www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-14T22:44:38+00:00 www.secnews.physaphae.fr Network World - Magazine Info IBM s'appuie sur l'IA pour les services de sécurité gérés<br>IBM leans into AI for managed security services Pour lire cet article en entier, veuillez cliquer ici
IBM is rolling out AI-based managed services that promise to help network and security operations teams more quickly and effectively respond to enterprise cyber threats.Managed by the IBM Consulting group, the Threat Detection and Response (TDR) Services offering promises 24x7 monitoring, investigation, and automated remediation of security alerts from existing security tools as well as cloud, on-premises, and operational technology systems utilizing the enterprise network. The services can integrate information from more than 15 security event and incident management (SIEM) tools and multiple third-party endpoint and network detection and response packages, for example.To read this article in full, please click here]]>
2023-10-06T07:52:00+00:00 https://www.networkworld.com/article/3708271/ibm-leans-into-ai-for-managed-security-services.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8392240 False Tool,Threat None 2.0000000000000000
Network World - Magazine Info IBM X-FORCE: L'utilisation des informations d'identification compromises assombrit l'image de sécurité du nuage<br>IBM X-Force: Use of compromised credentials darkens cloud security picture IBM X-Force Cloud Threat Landscape Report , qui a également trouvé une augmentation de 200% (environ 3 900 vulnérabilités) enLes vulnérabilités et les expositions communes axées sur le cloud (CVE) au cours de la dernière année. «Plus de 35% des incidents de sécurité du cloud se sont produits par les attaquants \\ 'Utilisation des références valides et compromises», a écrit Chris Caridi, cyber-cyber-cyberAnalyste de menace avec IBM X-Force, dans un blog À propos du rapport.«Comprenant près de 90% des actifs à vendre sur les marchés Web Dark, les informations d'identification \\ 'parmi les cybercriminels sont apparentes, une moyenne de 10 $ par inscription & # 8211;ou l'équivalent d'une douzaine de beignets. " Pour lire cet article en entier, veuillez cliquer ici
As connectivity to cloud-based resources grows, cybercriminals are using valid, compromised credentials to access enterprise resources at an alarming rate.That\'s one of the chief findings of the IBM X-Force Cloud Threat Landscape Report, which also found a 200% increase (about 3,900 vulnerabilities) in cloud-oriented Common Vulnerabilities and Exposures (CVE) in the last year.“Over 35% of cloud security incidents occurred from attackers\' use of valid, compromised credentials,” wrote Chris Caridi, strategic cyber threat analyst with IBM X-Force, in a blog about the report. “Making up nearly 90% of assets for sale on dark web marketplaces, credentials\' popularity among cybercriminals is apparent, averaging $10 per listing – or the equivalent of a dozen doughnuts.”To read this article in full, please click here]]>
2023-09-15T08:36:00+00:00 https://www.networkworld.com/article/3706948/ibm-x-force-use-of-compromised-credentials-darkens-cloud-security-picture.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8383732 False Vulnerability,Threat,Studies,Cloud None 3.0000000000000000
Network World - Magazine Info Versa améliore le package SASE avec des outils de sécurité basés sur l'IA<br>Versa enhances SASE package with AI-based security tools Package Versa Sase qui inclut SD WAN, un pare-feu de nouvelle génération et d'application Web, la prévention des intrusions, le support zéro fiducie et la prévention de la perte de données. Pour lire cet article en entier, veuillez cliquer ici
Versa is bolstering the AI security management features of its integrated Secure Access Service Edge (SASE) package to include improved malware detection for Advanced Threat Protection, network microsegmention and generative AI protection to help customers better detect and quickly mitigate threats to their networked service and applications.The vendor supports AI in its integrated Versa SASE package that includes SD WAN, a next-generation and web application firewall, intrusion prevention, zero trust support and data loss prevention.To read this article in full, please click here]]>
2023-08-23T10:00:00+00:00 https://www.networkworld.com/article/3705056/versa-enhances-sase-package-with-ai-based-security-tools.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8373748 False Malware,Tool,Threat None 2.0000000000000000
Network World - Magazine Info Fortinet dévoile les pare-feu du centre de données avec support de l'IA<br>Fortinet unveils data center firewalls with AI support Pour lire cet article en entier, veuillez cliquer ici
Fortinet has released two new high-speed, next generation firewalls designed to protect data center assets.The 387Gbps 3200F series and 164Gbps 900G series feature support for the vendor\'s AI-Powered Security Services, which blend AI and machine-learning technologies to make customers aware of cyber threats and act on protecting resources much more quickly, according to Nirav Shah, vice president of products and solutions at Fortinet.FortiGuard AI-Powered Security Services use real-time data from Fortinet\'s threat researchers at FortiGuard Lab to monitor for new dangers. “We look at terabytes of data every day, and that\'s where we run our AI and machine learning to see different things – whether we need to enable AI-powered services with IPS, or utilize sandbox technologies to mitigate them,” Shah said. “If you look at the cybersecurity industry, and the amount of data that we see, and the patterns and other things that we need to recognize to find the threats – [it] is extremely tough if you do it manually.”To read this article in full, please click here]]>
2023-07-18T09:38:00+00:00 https://www.networkworld.com/article/3702659/fortinet-unveils-data-center-firewalls-with-ai-support.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8358370 False Threat None 2.0000000000000000
Network World - Magazine Info Cisco vise la sécurité de l'IA-First avec Armorblox Acheter<br>Cisco aims for AI-first security with Armorblox buy un blog annonçant l'acquérir en pente . Bien que la sécurisation des e-mails était la première application par Armorblox \\ de ses techniques d'IA, ils pourraient également être appliqués à la prédiction d'attaque, à une détection rapide des menaces et à l'application efficace des politiques, a écrit Chopra."Grâce à cette acquisition, nous voyons de nombreux cas d'utilisation et possibilités d'utilisation de sécurité passionnants à déverrouiller." Pour lire cet article en entier, veuillez cliquer ici
Cisco plans to buy Armorblox, a six-year-old AI vendor, to help create “an AI-first Security Cloud.”“Leveraging Armorblox\'s use of predictive and Generative AI across our portfolio, we will change the way our customers understand and interact with their security control points,” wrote Raj Chopra senior vice president and chief product officer for Cisco Security in a blog announcing the pending acquistion.While securing email was Armorblox\'s first application of its AI techniques, they might also be applied to attack prediction, rapid threat detection, and efficient policy enforcement, Chopra wrote. “Through this acquisition though, we see many exciting broad security use cases and possibilities to unlock.”To read this article in full, please click here]]>
2023-05-31T16:34:00+00:00 https://www.networkworld.com/article/3698288/cisco-aims-for-ai-first-security-with-armorblox-buy.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8341073 False Threat None 2.0000000000000000
Network World - Magazine Info Palo Alto targets zero-day threats with new firewall software next-generation firewall (NGFW) software that includes some 50 new features aimed at helping enterprise organizations battle zero-day threats and advanced malware attacks.The new features are built into the latest version of Palo Alto's firewall operating system – PAN 11.0 Nova – and include upgraded malware sandboxing for the company's WildFire malware-analysis service, advanced threat prevention (ATP), and a new cloud access security broker (CASB).WildFire is Palo Alto's on-prem or cloud-based malware sandbox that is closely integrated with Palo Alto's firewalls. When a firewall detects anomalies, it sends data to WildFire for analysis. WildFire uses machine learning, static analysis, and other analytics to discover threats, malware and zero-day threats, according to the vendor.To read this article in full, please click here]]> 2022-11-16T08:52:00+00:00 https://www.networkworld.com/article/3680233/palo-alto-targets-zero-day-threats-with-new-firewall-software.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8049914 False Malware,Threat None None Network World - Magazine Info CISA issues emergency warning over two new VMware vulnerabilities 2022-05-19T06:10:00+00:00 https://www.csoonline.com/article/3661589/cisa-issues-emergency-warning-over-two-new-vmware-vulnerabilities.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=5485729 False Threat None None Network World - Magazine Info Cohesity launches FortKnox to protect data from ransomware attacks Cohesity is launching a new data isolation and recovery tool called FortKnox, in a bid to help customers protect their data from ransomware attacks.FortKnox provides an additional layer of off-site protection for customers by keeping data in a secure 'vault,' with physical separation, network and management isolation to keep threat actors from accessing sensitive data.An object lock requires a minimum of two or more people to approve critical actions, such as changes of vault policy, and access can be managed using granular role-based access control, multi-factor authentication, and encryption both in-flight and at rest.To read this article in full, please click here]]> 2022-05-10T03:00:00+00:00 https://www.networkworld.com/article/3659878/lock-up-your-data-with-cohesity-fortknox.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=4664459 False Ransomware,Tool,Threat None None Network World - Magazine Info US security agencies warn of threats to industrial, utility control networks joint warning that certain advanced persistent threat (APT) actors have shown the ability to gain full system access to compromised ICS/SCADA systems.The alert did not identify which groups were making the threats, but it did recognize Dragos, Mandiant, Microsoft, Palo Alto Networks and Schneider Electric for helping put together the warning. Dragos has posted a paper about part of the threat.To read this article in full, please click here]]> 2022-04-14T07:13:00+00:00 https://www.networkworld.com/article/3657609/us-security-agencies-warn-of-threats-to-industrial-utility-control-networks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=4664462 False Threat None None Network World - Magazine Info CISA warns of attacks against internet-connected UPS devices 2022-03-30T08:55:00+00:00 https://www.csoonline.com/article/3655591/cisa-warns-of-attacks-against-internet-connected-ups-devices.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=4664463 False Threat None None Network World - Magazine Info Texas ransomware attacks: to pay or not to pay? | TECH(feed) 2019-08-22T12:53:00+00:00 https://www.networkworld.com/video/97488/texas-ransomware-attacks-to-pay-or-not-to-pay-tech-feed#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=1279464 False Ransomware,Threat None None Network World - Magazine Info Cisco: DNSpionage attack adds new tools, morphs tactics DNSpionage in November, this week warned of new exploits and capabilities of the nefarious campaign. More about DNS: DNS in the cloud: Why and why not DNS over HTTPS seeks to make internet use more private How to protect your infrastructure from DNS cache poisoning ICANN housecleaning revokes old DNS security key “The threat actor's ongoing development of DNSpionage malware shows that the attacker continues to find new ways to avoid detection. DNS tunneling is a popular method of exfiltration for some actors and recent examples of DNSpionage show that we must ensure DNS is monitored as closely as an organization's normal proxy or weblogs,” Talos wrote.   “DNS is essentially the phonebook of the internet, and when it is tampered with, it becomes difficult for anyone to discern whether what they are seeing online is legitimate.”]]> 2019-04-24T11:06:00+00:00 https://www.networkworld.com/article/3390666/cisco-dnspionage-attack-adds-new-tools-morphs-tactics.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=1095452 False Malware,Threat None None Network World - Magazine Info Cisco Talos details exceptionally dangerous DNS hijacking attack report detailing what it calls the “first known case of a domain name registry organization that was compromised for cyber espionage operations.”Talos calls ongoing cyber threat campaign “Sea Turtle” and said that state-sponsored attackers are abusing DNS to harvest credentials to gain access to sensitive networks and systems in a way that victims are unable to detect, which displays unique knowledge on how to manipulate DNS, Talos stated. More about DNS: DNS in the cloud: Why and why not DNS over HTTPS seeks to make internet use more private How to protect your infrastructure from DNS cache poisoning ICANN housecleaning revokes old DNS security key By obtaining control of victims' DNS, the attackers can change or falsify any data on the Internet, illicitly modify DNS name records to point users to actor-controlled servers; users visiting those sites would never know, Talos reported. ]]> 2019-04-17T08:11:00+00:00 https://www.networkworld.com/article/3389747/cisco-talos-details-exceptionally-dangerous-dns-hijacking-attack.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=1094145 False Threat None None Network World - Magazine Info Protecting the IoT: 3 things you must include in an IoT security plan 2019-02-27T07:39:00+00:00 https://www.networkworld.com/article/3343184/protecting-the-iot-3-things-you-must-include-in-an-iot-security-plan.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=1044895 False Hack,Threat,Guideline None None