacks Cybercriminals made a lot of noise in 2017 with ransomware attacks like WannaCry and NotPetya, using an in-your-face approach to cyberattacks that netted them millions of dollars from victims. But new research from IBM X-Force, the threat intelligence, research and incident response arm of IBM Security, revealed that 2018 saw a rapid decline in ransomware […] ]]> 2019-02-26T11:00:03+00:00 https://securityintelligence.com/cryptojacking-rises-450-percent-as-cybercriminals-pivot-from-ransomware-to-stealthier-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=1042492 False Ransomware,Threat NotPetya,Wannacry 2.0000000000000000 Security Intelligence - Site de news Américain It\'s Time to Modernize Traditional Threat Intelligence Models for Cyber Warfare 2019-02-05T13:20:04+00:00 https://securityintelligence.com/its-time-to-modernize-traditional-threat-intelligence-models-for-cyber-warfare/ www.secnews.physaphae.fr/article.php?IdArticle=1020210 False Threat,Guideline None None Security Intelligence - Site de news Américain Why You Should Be Worried About London Blue\'s Business Email Compromise Attacks 2019-01-28T12:30:03+00:00 https://securityintelligence.com/why-you-should-be-worried-about-london-blues-business-email-compromise-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=1011943 False Threat None None Security Intelligence - Site de news Américain What Can Consumers and IT Decision-Makers Do About the Threat of Malvertising? Malvertising is one more threat that will keep your IT decision-makers up at night, but any company with a protection-first mindset should be able to remain ahead of the curve. ]]> 2019-01-21T12:05:02+00:00 https://securityintelligence.com/what-can-consumers-and-it-decision-makers-do-about-the-threat-of-malvertising/ www.secnews.physaphae.fr/article.php?IdArticle=1002173 False Threat None None Security Intelligence - Site de news Américain Bring Order to Chaos By Building SIEM Use Cases, Standards, Baselining and Naming Conventions Standards, baselines and naming conventions can remove barriers to threat detection and response and help security teams build effective SIEM use cases. ]]> 2019-01-17T13:05:01+00:00 https://securityintelligence.com/bring-order-to-chaos-by-building-siem-use-cases-standards-baselining-and-naming-conventions/ www.secnews.physaphae.fr/article.php?IdArticle=997021 False Threat None None Security Intelligence - Site de news Américain Where Can IT Get Expert Guidance for Managing Android in the Enterprise? IT decision-makers need to fast-track the EMM selection process to stay ahead of the evolving threat landscape and more effectively manage Android devices. ]]> 2019-01-15T17:00:02+00:00 https://securityintelligence.com/where-can-it-get-expert-guidance-for-managing-android-in-the-enterprise/ www.secnews.physaphae.fr/article.php?IdArticle=993821 False Threat None None Security Intelligence - Site de news Américain Maturing Your Security Operations Center With the Art and Science of Threat Hunting By combining repeatable processes for threat hunting with intelligent solutions and skilled analysts, organizations can improve threat response and protect their most critical assets. ]]> 2019-01-11T12:35:02+00:00 https://securityintelligence.com/maturing-your-security-operations-center-with-the-art-and-science-of-threat-hunting/ www.secnews.physaphae.fr/article.php?IdArticle=986591 False Threat None None Security Intelligence - Site de news Américain FBI Warns EdTech Needs Stronger Defenses for Students\' Personal Data 2019-01-11T12:20:02+00:00 https://securityintelligence.com/fbi-warns-edtech-needs-stronger-defenses-for-students-personal-data/ www.secnews.physaphae.fr/article.php?IdArticle=986592 False Threat None None Security Intelligence - Site de news Américain The Cyber Attribution Dilemma: 3 Barriers to Cyber Deterrence The concept of mutually assured destruction (MAD) has historically prevented nuclear war, but threat actors' advanced obfuscation techniques have made cyber deterrence difficult if not impossible. ]]> 2018-12-28T16:30:02+00:00 https://securityintelligence.com/the-cyber-attribution-dilemma-3-barriers-to-cyber-deterrence/ www.secnews.physaphae.fr/article.php?IdArticle=968613 False Threat None None Security Intelligence - Site de news Américain More Than Just a Fad: Lessons Learned About Threat Hunting in 2018 One cybersecurity capability that continues to prove it's here to stay is threat hunting, a proactive approach to discovering and mitigating threats. ]]> 2018-12-21T14:20:02+00:00 https://securityintelligence.com/more-than-just-a-fad-lessons-learned-about-threat-hunting-in-2018/ www.secnews.physaphae.fr/article.php?IdArticle=958560 False Threat None None Security Intelligence - Site de news Américain IBM X-Force Security Predictions for the 2019 Cybercrime Threat Landscape IBM X-Force's top security predictions for 2019 cover a range of potential attack schemes and consequences, from industry-specific prognostications to a rapid expansion of emerging criminal schemes. ]]> 2018-12-20T13:00:02+00:00 https://securityintelligence.com/ibm-x-force-security-predictions-for-the-2019-cybercrime-threat-landscape/ www.secnews.physaphae.fr/article.php?IdArticle=956499 False Threat None None Security Intelligence - Site de news Américain Machine Learning Will Transform How We Detect Software Vulnerabilities When used as part of the software development process, machine learning can help identify vulnerabilities before threat actors have a chance to exploit them. ]]> 2018-12-18T13:00:02+00:00 https://securityintelligence.com/machine-learning-will-transform-how-we-detect-software-vulnerabilities/ www.secnews.physaphae.fr/article.php?IdArticle=952373 False Threat None None Security Intelligence - Site de news Américain Stay on Top of Zero-Day Malware Attacks With Smart Mobile Threat Defense Mobile threats are growing both in number and severity. To protect crucial data, organizations need mobile threat defense solutions that can replicate the accuracy of manual analysis on a large scale. ]]> 2018-12-14T12:20:02+00:00 https://securityintelligence.com/stay-on-top-of-zero-day-malware-attacks-with-smart-mobile-threat-defense/ www.secnews.physaphae.fr/article.php?IdArticle=945962 False Malware,Threat None None Security Intelligence - Site de news Américain 3 Security Business Benefits From a 2018 Gartner Magic Quadrant SIEM Leader The main characteristics of a SIEM leader are centered around innovation in early threat detection, adaptation to customer environments and strong market presence. ]]> 2018-12-12T16:45:02+00:00 https://securityintelligence.com/3-security-business-benefits-from-a-2018-gartner-magic-quadrant-siem-leader/ www.secnews.physaphae.fr/article.php?IdArticle=942997 False Threat,Guideline None 3.0000000000000000 Security Intelligence - Site de news Américain How Tomer Agayev Fights Financial Fraud Through Curiosity, Suspicion and Education As threat research team lead at Trusteer, Tomer guards the gateway to both known and unknown threats and passes along his insights to help banking customers protect themselves from social engineering. ]]> 2018-12-07T15:35:01+00:00 https://securityintelligence.com/how-tomer-agayev-fights-financial-fraud-through-curiosity-suspicion-and-education/ www.secnews.physaphae.fr/article.php?IdArticle=939686 False Threat,Guideline None None Security Intelligence - Site de news Américain Is Your SOC Overwhelmed? Artificial Intelligence and MITRE ATT&CK Can Help Lighten the Load 2018-11-28T13:00:02+00:00 https://securityintelligence.com/is-your-soc-overwhelmed-artificial-intelligence-and-mitre-attck-can-help-lighten-the-load/ www.secnews.physaphae.fr/article.php?IdArticle=924035 False Threat None None Security Intelligence - Site de news Américain Retail Cybersecurity Is Lagging in the Digital Transformation Race, and Attackers Are Taking Advantage Retail cybersecurity requires a large-scale transition to cope with new threat vectors, close significant infrastructure gaps, and extend security protocols across new cloud and SaaS platforms. ]]> 2018-11-19T14:00:02+00:00 https://securityintelligence.com/retail-cybersecurity-is-lagging-in-the-digital-transformation-race-and-attackers-are-taking-advantage/ www.secnews.physaphae.fr/article.php?IdArticle=906687 False Threat None None Security Intelligence - Site de news Américain Busting Cybersecurity Silos To break down cybersecurity silos, professionals must work together to share security information and build collaborative solutions to address the evolving cybersecurity threat landscape. ]]> 2018-11-12T17:00:02+00:00 https://securityintelligence.com/busting-cybersecurity-silos/ www.secnews.physaphae.fr/article.php?IdArticle=893215 False Threat None None Security Intelligence - Site de news Américain Why You Should Start Leveraging Network Flow Data Before the Next Big Breach One of the most crucial types of information for threat detection and incident response is network flow data, which has several unique properties that can help security analysts uncover attacks. ]]> 2018-11-09T12:40:01+00:00 https://securityintelligence.com/why-you-should-start-leveraging-network-flow-data-before-the-next-big-breach/ www.secnews.physaphae.fr/article.php?IdArticle=888374 False Threat None None Security Intelligence - Site de news Américain How to Use Passive DNS to Inform Your Incident Response Passive DNS replication can be an essential source of data to contextualize your threat intelligence and inform your incident response plan. ]]> 2018-11-05T13:05:02+00:00 https://securityintelligence.com/how-to-use-passive-dns-to-inform-your-incident-response/ www.secnews.physaphae.fr/article.php?IdArticle=880865 False Threat None None Security Intelligence - Site de news Américain How an IoT Botnet Could Breach the Power Grid and Cause Widespread Blackouts A group of researchers from Princeton revealed that, through an attack dubbed MadIoT, threat actors could leverage an IoT botnet to compromise the power grid and cause widespread blackouts. ]]> 2018-11-02T15:25:01+00:00 https://securityintelligence.com/how-an-iot-botnet-could-breach-the-power-grid-and-cause-widespread-blackouts/ www.secnews.physaphae.fr/article.php?IdArticle=876458 False Threat None None Security Intelligence - Site de news Américain How SEO Poisoning Campaigns Are Mounting a Comeback SEO poisoning is on the rise again. How do threat actors use search engine results to drive victims to malicious sites, and what can users do to protect themselves? ]]> 2018-10-30T12:25:01+00:00 https://securityintelligence.com/how-seo-poisoning-campaigns-are-mounting-a-comeback/ www.secnews.physaphae.fr/article.php?IdArticle=870448 False Threat None None Security Intelligence - Site de news Américain Cyber War Games: Top Payment Companies Collaborate to Respond to Financial Cyberattacks In addition to targeted attacks, organizations in the financial services industry also face the threat of systemic financial cyberattacks. But are companies prepared for this type of threat? ]]> 2018-10-24T11:25:01+00:00 https://securityintelligence.com/cyber-war-games-top-payment-companies-collaborate-to-respond-to-financial-cyberattacks/ www.secnews.physaphae.fr/article.php?IdArticle=860185 False Threat None None Security Intelligence - Site de news Américain Threat Actors Prey on Drupalgeddon Vulnerability to Mass-Compromise Websites and Underlying Servers X-Force observed attackers using known Drupal vulnerabilities, including Drupalgeddon, to target websites and the underlying infrastructure that hosts them, leveraging Shellbot to open backdoors. ]]> 2018-10-10T19:10:02+00:00 https://securityintelligence.com/threat-actors-prey-on-drupalgeddon-vulnerability-to-mass-compromise-websites-and-underlying-servers/ www.secnews.physaphae.fr/article.php?IdArticle=840955 False Vulnerability,Threat None None Security Intelligence - Site de news Américain Why Healthcare Cyberattacks Should Be a Concern for Consumer Data Collectors Personal health information is extremely valuable to threat actors, and companies that store customers' health data need to be wary of healthcare cyberattacks that could threaten their business. ]]> 2018-10-05T13:25:02+00:00 https://securityintelligence.com/why-healthcare-cyberattacks-should-be-a-concern-for-consumer-data-collectors/ www.secnews.physaphae.fr/article.php?IdArticle=831773 False Threat None None Security Intelligence - Site de news Américain Bringing It All Back Home: Why You Should Apply Enterprise Network Security Policies to Your Smart Home As threat actors increasingly target IoT devices to spread malware and facilitate DDoS attacks, it's crucial to establish network security policies for your home IT just as you would at work. ]]> 2018-10-03T12:10:02+00:00 https://securityintelligence.com/bringing-it-all-back-home-why-you-should-apply-enterprise-network-security-policies-to-your-smart-home/ www.secnews.physaphae.fr/article.php?IdArticle=829851 False Malware,Threat None None Security Intelligence - Site de news Américain TRusted Anonymous Data Exchange (TRADE) Threat Intelligence Sharing With Blockchain A new threat intelligence sharing network allows companies to control both who has access to information and the quality of anonymous threat data they consume. ]]> 2018-09-26T12:31:01+00:00 https://securityintelligence.com/trusted-anonymous-data-exchange-trade-threat-intelligence-sharing-with-blockchain/ www.secnews.physaphae.fr/article.php?IdArticle=824912 False Threat None 4.0000000000000000 Security Intelligence - Site de news Américain Ransomware 101: What Is Ransomware and How Can You Protect Your Business? What is ransomware? In short, it's malware that encrypts your data and demands a ransom fee for its supposed safe return. The best defense against this threat is to keep it off the network altogether. ]]> 2018-09-20T11:55:04+00:00 https://securityintelligence.com/ransomware-101-what-is-ransomware-and-how-can-you-protect-your-business/ www.secnews.physaphae.fr/article.php?IdArticle=817277 False Ransomware,Malware,Threat None None Security Intelligence - Site de news Américain Don\'t Get Caught Off Base: Make Threat Intelligence a Security Imperative 2018-09-14T13:00:03+00:00 https://securityintelligence.com/dont-get-caught-off-base-make-threat-intelligence-a-security-imperative/ www.secnews.physaphae.fr/article.php?IdArticle=807718 False Threat None 3.0000000000000000 Security Intelligence - Site de news Américain What Are the Risks and Rewards Associated With AI in Healthcare? While the use of AI in healthcare promises to improve visibility and implementation, there are serious risks associated with the emerging technology if misused by staff or abused by threat actors. ]]> 2018-09-12T13:00:03+00:00 https://securityintelligence.com/what-are-the-risks-and-rewards-associated-with-ai-in-healthcare/ www.secnews.physaphae.fr/article.php?IdArticle=804593 False Threat None None Security Intelligence - Site de news Américain A Beginner\'s Guide to Threat Hunting 2018-09-12T12:15:03+00:00 https://securityintelligence.com/a-beginners-guide-to-threat-hunting/ www.secnews.physaphae.fr/article.php?IdArticle=804594 False Threat None None Security Intelligence - Site de news Américain Not Your Grandfather\'s SIEM: 5 Signs That You Should Reconsider Your Current SIEM Deployment 2018-09-07T11:05:02+00:00 https://securityintelligence.com/not-your-grandfathers-siem-5-signs-that-you-should-reconsider-your-current-siem-deployment/ www.secnews.physaphae.fr/article.php?IdArticle=797149 False Threat None None Security Intelligence - Site de news Américain Threat Actors Peddling Weaponized IQY Files Via Necurs Botnet Threat actors have taken a liking to IQY files, which are foreign to most users and appear benign to many spam filters. ]]> 2018-09-05T12:26:02+00:00 https://securityintelligence.com/threat-actors-peddling-weaponized-iqy-files-via-necurs-botnet/ www.secnews.physaphae.fr/article.php?IdArticle=793529 False Spam,Threat None None Security Intelligence - Site de news Américain What\'s In a (Threat Intelligence) Name? 2018-08-22T15:15:02+00:00 https://securityintelligence.com/whats-in-a-threat-intelligence-name/ www.secnews.physaphae.fr/article.php?IdArticle=782953 False Threat None 3.0000000000000000 Security Intelligence - Site de news Américain Stories From the Edge of IoT Security: Threat Demos From Black Hat and DEF CON At Black Hat 2018 and DEF CON 26, experts shared insights about IoT security risks and vulnerabilities and offered advice to help organizations and consumers navigate our increasingly connected world. ]]> 2018-08-20T16:35:02+00:00 https://securityintelligence.com/stories-from-the-edge-of-iot-security-threat-demos-from-black-hat-and-def-con/ www.secnews.physaphae.fr/article.php?IdArticle=782438 False Threat None None Security Intelligence - Site de news Américain How to Leverage Log Services to Analyze C&C Traffic 2018-08-20T10:10:02+00:00 https://securityintelligence.com/how-to-leverage-log-services-to-analyze-cc-traffic/ www.secnews.physaphae.fr/article.php?IdArticle=781874 False Threat None None Security Intelligence - Site de news Américain Email Security Best Practices to Help You Reel In the Threat of Phishing Phishing is still among the most common causes of a data breach. Companies should invest in managed security services and comprehensive awareness training to improve email security best practices. ]]> 2018-08-16T12:15:02+00:00 https://securityintelligence.com/email-security-best-practices-to-help-you-reel-in-the-threat-of-phishing/ www.secnews.physaphae.fr/article.php?IdArticle=779759 False Threat None None Security Intelligence - Site de news Américain Know Your Enemy: How to Build a Successful Threat Hunting Program To build a successful threat hunting program, you must thoroughly understand who might attack your organization, what these malicious actors might be after and what tactics they'll use to get it. ]]> 2018-08-10T12:31:02+00:00 https://securityintelligence.com/know-your-enemy-how-to-build-a-successful-threat-hunting-program/ www.secnews.physaphae.fr/article.php?IdArticle=774973 False Threat None None Security Intelligence - Site de news Américain 7 Ways to Identify Darknet Cybersecurity Risks Explore seven characteristics of security risk from the dark and hidden web. Learn how organizations can capture the latent value of dark-sourced threat intelligence. ]]> 2018-08-06T07:46:00+00:00 https://securityintelligence.com/7-ways-to-identify-darknet-cybersecurity-risks/ www.secnews.physaphae.fr/article.php?IdArticle=767632 False Threat None None Security Intelligence - Site de news Américain 5 Ways to Improve Collaboration Among Security Professionals Security professionals are not sharing intelligence as effectively as threat actors. The community can build a safer digital future for everyone by adopting more collaborative strategies. ]]> 2018-08-01T10:41:02+00:00 https://securityintelligence.com/5-ways-to-improve-collaboration-among-security-professionals/ www.secnews.physaphae.fr/article.php?IdArticle=761594 False Threat None None Security Intelligence - Site de news Américain The State of Cybersecurity: A CISO and CTO Dish on AI, Emerging Threats, Crisis Leadership and More Sridhar Muppidi, CTO of cloud security and IAM at IBM Security, and Shamla Naidoo, global CISO at IBM, took time to discuss topics ranging from AI and blockchain to threat sharing and collaboration. ]]> 2018-07-31T11:41:00+00:00 https://securityintelligence.com/the-state-of-cybersecurity-a-ciso-and-cto-dish-on-ai-emerging-threats-crisis-leadership-and-more/ www.secnews.physaphae.fr/article.php?IdArticle=760286 False Threat None None Security Intelligence - Site de news Américain How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 2 In the external reconnaissance and launch attack phases of the X-Force IRIS cyberattack preparation framework, threat actors look for vulnerabilities and tailor their attacks to exploit them. ]]> 2018-07-25T12:16:00+00:00 https://securityintelligence.com/how-a-cyberattack-framework-can-help-reduce-risk-at-all-levels-part-2/ www.secnews.physaphae.fr/article.php?IdArticle=752903 False Threat None None Security Intelligence - Site de news Américain How the IBM X-Force IRIS Cyberattack Framework Helps Security Teams Reduce Risk at All Levels, Part 1 The IBM X-Force IRIS cyberattack preparation and execution frameworks aim to help security teams predict threat actors' motives and tactics and communicate security intelligence more clearly. ]]> 2018-07-18T15:15:05+00:00 https://securityintelligence.com/how-the-ibm-x-force-iris-cyberattack-framework-helps-security-teams-reduce-risk-at-all-levels/ www.secnews.physaphae.fr/article.php?IdArticle=747685 False Threat None None Security Intelligence - Site de news Américain What\'s On the Horizon for SIEM Technology? Five Upcoming Innovations in Security Analytics 2018-07-18T11:12:01+00:00 https://securityintelligence.com/whats-on-the-horizon-for-siem-technology-five-upcoming-innovations-in-security-analytics/ www.secnews.physaphae.fr/article.php?IdArticle=747686 False Threat None None Security Intelligence - Site de news Américain Move Over, Ransomware: Why Cybercriminals Are Shifting Their Focus to Cryptojacking Instead of seeking financial gains with ransom demands, threat actors are now aiming to steal central processing unit (CPU) and graphics processing unit (GPU) resources to facilitate cryptojacking. ]]> 2018-07-17T11:45:05+00:00 https://securityintelligence.com/move-over-ransomware-why-cybercriminals-are-shifting-their-focus-to-cryptojacking/ www.secnews.physaphae.fr/article.php?IdArticle=747690 False Threat None None Security Intelligence - Site de news Américain Security Analysts Are Overworked, Understaffed and Overwhelmed - Here\'s How AI Can Help 2018-07-13T16:30:05+00:00 https://securityintelligence.com/security-analysts-are-overworked-understaffed-and-overwhelmed-heres-how-ai-can-help/ www.secnews.physaphae.fr/article.php?IdArticle=744174 False Threat None None Security Intelligence - Site de news Américain Understanding SIEM Technology: How to Add Value to Your Security Intelligence Implementation As the threat landscape expands - and IT skills grow increasingly scarce - many security leaders don't know how to get the most out of their security information and event management (SIEM) solution. ]]> 2018-07-12T12:25:04+00:00 https://securityintelligence.com/understanding-siem-technology-how-to-add-value-to-your-security-intelligence-implementation/ www.secnews.physaphae.fr/article.php?IdArticle=741744 False Threat,Guideline None None Security Intelligence - Site de news Américain A Brief History of iOS: The Evolution of MDM and Enterprise Mobility As the mobile threat landscape has expanded over the past decade, Apple's iOS releases have added new MDM features to help security professionals protect enterprise networks. ]]> 2018-07-09T11:20:04+00:00 https://securityintelligence.com/a-brief-history-of-ios-the-evolution-of-mdm-and-enterprise-mobility/ www.secnews.physaphae.fr/article.php?IdArticle=737092 False Threat None None Security Intelligence - Site de news Américain What\'s the Best Strategy to Manage Application Security Risk? 2018-07-06T13:25:04+00:00 https://securityintelligence.com/whats-the-best-strategy-to-manage-application-security-risk/ www.secnews.physaphae.fr/article.php?IdArticle=732945 False Threat,Guideline None None Security Intelligence - Site de news Américain It\'s Time to Take Advantage of Multifactor Authentication for Mainframe Security 2018-07-02T15:03:00+00:00 https://securityintelligence.com/its-time-to-take-advantage-of-multifactor-authentication-for-mainframe-security/ www.secnews.physaphae.fr/article.php?IdArticle=731214 False Threat None None Security Intelligence - Site de news Américain The Cybercrime Landscape Is Evolving - Will Your Mobile Threat Defense Strategy Keep Up? As the workforce embraces mobility to increase productivity, organizations must adopt a more innovative, dynamic approach to mobile threat defense. ]]> 2018-06-29T10:55:03+00:00 https://securityintelligence.com/the-cybercrime-landscape-is-evolving-will-your-mobile-threat-defense-strategy-keep-up/ www.secnews.physaphae.fr/article.php?IdArticle=728476 False Threat None None Security Intelligence - Site de news Américain It\'s Time to Infuse AI Into Your Endpoint Security Strategy 2018-06-25T16:50:02+00:00 https://securityintelligence.com/its-time-to-infuse-ai-into-your-endpoint-security-strategy/ www.secnews.physaphae.fr/article.php?IdArticle=722435 False Threat None None