www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-06-05T17:55:45+00:00 www.secnews.physaphae.fr TrendMicro - Security Firm Blog Software Patch Management Policy Best Practices 2022-10-18T00:00:00+00:00 https://www.trendmicro.com/en_us/ciso/22/j/software-patch-management-policy-best-practices.html www.secnews.physaphae.fr/article.php?IdArticle=7534662 True Vulnerability,Threat None None TrendMicro - Security Firm Blog Prevent Ransomware Attacks on Critical Infrastructure 2022-10-13T00:00:00+00:00 https://www.trendmicro.com/en_us/ciso/22/j/prevent-ransomware-attacks-on-critical-infrastructure.html www.secnews.physaphae.fr/article.php?IdArticle=7423857 False Ransomware None None TrendMicro - Security Firm Blog Enhance Cyber Defense with 2022 Cybersecurity Trends 2022-10-11T00:00:00+00:00 https://www.trendmicro.com/en_us/ciso/22/j/cybersecurity-trends-2022-cyber-defense.html www.secnews.physaphae.fr/article.php?IdArticle=7393758 False Threat,Guideline None None TrendMicro - Security Firm Blog How Will the Metaverse Affect Cloud Security? 2022-10-07T00:00:00+00:00 https://www.trendmicro.com/en_us/devops/22/j/metaverse-cloud-security.html www.secnews.physaphae.fr/article.php?IdArticle=7339536 False None None None TrendMicro - Security Firm Blog Secure Web Gateway (SWG) Security - SASE Part 3 2022-10-06T00:00:00+00:00 https://www.trendmicro.com/en_us/ciso/22/j/secure-web-gateway-swg-security-sase-part-3.html www.secnews.physaphae.fr/article.php?IdArticle=7321472 False None None None TrendMicro - Security Firm Blog Cyber Hygiene: 5 Tips for Company Buy-In 2022-10-06T00:00:00+00:00 https://www.trendmicro.com/en_us/ciso/22/j/cyber-hygiene-best-practices-assessment.html www.secnews.physaphae.fr/article.php?IdArticle=7321473 False None None None TrendMicro - Security Firm Blog Cyber Security Framework: Back to Basics 2022-10-04T00:00:00+00:00 https://www.trendmicro.com/en_us/ciso/22/j/cyber-security-framework-basics.html www.secnews.physaphae.fr/article.php?IdArticle=7292619 False None None None TrendMicro - Security Firm Blog Tracking Earth Aughisky\'s Malware and Changes 2022-10-04T00:00:00+00:00 https://www.trendmicro.com/en_us/research/22/j/tracking-earth-aughiskys-malware-and-changes.html www.secnews.physaphae.fr/article.php?IdArticle=7295108 False Malware None None TrendMicro - Security Firm Blog CISA Gov: \'23-25 Plan Focuses on Unified Cybersecurity 2022-10-03T00:00:00+00:00 https://www.trendmicro.com/en_us/ciso/22/j/dhs-cisa-gov-alert-2023-25-plan-unified-cybersecurity.html www.secnews.physaphae.fr/article.php?IdArticle=7292620 False None None None TrendMicro - Security Firm Blog Water Labbu Abuses Malicious DApps to Steal Cryptocurrency 2022-10-03T00:00:00+00:00 https://www.trendmicro.com/en_us/research/22/j/water-labbu-abuses-malicious-dapps-to-steal-cryptocurrency.html www.secnews.physaphae.fr/article.php?IdArticle=7292621 False None None None TrendMicro - Security Firm Blog Common Cloud-Native Security Misconfigurations & Fixes 2022-09-30T00:00:00+00:00 https://www.trendmicro.com/en_us/devops/22/i/cloud-native-security-misconfigurations-solutions.html www.secnews.physaphae.fr/article.php?IdArticle=7233375 False None None None TrendMicro - Security Firm Blog Incident Response Services & Playbooks Guide 2022-09-29T00:00:00+00:00 https://www.trendmicro.com/en_us/ciso/22/i/incident-response-services.html www.secnews.physaphae.fr/article.php?IdArticle=7189685 False None None None TrendMicro - Security Firm Blog Stronger Cloud Security in Azure Function Using Custom Cloud Container 2022-09-29T00:00:00+00:00 https://www.trendmicro.com/en_us/research/22/i/stronger-cloud-security-in-azure-function-using-custom-cloud-container.html www.secnews.physaphae.fr/article.php?IdArticle=7202858 False None None None TrendMicro - Security Firm Blog Simplify with Network Security as a Service (NSaaS) 2022-09-23T00:00:00+00:00 https://www.trendmicro.com/en_us/devops/22/i/network-security-as-a-service-nsaas.html www.secnews.physaphae.fr/article.php?IdArticle=7085493 False None None None TrendMicro - Security Firm Blog How to Prevent Ransomware as a Service (RaaS) Attacks 2022-09-22T00:00:00+00:00 https://www.trendmicro.com/en_us/ciso/22/i/prevent-ransomware-as-a-service-raas-attacks.html www.secnews.physaphae.fr/article.php?IdArticle=7054476 False Ransomware None None TrendMicro - Security Firm Blog Security Risks in Logistics APIs Used by E-Commerce Platforms 2022-09-20T00:00:00+00:00 https://www.trendmicro.com/en_us/research/22/i/security-risks-in-logistics-apis-used-by-e-commerce-platforms-.html www.secnews.physaphae.fr/article.php?IdArticle=7012192 False None None None TrendMicro - Security Firm Blog Cybersecurity Awareness Month 2022: 3 Actionable Tips 2022-09-20T00:00:00+00:00 https://www.trendmicro.com/en_us/ciso/22/i/cybersecurity-awareness-month-3-actionable-tips.html www.secnews.physaphae.fr/article.php?IdArticle=7009131 False None None None TrendMicro - Security Firm Blog Top 5 CNAPP-Solved Security Challenges 2022-09-15T00:00:00+00:00 https://www.trendmicro.com/en_us/devops/22/i/cnapp-solved-security-challenges.html www.secnews.physaphae.fr/article.php?IdArticle=6900114 False None None None TrendMicro - Security Firm Blog Red Teaming to Reduce Cyber Risk 2022-09-15T00:00:00+00:00 https://www.trendmicro.com/en_us/ciso/22/i/red-teaming-to-reduce-cyber-risk.html www.secnews.physaphae.fr/article.php?IdArticle=6898307 False None None None TrendMicro - Security Firm Blog Pros and Cons of 5G 2022-09-13T00:00:00+00:00 https://www.trendmicro.com/en_us/ciso/22/i/pros-cons-5g.html www.secnews.physaphae.fr/article.php?IdArticle=6865687 False Guideline None None TrendMicro - Security Firm Blog Biden Cybersecurity Executive Order: Ex-USSS Reflects 2022-09-08T00:00:00+00:00 https://www.trendmicro.com/en_us/ciso/22/i/biden-cybersecurity-executive-order-14028-may-2021.html www.secnews.physaphae.fr/article.php?IdArticle=6776122 False None None None TrendMicro - Security Firm Blog CIEM vs CWPP vs CSPM 2022-09-08T00:00:00+00:00 https://www.trendmicro.com/en_us/devops/22/i/ciem-vs-cwpp-vs-cspm.html www.secnews.physaphae.fr/article.php?IdArticle=6776121 False None None None TrendMicro - Security Firm Blog 3 Hybrid Cloud Security Challenges & Solutions 2022-09-06T00:00:00+00:00 https://www.trendmicro.com/en_us/ciso/22/i/hybrid-cloud-security-challenges-solutions.html www.secnews.physaphae.fr/article.php?IdArticle=6745305 False None None None TrendMicro - Security Firm Blog Top 5 Cloud Security Trends from AWS re:Inforce 2022 2022-09-02T00:00:00+00:00 https://www.trendmicro.com/en_us/devops/22/i/cloud-security-trends-aws-reinforce-2022.html www.secnews.physaphae.fr/article.php?IdArticle=6752435 False None None None TrendMicro - Security Firm Blog Metaverse Broadband Infrastructure Security 2022-09-01T00:00:00+00:00 https://www.trendmicro.com/en_us/ciso/22/i/metaverse-broadband-infrastructure-security.html www.secnews.physaphae.fr/article.php?IdArticle=6660954 False None None None TrendMicro - Security Firm Blog Tackling the Growing and Evolving Digital Attack Surface: 2022 Midyear Cybersecurity Report 2022-08-31T00:00:00+00:00 https://www.trendmicro.com/en_us/research/22/h/tackling-the-growing-and-evolving-digital-attack-surface-2022-mi.html www.secnews.physaphae.fr/article.php?IdArticle=6647645 False None None None TrendMicro - Security Firm Blog Cyber Security Managed Services 101 2022-08-30T00:00:00+00:00 https://www.trendmicro.com/en_us/ciso/22/i/cyber-security-managed-services-101.html www.secnews.physaphae.fr/article.php?IdArticle=6622327 False Threat None None TrendMicro - Security Firm Blog New Golang Ransomware Agenda Customizes Attacks 2022-08-25T00:00:00+00:00 https://www.trendmicro.com/en_us/research/22/h/new-golang-ransomware-agenda-customizes-attacks.html www.secnews.physaphae.fr/article.php?IdArticle=6519812 False Ransomware None None TrendMicro - Security Firm Blog Unlocking Serverless with AWS Lambda and IAM 2022-08-25T00:00:00+00:00 https://www.trendmicro.com/en_us/devops/22/h/serverless-aws-lambda-iam-tutorial.html www.secnews.physaphae.fr/article.php?IdArticle=6511242 False None None 3.0000000000000000 TrendMicro - Security Firm Blog ZTNA vs VPN: Secure Remote Work & Access - SASE Part 2 2022-08-25T00:00:00+00:00 https://www.trendmicro.com/en_us/ciso/22/h/ztna-vs-vpn-secure-remote-work.html www.secnews.physaphae.fr/article.php?IdArticle=6511241 False None None None TrendMicro - Security Firm Blog 4 Cybersecurity Budget Management Tips 2022-08-23T00:00:00+00:00 https://www.trendmicro.com/en_us/ciso/22/h/cybersecurity-budget-management.html www.secnews.physaphae.fr/article.php?IdArticle=6485480 False None None None TrendMicro - Security Firm Blog Business Email Compromise Attack Tactics 2022-08-18T00:00:00+00:00 https://www.trendmicro.com/en_us/ciso/22/h/business-email-compromise-bec-attack-tactics.html www.secnews.physaphae.fr/article.php?IdArticle=6398020 False Threat None None TrendMicro - Security Firm Blog Analyzing the Hidden Danger of Environment Variables for Keeping Secrets 2022-08-17T00:00:00+00:00 https://www.trendmicro.com/en_us/research/22/h/analyzing-hidden-danger-of-environment-variables-for-keeping-secrets.html www.secnews.physaphae.fr/article.php?IdArticle=6375833 False None None None TrendMicro - Security Firm Blog Protecting S3 from Malware: The Cold Hard Truth 2022-08-17T00:00:00+00:00 https://www.trendmicro.com/en_us/research/22/h/protect-s3-malware.html www.secnews.physaphae.fr/article.php?IdArticle=6377497 False None None None TrendMicro - Security Firm Blog Detect Threats with Runtime Security 2022-08-16T00:00:00+00:00 https://www.trendmicro.com/en_us/devops/22/h/runtime-security.html www.secnews.physaphae.fr/article.php?IdArticle=6468112 False None None None TrendMicro - Security Firm Blog Top Five Patch Management & Process Best Practices 2022-08-16T00:00:00+00:00 https://www.trendmicro.com/en_us/ciso/22/h/patch-management-process-best-practices.html www.secnews.physaphae.fr/article.php?IdArticle=6359256 False Vulnerability,Threat None 2.0000000000000000 TrendMicro - Security Firm Blog Event-Driven Architectures & the Security Implications 2022-08-12T00:00:00+00:00 https://www.trendmicro.com/en_us/devops/22/h/event-driven-architecture-security.html www.secnews.physaphae.fr/article.php?IdArticle=6264863 False None None None TrendMicro - Security Firm Blog Iron Tiger Compromises Chat Application Mimi, Targets Windows, Mac, and Linux Users 2022-08-12T00:00:00+00:00 https://www.trendmicro.com/en_us/research/22/h/irontiger-compromises-chat-app-Mimi-targets-windows-mac-linux-users.html www.secnews.physaphae.fr/article.php?IdArticle=6270841 False Malware APT 27 None TrendMicro - Security Firm Blog CopperStealer Distributes Malicious Chromium-based Browser Extension to Steal Cryptocurrencies 2022-08-11T00:00:00+00:00 https://www.trendmicro.com/en_us/research/22/h/copperstealer-distributes-malicious-chromium-browser-extension-steal-cryptocurrencies.html www.secnews.physaphae.fr/article.php?IdArticle=6249504 False None None None TrendMicro - Security Firm Blog Cyber Insurance Coverage Checklist: 5 Security Items 2022-08-11T00:00:00+00:00 https://www.trendmicro.com/en_us/ciso/22/h/cyber-insurance-coverage-checklist.html www.secnews.physaphae.fr/article.php?IdArticle=6257080 False None None None TrendMicro - Security Firm Blog A Secure Access Service Edge (SASE ) Guide for Leaders 2022-08-09T00:00:00+00:00 https://www.trendmicro.com/en_us/ciso/22/h/secure-access-service-edge-sase-security-company.html www.secnews.physaphae.fr/article.php?IdArticle=6216356 False None None None TrendMicro - Security Firm Blog Forecasting Metaverse Threats: Will it Become Metaworse? 2022-08-09T00:00:00+00:00 https://www.trendmicro.com/en_us/research/22/h/forecasting-metaverse-threats-will-it-become-metaworse.html www.secnews.physaphae.fr/article.php?IdArticle=6210679 False Threat None None TrendMicro - Security Firm Blog Cyber Insurance Market 2022: FAQs & Updates with iBynd 2022-08-05T00:00:00+00:00 https://www.trendmicro.com/en_us/ciso/22/h/cyber-insurance-market-2022.html www.secnews.physaphae.fr/article.php?IdArticle=6145613 False Ransomware None None TrendMicro - Security Firm Blog Well-Architected Framework: Sustainability 2022-08-05T00:00:00+00:00 https://www.trendmicro.com/en_us/devops/22/h/well-architected-framework-sustainability-pillar.html www.secnews.physaphae.fr/article.php?IdArticle=6148142 False None None None TrendMicro - Security Firm Blog Lessons from the Russian Cyber Warfare Attacks 2022-08-03T00:00:00+00:00 https://www.trendmicro.com/en_us/ciso/22/h/russian-cyber-warfare-attacks.html www.secnews.physaphae.fr/article.php?IdArticle=6112807 False None None 3.0000000000000000 TrendMicro - Security Firm Blog SolidBit Ransomware Enters the RaaS Scene and Takes Aim at Gamers and Social Media Users With New Variant 2022-08-02T00:00:00+00:00 https://www.trendmicro.com/en_us/research/22/h/solidbit-ransomware-enters-the-raas-scene-and-takes-aim-at-gamer.html www.secnews.physaphae.fr/article.php?IdArticle=6092651 False Ransomware None None TrendMicro - Security Firm Blog Examining New DawDropper Banking Dropper and DaaS on the Dark Web 2022-07-29T00:00:00+00:00 https://www.trendmicro.com/en_us/research/22/g/examining-new-dawdropper-banking-dropper-and-daas-on-the-dark-we.html www.secnews.physaphae.fr/article.php?IdArticle=6007880 False None None None TrendMicro - Security Firm Blog Transport Layer Security (TLS): Issues & Protocol 2022-07-28T00:00:00+00:00 https://www.trendmicro.com/en_us/devops/22/g/transport-layer-security-tls-issues-protocol.html www.secnews.physaphae.fr/article.php?IdArticle=5997746 False None None None TrendMicro - Security Firm Blog How to Apply a Zero Trust Security Model to ICS 2022-07-27T00:00:00+00:00 https://www.trendmicro.com/en_us/ciso/22/g/zero-trust-security-model-ics.html www.secnews.physaphae.fr/article.php?IdArticle=5973759 False None None None TrendMicro - Security Firm Blog Trend Micro Joins AWS Marketplace Vendor Insights 2022-07-27T00:00:00+00:00 https://www.trendmicro.com/en_us/research/22/g/aws-marketplace-vendor.html www.secnews.physaphae.fr/article.php?IdArticle=5952840 False None None None TrendMicro - Security Firm Blog Better Together: AWS and Trend Micro 2022-07-26T00:00:00+00:00 https://www.trendmicro.com/en_us/research/22/g/aws-trend-micro.html www.secnews.physaphae.fr/article.php?IdArticle=5956657 False Malware,Tool,Threat None None TrendMicro - Security Firm Blog LockBit Ransomware Group Augments Its Latest Variant, LockBit 3.0, With BlackMatter Capabilities 2022-07-25T00:00:00+00:00 https://www.trendmicro.com/en_us/research/22/g/lockbit-ransomware-group-augments-its-latest-variant--lockbit-3-.html www.secnews.physaphae.fr/article.php?IdArticle=5939832 False Ransomware None None TrendMicro - Security Firm Blog Improving Software Supply Chain Cybersecurity 2022-07-20T00:00:00+00:00 https://www.trendmicro.com/en_us/ciso/22/g/software-supply-chain-cybersecurity.html www.secnews.physaphae.fr/article.php?IdArticle=5835786 False None None None TrendMicro - Security Firm Blog Analyzing Penetration-Testing Tools That Threat Actors Use to Breach Systems and Steal Data 2022-07-20T00:00:00+00:00 https://www.trendmicro.com/en_us/research/22/g/analyzing-penetration-testing-tools-that-threat-actors-use-to-br.html www.secnews.physaphae.fr/article.php?IdArticle=5829457 False Threat None None TrendMicro - Security Firm Blog Top 5 Infrastructure as Code Security Challenges 2022-07-15T00:00:00+00:00 https://www.trendmicro.com/en_us/devops/22/g/infrastructure-as-code-iac-security.html www.secnews.physaphae.fr/article.php?IdArticle=5751527 False Threat None None TrendMicro - Security Firm Blog Worldwide 2021 Email Phishing Statistics & Examples 2022-07-13T00:00:00+00:00 https://www.trendmicro.com/en_us/ciso/21/c/going-beyond-built-in-security-email-threats-in-2020.html www.secnews.physaphae.fr/article.php?IdArticle=5702104 False None None None TrendMicro - Security Firm Blog Data Distribution Service: Mitigating Risks Part 3 2022-07-11T00:00:00+00:00 https://www.trendmicro.com/en_us/research/22/g/data-distribution-service-mitigating-risks-part-3.html www.secnews.physaphae.fr/article.php?IdArticle=5726382 False None None None TrendMicro - Security Firm Blog How Shady Code Commits Compromise the Security of the Open-Source Ecosystem 2022-07-11T00:00:00+00:00 https://www.trendmicro.com/en_us/research/22/g/how-shady-code-commits-compromise-the-security-of-the-open-sourc.html www.secnews.physaphae.fr/article.php?IdArticle=5658904 False None None None TrendMicro - Security Firm Blog Unpacking Cloud-Based Cryptocurrency Miners That Abuse GitHub Actions and Azure Virtual Machines 2022-07-07T00:00:00+00:00 https://www.trendmicro.com/en_us/research/22/g/unpacking-cloud-based-cryptocurrency-miners-that-abuse-github-ac.html www.secnews.physaphae.fr/article.php?IdArticle=5592561 False None None None TrendMicro - Security Firm Blog GraphQL vs gRPC: Which One Creates More Secure APIs? 2022-07-07T00:00:00+00:00 https://www.trendmicro.com/en_us/devops/22/g/graphql-vs-grpc.html www.secnews.physaphae.fr/article.php?IdArticle=5600426 False None None None TrendMicro - Security Firm Blog Brand-New HavanaCrypt Ransomware Poses as Google Software Update App, Uses Microsoft Hosting Service IP Address as C&C Server 2022-07-06T00:00:00+00:00 https://www.trendmicro.com/en_us/research/22/g/brand-new-havanacrypt-ransomware-poses-as-google-software-update.html www.secnews.physaphae.fr/article.php?IdArticle=5583763 False Ransomware None None TrendMicro - Security Firm Blog ICS & OT Cybersecurity Attack Trends 2022-07-06T00:00:00+00:00 https://www.trendmicro.com/en_us/ciso/22/g/ics-ot-cybersecurity-attack-trends.html www.secnews.physaphae.fr/article.php?IdArticle=5583121 False None None None TrendMicro - Security Firm Blog Data Distribution Service: Exploring Vulnerabilities and Risks Part 2 2022-07-06T00:00:00+00:00 https://www.trendmicro.com/en_us/research/22/g/data-distribution-service-part-2.html www.secnews.physaphae.fr/article.php?IdArticle=5726388 False None None None TrendMicro - Security Firm Blog Private 5G Network Security Expectations Part 2 2022-07-05T00:00:00+00:00 https://www.trendmicro.com/en_us/research/22/g/private-5g-network-security-part-2.html www.secnews.physaphae.fr/article.php?IdArticle=5612422 True None None None TrendMicro - Security Firm Blog Data Distribution Service: An Overview Part 1 2022-07-04T00:00:00+00:00 https://www.trendmicro.com/en_us/research/22/g/data-distribution-service-part-1.html www.secnews.physaphae.fr/article.php?IdArticle=5583122 False None None None TrendMicro - Security Firm Blog DevOps vs SRE: Differences & Similarities 2022-06-30T00:00:00+00:00 https://www.trendmicro.com/en_us/devops/22/f/devops-vs-sre.html www.secnews.physaphae.fr/article.php?IdArticle=5489554 False None None None TrendMicro - Security Firm Blog How to Present Cloud Risk to the Board 2022-06-29T00:00:00+00:00 https://www.trendmicro.com/en_us/ciso/22/f/cloud-risk-management-assessment-plan.html www.secnews.physaphae.fr/article.php?IdArticle=5489556 False Guideline None None TrendMicro - Security Firm Blog Azure vs. AWS Developer Tools 2022-06-22T00:00:00+00:00 https://www.trendmicro.com/en_us/devops/22/f/azure-vs-aws-developer-tools.html www.secnews.physaphae.fr/article.php?IdArticle=5489562 False Tool None None TrendMicro - Security Firm Blog Security 101: Cloud-native Virtual Patching 2022-06-16T00:00:00+00:00 https://www.trendmicro.com/en_us/devops/22/f/cloud-native-virtual-patching-101.html www.secnews.physaphae.fr/article.php?IdArticle=5489565 False Vulnerability,Patching None None TrendMicro - Security Firm Blog Addressing Cyber Risk with a Unified Platform 2022-06-13T00:00:00+00:00 https://www.trendmicro.com/en_us/ciso/22/f/addressing-cyber-risk-with-a-unified-platform.html www.secnews.physaphae.fr/article.php?IdArticle=5489567 False None None None TrendMicro - Security Firm Blog Amazon EKS vs Azure Kubernetes Service 2022-06-09T00:00:00+00:00 https://www.trendmicro.com/en_us/devops/22/f/amazon-eks-vs-azure-kubernetes-service-aks.html www.secnews.physaphae.fr/article.php?IdArticle=5489568 False None Uber None TrendMicro - Security Firm Blog Tutorial: How to Build Your First Node.js gRPC API 2022-06-04T00:00:00+00:00 https://www.trendmicro.com/en_us/devops/22/f/grpc-api-tutorial.html www.secnews.physaphae.fr/article.php?IdArticle=5489571 False None None None TrendMicro - Security Firm Blog Cyber Risk Management Strategies from Arjo CIO 2022-06-02T00:00:00+00:00 https://www.trendmicro.com/en_us/ciso/22/e/cyber-risk-management-arjo-cio-andrea-berg.html www.secnews.physaphae.fr/article.php?IdArticle=5489572 False None None None TrendMicro - Security Firm Blog Managing Cyber Risk: The People Element 2022-05-31T00:00:00+00:00 https://www.trendmicro.com/en_us/ciso/22/e/managing-cyber-risk.html www.secnews.physaphae.fr/article.php?IdArticle=5489575 False None None None TrendMicro - Security Firm Blog How to implement AWS Sustainability Pillar principles 2022-05-27T00:00:00+00:00 https://www.trendmicro.com/en_us/devops/22/e/aws-sustainability-pillar-principles.html www.secnews.physaphae.fr/article.php?IdArticle=5489577 False None None None TrendMicro - Security Firm Blog Detect Azure AD Hybrid Cloud Vulnerabilities 2022-05-19T00:00:00+00:00 https://www.trendmicro.com/en_us/devops/22/e/detect-azure-ad-hybrid-cloud-vulnerabilities.html www.secnews.physaphae.fr/article.php?IdArticle=5489581 False None None None TrendMicro - Security Firm Blog Cyber risk management: Attribution strategies 2022-05-19T00:00:00+00:00 https://www.trendmicro.com/en_us/ciso/22/e/cyber-attribution-benefits.html www.secnews.physaphae.fr/article.php?IdArticle=5489583 False Tool None None TrendMicro - Security Firm Blog Sandstone CTO shares how to assess cyber risk in the cloud 2022-05-13T00:00:00+00:00 https://www.trendmicro.com/en_us/ciso/22/e/cyber-risk-assessment-sandstone-cto.html www.secnews.physaphae.fr/article.php?IdArticle=5489587 False None None None TrendMicro - Security Firm Blog The Difference Between Virtual Machines and Containers 2022-05-12T00:00:00+00:00 https://www.trendmicro.com/en_us/devops/22/e/the-difference-between-virtual-machines-and-containers.html www.secnews.physaphae.fr/article.php?IdArticle=5489589 False None None None TrendMicro - Security Firm Blog Adding Guardrails To A Cloud Account After The Fact 2022-05-11T00:00:00+00:00 https://www.trendmicro.com/en_us/devops/22/e/cloud-configuration-management-guardrails.html www.secnews.physaphae.fr/article.php?IdArticle=5489590 False None None None TrendMicro - Security Firm Blog Workshop: Simplifying Network Security in the Cloud 2022-05-04T00:00:00+00:00 https://www.trendmicro.com/en_us/devops/22/e/workshop-simplifying-network-security-in-the-cloud.html www.secnews.physaphae.fr/article.php?IdArticle=5489594 False None None None TrendMicro - Security Firm Blog AvosLocker Ransomware Variant Abuses Driver File to Disable Antivirus, Scans for Log4shell 2022-05-02T00:00:00+00:00 https://www.trendmicro.com/en_us/research/22/e/avoslocker-ransomware-variant-abuses-driver-file-to-disable-anti-Virus-scans-log4shell.html www.secnews.physaphae.fr/article.php?IdArticle=5489595 False Ransomware None None TrendMicro - Security Firm Blog New AWS Competency Category - Why It\'s Important 2022-04-27T00:00:00+00:00 https://www.trendmicro.com/en_us/devops/22/d/why-aws-devops-competency-important.html www.secnews.physaphae.fr/article.php?IdArticle=5489596 False None None None TrendMicro - Security Firm Blog Unified Cybersecurity Platform: Why CISOs are Shifting 2022-04-24T00:00:00+00:00 https://www.trendmicro.com/en_us/ciso/21/g/why-secops-need-cybersecurity-platform.html www.secnews.physaphae.fr/article.php?IdArticle=5489599 False None None None TrendMicro - Security Firm Blog Aligning the c-suite with cyber risk management 2022-04-24T00:00:00+00:00 https://www.trendmicro.com/en_us/ciso/21/k/reduce-friction-between-it-leaders-and-c-suite.html www.secnews.physaphae.fr/article.php?IdArticle=5489601 False None None None TrendMicro - Security Firm Blog Cybersecurity Predictions for 2022 2022-04-24T00:00:00+00:00 https://www.trendmicro.com/en_us/ciso/21/l/cybersecurity-trends-2022.html www.secnews.physaphae.fr/article.php?IdArticle=5489598 False None None None TrendMicro - Security Firm Blog How XDR Security Aids in Cyber Risk Management 2022-04-24T00:00:00+00:00 https://www.trendmicro.com/en_us/ciso/21/l/why-xdr-is-necessary-in-todays-attack-landscape.html www.secnews.physaphae.fr/article.php?IdArticle=5489600 False Threat None None TrendMicro - Security Firm Blog Trend Micro Partnering with Bit Discovery 2022-04-24T00:00:00+00:00 https://www.trendmicro.com/en_us/research/22/d/attack-surface-management-partner.html www.secnews.physaphae.fr/article.php?IdArticle=5489602 True None None 5.0000000000000000 TrendMicro - Security Firm Blog This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs Welcome to our weekly roundup, where we share what you need to know about cybersecurity news and events that happened over the past few days. This week, learn about a ransomware group that walked away with 2,200 Bitcoin: More than $33 million based on the current Bitcoin exchange rate. Also, read about this month's Patch... ]]> 2020-11-13T13:11:18+00:00 https://blog.trendmicro.com/this-week-in-security-news-ransomware-gang-is-raking-in-tens-of-millions-of-dollars-and-microsoft-patch-tuesday-update-fixes-17-critical-bugs/ www.secnews.physaphae.fr/article.php?IdArticle=2103356 False Ransomware None 4.0000000000000000 TrendMicro - Security Firm Blog This Week in Security News: US Cyber Command Exposes New Russian Malware and REvil Ransomware Gang \'Acquires\' KPOT Malware Welcome to our weekly roundup, where we share what you need to know about cybersecurity news and events that happened over the past few days. This week, learn about eight new malware samples that were developed and deployed by Russian hackers in recent attacks. Also, read about how the operators of the REvil ransomware strain... ]]> 2020-11-06T13:42:03+00:00 https://blog.trendmicro.com/this-week-in-security-news-us-cyber-command-exposes-new-russian-malware-and-revil-ransomware-gang-acquires-kpot-malware/ www.secnews.physaphae.fr/article.php?IdArticle=2103357 False Ransomware,Malware None 3.0000000000000000 TrendMicro - Security Firm Blog This Week in Security News: Trend Micro Researcher Uncover Two Espionage Backdoors Associated with Operation Earth Kitsune and Trickbot and Ransomware Attackers Plan Big Hit on U.S. Hospitals Welcome to our weekly roundup, where we share what you need to know about cybersecurity news and events that happened over the past few days. This week, learn about how Trend Micro researchers uncovered two new espionage backdoors associated with the 'Operation Earth Kitsune' campaign. Also, read about how U.S. healthcare providers have been put... ]]> 2020-10-30T13:59:08+00:00 https://blog.trendmicro.com/this-week-in-security-news-trend-micro-researcher-uncover-two-espionage-backdoors-associated-with-operation-earth-kitsune-and-trickbot-and-ransomware-attackers-plan-big-hit-on-u-s-hospitals/ www.secnews.physaphae.fr/article.php?IdArticle=2103358 False Ransomware None 5.0000000000000000 TrendMicro - Security Firm Blog Trend Micro HouseCall for Home Networks: Giving You a Free Hand in Home Network Security 2020-10-27T12:36:56+00:00 https://blog.trendmicro.com/trend-micro-housecall-for-home-networks-giving-you-a-free-hand-in-home-network-security/ www.secnews.physaphae.fr/article.php?IdArticle=2103359 True None None 4.0000000000000000 TrendMicro - Security Firm Blog This Week in Security News: Cybercriminals Use Stolen Data and Hacking Tools as Prizes in Poker Games and Rap Battles and VirusTotal Now Supports Trend Micro ELF Hash Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about how cybercriminals are passing the time during the COVID-19 pandemic with online poker games, where the prizes include stolen data. Also, read about how VirusTotal... ]]> 2020-10-16T12:48:58+00:00 https://blog.trendmicro.com/this-week-in-security-news-cybercriminals-use-stolen-data-and-hacking-tools-as-prizes-in-poker-games-and-rap-battles-and-virustotal-now-supports-trend-micro-elf-hash/ www.secnews.physaphae.fr/article.php?IdArticle=2103361 False None None 4.0000000000000000 TrendMicro - Security Firm Blog Cyber Security Awareness: A Critical Checklist October 2020 marks the 17th year of National CyberSecurity Awareness Month, where users and organizations are encouraged to double their efforts to be aware of cybersecurity issues in all their digital dealings-and to take concrete steps to increase their privacy and security as necessary. The Cybersecurity & Infrastructure Security Agency (CISA), in conjunction with the... ]]> 2020-10-08T13:28:30+00:00 https://blog.trendmicro.com/cyber-security-awareness-a-critical-checklist/ www.secnews.physaphae.fr/article.php?IdArticle=2103363 False None None 3.0000000000000000 TrendMicro - Security Firm Blog This Week in Security News: Linkury Adware Caught Distributing Full-Blown Malware and Cross-Platform Modular Glupteba Malware Uses ManageX Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about how an adware family known primarily for distributing browser hijackers, Linkury, has been caught distributing malware. Also, read about a newly uncovered strain of the... ]]> 2020-10-02T12:05:55+00:00 https://blog.trendmicro.com/this-week-in-security-news-linkury-adware-caught-distributing-full-blown-malware-and-cross-platform-modular-glupteba-malware-uses-managex/ www.secnews.physaphae.fr/article.php?IdArticle=2103364 False Malware None 2.0000000000000000