www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2025-05-10T14:33:23+00:00 www.secnews.physaphae.fr Dark Reading - Informationweek Branch L'ingénierie de la plate-forme est l'ingénierie de la sécurité<br>Platform Engineering Is Security Engineering For modern applications built on Kubernetes and microservices, platform engineering is not just about building functional systems but also about embedding security into the fabric of those systems.]]> 2024-09-10T14:00:00+00:00 https://www.darkreading.com/application-security/platform-engineering-is-security-engineering www.secnews.physaphae.fr/article.php?IdArticle=8573919 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Dark Reading Confidential: Stron Test Arrests, cinq ans plus tard<br>Dark Reading Confidential: Pen Test Arrests, Five Years Later Episode 3: On September 11, 2019, two cybersecurity professionals were arrested in Dallas County, Iowa and forced to spend the night in jail -- just for doing their jobs. Gary De Mercurio and Justin Wynn. Despite the criminal charges against them eventually being dropped, the saga that night five years ago continues to haunt De Mercurio and Wynn personally and professionally. In this episode, the pair and Coalfire\'s CEO Tom McAndrew share how the arrest and fallout has shaped their lives and careers as well as how it has transformed physical penetration tests for the cybersecurity industry as a whole.]]> 2024-09-10T13:54:39+00:00 https://www.darkreading.com/vulnerabilities-threats/dark-reading-confidential-pen-test-arrests-five-years-later www.secnews.physaphae.fr/article.php?IdArticle=8573973 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Gallup Poll Bugs Open Door à la désinformation des élections<br>Gallup Poll Bugs Open Door to Election Misinformation Researchers flagged a pair of Gallup polling site XSS vulnerabilities that could have allowed malicious actors to execute arbitrary code, access sensitive data, or take over a victim account.]]> 2024-09-10T11:00:00+00:00 https://www.darkreading.com/vulnerabilities-threats/gallup-poll-bugs-open-door-to-election-misinformation www.secnews.physaphae.fr/article.php?IdArticle=8573811 False Vulnerability None 2.0000000000000000 Dark Reading - Informationweek Branch Gallup adresse des bogues XSS sur le site Web<br>Gallup Addresses XSS Bugs in Website Researchers flagged a pair of Gallup site XSS vulnerabilities.]]> 2024-09-10T11:00:00+00:00 https://www.darkreading.com/vulnerabilities-threats/gallup-xss-bugs-website www.secnews.physaphae.fr/article.php?IdArticle=8575504 False Vulnerability None 2.0000000000000000 Dark Reading - Informationweek Branch Équipe de tag chinois Apts continue de voler des secrets de gouvernement asiatique<br>Chinese Tag Team APTs Keep Stealing Asian Gov\\'t Secrets A PRC threat cluster known as "Crimson Palace" is demonstrating the benefits of having specialized units carry out distinct stages of a wider attack chain.]]> 2024-09-10T10:00:00+00:00 https://www.darkreading.com/threat-intelligence/chinese-tag-team-apts-keep-stealing-asian-govt-secrets www.secnews.physaphae.fr/article.php?IdArticle=8573777 False Threat None 2.0000000000000000 Dark Reading - Informationweek Branch 10 conseils d'écriture pour les professionnels de la cybersécurité<br>10 Writing Tips for Cybersecurity Professionals It takes more than technical knowledge to write about cybersecurity in a way people want to read. It takes creativity, discipline, and other key skills.]]> 2024-09-10T01:21:35+00:00 https://www.darkreading.com/cybersecurity-operations/how-to-get-published-regularly www.secnews.physaphae.fr/article.php?IdArticle=8573566 False Technical None 3.0000000000000000 Dark Reading - Informationweek Branch Akira Ransomware acteurs exploite le bug de Sonicwall pour RCE<br>Akira Ransomware Actors Exploit SonicWall Bug for RCE CISA has added CE-2024-40766 to its known exploited vulnerabilities catalog.]]> 2024-09-09T20:39:23+00:00 https://www.darkreading.com/ics-ot-security/akira-ransomware-actors-exploit-sonicwall-bug-for-rce www.secnews.physaphae.fr/article.php?IdArticle=8573439 False Ransomware,Vulnerability,Threat None 2.0000000000000000 Dark Reading - Informationweek Branch 300k victimes \\ 'Données compromises en violation de location de voiture Avis<br>300K Victims\\' Data Compromised in Avis Car Rental Breach Though the company reports that data was exfiltrated in the breach, it has been remained tightlipped regarding the kind of data that was exposed.]]> 2024-09-09T18:23:19+00:00 https://www.darkreading.com/cyberattacks-data-breaches/300k-victims-data-compromised-avis-car-rental-breach www.secnews.physaphae.fr/article.php?IdArticle=8573392 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Comment les stratégies de ransomware des forces de l'ordre évoluent<br>How Law Enforcement\\'s Ransomware Strategies Are Evolving The threat of ransomware hasn\'t gone away. But law enforcement has struck a blow by adjusting its tactics and taking out some of the biggest adversaries in the ransomware scene.]]> 2024-09-09T14:00:00+00:00 https://www.darkreading.com/cybersecurity-operations/how-law-enforcement-ransomware-strategies-are-evolving www.secnews.physaphae.fr/article.php?IdArticle=8574618 False Ransomware,Threat,Legislation None 3.0000000000000000 Dark Reading - Informationweek Branch Comment établir &Améliorer la sécurité des points finaux<br>How to Establish & Enhance Endpoint Security Endpoint security has been around for decades, but changes in device use and the quick evolution of new attacks have triggered the development of new security techniques.]]> 2024-09-09T14:00:00+00:00 https://www.darkreading.com/endpoint-security/how-to-establish-enhance-endpoint-security www.secnews.physaphae.fr/article.php?IdArticle=8573264 False None None 2.0000000000000000 Dark Reading - Informationweek Branch \\ 'Tidrone \\' Les cyberattaques ciblent les fabricants de drones de Taiwan \\<br>\\'TIDrone\\' Cyberattackers Target Taiwan\\'s Drone Manufacturers The Chinese-speaking group is launching sophisticated malware towards military and satellite targets globally.]]> 2024-09-09T01:00:00+00:00 https://www.darkreading.com/ics-ot-security/tidrone-cyberattackers-taiwan-drone-manufacturers www.secnews.physaphae.fr/article.php?IdArticle=8572951 False Malware None 3.0000000000000000 Dark Reading - Informationweek Branch Les fédéraux mettent en garde contre les acteurs russes ciblant les infrastructures critiques<br>Feds Warn on Russian Actors Targeting Critical Infrastructure In the past, Putin\'s Unit 29155 has utilized malware like WhisperGate to target organizations, particularly those in Ukraine.]]> 2024-09-06T19:48:04+00:00 https://www.darkreading.com/ics-ot-security/feds-warn-russian-actors-targeting-critical-infrastructure www.secnews.physaphae.fr/article.php?IdArticle=8571472 False Malware None 2.0000000000000000 Dark Reading - Informationweek Branch CISA Flags ICS Bugs in Baxter, Mitsubishi Products The vulnerabilities affect industrial control tech used across the healthcare and critical manufacturing sectors.]]> 2024-09-06T19:44:38+00:00 https://www.darkreading.com/ics-ot-security/cisa-flags-ics-bugs-in-baxter-mitsubishi-products www.secnews.physaphae.fr/article.php?IdArticle=8571473 False Vulnerability,Industrial,Medical None 2.0000000000000000 Dark Reading - Informationweek Branch Utiliser les logiciels espions commerciaux en arrière malgré les sanctions<br>Commercial Spyware Use Roars Back Despite Sanctions Vendors of mercenary spyware tools used by nation-states to track citizens and enemies have gotten savvy about evading efforts to limit their use.]]> 2024-09-06T19:25:09+00:00 https://www.darkreading.com/threat-intelligence/commercial-spyware-use-roars-back-despite-sanctions www.secnews.physaphae.fr/article.php?IdArticle=8571474 False Tool,Commercial None 2.0000000000000000 Dark Reading - Informationweek Branch La pénurie de talents de cybersécurité incite l'action de la Maison Blanche<br>Cybersecurity Talent Shortage Prompts White House Action The Biden administration launches an initiative to encourage careers in cybersecurity, as businesses try new tactics to get unfilled IT security roles staffed.]]> 2024-09-06T16:34:37+00:00 https://www.darkreading.com/cybersecurity-operations/cybersecurity-talent-shortage-prompts-white-house-action www.secnews.physaphae.fr/article.php?IdArticle=8571375 False None None 3.0000000000000000 Dark Reading - Informationweek Branch FreeBSD GOT ​​& EURO; 686 400 pour stimuler les fonctionnalités de sécurité<br>FreeBSD Gets €686,400 to Boost Security Features The funds from Germany\'s Sovereign Tech Fund will be used to integrate security features such as zero trust capabilities and tools for software bill of materials.]]> 2024-09-06T15:00:29+00:00 https://www.darkreading.com/application-security/freebsd-gets-stf-funding-boost-security-features www.secnews.physaphae.fr/article.php?IdArticle=8572047 False Tool None 2.0000000000000000 Dark Reading - Informationweek Branch Utilisation de la transparence et de l'ampli;Partage pour défendre les infrastructures critiques<br>Using Transparency & Sharing to Defend Critical Infrastructure No organization can single-handedly defend against sophisticated attacks. Governments and private sector entities need to collaborate, share information, and develop defenses against cyber threats]]> 2024-09-06T14:00:00+00:00 https://www.darkreading.com/vulnerabilities-threats/using-transparency-and-sharing-to-defend-critical-infrastructure www.secnews.physaphae.fr/article.php?IdArticle=8571269 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Quel est le modèle de destin partagé?<br>What is the Shared Fate Model? New threats, an overburdened workforce, and regulatory pressures mean cloud service providers need a more resilient model than the shared responsibility framework. That\'s where "shared fate" comes in.]]> 2024-09-05T23:11:27+00:00 https://www.darkreading.com/cloud-security/what-is-the-shared-fate-model www.secnews.physaphae.fr/article.php?IdArticle=8570852 False Cloud None 2.0000000000000000 Dark Reading - Informationweek Branch Hackerone nomme Kara Sprague en tant que PDG<br>HackerOne Appoints Kara Sprague As CEO 2024-09-05T21:22:15+00:00 https://www.darkreading.com/vulnerabilities-threats/hackerone-appoints-kara-sprague-as-ceo www.secnews.physaphae.fr/article.php?IdArticle=8570789 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Kiteworks renforce ses capacités de collecte de données sécurisées avec une acquisition de 123formbuilder<br>Kiteworks Bolsters Its Secure Data Collection Capabilities With 123FormBuilder Acquisition 2024-09-05T21:15:28+00:00 https://www.darkreading.com/cloud-security/kiteworks-bolsters-its-secure-data-collection-capabilities-with-123formbuilder-acquisition www.secnews.physaphae.fr/article.php?IdArticle=8570790 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Palo Alto Networks & Reg;Ferme l'acquisition des actifs SaaS Qradar d'IBM \\<br>Palo Alto Networks® Closes Acquisition of IBM\\'s QRadar SaaS Assets 2024-09-05T21:09:38+00:00 https://www.darkreading.com/cybersecurity-operations/palo-alto-networks-closes-acquisition-of-ibm-s-qradar-saas-assets www.secnews.physaphae.fr/article.php?IdArticle=8570755 False Cloud None 3.0000000000000000 Dark Reading - Informationweek Branch La campagne de malvertising construit un phish pour les employés de Lowe \\<br>Malvertising Campaign Builds a Phish for Lowe\\'s Employees Retail employees are being duped into divulging their credentials by typosquatting malvertisements.]]> 2024-09-05T20:56:45+00:00 https://www.darkreading.com/threat-intelligence/malvertising-campaign-phish-lowes-employees www.secnews.physaphae.fr/article.php?IdArticle=8570756 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Chinois \\ 'Tropic Trooper \\' APT cible les gouvernements du Moyen-Orient<br>Chinese \\'Tropic Trooper\\' APT Targets Mideast Governments In the past, the group has targeted different sectors in East and Southeast Asia, but recently has pivoted its focus to the Middle East, specifically to entities that publish human rights studies.]]> 2024-09-05T20:39:26+00:00 https://www.darkreading.com/cyberattacks-data-breaches/chinese-tropic-trooper-apt-targets-mideast-governments www.secnews.physaphae.fr/article.php?IdArticle=8570757 False Studies None 3.0000000000000000 Dark Reading - Informationweek Branch Chine \\ 'S \\' Earth Lusca \\ 'propage la porte dérobée multiplateforme<br>China\\'s \\'Earth Lusca\\' Propagates Multiplatform Backdoor The malware, KTLVdoor, has already been found on more than 50 command-and-control servers and enables full control of any environment it compromises.]]> 2024-09-05T20:15:02+00:00 https://www.darkreading.com/threat-intelligence/chinas-earth-lusca-propagates-multiplatform-backdoor www.secnews.physaphae.fr/article.php?IdArticle=8570758 False Malware None 2.0000000000000000 Dark Reading - Informationweek Branch Biden Admin dépose des accusations contre les Meddlers électoraux de Russie<br>Biden Admin Files Charges Against Election Meddlers From Russia Working with the Treasury and Justice departments, the president has sanctioned anti-democratic Russian adversaries.]]> 2024-09-05T19:39:53+00:00 https://www.darkreading.com/cybersecurity-operations/biden-admin-files-charges-against-election-meddlers-from-russia www.secnews.physaphae.fr/article.php?IdArticle=8570722 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Le rôle de la confiance ancrations dans la sécurité informatique moderne<br>The Role of Trust Anchors in Modern IT Security To fully realize the benefits trust anchors provide, organizations need to implement processes and technologies that maintain the privacy and security of trust anchors and the personal data they contain.]]> 2024-09-05T14:00:00+00:00 https://www.darkreading.com/cybersecurity-operations/trust-anchors-in-modern-it-security www.secnews.physaphae.fr/article.php?IdArticle=8570548 False None None 3.0000000000000000 Dark Reading - Informationweek Branch La propagande de l'armée indienne s'est répandue par des comptes de médias sociaux alimentés par 1,4k<br>Indian Army Propaganda Spread by 1.4K AI-Powered Social Media Accounts For three years now, more than a thousand social media accounts have been reposting the same pro-India, anti-Pakistan content on Facebook and X.]]> 2024-09-05T04:01:00+00:00 https://www.darkreading.com/threat-intelligence/indian-army-propaganda-ai-powered-social-media-accounts www.secnews.physaphae.fr/article.php?IdArticle=8570182 False None None 2.0000000000000000 Dark Reading - Informationweek Branch La Maison Blanche dévoile la feuille de route pour réparer BGP<br>White House Unveils Roadmap to Fix BGP The White House Office of the National Cyber Director released a plan outlining steps network operators and service providers need to take to secure BGP from abuse and configuration errors.]]> 2024-09-04T21:34:14+00:00 https://www.darkreading.com/cybersecurity-operations/white-house-unveils-roadmap-to-fix-bgp www.secnews.physaphae.fr/article.php?IdArticle=8570449 False None None 3.0000000000000000 Dark Reading - Informationweek Branch \\ 'revival Hijack \\' sur PYPI Disui des logiciels malveillants avec des noms de fichiers légitimes<br>\\'Revival Hijack\\' on PyPI Disguises Malware with Legitimate File Names Adversaries reusing abandoned package names sneak malware into organizations in a sort of software shell game.]]> 2024-09-04T20:18:54+00:00 https://www.darkreading.com/application-security/revival-hijack-on-pypi-disguises-malware-with-legitimate-file-names www.secnews.physaphae.fr/article.php?IdArticle=8569976 False Malware None 3.0000000000000000 Dark Reading - Informationweek Branch L'outil open source permet aux électeurs de vérifier les résultats des élections<br>Open-Source Tool Allows Voters to Verify Election Results The ElectionGuard project allows anyone - voters, campaign staffers, and election officials - to cryptographically verify ballots, a promise which may bolster faith in election integrity.]]> 2024-09-04T17:00:54+00:00 https://www.darkreading.com/data-privacy/open-source-tool-allows-voters-to-verify-election-results www.secnews.physaphae.fr/article.php?IdArticle=8570412 False Tool None 3.0000000000000000 Dark Reading - Informationweek Branch FBI: acteurs nord-coréens qui préparent une vague de cyberattaques agressive<br>FBI: North Korean Actors Readying Aggressive Cyberattack Wave Sophisticated social engineering is expected to accompany threat campaigns that are highly targeted and aimed at stealing crypto and deploying malware.]]> 2024-09-04T16:57:40+00:00 https://www.darkreading.com/threat-intelligence/fbi-north-korean-actors-aggressive-cyberattack-wave www.secnews.physaphae.fr/article.php?IdArticle=8569850 False Malware,Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Comment les cisos peuvent communiquer efficacement le cyber-risque<br>How CISOs Can Effectively Communicate Cyber-Risk A proximity resilience graph offers a more accurate representation of risk than heat maps and risk registers, and allows CISOs to tell a complex story in a single visualization.]]> 2024-09-04T14:00:00+00:00 https://www.darkreading.com/cyber-risk/how-cisos-can-effectively-communicate-cyber-risk www.secnews.physaphae.fr/article.php?IdArticle=8569748 False None None 2.0000000000000000 Dark Reading - Informationweek Branch L'arrestation des PDG ne va probablement pas atténuer l'intérêt cybercriminal pour le télégramme<br>CEO\\'s Arrest Will Likely Not Dampen Cybercriminal Interest in Telegram In recent years, the platform has become a go-to tool for executing almost all conceivable cybercriminal activity.]]> 2024-09-04T13:00:00+00:00 https://www.darkreading.com/threat-intelligence/ceo-arrest-cybercriminal-interest-telegram www.secnews.physaphae.fr/article.php?IdArticle=8569710 False Tool None 2.0000000000000000 Dark Reading - Informationweek Branch La Californie approuve le projet de loi de confidentialité nécessitant des outils de retrait<br>California Approves Privacy Bill Requiring Opt-Out Tools 2024-09-03T22:39:06+00:00 https://www.darkreading.com/data-privacy/california-privacy-bill-require-opt-out-tools www.secnews.physaphae.fr/article.php?IdArticle=8569640 False Tool None 3.0000000000000000 Dark Reading - Informationweek Branch L'APT nord-coréen exploite le nouveau chrome, Windows Bugs to Voler Crypto<br>North Korean APT Exploits Novel Chromium, Windows Bugs to Steal Crypto DPRK\'s innovative tack chains together previously unknown browser issues, then adds a rootkit to the mix to gain deep system access.]]> 2024-09-03T21:33:14+00:00 https://www.darkreading.com/vulnerabilities-threats/north-korean-apt-exploits-novel-chromium-windows-bugs-steal-crypto www.secnews.physaphae.fr/article.php?IdArticle=8569302 False None None 2.0000000000000000 Dark Reading - Informationweek Branch La ville de Columbus poursuit un chercheur après une attaque de ransomware<br>City of Columbus Sues Researcher After Ransomware Attack The city filed for a restraining order, claiming the researcher was working in tandem with the ransomware attackers.]]> 2024-09-03T21:18:49+00:00 https://www.darkreading.com/cyberattacks-data-breaches/city-of-columbus-sues-researcher-after-ransomware-attack www.secnews.physaphae.fr/article.php?IdArticle=8569303 False Ransomware None 2.0000000000000000 Dark Reading - Informationweek Branch Les cyberattaques usurpent Palo Alto VPNS pour répandre la variante Wikiloader<br>Cyberattackers Spoof Palo Alto VPNs to Spread WikiLoader Variant The malware, first discovered two years ago, has returned in campaigns using SEO poisoning.]]> 2024-09-03T18:25:06+00:00 https://www.darkreading.com/threat-intelligence/cyberattackers-spoof-palo-alto-vpns-to-spread-wikiloader-variant www.secnews.physaphae.fr/article.php?IdArticle=8569236 False Malware None 2.0000000000000000 Dark Reading - Informationweek Branch Données Halliburton volées dans l'attaque du secteur pétrolier<br>Halliburton Data Stolen in Oil-Sector Attack The energy Kahuna said that operations were disrupted after an attack on its supporting business applications.]]> 2024-09-03T16:09:05+00:00 https://www.darkreading.com/ics-ot-security/halliburton-data-stolen-oil-sector-attack www.secnews.physaphae.fr/article.php?IdArticle=8569159 False None None 2.0000000000000000 Dark Reading - Informationweek Branch L'évolution de la campagne de package NPM cible les développeurs Roblox, pendant des années<br>Evolving NPM Package Campaign Targets Roblox Devs, For Years Attackers have added aggressive social engineering to their arsenal, along with a novel Windows-manipulating persistence mechanism that demands developer vigilance.]]> 2024-09-03T16:08:03+00:00 https://www.darkreading.com/threat-intelligence/evolving-npm-package-campaign-roblox-devs www.secnews.physaphae.fr/article.php?IdArticle=8569160 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Blackcat Spinoff \\ 'cicada3301 \\' utilise des crédits volés à la volée, jupe edr<br>BlackCat Spinoff \\'Cicada3301\\' Uses Stolen Creds on the Fly, Skirts EDR Malware authors have iterated on one of the premier encryptors on the market, building something even bigger and better.]]> 2024-09-03T14:19:43+00:00 https://www.darkreading.com/threat-intelligence/blackcat-spinoff-cicada3301-stolen-creds-skirts-edr www.secnews.physaphae.fr/article.php?IdArticle=8569131 False Malware None 3.0000000000000000 Dark Reading - Informationweek Branch Amélioration de la résilience de la chaîne d'approvisionnement logicielle est égale à une sécurité accrue<br>Improved Software Supply Chain Resilience Equals Increased Security Understanding through visibility, managing through governance, and anticipating through continuous deployment will better prepare organizations for the next supply chain attack.]]> 2024-09-03T14:00:00+00:00 https://www.darkreading.com/vulnerabilities-threats/improved-software-supply-chain-resilience-equals-increased-security www.secnews.physaphae.fr/article.php?IdArticle=8569103 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Nommez ce bord toon: bug éteint<br>Name That Edge Toon: Bug Off Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.]]> 2024-09-03T12:33:45+00:00 https://www.darkreading.com/application-security/name-that-edge-toon-bug-off www.secnews.physaphae.fr/article.php?IdArticle=8569605 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Les gangs de ransomware frappent l'Asie du Sud-Est<br>Ransomware Gangs Pummel Southeast Asia Successful ransomware attacks against organizations in Asia continue at peak levels in 2024 following a wave of high-profile data breaches last year.]]> 2024-09-02T01:00:00+00:00 https://www.darkreading.com/cyber-risk/ransomware-gangs-pummel-southeast-asia www.secnews.physaphae.fr/article.php?IdArticle=8568245 False Ransomware None 2.0000000000000000 Dark Reading - Informationweek Branch Vérifier le point, Cisco boost les investissements AI avec les dernières offres<br>Check Point, Cisco Boost AI Investments With Latest Deals Cisco\'s deal to acquire Robust Intelligence will make it possible to use red-team algorithms to assess risk in AI models and applications, while Check Point\'s acquisition of Cyberint will add threat intelligence to its SOC platform.]]> 2024-08-30T22:11:11+00:00 https://www.darkreading.com/cyber-risk/check-point-cisco-boost-ai-investments-with-latest-deals www.secnews.physaphae.fr/article.php?IdArticle=8566820 False Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Commercial Spyware Vendors Have a Copycat in Top Russian APT Russia\'s Midnight Blizzard infected Mongolian government websites to try to compromise the devices of visitors, using watering-hole tactics.]]> 2024-08-30T17:16:08+00:00 https://www.darkreading.com/threat-intelligence/commercial-spyware-vendors-have-a-copycat-in-top-russian-apt www.secnews.physaphae.fr/article.php?IdArticle=8567009 False Commercial None 2.0000000000000000 Dark Reading - Informationweek Branch \\ 'Voldemort \\' malware maudis<br>\\'Voldemort\\' Malware Curses Orgs Using Global Tax Authorities The global malware campaign (that must not be named?) is targeting organizations by impersonating tax authorities, and using custom tools like Google Sheets for command and control.]]> 2024-08-30T17:00:09+00:00 https://www.darkreading.com/threat-intelligence/voldemort-malware-curses-orgs-global-tax-authorities www.secnews.physaphae.fr/article.php?IdArticle=8566978 False Malware,Tool None 2.0000000000000000 Dark Reading - Informationweek Branch Les vendeurs commerciaux de logiciels espion<br>Commercial Spyware Vendors Have a Copycat in Top Russian APT Russia\'s Midnight Blizzard infected Mongolian government websites to try to compromise the devices of visitors, using watering-hole tactics.]]> 2024-08-30T16:32:39+00:00 https://www.darkreading.com/threat-intelligence/commercial-spyware-vendors-copycat-russian-apt www.secnews.physaphae.fr/article.php?IdArticle=8566979 False Commercial None 2.0000000000000000 Dark Reading - Informationweek Branch La NASA se concentre sur la cybersécurité de son logiciel critique de mission<br>NASA Focuses on Cybersecurity of its Mission-Critical Software The software verification and validation efforts helps NASA improve the safety and cost-effectiveness of its mission critical software. Cybersecurity is now part of the evaluation.]]> 2024-08-30T15:08:11+00:00 https://www.darkreading.com/ics-ot-security/nasa-focuses-on-cybersecurity-of-its-mission-critical-software www.secnews.physaphae.fr/article.php?IdArticle=8566943 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Pourquoi les équipes d'identité doivent commencer à se présenter au CISO<br>Why Identity Teams Need to Start Reporting to the CISO Identity management sits with IT for good reason, but now that identity is the common denominator in every attack, it\'s time identity security was owned by a leader with a security background, like the CISO.]]> 2024-08-30T14:00:00+00:00 https://www.darkreading.com/cybersecurity-operations/why-identity-teams-need-to-start-reporting-to-the-ciso www.secnews.physaphae.fr/article.php?IdArticle=8566879 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Cyber ​​Insurance: quelques technologies de sécurité, une grande différence dans les primes<br>Cyber Insurance: A Few Security Technologies, a Big Difference in Premiums Ransomware attacks and email-based fraud account for 80% to 90% of all claims processed by cyber insurers, but a handful of cybersecurity technologies can help prevent big damages.]]> 2024-08-29T21:31:27+00:00 https://www.darkreading.com/threat-intelligence/cyber-insurance-security-technologies-premiums www.secnews.physaphae.fr/article.php?IdArticle=8566454 False Ransomware None 3.0000000000000000 Dark Reading - Informationweek Branch Cobalt nomme Sonali Shah en tant que PDG<br>Cobalt Appoints Sonali Shah as CEO 2024-08-29T21:04:51+00:00 https://www.darkreading.com/cybersecurity-operations/cobalt-appoints-sonali-shah-as-ceo www.secnews.physaphae.fr/article.php?IdArticle=8566421 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Iran \\ 'S \\' Fox Kitten \\ 'Group Aids Ransomware Attacks contre les cibles américaines<br>Iran\\'s \\'Fox Kitten\\' Group Aids Ransomware Attacks on US Targets In a joint advisory, CISA and the FBI described the activity as a likely attempt by the group to monetize access to networks it already has compromised.]]> 2024-08-29T21:01:36+00:00 https://www.darkreading.com/threat-intelligence/irans-fox-kitten-group-aids-ransomware-attacks-on-us-targets www.secnews.physaphae.fr/article.php?IdArticle=8566455 False Ransomware None 3.0000000000000000 Dark Reading - Informationweek Branch Authenticid dévoile Smart Reauth ™ amélioré pour une réauthentification biométrique instantanée<br>AuthenticID Unveils Enhanced Smart ReAuth™ for Instant Biometric Reauthentication 2024-08-29T21:01:02+00:00 https://www.darkreading.com/cybersecurity-operations/authenticid-unveils-enhanced-smart-reauth-for-instant-biometric-reauthentication www.secnews.physaphae.fr/article.php?IdArticle=8566422 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Réseau de fraude publicitaire brésilien \\ 'CAMU \\' frappe 2B + Demandes d'offres quotidiennes<br>Brazilian Ad Fraud Network \\'Camu\\' Hits 2B+ Daily Bid Requests The global Internet helps just about everything to scale more easily, including piracy and ad fraud.]]> 2024-08-29T20:41:02+00:00 https://www.darkreading.com/threat-intelligence/brazilian-ad-fraud-network-camu-hits-2-billion-daily-bid-requests www.secnews.physaphae.fr/article.php?IdArticle=8566423 False None None 2.0000000000000000 Dark Reading - Informationweek Branch SANS Institute dévoile le guide de stratégie d'infrastructure critique pour 2024<br>SANS Institute Unveils Critical Infrastructure Strategy Guide for 2024 2024-08-29T20:36:48+00:00 https://www.darkreading.com/cybersecurity-operations/sans-institute-unveils-critical-infrastructure-strategy-guide-for-2024 www.secnews.physaphae.fr/article.php?IdArticle=8566424 False Industrial None 4.0000000000000000 Dark Reading - Informationweek Branch Les meilleurs sites de voyage ont des problèmes de sécurité de première classe pour nettoyer<br>Top Travel Sites Have Some First-Class Security Issues to Clean Up Public-facing vulnerabilities, cloud sprawl, access to back-end servers are just a few of the challenges travel and hospitality companies must address.]]> 2024-08-29T19:34:28+00:00 https://www.darkreading.com/threat-intelligence/top-travel-sites-have-some-first-class-security-issues-to-clean-up www.secnews.physaphae.fr/article.php?IdArticle=8566389 False Vulnerability,Cloud None 3.0000000000000000 Dark Reading - Informationweek Branch Exploité: CISA met en évidence Apache ofbiz flaw après le POC émergé<br>Exploited: CISA Highlights Apache OFBiz Flaw After PoC Emerges The vulnerability carries nearly the highest score possible on the CVSS scale, at 9.8, impacting a system used by major companies around the world.]]> 2024-08-29T19:10:56+00:00 https://www.darkreading.com/threat-intelligence/cisa-highlights-apache-ofbiz-flaw-after-poc-open-access www.secnews.physaphae.fr/article.php?IdArticle=8566390 False Vulnerability None 2.0000000000000000 Dark Reading - Informationweek Branch Comment les vulnérabilités des télécommunications peuvent être une menace pour la posture de cybersécurité<br>How Telecom Vulnerabilities Can Be a Threat to Cybersecurity Posture Telecom-based attacks such as SMS toll fraud and 2FA hijacking have evolved into a mainstream concern for CISOs.]]> 2024-08-29T14:00:00+00:00 https://www.darkreading.com/vulnerabilities-threats/how-telecom-vulnerabilities-can-be-a-threat-to-cybersecurity-posture www.secnews.physaphae.fr/article.php?IdArticle=8566204 False Vulnerability,Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Dragos étend la visibilité des actifs dans la dernière mise à jour de la plate-forme<br>Dragos Expands Asset Visibility in Latest Platform Update The latest release of the Dragos Platform provide industrial and critical infrastructure organizations with complete and enriched view of their OT environment.]]> 2024-08-29T12:19:38+00:00 https://www.darkreading.com/ics-ot-security/dragos-expands-asset-visibility-in-latest-platform-update www.secnews.physaphae.fr/article.php?IdArticle=8566169 False Industrial None 3.0000000000000000 Dark Reading - Informationweek Branch L'APT sud-coréen exploite un bug de bureau WPS 1 clic, nabs chinois Intel<br>South Korean APT Exploits 1-Click WPS Office Bug, Nabs Chinese Intel The most popular office software suite in China actually has two critical vulnerabilities, which allowed hackers the opportunity for remote code execution. Time to patch.]]> 2024-08-29T01:00:00+00:00 https://www.darkreading.com/vulnerabilities-threats/south-korean-apt-exploits-1-click-wps-office-bug-nabs-chinese-intel www.secnews.physaphae.fr/article.php?IdArticle=8565784 False Vulnerability None 2.0000000000000000 Dark Reading - Informationweek Branch CCTV Zero-Day expose les infrastructures critiques à Mirai Botnet<br>CCTV Zero-Day Exposes Critical Infrastructure to Mirai Botnet CISA warned about the RCE zero-day vulnerability in AVTECH IP cameras in early August, and now vulnerable systems are being used to spread malware.]]> 2024-08-28T21:00:08+00:00 https://www.darkreading.com/ics-ot-security/cctv-zero-day-targeted-by-mirai-botnet-campaign www.secnews.physaphae.fr/article.php?IdArticle=8565658 False Malware,Vulnerability,Threat None 3.0000000000000000 Dark Reading - Informationweek Branch BlackByte cible le bug Esxi avec un ransomware pour accéder aux actifs virtuels<br>BlackByte Targets ESXi Bug With Ransomware to Access Virtual Assets The pivot is one of several changes the groups using the malware have used in recent attacks.]]> 2024-08-28T20:40:08+00:00 https://www.darkreading.com/cyberattacks-data-breaches/blackbyte-targets-esxi-bug-with-ransomeware-to-access-virtual-assets www.secnews.physaphae.fr/article.php?IdArticle=8565659 False Ransomware,Malware None 3.0000000000000000 Dark Reading - Informationweek Branch Les attaquants exploitent une faille de confluence atlasienne critique pour le cryptojacking<br>Attackers Exploit Critical Atlassian Confluence Flaw for Cryptojacking Novel attack vectors leverage the CVE-2023-22527 RCE flaw discovered in January, which is still under active attack, to turn targeted cloud environments into cryptomining networks.]]> 2024-08-28T18:03:59+00:00 https://www.darkreading.com/threat-intelligence/attackers-exploit-critical-atlassian-confluence-flaw-for-cryptojacking www.secnews.physaphae.fr/article.php?IdArticle=8565592 False Threat,Cloud None 3.0000000000000000 Dark Reading - Informationweek Branch Hitachi Energy Vulnérabilités Plague SCADA Power Systems<br>Hitachi Energy Vulnerabilities Plague SCADA Power Systems The company has assessed four of the five disclosed vulnerabilities as being of high to critical severity.]]> 2024-08-28T14:43:08+00:00 https://www.darkreading.com/ics-ot-security/hitachi-energy-vulnerabilities-plague-scada-power-systems www.secnews.physaphae.fr/article.php?IdArticle=8565468 False Vulnerability,Industrial None 4.0000000000000000 Dark Reading - Informationweek Branch Secteur de fabrication sous le feu des voleurs d'identification Microsoft<br>Manufacturing Sector Under Fire From Microsoft Credential Thieves The emails impersonate well-known companies in the industry, fooling the victim into thinking they are communicating with a legitimate entity.]]> 2024-08-28T14:18:27+00:00 https://www.darkreading.com/ics-ot-security/manufacturing-sector-microsoft-credential-thieves www.secnews.physaphae.fr/article.php?IdArticle=8565505 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Pourquoi les LLM sont juste la pointe de l'iceberg de sécurité AI<br>Why LLMs Are Just the Tip of the AI Security Iceberg With the right processes and tools, organizations can implement advanced AI security frameworks that make hidden risks visible, enabling security teams to track and address them before impact.]]> 2024-08-28T14:00:00+00:00 https://www.darkreading.com/vulnerabilities-threats/why-llms-are-just-the-tip-of-the-ai-security-iceberg www.secnews.physaphae.fr/article.php?IdArticle=8565433 False Tool None 3.0000000000000000 Dark Reading - Informationweek Branch Des centaines de serveurs LLM exposent l'entreprise, la santé et l'ampli;Autres données en ligne<br>Hundreds of LLM Servers Expose Corporate, Health & Other Online Data LLM automation tools and vector databases can be rife with sensitive data - and vulnerable to pilfering.]]> 2024-08-28T10:00:00+00:00 https://www.darkreading.com/application-security/hundreds-of-llm-servers-expose-corporate-health-and-other-online-data www.secnews.physaphae.fr/article.php?IdArticle=8565305 False Tool None 3.0000000000000000 Dark Reading - Informationweek Branch Le Zimbabwe forme des fonctionnaires du gouvernement aux compétences en cybersécurité<br>Zimbabwe Trains Government Officials in Cybersecurity Skills African nation\'s proactive approach to cybersecurity comes amid a rise in painful cyberattacks including the breach of a major bank.]]> 2024-08-28T07:00:00+00:00 https://www.darkreading.com/cybersecurity-operations/zimbabwe-trains-government-officials-in-cybersecurity-skills www.secnews.physaphae.fr/article.php?IdArticle=8565205 False None None 3.0000000000000000 Dark Reading - Informationweek Branch 77% des établissements d'enseignement ont repéré une cyberattaque au cours des 12 derniers mois<br>77% of Educational Institutions Spotted a Cyberattack Within the Last 12 Months 2024-08-27T21:08:37+00:00 https://www.darkreading.com/cyberattacks-data-breaches/77-of-educational-institutions-spotted-a-cyberattack-within-the-last-12-months www.secnews.physaphae.fr/article.php?IdArticle=8564933 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Exploit POC pour une vulnérabilité zéro cliquez<br>PoC Exploit for Zero-Click Vulnerability Made Available to the Masses The exploit can be accessed on GitHub and makes it easier for the flaw to be exploited by threat actors.]]> 2024-08-27T20:56:41+00:00 https://www.darkreading.com/vulnerabilities-threats/poc-exploit-for-zero-click-vulnerability-made-available-to-the-masses www.secnews.physaphae.fr/article.php?IdArticle=8564934 False Vulnerability,Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Le balancement de Microsoft \\ sert de lancement de la campagne \\ 'Quishing \\'<br>Microsoft\\'s Sway Serves as Launchpad for \\'Quishing\\' Campaign The attack is a mashup of QR codes and phishing that gets users to click on links to malicious Web pages.]]> 2024-08-27T19:05:27+00:00 https://www.darkreading.com/vulnerabilities-threats/microsofts-sway-serves-as-launchpad-for-quishing-campaign www.secnews.physaphae.fr/article.php?IdArticle=8564904 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Volt Typhoon en Chine exploite 0-jour dans les serveurs de directeur SD-WAN de Versa \\<br>China\\'s Volt Typhoon Exploits 0-day in Versa\\'s SD-WAN Director Servers So far, the threat actor has compromised at least five organizations using CVE-2024-39717; CISA has added bug to its Known Exploited Vulnerability database.]]> 2024-08-27T14:00:00+00:00 https://www.darkreading.com/cyberattacks-data-breaches/china-s-volt-typhoon-actively-exploiting-now-patched-0-day-in-versa-director-servers www.secnews.physaphae.fr/article.php?IdArticle=8564781 False Vulnerability,Threat Guam 3.0000000000000000 Dark Reading - Informationweek Branch Pourquoi chaque entreprise devrait prioriser l'informatique confidentielle<br>Why Every Business Should Prioritize Confidential Computing Confidential computing safeguards data in use, making it a crucial component of cloud security.]]> 2024-08-27T14:00:00+00:00 https://www.darkreading.com/cyberattacks-data-breaches/why-every-business-should-prioritize-confidential-computing www.secnews.physaphae.fr/article.php?IdArticle=8564746 False Cloud None 2.0000000000000000 Dark Reading - Informationweek Branch Group de menace \\ 'bling libra \\' pivots à l'extorsion pour les attaques de nuages<br>Threat Group \\'Bling Libra\\' Pivots to Extortion for Cloud Attacks The ShinyHunters attackers are skipping selling stolen data on hacker forums in favor of using deadline-driven ransom notes for financial gain.]]> 2024-08-27T11:39:29+00:00 https://www.darkreading.com/threat-intelligence/threat-group-bling-libra-extortion-cloud-attacks www.secnews.physaphae.fr/article.php?IdArticle=8564813 False Threat,Cloud None 3.0000000000000000 Dark Reading - Informationweek Branch Les pirates utilisent de rares techniques furtives pour réduire les militaires asiatiques, Gov \\ 't orgs<br>Hackers Use Rare Stealth Techniques to Down Asian Military, Gov\\'t Orgs A threat actor resembling APT41 performed "AppDomainManager Injection," which is like DLL sideloading, but arguably easier and stealthier.]]> 2024-08-26T21:33:17+00:00 https://www.darkreading.com/application-security/hackers-use-rare-stealth-techniques-to-down-asian-military-govt-orgs www.secnews.physaphae.fr/article.php?IdArticle=8564337 False Threat APT 41 2.0000000000000000 Dark Reading - Informationweek Branch Microsoft pour héberger Windows Security Summit dans Crowdstrike Outage Aftermath<br>Microsoft to Host Windows Security Summit in CrowdStrike Outage Aftermath The tech giant seeks to work with endpoint security partners, including CrowdStrike, on how to prevent an outage event of such gravity from happening again.]]> 2024-08-26T20:36:55+00:00 https://www.darkreading.com/cybersecurity-operations/microsoft-to-host-windows-security-summit-post-crowdstrike-outage www.secnews.physaphae.fr/article.php?IdArticle=8564338 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Les cybercriminels exploitent l'opale grasse pour créer 750m faux comptes Microsoft<br>Cybercriminals Tap Greasy Opal to Create 750M Fake Microsoft Accounts Such cyberattack enablement services let attackers breach security measures, establish new fake accounts, and brute-force servers.]]> 2024-08-26T18:47:35+00:00 https://www.darkreading.com/cyberattacks-data-breaches/cybercriminals-tap-greasy-opal-to-create-750m-fake-microsoft-accounts www.secnews.physaphae.fr/article.php?IdArticle=8564290 False None None 3.0000000000000000 Dark Reading - Informationweek Branch L'aéroport de Seattle-Tacoma subit des pannes de système en raison de la cyberattaque possible<br>Seattle-Tacoma Airport Suffers System Outages Due to Possible Cyberattack As the entire Port of Seattle struggles to become fully operational once more, the airport recommends that those who are traveling take extra precautions.]]> 2024-08-26T15:08:26+00:00 https://www.darkreading.com/cyberattacks-data-breaches/seattle-tacoma-airport-suffers-outages-due-to-possible-cyberattack www.secnews.physaphae.fr/article.php?IdArticle=8564199 False None None 2.0000000000000000 Dark Reading - Informationweek Branch La surveillance agressive des changements est un aspect clé de la cybersécurité<br>Aggressively Monitoring for Changes Is a Key Aspect of Cybersecurity Employees and management must fully support change detection and file integrity monitoring, allowing a proactive approach with definitive security controls to be implemented against threat actors.]]> 2024-08-26T14:00:00+00:00 https://www.darkreading.com/cyber-risk/aggressively-monitoring-for-changes-is-key-aspect-of-cybersecurity www.secnews.physaphae.fr/article.php?IdArticle=8564123 False Threat None 3.0000000000000000 Dark Reading - Informationweek Branch News Desk 2024: le piratage de Microsoft Copilot est effrayant<br>News Desk 2024: Hacking Microsoft Copilot Is Scary Easy As enterprises in the world embrace Microsoft\'s AI assistant, researcher Michael Bargury warns its security is lacking. Check out his News Desk interview during Black Hat USA.]]> 2024-08-26T12:07:24+00:00 https://www.darkreading.com/application-security/hacking-microsoft-copilot-is-scary-easy-news-desk-black-hat-2024 www.secnews.physaphae.fr/article.php?IdArticle=8566124 False None None 4.0000000000000000 Dark Reading - Informationweek Branch L'infrastructure critique de l'Inde subit une pointe dans les cyberattaques<br>India\\'s Critical Infrastructure Suffers Spike in Cyberattacks The financial and government sectors have come under increasing attacks in India, with the Reserve Bank of India (RBI) warning banks to double down on cybersecurity.]]> 2024-08-26T03:30:00+00:00 https://www.darkreading.com/cyber-risk/india-s-critical-infrastructure-suffers-spike-in-cyberattacks www.secnews.physaphae.fr/article.php?IdArticle=8563868 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Rat Moonpeak en constante évolution lié à l'espionnage nord-coréen<br>Constantly Evolving MoonPeak RAT Linked to North Korean Spying The malware is a customized variant of the powerful open source XenoRAT information stealing malware often deployed by Kimsuky and other DPRK APTs.]]> 2024-08-23T20:46:36+00:00 https://www.darkreading.com/cyberattacks-data-breaches/constantly-evolving-moonpeak-rat-linked-to-north-korean-spying www.secnews.physaphae.fr/article.php?IdArticle=8562707 False Malware None 3.0000000000000000 Dark Reading - Informationweek Branch Pluralsight libère des cours pour aider les cyber-pros contre le groupe de pirates Volt Typhoon<br>Pluralsight Releases Courses to Help Cyber Pros Defend Against Volt Typhoon Hacker Group 2024-08-23T19:41:25+00:00 https://www.darkreading.com/cybersecurity-operations/pluralsight-releases-courses-to-help-cyber-pros-defend-against-volt-typhoon-hacker-group www.secnews.physaphae.fr/article.php?IdArticle=8562708 False None Guam 2.0000000000000000 Dark Reading - Informationweek Branch NIST maintient le travail de cryptographie post-quanttum aux cyber-équipes<br>NIST Hands Off Post-Quantum Cryptography Work to Cyber Teams The release of new NIST quantum-proof cryptography standards signals it\'s time for cybersecurity teams to get serious about preparing for the rise of quantum threats.]]> 2024-08-23T19:21:30+00:00 https://www.darkreading.com/cyber-risk/nist-post-quantum-cryptography-work-cyber-teams www.secnews.physaphae.fr/article.php?IdArticle=8562709 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Patch maintenant: Second Solarwinds Critical Bug dans le Web du bureau<br>Patch Now: Second SolarWinds Critical Bug in Web Help Desk The disclosure of CVE-2024-28987 means that, in two weeks, there have been two critical bugs and corresponding patches for SolarWinds\' less-often-discussed IT help desk software.]]> 2024-08-23T18:38:17+00:00 https://www.darkreading.com/remote-workforce/patch-now-second-solarwinds-critical-bug-in-web-help-desk www.secnews.physaphae.fr/article.php?IdArticle=8562710 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Les fans de Liverpool prennent un titre de Premier League en anglais pour les escroqueries de billets<br>Liverpool Fans Take English Premier League Title for Ticket Scams Ticket scams are costing football fans close to £200 a season, on average, according to a report.]]> 2024-08-23T18:29:07+00:00 https://www.darkreading.com/cyber-risk/liverpool-fans-take-english-premier-league-title-for-ticket-scams www.secnews.physaphae.fr/article.php?IdArticle=8562711 False None None 2.0000000000000000 Dark Reading - Informationweek Branch L'implication de la suite C dans la cybersécurité est un peu plus que le service des lèvres<br>C-Suite Involvement in Cybersecurity Is Little More Than Lip Service Collaboration with security teams, making cybersecurity a core principle of business strategy, and investing in defenses better position organizations to thwart threats and ensure business continuity.]]> 2024-08-23T14:00:00+00:00 https://www.darkreading.com/vulnerabilities-threats/c-suite-involvement-in-cybersecurity-is-little-more-than-lip-service www.secnews.physaphae.fr/article.php?IdArticle=8562712 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Le voleur de trafic NFC cible les utilisateurs d'Android &Leurs informations bancaires<br>NFC Traffic Stealer Targets Android Users & Their Banking Info The malware builds on a near-field communication tool in combination with phishing and social engineering to steal cash.]]> 2024-08-22T20:30:22+00:00 https://www.darkreading.com/mobile-security/nfc-traffic-stealer-targets-android-users-and-their-banking-info www.secnews.physaphae.fr/article.php?IdArticle=8562713 False Malware,Tool,Mobile None 2.0000000000000000 Dark Reading - Informationweek Branch La NSA émet des conseils pour une meilleure journalisation, une détection des menaces dans les incidents LOTL<br>NSA Issues Tips for Better Logging, Threat Detection in LotL Incidents The guidance is part of a coordinated, global effort to eradicate living-off-the-land techniques used against critical infrastructure.]]> 2024-08-22T20:19:11+00:00 https://www.darkreading.com/cybersecurity-operations/nsa-issues-tips-for-better-logging-threat-detection-in-lotl-incidents www.secnews.physaphae.fr/article.php?IdArticle=8562714 False Threat,Technical None 4.0000000000000000 Dark Reading - Informationweek Branch InfostEllers Waltz via macOS pour saisir des portefeuilles crypto, crédits de navigateur<br>Infostealers Waltz Through macOS to Grab Crypto Wallets, Browser Creds Ironically, Macs\' lower risk profile may make them more susceptible to any given threat than the average Windows or Linux system.]]> 2024-08-22T18:44:44+00:00 https://www.darkreading.com/threat-intelligence/infostealers-waltz-through-macos-to-grab-crypto-wallets-browser-creds www.secnews.physaphae.fr/article.php?IdArticle=8562715 False Threat None 2.0000000000000000 Dark Reading - Informationweek Branch La mise à jour Google Chrome corrige la faille exploitée dans la nature<br>Google Chrome Update Fixes Flaw Exploited in the Wild New Chrome release set to roll out over the next few days addresses 38 security issues in the browser.]]> 2024-08-22T18:38:17+00:00 https://www.darkreading.com/vulnerabilities-threats/google-chrome-update-fixes-flaw-exploited-in-the-wild www.secnews.physaphae.fr/article.php?IdArticle=8562716 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Slack Patches AI Bug qui permettent aux attaquants de voler des données sur les canaux privés<br>Slack Patches AI Bug That Let Attackers Steal Data From Private Channels A prompt injection flaw in the AI feature of the workforce collaboration suite makes malicious queries of data sources appear legitimate.]]> 2024-08-22T15:36:28+00:00 https://www.darkreading.com/cyberattacks-data-breaches/slack-ai-patches-bug-that-let-attackers-steal-data-from-private-channels www.secnews.physaphae.fr/article.php?IdArticle=8562717 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Pourquoi la fin de vie des applications est le début de la vie des pirates<br>Why End of Life for Applications Is the Beginning of Life for Hackers In the next year, more than 35,000 applications will move to end-of-life status. To manage risk effectively, we need to plan ahead.]]> 2024-08-22T14:00:00+00:00 https://www.darkreading.com/vulnerabilities-threats/why-end-of-life-for-applications-is-beginning-of-life-for-hackers www.secnews.physaphae.fr/article.php?IdArticle=8562718 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Les acteurs de la menace chinoise utilisent des fichiers MSI pour contourner Windows, détection VT<br>Chinese Threat Actors Use MSI Files to Bypass Windows, VT Detection Analysts have been picking up increased cases of malware delivery via Windows Installer files in Southeast Asia.]]> 2024-08-22T01:00:00+00:00 https://www.darkreading.com/threat-intelligence/chinese-threat-actors-msi-files-bypass-windows-vt-detection www.secnews.physaphae.fr/article.php?IdArticle=8562719 False Malware,Threat,Technical None 3.0000000000000000 Dark Reading - Informationweek Branch La balle argentée de MFA n'a jamais été assez<br>The Silver Bullet of MFA Was Never Enough There is no such thing as a silver bullet in cybersecurity. No, not even multifactor authentication.]]> 2024-08-21T23:27:44+00:00 https://www.darkreading.com/cybersecurity-operations/the-silver-bullet-of-mfa-was-never-enough www.secnews.physaphae.fr/article.php?IdArticle=8562720 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Des liens malveillants, des outils compatibles AI et des attaques contre les PME parmi les principales menaces de cybersécurité dans le rapport de renseignement sur les menaces mondiales H1 Mimecast<br>Malicious Links, AI-Enabled Tools, and Attacks on SMBs Among Top Cybersecurity Threats in H1 Mimecast Global Threat Intelligence Report 2024-08-21T21:31:07+00:00 https://www.darkreading.com/cyberattacks-data-breaches/malicious-links-ai-enabled-tools-and-attacks-on-smbs-among-top-cybersecurity-threats-in-h1-mimecast-global-threat-intelligence-report www.secnews.physaphae.fr/article.php?IdArticle=8562721 False Tool,Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Gartner Spotlights AI, Sécurité en 2024 Hype Cycle for Emerging Tech<br>Gartner Spotlights AI, Security in 2024 Hype Cycle for Emerging Tech The technologies listed in Gartner\'s 2024 Hype Cycle for Emerging Technologies fall into four key areas: autonomous AI, developer productivity, total experience, and human-centric security and privacy programs.]]> 2024-08-21T21:08:35+00:00 https://www.darkreading.com/application-security/gartner-spotlights-ai-security-in-2024-hype-cycle-for-emerging-tech www.secnews.physaphae.fr/article.php?IdArticle=8562722 False None None 2.0000000000000000 Dark Reading - Informationweek Branch \\ 'Styx Stealer \\' souffle sa propre couverture avec une erreur OPSEC bâclée<br>\\'Styx Stealer\\' Blows Its Own Cover With Sloppy OpSec Mistake An individual in Turkey is behind a new information stealer that researchers have recently observed in multiple attacks.]]> 2024-08-21T20:06:54+00:00 https://www.darkreading.com/cyberattacks-data-breaches/styx-stealer-blows-its-own-cover-with-sloppy-opsec-mistake www.secnews.physaphae.fr/article.php?IdArticle=8562723 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Deadbeat Dad pirate le registre de l'État pour simuler sa propre mort<br>Deadbeat Dad Hacks State Registry to Fake His Own Death A Kentucky man used stolen doctor credentials to fake his own death certificate to avoid paying a six-figure child support debt.]]> 2024-08-21T19:15:00+00:00 https://www.darkreading.com/cyberattacks-data-breaches/deadbeat-dad-hacks-state-registy-to-fake-his-own-death www.secnews.physaphae.fr/article.php?IdArticle=8562724 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Université de Taiwan sous le feu de la porte dérobée de DLL unique<br>Taiwan University Under Fire From Unique DLL Backdoor It\'s unclear who the "Msupedge" threat actors were or what the motive for the attack was.]]> 2024-08-21T19:04:44+00:00 https://www.darkreading.com/cyberattacks-data-breaches/taiwan-university-under-fire-from-unique-dll-backdoor www.secnews.physaphae.fr/article.php?IdArticle=8562725 False Threat None 2.0000000000000000