www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2025-05-10T14:32:17+00:00 www.secnews.physaphae.fr Dark Reading - Informationweek Branch Comment les vents contraires économiques influencent l'écosystème des ransomwares<br>How Economic Headwinds Influence the Ransomware Ecosystem Inflation, cryptocurrency market volatility, and the ability to invest in defenses all influence the impact and severity of a ransomware attack, according to incident response efforts and ransomware negotiators.]]> 2025-03-17T12:54:25+00:00 https://www.darkreading.com/cyberattacks-data-breaches/how-economic-headwinds-influence-ransomware-ecosystem www.secnews.physaphae.fr/article.php?IdArticle=8656221 False Ransomware None 2.0000000000000000 Dark Reading - Informationweek Branch Le tunnel de données sécurisé d'Intel \\ déplace les modèles de formation AI aux sources de données<br>Intel\\'s Secure Data Tunnel Moves AI Training Models to Data Sources The chip maker\'s Tiber Secure Federated AI service creates a secure tunnel between AI models on remote servers and data sources on origin systems.]]> 2025-03-16T19:57:00+00:00 https://www.darkreading.com/cloud-security/intel-s-secure-data-tunnel-moves-ai-training-models-to-data-sources www.secnews.physaphae.fr/article.php?IdArticle=8656098 False None None 3.0000000000000000 Dark Reading - Informationweek Branch L'acteur de menace imite Booking.com dans le programme de phishing<br>Threat Actor Impersonates Booking.com in Phishing Scheme Microsoft detailed a sophisticated campaign that relies on a social engineering technique, "ClickFix," in which a phisher uses security verification like captcha to give the target a false sense of safety.]]> 2025-03-14T20:07:52+00:00 https://www.darkreading.com/threat-intelligence/threat-actor-booking-com-clickfix-phishing-scheme www.secnews.physaphae.fr/article.php?IdArticle=8655809 False Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Les vulns de l'homme au milieu offrent de nouvelles opportunités de recherche pour la sécurité des voitures<br>Man-in-the-Middle Vulns Provide New Research Opportunities for Car Security A pair of researchers plan on detailing effective tools to dig into the effectiveness of vehicle cybersecurity without breaking the bank.]]> 2025-03-14T19:38:38+00:00 https://www.darkreading.com/cybersecurity-operations/mitm-vulns-research-opportunities-car-security www.secnews.physaphae.fr/article.php?IdArticle=8655799 False Tool None 2.0000000000000000 Dark Reading - Informationweek Branch Ransomware Developer Extradit, admet de travailler pour Lockbit<br>Ransomware Developer Extradited, Admits Working for LockBit Law enforcement discovered admin credentials on the suspect\'s computer for an online repository hosted on the Dark Web that stored source code for multiple versions of the LockBit builder.]]> 2025-03-14T19:24:48+00:00 https://www.darkreading.com/cyberattacks-data-breaches/lockbit-developer-extradited-admits-working-ransomware-group www.secnews.physaphae.fr/article.php?IdArticle=8655800 False Ransomware,Legislation None 2.0000000000000000 Dark Reading - Informationweek Branch L'acteur de menace lié à Lockbit Ransomware cible les utilisateurs de Fortinet<br>Threat Actor Tied to LockBit Ransomware Targets Fortinet Users The Mora_001 group uses similar post-exploitation patterns and ransomware customization originated by LockBit.]]> 2025-03-14T17:25:44+00:00 https://www.darkreading.com/cyberattacks-data-breaches/actor-tied-lockbit-ransomware-targets-fortinet-users www.secnews.physaphae.fr/article.php?IdArticle=8655782 False Ransomware,Threat None 3.0000000000000000 Dark Reading - Informationweek Branch CISA réduit 10 millions de dollars de financement ISAC et des centaines d'employés<br>CISA Cuts $10M in ISAC Funding & 100s of Employees President Trump has long complained about perceived threats to election security. Now his DHS has kneecapped the agencies designed to support it. Experts are worried about what comes next.]]> 2025-03-14T14:53:32+00:00 https://www.darkreading.com/remote-workforce/cisa-cuts-isac-funding-employees www.secnews.physaphae.fr/article.php?IdArticle=8655756 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Les plus grandes cyber-menaces à l'industrie des soins de santé aujourd'hui<br>Biggest Cyber Threats to the Healthcare Industry Today Healthcare organizations must enhance their cybersecurity arsenal. Doing so can help them prevent financial, compliance, and reputational damage.]]> 2025-03-14T14:00:00+00:00 https://www.darkreading.com/vulnerabilities-threats/biggest-cyber-threats-healthcare-industry-today www.secnews.physaphae.fr/article.php?IdArticle=8655747 False Medical None 3.0000000000000000 Dark Reading - Informationweek Branch L'infra d'accès à distance reste la plus risquée Corp. Surface d'attaque<br>Remote Access Infra Remains Riskiest Corp. Attack Surface Exposed login panels for VPNs and remote access systems leave companies open to attack, sometimes tripling the risk of ransomware and making it harder to get cyber insurance.]]> 2025-03-14T13:00:00+00:00 https://www.darkreading.com/cyber-risk/remote-access-infra-remains-riskiest-corp-attack-surface www.secnews.physaphae.fr/article.php?IdArticle=8655736 False Ransomware None 3.0000000000000000 Dark Reading - Informationweek Branch Obscure # Bat malware met en évidence les risques de crochet API<br>OBSCURE#BAT Malware Highlights Risks of API Hooking Researchers discovered an attack chain that uses several layers of obfuscated batch files and PowerShell scripts to deliver an advanced and persistent rootkit.]]> 2025-03-13T21:22:29+00:00 https://www.darkreading.com/vulnerabilities-threats/obscurebat-malware-highlights-api-hooking www.secnews.physaphae.fr/article.php?IdArticle=8655624 False Malware None 2.0000000000000000 Dark Reading - Informationweek Branch FBI, la CISA stimule les alarmes à mesure que les attaques de ransomware Medusa augmentent<br>FBI, CISA Raise Alarms As Medusa Ransomware Attacks Grow Medusa developers have been targeting a wide variety of critical infrastructure sectors, from healthcare and technology to manufacturing and insurance, racking up its victim count as it seemingly adds to its numbers of affiliates.]]> 2025-03-13T21:15:09+00:00 https://www.darkreading.com/cyberattacks-data-breaches/fbi-cisa-alarmed-medusa-ransomware-attacks-grow www.secnews.physaphae.fr/article.php?IdArticle=8655625 False Ransomware,Medical None 2.0000000000000000 Dark Reading - Informationweek Branch Les groupes de consommateurs poussent la facture de sécurité IoT pour répondre aux préoccupations de l'EOL<br>Consumer Groups Push IoT Security Bill to Address EoL Concerns Consumer Reports, Secure Resilient Future Foundation (SRFF) and US Public Interest Research Group (PIRG) introduced a model bill to increase transparency around Internet of Things that have reached end-of-life status.]]> 2025-03-13T16:39:02+00:00 https://www.darkreading.com/iot/consumer-groups-rally-to-address-iot-security-concerns www.secnews.physaphae.fr/article.php?IdArticle=8655737 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Salt Typhoon: un réveil pour les infrastructures critiques<br>Salt Typhoon: A Wake-up Call for Critical Infrastructure The Salt Typhoon attacks underscored the need for unity, innovation, and resilience in the face of an increasingly sophisticated cyber-threat landscape.]]> 2025-03-13T14:00:00+00:00 https://www.darkreading.com/cyberattacks-data-breaches/salt-typhoon-wake-up-call-critical-infrastructure www.secnews.physaphae.fr/article.php?IdArticle=8655549 False None None 2.0000000000000000 Dark Reading - Informationweek Branch F5 intègre la sécurité et le réseautage de l'API pour aborder l'assaut de l'IA<br>F5 Integrates API Security and Networking to Address AI Onslaught The new The F5 Application Delivery Controller and Security Platform combines BIG-IP, NGNIX and Distributed Cloud Services and new AI Gateway and AI Assistants.]]> 2025-03-13T12:31:50+00:00 https://www.darkreading.com/endpoint-security/f5-api-security-networking-ai-onslaught www.secnews.physaphae.fr/article.php?IdArticle=8655530 False Cloud None 2.0000000000000000 Dark Reading - Informationweek Branch Agent opérateur openai utilisé dans l'attaque de phishing de la preuve de concept<br>OpenAI Operator Agent Used in Proof-of-Concept Phishing Attack Researchers from Symantec showed how OpenAI\'s Operator agent, currently in research preview, can be used to construct a basic phishing attack from start to finish.]]> 2025-03-13T10:00:00+00:00 https://www.darkreading.com/threat-intelligence/openai-operator-agent-proof-concept-phishing-attack www.secnews.physaphae.fr/article.php?IdArticle=8655493 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Les directives d'Abu Dhabi offrent un plan de cybersécurité en santé<br>Abu Dhabi Guidelines Offer Blueprint for Cybersecurity in Health Following increasing attacks on healthcare organizations, the United Arab Emirates has refined its regulatory strategy for improving cybersecurity in healthcare.]]> 2025-03-13T06:00:00+00:00 https://www.darkreading.com/cyber-risk/abu-dhabi-guidelines-offer-blueprint-cybersecurity-health www.secnews.physaphae.fr/article.php?IdArticle=8655449 False Medical None 2.0000000000000000 Dark Reading - Informationweek Branch Routeurs de genévrer de qualité supérieure à dos de secours à dos de chinois<br>China-Backed Hackers Backdoor US Carrier-Grade Juniper MX Routers Mandiant researchers found the routers of several unnamed organizations (likely telcos and ISPs) were hacked by UNC3886, and contained a custom backdoor called "TinyShell."]]> 2025-03-12T21:14:53+00:00 https://www.darkreading.com/cyberattacks-data-breaches/china-hackers-backdoor-carrier-grade-juniper-mx-routers www.secnews.physaphae.fr/article.php?IdArticle=8655387 False None None 2.0000000000000000 Dark Reading - Informationweek Branch NIST finalise les règles de confidentialité différentielle pour protéger les données<br>NIST Finalizes Differential Privacy Rules to Protect Data The National Institute of Standards and Technology (NIST) released updated differential privacy guidelines for organizations to follow to protect personally identifiable information when sharing data.]]> 2025-03-12T20:52:33+00:00 https://www.darkreading.com/data-privacy/nist-finalizes-differential-privacy-rules-to-protect-data www.secnews.physaphae.fr/article.php?IdArticle=8655398 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Apple laisse tomber un autre bogue webkit zéro-jour<br>Apple Drops Another WebKit Zero-Day Bug A threat actor leveraged the vulnerability in an "extremely sophisticated" attack on targeted iOS users, the company says.]]> 2025-03-12T20:48:51+00:00 https://www.darkreading.com/mobile-security/apple-drops-another-webkit-zero-day-bug www.secnews.physaphae.fr/article.php?IdArticle=8655377 False Vulnerability,Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Volt Typhoon frappe Massachusetts Power Utility<br>Volt Typhoon Strikes Massachusetts Power Utility The prolonged attack, which lasted 300+ days, is the first known compromise of the US electric grid by the Voltzite subgroup of the Chinese APT; during it, the APT attempted to exfiltrate critical OT infrastructure data.]]> 2025-03-12T17:54:37+00:00 https://www.darkreading.com/cyberattacks-data-breaches/volt-typhoon-strikes-massachusetts-power-utility www.secnews.physaphae.fr/article.php?IdArticle=8655348 False Industrial Guam 2.0000000000000000 Dark Reading - Informationweek Branch \\ 'Ballista \\' Botnet exploite 2023 Vulnérabilité dans les routeurs TP-Link<br>\\'Ballista\\' Botnet Exploits 2023 Vulnerability in TP-Link Routers In the past, the vulnerability was exploited to drop Mirai botnet malware. Today, it\'s being used once more for another botnet campaign with its own malware.]]> 2025-03-12T15:36:53+00:00 https://www.darkreading.com/cyberattacks-data-breaches/ballista-botnet-campaign-exploits-2023-vuln-tp-link-routers www.secnews.physaphae.fr/article.php?IdArticle=8655326 False Malware,Vulnerability None 2.0000000000000000 Dark Reading - Informationweek Branch Le CISO en tant qu'architecte de résilience commerciale<br>The CISO as Business Resilience Architect To truly become indispensable in the boardroom, CISOs need to meet the dual demands of defending against sophisticated adversaries while leading resilience strategies.]]> 2025-03-12T14:00:00+00:00 https://www.darkreading.com/vulnerabilities-threats/ciso-business-resilience-architect www.secnews.physaphae.fr/article.php?IdArticle=8655295 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Nombre d'énormes jours Microsoft Zero-Days<br>Whopping Number of Microsoft Zero-Days Under Attack The number of zero-day vulnerabilities getting patched in Microsoft\'s March update is the company\'s second-largest ever.]]> 2025-03-11T21:25:02+00:00 https://www.darkreading.com/application-security/whopping-number-microsoft-zero-days-under-attack www.secnews.physaphae.fr/article.php?IdArticle=8655136 False Vulnerability,Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Trump exploite Sean Plankey pour remplir le président du directeur de la CISA vide<br>Trump Taps Sean Plankey To Fill Empty CISA Director Chair Plankey has served in numerous cybersecurity positions in the past, including during the first Trump presidency from 2018-2020.]]> 2025-03-11T20:23:49+00:00 https://www.darkreading.com/cybersecurity-operations/trump-sean-plankey-cisa-director www.secnews.physaphae.fr/article.php?IdArticle=8655125 False None None 1.00000000000000000000 Dark Reading - Informationweek Branch Button Hot Butter Tag Tag Middle East, N. Afrique victimes<br>Hot Button Facebook Ads Tag Middle East, N. Africa Victims A Libya-linked threat actor has resurfaced, using the same old political phishing tricks to deliver AsyncRAT that have worked for years.]]> 2025-03-11T19:38:56+00:00 https://www.darkreading.com/cyberattacks-data-breaches/hot-button-facebook-ads-middle-east-africa-victims www.secnews.physaphae.fr/article.php?IdArticle=8655106 False Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Démocratiser la sécurité pour améliorer la posture de sécurité<br>Democratizing Security to Improve Security Posture Analysts weigh in on how democratizing cybersecurity could benefit organizations, particularly SMBs, as threats increase across the landscape.]]> 2025-03-11T12:57:30+00:00 https://www.darkreading.com/cybersecurity-operations/democratizing-cybersecurity-improve-security-posture www.secnews.physaphae.fr/article.php?IdArticle=8655019 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Les usurpères de binance compromettent les PC dans \\ 'Trump \\' crypto arnaque<br>Binance Spoofers Compromise PCs in \\'TRUMP\\' Crypto Scam An email campaign luring users with offers of free President Trump meme coins can lead to computer takeover via the ConnectWise RAT, in less than 2 minutes.]]> 2025-03-11T11:24:11+00:00 https://www.darkreading.com/cyberattacks-data-breaches/binance-spoofers-compromise-pcs-trump-crypto-scam www.secnews.physaphae.fr/article.php?IdArticle=8655054 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Exploit de voitures vous permet d'espionner les conducteurs en temps réel<br>Car Exploit Allows You to Spy on Drivers in Real Time Just like with any regular computer, researchers figured out how to crack into, force restart, and upload malware to an aftermarket in-vehicle infotainment system.]]> 2025-03-10T21:27:46+00:00 https://www.darkreading.com/vulnerabilities-threats/car-exploit-spy-drivers-real-time www.secnews.physaphae.fr/article.php?IdArticle=8655573 False Malware,Threat None 3.0000000000000000 Dark Reading - Informationweek Branch \\ 'Sidewinder \\' intensifie les attaques contre le secteur maritime<br>\\'SideWinder\\' Intensifies Attacks on Maritime Sector The likely India-based threat group is also targeting logistics companies in a continued expansion of its activities.]]> 2025-03-10T21:20:12+00:00 https://www.darkreading.com/cyberattacks-data-breaches/sidewinder-intensifies-attacks-maritime-sector www.secnews.physaphae.fr/article.php?IdArticle=8654930 False Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Google paie près de 12 millions de dollars dans le programme de primes de bogue 2024<br>Google Pays Out Nearly $12M in 2024 Bug Bounty Program The program underwent a series of changes in the past year, including richer maximum rewards in a variety of bug categories.]]> 2025-03-10T20:17:24+00:00 https://www.darkreading.com/vulnerabilities-threats/google-pays-nearly-12m-2024-bug-bounty-program www.secnews.physaphae.fr/article.php?IdArticle=8654924 False None None 4.0000000000000000 Dark Reading - Informationweek Branch APT \\ 'Blind Eagle \\' cible le gouvernement colombien<br>APT \\'Blind Eagle\\' Targets Colombian Government The South American-based advanced persistent threat group is using an exploit with a "high infection rate," according to research from Check Point.]]> 2025-03-10T19:38:36+00:00 https://www.darkreading.com/cyberattacks-data-breaches/apt-blind-eagle-targets-colombian-government www.secnews.physaphae.fr/article.php?IdArticle=8654919 False Threat None 3.0000000000000000 Dark Reading - Informationweek Branch L'ancien employé reconnu coupable de vengeance à un programme de commutation de kill<br>Ex-Employee Found Guilty in Revenge Kill-Switch Scheme Clandestine kill switch was designed to lock out other users if the developer\'s account in the company\'s Windows Active Directory was ever disabled.]]> 2025-03-10T17:20:37+00:00 https://www.darkreading.com/cyberattacks-data-breaches/ex-employee-guilty-revenge-kill-switch-scheme www.secnews.physaphae.fr/article.php?IdArticle=8654913 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Quand les secondes comptent: comment survivre les microburstes DDOS rapides et furieux<br>When Seconds Count: How to Survive Fast-and-Furious DDoS Microbursts In the battle against two-minute micro-attacks that can knock out critical communication services, the difference between success and failure can literally come down to seconds.]]> 2025-03-10T15:00:00+00:00 https://www.darkreading.com/cyberattacks-data-breaches/survive-fast-furious-ddos-microbursts www.secnews.physaphae.fr/article.php?IdArticle=8654875 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Les logiciels malveillants hébergés par Github infectent les utilisateurs de 1M Windows<br>GitHub-Hosted Malware Infects 1M Windows Users Microsoft has identified a complex, malvertising-based attack chain that delivered Lumma and other infostealers to enterprise and consumer PC users; the campaign is unlikely the last of its kind.]]> 2025-03-10T10:43:45+00:00 https://www.darkreading.com/endpoint-security/github-hosted-malware-1m-windows-users www.secnews.physaphae.fr/article.php?IdArticle=8654914 False Malware None 3.0000000000000000 Dark Reading - Informationweek Branch Équilibrer la responsabilité et la déréglementation de la cybersécurité<br>Balancing Cybersecurity Accountability & Deregulation While deregulation may open opportunities for growth and innovation, it also creates new risks that demand a proactive, accountable approach to security.]]> 2025-03-07T20:54:35+00:00 https://www.darkreading.com/vulnerabilities-threats/balancing-cybersecurity-accountability-deregulation www.secnews.physaphae.fr/article.php?IdArticle=8655020 False None None 3.0000000000000000 Dark Reading - Informationweek Branch \\ 'Spearwing \\' Raas Group ébouriant les plumes dans la scène cyber-menace<br>\\'Spearwing\\' RaaS Group Ruffles Feathers in Cyber Threat Scene The group is using the Medusa malware and taking up space once held by other notable ransomware groups like LockBot, increasing its victim list to 400 and demanding astoundingly high ransoms.]]> 2025-03-07T20:04:49+00:00 https://www.darkreading.com/cyberattacks-data-breaches/spearwing-raas-cyber-threat-scene www.secnews.physaphae.fr/article.php?IdArticle=8654631 False Ransomware,Malware,Threat None 3.0000000000000000 Dark Reading - Informationweek Branch MITER EMB3D pour la modélisation des menaces OT & ICS prend la fuite<br>MITRE EMB3D for OT & ICS Threat Modeling Takes Flight Manufacturers and infrastructure providers are gaining options to satisfy regulations and boost cyber safety for embedded and industrial control systems, as EMB3D, STRIDE, and ATT&CK for ICS gain traction.]]> 2025-03-07T19:37:21+00:00 https://www.darkreading.com/threat-intelligence/mitre-emb3d-ot-ics-threat-modeling www.secnews.physaphae.fr/article.php?IdArticle=8654632 False Threat,Industrial None 3.0000000000000000 Dark Reading - Informationweek Branch Les analyses statiques, les équipes rouges et les cadres visent à trouver de mauvais modèles d'IA<br>Static Scans, Red Teams and Frameworks Aim to Find Bad AI Models With hundreds of AI models found to harbor malicious code, cybersecurity firms are releasing technology to help companies manage their AI development and deployment efforts.]]> 2025-03-07T19:20:47+00:00 https://www.darkreading.com/application-security/static-scans-red-teams-frameworks-aim-find-bad-ai-models www.secnews.physaphae.fr/article.php?IdArticle=8654586 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Cybercrime \\'s Cobalt Strike Use chute 80% dans le monde<br>Cybercrime\\'s Cobalt Strike Use Plummets 80% Worldwide Fortra, Microsoft, and Health-ISAC have combined forces to claw back one of hackers\' most prized attack tools, with massive takedowns.]]> 2025-03-07T19:01:18+00:00 https://www.darkreading.com/threat-intelligence/cybercrime-cobalt-strike-use-plummets-worldwide www.secnews.physaphae.fr/article.php?IdArticle=8654578 False Tool None 3.0000000000000000 Dark Reading - Informationweek Branch Zero-Days mettent des dizaines de 1 000 jours en danger pour les attaques d'évacuation VM<br>Zero-Days Put Tens of 1,000s of Orgs at Risk for VM Escape Attacks More than 41,000 ESXi instances remain vulnerable to a critical VMware vulnerability, one of three that Broadcom disclosed earlier this week.]]> 2025-03-07T18:26:33+00:00 https://www.darkreading.com/remote-workforce/zero-days-risk-vm-escape-attacks www.secnews.physaphae.fr/article.php?IdArticle=8654579 False Vulnerability None 3.0000000000000000 Dark Reading - Informationweek Branch Taylor Swift Ticket Thieves inculpé devant le tribunal pour l'opération de revente<br>Taylor Swift Ticket Thieves Charged in Court for Resale Operation The pair found a loophole through StubHub\'s services, allowing them to steal tickets and resell them for personal profit, amassing hundreds of thousands of dollars.]]> 2025-03-07T17:21:22+00:00 https://www.darkreading.com/cyberattacks-data-breaches/taylor-swift-ticket-thieves-charged www.secnews.physaphae.fr/article.php?IdArticle=8654565 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Comment les cyberattaques affectent votre personnel<br>How Cyberattacks Affect Your Staff Businesses have a responsibility to safeguard their workforce, which is best achieved by preparing and equipping the whole organization to better face these worst-case cyber scenarios.]]> 2025-03-07T15:00:00+00:00 https://www.darkreading.com/cyberattacks-data-breaches/how-cyberattacks-affect-your-staff www.secnews.physaphae.fr/article.php?IdArticle=8654538 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Intel mappe les nouvelles puces VPRO dans le cadre d'atT & CK de Mitre \\<br>Intel Maps New vPro Chips to MITRE\\'s ATT&CK Framework The PC Security Stack Mappings project improves the security posture of corporate PCs by aligning each of the security features found in vPro PC and Core Ultra chips with the techniques described in MITRE\'s ATT&CK.]]> 2025-03-07T04:14:49+00:00 https://www.darkreading.com/endpoint-security/intel-maps-new-vpro-chips-mitre-attck www.secnews.physaphae.fr/article.php?IdArticle=8654458 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Armis acquiert Otorio pour étendre la plateforme de gestion de l'exposition à l'OT<br>Armis Acquires OTORIO to Expand OT Exposure Management Platform Armis will integrate OTORIO\'s Titan platform with its cloud-based Centrix, bringing an on-premise option to the cloud-only offering.]]> 2025-03-07T01:29:31+00:00 https://www.darkreading.com/ics-ot-security/armis-acquires-otorio-expand-ot-exposure-management-platform www.secnews.physaphae.fr/article.php?IdArticle=8654451 False Industrial None 2.0000000000000000 Dark Reading - Informationweek Branch \\ 'Encrypthub \\' Les échecs OPSEC révèlent des TTP et des grands plans<br>\\'EncryptHub\\' OPSEC Failures Reveal TTPs & Big Plans Is EncryptHub the most prolific cybercriminal in recent history? Or, as new information suggests, a bumbling amateur?]]> 2025-03-06T22:58:08+00:00 https://www.darkreading.com/threat-intelligence/encrypthub-opsec-failures-ttps-big-plans www.secnews.physaphae.fr/article.php?IdArticle=8654421 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Sous pression: les États-Unis accusaient des pirates de chinois pour la Chine<br>Under Pressure: US Charges China\\'s APT-for-Hire Hackers The US Justice Department on Wednesday announced charges against members of the Chinese-backed i-Soon "secret" APT and APT27, the latter implicated in January\'s Treasury breach.]]> 2025-03-06T22:21:47+00:00 https://www.darkreading.com/threat-intelligence/us-charges-china-apt-for-hire-hackers www.secnews.physaphae.fr/article.php?IdArticle=8654422 False None APT 27 3.0000000000000000 Dark Reading - Informationweek Branch Les femmes ont été confrontées au poids des coupures de cybersécurité en 2024<br>Women Faced the Brunt of Cybersecurity Cutbacks in 2024 Many women are finding that they are unhappy in their cybersecurity roles, largely due to the layoffs their companies are experiencing, cutbacks, and return to in-office work policies.]]> 2025-03-06T18:35:33+00:00 https://www.darkreading.com/remote-workforce/women-cyber-cutbacks-2024 www.secnews.physaphae.fr/article.php?IdArticle=8654382 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Entreprise AI via un objectif de sécurité des données: équilibrer la productivité avec la sécurité<br>Enterprise AI Through a Data Security Lens: Balancing Productivity With Safety Recently, 57 countries signed an agreement pledging an "open" and "inclusive" approach to AI\'s development. The US and UK were not among them, with the US vice president implying productivity should be the priority over safety. Should the opportunity for AI to drive innovation and productivity be prioritized over safety and security?]]> 2025-03-06T18:13:39+00:00 https://www.darkreading.com/cyber-risk/enterprise-ai-through-data-security-lens-balancing-productivity-safety www.secnews.physaphae.fr/article.php?IdArticle=8654383 False None None 3.0000000000000000 Dark Reading - Informationweek Branch CISA COUTS: Un pari dangereux dans un monde dangereux<br>CISA Cuts: A Dangerous Gamble in a Dangerous World The Cybersecurity and Infrastructure Security Agency\'s role in risk management needs to expand, not shrink.]]> 2025-03-06T15:00:00+00:00 https://www.darkreading.com/cyberattacks-data-breaches/cisa-cuts-dangerous-gamble-dangerous-world www.secnews.physaphae.fr/article.php?IdArticle=8654302 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Vidéos DeepFake de YouTube PDG PHISH Créateurs<br>Deepfake Videos of YouTube CEO Phish Creators YouTube creators are being targeted by scammers seeking out their credentials, using deepfake tactics to lure them in with a false sense of legitimacy.]]> 2025-03-06T14:28:12+00:00 https://www.darkreading.com/remote-workforce/deepfake-videos-youtube-phish-creators www.secnews.physaphae.fr/article.php?IdArticle=8654303 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Les attaques de ransomwares se construisent contre les entreprises de construction saoudienne<br>Ransomware Attacks Build Against Saudi Construction Firms Cybercriminals are ramping up their efforts in the Kingdom and targeting more than just petroleum firms; now, they\'re aiming for Middle East organizations in the IT, government, construction, and real estate sectors too.]]> 2025-03-06T07:00:00+00:00 https://www.darkreading.com/cyberattacks-data-breaches/ransomware-attacks-saudi-construction-firms www.secnews.physaphae.fr/article.php?IdArticle=8654139 False Ransomware None 3.0000000000000000 Dark Reading - Informationweek Branch L'avenir de la cybersécurité est une question de gouvernance, pas de plus d'outils<br>Cybersecurity\\'s Future Is All About Governance, Not More Tools As CISOs take a seat at the boardroom table, the focus shifts from stacking security tools to driving accountability, efficiency, and strategic risk management.]]> 2025-03-06T04:16:10+00:00 https://www.darkreading.com/cyber-risk/cybersecurity-future-governance-not-more-tools www.secnews.physaphae.fr/article.php?IdArticle=8654278 False Tool None 3.0000000000000000 Dark Reading - Informationweek Branch Acteur d'espionnage \\ 'Lotus Blossom \\' cible l'Asie du Sud-Est<br>Espionage Actor \\'Lotus Blossom\\' Targets South East Asia The threat actor, of unknown origin, is deploying a proprietary backdoor malware known as "Sagerunex" against critical infrastructure in Hong Kong, Philippines, Taiwan, and Vietnam.]]> 2025-03-06T02:53:22+00:00 https://www.darkreading.com/threat-intelligence/espionage-lotus-blossom-south-east-asia www.secnews.physaphae.fr/article.php?IdArticle=8654069 False Malware,Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Le typhon APT du Typhoon de la Chine se déplace vers la chaîne d'approvisionnement des attaques de chaîne d'approvisionnement<br>China\\'s Silk Typhoon APT Shifts to IT Supply Chain Attacks The nation-state threat group has been breaching providers of remote management tools, identity management providers, and other IT companies to access networks of targeted entities, according to Microsoft.]]> 2025-03-05T21:15:32+00:00 https://www.darkreading.com/remote-workforce/china-silk-typhoon-it-supply-chain-attacks www.secnews.physaphae.fr/article.php?IdArticle=8654016 False Tool,Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Aryon Security est lancé pour lutter contre les erreurs de configuration du cloud<br>Aryon Security Launches to Tackle Cloud Misconfigurations The new cloud security startup uses AI to scan cloud applications and systems for issues before they are deployed.]]> 2025-03-05T20:45:33+00:00 https://www.darkreading.com/cloud-security/aryon-security-claims-to-bring-new-approach-to-cloud-security www.secnews.physaphae.fr/article.php?IdArticle=8654086 False Cloud None 2.0000000000000000 Dark Reading - Informationweek Branch Qualcomm, MediaTek Release Security Fix Bonanza The chipmakers patched bugs, mostly critical and high severity, that affect everything from smartphones to TVs to artificial intelligence platforms.]]> 2025-03-05T20:12:30+00:00 https://www.darkreading.com/remote-workforce/qualcomm-mediatek-security-fix-bonanza www.secnews.physaphae.fr/article.php?IdArticle=8653985 False None None 2.0000000000000000 Dark Reading - Informationweek Branch \\ 'Crafty Camel \\' APT Targets Aviation, OT avec des fichiers polygot<br>\\'Crafty Camel\\' APT Targets Aviation, OT With Polygot Files The Iran-linked nation-state group made its debut with a stealthy, sophisticated, and laser-focused cyber-espionage attack on targets in UAE.]]> 2025-03-05T19:41:01+00:00 https://www.darkreading.com/ics-ot-security/crafty-camel-apt-aviation-ot-polygot-files www.secnews.physaphae.fr/article.php?IdArticle=8653967 False Industrial None 2.0000000000000000 Dark Reading - Informationweek Branch Bogus \\ 'Bianlian \\' gang envoie des lettres d'extorsion de Snail-Mail<br>Bogus \\'BianLian\\' Gang Sends Snail-Mail Extortion Letters The letters mimic typical ransom notes and threaten to delete or leak compromised data if payments aren\'t made, though none of the organizations that received them had active ransomware attacks.]]> 2025-03-05T17:46:32+00:00 https://www.darkreading.com/threat-intelligence/bogus-bianlian-snail-mail-extortion-letters www.secnews.physaphae.fr/article.php?IdArticle=8653941 False Ransomware None 2.0000000000000000 Dark Reading - Informationweek Branch Pourquoi les dirigeants de la sécurité optent pour des concerts de consultation<br>Why Security Leaders Are Opting for Consulting Gigs Many CISOs are weighing the benefits of going virtual as a consultant. Can the pendulum swing in the other direction?]]> 2025-03-05T15:00:00+00:00 https://www.darkreading.com/cybersecurity-operations/why-security-leaders-opting-consulting-gigs www.secnews.physaphae.fr/article.php?IdArticle=8653860 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Black Basta Pivots to Cactus Ransomware Group The future of the formerly fearsome cybercriminal group remains uncertain as key members have moved to a new affiliation, in fresh attacks that use novel persistence malware BackConnect.]]> 2025-03-05T14:00:00+00:00 https://www.darkreading.com/threat-intelligence/black-basta-pivots-cactus-ransomware-group www.secnews.physaphae.fr/article.php?IdArticle=8653836 False Ransomware,Malware None 2.0000000000000000 Dark Reading - Informationweek Branch Sortir des sentiers battus sur le cyber-risque<br>Thinking Outside the Box on Cyber-Risk CISOs should add more to their vision than technology as a global report published by the World Economic Forum identifies a closely interconnected cocktail of risk.]]> 2025-03-05T04:36:24+00:00 https://www.darkreading.com/cyber-risk/thinking-outside-box-cyber-risk www.secnews.physaphae.fr/article.php?IdArticle=8653837 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Rapid7 offre des offres de plate-forme de commande pour la gestion de l'exposition<br>Rapid7 Delivers Command Platform Offerings for Exposure Management 2025-03-04T22:35:57+00:00 https://www.darkreading.com/cyber-risk/rapid7-delivers-command-platform-offerings-for-exposure-management www.secnews.physaphae.fr/article.php?IdArticle=8653593 False None None 3.0000000000000000 Dark Reading - Informationweek Branch 3 bogues VMware zéro-jour permettent d'échapper<br>3 VMware Zero-Day Bugs Allow Sandbox Escape The now-patched bugs are under active exploit and enable attackers to carry out a wide range of malicious activities, including escaping a virtual machine and gaining access to the underlying host.]]> 2025-03-04T22:29:43+00:00 https://www.darkreading.com/vulnerabilities-threats/vmware-zero-day-bugs-sandbox-escape www.secnews.physaphae.fr/article.php?IdArticle=8653594 False Vulnerability,Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Greynoise Intelligence publie de nouvelles recherches sur les vulns de cybersécurité<br>GreyNoise Intelligence Releases New Research on Cybersecurity Vulns 2025-03-04T22:28:10+00:00 https://www.darkreading.com/cyberattacks-data-breaches/greynoise-intelligence-releases-new-research-on-cybersecurity-vulns www.secnews.physaphae.fr/article.php?IdArticle=8653595 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Glide Identity s'associe à Google Cloud et à Major Telcos<br>Glide Identity Partners With Google Cloud and Major Telcos 2025-03-04T22:19:35+00:00 https://www.darkreading.com/cloud-security/glide-identity-partners-with-google-cloud-and-major-telcos www.secnews.physaphae.fr/article.php?IdArticle=8653596 False Cloud None 2.0000000000000000 Dark Reading - Informationweek Branch Beyondtrust Pathfinder offre une approche en une plateforme de la sécurité centrée sur l'identité<br>BeyondTrust Pathfinder Delivers a One-Platform Approach to Identity-Centric Security 2025-03-04T22:15:55+00:00 https://www.darkreading.com/endpoint-security/beyondtrust-pathfinder-delivers-a-one-platform-approach-to-identity-centric-security www.secnews.physaphae.fr/article.php?IdArticle=8653597 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Acteur de menace \\ 'javaghost \\' cible les environnements AWS dans le schéma de phishing<br>Threat Actor \\'JavaGhost\\' Targets AWS Environments in Phishing Scheme Palo Alto Networks\' Unit 42 details how a threat actor is dodging detection with careful targeting and the use of Amazon\'s native email tools.]]> 2025-03-04T21:26:07+00:00 https://www.darkreading.com/cloud-security/threat-actor-javaghost-targets-aws-environments-phishing-scheme www.secnews.physaphae.fr/article.php?IdArticle=8653573 False Tool,Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Téléphone de la police serbe Hack Proteter \\ avec la chaîne d'exploitation Cellebrite<br>Serbian Police Hack Protester\\'s Phone With Cellebrite Exploit Chain Amnesty International said Serbian police used an exploit chain in tandem with legitimate mobile extraction dongle from vendor Cellebrite in an attack that brings up questions around ethical technology development.]]> 2025-03-04T21:06:38+00:00 https://www.darkreading.com/cyberattacks-data-breaches/serbian-police-hack-protester-phone-cellebrite-exploit-chain www.secnews.physaphae.fr/article.php?IdArticle=8653555 False Hack,Threat,Legislation,Mobile None 2.0000000000000000 Dark Reading - Informationweek Branch Jamf achète l'automatisation de l'identité, élargit les capacités IAM<br>Jamf Buys Identity Automation, Expands IAM Capabilities The $215 million acquisition will allow Jamf offer dynamic identity capabilities and device access in a single platform.]]> 2025-03-04T20:56:40+00:00 https://www.darkreading.com/identity-access-management-security/jamf-buys-identity-automation-expands-iam www.secnews.physaphae.fr/article.php?IdArticle=8653657 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Le dernier schéma de travail \\ 'de la Corée du Nord \\ \\' 'cherche des fonds nucléaires<br>North Korea\\'s Latest \\'IT Worker\\' Scheme Seeks Nuclear Funds Fraudulent IT workers are looking for engineering and developer positions in the US and Japan, and this time it\'s not about espionage.]]> 2025-03-04T20:35:43+00:00 https://www.darkreading.com/remote-workforce/north-korea-it-worker-scheme-nuclear-funds www.secnews.physaphae.fr/article.php?IdArticle=8653556 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Pentagone, la CISA nie les changements dans la cyber-politique américaine sur la Russie<br>Pentagon, CISA Deny Change in US Cyber Policy on Russia Media reports over the weekend suggested the Trump Administration ordered US Cyber Command and CISA to draw down cyber activities targeting Russia.]]> 2025-03-04T18:30:49+00:00 https://www.darkreading.com/threat-intelligence/pentagon-cisa-deny-change-us-cyber-policy-russia www.secnews.physaphae.fr/article.php?IdArticle=8653520 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Pourquoi les emplois de cybersécurité sont difficiles à trouver au milieu d'une pénurie de travailleurs<br>Why Cybersecurity Jobs Are Hard to Find Amid a Worker Shortage The cybersecurity job market nowadays is facing an unusual paradox: Many roles seem open, but competition and hiring practices can make securing a position a real challenge.]]> 2025-03-04T15:00:00+00:00 https://www.darkreading.com/cybersecurity-operations/cybersecurity-jobs-hard-find-amid-worker-shortage www.secnews.physaphae.fr/article.php?IdArticle=8653442 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Nommez ce bord toon: sur le précipice<br>Name That Edge Toon: On the Precipice Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 gift card.]]> 2025-03-03T21:07:16+00:00 https://www.darkreading.com/remote-workforce/name-that-edge-toon-on-the-precipice www.secnews.physaphae.fr/article.php?IdArticle=8653150 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Les données des adolescents de Tiktok \\ ont sondage sondé par les régulateurs britanniques<br>TikTok\\'s Teen Data Use Probed by UK Regulators Investigators at the ICO are looking into how (or if) TikTok, as well as Reddit and Imgur, are enforcing UK privacy protections for 13- to 17-year-old users.]]> 2025-03-03T20:44:06+00:00 https://www.darkreading.com/application-security/tiktok-teen-data-use-probed-regulators www.secnews.physaphae.fr/article.php?IdArticle=8653129 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Qilin Cybercrime Ring réclame le crédit pour la violation du journal Lee<br>Qilin Cybercrime Ring Claims Credit for Lee Newspaper Breach The ransomware-as-a-service (RaaS) cybercrime group intends to leak the stolen information in just two days, it claims; but oddly, it doesn\'t seek a ransom payment from its victim.]]> 2025-03-03T20:29:43+00:00 https://www.darkreading.com/cyberattacks-data-breaches/qilin-cyber-gang-credit-lee-newspaper-breach www.secnews.physaphae.fr/article.php?IdArticle=8653130 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Phishers a fait des ravages, \\ 'déguisé l'attaque à l'intérieur de SharePoint<br>Phishers Wreak \\'Havoc,\\' Disguising Attack Inside SharePoint A complex campaign allows cyberattackers to take over Windows systems by a combining a ClickFix-style attack and sophisticated obfuscation that abuses legitimate Microsoft services.]]> 2025-03-03T20:02:24+00:00 https://www.darkreading.com/cyberattacks-data-breaches/phishers-wreak-havoc-disguising-attack-inside-sharepoint www.secnews.physaphae.fr/article.php?IdArticle=8653131 False None None 2.0000000000000000 Dark Reading - Informationweek Branch La nouvelle directive sur la responsabilité des produits des produits de l'UE et son impact sur la cybersécurité<br>EU\\'s New Product Liability Directive & Its Cybersecurity Impact By proactively addressing liabilities tied to software updates, data loss, and AI technologies, businesses can mitigate risks and achieve compliance.]]> 2025-03-03T15:00:00+00:00 https://www.darkreading.com/cybersecurity-operations/eus-new-product-liability-directive-cybersecurity-impact www.secnews.physaphae.fr/article.php?IdArticle=8653015 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Les organisations latino-américaines sont confrontées à 40% de plus d'attaques que la moyenne mondiale<br>Latin American Orgs Face 40% More Attacks Than Global Average Technological adoption, demographics, politics, and uniquely Latin American law enforcement challenges have combined to make the region uniquely fertile for cyberattacks.]]> 2025-03-03T14:23:21+00:00 https://www.darkreading.com/cybersecurity-analytics/latin-american-orgs-more-cyberattacks-global-average www.secnews.physaphae.fr/article.php?IdArticle=8653016 False Legislation None 3.0000000000000000 Dark Reading - Informationweek Branch L'accord Snapattack de Cisco étend les capacités de Splunk \\<br>Cisco\\'s SnapAttack Deal Expands Splunk\\'s Capabilities The addition of SnapAttack, a startup incubated by Booz Allen Hamilton\'s Darklabs, will enhance Splunk with accelerated SIEM migration and proactive threat hunting.]]> 2025-02-28T23:15:07+00:00 https://www.darkreading.com/threat-intelligence/cisco-snapattack-deal-expands-splunk-capabilities www.secnews.physaphae.fr/article.php?IdArticle=8652995 False Threat None 2.0000000000000000 Dark Reading - Informationweek Branch Microsoft Busts Hackers vendant un accès Azure illégal<br>Microsoft Busts Hackers Selling Illegal Azure AI Access LLMjacking operation leveraged illicit access GenAI services to produce explicit celebrity images and other harmful content, Microsoft\'s digital crimes unit says.]]> 2025-02-28T19:53:16+00:00 https://www.darkreading.com/application-security/microsoft-openai-hackers-selling-illicit-access-azure-llm-services www.secnews.physaphae.fr/article.php?IdArticle=8652068 False None None 3.0000000000000000 Dark Reading - Informationweek Branch US Soldier a l'intention d'admettre le piratage de 15 transporteurs de télécommunications<br>US Soldier Intends to Admit Hacking 15 Telecom Carriers The federal government views the defendant as a flight risk and danger to the community due to his ability to access sensitive and private information.]]> 2025-02-28T19:36:49+00:00 https://www.darkreading.com/cyber-risk/us-soldier-admits-hacking-15-telecom-carriers www.secnews.physaphae.fr/article.php?IdArticle=8652069 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Risque tiers Risque Top Cybersecurity Claims<br>Third-Party Risk Top Cybersecurity Claims Data collected by cyber-insurers show that ransomware accounts for the majority of insurance claims, but that much of the losses stem from third-party breaches affecting policyholders.]]> 2025-02-28T16:20:46+00:00 https://www.darkreading.com/cyber-risk/third-party-risk-top-cybersecurity-claims www.secnews.physaphae.fr/article.php?IdArticle=8652996 False Ransomware None 3.0000000000000000 Dark Reading - Informationweek Branch Top 10 pour les façons les plus probables qu'une entreprise puisse être piratée<br>Top 10 Most Probable Ways a Company Can Be Hacked How to win the battle with root cause analysis and a data-driven approach.]]> 2025-02-28T15:00:00+00:00 https://www.darkreading.com/vulnerabilities-threats/top-10-most-probable-ways-company-can-be-hacked www.secnews.physaphae.fr/article.php?IdArticle=8651992 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Cible par les ransomwares, les banques du Moyen-Orient renforcent la sécurité<br>Targeted by Ransomware, Middle East Banks Shore Up Security As the UAE financial sector finished up its annual cyberattack exercise, its worries about ransomware compromises and geopolitical attacks are on the rise.]]> 2025-02-28T04:00:00+00:00 https://www.darkreading.com/cyber-risk/targeted-ransomware-middle-east-banks-security www.secnews.physaphae.fr/article.php?IdArticle=8651824 False Ransomware None 3.0000000000000000 Dark Reading - Informationweek Branch Le tribunal municipal de Cleveland reste fermé après le cyber-incident<br>Cleveland Municipal Court Remains Closed After Cyber Incident No details yet on what forced the court to shut down affected systems and halt operations as of late Feb. 23.]]> 2025-02-27T21:01:00+00:00 https://www.darkreading.com/cyberattacks-data-breaches/cleveland-municipal-court-remains-closed-after-cyber-incident www.secnews.physaphae.fr/article.php?IdArticle=8651742 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Nakivo corrige l'outil de sauvegarde et de réplication critique<br>Nakivo Fixes Critical Flaw in Backup & Replication Tool The vendor\'s products fall in a category that ransomware operators like to target to circumvent victims\' ability to recover from a successful attack.]]> 2025-02-27T20:46:38+00:00 https://www.darkreading.com/application-security/nakivo-fixes-critical-flaw-backup-replication-tool www.secnews.physaphae.fr/article.php?IdArticle=8651743 False Ransomware,Tool None 2.0000000000000000 Dark Reading - Informationweek Branch Microsoft déploie une nouvelle correction d'Outlook après une mise à jour Windows défectueuse<br>Microsoft Rolls Out Fresh Outlook Fix After Faulty Windows Update Windows 11 users can deploy a workaround or await the update rollout.]]> 2025-02-27T19:58:27+00:00 https://www.darkreading.com/application-security/microsoft-rolls-out-fresh-outlook-fix-after-faulty-windows-update www.secnews.physaphae.fr/article.php?IdArticle=8651728 False None None 2.0000000000000000 Dark Reading - Informationweek Branch 3 choses à savoir sur l'intoxication aux données de l'IA<br>3 Things to Know About AI Data Poisoning Data poisoning represents the next big existential cybersecurity threat - unless organizations can ensure their AI systems are safe and trustworthy.]]> 2025-02-27T19:07:13+00:00 https://www.darkreading.com/vulnerabilities-threats/3-things-about-ai-data-poisoning www.secnews.physaphae.fr/article.php?IdArticle=8651664 False Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Chinese APT utilise un bogue VPN pour exploiter le monde entier OT Orgs<br>Chinese APT Uses VPN Bug to Exploit Worldwide OT Orgs Companies critical to the aviation and aerospace supply chains didn\'t patch a known CVE, providing opportunity for foreign espionage.]]> 2025-02-27T14:29:30+00:00 https://www.darkreading.com/ics-ot-security/chinese-apt-vpn-bug-worldwide-ot-orgs www.secnews.physaphae.fr/article.php?IdArticle=8651637 False Threat,Industrial None 3.0000000000000000 Dark Reading - Informationweek Branch Les pirates peuvent craquer les caméras de voiture en quelques minutes à plat<br>Hackers Can Crack Into Car Cameras in Minutes Flat It\'s shockingly simple to turn a car dashcam into a powerful reconnaissance tool for gathering everyday routine and location data, researchers warn.]]> 2025-02-27T13:59:50+00:00 https://www.darkreading.com/vulnerabilities-threats/hackers-can-crack-car-cameras-minutes www.secnews.physaphae.fr/article.php?IdArticle=8651638 False Tool None 3.0000000000000000 Dark Reading - Informationweek Branch OpenSSF définit les lignes de base de sécurité minimales pour les projets open source<br>OpenSSF Sets Minimum Security Baselines for Open Source Projects OSPS Baseline provides a starting point for project owners and adopters to understand an open source project\'s security posture by outlining all the controls that have been applied.]]> 2025-02-26T23:40:14+00:00 https://www.darkreading.com/application-security/openssf-minimum-security-baselines-open-source-projects www.secnews.physaphae.fr/article.php?IdArticle=8651639 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Escroqueries fiscales alimentées par l'IA en augmentation<br>AI-Fueled Tax Scams on the Rise 2025-02-26T22:18:53+00:00 https://www.darkreading.com/cyberattacks-data-breaches/ai-fueled-tax-scams-on-the-rise www.secnews.physaphae.fr/article.php?IdArticle=8651393 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Comment les pirates rendent Salesforce plus sécurisé dans l'ère de l'IA agentique<br>How Hackers Make Salesforce More Secure in the Agentic AI Era 2025-02-26T21:57:19+00:00 https://www.darkreading.com/cybersecurity-operations/how-hackers-make-salesforce-more-secure-in-the-agentic-ai-era www.secnews.physaphae.fr/article.php?IdArticle=8651378 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Onapsis présente Control Central pour la nouvelle ère de montée avec SAP<br>Onapsis Introduces Control Central for New Era of RISE With SAP 2025-02-26T21:40:47+00:00 https://www.darkreading.com/application-security/onapsis-introduces-control-central-for-new-era-of-rise-with-sap www.secnews.physaphae.fr/article.php?IdArticle=8651379 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Anubis Threat Group recherche des victimes critiques de l'industrie<br>Anubis Threat Group Seeks Out Critical Industry Victims The threat group has a variety of tactics in its toolbox, including double extortion and ransomware-as-a-service.]]> 2025-02-26T21:15:54+00:00 https://www.darkreading.com/cyber-risk/anubis-threat-group-seeks-out-critical-industry-victims www.secnews.physaphae.fr/article.php?IdArticle=8651380 False Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Water Utility Co. payant toujours le prix de la violation un an plus tard<br>Water Utility Co. Still Paying the Breach Price a Year Later The UK\'s Southern Water has been forced to shell out millions due to a Black Basta cyberattack, and it has come to light that the total could include a ransom payment.]]> 2025-02-26T20:15:58+00:00 https://www.darkreading.com/cyberattacks-data-breaches/water-utility-paying-breach-price-year-later www.secnews.physaphae.fr/article.php?IdArticle=8651361 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Nommez ce toon: ka-ching!<br>Name That Toon: Ka-Ching! Feeling creative? Have something to say about cybersecurity? Submit your caption and our panel of experts will reward the winner with a $25 gift card.]]> 2025-02-26T17:38:27+00:00 https://www.darkreading.com/threat-intelligence/name-that-toon-ka-ching www.secnews.physaphae.fr/article.php?IdArticle=8651300 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Machine désapprentissage: la lobotomisation des LLM<br>Machine Unlearning: The Lobotomization of LLMs In the end, the question isn\'t whether large language models will ever forget - it\'s how we\'ll develop the tools and systems to do so effectively and ethically.]]> 2025-02-26T15:00:00+00:00 https://www.darkreading.com/vulnerabilities-threats/machine-unlearning-lobotomization-llms www.secnews.physaphae.fr/article.php?IdArticle=8651242 False Tool None 3.0000000000000000 Dark Reading - Informationweek Branch Fortanix aborde les menaces informatiques quantiques avec de nouveaux algorithmes<br>Fortanix Tackles Quantum Computing Threats With New Algorithms Fortanix is implementing post-quantum cryptographic algorithms in its security suite to protect against future attacks.]]> 2025-02-26T14:00:12+00:00 https://www.darkreading.com/data-privacy/fortanix-tackles-quantum-computing-threats-algorithms www.secnews.physaphae.fr/article.php?IdArticle=8651243 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Backdoor Linux \\ 'Steals<br>Stealthy Linux \\'Auto-color\\' Backdoor Paints US Institutions With Malware Attackers are using a novel malware that takes on different file names each time it\'s deployed; it also boasts an anti-removal mechanism to target universities and government offices.]]> 2025-02-26T10:18:02+00:00 https://www.darkreading.com/threat-intelligence/stealthy-linux-auto-color-backdoor-us-institutions-malware www.secnews.physaphae.fr/article.php?IdArticle=8651344 False Malware None 3.0000000000000000