www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-04-29T05:32:23+00:00 www.secnews.physaphae.fr Network World - Magazine Info Startup de sécurité AirGap Networks apporte des technologies de télécommunications au LAN<br>Security startup Airgap Networks brings telco technologies to the LAN Pour lire cet article en totalité, veuillez cliquer ici
AI-generating malware, deep fake identity spoofing, and state-sponsored ransomware are just a few of the latest methods that attackers are using to bypass traditional cybersecurity tools. Ritesh Agrawal, CEO of cybersecurity startup Airgap Networks, noticed that many of the attacks that compromise enterprise networks fail to penetrate telco and service provider networks.“Even though they\'re deploying the same routers, switches, and firewalls, there\'s something fundamentally different about telco networks that shields them from many threats to enterprise LANs,” Argawal said. Agrawal has 20 years of experience with cybersecurity, enterprise networking, and cloud computing, most of that time spent with Juniper Networks focusing on telco and large enterprise clients.To read this article in full, please click here]]>
2023-10-19T02:00:00+00:00 https://www.networkworld.com/article/3709049/startup-airgap-networks-brings-telco-technologies-to-the-lan.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8404180 False Ransomware,Malware,Tool,Cloud None 2.0000000000000000
Network World - Magazine Info Fortinet sécurise le réseautage du campus avec des commutateurs haut de gamme<br>Fortinet secures campus networking with high-end switches portefeuille de réseau avec deux nouveaux commutateurs qui comportent l'intégration avec les services de sécurité de Fortinet \\ et l'outil de gestion AIOPS. Le Fortiswitch 600 est un commutateur d'accès au campus sécurisé multi-gigabit qui prend en charge jusqu'à 5GE Access et 25GE UpLinks.Le Fortiswitch 2000 est un interrupteur de noyau de campus conçu pour prendre en charge les environnements de campus plus grands et plus complexes en agrégeant les commutateurs d'accès haute performance, y compris le Fortiswitch 600. Les nouveaux commutateurs sont intégrés avec Fortinet \'s Fortiguard AI-Les services de sécurité puissants et outil de gestion Fortiaiops, qui permet aux clients d'utiliser des fonctionnalités de sécurité et d'exploitation telles que la protection des logiciels malveillants, le profilage des appareils et le contrôle d'accès basé sur les rôles. Pour lire cet article entièrement, veuillez cliquer ici
Fortinet has expanded its campus network portfolio with two new switches that feature integration with Fortinet\'s security services and AIops management tool.The FortiSwitch 600 is a multi-gigabit secure campus access switch that supports up to 5GE access and 25GE uplinks. The FortiSwitch 2000 is a campus core switch designed to support larger, more complex campus environments by aggregating high-performance access switches, including the FortiSwitch 600.The new switches are integrated with Fortinet\'s FortiGuard AI-Powered Security Services and FortiAIOps management tool, which lets customers utilize security and operations features such as malware protection, device profiling and role-based access control.To read this article in full, please click here]]>
2023-10-10T08:07:00+00:00 https://www.networkworld.com/article/3708214/fortinet-secures-campus-networking-with-high-end-switches.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8393807 False Malware None 2.0000000000000000
Network World - Magazine Info IBM s'appuie sur l'IA pour les services de sécurité gérés<br>IBM leans into AI for managed security services Pour lire cet article en entier, veuillez cliquer ici
IBM is rolling out AI-based managed services that promise to help network and security operations teams more quickly and effectively respond to enterprise cyber threats.Managed by the IBM Consulting group, the Threat Detection and Response (TDR) Services offering promises 24x7 monitoring, investigation, and automated remediation of security alerts from existing security tools as well as cloud, on-premises, and operational technology systems utilizing the enterprise network. The services can integrate information from more than 15 security event and incident management (SIEM) tools and multiple third-party endpoint and network detection and response packages, for example.To read this article in full, please click here]]>
2023-10-06T07:52:00+00:00 https://www.networkworld.com/article/3708271/ibm-leans-into-ai-for-managed-security-services.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8392240 False Tool,Threat None 2.0000000000000000
Network World - Magazine Info Comment la sécurité du réseau peut économiser des dollars de sécurité<br>How network security can save security dollars Pour lire cet article en entier, veuillez cliquer ici
For the last twelve years, 100% of CIOs have said that they expect to spend more on IT security, making security the only category that just keeps on absorbing investment. Every year in the last three years, over 80% of enterprises have said that their IT security still needed improvement. So, like death and taxes, is security spending growth inevitable? If we keep on the way we have, it sure seems like it. But what might change?Let\'s start with what\'s important to users. External threats, meaning hacking, are a problem for every CIO. Internal threats, from badly behaving employees, are a problem for three out of four. Data theft is a universal fear, and malware that interferes with applications and operations is an important problem for over 90% of CIOs. As far as approaches or targets are concerned, 100% say access security on applications and data is essential and so is regular malware scanning. If you ask CIOs to pick a single thing they think is essential for IT security, it\'s access security.To read this article in full, please click here]]>
2023-09-21T03:15:00+00:00 https://www.networkworld.com/article/3707308/how-network-security-can-save-security-dollars.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8386236 False Malware None 2.0000000000000000
Network World - Magazine Info IBM X-FORCE: L'utilisation des informations d'identification compromises assombrit l'image de sécurité du nuage<br>IBM X-Force: Use of compromised credentials darkens cloud security picture IBM X-Force Cloud Threat Landscape Report , qui a également trouvé une augmentation de 200% (environ 3 900 vulnérabilités) enLes vulnérabilités et les expositions communes axées sur le cloud (CVE) au cours de la dernière année. «Plus de 35% des incidents de sécurité du cloud se sont produits par les attaquants \\ 'Utilisation des références valides et compromises», a écrit Chris Caridi, cyber-cyber-cyberAnalyste de menace avec IBM X-Force, dans un blog À propos du rapport.«Comprenant près de 90% des actifs à vendre sur les marchés Web Dark, les informations d'identification \\ 'parmi les cybercriminels sont apparentes, une moyenne de 10 $ par inscription & # 8211;ou l'équivalent d'une douzaine de beignets. " Pour lire cet article en entier, veuillez cliquer ici
As connectivity to cloud-based resources grows, cybercriminals are using valid, compromised credentials to access enterprise resources at an alarming rate.That\'s one of the chief findings of the IBM X-Force Cloud Threat Landscape Report, which also found a 200% increase (about 3,900 vulnerabilities) in cloud-oriented Common Vulnerabilities and Exposures (CVE) in the last year.“Over 35% of cloud security incidents occurred from attackers\' use of valid, compromised credentials,” wrote Chris Caridi, strategic cyber threat analyst with IBM X-Force, in a blog about the report. “Making up nearly 90% of assets for sale on dark web marketplaces, credentials\' popularity among cybercriminals is apparent, averaging $10 per listing – or the equivalent of a dozen doughnuts.”To read this article in full, please click here]]>
2023-09-15T08:36:00+00:00 https://www.networkworld.com/article/3706948/ibm-x-force-use-of-compromised-credentials-darkens-cloud-security-picture.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8383732 False Vulnerability,Threat,Studies,Cloud None 3.0000000000000000
Network World - Magazine Info Cisco, Kyndryl Step Up Partnership pour réduire les menaces de sécurité des entreprises<br>Cisco, Kyndryl step up partnership to cut enterprise security threats Kyndryl ont élargi leur partenariat pour offrir de nouveaux services qui visent à aider les clients d'entreprise à mieux détecter et répondre aux cyber-menaces. spécifiquement, Kyndryl intégrera sa propre offre de cyber-résilience avec Cisco \La plate-forme cloud de sécurité globale qui comprend des composants de sécurité tels que le contrôle d'accès duo de Cisco \\, les fonctionnalités de détection et de réponse prolongées, et la défense multicloud, qui orchestre la sécurité et la politique sur les nuages privés et publics. Security Cloud fonctionne comme une couche au-dessus de l'infrastructure à travers les services cloud d'un client \\ & # 8211;y compris Azure, AWS, GCP et Clouds de centre de données privés & # 8211;Pour protéger les applications de base, a déclaré Cisco.Il dispose d'un tableau de bord unifié, de la prise en charge des politiques de confiance flexibles et des API ouvertes pour encourager les intégrateurs tiers.En corrélant les données et en utilisant l'intelligence artificielle et l'apprentissage automatique, Cisco Security Cloud peut détecter et résoudre les menaces rapidement dans toute une organisation, dit Cisco. Pour lire cet article entièrement, veuillez cliquer ici
Cisco and Kyndryl have expanded their partnership to offer new services that are aimed at helping enterprise customers better detect and respond to cyber threats.Specifically, Kyndryl will be integrating its own cyber resiliency offering with Cisco\'s overarching Security Cloud platform that includes security components such as Cisco\'s Duo access control, extended detection and response features, and Multicloud Defense, which orchestrates security and policy across private and public clouds.Security Cloud operates as a layer on top of the infrastructure across a customer\'s cloud services – including Azure, AWS, GCP and private data-center clouds – to protect core applications, Cisco said. It features a unified dashboard, support for flexible trust policies, and open APIs to encourage third-party integrators. By correlating data and employing artificial intelligence and machine learning, Cisco Security Cloud can detect and remediate threats quickly throughout an organization, Cisco says.To read this article in full, please click here]]>
2023-08-24T07:13:00+00:00 https://www.networkworld.com/article/3705490/cisco-kyndryl-step-up-partnership-to-cut-enterprise-security-threats.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8374106 False Cloud None 2.0000000000000000
Network World - Magazine Info Versa améliore le package SASE avec des outils de sécurité basés sur l'IA<br>Versa enhances SASE package with AI-based security tools Package Versa Sase qui inclut SD WAN, un pare-feu de nouvelle génération et d'application Web, la prévention des intrusions, le support zéro fiducie et la prévention de la perte de données. Pour lire cet article en entier, veuillez cliquer ici
Versa is bolstering the AI security management features of its integrated Secure Access Service Edge (SASE) package to include improved malware detection for Advanced Threat Protection, network microsegmention and generative AI protection to help customers better detect and quickly mitigate threats to their networked service and applications.The vendor supports AI in its integrated Versa SASE package that includes SD WAN, a next-generation and web application firewall, intrusion prevention, zero trust support and data loss prevention.To read this article in full, please click here]]>
2023-08-23T10:00:00+00:00 https://www.networkworld.com/article/3705056/versa-enhances-sase-package-with-ai-based-security-tools.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8373748 False Malware,Tool,Threat None 2.0000000000000000
Network World - Magazine Info Cisco apporte une protection des ransomwares au package saas XDR<br>Cisco brings ransomware protection to XDR SaaS package 2023-08-01T06:35:00+00:00 https://www.networkworld.com/article/3703829/cisco-brings-ransomware-protection-to-xdr-saas-package.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8364288 False Ransomware,Cloud None 2.0000000000000000 Network World - Magazine Info Les géants du réseau s'unissent pour lutter contre les risques de sécurité<br>Network giants unite to fight security risks 2023-07-25T11:54:00+00:00 https://www.networkworld.com/article/3703233/network-giants-unite-to-fight-security-risks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8361367 False None None 2.0000000000000000 Network World - Magazine Info Fortinet dévoile les pare-feu du centre de données avec support de l'IA<br>Fortinet unveils data center firewalls with AI support Pour lire cet article en entier, veuillez cliquer ici
Fortinet has released two new high-speed, next generation firewalls designed to protect data center assets.The 387Gbps 3200F series and 164Gbps 900G series feature support for the vendor\'s AI-Powered Security Services, which blend AI and machine-learning technologies to make customers aware of cyber threats and act on protecting resources much more quickly, according to Nirav Shah, vice president of products and solutions at Fortinet.FortiGuard AI-Powered Security Services use real-time data from Fortinet\'s threat researchers at FortiGuard Lab to monitor for new dangers. “We look at terabytes of data every day, and that\'s where we run our AI and machine learning to see different things – whether we need to enable AI-powered services with IPS, or utilize sandbox technologies to mitigate them,” Shah said. “If you look at the cybersecurity industry, and the amount of data that we see, and the patterns and other things that we need to recognize to find the threats – [it] is extremely tough if you do it manually.”To read this article in full, please click here]]>
2023-07-18T09:38:00+00:00 https://www.networkworld.com/article/3702659/fortinet-unveils-data-center-firewalls-with-ai-support.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8358370 False Threat None 2.0000000000000000
Network World - Magazine Info Cisco héberge un pare-feu conteneurisé sur les commutateurs de catalyseur pour protéger les réseaux IT / OT mixés<br>Cisco hosts containerized firewall on Catalyst switches to protect mixed IT/OT networks blog sur les nouvelles. Pour lire cet article en entier, veuillez cliquer ici
Cisco announced a containerized firewall package for its venerable Catalyst switch family that\'s designed to help enterprise customers with mixed IT and OT systems more easily segment network resources and save money by consolidating network and security deployments.Specifically, Cisco built a Docker-based container for its Secure Firewall Adaptive Security Appliance (ASA) that can be hosted on its Catalyst 9300 access switches. Cisco Secure Firewall ASA combines firewall, antivirus, intrusion prevention, encryption and virtual private network (VPN) support.The firewall supports up to 10 logical interfaces, which can be used for segmentation. This segmentation helps limit the ability of an attacker to move laterally within the network by containing any breach to a specific zone, wrote Pal Lakatos-Toth, an engineering product manager with Cisco\'s security business group, in a blog about the news.To read this article in full, please click here]]>
2023-07-17T11:43:00+00:00 https://www.networkworld.com/article/3702908/cisco-hosts-containerized-firewall-on-catalyst-switches-to-protect-mixed-itot-networks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8357870 False None None 2.0000000000000000
Network World - Magazine Info Cato Networks lance un tracker alimenté par AI pour la commande et le contrôle des logiciels malveillants<br>Cato Networks launches AI-powered tracker for malware command and control Les algorithmes de l'apprentissage en profondeur sont conçus pour identifier Micware Domaines de commandement et de contrôle et les bloquer plus rapidement que les systèmes traditionnels en fonction de la réputation du domaine, grâce à une formation approfondie sur les ensembles de données de la société. Cato, a ]]> 2023-06-27T05:31:00+00:00 https://www.networkworld.com/article/3700794/cato-networks-launches-ai-powered-tracker-for-malware-command-and-control.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8349700 False Malware None 2.0000000000000000 Network World - Magazine Info La mauvaise configuration des nuages provoque une violation massive de données chez Toyota Motor<br>Cloud misconfiguration causes massive data breach at Toyota Motor Vehicle data and customer information were exposed for over eight years due to a cloud misconfiguration at Toyota Motor that impacted over 260,000 customers.]]> 2023-06-06T02:30:00+00:00 https://www.csoonline.com/article/3698513/cloud-misconfiguration-causes-massive-data-breach-at-toyota-motor.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8342708 False Data Breach,Cloud None 4.0000000000000000 Network World - Magazine Info Cisco vise la sécurité de l'IA-First avec Armorblox Acheter<br>Cisco aims for AI-first security with Armorblox buy un blog annonçant l'acquérir en pente . Bien que la sécurisation des e-mails était la première application par Armorblox \\ de ses techniques d'IA, ils pourraient également être appliqués à la prédiction d'attaque, à une détection rapide des menaces et à l'application efficace des politiques, a écrit Chopra."Grâce à cette acquisition, nous voyons de nombreux cas d'utilisation et possibilités d'utilisation de sécurité passionnants à déverrouiller." Pour lire cet article en entier, veuillez cliquer ici
Cisco plans to buy Armorblox, a six-year-old AI vendor, to help create “an AI-first Security Cloud.”“Leveraging Armorblox\'s use of predictive and Generative AI across our portfolio, we will change the way our customers understand and interact with their security control points,” wrote Raj Chopra senior vice president and chief product officer for Cisco Security in a blog announcing the pending acquistion.While securing email was Armorblox\'s first application of its AI techniques, they might also be applied to attack prediction, rapid threat detection, and efficient policy enforcement, Chopra wrote. “Through this acquisition though, we see many exciting broad security use cases and possibilities to unlock.”To read this article in full, please click here]]> 2023-05-31T16:34:00+00:00 https://www.networkworld.com/article/3698288/cisco-aims-for-ai-first-security-with-armorblox-buy.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8341073 False Threat None 2.0000000000000000 Network World - Magazine Info Cisco pour lancer un package de détection et de réponse prolongée<br>Cisco to launch an extended detection and response SaaS package Lire cet article en complet, veuillez cliquer ici
Cisco is taking its first major step into Extended Detection and Response (XDR) with a SaaS-delivered integrated system of endpoint, network, firewall, email and identity software aimed at protecting enterprise resources.Cisco\'s XDR service, which will be available July, brings together myriad Cisco and third-party security products to control network access, analyze incidents, remediate threats, and automate response all from a single cloud-based interface. The offering gathers six telemetry sources that Security Operations Center (SOC) operators say are critical for an XDR solution: endpoint, network, firewall, email, identity, and DNS, Cisco stated.To read this article in full, please click here]]>
2023-04-24T08:38:00+00:00 https://www.networkworld.com/article/3694449/cisco-to-launch-an-extended-detection-and-response-saas-package.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8330624 False Cloud None 2.0000000000000000
Network World - Magazine Info Cisco met en garde contre les attaques contre les routeurs de réseau, les pare-feu<br>Cisco warns of attacks on network routers, firewalls Le National Cyber Security Center du Royaume-Uni (NCSC), l'Agence américaine de sécurité nationale (NSA), l'Agence américaine de sécurité de la cybersécurité et de l'infrastructure (CISA) et le Federal Bureau of Investigation (FBI) qui a noté une augmentation des menaces dansen partie utilisant un exploit qui a été révélé pour la première fois en 2017. Cet exploit a ciblé une vulnérabilité SNMP dans les routeurs Cisco qui Le fournisseur patché en 2017 . Pour lire cet article en entier, veuillez cliquer ici
Cisco\'s Talos security intelligence group issued a warning today about an uptick in highly sophisticated attacks on network infrastructure including routers and firewalls.The Cisco warning piggybacks a similar joint warning issued today from The UK National Cyber Security Centre (NCSC), the US National Security Agency (NSA), US Cybersecurity and Infrastructure Security Agency (CISA) and US Federal Bureau of Investigation (FBI) that noted an uptick in threats in part utilizing an exploit that first came to light in 2017.  That exploit targeted an SNMP vulnerability in Cisco routers that the vendor patched in 2017To read this article in full, please click here]]>
2023-04-18T16:26:00+00:00 https://www.networkworld.com/article/3693753/cisco-warns-of-attacks-on-network-routers-firewalls.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8329177 False Vulnerability APT 28 2.0000000000000000
Network World - Magazine Info Les données DNS montrent qu'une organisation sur 10 a un trafic de logiciels malveillants sur leurs réseaux [DNS data shows one in 10 organizations have malware traffic on their networks] Akamai report highlights how widespread malware threats remain, noting the dangers of threats specific to DNS infrastructure.]]> 2023-03-14T14:50:00+00:00 https://www.csoonline.com/article/3690518/dns-data-shows-one-in-10-organizations-have-malware-traffic-on-their-networks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8320188 False Malware None 3.0000000000000000 Network World - Magazine Info AT&T informs 9M customers about data breach 2023-03-10T04:16:00+00:00 https://www.csoonline.com/article/3690609/att-informs-9m-customers-about-data-breach.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8317232 False Data Breach None 3.0000000000000000 Network World - Magazine Info Attacks on SonicWall appliances linked to Chinese campaign: Mandiant 2023-03-10T01:30:00+00:00 https://www.csoonline.com/article/3690588/attacks-on-sonicwall-appliances-linked-to-chinese-campaign-mandiant.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8317274 False None None 3.0000000000000000 Network World - Magazine Info War tests Ukrainian telecom, internet resilience resilience and defiance has been inspiring, but telecommunications and internet connectivity has grown much more difficult.Initially the country's internet network mostly withstood with some outages and slowdowns, but that has changed over time as the aggressors devote more effort in destroying physical locations and deploying malware and other cybersecurity weapons.For example, researchers at Top10VPN recently reported some distressing analysis including:To read this article in full, please click here]]> 2023-02-27T02:30:00+00:00 https://www.networkworld.com/article/3689174/war-tests-ukrainian-telecom-internet-resilience.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8313636 False Malware None 2.0000000000000000 Network World - Magazine Info VMware ESXi server ransomware evolves, after recovery script released massive ransomware attack targeting VMWare ESXi servers worldwide, reports surfaced that the malware evolved in a way that made earlier recovery procedures ineffective.The attacks, aimed at VMware's ESXi bare metal hypervisor, were first made public February 3 by the French Computer Emergency Response Team (CERT-FR), and target ESXi instances running older versions of the software, or those that have not been patched to current standards. Some 3,800 servers have been affected globally, CISA and the FBI said.To read this article in full, please click here]]> 2023-02-09T09:00:00+00:00 https://www.networkworld.com/article/3687610/vmware-esxi-server-ransomware-evolves-after-recovery-script-released.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8308608 False Ransomware,Malware None 3.0000000000000000 Network World - Magazine Info Massive ransomware attack targets VMware ESXi servers worldwide 2023-02-06T10:44:00+00:00 https://www.csoonline.com/article/3687095/massive-ransomware-attack-targets-vmware-esxi-servers-worldwide.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8307613 False Ransomware None 2.0000000000000000 Network World - Magazine Info What to expect from SASE certifications rolls SD-WAN and security into a single, centrally-managed cloud service that promises simplified WAN deployment, improved security, and better performance.According to Gartner, SASE's benefits are transformational because it can speed deployment time for new users, locations, applications, and devices, as well as reduce attack surfaces and shorten remediation times by as much as 95%.With the pandemic, adoption of SASE has been on an upward swing. Gartner predicts in its most recent SASE roadmap that 80% of enterprises will have adopted a SASE or SSE architecture by 2025, up from 20% in 2021. (Security service edge, or SSE, is a security-focused subset of SASE that's basically SASE without SD-WAN.)To read this article in full, please click here]]> 2023-01-13T03:00:00+00:00 https://www.networkworld.com/article/3633533/what-to-expect-from-sase-certifications.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8300851 False None None 2.0000000000000000 Network World - Magazine Info Top 10 Best Residential Proxy Service Providers To read this article in full, please click here]]> 2022-12-12T04:00:00+00:00 https://www.networkworld.com/article/3682140/top-10-best-residential-proxy-service-providers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8290301 False None None 3.0000000000000000 Network World - Magazine Info Ransomware attack knocks Rackspace\'s Exchange servers offline ransomware attack. The company shut the service down last Friday.It was not initially clear what had caused the outage, but Rackspace quickly moved to shift Exchange customers over to Microsoft 365, as this part of the company's infrastructure was apparently unaffected.Rackspace offers migration to Microsoft 365 Rackspace said today that there is “no timeline” for restoration of Exchange service, but it is offering Exchange users technical assistance and free access to Microsoft 365 as a substitute, though it acknowledged that migration is unlikely to be a simple process for every user. Rackspace said that, while the migration is in progress, customers can forward emails sent to their Hosted Exchange inboxes to an external server, as a temporary workaround.To read this article in full, please click here]]> 2022-12-06T13:59:00+00:00 https://www.networkworld.com/article/3681895/ransomware-attack-knocks-rackspaces-exchange-servers-offline.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8289343 False Ransomware None 1.00000000000000000000 Network World - Magazine Info Researchers found security pitfalls in IBM\'s cloud infrastructure 2022-12-01T06:01:00+00:00 https://www.csoonline.com/article/3681450/researchers-found-security-pitfalls-in-ibm-s-cloud-infrastructure.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8286269 False None None 3.0000000000000000 Network World - Magazine Info 5 DNS services to provide a layer of internet security Domain Name System (DNS) every time you surf the Web. Each time you type a site name into the browser, DNS is queried for the IP address corresponding to that particular domain, so the browser can contact the Web server to get the content. The process of converting the domain name to its IP address is called domain-name resolution.To read this article in full, please click here]]> 2022-11-29T15:43:00+00:00 https://www.networkworld.com/article/2876173/6-dns-services-protect-against-malware-and-other-unwanted-content.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8285680 False Malware None 2.0000000000000000 Network World - Magazine Info Palo Alto targets zero-day threats with new firewall software next-generation firewall (NGFW) software that includes some 50 new features aimed at helping enterprise organizations battle zero-day threats and advanced malware attacks.The new features are built into the latest version of Palo Alto's firewall operating system – PAN 11.0 Nova – and include upgraded malware sandboxing for the company's WildFire malware-analysis service, advanced threat prevention (ATP), and a new cloud access security broker (CASB).WildFire is Palo Alto's on-prem or cloud-based malware sandbox that is closely integrated with Palo Alto's firewalls. When a firewall detects anomalies, it sends data to WildFire for analysis. WildFire uses machine learning, static analysis, and other analytics to discover threats, malware and zero-day threats, according to the vendor.To read this article in full, please click here]]> 2022-11-16T08:52:00+00:00 https://www.networkworld.com/article/3680233/palo-alto-targets-zero-day-threats-with-new-firewall-software.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8049914 False Malware,Threat None None Network World - Magazine Info Researchers show techniques for malware persistence on F5 and Citrix load balancers 2022-11-09T10:53:00+00:00 https://www.csoonline.com/article/3679628/researchers-show-techniques-for-malware-persistence-on-f5-and-citrix-load-balancers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=7909215 False Malware None None Network World - Magazine Info U.S. government proposals spell out 5G security advancements 2022-05-31T14:25:00+00:00 https://www.csoonline.com/article/3662075/u-s-government-proposals-spell-out-5g-security-advancements.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=5485726 False None None None Network World - Magazine Info Microsoft security vulnerabilities drop after five-year rise 2022-05-25T12:45:00+00:00 https://www.csoonline.com/article/3662069/microsoft-security-vulnerabilities-drop-after-five-year-rise.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=4807615 False None None None Network World - Magazine Info CISA issues emergency warning over two new VMware vulnerabilities 2022-05-19T06:10:00+00:00 https://www.csoonline.com/article/3661589/cisa-issues-emergency-warning-over-two-new-vmware-vulnerabilities.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=5485729 False Threat None None Network World - Magazine Info Cohesity launches FortKnox to protect data from ransomware attacks Cohesity is launching a new data isolation and recovery tool called FortKnox, in a bid to help customers protect their data from ransomware attacks.FortKnox provides an additional layer of off-site protection for customers by keeping data in a secure 'vault,' with physical separation, network and management isolation to keep threat actors from accessing sensitive data.An object lock requires a minimum of two or more people to approve critical actions, such as changes of vault policy, and access can be managed using granular role-based access control, multi-factor authentication, and encryption both in-flight and at rest.To read this article in full, please click here]]> 2022-05-10T03:00:00+00:00 https://www.networkworld.com/article/3659878/lock-up-your-data-with-cohesity-fortknox.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=4664459 False Ransomware,Tool,Threat None None Network World - Magazine Info Cisco warns of critical vulnerability in virtualized network software VM) to the host machine, Cisco disclosed. The other two problems involve letting a bad actor inject commands that execute at the root level and allowing a remote attacker to leak system data from the host to the VM.NFVIS is Linux-based infrastructure software designed to help enterprises and service providers to deploy virtualized network functions, such as a virtual router, firewall and WAN acceleration, Cisco stated.To read this article in full, please click here]]> 2022-05-05T11:06:00+00:00 https://www.networkworld.com/article/3659872/cisco-warns-of-critical-vulnerability-in-virtualized-network-software.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=4664460 False Vulnerability None None Network World - Magazine Info TLS implementation flaws open Aruba and Avaya network switches to RCE attacks 2022-05-03T03:42:00+00:00 https://www.csoonline.com/article/3658834/tls-implementation-flaws-open-aruba-and-avaya-network-switches-to-rce-attacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=4664461 False None None None Network World - Magazine Info US security agencies warn of threats to industrial, utility control networks joint warning that certain advanced persistent threat (APT) actors have shown the ability to gain full system access to compromised ICS/SCADA systems.The alert did not identify which groups were making the threats, but it did recognize Dragos, Mandiant, Microsoft, Palo Alto Networks and Schneider Electric for helping put together the warning. Dragos has posted a paper about part of the threat.To read this article in full, please click here]]> 2022-04-14T07:13:00+00:00 https://www.networkworld.com/article/3657609/us-security-agencies-warn-of-threats-to-industrial-utility-control-networks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=4664462 False Threat None None Network World - Magazine Info CISA warns of attacks against internet-connected UPS devices 2022-03-30T08:55:00+00:00 https://www.csoonline.com/article/3655591/cisa-warns-of-attacks-against-internet-connected-ups-devices.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=4664463 False Threat None None Network World - Magazine Info SolarWinds roundup: Fixes, new bad actors, and the company knew [Get regularly scheduled insights by signing up for Network World newsletters.] After an initial dormant period of up to two weeks, the Trojan retrieves and executes commands, called jobs, that include the ability to transfer files, execute files, profile the system, reboot, and disable system services. In short, a total takeover of the machine.]]> 2020-12-23T05:13:00+00:00 https://www.networkworld.com/article/3602090/solarwinds-roundup-fixes-new-bad-actors-and-the-company-knew.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=2122720 True None None None Network World - Magazine Info SolarWinds roundup: Fixes, new bad actors, and what the company knew [Get regularly scheduled insights by signing up for Network World newsletters.] After an initial dormant period of up to two weeks, the Trojan retrieves and executes commands, called jobs, that include the ability to transfer files, execute files, profile the system, reboot, and disable system services. In short, a total takeover of the machine.]]> 2020-12-23T05:13:00+00:00 https://www.networkworld.com/article/3602090/solarwinds-roundup-fixes-new-bad-actors-and-what-the-company-knew.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=2131745 True None None None Network World - Magazine Info SolarWinds Trojan: Affected enterprises must use hot patches, isolate compromised gear the serious Trojan unleashed on the platform.The supply-chain attack, reported early this week by Reuters and detailed by security researchers at FireEye and Microsoft involves a potential state-sponsored, sophisticated actor gained access to a wide variety of government, public and private networks via Trojanized updates to SolarWind's Orion network monitoring and management software. This campaign may have begun as early as spring 2020 and is ongoing, according to FireEye and others.]]> 2020-12-15T12:21:00+00:00 https://www.networkworld.com/article/3601568/solarwinds-trojan-affected-enterprises-must-use-hot-patches-isolate-compromised-gear.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=2103522 False Patching Solardwinds None Network World - Magazine Info Trojan in SolarWinds security has far-reaching impact In a security advisory, SolarWinds said customers should upgrade to Orion Platform version 2020.2.1 HF 1 as soon as possible to ensure their environment is safe. An additional hotfix release that both replaces the compromised component and provides several additional security enhancements is expected in the next day or two.The company's managed services tools appear to be uncompromised, and the company said it isn't aware of any similar issues with its non-Orion products, like RMM, N-Central, and SolarWinds MSP products.]]> 2020-12-15T08:41:00+00:00 https://www.networkworld.com/article/3600833/trojan-in-solarwinds-security-has-far-reaching-impact.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=2102924 False None None None Network World - Magazine Info SolarWinds attack explained: And why it was so hard to detect 2020-12-15T03:44:00+00:00 https://www.csoonline.com/article/3601508/solarwinds-supply-chain-attack-explained-why-organizations-were-not-prepared.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=2102784 False None APT 29 None Network World - Magazine Info \'Credible threat\': How to protect networks from ransomware warning of credible cyberthreats to healthcare facilities including ransomware, it's a good time to review the steps outlined in this article that enterprises can take to guard against such attacks.)Ransomware attacks are becoming more rampant now that criminals have learned they are an effective way to make money in a short amount of time.Attackers do not even need any programming skills to launch an attack because they can obtain code that is shared among the many hacker communities. There are even services that will collect the ransom via Bitcoin on behalf of the attackers and just require them to pay a commission.]]> 2020-10-29T07:53:00+00:00 https://www.networkworld.com/article/3218708/how-to-protect-your-network-from-ransomware-attacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=2002398 False Ransomware None None Network World - Magazine Info ROLLING UPDATE: The impact of COVID-19 on public networks and security BroadbandNow say users in most of the cities it analyzed are experiencing normal network conditions, suggesting that ISP's (and their networks) are holding up to the shifting demand. In a March 25 post the firm wrote: “Encouragingly, many of the areas hit hardest by the spread of the coronavirus are holding up to increased network demand. Cities like Los Angeles, Chicago, Brooklyn, and San Francisco have all experienced little or no disruption. New York City,  now the epicenter of the virus in the U.S., has seen a 24% dip out of its previous ten-week range. However, with a new median speed of nearly 52 Mbps, home connections still appear to be holding up overall.” Other BroadbandNow findings included:]]> 2020-03-25T10:36:00+00:00 https://www.networkworld.com/article/3534037/rolling-update-the-impact-of-covid-19-on-public-networks-and-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=1622910 False None None None Network World - Magazine Info How enterprise networking is changing with a work-at-home workforce BroadbandNow say users in most of the cities it analyzed are experiencing normal network conditions, suggesting that ISP's (and their networks) are holding up to the shifting demand. In a March 25 post the firm wrote: “Encouragingly, many of the areas hit hardest by the spread of the coronavirus are holding up to increased network demand. Cities like Los Angeles, Chicago, Brooklyn, and San Francisco have all experienced little or no disruption. New York City,  now the epicenter of the virus in the U.S., has seen a 24% dip out of its previous ten-week range. However, with a new median speed of nearly 52 Mbps, home connections still appear to be holding up overall.”]]> 2020-03-25T10:36:00+00:00 https://www.networkworld.com/article/3534037/how-enterprise-networking-is-changing-with-a-work-at-home-workforce.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=1630787 True None None None Network World - Magazine Info Coronavirus challenges remote networking Atlas shows that VPN usage in the U.S. grew by 53% between March 9 and 15, and it could grow faster. VPN usage in Italy, where the virus outbreak is about two weeks ahead of the U.S., increased by 112% during the last week. "We estimate that VPN usage in the U.S. could increase over 150% by the end of the month," said Rachel Welch, chief operating officer of Atlas VPN, in a statement.]]> 2020-03-16T13:02:00+00:00 https://www.networkworld.com/article/3532440/coronavirus-challenges-remote-networking.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=1601030 False None None None Network World - Magazine Info How cyber attackers hide malware on your network 2020-02-12T03:00:00+00:00 https://www.networkworld.com/video/101019/how-cyber-attackers-hide-malware-on-your-network#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=1537193 False Malware None None Network World - Magazine Info The problem with mobile and app voting 2020-02-04T09:24:00+00:00 https://www.networkworld.com/video/100959/the-problem-with-mobile-and-app-voting#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=1524530 False Hack,Guideline None None Network World - Magazine Info 3 easy ways to make your Windows network harder to hack 2020-01-15T03:00:00+00:00 https://www.networkworld.com/video/100228/3-easy-ways-to-make-your-windows-network-harder-to-hack#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=1501558 False Hack None None Network World - Magazine Info Red Hat Responds to Zombieload v2 [Get regularly scheduled insights by signing up for Network World newsletters.] Red Hat strongly suggests that all Red Hat systems be updated even if they do not believe their configuration poses a direct threat, and it is providing resources to their customers and to the enterprise IT community.]]> 2019-11-13T12:07:00+00:00 https://www.networkworld.com/article/3453596/red-hat-responds-to-zombieload-v2.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=1465462 False None None None Network World - Magazine Info Cisco: 13 IOS, IOS XE security flaws you should patch now IOS and IOS XE Software Security Advisory Bundle – have a security impact rating (SIR) of "high". Successful exploitation of the vulnerabilities could allow an attacker to gain unauthorized access to, conduct a command injection attack on, or cause a denial of service (DoS) condition on an affected device, Cisco stated. "How to determine if Wi-Fi 6 is right for you" Two of the vulnerabilities affect both Cisco IOS Software and Cisco IOS XE Software. Two others affect Cisco IOS Software, and eight of the vulnerabilities affect Cisco IOS XE Software. The final one affects the Cisco IOx application environment. Cisco has confirmed that none of the vulnerabilities affect Cisco IOS XR Software or Cisco NX-OS Software.  Cisco has released software updates that address these problems.]]> 2019-09-26T08:18:00+00:00 https://www.networkworld.com/article/3441221/cisco-13-ios-ios-xe-security-flaws-you-should-patch-now.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=1363394 False None None None Network World - Magazine Info What is phishing? Learn how this attack works 2019-08-28T03:00:00+00:00 https://www.networkworld.com/video/97549/what-is-phishing-learn-how-this-attack-works#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=1290419 False None None None Network World - Magazine Info Texas ransomware attacks: to pay or not to pay? | TECH(feed) 2019-08-22T12:53:00+00:00 https://www.networkworld.com/video/97488/texas-ransomware-attacks-to-pay-or-not-to-pay-tech-feed#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=1279464 False Ransomware,Threat None None Network World - Magazine Info Don\'t worry about shadow IT. Shadow IoT is much worse. so eager to circumvent what they see as slow and conservative IT departments by adopting increasingly powerful and affordable consumer and cloud-based alternatives, with or without the blessing of the powers that be. Just as important, there's plenty of evidence of that enlightened IT departments should work to leverage those new approaches to serve their internal customers in a more agile manner.]]> 2019-08-22T08:21:00+00:00 https://www.networkworld.com/article/3433496/dont-worry-about-shadow-it-shadow-iot-is-much-worse.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=1278904 False None None None Network World - Magazine Info Microsoft finds Russia-backed attacks that exploit IoT devices IoT-based attack on unnamed Microsoft customers, according to the company. a blog post from the company's security response center issued Monday.Microsoft said in a blog that the attack, which it discovered in April, targeted three specific IoT devices – a VoIP phone, a video decoder and a printer (the company declined to specify the brands) – and used them to gain access to unspecified corporate networks. Two of the devices were compromised because nobody had changed the manufacturer's default password, and the other one hadn't had the latest security patch applied.]]> 2019-08-06T15:20:00+00:00 https://www.networkworld.com/article/3430356/microsoft-finds-russia-backed-attacks-that-exploit-iot-devices.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=1247157 False None APT 28 None Network World - Magazine Info The latest large-scale data breach: Capital One | TECH(feed) 2019-07-31T10:33:00+00:00 https://www.networkworld.com/video/97107/the-latest-large-scale-data-breach-capital-one-tech-feed#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=1237671 False None Equifax None Network World - Magazine Info Remote code execution is possible by exploiting flaws in Vxworks What is the IoT? How the internet of things works What is edge computing and how it's changing the network Most powerful Internet of Things companies 10 Hot IoT startups to watch The 6 ways to make money in IoT What is digital twin technology? [and why it matters] Blockchain, service-centric networking key to IoT success Getting grounded in IoT networking and security Building IoT-ready networks must become a priority What is the Industrial IoT? [And why the stakes are so high] The vulnerabilities affect all devices running VxWorks version 6.5 and later with the exception of VxWorks 7, issued July 19, which patches the flaws. That means the attack windows may have been open for more than 13 years.]]> 2019-07-31T08:40:00+00:00 https://www.networkworld.com/article/3428996/remote-code-execution-is-possible-by-exploiting-flaws-in-vxworks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=1235270 False None None None Network World - Magazine Info Tracking down library injections on Linux Learn how to master a host of Linux commands in these 2-minute video tutorials ] Shared library vulnerability Both DLL and .so files are shared library files that allow code (and sometimes data) to be shared by various processes. Commonly used code might be put into one of these files so that it can be reused rather than rewritten many times over for each process that requires it. This also facilitates management of commonly used code.]]> 2019-06-26T08:08:00+00:00 https://www.networkworld.com/article/3404621/tracking-down-library-injections-on-linux.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=1175012 False None None None Network World - Magazine Info Microsoft issues fixes for non-supported versions of Windows Server CVE-2019-0708) is in the Remote Desktop Services component built into all versions of Windows. RDP, formerly known as Terminal Services, itself is not vulnerable. CVE-2019-0708 is pre-authentication and requires no user interaction, meaning any future malware could self-propagate from one vulnerable machine to another.CVE-2019-0708 affects Windows XP, Windows 7, Windows Server 2003, Windows Server 2008 R2, and Windows Server 2008. It does not impact Microsoft's newest operating systems; Windows 8 through 10 and Windows Server 2012 through 2019 are not affected.]]> 2019-05-17T10:56:00+00:00 https://www.networkworld.com/article/3396177/microsoft-issues-fixes-for-non-supported-versions-of-windows-server.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=1112885 False Malware,Vulnerability None 5.0000000000000000 Network World - Magazine Info WhatsApp attacked by spyware | TECH(feed) 2019-05-16T03:00:00+00:00 https://www.networkworld.com/video/95587/whatsapp-attacked-by-spyware-tech-feed#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=1110127 False Hack,Vulnerability None None Network World - Magazine Info Cisco adds AMP to SD-WAN for ISR/ASR routers reinforce branch and core network malware protection at across the SD-WAN.Cisco last year added its Viptela SD-WAN technology to the IOS XE version 16.9.1 software that runs its core ISR/ASR routers such as the ISR models 1000, 4000 and ASR 5000, in use by organizations worldwide. Cisco bought Viptela in 2017.  More about SD-WAN How to buy SD-WAN technology: Key questions to consider when selecting a supplier How to pick an off-site data-backup method SD-Branch: What it is and why you'll need it What are the options for security SD-WAN? The release of Cisco IOS XE offered an instant upgrade path for creating cloud-controlled SD-WAN fabrics to connect distributed offices, people, devices and applications operating on the installed base, Cisco said. At the time Cisco said that Cisco SD-WAN on edge routers builds a secure virtual IP fabric by combining routing, segmentation, security, policy and orchestration.]]> 2019-05-09T12:25:00+00:00 https://www.networkworld.com/article/3394597/cisco-adds-amp-to-sd-wan-for-israsr-routers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=1101262 False Malware None None Network World - Magazine Info Cisco: DNSpionage attack adds new tools, morphs tactics DNSpionage in November, this week warned of new exploits and capabilities of the nefarious campaign. More about DNS: DNS in the cloud: Why and why not DNS over HTTPS seeks to make internet use more private How to protect your infrastructure from DNS cache poisoning ICANN housecleaning revokes old DNS security key “The threat actor's ongoing development of DNSpionage malware shows that the attacker continues to find new ways to avoid detection. DNS tunneling is a popular method of exfiltration for some actors and recent examples of DNSpionage show that we must ensure DNS is monitored as closely as an organization's normal proxy or weblogs,” Talos wrote.   “DNS is essentially the phonebook of the internet, and when it is tampered with, it becomes difficult for anyone to discern whether what they are seeing online is legitimate.”]]> 2019-04-24T11:06:00+00:00 https://www.networkworld.com/article/3390666/cisco-dnspionage-attack-adds-new-tools-morphs-tactics.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=1095452 False Malware,Threat None None Network World - Magazine Info Cisco Talos details exceptionally dangerous DNS hijacking attack report detailing what it calls the “first known case of a domain name registry organization that was compromised for cyber espionage operations.”Talos calls ongoing cyber threat campaign “Sea Turtle” and said that state-sponsored attackers are abusing DNS to harvest credentials to gain access to sensitive networks and systems in a way that victims are unable to detect, which displays unique knowledge on how to manipulate DNS, Talos stated. More about DNS: DNS in the cloud: Why and why not DNS over HTTPS seeks to make internet use more private How to protect your infrastructure from DNS cache poisoning ICANN housecleaning revokes old DNS security key By obtaining control of victims' DNS, the attackers can change or falsify any data on the Internet, illicitly modify DNS name records to point users to actor-controlled servers; users visiting those sites would never know, Talos reported. ]]> 2019-04-17T08:11:00+00:00 https://www.networkworld.com/article/3389747/cisco-talos-details-exceptionally-dangerous-dns-hijacking-attack.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=1094145 False Threat None None Network World - Magazine Info How to quickly deploy, run Linux applications as unikernels 2019-04-08T06:20:00+00:00 https://www.networkworld.com/article/3387299/how-to-quickly-deploy-run-linux-applications-as-unikernels.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=1091952 False None None None Network World - Magazine Info How to hack your own Wi-Fi network 2019-03-25T22:05:00+00:00 https://www.networkworld.com/article/2187861/security-how-to-hack-your-own-wi-fi-network.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=1081415 False Hack,Tool None None Network World - Magazine Info Huawei\'s possible lawsuit, ransomware readiness, old malware resurfaces | TECH(feed) 2019-03-05T12:00:00+00:00 https://www.networkworld.com/video/94127/huawei-s-possible-lawsuit-ransomware-readiness-old-malware-resurfaces-tech-feed#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=1054896 False Ransomware,Malware None None Network World - Magazine Info Protecting the IoT: 3 things you must include in an IoT security plan 2019-02-27T07:39:00+00:00 https://www.networkworld.com/article/3343184/protecting-the-iot-3-things-you-must-include-in-an-iot-security-plan.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=1044895 False Hack,Threat,Guideline None None Network World - Magazine Info Edge security: There\'s lots of attack surfaces to worry about How edge networking and IoT will reshape data centers Edge computing best practices How edge computing can help secure the IoT The most common IoT vulnerability occurs because many sensors and edge computing devices are running some kind of built-in web server to allow for remote access and management. This is an issue because many end-users don't – or, in some cases, can't – change default login and password information, nor are they able to seal them off from the Internet at large. There are dedicated gray-market search sites out there to help bad actors find these unsecured web servers, and they can even be found with a little creative Googling, although Joan Pepin, CISO at security and authentication vendor Auth0, said that the search giant has taken steps recently to make that process more difficult.]]> 2019-02-19T15:03:00+00:00 https://www.networkworld.com/article/3342039/internet-of-things/edge-security-there-s-lots-of-attack-surfaces-to-worry-about.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=1033234 False Vulnerability None None Network World - Magazine Info DARPA explores new computer architectures to fix security between systems Defense Advanced Research Projects Agency (DARPA) on its website, announcing an initiative to develop completely new hardware and software that will allow defense communications to take place securely among myriad existing systems, networks, and security protocols.]]> 2019-01-31T06:32:00+00:00 https://www.networkworld.com/article/3337460/network-security/darpa-explores-new-computer-architectures-to-fix-security-between-systems.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=1016757 False None None None Network World - Magazine Info Build security into your IoT plan or risk attack 2019-01-28T09:11:00+00:00 https://www.networkworld.com/article/3336269/internet-of-things/build-security-into-your-iot-plan-or-risk-attack.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=1012332 False Guideline None None Network World - Magazine Info Download Malwarebytes Today and Protect Your Data for Free malware, phishing, or hacking. Best-case scenario, it sucks up your time to fix (or your money by paying someone else to fix it). Worst case scenario, it puts you and your computer out of commission for days and damages your files beyond repair. Not to mention the sheer terror of knowing some hacker has complete and total access to virtually everything about you, including all of your banking and credit card information. Malwarebytes is a free program built to help you avoid the above scenarios altogether - and it makes traditional antivirus look old, tired, and played out (seriously it's free, download it here).]]> 2018-11-15T06:48:00+00:00 https://www.networkworld.com/article/3319658/security/download-malwarebytes-today-and-protect-your-data-for-free.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=898284 False None None None Network World - Magazine Info GPUs are vulnerable to side-channel attacks What are the Meltdown and Spectre exploits? | Get regularly scheduled insights: Sign up for Network World newsletters ] A side-channel attack is one where the attacker uses how a technology operates, in this case a GPU, rather than a bug or flaw in the code. It takes advantage of how the processor is designed and exploits it in ways the designers hadn't thought of.]]> 2018-11-13T10:55:00+00:00 https://www.networkworld.com/article/3321036/data-center/gpus-are-vulnerable-to-side-channel-attacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=895293 False None None None Network World - Magazine Info Talking DerbyCon, Chinese whispers and Google\'s data breach | Salted Hash Ep 47 2018-10-11T22:00:00+00:00 https://www.networkworld.com/video/91367/talking-derbycon-chinese-whispers-and-googles-data-breach-salted-hash-ep-47#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=847979 True Data Breach None None Network World - Magazine Info Talking DerbyCon, spy chip whispers and Google\'s data breach | Salted Hash Ep 47 2018-10-11T22:00:00+00:00 https://www.networkworld.com/video/91367/talking-derbycon-spy-chip-whispers-and-googles-data-breach-salted-hash-ep-47#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=848115 True Data Breach None None Network World - Magazine Info VirusTotal Intelligence, a search engine for malware | Salted Hash Ep 45 2018-08-31T12:49:00+00:00 https://www.networkworld.com/video/89887/virustotal-intelligence-a-search-engine-for-malware-salted-hash-ep-45#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=787581 False Malware,Tool None None Network World - Magazine Info How to protect your infrastructure from DNS cache poisoning Domain Name System (DNS) is our root of trust and is one of the most critical components of the internet. It is a mission-critical service because if it goes down, a business's web presence goes down.DNS is a virtual database of names and numbers. It serves as the backbone for other services critical to organizations. This includes email, internet site access, voice over internet protocol (VoIP), and the management of files.You hope that when you type a domain name that you are really going where you are supposed to go. DNS vulnerabilities do not get much attention until an actual attack occurs and makes the news. For example, in April 2018, public DNS servers that managed the domain for Myetherwallet were hijacked and customers were redirected to a phishing site. Many users reported losing funds out of their account, and this brought a lot of public attention to DNS vulnerabilities.]]> 2018-08-16T08:01:00+00:00 https://www.networkworld.com/article/3298160/internet/how-to-protect-your-infrastructure-from-dns-cache-poisoning.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=779753 False None None None Network World - Magazine Info Chip maker TSMC will lose millions for not patching its computers 2018-08-08T13:28:00+00:00 https://www.networkworld.com/article/3296041/security/chip-maker-tsmc-will-lose-millions-for-not-patching-its-computers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=771716 False Tool,Patching Wannacry None Network World - Magazine Info An inside look at hybrid Office 365 phishing attacks | Salted Hash Ep 41 2018-08-08T02:54:00+00:00 https://www.networkworld.com/video/89055/an-inside-look-at-hybrid-office-365-phishing-attacks-salted-hash-ep-41#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=770898 False None None None Network World - Magazine Info The aftermath of the Gentoo GitHub hack 2018-07-10T07:23:00+00:00 https://www.networkworld.com/article/3287973/linux/the-aftermath-of-the-gentoo-github-hack.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=738864 False Hack None None Network World - Magazine Info Automation critical to scalable network security 2018-06-11T12:33:00+00:00 https://www.networkworld.com/article/3280824/network-security/automation-critical-to-scalable-network-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=703968 False None None None Network World - Magazine Info Supermicro is the latest hardware vendor with a security issue Eclypsium said in a blog post announcing its findings.]]> 2018-06-11T04:52:00+00:00 https://www.networkworld.com/article/3279896/security/supermicro-is-the-latest-hardware-vendor-with-a-security-issue.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=706153 False None None None Network World - Magazine Info What an Apple phishing attack looks like | Salted Hash Ep 32 2018-05-16T04:00:00+00:00 https://www.networkworld.com/video/87395/what-an-apple-phishing-attack-looks-like-salted-hash-ep-32#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=652700 False None None None Network World - Magazine Info Mingis on Tech: The lowdown on Android security 2018-04-24T03:00:00+00:00 https://www.networkworld.com/video/86856/mingis-on-tech-the-lowdown-on-android-security#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=610937 False None None None Network World - Magazine Info Is it time to kill the pen test? | Salted Hash Ep 22 2018-04-17T21:00:00+00:00 https://www.networkworld.com/video/86816/is-it-time-to-kill-the-pen-test-salted-hash-ep-22#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=596541 False None None None Network World - Magazine Info Memcached servers can be hijacked for massive DDoS attacks first discovered by security researchers at content delivery network (CDN) specialist Cloudflare. Since then, CDN specialist Akamai and security provider Arbor Networks have also published their findings.Also read: Getting the most out of your next-generation firewall Memcached is a Web-based massive memory cache for database-drive sites, such as websites, that caches the most frequently retrieved data and keeps it in memory rather than getting it from the hard disk over and over again. It is a combination of open-source software and standard server hardware that consists of memory, memory, and more memory.]]> 2018-02-28T12:21:00+00:00 https://www.networkworld.com/article/3258772/security/memcached-servers-can-be-hijacked-for-massive-ddos-attacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=493270 False None None None Network World - Magazine Info How to eliminate the default route for greater security IPv6 deployment guide; What is edge computing and how it's changing the network?+]]> 2018-02-01T03:00:00+00:00 https://www.networkworld.com/article/3252090/lan-wan/how-to-eliminate-the-default-route-for-greater-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=463210 False None None None Network World - Magazine Info What is microsegmentation? How getting granular improves network security firewalls, virtual local area networks (VLAN) and access control lists (ACL) for network segmentation for years. With microsegmentation, policies are applied to individual workloads for greater attack resistance.]]> 2018-01-30T08:56:00+00:00 https://www.networkworld.com/article/3247672/virtualization/what-is-microsegmentation-how-getting-granular-improves-network-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=462223 False None None None Network World - Magazine Info The people you call when you\'ve had a breach | Salted Hash Ep 15 2018-01-22T06:00:00+00:00 https://www.networkworld.com/video/83975/the-people-you-call-when-youve-had-a-breach-salted-hash-ep-15#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=459744 False None None None Network World - Magazine Info Tech Talk: Uber hack, Google tracks, AWS packs (in China) ... and Firefox is back 2017-11-29T12:00:00+00:00 https://www.networkworld.com/video/83615/tech-talk-uber-hack-google-tracks-aws-packs-in-china-and-firefox-is-back#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=441813 False None Uber None Network World - Magazine Info Tech Talk: The Equifax data breach, a new Apple Watch and the A.I. revolution 2017-09-27T14:00:00+00:00 https://www.computerworld.com/video/82055/tech-talk-the-equifax-data-breach-a-new-apple-watch-and-the-a-i-revolution#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=412825 False None Equifax None Network World - Magazine Info Microsoft launches data security technology for Windows Server, Azure company blog post. “With confidential computing, they can move the data to Azure knowing that it is safe not only at rest, but also in use from [various] threats.” To read this article in full or to leave a comment, please click here]]> 2017-09-19T12:28:00+00:00 https://www.networkworld.com/article/3226730/security/microsoft-launches-data-security-technology-for-windows-server-azure.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=409765 False None None None Network World - Magazine Info Today\'s property rules don\'t work in our IoT world owned Cambridge University Press “Property ownership as we know it is under attack and fading fast,” writes Joshua Fairfield in his book Owned: Property, Privacy, and the New Digital Serfdom. “The Internet of Things and digital property ownership systems are being built on the old feudal model.”To read this article in full or to leave a comment, please click here]]> 2017-09-12T07:25:00+00:00 https://www.networkworld.com/article/3222861/internet-of-things/todays-property-rules-dont-work-in-our-iot-world.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=406969 False None None None Network World - Magazine Info This Linux tool could improve the security of IoT devices How to improve IoT security + Those earlier platforms have been hardened, updates have been automated, and the app discovery and installation have been made trustworthy. IoT developers need to follow their lead. To read this article in full or to leave a comment, please click here]]> 2017-08-24T07:33:00+00:00 https://www.networkworld.com/article/3219725/internet-of-things/this-linux-tool-could-improve-the-security-of-iot-devices.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=400384 False Guideline None None Network World - Magazine Info Connected cars have an \'indefensible\' security vulnerability security firm Trend Micro, these safety systems are even more vulnerable to hacking than was previously thought. In a blog post published last week, "The Crisis of Connected Cars: When Vulnerabilities Affect the CAN Standard," the company publicized an effective, vendor-neutral hack that is “currently indefensible by modern car security technology.”To read this article in full or to leave a comment, please click here]]> 2017-08-23T08:18:00+00:00 https://www.networkworld.com/article/3218712/internet-of-things/connected-cars-have-an-indefensible-security-vulnerability.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=399864 False None None None Network World - Magazine Info How to protect your network from ransomware attacks Network vulnerability analysis 101: Free online training + Many small and medium-size businesses pay ransoms because they do not backup their data and do not have any other options available to recover their data. They sometimes face the decision of either paying the ransom or being forced out of business. Also, hospitals that do not back up all their critical patient data and are not able to retrieve it in a timely manner will immediately pay the ransom because it is critical to access records of patients who require immediate care. It can become a life-or-death situation for someone in intensive care.To read this article in full or to leave a comment, please click here]]> 2017-08-23T06:44:00+00:00 https://www.networkworld.com/article/3218708/network-monitoring/how-to-protect-your-network-from-ransomware-attacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=399865 False None None None Network World - Magazine Info Mingis on Tech: Android vs iOS – Which is more secure? 2017-08-10T03:00:00+00:00 http://www.networkworld.com/video/80515/mingis-on-tech-android-vs-ios-which-is-more-secure#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=394994 False None None None Network World - Magazine Info Even weak hackers can pull off a password reset MitM attack via account registration pdf). It explains how a weak attacker could take over accounts by exploiting vulnerabilities in password reset procedures.They dubbed the attack: password reset man-in-the-middle (PRMitM). The researchers said Google is “extremely vulnerable” to PRMitM, but Facebook, Yahoo, LinkedIn, Yandex and other sites and email services are also vulnerable as well as mobile apps like Whatsapp, Snapchat and Telegram.To read this article in full or to leave a comment, please click here]]> 2017-06-25T08:42:00+00:00 http://www.networkworld.com/article/3203386/security/even-weak-hackers-can-pull-off-a-password-reset-mitm-attack-via-account-registration.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=378207 False None Yahoo None Network World - Magazine Info It\'s time to upgrade to TLS 1.3 already, says CDN engineer To read this article in full or to leave a comment, please click here]]> 2017-06-23T04:03:01+00:00 http://www.networkworld.com/article/3202319/internet/its-time-to-upgrade-to-tls-13-already-says-cdn-engineer.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=378032 False None None None Network World - Magazine Info 198 million American voter records found unprotected on the internet To read this article in full or to leave a comment, please click here]]> 2017-06-20T09:18:00+00:00 http://www.networkworld.com/article/3202305/security/198-million-american-voter-records-found-unprotected-on-the-internet.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=376534 False None None None Network World - Magazine Info Hackers attacked 4 Florida school districts, allegedly hoped to hack voting systems hack the US election, but another hacking group also allegedly wanted to interfere with the election; they attempted to pivot from compromised school districts to state voting systems.The Miami Herald reported that MoRo, a group of hackers based in Morocco, penetrated “at least four Florida school district networks” and purportedly searched for a way “to slip into other sensitive government systems, including state voting systems.”To read this article in full or to leave a comment, please click here]]> 2017-06-18T08:22:00+00:00 http://www.networkworld.com/article/3201118/security/hackers-attacked-4-florida-school-districts-allegedly-hoped-to-hack-voting-systems.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=375530 False None None None