www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-17T01:24:59+00:00 www.secnews.physaphae.fr Securonix - Siem AI-Renforced: Le moteur alimentait la révolution des cyberops Securonix<br>AI-Reinforced: The Engine Powering the Securonix CyberOps Revolution The rise of AI-powered attacks presents a significant challenge. Adversaries are wielding machine learning to automate tasks, craft hyper-realistic phishing lures, and develop self-propagating malware. Traditional security, reliant on manual analysis and signature-based detection, is simply outmatched. Read More.]]> 2024-04-25T12:58:17+00:00 https://www.securonix.com/blog/ai-reinforced-the-engine-powering-the-securonix-cyberops-revolution/ www.secnews.physaphae.fr/article.php?IdArticle=8488639 False Malware None 2.0000000000000000 Securonix - Siem Analyse de Dev # Popper: Nouvelle campagne d'attaque ciblant les développeurs de logiciels probablement associés aux acteurs de la menace nord-coréenne<br>Analysis of DEV#POPPER: New Attack Campaign Targeting Software Developers Likely Associated With North Korean Threat Actors The Securonix Threat Research Team has been monitoring an ongoing social engineering attack campaign from North Korean threat actors who are targeting developers using fake interviews to deliver a Python-based RAT. Read more.]]> 2024-04-25T10:30:17+00:00 https://www.securonix.com/blog/analysis-of-devpopper-new-attack-campaign-targeting-software-developers-likely-associated-with-north-korean-threat-actors/ www.secnews.physaphae.fr/article.php?IdArticle=8488593 False Threat None 2.0000000000000000 Securonix - Siem Securonix Threat Research Security Advisory: Analyse de la campagne Frozen # Frozen # Shadow Attack Tirageant le logiciel malveillant SSLoad et RMM pour la prise de contrôle du domaine<br>Securonix Threat Research Security Advisory: Analysis of Ongoing FROZEN#SHADOW Attack Campaign Leveraging SSLoad Malware and RMM Software for Domain Takeover The Securonix Threat Research team (STR) observed an interesting attack campaign dubbed FROZEN#SHADOW which leveraged SSLoad malware and Cobalt Strike implants resulting in the attackers being able to pivot and take over the entire network domain. Read more.]]> 2024-04-24T08:45:12+00:00 https://www.securonix.com/blog/securonix-threat-research-security-advisory-frozenshadow-attack-campaign/ www.secnews.physaphae.fr/article.php?IdArticle=8487996 False Malware,Threat None 3.0000000000000000 Securonix - Siem Au-delà du bruit: la sécurité sans friction habilite les analystes cyberops<br>Beyond the Noise: Frictionless Security Empowers CyberOps Analysts Frictionless Security is the silent weapon that empowers security analysts to navigate the ever-evolving threat landscape with laser focus and reduced noise. The relentless barrage of false positives is a major source of friction for analysts. Frictionless Security leverages AI to tune the SIEM, filter out false positives and prioritize only high priority legitimate threats. No more endless alert triaging – analysts can focus on the high-priority alerts that demand immediate attention.]]> 2024-04-17T13:16:42+00:00 https://www.securonix.com/blog/beyond-the-noise-frictionless-security-empowers-cyberops-analysts/ www.secnews.physaphae.fr/article.php?IdArticle=8484287 False Threat None 2.0000000000000000 Securonix - Siem Présentation de la sécurité simplifiée: Securonix dévoile les nouveaux prix et l'emballage à plusieurs niveaux<br>Introducing Simplified Security: Securonix Unveils New Pricing and Tiered Packaging Pricing models have always been a common source of debate for SIEM solutions. That\'s why we listened to the feedback from prospects and customers and are evolving how we charge for our product. As of April 1st, we have switched to a GB/Day pricing structure and tiered packaging options, aligning with industry standards and your preferences. We\'re committed to simplicity, so we\'re keeping pricing low while eliminating any unnecessary complexity. Additionally, our revamped packaging offers you more flexibility and cost savings through carefully crafted bundles.]]> 2024-04-12T08:00:33+00:00 https://www.securonix.com/blog/introducing-simplified-security-securonix-unveils-new-pricing-and-tiered-packaging/ www.secnews.physaphae.fr/article.php?IdArticle=8480736 False None None 2.0000000000000000 Securonix - Siem Securonix Threat Research Knowleas Shart Series: détection des techniques de téléchargement de la DLL trouvées dans les récentes chaînes d'attaque malveillantes du monde réel<br>Securonix Threat Research Knowledge Sharing Series: Detecting DLL Sideloading Techniques Found In Recent Real-world Malware Attack Chains The Securonix Threat Research team takes a deep dive into this article in our knowledge sharing series on detecting DLL sideloading techniques found In recent real-world malware attack chains]]> 2024-04-11T08:00:24+00:00 https://www.securonix.com/blog/detecting-dll-sideloading-techniques-in-malware-attack-chains/ www.secnews.physaphae.fr/article.php?IdArticle=8480009 False Malware,Threat None 3.0000000000000000 Securonix - Siem Silos brillants avec un cyber maill, l'épine dorsale des cyberopes renforcés AI<br>Shattering Silos With Cyber Mesh, the Backbone of AI-Reinforced CyberOps Cyber Mesh is not just about integration, it\'s about fostering an intelligent ecosystem where security tools work together like a well-oiled machine, powered by the insights gleaned from AI and machine learning.]]> 2024-04-10T10:32:57+00:00 https://www.securonix.com/blog/shattering-silos-with-cyber-mesh-the-backbone-of-ai-reinforced-cyberops/ www.secnews.physaphae.fr/article.php?IdArticle=8479397 False Tool None 3.0000000000000000 Securonix - Siem Securonix Threat Labs Monthly Intelligence Insights & # 8211;Mars 2024<br>Securonix Threat Labs Monthly Intelligence Insights – March 2024 Securonix Threat Labs Monthly Intelligence Insights March 2024 provides a summary of top threats curated, monitored, and analyzed by Securonix Threat Labs.]]> 2024-04-09T08:00:06+00:00 https://www.securonix.com/blog/securonix-threat-labs-monthly-intelligence-insights-march-2024/ www.secnews.physaphae.fr/article.php?IdArticle=8478682 False Threat None 3.0000000000000000 Securonix - Siem Bias de rupture: explorer le rôle de l'UEBA dans la gestion éthique des menaces d'initiés<br>Breaking Bias: Exploring UEBA’s Role in Ethical Insider Threat Management In DevOps, compliance ensures that software development and delivery are secure and trustworthy. And to ensure companies follow compliance regulations, audits are performed by external vendors (usually, but companies may have internal audits as well). Compliance involves adhering to established security policies, regulatory requirements, and industry standards throughout the development lifecycle.]]> 2024-04-08T12:40:33+00:00 https://www.securonix.com/blog/breaking-bias-with-ueba/ www.secnews.physaphae.fr/article.php?IdArticle=8478227 False Threat None 2.0000000000000000 Securonix - Siem Q1 2024 Jalons: ce qui est nouveau à Securonix<br>Q1 2024 Milestones: What\\'s New at Securonix In DevOps, compliance ensures that software development and delivery are secure and trustworthy. And to ensure companies follow compliance regulations, audits are performed by external vendors (usually, but companies may have internal audits as well). Compliance involves adhering to established security policies, regulatory requirements, and industry standards throughout the development lifecycle.]]> 2024-04-04T12:31:12+00:00 https://www.securonix.com/blog/q1-milestones/ www.secnews.physaphae.fr/article.php?IdArticle=8476019 False None None 2.0000000000000000 Securonix - Siem De SOC à Cyber OPS: comment l'IA révolutionne les opérations de sécurité<br>From SOC to Cyber Ops: How AI is Revolutionizing Security Operations In DevOps, compliance ensures that software development and delivery are secure and trustworthy. And to ensure companies follow compliance regulations, audits are performed by external vendors (usually, but companies may have internal audits as well). Compliance involves adhering to established security policies, regulatory requirements, and industry standards throughout the development lifecycle.]]> 2024-04-03T12:55:39+00:00 https://www.securonix.com/blog/soc-to-cyber-ops-ai/ www.secnews.physaphae.fr/article.php?IdArticle=8478683 False None None 2.0000000000000000 Securonix - Siem Cybersecurity Symphony: Securonix ajoute des capacités de soar intégrées<br>Cybersecurity Symphony: Securonix Adds Embedded SOAR Capabilities In DevOps, compliance ensures that software development and delivery are secure and trustworthy. And to ensure companies follow compliance regulations, audits are performed by external vendors (usually, but companies may have internal audits as well). Compliance involves adhering to established security policies, regulatory requirements, and industry standards throughout the development lifecycle.]]> 2024-04-01T15:54:33+00:00 https://www.securonix.com/blog/embedded-soar-capabilities/ www.secnews.physaphae.fr/article.php?IdArticle=8474214 False None None 2.0000000000000000 Securonix - Siem Securonix Threat Research Security Advisory: Analyse de la nouvelle campagne d'attaque de la nouvelle # GOSU probablement associée au nord-coréen Kimsuky ciblant les victimes avec des logiciels malveillants furtifs<br>Securonix Threat Research Security Advisory: Analysis of New DEEP#GOSU Attack Campaign Likely Associated with North Korean Kimsuky Targeting Victims with Stealthy Malware The Securonix Threat Research team has uncovered an elaborate multi-stage attack campaign dubbed DEEP#GOSU likely associated with the North Korean Kimsuky group.]]> 2024-03-18T09:00:49+00:00 https://www.securonix.com/blog/securonix-threat-research-security-advisory-new-deepgosu-attack-campaign/ www.secnews.physaphae.fr/article.php?IdArticle=8466086 False Malware,Threat None 3.0000000000000000 Securonix - Siem Securonix Threat Labs Monthly Intelligence Insights & # 8211;Février 2024<br>Securonix Threat Labs Monthly Intelligence Insights – February 2024 Securonix Threat Labs Monthly Intelligence Insights February 2024 provides a summary of top threats curated, monitored, and analyzed by Securonix Threat Labs.]]> 2024-03-14T08:00:30+00:00 https://www.securonix.com/blog/securonix-threat-labs-monthly-intelligence-insights-february-2024/ www.secnews.physaphae.fr/article.php?IdArticle=8463786 False Threat None 2.0000000000000000 Securonix - Siem La perspective d'un praticien de DevOps: conformité régulière et audits<br>A Practitioner\\'s Perspective of DevOps: Regular Compliance and Audits In DevOps, compliance ensures that software development and delivery are secure and trustworthy. And to ensure companies follow compliance regulations, audits are performed by external vendors (usually, but companies may have internal audits as well). Compliance involves adhering to established security policies, regulatory requirements, and industry standards throughout the development lifecycle.]]> 2024-03-12T06:00:57+00:00 https://www.securonix.com/blog/a-practitioners-perspective-of-devops-regular-compliance-and-audits/ www.secnews.physaphae.fr/article.php?IdArticle=8462587 False None None 2.0000000000000000 Securonix - Siem Happy International Women & # 8217; S de Securonix<br>Happy International Women’s Day from Securonix AI has become a critical weapon in the fight against ever-evolving threats. But the narrative that AI is some new silver bullet in security misses the mark. At Securonix, we\'ve been harnessing the power of AI for over a decade, quietly refining our approach and weaving it into the very fabric of our DNA as a company. Our AI mission is to arm the SOC of the future, what we are calling Cyber Ops, with the weapons and defenses they need to stave off the next generation of cyber attacks.  ]]> 2024-03-08T11:10:46+00:00 https://www.securonix.com/blog/international-womens-day/ www.secnews.physaphae.fr/article.php?IdArticle=8460902 False None None 2.0000000000000000 Securonix - Siem Securonix Threat Research Knowledge Sharing Series: Lot (DOS) Obfuscation ou Dosfusccation: pourquoi il est en augmentation, et comment les attaquants se cachent dans l'obscurité<br>Securonix Threat Research Knowledge Sharing Series: Batch (DOS) Obfuscation or DOSfuscation: Why It\\'s on the Rise, and How Attackers are Hiding in Obscurity Securonix Threat Research has been monitoring a trend known as batch (DOS) fuscation or DOSfuscation where an increased number of malware samples use obfuscated code contained within batch or DOS-based scripts. This trend was likely brought about when Microsoft made the decision to disable macro execution in Office products by default. Since then, there has been a rise in shortcut-based (.lnk file) execution coming from archived email attachments. Naturally, CMD obfuscation is the natural path as any passed in command line into a shortcut file will likely be primarily executed using cmd.exe as the initial process]]> 2024-02-28T10:30:36+00:00 https://www.securonix.com/blog/securonix-threat-research-knowledge-sharing-series-batch-obfuscation/ www.secnews.physaphae.fr/article.php?IdArticle=8456508 False Malware,Threat,Prediction None 3.0000000000000000 Securonix - Siem De l'IA pionnier au visionnaire: Securonix trace le cours pour les cyber-opérations de 2025<br>From AI Pioneer to Visionary: Securonix Charts the Course for the Cyber Ops of 2025 AI has become a critical weapon in the fight against ever-evolving threats. But the narrative that AI is some new silver bullet in security misses the mark. At Securonix, we\'ve been harnessing the power of AI for over a decade, quietly refining our approach and weaving it into the very fabric of our DNA as a company. Our AI mission is to arm the SOC of the future, what we are calling Cyber Ops, with the weapons and defenses they need to stave off the next generation of cyber attacks.  ]]> 2024-02-27T11:00:25+00:00 https://www.securonix.com/blog/ai-pioneer-and-visionary-securonix-envisions-cyber-ops-of-2025/ www.secnews.physaphae.fr/article.php?IdArticle=8455978 False None None 2.0000000000000000 Securonix - Siem La perspective d'un praticien de DevOps: Garder les systèmes à jour<br>A Practitioner\\'s Perspective of DevOps: Keeping Systems Updated The three pillars of DevOps are continuous security, keeping systems updated, and regular compliance audits. This post focuses on the second, keeping systems updated. For those new to DevOps and security, keep in mind that the culture and processes will be drastically different from traditional software development, with more integration across teams so that security is practiced in a more proactive manner.]]> 2024-02-21T10:45:31+00:00 https://www.securonix.com/blog/a-practitioners-perspective-of-devops-keeping-systems-updated/ www.secnews.physaphae.fr/article.php?IdArticle=8453269 False General Information None 2.0000000000000000 Securonix - Siem Migrer sans la migraine vers Securonix<br>Migrate Without the Migraine to Securonix The good news is that you aren\'t locked in to your legacy SIEM solution and switching to Securonix is easier than you may think. Securonix offers robust log management and industry-leading AI and analytics in a unified experience with the flexibility to play nice with other complementary solutions.]]> 2024-02-16T10:00:39+00:00 https://www.securonix.com/blog/migrate-without-the-migraine-to-securonix/ www.secnews.physaphae.fr/article.php?IdArticle=8450999 False None None 3.0000000000000000 Securonix - Siem Securonix Hackathon: construire l'avenir de la sécurité, ensemble<br>Securonix Hackathon: Building the Future of Security, Together Securonix has always believed in pushing the boundaries of security. It\'s not just what we do, it\'s who we are. And what better way to spark groundbreaking ideas than a company-wide hackathon? From January 2nd to 5th, the Securonix Engineering family, spanning across teams, time zones, and continents, came together in a collaborative display of innovation.]]> 2024-02-13T11:00:49+00:00 https://www.securonix.com/blog/securonix-hackathon-2024/ www.secnews.physaphae.fr/article.php?IdArticle=8449638 False None None 2.0000000000000000 Securonix - Siem Securonix Threat Labs Monthly Intelligence Insights & # 8211;Janvier 2024<br>Securonix Threat Labs Monthly Intelligence Insights – January 2024 Securonix Threat Labs Monthly Intelligence Insights January 2024 provides a summary of top threats curated, monitored, and analyzed by Securonix Threat Labs.]]> 2024-02-08T10:00:38+00:00 https://www.securonix.com/blog/securonix-threat-labs-monthly-intelligence-insights-january-2024/ www.secnews.physaphae.fr/article.php?IdArticle=8448069 False Threat None 2.0000000000000000 Securonix - Siem 70% des organisations ne sont pas préparées et comment les technologies avancées peuvent aider<br>70% of Organizations Feel Unprepared and How Advanced Technologies Can Help Over 70% of respondents of organizations feel that they lack the right tools to protect their sensitive information and systems from insider threats. These statistics are just not alarming; it\'s a call for a deeper understanding and strategic response to an often overlooked aspect of cybersecurity.]]> 2024-02-06T11:00:33+00:00 https://www.securonix.com/blog/70-of-organizations-feel-unprepared-how-advanced-technologies-can-help/ www.secnews.physaphae.fr/article.php?IdArticle=8447348 False Tool None 2.0000000000000000 Securonix - Siem Securonix Threat Research Security Advisory: Analyse et détection de la campagne d'attaque stable # URSA ciblant Ukraine Military abandonnant de nouveaux PowerShell de PowerShell de nouveaux pattes<br>Securonix Threat Research Security Advisory: Analysis and Detection of STEADY#URSA Attack Campaign Targeting Ukraine Military Dropping New Covert SUBTLE-PAWS PowerShell Backdoor Securonix Threat Research Security Advisory: Analysis and Detection of STEADY#URSA Attack Campaign Targeting Ukraine Military Dropping New Covert SUBTLE-PAWS PowerShell Backdoor]]> 2024-02-01T06:00:00+00:00 https://www.securonix.com/blog/security-advisory-steadyursa-attack-campaign-targets-ukraine-military/ www.secnews.physaphae.fr/article.php?IdArticle=8445539 False Threat None 3.0000000000000000 Securonix - Siem Quantaiverse & # 8211;Une perspective de menace d'initié<br>QuantAIverse – An Insider Threat Perspective QuantAIverse – An Insider Threat Perspective The ever-evolving world of technology continues to shape and redefine the cybersecurity landscape. Emerging technologies, like AI, the Metaverse, and quantum computing, are changing how we interact with digital environments and introducing new challenges in managing insider threats.]]> 2024-01-31T10:00:03+00:00 https://www.securonix.com/blog/quantaiverse-an-insider-threat-perspective/ www.secnews.physaphae.fr/article.php?IdArticle=8445236 False Threat None 3.0000000000000000 Securonix - Siem La perspective d'un praticien de DevOps: Sécurité continue<br>A Practitioner\\'s Perspective of DevOps: Continuous Security A Practitioner\'s Perspective of DevOps: Continuous Security]]> 2024-01-30T10:00:37+00:00 https://www.securonix.com/blog/devops-and-continuous-security/ www.secnews.physaphae.fr/article.php?IdArticle=8444845 False None None 1.00000000000000000000 Securonix - Siem Securonix Threat Research Security Advisory: Analyse technique et détection de deux vulnérabilités zéro-jours dans Ivanti Connect Secure VPN<br>Securonix Threat Research Security Advisory: Technical Analysis and Detection of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN Securonix Threat Research Security Advisory: Technical Analysis and Detection of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN]]> 2024-01-26T09:00:54+00:00 https://www.securonix.com/blog/securonix-threat-research-security-advisory-technical-analysis-and-detection-of-two-zero-day-vulnerabilities-in-ivanti-connect-secure-vpn/ www.secnews.physaphae.fr/article.php?IdArticle=8443435 False Vulnerability,Threat,Technical None 2.0000000000000000 Securonix - Siem Comprendre les perceptions changeantes des menaces d'initiés sur les cyberattaques externes<br>Understanding the Shifting Perceptions of Insider Threats Over External Cyber Attacks Understanding the Shifting Perceptions of Insider Threats Over External Cyber Attacks. The new 2024 Insider Threat Report, published by Cybersecurity Insiders and commissioned by Securonix, found that 53% of cybersecurity professionals believe insider attacks are more difficult to detect and prevent than external cyber-attacks.]]> 2024-01-24T09:00:12+00:00 https://www.securonix.com/blog/shifting-perceptions-of-insider-threats-vs-external-cyber-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8442564 False Threat None 2.0000000000000000 Securonix - Siem 2023 en revue: c'est un enveloppe!<br>2023 In Review: It\\'s a Wrap!  2023 saw broad changes to the threat landscape and how SOC teams detect and mitigate threats. Securonix saw increased data needs, the rise of generative AI and integrated automation as top trends in 2023.]]> 2024-01-17T08:00:06+00:00 https://www.securonix.com/blog/securonix-2023-in-review/ www.secnews.physaphae.fr/article.php?IdArticle=8439898 False Threat None 3.0000000000000000 Securonix - Siem Securonix Threat Research Knowleas Shart Series: sur la détection d'attaques réelles impliquant des comportements RMM utilisant Securonix<br>Securonix Threat Research Knowledge Sharing Series: On Detecting Real-world Attacks Involving RMM Behaviors Using Securonix Securonix Threat Research Knowledge Sharing Series: On Detecting Real-world Attacks Involving RMM Behaviors Using Securonix]]> 2024-01-16T08:00:29+00:00 https://www.securonix.com/blog/securonix-threat-research-knowledge-sharing-series-detecting-rmm-behaviors/ www.secnews.physaphae.fr/article.php?IdArticle=8439560 False Threat None 3.0000000000000000 Securonix - Siem Securonix Threat Labs Monthly Intelligence Insights & # 8211;Décembre 2023<br>Securonix Threat Labs Monthly Intelligence Insights – December 2023 Securonix Threat Labs Monthly Intelligence Insights December 2023 provides a summary of top threats curated, monitored, and analyzed by Securonix Threat Labs.]]> 2024-01-11T08:00:14+00:00 https://www.securonix.com/blog/securonix-threat-labs-monthly-intelligence-insights-december-2023/ www.secnews.physaphae.fr/article.php?IdArticle=8437886 False Threat None 3.0000000000000000 Securonix - Siem Securonix Threat Research Security Advisory: New Re # Turncence Attack Campaign: les pirates turcs ciblent les serveurs MSSQL pour fournir un ransomware de mimique à l'échelle du domaine<br>Securonix Threat Research Security Advisory: New RE#TURGENCE Attack Campaign: Turkish Hackers Target MSSQL Servers to Deliver Domain-Wide MIMIC Ransomware Securonix Threat Research Security Advisory: New RE#TURGENCE Attack Campaign: Turkish Hackers Target MSSQL Servers to Deliver Domain-Wide MIMIC Ransomware]]> 2024-01-09T05:30:27+00:00 https://www.securonix.com/blog/securonix-threat-research-security-advisory-new-returgence-attack-campaign-turkish-hackers-target-mssql-servers-to-deliver-domain-wide-mimic-ransomware/ www.secnews.physaphae.fr/article.php?IdArticle=8437088 False Ransomware,Threat None 3.0000000000000000 Securonix - Siem Le meilleur du blog Securonix<br>The Best of the Securonix Blog The Best of the Securonix Blog, top blog posts in 2023. advisories, product news, thought leadership, timely information]]> 2023-12-26T13:00:17+00:00 https://www.securonix.com/blog/the-best-of-the-securonix-blog/ www.secnews.physaphae.fr/article.php?IdArticle=8429436 False Commercial None 2.0000000000000000 Securonix - Siem Les périls de la sur-consolidation en cybersécurité: leçons de la Terre du Milieu de Tolkien<br>The Perils of Over-Consolidation in Cybersecurity: Lessons from Tolkien’s Middle-Earth The Perils of Over-Consolidation in Cybersecurity: Lessons from Tolkien\'s Middle-Earth]]> 2023-12-20T09:30:36+00:00 https://www.securonix.com/blog/the-perils-of-over-consolidation-in-cybersecurity/ www.secnews.physaphae.fr/article.php?IdArticle=8426168 False Studies None 4.0000000000000000 Securonix - Siem Securonix 2024 Prédictions de cybersécurité<br>Securonix 2024 Cybersecurity Predictions Securonix 2024 Cybersecurity Predictions. Our experts reflected on what we learned in 2023, and shared their thoughts in this forecast on the trends, challenges and opportunities that lie ahead in 2024.]]> 2023-12-12T11:00:02+00:00 https://www.securonix.com/blog/securonix-2024-cybersecurity-predictions/ www.secnews.physaphae.fr/article.php?IdArticle=8421604 False Prediction None 3.0000000000000000 Securonix - Siem Securonix Threat Labs Monthly Intelligence Insights & # 8211;Novembre 2023<br>Securonix Threat Labs Monthly Intelligence Insights – November 2023 The Monthly Intelligence Insights provides a summary of top threats curated, monitored, and analyzed by Securonix Threat Labs in November.]]> 2023-12-07T11:00:21+00:00 https://www.securonix.com/blog/securonix-threat-labs-monthly-intelligence-insights-november-2023/ www.secnews.physaphae.fr/article.php?IdArticle=8419948 False Threat None 2.0000000000000000 Securonix - Siem Choisissez votre mode<br>Choose Your Mode Choose between light and dark mode for your Securonix interface.]]> 2023-11-22T11:00:35+00:00 https://www.securonix.com/blog/choose-your-mode/ www.secnews.physaphae.fr/article.php?IdArticle=8415986 False None None 2.0000000000000000 Securonix - Siem Les alternatives SIEM<br>The SIEM Alternatives Fallacies The SIEM Alternatives Fallacies by Augusto Barros]]> 2023-11-21T09:00:36+00:00 https://www.securonix.com/blog/the-siem-alternatives-fallacies/ www.secnews.physaphae.fr/article.php?IdArticle=8415431 False None None 3.0000000000000000 Securonix - Siem Nouvelle campagne d'attaque SEO # Lurker: les acteurs de la menace utilisent l'empoisonnement du référencement et les fausses publicités Google pour attirer les victimes d'installation<br>New SEO#LURKER Attack Campaign: Threat Actors Use SEO Poisoning and Fake Google Ads to Lure Victims Into Installing Malware An ongoing SEO poisoning/malvertising campaign leveraging WinSCP lures along with a stealthy  infection chain lures victims into installing malware (alongside the legitimate WinSCP software). Attackers are likely leveraging dynamic search ads which let threat actors inject their own malicious code while mimicking legitimate sources like Google search pages.]]> 2023-11-16T15:00:01+00:00 https://www.securonix.com/blog/new-seolurker-attack-campaign-threat-actors-use-seo-poisoning-and-fake-google-ads-to-lure-victims-into-installing-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8413052 False Malware,Threat None 3.0000000000000000 Securonix - Siem New SEO#LURKER Attack Campaign: Threat Actors Use SEO Poisoning and Fake Google Ads to Lure Victims Into Installing Malware An ongoing SEO poisoning/malvertising campaign leveraging WinSCP lures along with a stealthy  infection chain lures victims into installing malware (alongside the legitimate WinSCP software). Attackers are likely leveraging dynamic search ads which let threat actors inject their own malicious code while mimicking legitimate sources like Google search pages.]]> 2023-11-16T15:00:01+00:00 https://www.securonix.com/blog/seolurker-attack-campaign-uses-seo-poisoning-fake-google-ads-to-install-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8415432 False Malware,Threat None 3.0000000000000000 Securonix - Siem Securonix Threat Labs Monthly Intelligence Insights & # 8211;Octobre 2023<br>Securonix Threat Labs Monthly Intelligence Insights – October 2023 The Monthly Intelligence Insights provides a summary of top threats curated, monitored, and analyzed by Securonix Threat Labs in October. The report additionally provides a synopsis of the threats; indicators of compromise (IoCs); tactics, techniques, and procedures (TTPs); and related tags. Read the latest from the team about Exploitation of Atlassian Confluence CVE-2023-22515. WinRAR vulnerability, Critical vulnerabilities in WS_FTP exploited, attacks on governments.]]> 2023-11-08T06:00:27+00:00 https://www.securonix.com/blog/securonix-threat-labs-monthly-intelligence-insights-october-2023/ www.secnews.physaphae.fr/article.php?IdArticle=8407835 False Vulnerability,Threat None 2.0000000000000000 Securonix - Siem Maximiser la sécurité du cloud: la puissance de Securonix + Wiz.io<br>Maximizing Cloud Security: The Power of Securonix + Wiz.io Bridging the Gap – Understanding and Mitigating Insider Threats Through Conversations ]]> 2023-11-07T06:00:23+00:00 https://www.securonix.com/blog/maximizing-cloud-security-the-power-of-securonix-wiz-io/ www.secnews.physaphae.fr/article.php?IdArticle=8407223 False Cloud,Commercial None 2.0000000000000000 Securonix - Siem Combler l'écart & # 8211;Comprendre et atténuer les menaces d'initiés à travers les conversations<br>Bridging the Gap – Understanding and Mitigating Insider Threats Through Conversations  Bridging the Gap – Understanding and Mitigating Insider Threats Through Conversations ]]> 2023-10-16T17:23:12+00:00 https://www.securonix.com/blog/bridging-the-gap-understanding-and-mitigating-insider-threats-through-conversations/ www.secnews.physaphae.fr/article.php?IdArticle=8397711 False None None 2.0000000000000000 Securonix - Siem Conseil de sécurité des laboratoires de menace: Nouvelle campagne d'attaque Stark # Vortex: les acteurs de la menace utilisent des leurres manuels de drones pour livrer des charges utiles de Merlinagent<br>Threat Labs Security Advisory: New STARK#VORTEX Attack Campaign: Threat Actors Use Drone Manual Lures to Deliver MerlinAgent Payloads Securonix Threat Labs Security Advisory: New STARK#VORTEX Attack Campaign: Threat Actors Use Drone Manual Lures to Deliver MerlinAgent Payloads]]> 2023-10-06T18:13:06+00:00 https://www.securonix.com/blog/threat-labs-security-advisory-new-starkvortex-attack-campaign-threat-actors-use-drone-manual-lures-to-deliver-merlinagent-payloads/ www.secnews.physaphae.fr/article.php?IdArticle=8393067 False Threat None 2.0000000000000000 Securonix - Siem Securonix Threat Labs Monthly Intelligence Insights & # 8211;Septembre 2023<br>Securonix Threat Labs Monthly Intelligence Insights – September 2023 The Monthly Intelligence Insights provides a summary of top threats curated, monitored, and analyzed by Securonix Threat Labs in September. The report additionally provides a synopsis of the threats; indicators of compromise (IoCs); tactics, techniques, and procedures (TTPs); and related tags. Each threat has a comprehensive threat summary from Threat Labs and search queries from the Threat Research team. For additional information on Threat Labs and related search queries used via Autonomous Threat Sweeper to detect the below mentioned threats, refer to our Threat Labs home page.]]> 2023-10-05T00:25:24+00:00 https://www.securonix.com/blog/securonix-threat-labs-monthly-intelligence-insights-september-2023/ www.secnews.physaphae.fr/article.php?IdArticle=8393064 False Threat None 2.0000000000000000 Securonix - Siem Améliorer la capacité de votre équipe bleue à détecter les menaces avec une télémétrie SIEM améliorée<br>Improving Your Blue Team\\'s Ability To Detect Threats With Enhanced SIEM Telemetry Learn how Securonix is delivering contextual documentation and a all new documentation portal to help our customer find the information they need faster.]]> 2023-10-04T18:06:12+00:00 https://www.securonix.com/blog/improving-blue-team-threat-detection-with-enhanced-siem-telemetry/ www.secnews.physaphae.fr/article.php?IdArticle=8393071 False None None 2.0000000000000000 Securonix - Siem Jalons significatifs: T-Q3 2023 Journeau produit<br>Meaningful Milestones: Q3 2023 Product Journey 2023-09-28T18:02:14+00:00 https://www.securonix.com/blog/meaningful-milestones-q3-2023-product-journey/ www.secnews.physaphae.fr/article.php?IdArticle=8393065 False None None 2.0000000000000000 Securonix - Siem Minimiser les alertes avec la liste blanche multi-attribution<br>Minimize Alerts with Multi-Attribute Whitelisting Understanding the Technical and Behavioral Indicators of Insider Threats]]> 2023-09-26T18:06:26+00:00 https://www.securonix.com/blog/minimize-alerts-multiattribute-wl/ www.secnews.physaphae.fr/article.php?IdArticle=8393066 False None None 2.0000000000000000 Securonix - Siem Securonix Threat Labs Monthly Intelligence Insights & # 8211;Août 2023<br>Securonix Threat Labs Monthly Intelligence Insights – August 2023 Securonix Threat Labs Monthly Intelligence Insights – August 2023]]> 2023-09-22T18:57:50+00:00 https://www.securonix.com/blog/securonix-threat-labs-monthly-intelligence-insights-august-2023/ www.secnews.physaphae.fr/article.php?IdArticle=8393069 False Threat None 2.0000000000000000 Securonix - Siem Securonix Threat Labs Security Advisory: les acteurs de la menace ciblent les serveurs MSSQL dans DB # Jammer pour livrer le ransomware Freeworld Free<br>Securonix Threat Labs Security Advisory: Threat Actors Target MSSQL Servers in DB#JAMMER to Deliver FreeWorld Ransomware Securonix Threat Labs Security Advisory: Threat Actors Target MSSQL Servers in DB#JAMMER to Deliver FreeWorld Ransomware]]> 2023-09-15T16:59:07+00:00 https://www.securonix.com/blog/securonix-threat-labs-security-advisory-threat-actors-target-mssql-servers-in-dbjammer-to-deliver-freeworld-ransomware/ www.secnews.physaphae.fr/article.php?IdArticle=8393070 False Ransomware,Threat None 2.0000000000000000 Securonix - Siem Comprendre les indicateurs techniques et comportementaux des menaces d'initiés<br>Understanding the Technical and Behavioral Indicators of Insider Threats Understanding the Technical and Behavioral Indicators of Insider Threats]]> 2023-09-11T17:46:01+00:00 https://www.securonix.com/blog/understanding-insider-threat-technical-behavioral-indicators/ www.secnews.physaphae.fr/article.php?IdArticle=8393068 False None None 2.0000000000000000 Securonix - Siem Ce qui est sur la liste Inc. 5000 signifie pour Securonix & # 8211;Cette année<br>What Being on the Inc. 5000 List Means for Securonix – This Year What Being on the Inc. 5000 List Means for Securonix – This Year]]> 2023-08-17T15:46:58+00:00 https://www.securonix.com/blog/securonix-makes-the-2023-inc-5000-list/ www.secnews.physaphae.fr/article.php?IdArticle=8393072 False None None 3.0000000000000000 Securonix - Siem Le risque de travail à distance et de menaces d'initié: solutions techniques pour gérer votre main-d'œuvre<br>The Risk of Remote Working and Insider Threats: Technical Solutions to Manage Your Workforce  Technical Solutions to manage remote Working and Insider Threats. Remote working practices also disrupt regular communication and supervision channels, making it harder to identify irregular, suspicious, or risky behavior that may signal a potential insider threat.]]> 2023-08-11T17:28:33+00:00 https://www.securonix.com/blog/technical-solutions-remote-working-and-insider-threats/ www.secnews.physaphae.fr/article.php?IdArticle=8393073 False None None 3.0000000000000000