www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-16T22:55:32+00:00 www.secnews.physaphae.fr Dark Reading - Informationweek Branch Evil XDR: Le chercheur transforme le logiciel Palo Alto en logiciel malveillant parfait<br>Evil XDR: Researcher Turns Palo Alto Software Into Perfect Malware It turns out that a powerful security solution can double as even more powerful malware, capable of granting comprehensive access over a targeted machine.]]> 2024-04-19T03:20:00+00:00 https://www.darkreading.com/application-security/evil-xdr-researcher-turns-palo-alto-software-into-perfect-malware www.secnews.physaphae.fr/article.php?IdArticle=8485078 False Malware,Technical None 4.0000000000000000 Dark Reading - Informationweek Branch Comment s'assurer que les forfaits open source ne sont pas des mines terrestres<br>How to Ensure Open-Source Packages Are Not Landmines CISA and OpenSSF jointly published new guidance recommending technical controls to make it harder for developers to bring in malicious software components into code.]]> 2024-03-08T03:00:22+00:00 https://www.darkreading.com/application-security/how-to-ensure-open-source-pckages-are-not-landmines www.secnews.physaphae.fr/article.php?IdArticle=8460914 False Technical Bahamut 3.0000000000000000 Dark Reading - Informationweek Branch La stratégie de cyber-assurance nécessite une collaboration CISO-CFO<br>Cyber Insurance Strategy Requires CISO-CFO Collaboration Cyber risk quantification brings together the CISO\'s technical expertise and the CFO\'s focus on financial impact to develop a stronger and better understanding of cyber risk.]]> 2024-03-07T18:34:58+00:00 https://www.darkreading.com/cyber-risk/cyber-insurance-strategy-requires-ciso-cfo-collaboration www.secnews.physaphae.fr/article.php?IdArticle=8460778 False Technical None 3.0000000000000000 Dark Reading - Informationweek Branch Mitre déploie 4 nouvelles CWE pour les bogues de sécurité des microprocesseurs<br>MITRE Rolls Out 4 Brand-New CWEs for Microprocessor Security Bugs Goal is to give chip designers and security practitioners in the semiconductor space a better understanding of major microprocessor flaws like Meltdown and Spectre.]]> 2024-02-29T19:17:54+00:00 https://www.darkreading.com/endpoint-security/four-new-cwes-released-for-microprocessor-architectures www.secnews.physaphae.fr/article.php?IdArticle=8457137 False Technical None 4.0000000000000000 Dark Reading - Informationweek Branch La Maison Blanche exhorte le passage aux langues sûres de la mémoire<br>White House Urges Switching to Memory Safe Languages The Office of the National Cyber Director technical report focuses on reducing memory-safety vulnerabilities in applications and making it harder for malicious actors to exploit them.]]> 2024-02-27T00:12:58+00:00 https://www.darkreading.com/application-security/white-house-switch-memory-safe-languages www.secnews.physaphae.fr/article.php?IdArticle=8455963 False Vulnerability,Threat,Technical None 2.0000000000000000 Dark Reading - Informationweek Branch À quoi pourrait ressembler à la sécurité pour réguler les puces d'IA<br>What Using Security to Regulate AI Chips Could Look Like An exploratory research proposal is recommending regulation of AI chips and stronger governance measures to keep up with the rapid technical innovations in artificial intelligence.]]> 2024-02-16T22:24:14+00:00 https://www.darkreading.com/cyber-risk/what-using-security-to-regulate-ai-chips-could-look-like www.secnews.physaphae.fr/article.php?IdArticle=8451137 False Technical None 2.0000000000000000 Dark Reading - Informationweek Branch 10 catégories de métriques de sécurité Les Cisos devraient présenter au conseil d'administration<br>10 Security Metrics Categories CISOs Should Present to the Board Boards of directors don\'t care about the minute technical details of the security program. They want to see how key performance indicators are tracked and utilized.]]> 2024-02-14T23:00:00+00:00 https://www.darkreading.com/cybersecurity-analytics/10-security-metrics-categories-cisos-should-present-to-the-board www.secnews.physaphae.fr/article.php?IdArticle=8450418 False Technical None 2.0000000000000000 Dark Reading - Informationweek Branch Le district scolaire du New Jersey fermé par cyberattaque<br>New Jersey School District Shut Down by Cyberattack Sunday night, Freehold Township district officials notified its staff and parents that school would not be in session Monday due to technical difficulties caused by a cyber incident.]]> 2024-01-29T16:00:00+00:00 https://www.darkreading.com/vulnerabilities-threats/freehold-township-district-closes-due-to-cyber-incident www.secnews.physaphae.fr/article.php?IdArticle=8444476 False Technical None 2.0000000000000000 Dark Reading - Informationweek Branch The Role of the CISO in Digital Transformation A successful CISO should play a leading role in digital transformation and cloud migration initiatives in their organization. The CISO is responsible for making sure technical security controls are designed and implemented appropriately, and changes are properly managed, with security in mind from the very start.]]> 2023-11-27T22:00:00+00:00 https://www.darkreading.com/cloud-security/the-role-of-the-ciso-in-digital-transformation www.secnews.physaphae.fr/article.php?IdArticle=8417466 False Cloud,Technical None 2.0000000000000000 Dark Reading - Informationweek Branch Le rôle du CISO dans la transformation numérique<br>The Role of the CISO in Digital Transformation A successful CISO should play a leading role in digital transformation and cloud migration initiatives in their organization. The CISO is responsible for making sure technical security controls are designed and implemented appropriately, and changes are properly managed, with security in mind from the very start.]]> 2023-11-21T20:45:00+00:00 https://www.darkreading.com/google-cloud-security/the-role-of-the-ciso-in-digital-transformation www.secnews.physaphae.fr/article.php?IdArticle=8415562 False Cloud,Technical None 2.0000000000000000 Dark Reading - Informationweek Branch Les logiciels malveillants utilisent la trigonométrie pour suivre les traits de souris<br>Malware Uses Trigonometry to Track Mouse Strokes The latest LummaC2 infostealer version includes a novel anti-sandbox trick to avoid detonating when no human mouse movements are detected.]]> 2023-11-20T22:01:00+00:00 https://www.darkreading.com/application-security/malware-trigonometry-track-mouse-strokes www.secnews.physaphae.fr/article.php?IdArticle=8415053 False Malware,Technical None 3.0000000000000000 Dark Reading - Informationweek Branch Une référence de détection et de réponse conçue pour le nuage<br>A Detection and Response Benchmark Designed for the Cloud Does your security operation center\'s performance meet the 5/5/5 benchmark for cloud threat detection and incident response?]]> 2023-11-20T08:00:00+00:00 https://www.darkreading.com/cloud/5-5-5-benchmark-cloud-detection-and-response www.secnews.physaphae.fr/article.php?IdArticle=8414727 False Threat,Cloud,Technical None 4.0000000000000000 Dark Reading - Informationweek Branch Nouvel Google Cloud Rat utilise des événements de calendrier pour C2<br>Novel Google Cloud RAT Uses Calendar Events for C2 Cybercriminals are abusing legitimate functions within cloud services, and providers can\'t totally stop them, especially when it comes to innovative approaches like this.]]> 2023-11-06T21:23:00+00:00 https://www.darkreading.com/cloud/google-cloud-rat-calendar-events-command-and-control www.secnews.physaphae.fr/article.php?IdArticle=8406844 False Cloud,Technical None 5.0000000000000000