www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2025-05-10T14:26:52+00:00 www.secnews.physaphae.fr Dark Reading - Informationweek Branch La race mondiale de l'IA: équilibrer l'innovation et la sécurité<br>The Global AI Race: Balancing Innovation and Security The AI security race is on - and it will be won where defenders come together with developers and researchers to do things right.]]> 2025-04-21T14:00:00+00:00 https://www.darkreading.com/vulnerabilities-threats/global-ai-race-balancing-innovation-security www.secnews.physaphae.fr/article.php?IdArticle=8665727 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Le ransomware pourrait-il survivre sans crypto-monnaie?<br>Could Ransomware Survive Without Cryptocurrency? Threat actors would be at least temporarily derailed, experts say. But the real issue ladders back to organizations\' weak cyber hygiene.]]> 2025-04-18T20:04:40+00:00 https://www.darkreading.com/cyber-risk/ransomware-would-adapt-without-cryptocurrency www.secnews.physaphae.fr/article.php?IdArticle=8664609 False Ransomware,Threat None 2.0000000000000000 Dark Reading - Informationweek Branch AWWA soutient l'introduction d'une législation collaborative sur la cybersécurité<br>AWWA Supports Introduction of Collaborative Cybersecurity Legislation 2025-04-18T19:17:50+00:00 https://www.darkreading.com/ics-ot-security/awwa-introduction-cybersecurity-legislation www.secnews.physaphae.fr/article.php?IdArticle=8664610 False Legislation None 3.0000000000000000 Dark Reading - Informationweek Branch Les organisations réparent moins de la moitié de toutes les vulnérabilités exploitables, avec seulement 21% des défauts de l'application Genai résolus<br>Organizations Fix Less Than Half of All Exploitable Vulnerabilities, With Just 21% of GenAI App Flaws Resolved 2025-04-18T19:14:51+00:00 https://www.darkreading.com/application-security/organizations-fix-less-than-half-vulnerabilities www.secnews.physaphae.fr/article.php?IdArticle=8664611 False Vulnerability None 2.0000000000000000 Dark Reading - Informationweek Branch Les attaquants et les défenseurs s'appuient sur l'IA dans la bataille de la fraude à l'identité<br>Attackers and Defenders Lean on AI in Identity Fraud Battle Identity verification, insurance claims, and financial services are all seeing surges in AI-enabled fraud, but organizations are taking advantage of AI systems to fight fire with fire.]]> 2025-04-18T18:04:39+00:00 https://www.darkreading.com/cyber-risk/fraudsters-increasingly-use-ai-companies-look-ai www.secnews.physaphae.fr/article.php?IdArticle=8664574 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Chinese APT Mustang Panda fait ses débuts 4 nouveaux outils d'attaque<br>Chinese APT Mustang Panda Debuts 4 New Attack Tools The notorious nation-state-backed threat actor has added two new keyloggers, a lateral movement tool, and an endpoint detection and response (EDR) evasion driver to its arsenal.]]> 2025-04-18T17:26:09+00:00 https://www.darkreading.com/cloud-security/chinese-apt-mustang-panda-4-attack-tools www.secnews.physaphae.fr/article.php?IdArticle=8664575 False Tool,Threat None 2.0000000000000000 Dark Reading - Informationweek Branch La CISA pèse sur une violation présumée d'Oracle Cloud<br>CISA Weighs In on Alleged Oracle Cloud Breach The agency is recommending that organizations and individuals implement its recommendations to prevent the misuse of stolen data, though Oracle has yet to publicly do the same for its customers.]]> 2025-04-18T15:24:58+00:00 https://www.darkreading.com/cloud-security/cisa-alleged-oracle-cloud-breach www.secnews.physaphae.fr/article.php?IdArticle=8664541 False Cloud None 3.0000000000000000 Dark Reading - Informationweek Branch Si les planches ne corrigent pas la sécurité, les régulateurs<br>If Boards Don\\'t Fix OT Security, Regulators Will Around the world, governments are setting higher-bar regulations with clear corporate accountability for breaches on the belief organizations won\'t drive up security maturity for operational technology unless they\'re made to.]]> 2025-04-18T14:00:00+00:00 https://www.darkreading.com/ics-ot-security/boards-fix-ot-security-regulators www.secnews.physaphae.fr/article.php?IdArticle=8664501 False Industrial None 3.0000000000000000 Dark Reading - Informationweek Branch Apple zéro-jours sous \\ 'Attaque sophistiquée, \\' mais les détails manquant<br>Apple Zero-Days Under \\'Sophisticated Attack,\\' but Details Lacking The technology giant said two zero-day vulnerabilities were used in attacks on iOS devices against "specific targeted individuals," which suggests spyware or nation-state threat activity.]]> 2025-04-18T13:01:45+00:00 https://www.darkreading.com/vulnerabilities-threats/apple-zero-days-sophisticated-attacks www.secnews.physaphae.fr/article.php?IdArticle=8664521 False Vulnerability,Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Joublé par Trump, Chris Krebs démissionne de Sentinélone<br>Dogged by Trump, Chris Krebs Resigns from SentinelOne The president revoked the former CISA director\'s security clearance, half a decade after Krebs challenged right-wing election disinformation, prompting his eventual resignation.]]> 2025-04-17T19:12:55+00:00 https://www.darkreading.com/cybersecurity-operations/trump-chris-krebs-resigns-sentinelone www.secnews.physaphae.fr/article.php?IdArticle=8664196 False None None 3.0000000000000000 Dark Reading - Informationweek Branch PromptArmor lance pour aider à évaluer, surveiller les risques d'infirmière tiers<br>PromptArmor Launches to Help Assess, Monitor Third-Party AI Risks The AI security startup has already made waves with critical vulnerability discoveries and seeks to address emerging AI concerns with its PromptArmor platform.]]> 2025-04-17T18:10:49+00:00 https://www.darkreading.com/cyber-risk/promptarmor-launches-assess-monitor-third-party-ai-risk www.secnews.physaphae.fr/article.php?IdArticle=8664455 False Vulnerability None 3.0000000000000000 Dark Reading - Informationweek Branch Les coupes du programme CVE envoient le cyber secteur en mode panique<br>CVE Program Cuts Send the Cyber Sector Into Panic Mode After threatening to slash support for the CVE program, CISA threw MITRE a lifeline at the last minute - extending its government contract for another 11 months. After that, it looks like it\'s up to the private sector to find the cash to keep it going.]]> 2025-04-17T15:38:04+00:00 https://www.darkreading.com/vulnerabilities-threats/cve-program-cuts-cyber-sector www.secnews.physaphae.fr/article.php?IdArticle=8664112 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Cybersécurité par conception: lorsque les humains rencontrent la technologie<br>Cybersecurity by Design: When Humans Meet Technology If security tools are challenging to use, people will look for workarounds to get around the restrictions.]]> 2025-04-17T13:49:43+00:00 https://www.darkreading.com/cyber-risk/cybersecurity-by-design-when-humans-meet-technology www.secnews.physaphae.fr/article.php?IdArticle=8664066 False Tool None 3.0000000000000000 Dark Reading - Informationweek Branch Moyen-Orient et dépenses de sécurité en Afrique du Nord pour dépasser 3 milliards de dollars<br>Middle East, North Africa Security Spending to Top $3B Gartner projects IT security spending in the MENA region will continue to increase in 2025, with security services accounting for the most growth.]]> 2025-04-17T06:00:00+00:00 https://www.darkreading.com/cybersecurity-analytics/middle-east-north-africa-security-spending www.secnews.physaphae.fr/article.php?IdArticle=8663886 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Les attaques d'usurpation du GPS font une pointe au Moyen-Orient, en Asie du Sud-Est<br>GPS Spoofing Attacks Spike in Middle East, Southeast Asia An Indian disaster-relief flight delivering aid is the latest air-traffic incident, as attacks increase in the Middle East and Myanmar and along the India-Pakistan border.]]> 2025-04-17T02:30:00+00:00 https://www.darkreading.com/cyberattacks-data-breaches/gps-spoofing-attacks-spike-middle-east-southeast-asia www.secnews.physaphae.fr/article.php?IdArticle=8663829 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Plusieurs groupes exploitent la faille NTLM dans Microsoft Windows<br>Multiple Groups Exploit NTLM Flaw in Microsoft Windows The attacks have been going on since shortly after Microsoft patched the vulnerability in March.]]> 2025-04-16T21:25:24+00:00 https://www.darkreading.com/cyberattacks-data-breaches/multiple-group-exploiting-ntlm-flaw www.secnews.physaphae.fr/article.php?IdArticle=8663758 False Vulnerability,Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Les pirates liés à la Chine pondent des portes de briques sur les réseaux européens sur les réseaux européens<br>China-Linked Hackers Lay Brickstorm Backdoors on Euro Networks Researchers discovered new variants of the malware, which is tied to a China-nexus threat group, targeting Windows environments of critical infrastructure networks in Europe.]]> 2025-04-16T20:58:10+00:00 https://www.darkreading.com/vulnerabilities-threats/china-linked-hackers-brickstorm-backdoors-european-networks www.secnews.physaphae.fr/article.php?IdArticle=8663759 False Malware,Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Téléphones Android pré-téléchargés avec des portefeuilles de cryptographie utilisateur cible de logiciels malveillants<br>Android Phones Pre-Downloaded With Malware Target User Crypto Wallets The threat actors lace pre-downloaded applications with malware to steal cryptocurrency by covertly swapping users\' wallet addresses with their own.]]> 2025-04-16T20:57:30+00:00 https://www.darkreading.com/threat-intelligence/android-pre-downloaded-malware-crypto-wallets www.secnews.physaphae.fr/article.php?IdArticle=8664175 False Malware,Threat,Mobile None 3.0000000000000000 Dark Reading - Informationweek Branch Ransomware Gang \\ 'CrazyHunter \\' cible les orgs taïwanais critiques<br>Ransomware gang \\'CrazyHunter\\' Targets Critical Taiwanese Orgs Trend Micro researchers detailed an emerging ransomware campaign by a new group known as "CrazyHunter" that is targeting critical sectors in Taiwan.]]> 2025-04-16T20:10:07+00:00 https://www.darkreading.com/threat-intelligence/ransomware-gang-crazyhunter-critical-taiwanese-orgs www.secnews.physaphae.fr/article.php?IdArticle=8663738 False Ransomware,Prediction None 3.0000000000000000 Dark Reading - Informationweek Branch NIST met à jour le cadre de confidentialité avec l'IA et les révisions de gouvernance<br>NIST Updates Privacy Framework With AI and Governance Revisions The U.S. National Institute of Standards and Technology (NIST) updated its Privacy Framework to work cohesively with its Cybersecurity Framework and guide organizations to develop stronger postures to handle privacy risks..]]> 2025-04-16T19:54:19+00:00 https://www.darkreading.com/data-privacy/nist-updates-privacy-framework-ai-governance www.secnews.physaphae.fr/article.php?IdArticle=8664035 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Patch maintenant: les défauts NVDIA exposent les modèles d'IA, l'infrastructure critique<br>Patch Now: NVDIA Flaws Expose AI Models, Critical Infrastructure A fix for a critical flaw in a tool allowing organizations to run GPU-accelerated containers released last year did not fully mitigate the issue, spurring the need to patch a secondary flaw to protect organizations that rely on NVIDIA processors for AI workloads.]]> 2025-04-16T16:33:58+00:00 https://www.darkreading.com/cloud-security/buggy-nvdia-patch-exposes-ai-models-critical-infrastructure www.secnews.physaphae.fr/article.php?IdArticle=8663643 False Tool None 3.0000000000000000 Dark Reading - Informationweek Branch Cloud, défauts de cryptographie dans les applications mobiles, fuite des données d'entreprise<br>Cloud, Cryptography Flaws in Mobile Apps Leak Enterprise Data Cloud misconfigurations and cryptography flaws plague some of the top apps used in work environments, exposing organizations to risk and intrusion.]]> 2025-04-16T15:38:07+00:00 https://www.darkreading.com/endpoint-security/cloud-cryptography-flaws-mobile-apps-expose-enterprise-data www.secnews.physaphae.fr/article.php?IdArticle=8663614 False Mobile,Cloud None 3.0000000000000000 Dark Reading - Informationweek Branch Active Directory Recovery ne peut pas être une réflexion après coup<br>Active Directory Recovery Can\\'t Be an Afterthought Active Directory is one of the most vulnerable access points in an organization\'s IT environment. Companies cannot wait for a real attack to pressure-test their AD recovery strategy.]]> 2025-04-16T14:00:00+00:00 https://www.darkreading.com/vulnerabilities-threats/active-directory-recovery-afterthought www.secnews.physaphae.fr/article.php?IdArticle=8663583 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Les cabinets comptables ne peuvent pas lésiner sur la cybersécurité<br>Accounting Firms Can\\'t Skimp on Cybersecurity Cybercriminals capitalize on tax preparation stress, technology sprawl, and lax communications. Accounting teams can\'t afford to treat cybersecurity as an afterthought.]]> 2025-04-15T22:06:12+00:00 https://www.darkreading.com/cloud-security/accounting-firms-cannot-skimp-cybersecurity www.secnews.physaphae.fr/article.php?IdArticle=8663515 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Un bug de gravité maximale dans Apache Roller a permis un accès persistant<br>Max Severity Bug in Apache Roller Enabled Persistent Access The remediated flaw gave adversaries a way to maintain access to the app through password resets.]]> 2025-04-15T20:21:31+00:00 https://www.darkreading.com/vulnerabilities-threats/max-severity-bug-apache-roller-persistent-access www.secnews.physaphae.fr/article.php?IdArticle=8663229 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Avec l'aide d'Ai \\, les mauvais robots prennent le contrôle du Web<br>With AI\\'s Help, Bad Bots Are Taking Over the Web Bad bots are becoming increasingly difficult to detect as they more easily mimic human behaviors and utilize evasion techniques, researchers say.]]> 2025-04-15T20:11:11+00:00 https://www.darkreading.com/vulnerabilities-threats/ai-bad-bots-are-taking-over-web www.secnews.physaphae.fr/article.php?IdArticle=8663230 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Outil de présentation alimenté par l'IA exploité dans les attaques de phishing<br>AI-Powered Presentation Tool Leveraged in Phishing Attacks Researchers at Abnormal Security said threat actors are using a legitimate presentation and graphic design tool named "Gamma" in phishing attacks.]]> 2025-04-15T20:01:22+00:00 https://www.darkreading.com/threat-intelligence/ai-powered-presentation-tool-leveraged-phishing-attacks www.secnews.physaphae.fr/article.php?IdArticle=8663231 False Tool,Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Hertz est victime des attaques de Cleo Zero-Day<br>Hertz Falls Victim to Cleo Zero-Day Attacks Customer data such as birth dates, credit card numbers and driver\'s license information were stolen when threat actors exploited zero-day vulnerabilities in Cleo-managed file transfer products.]]> 2025-04-15T18:37:46+00:00 https://www.darkreading.com/vulnerabilities-threats/hertz-falls-victim-cleo-zero-day-attacks www.secnews.physaphae.fr/article.php?IdArticle=8663197 False Vulnerability,Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Vague d'attaques de phishing inspirées du vin cible les diplomates de l'UE<br>Wave of Wine-Inspired Phishing Attacks Targets EU Diplomats Russia-backed APT29\'s latest campaign once again uses malicious invites to wine-tasting events as its lure, but this time targets a different set of vintages - errr, victims - and delivers a novel backdoor, GrapeLoader.]]> 2025-04-15T16:11:23+00:00 https://www.darkreading.com/cyberattacks-data-breaches/wine-inspired-phishing-eu-diplomats www.secnews.physaphae.fr/article.php?IdArticle=8663160 False None APT 29 3.0000000000000000 Dark Reading - Informationweek Branch Sommes-nous en train de prioriser les mauvaises mesures de sécurité?<br>Are We Prioritizing the Wrong Security Metrics? True security isn\'t about meeting deadlines - it\'s about mitigating risk in a way that aligns with business objectives while protecting against real-world threats.]]> 2025-04-15T14:00:00+00:00 https://www.darkreading.com/cyber-risk/are-we-prioritizing-wrong-security-metrics www.secnews.physaphae.fr/article.php?IdArticle=8663109 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Acteur de menace soutenu par la Chine \\ 'unc5174 \\' en utilisant des outils open source dans des attaques furtives<br>China-Backed Threat Actor \\'UNC5174\\' Using Open Source Tools in Stealthy Attacks Sysdig researchers detailed an ongoing campaign from China-backed threat actor UNC5174, which is using open source hacking tools to stay under the radar.]]> 2025-04-15T14:00:00+00:00 https://www.darkreading.com/cyberattacks-data-breaches/china-threat-actor-unc5174-open-source-stealthy-attacks www.secnews.physaphae.fr/article.php?IdArticle=8663108 False Tool,Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Outils de code AI<br>AI Code Tools Widely Hallucinate Packages The hallucination problem is not just pervasive, it is persistent as well, according to new research.]]> 2025-04-14T21:19:29+00:00 https://www.darkreading.com/application-security/ai-code-tools-widely-hallucinate-packages www.secnews.physaphae.fr/article.php?IdArticle=8662839 False Tool None 3.0000000000000000 Dark Reading - Informationweek Branch Menage Intel Firm propose la crypto en échange de comptes Web sombres<br>Threat Intel Firm Offers Crypto in Exchange for Dark Web Accounts Prodaft is currently buying accounts from five Dark Web forums and offers to pay extra for administrator or moderator accounts. The idea is to infiltrate forums to boost its threat intelligence.]]> 2025-04-14T20:25:04+00:00 https://www.darkreading.com/threat-intelligence/threat-intel-firm-crypto-dark-web-accounts www.secnews.physaphae.fr/article.php?IdArticle=8662824 False Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Le bug de Fortinet Zero-Day peut conduire à une exécution de code arbitraire<br>Fortinet Zero-Day Bug May Lead to Arbitrary Code Execution A threat actor posted about the zero-day exploit on the same day that Fortinet published a warning about known vulnerabilities under active exploitation.]]> 2025-04-14T17:20:30+00:00 https://www.darkreading.com/vulnerabilities-threats/fortinet-zero-day-arbitrary-code-execution www.secnews.physaphae.fr/article.php?IdArticle=8662779 False Vulnerability,Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Chinois Apts exploite edr \\ 'écart de visibilité \\' pour le cyber-espionnage<br>Chinese APTs Exploit EDR \\'Visibility Gap\\' for Cyber Espionage Blind spots in network visibility, including in firewalls, IoT devices, and the cloud, are being exploited by Chinese state-backed threat actors with increasing success, according to new threat intelligence. Here\'s how experts say you can get eyes on it all.]]> 2025-04-14T16:34:17+00:00 https://www.darkreading.com/threat-intelligence/chinese-apt-exploit-edr-visibility-gap-cyber-espionage www.secnews.physaphae.fr/article.php?IdArticle=8662763 False Threat,Cloud None 3.0000000000000000 Dark Reading - Informationweek Branch Un nouveau \\ 'it rat \\': furtif \\ 'résolver \\' malware tremble dans<br>A New \\'It RAT\\': Stealthy \\'Resolver\\' Malware Burrows In A new infostealer on the market is making big waves globally, replacing Lumma et al. in attacks and employing so many stealth, persistence, and anti-analysis tricks that it\'s downright difficult to count them all.]]> 2025-04-14T14:53:31+00:00 https://www.darkreading.com/cloud-security/it-rat-stealthy-resolver-malware www.secnews.physaphae.fr/article.php?IdArticle=8662744 False Malware None 3.0000000000000000 Dark Reading - Informationweek Branch 7 RSAC 2025 Cloud Security Sessions Vous ne voulez pas manquer<br>7 RSAC 2025 Cloud Security Sessions You Don\\'t Want to Miss Some of the brightest minds in the industry will discuss how to strengthen cloud security.]]> 2025-04-14T14:00:00+00:00 https://www.darkreading.com/cloud-security/7-rsac-2025-cloud-security-sessions www.secnews.physaphae.fr/article.php?IdArticle=8662706 False Cloud None 3.0000000000000000 Dark Reading - Informationweek Branch Comment DigitalOcean s'est éloigné de la gestion de l'identité manuelle<br>How DigitalOcean Moved Away From Manual Identity Management DigitalOcean executives describe how they automated and streamlined many of the identity and access management functions which had been previously handled manually.]]> 2025-04-14T12:28:48+00:00 https://www.darkreading.com/identity-access-management-security/how-digitalocean-moved-away-from-manual-identity-management www.secnews.physaphae.fr/article.php?IdArticle=8662681 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Le Maroc enquête sur la fuite de données de l'agence de sécurité sociale<br>Morocco Investigates Social Security Agency Data Leak A threat actor has claimed responsibility for the alleged politically motivated attack and has uploaded the stolen data to a Dark Web forum.]]> 2025-04-14T06:00:00+00:00 https://www.darkreading.com/threat-intelligence/morocco-investigates-social-security-agency-data-leak www.secnews.physaphae.fr/article.php?IdArticle=8662558 False Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Le processus Pall Mall progresse mais mène à plus de questions<br>Pall Mall Process Progresses but Leads to More Questions Nations continue to sign the Code of Practice for States in an effort to curb commercial spyware, yet implementation and enforcement concerns have yet to be figured out.]]> 2025-04-11T20:44:57+00:00 https://www.darkreading.com/cyberattacks-data-breaches/pall-mall www.secnews.physaphae.fr/article.php?IdArticle=8661887 False Legislation,Commercial None 2.0000000000000000 Dark Reading - Informationweek Branch L'acteur de menace de loup-garou en papier cible les lecteurs flash avec de nouveaux logiciels malveillants<br>Paper Werewolf Threat Actor Targets Flash Drives With New Malware The threat actor, also known as Goffee, has been active since at least 2022 and has changed its tactics and techniques over the years while targeting Russian organizations.]]> 2025-04-11T19:42:08+00:00 https://www.darkreading.com/threat-intelligence/paper-werewolf-targets-flash-drives-new-malware www.secnews.physaphae.fr/article.php?IdArticle=8661855 False Malware,Threat None 3.0000000000000000 Dark Reading - Informationweek Branch La fraude financière, avec une touche de tiers, domine les cyber-affirmations<br>Financial Fraud, With a Third-Party Twist, Dominates Cyber Claims The most damaging attacks continue to be ransomware, but financial fraud claims are more numerous - and both are driven by increasing third-party breaches.]]> 2025-04-11T17:15:52+00:00 https://www.darkreading.com/threat-intelligence/financial-fraud-third-party-cyber-claims www.secnews.physaphae.fr/article.php?IdArticle=8661819 False Ransomware None 3.0000000000000000 Dark Reading - Informationweek Branch Utilisation des fournisseurs d'identité tiers sans perdre zéro confiance<br>Using Third-Party ID Providers Without Losing Zero Trust With $4.4 billion in worldwide data breach fines in 2024, the cost of not knowing who\'s walking into your systems is devastating.]]> 2025-04-11T14:00:00+00:00 https://www.darkreading.com/cyber-risk/using-third-party-id-providers-zero-trust www.secnews.physaphae.fr/article.php?IdArticle=8661770 False Data Breach None 3.0000000000000000 Dark Reading - Informationweek Branch Les organisations manquent de plans de réponse aux incidents, mais les réponses sont en cours<br>Organizations Lack Incident Response Plans, But Answers Are on the Way Developing strong incident response plans remains an area that requires significant improvement. Here are some shortcomings and how to address them.]]> 2025-04-11T13:45:48+00:00 https://www.darkreading.com/cyberattacks-data-breaches/shortcomings-improvements-incident-response-plans www.secnews.physaphae.fr/article.php?IdArticle=8661752 False None None 2.0000000000000000 Dark Reading - Informationweek Branch 11 bogues trouvés dans l'application Android de chatte de perplexité AI \\<br>11 Bugs Found in Perplexity AI\\'s Chatbot Android App Researchers characterize the company\'s artificial intelligence chatbot as less secure than ChatGPT and even DeepSeek.]]> 2025-04-11T13:00:00+00:00 https://www.darkreading.com/application-security/11-bugs-found-perplexity-chatbots-android-app www.secnews.physaphae.fr/article.php?IdArticle=8661730 False Mobile ChatGPT 3.0000000000000000 Dark Reading - Informationweek Branch Zero-day dans la plate-forme de partage de fichiers Centrestack sous attaque<br>Zero-Day in CentreStack File Sharing Platform Under Attack Gladinet\'s platform is widely used among managed service providers, and a critical deserialization flaw could put MSP customers in jeopardy.]]> 2025-04-10T21:15:36+00:00 https://www.darkreading.com/vulnerabilities-threats/zero-day-centrestack-platform-under-attack www.secnews.physaphae.fr/article.php?IdArticle=8661517 False Vulnerability,Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Authzen vise à harmoniser les contrôles d'autorisation fracturés<br>AuthZEN Aims to Harmonize Fractured Authorization Controls Managing permissions and authorizations across dozens or hundreds of cloud services and platforms poses significant headaches for companies. An open specification aims to change that.]]> 2025-04-10T20:41:31+00:00 https://www.darkreading.com/cloud-security/authzen-aims-harmonize-fractured-authorization-controls www.secnews.physaphae.fr/article.php?IdArticle=8661502 False Cloud None 3.0000000000000000 Dark Reading - Informationweek Branch Ping Identity double la stratégie des partenaires avec un nouveau programme partenaire et un conseil consultatif<br>Ping Identity Doubles Down on Partner Strategy with New Partner Program and Advisory Board 2025-04-10T19:45:20+00:00 https://www.darkreading.com/cybersecurity-operations/ping-identity-reveals-partner-program-and-advisory-board www.secnews.physaphae.fr/article.php?IdArticle=8661483 False None None 2.0000000000000000 Dark Reading - Informationweek Branch La plate-forme de gestion des actifs numériques Limiminal lève 4,7 millions de dollars de financement dirigée par Elevation Capital<br>Digital Asset Management Platform Liminal Raises $4.7M Funding Led by Elevation Capital 2025-04-10T19:40:01+00:00 https://www.darkreading.com/cybersecurity-operations/liminal-raises-4m-funding www.secnews.physaphae.fr/article.php?IdArticle=8661484 False None None 3.0000000000000000 Dark Reading - Informationweek Branch DOJ de Trump \\ cible Krebs, révoque l'autorisation de sécurité de Sentinelone<br>Trump\\'s DoJ Targets Krebs, Revokes SentinelOne Security Clearance An executive order is targeting former Trump appointees, including former CISA director Chris Krebs and his current coworkers, in the latest in a series of directives against those who dissented against the president and his associates.]]> 2025-04-10T19:31:04+00:00 https://www.darkreading.com/threat-intelligence/trump-doj-krebs-revokes-sentinelone-security-clearance www.secnews.physaphae.fr/article.php?IdArticle=8661485 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Que devraient faire les États-Unis à propos du typhon de sel?<br>What Should the US Do About Salt Typhoon? Security experts weigh in on the problem Salt Typhoon and its hacking of telecoms poses against the United States, including what the US should do and how defenders can protect themselves.]]> 2025-04-10T18:36:49+00:00 https://www.darkreading.com/cyberattacks-data-breaches/what-should-us-do-salt-typhoon www.secnews.physaphae.fr/article.php?IdArticle=8661486 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Les correctifs empoisonnés open source infectent le logiciel local<br>Open Source Poisoned Patches Infect Local Software Malicious packages lurking on open source repositories like npm have become less effective, so cyberattackers are using a new strategy: offering "patches" for locally installed programs.]]> 2025-04-10T18:10:10+00:00 https://www.darkreading.com/cloud-security/open-source-poisoned-patches-infect-local-software www.secnews.physaphae.fr/article.php?IdArticle=8661467 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Pourquoi la confidentialité des données n'est pas la même que la sécurité des données<br>Why Data Privacy Isn\\'t the Same as Data Security Failing to distinguish between data privacy and data security leaves businesses vulnerable to regulatory scrutiny and the kinds of breaches that erode consumer trust overnight.]]> 2025-04-10T14:00:00+00:00 https://www.darkreading.com/cyber-risk/data-privacy-versus-data-security www.secnews.physaphae.fr/article.php?IdArticle=8661393 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Les acteurs de la menace utilisent \\ 'Bombing Spam \\' Technique pour cacher des motifs malveillants<br>Threat Actors Use \\'Spam Bombing\\' Technique to Hide Malicious Motives Darktrace researchers detailed "spam bombing," a technique in which threat actors bombard targets with spam emails as a pretense for activity like social engineering campaigns.]]> 2025-04-10T13:00:00+00:00 https://www.darkreading.com/cyberattacks-data-breaches/threat-actors-spam-bombing-malicious-motives www.secnews.physaphae.fr/article.php?IdArticle=8661372 False Spam,Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Google fusionne les offres de sécurité dans une suite cohésive<br>Google Merges Security Offerings Into a Cohesive Suite Google Unified Security brings together threat detection, AI-powered security, secure browser features, and Mandiant services, the company said at its Cloud Next conference.]]> 2025-04-09T22:40:04+00:00 https://www.darkreading.com/cloud-security/google-merges-security-offerings-cohesive-suite www.secnews.physaphae.fr/article.php?IdArticle=8661373 False Threat,Cloud,Conference None 3.0000000000000000 Dark Reading - Informationweek Branch La préparation avancée a été la clé d'un Olympique de Paris sécurisé<br>Advanced Preparation Was Key to a Secure Paris Olympics The security teams associated with the 2024 Olympic Games in Paris focused on in-depth penetration testing, crisis management exercises, and collaboration to defend against potential cyberattacks.]]> 2025-04-09T21:57:34+00:00 https://www.darkreading.com/cybersecurity-operations/advanced-preparation-key-secure-paris-olympics www.secnews.physaphae.fr/article.php?IdArticle=8661374 False None None 3.0000000000000000 Dark Reading - Informationweek Branch US Contrôleur Cyber ​​\\ 'Incident \\' Compromis les courriels d'Org \\<br>US Comptroller Cyber \\'Incident\\' Compromises Org\\'s Emails A review of the emails involved in the breach is still ongoing, but what has been discovered is enough for the Treasury Department to label it a "major cyber incident."]]> 2025-04-09T21:54:30+00:00 https://www.darkreading.com/vulnerabilities-threats/occ-major-cyber-incident-executive-employee-emails www.secnews.physaphae.fr/article.php?IdArticle=8661235 False None None 2.0000000000000000 Dark Reading - Informationweek Branch L'exploitation de Cratshftp se poursuit au milieu du différend de divulgation<br>CrushFTP Exploitation Continues Amid Disclosure Dispute Attacks on a critical authentication bypass flaw in CrushFTP\'s file transfer product continue this week after duplicate CVEs sparked confusion.]]> 2025-04-09T21:15:24+00:00 https://www.darkreading.com/vulnerabilities-threats/crushftp-exploitation-disclosure-dispute www.secnews.physaphae.fr/article.php?IdArticle=8661236 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Les tarifs peuvent provoquer une augmentation des cyberattaques mondiales<br>Tariffs May Prompt Increase in Global Cyberattacks Cybersecurity and policy experts worry that if tariffs give way to a global recession, organizations will reduce their spending on cybersecurity.]]> 2025-04-09T20:08:25+00:00 https://www.darkreading.com/cyber-risk/tariffs-increase-global-cyberattacks www.secnews.physaphae.fr/article.php?IdArticle=8661225 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Oracle semble admettre la violation de 2 \\ 'serveurs obsolètes<br>Oracle Appears to Admit Breach of 2 \\'Obsolete\\' Servers The database company said its Oracle Cloud Infrastructure (OCI) was not involved in the breach. And at least one law firm seeking damages is already on the case.]]> 2025-04-09T18:59:10+00:00 https://www.darkreading.com/cyberattacks-data-breaches/oracle-breach-2-obsolete-servers www.secnews.physaphae.fr/article.php?IdArticle=8661226 False Cloud None 2.0000000000000000 Dark Reading - Informationweek Branch Les pirates liés à la Chine continuent de harceler des groupes ethniques avec des logiciels espions<br>China-Linked Hackers Continue Harassing Ethnic Groups With Spyware Threat actors are trolling online forums and spreading malicious apps to target Uyghurs, Taiwanese, Tibetans, and other individuals aligned with interests that China sees as a threat to its authority.]]> 2025-04-09T18:19:23+00:00 https://www.darkreading.com/vulnerabilities-threats/china-continues-harassing-ethnic-groups-spyware www.secnews.physaphae.fr/article.php?IdArticle=8661207 False Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Utilisation de la planification post-Quantum pour améliorer l'hygiène de sécurité<br>Using Post-Quantum Planning to Improve Security Hygiene With careful planning, the transition to post-quantum cryptography can significantly improve security and risk management for the present and future.]]> 2025-04-09T14:00:00+00:00 https://www.darkreading.com/vulnerabilities-threats/post-quantum-planning-security-hygiene www.secnews.physaphae.fr/article.php?IdArticle=8661149 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Microsoft laisse tomber une autre mise à jour de patch massive<br>Microsoft Drops Another Massive Patch Update A threat actor has already exploited one of the flaws in a ransomware campaign with victims in the US and other countries.]]> 2025-04-08T22:01:15+00:00 https://www.darkreading.com/application-security/microsoft-drops-another-massive-patch-update www.secnews.physaphae.fr/article.php?IdArticle=8661021 False Ransomware,Threat None 3.0000000000000000 Dark Reading - Informationweek Branch L'industrie demande la clarté des règles proposées de la cybersécurité HIPAA<br>Industry Asks for Clarity on Proposed HIPAA Cybersecurity Rules Healthcare and IT security practitioners worry some of the proposed amendments are not practical for a sector that lacks resources and often uses legacy equipment.]]> 2025-04-08T21:36:33+00:00 https://www.darkreading.com/cyber-risk/industry-asks-clarity-proposed-hipaa-rules www.secnews.physaphae.fr/article.php?IdArticle=8661137 False Medical None 3.0000000000000000 Dark Reading - Informationweek Branch Aurascape apporte une visibilité, des contrôles de sécurité pour gérer les applications d'IA<br>Aurascape Brings Visibility, Security Controls to Manage AI Applications New cybersecurity startup Aurascape emerged from stealth today with an AI-native security platform to automate security policies for AI applications.]]> 2025-04-08T19:40:11+00:00 https://www.darkreading.com/cyber-risk/aurascape-brings-visibility-security-controls-ai-applications www.secnews.physaphae.fr/article.php?IdArticle=8661138 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Les organisations britanniques récupèrent des projets numériques avec une menace imminente de cyber-warfare<br>UK Orgs Pull Back Digital Projects With Looming Threat of Cyberwarfare Artificial intelligence poses a significant concern when it comes to nation-state cyberthreats and AI\'s ability to supercharge attacks.]]> 2025-04-08T19:39:28+00:00 https://www.darkreading.com/threat-intelligence/uk-orgs-pull-back-digital-projects-cyberwarfare www.secnews.physaphae.fr/article.php?IdArticle=8661003 False Threat None 3.0000000000000000 Dark Reading - Informationweek Branch 2 bogues Android Zero-Day sous Exploit actif<br>2 Android Zero-Day Bugs Under Active Exploit Neither security issue requires user interaction; and one of the vulnerabilities was used to unlock a student activist\'s device in an attempt to install spyware.]]> 2025-04-08T16:17:21+00:00 https://www.darkreading.com/vulnerabilities-threats/android-zero-day-bugs-active-exploit www.secnews.physaphae.fr/article.php?IdArticle=8660988 False Vulnerability,Threat,Mobile None 3.0000000000000000 Dark Reading - Informationweek Branch Dangereux, Windows-Hijacking Neptune Rat Scurries dans Telegram, YouTube<br>Dangerous, Windows-Hijacking Neptune RAT Scurries Into Telegram, YouTube The malware\'s creators insist a new open source version of Neptune is for educational use by pen testers, but a raft of sophisticated backdoor and evasion capabilities says otherwise.]]> 2025-04-08T14:20:10+00:00 https://www.darkreading.com/cloud-security/windows-hijacking-neptune-rat-telegram-youtube www.secnews.physaphae.fr/article.php?IdArticle=8660955 False Malware None 3.0000000000000000 Dark Reading - Informationweek Branch Comment le développement démocratisé crée un cauchemar de sécurité<br>How Democratized Development Creates a Security Nightmare No-code and low-code platforms offer undeniable benefits. But when security is an afterthought, organizations risk deploying vulnerable applications that expose sensitive data and critical systems.]]> 2025-04-08T14:00:00+00:00 https://www.darkreading.com/cyber-risk/democratized-development-security-nightmare www.secnews.physaphae.fr/article.php?IdArticle=8660979 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Des experts optimistes sur Secure by Design Progress<br>Experts Optimistic about Secure by Design Progress Secure by Design is an important step to reduce the number of vulnerabilities present originally, but is it progressing fast enough? Security experts Chris Wysopal and Jason Healey say things are improving for the better.]]> 2025-04-07T22:58:06+00:00 https://www.darkreading.com/application-security/optimism-about-secure-by-design-progress www.secnews.physaphae.fr/article.php?IdArticle=8660937 False Vulnerability None 3.0000000000000000 Dark Reading - Informationweek Branch Palo Alto Networks commence le déploiement de la sécurité unifiée<br>Palo Alto Networks Begins Unified Security Rollout Cortex Cloud integrates Prisma Cloud with CDR to provide a consolidated security posture management and real-time threat detection and remediation.]]> 2025-04-07T22:14:51+00:00 https://www.darkreading.com/cloud-security/palo-alto-networks-begins-unified-security-rollout www.secnews.physaphae.fr/article.php?IdArticle=8660938 False Threat,Cloud None 3.0000000000000000 Dark Reading - Informationweek Branch Toddycat APT cible le bug Eset pour charger des logiciels malveillants silencieux<br>ToddyCat APT Targets ESET Bug to Load Silent Malware Researchers found the threat actor attempting to use the now-patched flaw to load and execute a malicious dynamic link library on infected systems.]]> 2025-04-07T20:43:35+00:00 https://www.darkreading.com/vulnerabilities-threats/toddycat-apt-eset-bug-silent-malware www.secnews.physaphae.fr/article.php?IdArticle=8660818 False Malware,Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Nist pour mettre en œuvre le statut \\ 'différé \\' aux vulnérabilités datées<br>NIST to Implement \\'Deferred\\' Status to Dated Vulnerabilities The changes will go into effect over the next several days to reflect which CVEs are being prioritized in the National Vulnerability Database (NVD).]]> 2025-04-07T19:00:35+00:00 https://www.darkreading.com/vulnerabilities-threats/nist-deferred-status-dated-vulnerabilities www.secnews.physaphae.fr/article.php?IdArticle=8660807 False Vulnerability None 2.0000000000000000 Dark Reading - Informationweek Branch Araignée dispersée \\ 's \\' roi Bob \\ 'plaide coupable de cyber-accusations<br>Scattered Spider\\'s \\'King Bob\\' Pleads Guilty to Cyber Charges The 20-year-old was arrested in January 2024 alongside four other group members who carried out related cybercriminal acts, earning them similar charges.]]> 2025-04-07T17:16:23+00:00 https://www.darkreading.com/vulnerabilities-threats/scattered-spider-king-bob-pleads-guilty-charges www.secnews.physaphae.fr/article.php?IdArticle=8660789 False None None 3.0000000000000000 Dark Reading - Informationweek Branch La plate-forme d'attaquant autonome et axée sur Genai entre dans le chat<br>Autonomous, GenAI-Driven Attacker Platform Enters the Chat "Xanthorox AI" provides a modular GenAI platform for offensive cyberattacks, which supplies a model-agnostic, one-stop shop for developing a range of cybercriminal operations.]]> 2025-04-07T14:50:50+00:00 https://www.darkreading.com/threat-intelligence/autonomous-genai-attacker-platform-chat www.secnews.physaphae.fr/article.php?IdArticle=8660767 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Mentorat intergénérationnel: clé de la cybersécurité \\'s Ai Future<br>Intergenerational Mentoring: Key to Cybersecurity\\'s AI Future As threats evolve and technology changes, our ability to work together across generations will determine our success.]]> 2025-04-07T14:00:00+00:00 https://www.darkreading.com/cybersecurity-operations/intergenerational-mentoring-key-cybersecuritys-ai-future www.secnews.physaphae.fr/article.php?IdArticle=8660740 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Gmail n'est pas un moyen sécurisé d'envoyer des communications sensibles: un rappel amical<br>Gmail Is Not a Secure Way to Send Sensitive Comms: A Friendly Reminder New end-to-end Gmail encryption alone isn\'t secure enough for an enterprise\'s most sensitive and prized data, experts say.]]> 2025-04-04T20:25:00+00:00 https://www.darkreading.com/application-security/gmail-not-secure-way-send-sensitive-comms www.secnews.physaphae.fr/article.php?IdArticle=8660314 False None None 3.0000000000000000 Dark Reading - Informationweek Branch RSAC dévoile la conférence de conférencier pour conférences pour la conférence RSAC (TM) 2025<br>RSAC Unveils Keynote Speaker Slate for RSAC (TM) 2025 Conference 2025-04-04T20:09:32+00:00 https://www.darkreading.com/cybersecurity-operations/rsac-unveils-keynote-speaker-slate www.secnews.physaphae.fr/article.php?IdArticle=8660315 False Conference None 2.0000000000000000 Dark Reading - Informationweek Branch CISA avertit: Old DNS Trick \\ 'Fast Flux \\' est toujours en plein essor<br>CISA Warns: Old DNS Trick \\'Fast Flux\\' Is Still Thriving An old DNS switcheroo technique is still helping attackers keep their infrastructure alive. But is it really a pressing issue in 2025?]]> 2025-04-04T20:00:29+00:00 https://www.darkreading.com/cyber-risk/cisa-dns-trick-fast-flux-thriving www.secnews.physaphae.fr/article.php?IdArticle=8660316 False None None 3.0000000000000000 Dark Reading - Informationweek Branch La tribu du Minnesota a du mal après une attaque de ransomware<br>Minnesota Tribe Struggles After Ransomware Attack Hotel and casino operations for the Lower Sioux Indians have been canceled or postponed, and the local health center is redirecting those needing medical or dental care.]]> 2025-04-04T17:50:09+00:00 https://www.darkreading.com/cyberattacks-data-breaches/minnesota-tribe-operations-ransomware-attack www.secnews.physaphae.fr/article.php?IdArticle=8660289 False Ransomware,Medical None 2.0000000000000000 Dark Reading - Informationweek Branch Medusa provient de l'élan du pivot Ransomware-as-a-Service<br>Medusa Rides Momentum From Ransomware-as-a-Service Pivot Shifting to a RaaS business model has accelerated the group\'s growth, and targeting critical industries like healthcare, legal, and manufacturing hasn\'t hurt either.]]> 2025-04-04T14:37:16+00:00 https://www.darkreading.com/threat-intelligence/medusa-momentum-ransomware-as-a-service-pivot www.secnews.physaphae.fr/article.php?IdArticle=8660264 False Medical None 2.0000000000000000 Dark Reading - Informationweek Branch Les licenciements CISA sont une perturbation momentanée, pas une menace<br>CISA Layoffs Are a Momentary Disruption, Not a Threat Layoffs may cause short-term disruptions, but they don\'t represent a catastrophic loss of cybersecurity capability - because the true cyber operations never resided solely within CISA to begin with.]]> 2025-04-04T14:00:00+00:00 https://www.darkreading.com/vulnerabilities-threats/cisa-layoffs-momentary-disruption-not-threat www.secnews.physaphae.fr/article.php?IdArticle=8660265 False Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Les communications sécurisées évoluent au-delà du cryptage de bout en bout<br>Secure Communications Evolve Beyond End-to-End Encryption Signal, Wickr, WhatsApp, and Cape all have different approaches to security and privacy, yet most are finding ways to make secure communications more private.]]> 2025-04-04T12:47:08+00:00 https://www.darkreading.com/cybersecurity-operations/secure-communications-evolve-beyond-end-to-end-encryption www.secnews.physaphae.fr/article.php?IdArticle=8660228 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Des radeaux de bogues de sécurité pourraient pleuvoir les réseaux solaires<br>Rafts of Security Bugs Could Rain Out Solar Grids At least three major energy solution and renewable energy companies have nearly 50 vulnerabilities - many of them "basic" mistakes - indicating a lack of developed cybersecurity safeguards.]]> 2025-04-04T08:16:36+00:00 https://www.darkreading.com/vulnerabilities-threats/security-bugs-could-rain-out-solar-grids www.secnews.physaphae.fr/article.php?IdArticle=8660251 False Vulnerability None 3.0000000000000000 Dark Reading - Informationweek Branch Microsoft augmente les règles de l'expéditeur de messagerie pour Outlook<br>Microsoft Boosts Email Sender Rules for Outlook The tech giant will enforce new email authentication protocols for Outlook users who send large volumes of email beginning on May 5.]]> 2025-04-03T22:21:46+00:00 https://www.darkreading.com/cloud-security/microsoft-boosts-email-sender-rules-outlook www.secnews.physaphae.fr/article.php?IdArticle=8660240 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Le groupe de menaces lié à la Chine exploite Ivanti Bug<br>China-Linked Threat Group Exploits Ivanti Bug The vendor had originally assessed the flaw as low risk but now says it is a critical issue that enables remote code execution.]]> 2025-04-03T20:14:04+00:00 https://www.darkreading.com/vulnerabilities-threats/china-linked-threat-group-exploits-ivanti-bug www.secnews.physaphae.fr/article.php?IdArticle=8660117 False Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Coup drame de divulgation Crushftp Vulnérabilité Exploitation<br>Disclosure Drama Clouds CrushFTP Vulnerability Exploitation CrushFTP CEO Ben Spink slammed several cybersecurity companies for creating confusion around a critical authentication bypass flaw that\'s currently under attack.]]> 2025-04-03T19:51:25+00:00 https://www.darkreading.com/vulnerabilities-threats/disclosure-drama-clouds-crushftp-vulnerability-exploitation www.secnews.physaphae.fr/article.php?IdArticle=8660118 False Vulnerability None 3.0000000000000000 Dark Reading - Informationweek Branch Téléphones contrefaits transportant des logiciels malveillants Triada remaniés cachés<br>Counterfeit Phones Carrying Hidden Revamped Triada Malware The malware, first discovered in 2016, has been updated over the years, and the latest version is now hiding in the firmware of counterfeit mobile phones.]]> 2025-04-03T16:17:45+00:00 https://www.darkreading.com/endpoint-security/counterfeit-phones-infected-triada-malware www.secnews.physaphae.fr/article.php?IdArticle=8660110 False Malware,Mobile None 3.0000000000000000 Dark Reading - Informationweek Branch Runtime Ventures lance un nouveau fonds pour les startups de graines et de graines<br>Runtime Ventures Launches New Fund for Seed, Pre-Seed Startups Co-founders Michael Sutton and David Endler raised $32 million to invest in early stage cybersecurity startups as well as to provide mentoring support.]]> 2025-04-03T15:31:13+00:00 https://www.darkreading.com/endpoint-security/runtime-ventures-launches-new-fund-for-seed-pre-seed-startups www.secnews.physaphae.fr/article.php?IdArticle=8660091 False None None 3.0000000000000000 Dark Reading - Informationweek Branch L'ingénierie sociale est devenue plus intelligente<br>Social Engineering Just Got Smarter Polices that forbid employees from divulging company details are worthless if the same information can be obtained from sources employees have no control over.]]> 2025-04-03T14:00:00+00:00 https://www.darkreading.com/vulnerabilities-threats/social-engineering-smarter www.secnews.physaphae.fr/article.php?IdArticle=8660047 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Les risques émergents nécessitent une collaboration informatique pour sécuriser les systèmes physiques<br>Emerging Risks Require IT/OT Collaboration to Secure Physical Systems With an increase in cyber-physical attacks that can cause significant disruptions, financial fallout and safety concerns for victim organizations, Renee Guttmann and Marc Sachs discuss why IT and OT security teams cannot keep working in silos.]]> 2025-04-03T13:47:52+00:00 https://www.darkreading.com/ics-ot-security/experts-discuss-current-and-emerging-ics-security-risks www.secnews.physaphae.fr/article.php?IdArticle=8660064 False Industrial None 3.0000000000000000 Dark Reading - Informationweek Branch Google Quick Share Bogue contournait le transfert de fichiers zéro clique<br>Google Quick Share Bug Bypasses Allow Zero-Click File Transfer Google addresses patch bypasses for CVE-2024-38272 and CVE-2024-38271, part of the previously announced "QuickShell" silent RCE attack chain against Windows users.]]> 2025-04-03T10:24:26+00:00 https://www.darkreading.com/application-security/google-quick-share-bug-bypasses-zero-click-file-transfer www.secnews.physaphae.fr/article.php?IdArticle=8660048 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Israël entre \\ 'stade 3 \\' de Cyber ​​Wars avec des procurations iraniennes<br>Israel Enters \\'Stage 3\\' of Cyber Wars With Iran Proxies While Israel and Iranian proxies fight it out IRL, their conflict in cyberspace has developed in parallel. These days attacks have decelerated, but advanced in sophistication.]]> 2025-04-03T06:00:00+00:00 https://www.darkreading.com/threat-intelligence/israel-stage-3-cyber-wars-with-iran-proxies www.secnews.physaphae.fr/article.php?IdArticle=8659972 False None None 3.0000000000000000 Dark Reading - Informationweek Branch DPRC \\ 'Les travailleurs informatiques \\' Pivot en Europe pour les escroqueries d'emploi<br>DPRK \\'IT Workers\\' Pivot to Europe for Employment Scams By using fake references and building connections with recruiters, some North Korean nationals are landing six-figure jobs that replenish DPRK coffers.]]> 2025-04-02T21:48:13+00:00 https://www.darkreading.com/threat-intelligence/dprk-it-workers-europe-employment www.secnews.physaphae.fr/article.php?IdArticle=8659918 False None None 3.0000000000000000 Dark Reading - Informationweek Branch SolarWinds ajoute l'outil de gestion des incidents de Squadcast<br>SolarWinds Adds Incident Management Tool From Squadcast The IT service management and observability tools company acquired Squadcast last month and is adding the automated incident response platform to the SolarWinds portfolio.]]> 2025-04-02T21:45:46+00:00 https://www.darkreading.com/cyberattacks-data-breaches/solarwinds-adds-incident-management-tool-from-squadcast www.secnews.physaphae.fr/article.php?IdArticle=8660024 False Tool None 2.0000000000000000 Dark Reading - Informationweek Branch Dans le sillage de Salt Typhoon, le Congrès réfléchit aux options potentielles<br>In Salt Typhoon\\'s Wake, Congress Mulls Potential Options While the House Committee on Government Reform was looking for retaliatory options, cybersecurity experts pointed them toward building better defenses.]]> 2025-04-02T21:01:21+00:00 https://www.darkreading.com/cyberattacks-data-breaches/salt-typhoons-wake-congress-potential-options www.secnews.physaphae.fr/article.php?IdArticle=8659919 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Les nouvelles règles PCI DSS disent que les commerçants sur Hook pour la conformité, pas les fournisseurs<br>New PCI DSS Rules Say Merchants on Hook for Compliance, Not Providers Merchants and retailers will now face penalties for not being compliant with PCI DSS 4.0.1, and the increased security standards make it clear they cannot transfer compliance responsibility to third-party service providers.]]> 2025-04-02T19:19:32+00:00 https://www.darkreading.com/cyber-risk/new-pci-dss-rules-merchants-on-hook-compliance www.secnews.physaphae.fr/article.php?IdArticle=8660025 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Comment un état d'esprit d'interdiction peut aider à gagner la guerre contre les cyberattaques<br>How an Interdiction Mindset Can Help Win War on Cyberattacks The US military and law enforcement learned to outthink insurgents. It\'s time for cybersecurity to learn to outsmart and outmaneuver threat actors with the same framework.]]> 2025-04-02T14:00:00+00:00 https://www.darkreading.com/cyberattacks-data-breaches/how-interdiction-mindset-cyberattacks www.secnews.physaphae.fr/article.php?IdArticle=8659844 False Threat,Legislation None 3.0000000000000000 Dark Reading - Informationweek Branch Les logiciels malveillants de Gootloader revint dans les annonces Google pour les documents juridiques<br>Gootloader Malware Resurfaces in Google Ads for Legal Docs Attackers target a familiar industry, law professionals, by hiding the infostealer in ads delivered via Google-based malvertising.]]> 2025-04-02T13:22:44+00:00 https://www.darkreading.com/cyberattacks-data-breaches/gootloader-malware-google-ads-legal-docs www.secnews.physaphae.fr/article.php?IdArticle=8659845 False Malware None 3.0000000000000000 Dark Reading - Informationweek Branch La cyber-perturbation de l'aéroport malaisien \\ a avertissement pour l'Asie<br>Malaysian Airport\\'s Cyber Disruption a Warning for Asia Transportation facilities and networks slowly adapt to changes and threats, leaving them vulnerable to agile cyberattackers, as demonstrated by the $10 million ransomware attack.]]> 2025-04-02T01:00:00+00:00 https://www.darkreading.com/cyberattacks-data-breaches/malaysian-airport-cyber-disruption-warning-asia www.secnews.physaphae.fr/article.php?IdArticle=8659729 False Ransomware None 3.0000000000000000