www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2025-05-10T18:40:41+00:00 www.secnews.physaphae.fr Dark Reading - Informationweek Branch Kit de phishing Darcula obtient une mise à niveau de l'IA mortelle<br>Phishing Kit Darcula Gets Lethal AI Upgrade Recently added artificial intelligence capabilities on the Chinese-language Darcula phishing-as-a-service platform make phishing attacks easy for even the least technical hackers.]]> 2025-04-24T18:34:09+00:00 https://www.darkreading.com/remote-workforce/phishing-kit-darcula-gets-major-ai-upgrade www.secnews.physaphae.fr/article.php?IdArticle=8667633 False Technical None 3.0000000000000000 Dark Reading - Informationweek Branch Comment \\ 'Open Innovation \\' peut aider à résoudre les problèmes plus rapides, meilleurs et moins chers<br>How \\'Open Innovation\\' Can Help Solve Problems Faster, Better & Cheaper Cybersecurity is not just a technical challenge but also a very human one. The more humans that organizations can get involved, the more diverse perspectives and experiences that can be tapped into.]]> 2025-03-17T14:12:42+00:00 https://www.darkreading.com/vulnerabilities-threats/how-open-innovation-can-help-solve-problems-faster-better-cheaper www.secnews.physaphae.fr/article.php?IdArticle=8656251 False Technical None 2.0000000000000000 Dark Reading - Informationweek Branch Proposed HIPAA Amendments Will Close Healthcare Security Gaps The changes to the healthcare privacy regulation with technical controls such as network segmentation, multi-factor authentication, and encryption. The changes would strengthen cybersecurity protections for electronic health information and address evolving threats against healthcare entities.]]> 2025-01-02T21:30:43+00:00 https://www.darkreading.com/cyber-risk/proposed-hipaa-amendments-close-healthcare-security-gaps www.secnews.physaphae.fr/article.php?IdArticle=8632953 False Medical,Technical None 2.0000000000000000 Dark Reading - Informationweek Branch Faux ChatGPT, Claude API Packages Deliver JarkaStealer Attackers are betting that the hype around generative AI (GenAI) is attracting less technical, less cautious developers who might be more inclined to download an open source Python code package for free access, without vetting it or thinking twice.]]> 2024-11-22T21:40:27+00:00 https://www.darkreading.com/application-security/faux-chatgpt-claude-api-packages-jarkastealer www.secnews.physaphae.fr/article.php?IdArticle=8616231 False Technical ChatGPT 2.0000000000000000 Dark Reading - Informationweek Branch Préparation de Dora au milieu de l'ambiguïté des contrôles techniques<br>Preparing for DORA Amid Technical Controls Ambiguity The European Union\'s Digital Operational Resilience Act requires financial entities to focus on third-party risk, resilience, and testing.]]> 2024-11-08T20:14:18+00:00 https://www.darkreading.com/cyber-risk/preparing-for-dora-amidst-technical-controls-ambiguity www.secnews.physaphae.fr/article.php?IdArticle=8608277 False Technical None 3.0000000000000000 Dark Reading - Informationweek Branch FHE Consortium pousse pour les normes de cryptographie résiliente quantique<br>FHE Consortium Pushes for Quantum-Resilient Cryptography Standards The FHE Technical Consortium for Hardware (FHETCH) brings together developers, hardware manufacturers and cloud providers to collaborate on technical standards necessary to develop commercial fully homomorphic encryption solutions and lower adoption barriers.]]> 2024-10-15T20:18:54+00:00 https://www.darkreading.com/data-privacy/fhe-consortium-quantum-resilient-cryptography-standards www.secnews.physaphae.fr/article.php?IdArticle=8598425 False Cloud,Technical,Commercial None 3.0000000000000000 Dark Reading - Informationweek Branch Réseaux à air vulnérables à l'attaque acoustique via les écrans LCD<br>Air-Gapped Networks Vulnerable to Acoustic Attack via LCD Screens Sound waves generated by pixels on a screen can transmit information across seemingly impenetrable air gaps.]]> 2024-09-10T20:23:44+00:00 https://www.darkreading.com/ics-ot-security/air-gapped-networks-vulnerable-to-acoustic-attack-via-lcd-screens www.secnews.physaphae.fr/article.php?IdArticle=8574577 False Technical None 4.0000000000000000 Dark Reading - Informationweek Branch 10 conseils d'écriture pour les professionnels de la cybersécurité<br>10 Writing Tips for Cybersecurity Professionals It takes more than technical knowledge to write about cybersecurity in a way people want to read. It takes creativity, discipline, and other key skills.]]> 2024-09-10T01:21:35+00:00 https://www.darkreading.com/cybersecurity-operations/how-to-get-published-regularly www.secnews.physaphae.fr/article.php?IdArticle=8573566 False Technical None 3.0000000000000000 Dark Reading - Informationweek Branch La NSA émet des conseils pour une meilleure journalisation, une détection des menaces dans les incidents LOTL<br>NSA Issues Tips for Better Logging, Threat Detection in LotL Incidents The guidance is part of a coordinated, global effort to eradicate living-off-the-land techniques used against critical infrastructure.]]> 2024-08-22T20:19:11+00:00 https://www.darkreading.com/cybersecurity-operations/nsa-issues-tips-for-better-logging-threat-detection-in-lotl-incidents www.secnews.physaphae.fr/article.php?IdArticle=8562714 False Threat,Technical None 4.0000000000000000 Dark Reading - Informationweek Branch Les acteurs de la menace chinoise utilisent des fichiers MSI pour contourner Windows, détection VT<br>Chinese Threat Actors Use MSI Files to Bypass Windows, VT Detection Analysts have been picking up increased cases of malware delivery via Windows Installer files in Southeast Asia.]]> 2024-08-22T01:00:00+00:00 https://www.darkreading.com/threat-intelligence/chinese-threat-actors-msi-files-bypass-windows-vt-detection www.secnews.physaphae.fr/article.php?IdArticle=8562719 False Malware,Threat,Technical None 3.0000000000000000 Dark Reading - Informationweek Branch Evil XDR: Le chercheur transforme le logiciel Palo Alto en logiciel malveillant parfait<br>Evil XDR: Researcher Turns Palo Alto Software Into Perfect Malware It turns out that a powerful security solution can double as even more powerful malware, capable of granting comprehensive access over a targeted machine.]]> 2024-04-19T03:20:00+00:00 https://www.darkreading.com/application-security/evil-xdr-researcher-turns-palo-alto-software-into-perfect-malware www.secnews.physaphae.fr/article.php?IdArticle=8485078 False Malware,Technical None 4.0000000000000000 Dark Reading - Informationweek Branch Comment s'assurer que les forfaits open source ne sont pas des mines terrestres<br>How to Ensure Open-Source Packages Are Not Landmines CISA and OpenSSF jointly published new guidance recommending technical controls to make it harder for developers to bring in malicious software components into code.]]> 2024-03-08T03:00:22+00:00 https://www.darkreading.com/application-security/how-to-ensure-open-source-pckages-are-not-landmines www.secnews.physaphae.fr/article.php?IdArticle=8460914 False Technical Bahamut 3.0000000000000000 Dark Reading - Informationweek Branch La stratégie de cyber-assurance nécessite une collaboration CISO-CFO<br>Cyber Insurance Strategy Requires CISO-CFO Collaboration Cyber risk quantification brings together the CISO\'s technical expertise and the CFO\'s focus on financial impact to develop a stronger and better understanding of cyber risk.]]> 2024-03-07T18:34:58+00:00 https://www.darkreading.com/cyber-risk/cyber-insurance-strategy-requires-ciso-cfo-collaboration www.secnews.physaphae.fr/article.php?IdArticle=8460778 False Technical None 3.0000000000000000 Dark Reading - Informationweek Branch Mitre déploie 4 nouvelles CWE pour les bogues de sécurité des microprocesseurs<br>MITRE Rolls Out 4 Brand-New CWEs for Microprocessor Security Bugs Goal is to give chip designers and security practitioners in the semiconductor space a better understanding of major microprocessor flaws like Meltdown and Spectre.]]> 2024-02-29T19:17:54+00:00 https://www.darkreading.com/endpoint-security/four-new-cwes-released-for-microprocessor-architectures www.secnews.physaphae.fr/article.php?IdArticle=8457137 False Technical None 4.0000000000000000 Dark Reading - Informationweek Branch La Maison Blanche exhorte le passage aux langues sûres de la mémoire<br>White House Urges Switching to Memory Safe Languages The Office of the National Cyber Director technical report focuses on reducing memory-safety vulnerabilities in applications and making it harder for malicious actors to exploit them.]]> 2024-02-27T00:12:58+00:00 https://www.darkreading.com/application-security/white-house-switch-memory-safe-languages www.secnews.physaphae.fr/article.php?IdArticle=8455963 False Vulnerability,Threat,Technical None 2.0000000000000000 Dark Reading - Informationweek Branch À quoi pourrait ressembler à la sécurité pour réguler les puces d'IA<br>What Using Security to Regulate AI Chips Could Look Like An exploratory research proposal is recommending regulation of AI chips and stronger governance measures to keep up with the rapid technical innovations in artificial intelligence.]]> 2024-02-16T22:24:14+00:00 https://www.darkreading.com/cyber-risk/what-using-security-to-regulate-ai-chips-could-look-like www.secnews.physaphae.fr/article.php?IdArticle=8451137 False Technical None 2.0000000000000000 Dark Reading - Informationweek Branch 10 catégories de métriques de sécurité Les Cisos devraient présenter au conseil d'administration<br>10 Security Metrics Categories CISOs Should Present to the Board Boards of directors don\'t care about the minute technical details of the security program. They want to see how key performance indicators are tracked and utilized.]]> 2024-02-14T23:00:00+00:00 https://www.darkreading.com/cybersecurity-analytics/10-security-metrics-categories-cisos-should-present-to-the-board www.secnews.physaphae.fr/article.php?IdArticle=8450418 False Technical None 2.0000000000000000 Dark Reading - Informationweek Branch Le district scolaire du New Jersey fermé par cyberattaque<br>New Jersey School District Shut Down by Cyberattack Sunday night, Freehold Township district officials notified its staff and parents that school would not be in session Monday due to technical difficulties caused by a cyber incident.]]> 2024-01-29T16:00:00+00:00 https://www.darkreading.com/vulnerabilities-threats/freehold-township-district-closes-due-to-cyber-incident www.secnews.physaphae.fr/article.php?IdArticle=8444476 False Technical None 2.0000000000000000 Dark Reading - Informationweek Branch The Role of the CISO in Digital Transformation A successful CISO should play a leading role in digital transformation and cloud migration initiatives in their organization. The CISO is responsible for making sure technical security controls are designed and implemented appropriately, and changes are properly managed, with security in mind from the very start.]]> 2023-11-27T22:00:00+00:00 https://www.darkreading.com/cloud-security/the-role-of-the-ciso-in-digital-transformation www.secnews.physaphae.fr/article.php?IdArticle=8417466 False Cloud,Technical None 2.0000000000000000 Dark Reading - Informationweek Branch Le rôle du CISO dans la transformation numérique<br>The Role of the CISO in Digital Transformation A successful CISO should play a leading role in digital transformation and cloud migration initiatives in their organization. The CISO is responsible for making sure technical security controls are designed and implemented appropriately, and changes are properly managed, with security in mind from the very start.]]> 2023-11-21T20:45:00+00:00 https://www.darkreading.com/google-cloud-security/the-role-of-the-ciso-in-digital-transformation www.secnews.physaphae.fr/article.php?IdArticle=8415562 False Cloud,Technical None 2.0000000000000000 Dark Reading - Informationweek Branch Les logiciels malveillants utilisent la trigonométrie pour suivre les traits de souris<br>Malware Uses Trigonometry to Track Mouse Strokes The latest LummaC2 infostealer version includes a novel anti-sandbox trick to avoid detonating when no human mouse movements are detected.]]> 2023-11-20T22:01:00+00:00 https://www.darkreading.com/application-security/malware-trigonometry-track-mouse-strokes www.secnews.physaphae.fr/article.php?IdArticle=8415053 False Malware,Technical None 3.0000000000000000 Dark Reading - Informationweek Branch Une référence de détection et de réponse conçue pour le nuage<br>A Detection and Response Benchmark Designed for the Cloud Does your security operation center\'s performance meet the 5/5/5 benchmark for cloud threat detection and incident response?]]> 2023-11-20T08:00:00+00:00 https://www.darkreading.com/cloud/5-5-5-benchmark-cloud-detection-and-response www.secnews.physaphae.fr/article.php?IdArticle=8414727 False Threat,Cloud,Technical None 4.0000000000000000 Dark Reading - Informationweek Branch Nouvel Google Cloud Rat utilise des événements de calendrier pour C2<br>Novel Google Cloud RAT Uses Calendar Events for C2 Cybercriminals are abusing legitimate functions within cloud services, and providers can\'t totally stop them, especially when it comes to innovative approaches like this.]]> 2023-11-06T21:23:00+00:00 https://www.darkreading.com/cloud/google-cloud-rat-calendar-events-command-and-control www.secnews.physaphae.fr/article.php?IdArticle=8406844 False Cloud,Technical None 5.0000000000000000