www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2025-05-10T20:58:14+00:00 www.secnews.physaphae.fr InfoSecurity Mag - InfoSecurity Magazine Smishing Triad améliore les outils et les tactiques pour les attaques mondiales<br>Smishing Triad Upgrades Tools and Tactics for Global Attacks Global smishing campaigns linked to Chinese cybercriminals escalate with Smishing Triad\'s new tools and techniques]]> 2025-05-06T15:00:00+00:00 https://www.infosecurity-magazine.com/news/smishing-triad-upgrades-tools/ www.secnews.physaphae.fr/article.php?IdArticle=8672331 False Tool None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Blue Shield of California Data Breach affecte 4,7 millions de membres<br>Blue Shield of California Data Breach Affects 4.7 Million Members A misconfigured tracking tool has exposed protected health information of 4.7 million Blue Shield members to Google Ads]]> 2025-04-24T15:00:00+00:00 https://www.infosecurity-magazine.com/news/blue-shield-california-data-breach/ www.secnews.physaphae.fr/article.php?IdArticle=8667215 True Data Breach,Tool None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Billbug Espionage Group déploie de nouveaux outils en Asie du Sud-Est<br>Billbug Espionage Group Deploys New Tools in Southeast Asia Billbug, a China-linked espionage group, has been observed targeting critical sectors in Southeast Asia with new tools]]> 2025-04-22T15:00:00+00:00 https://www.infosecurity-magazine.com/news/billbug-espionage-group-new-tools/ www.secnews.physaphae.fr/article.php?IdArticle=8666185 False Tool None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Google Cloud: les CISOS demandent des outils de sécurité simplifiés dans un contexte de complexité technologique croissante<br>Google Cloud: CISOs Demand Simplified Security Tools Amid Growing Tech Complexity Google Cloud announced a number of security products designed to reduce complexity for security leaders]]> 2025-04-10T14:30:00+00:00 https://www.infosecurity-magazine.com/news/google-cloud-cisos-demand/ www.secnews.physaphae.fr/article.php?IdArticle=8661409 False Tool,Cloud None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Xanthorox AI de Darknet \\ propose des outils personnalisables pour les pirates<br>Darknet\\'s Xanthorox AI Offers Customizable Tools for Hackers Xanthorox AI, a self-contained system for offensive cyber operations, has emerged on darknet forums]]> 2025-04-07T13:00:00+00:00 https://www.infosecurity-magazine.com/news/darknets-xanthorox-ai-hackers-tools/ www.secnews.physaphae.fr/article.php?IdArticle=8660728 False Tool None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Une nouvelle attaque de phishing combine des techniques de téléchargement de touche et de DLL<br>New Phishing Attack Combines Vishing and DLL Sideloading Techniques A new attack targeting Microsoft Teams users used vishing, remote access tools and DLL sideloading to deploy a JavaScript backdoor]]> 2025-04-01T13:30:00+00:00 https://www.infosecurity-magazine.com/news/phishing-attack-combines-vishing/ www.secnews.physaphae.fr/article.php?IdArticle=8659616 False Tool None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Dark Web mentions d'outils d'IA malveillants augmente 200%<br>Dark Web Mentions of Malicious AI Tools Spike 200% Kela researchers detect a 200%+ increase in dark web chatter about malicious AI tools]]> 2025-03-25T12:00:00+00:00 https://www.infosecurity-magazine.com/news/dark-web-mentions-malicious-ai/ www.secnews.physaphae.fr/article.php?IdArticle=8658077 False Tool None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Le chercheur en sécurité prouve que les outils Genai peuvent développer des infostenteurs Google Chrome<br>Security Researcher Proves GenAI Tools Can Develop Google Chrome Infostealers A Cato Networks researcher discovered a new LLM jailbreaking technique enabling the creation of password-stealing malware]]> 2025-03-18T15:30:00+00:00 https://www.infosecurity-magazine.com/news/security-researcher-llm/ www.secnews.physaphae.fr/article.php?IdArticle=8656495 False Malware,Tool None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine La base de données de sécurité vise à autonomiser les organisations à but non lucratif<br>Security Database Aims to Empower Non-Profits Common Good Cyber has released a new mapping database designed to help NGOs find the security tools they need]]> 2025-03-17T10:45:00+00:00 https://www.infosecurity-magazine.com/news/security-database-aims-empower/ www.secnews.physaphae.fr/article.php?IdArticle=8656196 False Tool None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Salt Typhoon a exploité les appareils Cisco avec un outil personnalisé à espionner les télécommunications américaines<br>Salt Typhoon Exploited Cisco Devices With Custom Tool to Spy on US Telcos Chinese threat actor Salt Typhoon used JumbledPath, a custom-built utility, to gain access to a remote Cisco device, said the network provider]]> 2025-02-21T14:15:00+00:00 https://www.infosecurity-magazine.com/news/salt-typhoon-cisco-custom-tool/ www.secnews.physaphae.fr/article.php?IdArticle=8649607 False Tool,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Mustang Panda Leverages Microsoft Tools to Bypass Anti-Virus Solutions Trend Micro found that Chinese espionage group Mustang Panda is deploying malware via legitimate Microsoft tools, enabling it to bypass ESET antivirus applications]]> 2025-02-18T15:00:00+00:00 https://www.infosecurity-magazine.com/news/mustang-panda-microsoft-bypass/ www.secnews.physaphae.fr/article.php?IdArticle=8648876 False Malware,Tool,Prediction None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine China-Linked Espionage Tools Used in Recent Ransomware Attack Symantec found that tools previously only used by Chinese nation-state espionage actors were deployed in a ransomware attack]]> 2025-02-14T10:00:00+00:00 https://www.infosecurity-magazine.com/news/chinese-espionage-tools-ransomware/ www.secnews.physaphae.fr/article.php?IdArticle=8648459 False Ransomware,Tool None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine International Operation Dismantles Cracked and Nulled Cybercrime Hubs A global law enforcement operation has taken down infrastructure used by Cracked.io and Nulled.io, which provide cybercriminal tools and services]]> 2025-01-31T09:35:00+00:00 https://www.infosecurity-magazine.com/news/operation-dismantles-cracked/ www.secnews.physaphae.fr/article.php?IdArticle=8645176 False Tool,Legislation None 4.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Attackers Increase Use of HTTP Clients for Account Takeovers HTTP client tools used to compromise Microsoft 365 environments with 78% of tenants targeted in 2024]]> 2025-01-30T16:30:00+00:00 https://www.infosecurity-magazine.com/news/attackers-increase-use-http/ www.secnews.physaphae.fr/article.php?IdArticle=8644862 False Tool None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Nation-State Hackers Abuse Gemini AI Tool Google highlighted significant abuse of its Gemini LLM tool by nation state actors to support malicious activities, including research and malware development]]> 2025-01-29T16:00:00+00:00 https://www.infosecurity-magazine.com/news/nation-state-abuse-gemini-ai/ www.secnews.physaphae.fr/article.php?IdArticle=8644358 False Malware,Tool None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine New Ransomware Group Uses AI to Develop Nefarious Tools Researchers at Check Point said FunkSec operators appear to use AI for malware development]]> 2025-01-13T13:00:00+00:00 https://www.infosecurity-magazine.com/news/new-ransomware-group-uses-ai/ www.secnews.physaphae.fr/article.php?IdArticle=8636712 False Ransomware,Malware,Tool None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Fake Government Officials Use Remote Access Tools for Card Fraud Group-IB has observed scammers impersonating government officials to trick disaffected consumers into divulging card details]]> 2025-01-08T09:45:00+00:00 https://www.infosecurity-magazine.com/news/fake-government-officials-rats/ www.secnews.physaphae.fr/article.php?IdArticle=8634829 False Tool None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Supply Chain Attack Targets Key Ethereum Development Tools A new supply chain attack targets Ethereum tools, exploiting npm packages to steal sensitive data]]> 2025-01-06T16:30:00+00:00 https://www.infosecurity-magazine.com/news/supply-chain-attack-targets/ www.secnews.physaphae.fr/article.php?IdArticle=8634181 False Tool None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Cryptomining Malware Found in Popular Open Source Packages Cryptomining malware hits popular npm packages rspack and vant, posing risks to open source tools]]> 2024-12-23T16:30:00+00:00 https://www.infosecurity-magazine.com/news/cryptomining-malware-opensource/ www.secnews.physaphae.fr/article.php?IdArticle=8629181 False Malware,Tool None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Vulnerability Exploit Assessment Tool EPSS Exposed to Adversarial Attack A Morphisec researcher showed how an attacker could manipulate FIRST\'s Exploit Prediction Scoring System (EPSS) using AI]]> 2024-12-19T10:30:00+00:00 https://www.infosecurity-magazine.com/news/epss-exposed-to-adversarial-attack/ www.secnews.physaphae.fr/article.php?IdArticle=8627462 False Tool,Vulnerability,Threat,Prediction None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine GenAI: Security Teams Demand Expertise-Driven Solutions 76% of security leaders favor cybersecurity-focused GenAI tools over domain-agnostic tools]]> 2024-12-17T13:00:00+00:00 https://www.infosecurity-magazine.com/news/genai-security-teams-crowdstrike/ www.secnews.physaphae.fr/article.php?IdArticle=8626556 False Tool None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine 2024 Sees Sharp Increase in Microsoft Tool Exploits Sophos found observed a significant rise in Microsoft LOLbins abused by attackers in H1 2024 compared to 2023]]> 2024-12-13T13:45:00+00:00 https://www.infosecurity-magazine.com/news/increase-microsoft-tool-exploits/ www.secnews.physaphae.fr/article.php?IdArticle=8624576 False Tool None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Lookout Discovers New Spyware Deployed by Russia and China Russian-made spyware BoneSpy and PlainGnome target former Soviet states, while public security bureaus in mainland China use Chinese surveillance tool EagleMsgSpy]]> 2024-12-12T11:30:00+00:00 https://www.infosecurity-magazine.com/news/lookout-new-spyware-russia-china/ www.secnews.physaphae.fr/article.php?IdArticle=8623989 False Tool None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine FBI Warns GenAI is Boosting Financial Fraud An FBI alert warned that GenAI tools are improving the believability of fraud schemes and enabling large scale attacks]]> 2024-12-05T14:00:00+00:00 https://www.infosecurity-magazine.com/news/fbi-genai-financial-fraud/ www.secnews.physaphae.fr/article.php?IdArticle=8620076 False Tool None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine GodLoader Malware Infects Thousands via Game Development Tools A new cyber-attack technique uses Godot Engine to deploy undetectable malware via GodLoader, infecting more than 17,000 devices]]> 2024-11-28T16:30:00+00:00 https://www.infosecurity-magazine.com/news/godloader-malware-infects/ www.secnews.physaphae.fr/article.php?IdArticle=8618167 False Malware,Tool None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Over a Third of Firms Struggling With Shadow AI Some 35% of global organizations report challenges monitoring use of non-approved AI tools]]> 2024-11-26T10:15:00+00:00 https://www.infosecurity-magazine.com/news/over-third-firms-struggling-shadow/ www.secnews.physaphae.fr/article.php?IdArticle=8617857 False Tool None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Russian Cyber Spies Target Organizations with HatVibe and CherrySpy Malware Russian-aligned TAG-110 uses custom tools to spy on governments, human rights groups and educational institutions in Europe and Asia]]> 2024-11-22T13:00:00+00:00 https://www.infosecurity-magazine.com/news/russian-cyber-spies-hatvibe/ www.secnews.physaphae.fr/article.php?IdArticle=8616009 False Malware,Tool None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Phishing Tool GoIssue Targets Developers on GitHub New phishing tool GoIssue targets GitHub, enabling mass phishing, and has been linked to the GitLoker extortion campaign]]> 2024-11-12T15:15:00+00:00 https://www.infosecurity-magazine.com/news/phishing-goissue-targets-github/ www.secnews.physaphae.fr/article.php?IdArticle=8609864 False Tool None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Le régulateur britannique demande une protection des données plus forte dans les outils de recrutement d'IA<br>UK Regulator Urges Stronger Data Protection in AI Recruitment Tools An ICO audit of AI recruitment tools found numerous data privacy issues that may lead to jobseekers being discriminated against and privacy compromised]]> 2024-11-07T12:30:00+00:00 https://www.infosecurity-magazine.com/news/uk-regulator-data-protection-ai/ www.secnews.physaphae.fr/article.php?IdArticle=8607537 False Tool None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine L'opération d'application de la loi élimine la ligne rouge et les méta-infostateurs<br>Law Enforcement Operation Takes Down Redline and Meta Infostealers Operation Magnus took down infrastructure used to run the Redline and Meta infostealers, widely used tools in cybercriminal activities]]> 2024-10-29T14:00:00+00:00 https://www.infosecurity-magazine.com/news/law-enforcement-redline-meta/ www.secnews.physaphae.fr/article.php?IdArticle=8603297 False Tool,Legislation None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Gang d'embargo Ransomware déploie des outils d'évasion de défense personnalisés<br>Embargo Ransomware Gang Deploys Customized Defense Evasion Tools The recently discovered Embargo ransomware group is using Rust-based custom tools to overcome victims\' security defenses, ESET researchers have observed]]> 2024-10-23T15:02:00+00:00 https://www.infosecurity-magazine.com/news/embargo-ransomware-defense-evasion/ www.secnews.physaphae.fr/article.php?IdArticle=8601371 False Ransomware,Tool None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine LLMJacking et surtension d'outils open source en 2024 Attaques de cloud<br>LLMjacking and Open-Source Tool Abuse Surge in 2024 Cloud Attacks Cloud attacks surged in 2024 as attackers exploited cloud resources at unprecedented levels]]> 2024-10-22T16:15:00+00:00 https://www.infosecurity-magazine.com/news/llmjacking-opensource-surge-2024/ www.secnews.physaphae.fr/article.php?IdArticle=8601378 False Tool,Cloud None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Think Tanks Insignez l'action de limiter une mauvaise utilisation des logiciels espions et du piratage pour la location<br>Think Tanks Urge Action to Curb Misuse of Spyware and Hack-for-Hire RUSI and Chatham House recommended global standards to combat commercial cyber tool abuse]]> 2024-10-22T09:00:00+00:00 https://www.infosecurity-magazine.com/news/rusi-chatham-house-misuse-spyware/ www.secnews.physaphae.fr/article.php?IdArticle=8601285 False Tool,Commercial None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Attaques alimentées par l'IA<br>AI-Powered Attacks Flood Retail Websites AI tools are being used to launch over half a million cyber-attacks daily on retailers, according to a new report]]> 2024-10-22T08:00:00+00:00 https://www.infosecurity-magazine.com/news/aipowered-attacks-flood-retail/ www.secnews.physaphae.fr/article.php?IdArticle=8601276 False Tool None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les pirates éthiques embrassent les outils d'IA au milieu des cyber-menaces en hausse<br>Ethical Hackers Embrace AI Tools Amid Rising Cyber Threats A new Bugcrowd study shows 71% of ethical hackers now see AI boosting hacking value, up from 21% in 2023]]> 2024-10-16T15:15:00+00:00 https://www.infosecurity-magazine.com/news/ethical-hackers-embrace-ai-tools/ www.secnews.physaphae.fr/article.php?IdArticle=8598797 False Tool,Studies None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les professionnels de la technologie mettent en évidence les compétences critiques en matière de sécurité de l'IA<br>Tech Professionals Highlight Critical AI Security Skills Gap A new O\'Reilly survey showed a shortage of AI security skills, while AI-enabled security tools become tech professionals\' top priority for the coming year]]> 2024-10-07T13:05:00+00:00 https://www.infosecurity-magazine.com/news/tech-professionals-critical-ai/ www.secnews.physaphae.fr/article.php?IdArticle=8593639 False Tool None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Obtenez la sécurité en ligne lance un nouveau détecteur d'arnaque<br>Get Safe Online Launches New Scam Detector A new scam detection tool from Get Safe Online uses AI to help individuals and small businesses protect themselves]]> 2024-10-07T09:00:00+00:00 https://www.infosecurity-magazine.com/news/get-safe-online-launches-new-scam/ www.secnews.physaphae.fr/article.php?IdArticle=8593541 False Tool None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Le groupe Stonefly cible les entreprises américaines avec de nouveaux outils de logiciels malveillants<br>Stonefly Group Targets US Firms With New Malware Tools North Korean APT Stonefly continues to launch cyber-attacks on US firms despite July indictment]]> 2024-10-02T15:30:00+00:00 https://www.infosecurity-magazine.com/news/stonefly-targets-us-firms-new/ www.secnews.physaphae.fr/article.php?IdArticle=8590557 False Malware,Tool None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Europol: Genai propose un «trésor de possibilités»<br>Europol: GenAI Offers “Treasure Trove of Possibilities” A new Europol report argues that AI tools could revolutionize policing across the region]]> 2024-09-24T08:40:00+00:00 https://www.infosecurity-magazine.com/news/europol-genai-treasure-trove/ www.secnews.physaphae.fr/article.php?IdArticle=8583657 False Tool None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Kryptina Ransomware refait surface dans les attaques d'entreprise par Mallox<br>Kryptina Ransomware Resurfaces in Enterprise Attacks By Mallox Kryptina, a free Ransomware-as-a-Service tool available on dark web forums, is now being used by Mallox ransomware affiliates]]> 2024-09-23T16:15:00+00:00 https://www.infosecurity-magazine.com/news/kryptina-ransomware-resurfaces/ www.secnews.physaphae.fr/article.php?IdArticle=8583063 False Ransomware,Tool None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine La technologie opérationnelle se laisse ouverte à la cyberattaque<br>Operational Technology Leaves Itself Open to Cyber-Attack Excessive use of remote access tools is leaving operational technology devices vulnerable, with even basic security features missing]]> 2024-09-11T16:15:00+00:00 https://www.infosecurity-magazine.com/news/ot-open-cyberattack/ www.secnews.physaphae.fr/article.php?IdArticle=8574675 False Tool None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Outil d'équipe rouge maltraité pour le déploiement de logiciels malveillants<br>Red Teaming Tool Abused for Malware Deployment Cisco Talos has assessed that red teaming tool MacroPack is being abused by various threat actors in different geographies to deploy malware]]> 2024-09-04T13:00:00+00:00 https://www.infosecurity-magazine.com/news/red-teaming-tool-abused-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8569712 False Malware,Tool,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Lummac2 InfoSteller revintafaces avec des tactiques PowerShell obscurcies<br>LummaC2 Infostealer Resurfaces With Obfuscated PowerShell Tactics LummaC2, a C-based MaaS tool first identified in 2022, has resurfaced to exfiltrate credentials and personal data]]> 2024-08-28T16:15:00+00:00 https://www.infosecurity-magazine.com/news/lummac2-infostealer-obfuscated/ www.secnews.physaphae.fr/article.php?IdArticle=8565497 False Tool None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine YouTube lance l'outil AI pour récupérer les comptes piratés<br>YouTube Launches AI Tool to Recover Hacked Accounts YouTube\'s new AI troubleshooting tool is designed to help users recover and secure their accounts after they\'ve been hacked]]> 2024-08-23T10:00:00+00:00 https://www.infosecurity-magazine.com/news/youtube-ai-tool-hacked-accounts/ www.secnews.physaphae.fr/article.php?IdArticle=8562451 False Tool None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Nouvel outil que l'expéditeur Xeon Active les attaques de spam SMS à grande échelle<br>New Tool Xeon Sender Enables Large-Scale SMS Spam Attacks Xeon Sender features SMS spam via APIs, Nexmo/Twilio credentials validation and phone number generation]]> 2024-08-19T15:30:00+00:00 https://www.infosecurity-magazine.com/news/xeon-sender-enables-sms-spam/ www.secnews.physaphae.fr/article.php?IdArticle=8560354 False Spam,Tool None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Le leadership Openai s'est séparé de la technologie des filigations de l'IA interne<br>OpenAI Leadership Split Over In-House AI Watermarking Technology One primary concern is that the tool might turn ChatGPT users away from the product]]> 2024-08-09T10:15:00+00:00 https://www.infosecurity-magazine.com/news/openai-split-ai-watermarking/ www.secnews.physaphae.fr/article.php?IdArticle=8554609 False Tool ChatGPT 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les acteurs de la menace favorisent Rclone, WinSCP et Curl comme outils d'exfiltration de données<br>Threat Actors Favor Rclone, WinSCP and cURL as Data Exfiltration Tools ReliaQuest found that Rclone, WinSCP and cURL were the top three data exfiltration tools utilized by threat actors over the past year]]> 2024-08-09T09:00:00+00:00 https://www.infosecurity-magazine.com/news/rclone-winscp-curl-top-data/ www.secnews.physaphae.fr/article.php?IdArticle=8554586 False Tool,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine NCSC dévoile la cyberdéfense 2.0 avancée pour lutter contre l'évolution des menaces<br>NCSC Unveils Advanced Cyber Defence 2.0 to Combat Evolving Threats The UK\'s NCSC is launching ACD 2.0, an advanced suite of cybersecurity tools and services designed to protect businesses from evolving cyber threats]]> 2024-08-02T09:50:00+00:00 https://www.infosecurity-magazine.com/news/ncsc-acd-evolving-threats/ www.secnews.physaphae.fr/article.php?IdArticle=8549622 False Tool None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Juste une attaque sur 10 signalée par des outils de sécurité<br>Just One in 10 Attacks Flagged By Security Tools Picus Security claims just 12% of simulated attacks trigger an alert]]> 2024-07-30T10:00:00+00:00 https://www.infosecurity-magazine.com/news/one-10-attacks-detected-security/ www.secnews.physaphae.fr/article.php?IdArticle=8547182 False Tool None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Malgré les interdictions, les outils du code d'IA sont répandus dans les organisations<br>Despite Bans, AI Code Tools Widespread in Organizations Despite bans on AI code generation tools, widespread use and lack of governance are creating significant security risks for organizations]]> 2024-07-26T11:00:00+00:00 https://www.infosecurity-magazine.com/news/ai-code-tools-widespread-in/ www.secnews.physaphae.fr/article.php?IdArticle=8544713 False Tool None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Risques sensibles du partage de données accrus au fur et à mesure que Genai augmente<br>Sensitive Data Sharing Risks Heightened as GenAI Surges Netskope found that 96% of organizations use generative AI applications, with sensitive data frequently shared with these tools]]> 2024-07-17T11:10:00+00:00 https://www.infosecurity-magazine.com/news/sensitive-data-sharing-genai/ www.secnews.physaphae.fr/article.php?IdArticle=8538808 False Tool None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Iranian Muddywater Mosences arsenal avec une nouvelle porte dérobée personnalisée<br>Iranian MuddyWater Upgrades Arsenal With New Custom Backdoor The Iranian APT group has shifted away from using legitimate remote monitoring tools to compromise its victims]]> 2024-07-16T14:00:00+00:00 https://www.infosecurity-magazine.com/news/iran-muddywater-new-custom-backdoor/ www.secnews.physaphae.fr/article.php?IdArticle=8538196 False Tool None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les cyber-attaques cristalristes se décuplent à l'aide d'outils OSS<br>CRYSTALRAY Cyber-Attacks Grow Tenfold Using OSS Tools Sysdig said CRYSTALRAY used a variety of open source security tools to scan for vulnerabilities]]> 2024-07-15T16:15:00+00:00 https://www.infosecurity-magazine.com/news/crystalray-cyber-attacks-grow/ www.secnews.physaphae.fr/article.php?IdArticle=8537644 False Tool,Vulnerability None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Attackers Exploit URL Protections to Disguise Phishing Links Barracuda has observed attackers using three different URL protection services to mask their phishing URLs, bypassing email security tools]]> 2024-07-15T11:45:00+00:00 https://www.infosecurity-magazine.com/news/attackers-exploit-url-protections/ www.secnews.physaphae.fr/article.php?IdArticle=8537498 False Tool,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Google contrecarre plus de 10 000 tentatives de l'opérateur d'influence chinoise<br>Google Thwarts Over 10,000 Attempts by Chinese Influence Operator Google warned of high levels of activity from Chinese influence operator Dragon Bridge, which is increasingly experimenting with generative AI tools to create content]]> 2024-06-28T10:15:00+00:00 https://www.infosecurity-magazine.com/news/google-thwarts-chinese-influence/ www.secnews.physaphae.fr/article.php?IdArticle=8527114 False Tool None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Installations chimiques avertis d'une éventuelle exfiltration des données après une violation de la CISA<br>Chemical Facilities Warned of Possible Data Exfiltration Following CISA Breach CISA has informed chemical facilities that its Chemical Security Assessment Tool (CSAT) was infiltrated by a malicious actor, and potentially exfiltrated sensitive data]]> 2024-06-21T13:30:00+00:00 https://www.infosecurity-magazine.com/news/chemical-exfiltration-cisa-breach/ www.secnews.physaphae.fr/article.php?IdArticle=8522710 False Tool None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine # Infosec2024: relever les cyber-défis du code généré par l'IA-AI<br>#Infosec2024: Tackling Cyber Challenges of AI-Generated Code If software developers want to benefit from AI-generated code tools, they must mitigate some of the risks they could bring first, Synopsys\' Lucas von Stockhausen said at Infosecurity Europe]]> 2024-06-05T08:30:00+00:00 https://www.infosecurity-magazine.com/news/tackling-cyber-challenges-ai-code/ www.secnews.physaphae.fr/article.php?IdArticle=8513528 False Tool None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Le nouveau PYPI Malware «Pytoileur» vole la crypto et échappe à la détection<br>New PyPI Malware “Pytoileur” Steals Crypto and Evades Detection The package posed as an API management tool and downloaded trojanized Windows binaries]]> 2024-05-29T15:15:00+00:00 https://www.infosecurity-magazine.com/news/pypi-malware-pytoileur-steals/ www.secnews.physaphae.fr/article.php?IdArticle=8509385 False Malware,Tool None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Google étend l'outil de filigrane de contenu synthétique en texte généré par l'IA<br>Google Expands Synthetic Content Watermarking Tool to AI-Generated Text Google DeepMind\'s SynthID can now be used to watermark AI-generated images, audio, text and video]]> 2024-05-15T12:00:00+00:00 https://www.infosecurity-magazine.com/news/google-synthid-ai-text/ www.secnews.physaphae.fr/article.php?IdArticle=8500170 False Tool None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine #RSAC: 70% des entreprises hiérarchisent l'innovation sur la sécurité dans les projets génératifs d'IA<br>#RSAC: 70% of Businesses Prioritize Innovation Over Security in Generative AI Projects An IBM report found that most organizations are exposing themselves to security risks when implementing generative AI tools]]> 2024-05-06T13:15:00+00:00 https://www.infosecurity-magazine.com/news/businesses-innovation-security/ www.secnews.physaphae.fr/article.php?IdArticle=8494623 False Tool None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Gouvernement américain et partenaire OpenSSF sur un nouvel outil de gestion SBOM<br>US Government and OpenSSF Partner on New SBOM Management Tool OpenSSF, in collaboration with the US Government, has developed Protobom, a open source tool designed to simplify SBOM management for organizations]]> 2024-04-17T14:36:00+00:00 https://www.infosecurity-magazine.com/news/us-government-openssf-sbom-tool/ www.secnews.physaphae.fr/article.php?IdArticle=8484182 False Tool None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Apple stimule les alertes spyware pour les attaques mercenaires<br>Apple Boosts Spyware Alerts For Mercenary Attacks The revision points out companies like NSO Group, known for surveillance tools like Pegasus]]> 2024-04-11T16:00:00+00:00 https://www.infosecurity-magazine.com/news/apple-boosts-spyware-alerts/ www.secnews.physaphae.fr/article.php?IdArticle=8480095 False Tool None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les acteurs de la menace chinoise déploient de nouveaux TTP pour exploiter les vulnérabilités ivanti<br>Chinese Threat Actors Deploy New TTPs to Exploit Ivanti Vulnerabilities Mandiant research details how Chinese espionage groups are deploying new tools post-exploitation of recently patched Ivanti vulnerabilities]]> 2024-04-05T14:00:00+00:00 https://www.infosecurity-magazine.com/news/chinese-threat-ttps-ivanti/ www.secnews.physaphae.fr/article.php?IdArticle=8476514 False Tool,Vulnerability,Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Microsoft: 87% des organisations britanniques vulnérables aux cyberattaques coûteuses<br>Microsoft: 87% of UK Organizations Vulnerable to Costly Cyber-Attacks A Microsoft report found that 87% of UK organizations are either vulnerable or at high-risk of cyber-attacks, and urged investment in AI as a security tool]]> 2024-03-18T12:40:00+00:00 https://www.infosecurity-magazine.com/news/microsoft-uk-orgs-vulnerable-cyber/ www.secnews.physaphae.fr/article.php?IdArticle=8466032 False Tool None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Exigences de divulgation oculaire des gouvernements pour les laboratoires de développement de l'IA<br>Governments Eye Disclosure Requirements for AI Development Labs AI scientist Inma Martinez predicts governments will start requiring \'frontier\' AI labs full disclosure on the purpose of the tools they are developing]]> 2024-03-07T14:30:00+00:00 https://www.infosecurity-magazine.com/news/governments-disclosure/ www.secnews.physaphae.fr/article.php?IdArticle=8460356 False Tool None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine GhostSec évolue avec des outils de compromis sur le site Web<br>GhostSec Evolves With Website Compromise Tools Cisco Talos uncovered two new tools developed by the group: the “GhostSec Deep Scan tool” and “GhostPresser”]]> 2024-03-05T16:15:00+00:00 https://www.infosecurity-magazine.com/news/ghostsec-evolves-website/ www.secnews.physaphae.fr/article.php?IdArticle=8459410 False Tool None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine La police sud-coréenne développe un outil de détection DeepFake avant les élections d'avril<br>South Korean Police Develops Deepfake Detection Tool Ahead of April Elections With a claimed 80% efficiency, the new AI detection tool will be used to inform the police during criminal investigations]]> 2024-03-05T15:30:00+00:00 https://www.infosecurity-magazine.com/news/south-korea-police-deepfake/ www.secnews.physaphae.fr/article.php?IdArticle=8459382 False Tool,Legislation None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Hacktivist Collective Noname057 frappe les cibles européennes<br>Hacktivist Collective NoName057 Strikes European Targets Sekoia.io observed developments in the group\'s DDoS tools, including updates enhancing compatibility with different processor architectures and OS]]> 2024-03-04T17:15:00+00:00 https://www.infosecurity-magazine.com/news/hacktivist-collective-noname057/ www.secnews.physaphae.fr/article.php?IdArticle=8458932 False Tool None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Cinq yeux mettent en garde contre l'exploitation des vulnérabilités d'Ivanti, les outils de détection insuffisants<br>Five Eyes Warn of Ivanti Vulnerabilities Exploitation, Detection Tools Insufficient Government agencies from the Five Eyes coalition said that Ivanti\'s own tools are not sufficient to detect compromise]]> 2024-03-01T12:00:00+00:00 https://www.infosecurity-magazine.com/news/five-eyes-warn-ivanti/ www.secnews.physaphae.fr/article.php?IdArticle=8457481 False Tool,Vulnerability None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les problèmes du FBI ont une alerte sur les menaces russes ciblant les routeurs Ubiquiti<br>FBI Issues Alert on Russian Threats Targeting Ubiquiti Routers The routers were hijacked to steal credentials, proxy traffic, and host phishing pages and custom tools]]> 2024-02-28T17:30:00+00:00 https://www.infosecurity-magazine.com/news/fbi-alert-russian-threats-ubiquiti/ www.secnews.physaphae.fr/article.php?IdArticle=8456544 False Tool None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Microsoft, Openai confirment que les États-nations armement une IA générative dans les cyberattaques<br>Microsoft, OpenAI Confirm Nation-States are Weaponizing Generative AI in Cyber-Attacks Microsoft and OpenAI found that nation-state groups are using generative AI tools to support cyber campaigns rather than developing novel attack techniques]]> 2024-02-15T11:43:00+00:00 https://www.infosecurity-magazine.com/news/microsoft-nation-states-gen-ai/ www.secnews.physaphae.fr/article.php?IdArticle=8450382 False Tool None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine AnyDesk frappé par la cyberattaque et la violation des données des clients<br>AnyDesk Hit by Cyber-Attack and Customer Data Breach The cyber-attack that hit the remote tool provider could have a more significant impact than initially expected]]> 2024-02-05T12:15:00+00:00 https://www.infosecurity-magazine.com/news/anydesk-hit-cyberattack-customer/ www.secnews.physaphae.fr/article.php?IdArticle=8446905 False Data Breach,Hack,Tool None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Un nouvel outil identifie Pegasus et d'autres logiciels espions iOS<br>New Tool Identifies Pegasus and Other iOS Spyware Kaspersky experts developed the tool after analyzing Shutdown.log, a file retaining reboot information]]> 2024-01-16T16:30:00+00:00 https://www.infosecurity-magazine.com/news/tool-identifies-pegasus-ios-spyware/ www.secnews.physaphae.fr/article.php?IdArticle=8439603 False Tool None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine L'outil basé sur Python FBOT perturbe la sécurité du cloud<br>Python-Based Tool FBot Disrupts Cloud Security Discovered by the SentinelLabs team, FBot targets web servers, cloud services and SaaS platforms]]> 2024-01-15T16:30:00+00:00 https://www.infosecurity-magazine.com/news/python-tool-fbot-disrupts-cloud/ www.secnews.physaphae.fr/article.php?IdArticle=8439287 False Tool,Cloud None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Black Basta Ransomware Decryptor publié<br>Black Basta Ransomware Decryptor Published Researchers at SRLabs have revealed a new suite of decryption tools for Black Basta ransomware]]> 2024-01-02T09:30:00+00:00 https://www.infosecurity-magazine.com/news/black-basta-ransomware-decryptor/ www.secnews.physaphae.fr/article.php?IdArticle=8432819 False Ransomware,Tool None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les logiciels malveillants du voleur Redline déploient via l'outil d'évasion Scrubcrypt<br>RedLine Stealer Malware Deployed Via ScrubCrypt Evasion Tool The new ScrubCrypt obfuscation tool is designed to avoid antivirus protections]]> 2023-11-30T14:00:00+00:00 https://www.infosecurity-magazine.com/news/redline-stealer-malware-scrubcrypt/ www.secnews.physaphae.fr/article.php?IdArticle=8418068 False Malware,Tool None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine DeepFake Digital Identity Fraud est décuplé, SumSub Report est constaté<br>Deepfake Digital Identity Fraud Surges Tenfold, Sumsub Report Finds AI-powered tools are among the top fraud techniques used by threat actors in 2023, according to Sumsub\'s third annual Identity Fraud Report]]> 2023-11-28T15:15:00+00:00 https://www.infosecurity-magazine.com/news/deepfake-identity-fraud-surges/ www.secnews.physaphae.fr/article.php?IdArticle=8417545 False Tool,Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les cybercriminels hésitent à utiliser l'IA génératrice<br>Cybercriminals Hesitant About Using Generative AI An analysis of dark web forums revealed many threat actors are skeptical about using tools like ChatGPT to launch attacks]]> 2023-11-28T11:40:00+00:00 https://www.infosecurity-magazine.com/news/cyber-criminals-hesitant/ www.secnews.physaphae.fr/article.php?IdArticle=8417485 False Tool,Threat ChatGPT,ChatGPT 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine L'implant de chèvre augmentait le risque de ransomware post-infection<br>GootBot Implant Heightens Risk of Post-Infection Ransomware IBM found Gootloader group opting for GootBot over off-the-shelf tools for lateral movement]]> 2023-11-07T16:30:00+00:00 https://www.infosecurity-magazine.com/news/gootbot-heightens-risk-of-post/ www.secnews.physaphae.fr/article.php?IdArticle=8407350 False Ransomware,Tool None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine # ISC2Congress: Génératif Ai une aubaine pour les organisations malgré les risques, disent les experts<br>#ISC2Congress: Generative AI A Boon for Organizations Despite the Risks, Experts Say Experts highlighted the ways generative AI tools can help security teams, and how to mitigate the risks they pose]]> 2023-10-27T11:30:00+00:00 https://www.infosecurity-magazine.com/news/generative-ai-a-boon-for/ www.secnews.physaphae.fr/article.php?IdArticle=8401400 False Tool None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Ransomware cible les serveurs WS_FTP non corrigés<br>Ransomware Targets Unpatched WS_FTP Servers The threat actors attempted to escalate privileges using the open-source GodPotato tool]]> 2023-10-16T15:30:00+00:00 https://www.infosecurity-magazine.com/news/ransomware-targets-unpatched-wsftp/ www.secnews.physaphae.fr/article.php?IdArticle=8396277 False Ransomware,Tool,Threat None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Bunnyloader malware cible les navigateurs et la crypto-monnaie<br>BunnyLoader Malware Targets Browsers and Cryptocurrency Coded in C/C++, the tool is a fileless loader that conducts malicious activities in memory]]> 2023-10-02T15:00:00+00:00 https://www.infosecurity-magazine.com/news/bunnyloader-targets-browsers-crypto/ www.secnews.physaphae.fr/article.php?IdArticle=8390530 False Malware,Tool None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les cybercriminels «jailbreak» AI chatbots pour les fins malveillantes<br>Cyber-criminals “Jailbreak” AI Chatbots For Malicious Ends SlashNext research shows that most of these tools connect to jailbroken versions of public chatbots]]> 2023-09-12T15:00:00+00:00 https://www.infosecurity-magazine.com/news/cybercriminals-jailbreak-ai/ www.secnews.physaphae.fr/article.php?IdArticle=8381847 False Tool None 1.00000000000000000000 InfoSecurity Mag - InfoSecurity Magazine Outil d'émulation d'attaque à libération d'attaque et de CISA et CISA<br>MITRE and CISA Release OT Attack Emulation Tool The open source tool will enable cyber teams to consistently test and boost the defenses of ICS environments]]> 2023-09-06T15:00:00+00:00 https://www.infosecurity-magazine.com/news/mitre-cisa-ot-attack-emulation-tool/ www.secnews.physaphae.fr/article.php?IdArticle=8379666 False Tool,Industrial None 4.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Des robots AI trompeurs répartissent les logiciels malveillants, soulèvent des problèmes de sécurité<br>Deceptive AI Bots Spread Malware, Raise Security Concerns ESET said Facebook promoted the download of what seemed to be Google\'s Bard AI tool]]> 2023-08-21T16:30:00+00:00 https://www.infosecurity-magazine.com/news/deceptive-ai-bots-spread-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8372801 False Tool None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Cuba Ransomware Group vole les informations d'identification via Veeam Exploit<br>Cuba Ransomware Group Steals Credentials Via Veeam Exploit Russian gang operates comprehensive set of attack tools]]> 2023-08-21T08:30:00+00:00 https://www.infosecurity-magazine.com/news/cuba-credentials-veeam-exploit/ www.secnews.physaphae.fr/article.php?IdArticle=8372660 False Ransomware,Tool None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les marchés Web sombres offrent un nouvel outil Fraudegpt AI<br>Dark Web Markets Offer New FraudGPT AI Tool The tool can craft phishing emails, create undetectable malware and identify vulnerable sites]]> 2023-07-26T15:05:00+00:00 https://www.infosecurity-magazine.com/news/dark-web-markets-fraudgpt-ai-tool/ www.secnews.physaphae.fr/article.php?IdArticle=8361750 False Malware,Tool None 1.00000000000000000000 InfoSecurity Mag - InfoSecurity Magazine L'outil AI Wormpt permet de convaincre les faux e-mails pour les attaques BEC<br>AI Tool WormGPT Enables Convincing Fake Emails For BEC Attacks Security expert Daniel Kelley worked with the SlashNext team on the research]]> 2023-07-14T16:30:00+00:00 https://www.infosecurity-magazine.com/news/wormgpt-fake-emails-bec-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8356613 False Tool None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Un nouvel outil aide les développeurs à vérifier les décalages de confusion manifestes<br>New Tool Helps Devs Check For Manifest Confusion Mismatches Python script could minimize risk until a formal solution is developed]]> 2023-07-05T09:00:00+00:00 https://www.infosecurity-magazine.com/news/tool-devs-check-manifest-confusion/ www.secnews.physaphae.fr/article.php?IdArticle=8352381 False Tool None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Trois vulnérabilités découvertes dans Game Dev Tool RenderDoc<br>Three Vulnerabilities Discovered in Game Dev Tool RenderDoc Qualys identified one instance of privilege escalation and two heap-based buffer overflows]]> 2023-06-06T17:05:00+00:00 https://www.infosecurity-magazine.com/news/vulnerabilities-discovered/ www.secnews.physaphae.fr/article.php?IdArticle=8342648 False Tool None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Kaspersky libère l'outil pour détecter les attaques iOS zéro cliquez sur zéro<br>Kaspersky Releases Tool to Detect Zero-Click iOS Attacks Fallout from Operation Triangulation continues]]> 2023-06-06T09:10:00+00:00 https://www.infosecurity-magazine.com/news/kaspersky-tool-detect-zeroclick/ www.secnews.physaphae.fr/article.php?IdArticle=8342454 False Tool None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine "Greatness" Phishing Tool Exploits Microsoft 365 Credentials The findings come from security researchers at Cisco Talos]]> 2023-05-11T15:30:00+00:00 https://www.infosecurity-magazine.com/news/greatness-phishing-exploits/ www.secnews.physaphae.fr/article.php?IdArticle=8335683 False Tool None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Emotet grimpe mars 2023 \\ la liste des logiciels malveillants le plus recherché avec la campagne OneNote<br>Emotet Climbs March 2023\\'s Most Wanted Malware List With OneNote Campaign The malicious software tool is now second on the list, one spot up from February\'s report]]> 2023-04-12T15:30:00+00:00 https://www.infosecurity-magazine.com/news/emotet-climbs-march-2023s-wanted/ www.secnews.physaphae.fr/article.php?IdArticle=8327119 False Malware,Tool None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine NOUVEAU RORSCHWAGE "RORSCHACH" via un produit commercial<br>New "Rorschach" Ransomware Spread Via Commercial Product The ransomware strain uses a signed component of the Palo Alto Cortex XDR Dump Service Tool]]> 2023-04-04T16:00:00+00:00 https://www.infosecurity-magazine.com/news/rorschach-spread-commercial/ www.secnews.physaphae.fr/article.php?IdArticle=8324739 False Ransomware,Tool None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine NCSC Calms Fears Over ChatGPT Threat 2023-03-16T10:30:00+00:00 https://www.infosecurity-magazine.com/news/ncsc-calms-fears-chatgpt/ www.secnews.physaphae.fr/article.php?IdArticle=8319100 False Tool,Threat ChatGPT,ChatGPT 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Just 10% of Firms Can Resolve Cloud Threats in an Hour 2023-03-07T13:15:00+00:00 https://www.infosecurity-magazine.com/news/10-firms-resolve-cloud-threats-hour/ www.secnews.physaphae.fr/article.php?IdArticle=8316297 False Tool,Cloud None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine CISA Releases Recovery Tool for VMware Ransomware Victims 2023-02-08T10:00:00+00:00 https://www.infosecurity-magazine.com/news/cisa-releases-recovery-vmware/ www.secnews.physaphae.fr/article.php?IdArticle=8308192 False Ransomware,Tool,Threat None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Hackers Deploy Open-Source Tool Sliver C2, Replacing Cobalt Strike, Metasploit 2023-01-23T18:00:00+00:00 https://www.infosecurity-magazine.com/news/hackers-deploy-open-source-tool/ www.secnews.physaphae.fr/article.php?IdArticle=8303452 False Tool None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine New Phishing Campaign Impersonates Flipper Zero to Target Cyber Professionals 2023-01-04T14:15:00+00:00 https://www.infosecurity-magazine.com/news/phishing-campaign-uses-flipper-zero/ www.secnews.physaphae.fr/article.php?IdArticle=8297829 False Tool,Threat None 4.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine New Google Tool Helps Devs Root Out Open Source Bugs 2022-12-14T10:30:00+00:00 https://www.infosecurity-magazine.com/news/new-google-tool-devs-open-source/ www.secnews.physaphae.fr/article.php?IdArticle=8291149 False Tool None 1.00000000000000000000